Page 2,095«..1020..2,0942,0952,0962,097..2,1002,110..»

Satellites, the first line of defence – Capacity Media

The agencies, one from each of the Five Eyes countries that have worked on intelligence since World War Two, were the UKs National Cyber Security Centre, the Cybersecurity and Infrastructure Security Agency (CISA) in the US, National Cyber Security Centre New Zealand, the Canadian Centre for Cyber Security, and the Australian Cyber Security Centre,

But what this will mean for the wholesale telecoms/ICT community that protect not only the infrastructure, but the network layer and in some cases the application layer as well?

According to Alp Toker, founder and director of NetBlocks, a global internet monitor, Ukraine has been a huge wake-up call for the telecoms community in terms of security, but there are also other factors to consider.

Firstly, the pandemic has caused a blurring of lines between business infrastructure and home infrastructure, so you already have this need for resilience that is much more widespread than to the office or to the data centre, says Toker.

At the same time there has been a growing awareness of physical infrastructure and threats to physical infrastructure, including both kinetic attacks and sabotage, so, along with awareness of telecommunications, theres also an awareness of how to disrupt telecommunications.

But by his own admission there is no silver bullet. Instead telcos must adopt a holistic approach with information officers encouraged to track the news and keep up to date with whats going on according to their own processes.

Theres the hardware threat, the software threat, as well as a piggybacking of business infrastructure, increasingly on consumer networks creating this need for increased reliability across the board, added Toker.

Telcos are going to need to improve security by themselves. They cant rely on government or local authorities. Its a task for the entire business.

Despite the need for a holistic approach, a month prior to the publication of the joint Cybersecurity Advisory, the CISA and the Federal Bureau of Investigation (FBI) published an alert on the need for US and international satellite operators to strengthen their cybersecurity citing the current geopolitical situation.

Satellite

In its advisory the Cybersecurity Advisory writes that it strongly encourages critical infrastructure organisations and other organisations that are either satcomm network providers or customers to review and implement the mitigations outlined in this CSA to strengthen satcomm network cybersecurity.

Toker said: Satellite communications have played a significant role in the conflict, despite Ukraine being very well connected via land.

One such incident that supports this need is the attack on the Viasat satellite network in Europe on the morning of the Russian invasion.

It shows you that this kind of instruction will be targeted as a means of preparing the battlefield and as a means of limiting communications, he added.

Further, the introduction of low earth orbit satellites like Starlink brings with it new technological opportunities as it no longer requires bulky equipment and in theory, a receiver and transmitter can be minimised and put on a phone: it can even be scaled down to the size of a wristwatch.

This has been part of what Toker calls the information warfare field. The first is that the technology itself has been classified as a risk by the Russian government, which sees independent communication lines as a threat.

Next, he says is the use of jamming, which refers to the intentional disruption of wireless communications with signal interference to limit the use of devices such as handsets.

The most interesting thing here is this new ability that Starlink has developed to dynamically mitigate these risks, which really speaks to needs that the whole industry faces not just in satellite. When there is a threat, you need to be able to counter it dynamically and in real time.

This functionality enables operators to push updates, including firmware updates and dynamic frequency updates to mitigate these threats because otherwise your device is going to be incapacitated and stuck in the field.

This leads onto another emergent threat: firmware attacks, another type of assault believed to have happened during the Russia-Ukraine war.

This is every telcos nightmare, because once a device is bricked that device is very difficult or impossible to repair, says Toker.

If hackers can push fake firmware or can incapacitate devices, they can knock out significant parts of the network, without even needing to perform a more sophisticated attack or supply chain attack. The more remote the devices, the more of a nightmare it is for the operator to resolve the issue, with the ultimate fear being that satellites themselves could be bricked through remote firmware.

One such example includes the story of Russian looters who, while working with the Russian military, stole 27 pieces of John Deere farm equipment, valued at approximately $5,000,000 from a dealership in Melitopol, Ukraine.

The group attempted to take the equipment back to Chechnya, Russia in an attempt to sell it on, but the John Deere dealership used the internet and bricked the tractors, using an in-built kill-switch.

Security and tech

With so many companies monitoring the situation, Quad9, a global public recursive DNS resolver, intercepted more than 4.6 million attacks against computers and phones in Ukraine and Poland since March of this year.

Bill Woodcock, executive director of Packet Clearing House, said: Theyre being targeted by a huge amount of phishing, and a lot of malware that is getting onto machines is trying to contact malicious command-and-control infrastructure.

Toker says that, due to the varied nature of these attacks, securing the home, and building networking structure that is as reliable as the office, in peoples homes, has really become the new challenge.

AI and machine learning continue to be the biggest technologies to invest in for their ability to monitor and mitigate network activity. As for things like quantum cryptography, Toker says it holds a lot of potential but but there are also questions about how to make it attractive as an investment. There needs to be an increased awareness and desire to protect users data, so that there can be investment in technologies like quantum cryptography.

While blockchain continues to grow in use cases, he says we havent yet seen the real-world applications agreed for the technology.

Tokers advice is to decentralise as much as you can, while increasing peering and reducing choke points that can be targeted by threat actors.

If a telco isnt automating their threat analysis, they really need to get involved with that now, he said. You need to know what attacks are coming in, and you need to be able to automate that, so machine learning would be a deployment that I would prioritise.

Read this article:
Satellites, the first line of defence - Capacity Media

Read More..

Mitigating cyber threats post pandemic – Capacity Media

The disruption caused by Covid-19 has left companies struggling to maintain security and business continuity.

The working from home culture adopted by millions as a result of the pandemic meant a heightened risk of cyber threats for businesses. However, this sudden shift meant many companies were still ill-prepared for breaches to their systems.

What we saw, at the beginning of the pandemic at least, was that organisations were not prepared for the quick shift to offsite working, says Max Rttgermann, senior product manager of IP transit and DDoS defence at Deutsche Telekom.

He adds that companies did not have the security processes in place to ensure their data was secure as a growing number of employees began to work from home.

And as many employees worked from their own personal computers, the risk of cybercrimes was greater than ever before, according to Rttgermann.

We were faced with providing quick solutions to a large number of clients all at the same time, and many organisations have still not enabled satisfactory security procedures, he says.

Simultaneously, more organisations had limited staff on site, meaning there were fewer employees available to keep an eye on fraud controls as meticulously as they may have done previously.

This all provided and continues to provide fertile ground for fraudsters.

Mitigating the risk

Deutsche Telekom itself faces the same risks that any organisation faces. Having said that, Rttgermann acknowledges that being a major telco provider makes the company an attractive target for those attempting to affect or influence businesses or even political agendas.

However, the firm has a comprehensive series of mitigation solutions in place to neutralise those risks.

We continually launch innovations and strengthen our defence offerings to the benefit of our clients as well as ourselves, Rttgermann says.

Additionally, we automatically analyse immense amounts of data every day to protect our own infrastructure.

One such solution is its 360 Defense Strategy, which takes a holistic approach to protection with the intention of stopping fraud and cyberattacks before they have a chance to cause any damage.

Part of that includes its automated fraud monitoring system, which screens all international voice traffic and can independently take mitigation steps in case of anomalies or suspicious traffic.

Deutsche Telekom has a team of security and fraud experts who look into identifying possible cyberattacks and fending them off and making sure the company is best prepared to deal with one, should it occur.

Rttgermann says that there are programmes that help the company to determine where the next possible attacks may be coming from, so that they can be stopped before they have a chance to do damage.

This is a continuous effort, and one we successfully maintain, he says.

Through our co-operation with the best partners in the industry, we have developed a whole regiment of troops to battle even the toughest of cyber enemies.

IoT security

With the rapid evolution of Internet of Things (IoT) devices and the swift adoption of IoT as an industry, security will become increasingly important. The total number of IoT devices is expected to jump to 30.9 billion units by 2025, according to numbers from Statista. This means, according to Rttgermann, that greater emphasis must be placed on IoT security.

If you think about use cases such as remote surgery, autonomous cars, smart medical implants, or even governments promoting smart cities they all need not only fast and reliable connectivity but also strong security, Rttgermann says.

He adds that Deutsche Telekom Global Carrier already has one of the most comprehensive security portfolios on the market something that will strengthen IoT security.

Additionally, the company has initiated developments that bring continual advancements to enhance connectivity security. They includes its Regional Packet Gateway platform, which installs gateways at strategic locations around the world instead of sending data back to a home country that could be in a remote location.

Alongside this, Rttgermann says, Deutsche Telekom led an ITW Global Leaders Forum (GLF) working group to publish a Code of Conduct for the direct peering of critical, transnational IoT traffic.

Its purpose was to define a protocol among global carriers providing IPX-based traffic in order to assure quality of service for critical IoT applications.

Without initiatives like this, enterprise customers would not be able to guarantee the stability of their products to end users, he adds.

At Deutsche Telekom Global Carrier, we are more than ready to take on any cybersecurity fraudsters or criminals.

Go here to see the original:
Mitigating cyber threats post pandemic - Capacity Media

Read More..

Noteworthy Information in the French Data Protection Authority’s (CNIL) Newly Published 2021 Annual Report – Lexology

The French data protection authority, the CNIL, has published its annual report for 2021 (in French) which contains some useful information and figures notably on complaints, investigations and sanctions as well as standards of references issued by the CNIL in relation to specific processing activities.

Complaints

In 2021, the CNIL received 14,143 complaints (an increase of 7% compared to 2020 but similar to 2019) out of which:

Some complaints have been transferred to another lead authority under the one stop shop and cooperation rules.

The CNIL has also received 5,882 indirect data subject action requests (the indirect action is the only one available for certain data basis such as the one for the police or secret services).

The CNIL reports that many complaints have been made about organizations that are established outside of the EU (UK, Switzerland, United States of America, Canada, Russia, Australia, South Korea and China) mainly in relation to the publication of data on the Internet.

Investigations

It carried out 384 investigations, 31% of which followed from complaints or reports.

The CNIL highlights:

Cookie compliance has been one of the priority themes set by the CNIL for 2021 and the CNIL has launched an unprecedented control campaign.

The CNIL also continued its control activities on the security of health data by investigating 30 medical analysis laboratories, hospitals, service providers and data brokers, notably in relation to COVID-19 pandemic related data. Some of these procedures are still ongoing.

It controlled 22 organizations, 15 of which are public with respect to the level of internet security. The investigations revealed obsolete cryptographic suites making websites vulnerable to attacks, shortcomings concerning passwords and, more generally, insufficient means with regard to current security issues.

Sanctions

The CNIL issued:

Out of the 18 sanctions,

The most frequent breaches include:

The CNIL also issued two public sanctions against the Ministry of the Interior, concerning the illicit use of drones and poor management of the automated fingerprint file (FAED).

Investigation program for 2022

In February, the CNIL published its priority focuses for investigation in 2022 investigation program, which accounts for around one third of its investigations, on the following three major topics:

This follows the numerous complaints received on this topic and the publication in February 2022, a new commercial management reference framework, in particular framing the carrying out of commercial prospecting. The CNIL intends to investigate data brokers and other intermediaries.

The significant shift to teleworking has led to the development of specific tools, including tools allowing employers to ensure closer monitoring of the daily tasks and activities of employees. The CNIL considers it necessary to check the employers practices in this field.

The CNIL intends to explore issues relating to data transfers and the management of contractual relations between data controllers and cloud solution provider subcontractors.

The CNIL has received 5,037 data breach notifications (a 79% increase compared to 2020) out of which, 63% were due to an external cause (accident or malicious act). The CNIL considers that this figure is still too low compared to actual data breaches which may have occurred.

The CNIL responded to 22 parliamentary hearings and issued 121 opinions on bills and decrees. 16 of these opinions concerned how data processing was implemented in the context of the fight against the COVID-19 pandemic.

The CNIL also handled 576 health authorization applications in 2021 and issued 54 research authorizations on COVID-19.

In 2021, the CNIL adopted several standards of reference and sectorial recommendations. These included:

It has also developed tools to enable the development of virtuous digital innovation, in particular through its start-up strategy deployed in 2017. This year, this has resulted in the implementation of a first personal data sandbox for health. As a result, 12 projects have been supported by the CNIL, including 4 in a reinforced way.

Read this article:
Noteworthy Information in the French Data Protection Authority's (CNIL) Newly Published 2021 Annual Report - Lexology

Read More..

How Singapore is shaping its cyber defence with international collaboration – GovInsider

If you see your neighbours house burning, do not point and laugh, because yours will be next. These words of warning, shared by a foreign diplomat, summarise the importance of collaboration in the cyber sphere, said Gaurav Keerthi, Deputy Chief Executive (Development), Cyber Security Agency, Singapore.

Teamwork makes the dream work, and thats no exception for protecting against cyber threats. Having channels of communication between nations allows them to tackle cross-border cyber attacks together, Keerthi shared at GovInsiders AI x GOV panel on cyber diplomacy.

He discussed how Singapore is working with the international community to fortify cyber defences. Keerthi also shared how governments can build cyber capabilities even among non-IT skilled citizens by providing greater convenience and incentives.

International cyber cooperation

Why should governments work with one another on cybersecurity issues? A cyber threat, like a fire, will spread, shared Keerthi. If theres a cybersecurity incident in another nation in Southeast Asia, we have to lean forward and help each other, he said.

When vulnerabilities emerge, it is now instinctive for Southeast Asian nations to pick up the phone and ask are you seeing this too?, Keerthi shared. Nations are building both regional and global agreements on cybersecurity, GovInsider reported.

On a worldwide level, Singapore chairs an Open Ended Working Group, an international team within the UN, to look at the use of information and communications. The hope is that this group will help implement international norms on responsible cyber behaviour.

For example, representatives from Singapore suggested nations practice for emergency situations. This includes making sure different countries know who to call when they require assistance or have valuable information, Keerthi explained.

Another example of collaboration is Singapores cyber labelling scheme, where IoT devices are given a sticker to rate them according to their level of cybersecurity protections. Finland and Singapore have agreed to recognise labels from each other, Keerthi shared.

This means that IoT manufacturers can apply for a labelling rating and have their products cybersecurity protections recognised in both countries, wrote Singapores Cyber Security Agency.

Cybersecurity and the average person

Keerthi discussed how citizens and public servants without significant IT training could play their part in cybersecurity. First, he shared that you should not need to be a computer science student to operate a computer.

When he first learned to drive, Keerthi had to learn the parts of a car engine, such as the carburetor. But today, drivers just need to know where the start button is, he said. This can be applied to cybersecurity, explaining that technology can make it easier for non-experts.

One example of how governments can develop cyber safety among citizens is through a mobile app where citizens can use biometrics to access government e-services, Keerthi shared.

Rather than having to remind citizens about two factor authentication and strong passwords, its actually cheaper and more effective to just build an authentication platform for them, Keerthi highlighted.

Defending Singapore includes small businesses and citizens Singapores uncles and aunties, he shared. The government has a duty to provide clean drinking water in the form of reliable and clean internet access to its citizens, he highlighted.

Second, regulations can help ensure cyber safety, comparing cyber security tools with cars. Cars in the past were less safe than they are today, but then regulations required automobiles to be built with seatbelts.

Now automobile manufacturers have moved beyond seatbelts, and are developing new safety measures on their own, Keerthi continues. Cybersecurity tools have not yet reached this level of advancement, but the role of these regulations is something to keep in mind, he shared.

Third, he shared that market forces are a method of developing cybersecurity protections, without IT knowledge. The cyber labelling scheme mentioned previously is an example of this.

The simple sticker on IoT devices immediately changes behaviour among consumers as they can easily evaluate a products security, Keerthi said. But it also alters the behaviour of manufacturers as they will compete with each other to provide this improved security, he explained.

This is not a technology solution, but understanding human behaviour, understanding dynamics of market competition, and trying to incentivise market competition in security, he summarised.

To stop a spreading fire, people form a human chain to ferry water to the flames. Governments can similarly work together to stop cyber attacks, setting out cyber norms and instinctively sharing information with one another, to protect their citizens.

See original here:
How Singapore is shaping its cyber defence with international collaboration - GovInsider

Read More..

COMMENTARY: Computer Science is everywhere in our world but almost nowhere in California schools – EdSource

Alison Yin/EdSource

In data science classes, students write computer programs to help analyze large sets of data.

In data science classes, students write computer programs to help analyze large sets of data.

California leads the world in technological innovation, and our economy benefits from a tech sector that generates more than $520 billion annually. Nearly 2 million Californians have already staked their claim in the states growing tech workforce with no end in sight. There are about 68,000 computing jobs currently available that earn above-average yearly salaries of $115,754.

Yet, when it comes to who gets these jobs, Californias youth particularly the Black, Latino, Indigenous and low-income students that are historically underserved and have been disproportionately impacted by the pandemic lack access to the education and preparation needed to take on these roles.

Since his time as lieutenant governor, Gov. Gavin Newsom has stood with us policymakers, computer science education advocates, and teachers and has been committed to expanding access to quality computer science education. He has embraced the fact that technological fluency is core to the ways we live and work today.

Yet, California still makes shockingly low investments in computer science education. Nearly two-thirds of California high schools lack computer science courses, ranking 41st nationally. Our state is neglecting to prepare students to enter Californias tech industry, and neglecting to train and equip teachers with the resources or professional knowledge needed to support our students.

Even in schools that have computer science education, teachers too often lack computer science-focused training and professional development. This leaves teachers struggling to provide high-quality computer science education for our children especially those that are in underserved and underrepresented communities and schools.

In 2019, the State Board of Education, the governor, and the Legislature created the Computer Science Strategic Implementation Plan, a road map to expand teaching and learning opportunities and address inequities in computer science education. This was major progress but we continue failing to adequately fund computer science education.

This year, the governor and the Legislature can use the state budget to jumpstart the solution and finally invest in the teachers who are guiding Californias students. This is a unique chance to end the cycle of failed support for computer science education and our students futures especially for Black, Latino, Indigenous, and low-income students.

This investment is possible in part because while students have struggled throughout the pandemic, the State of Californias revenue has not: the surplus just topped $68 billion. The funding is available like never before, and there is no better time to invest in our kids.

This is why we strongly encourage the governor and Legislature to adopt two key computer science education funding requests of $15 million for teacher preparation from Assemblymember Marc Berman and $101.6 millionfor teacher professional development from Assemblymember Luz Rivas. These funds will support targeted, equitable investment in computer science education:

Its up to us to empower students with the skills and experiences to stake their claim on those 68,000 high-paying technology jobs. Its up to us to fight computer science education inequities. This funding is a critical step to making sure teachers have the knowledge, tools and resources to help all students develop the essential skills they need to thrive in Californias modern economy.

Allison Scott is the co-director of the Computer Science for California Coalition and the chief executive officer of the Kapor Foundation, which aims to make the technology ecosystem and entrepreneurship more diverse and inclusive.

Art Lopez is a computer science teacher at Sweetwater High, in San Diego and serves as the Grades 9-12 high school representative for the board of directors for the Computer Science Teachers Association.

Susan Bonilla is CEO of the CA Pharmacists Association and a member of ReadyNation, a business organization advocating for education improvements. She served in the California Assembly from 2010-2016 and authored the legislation for the Computer Science Strategic Implementation Plan.

The opinions in this commentary are those of the authors. If you would like to submit a commentary, please review ourguidelinesandcontact us.

To get more reports like this one, click here to sign up for EdSources no-cost daily email on latest developments in education.

Follow this link:

COMMENTARY: Computer Science is everywhere in our world but almost nowhere in California schools - EdSource

Read More..

Computer science teacher in Lynn named one of Amazons teachers of the year – CBS Boston

LYNN (CBS) A teacher in Lynn has received an exciting recognition Tymond Tran was named one of Amazons teachers of the year.

Tran teaches computer science at Thurgood Marshall Middle School in Lynn.

This year, Amazon named him a Future Engineer Teacher of the Year. The award is $30,000, $25,000 goes to the school and the teacher gets to keep $5,000.

I was incredibly surprised. I had no idea it was coming, and it turned out to be really wonderful because it just so happened to be the week that our superintendent of the district was in, Tran said. So he was actually the one that came in with the Amazon box and surprised me. Hes like, Hey, open this up. See whats inside. And so, as I was opening it in front of my class in the middle of my mini-lesson, the rest of the administration from the school showed up with balloons and poppers and just cheering. It was a great time.

Tran is one of 10 teachers across the country to be recognized for going above and beyond.

Read more:

Computer science teacher in Lynn named one of Amazons teachers of the year - CBS Boston

Read More..

From Brandeis to Google: One Student’s Journey through the World of Computational Linguistics – Brandeis University

Home / News & Events / From Brandeis to Google: One Students Journey through the World of Computational Linguistics

May 12, 2022

Sydney Adams | Graduate School of Arts and Sciences

Prior to pursuing her PhD in Computer Science at Brandeis, Ella Tusons initial attraction to the field was a bit of a surprise. She found a love for teaching and researching in Computer Science as an undergraduate at Clark University in Worcester, MA. I had initially taken the class to fill the science requirement, she says, and I guess I just sort of fell in love. Tuson wanted to maintain the liberal arts background she had experienced as an undergraduate when she transitioned to graduate education. When looking for programs, she realized that Brandeis, had everything she was looking for.

Brandeis Michtom School of Computer Science aims to provide students with a breadth of experience in the field. It also maintains a focus on developing technology and scholarship that will benefit society. These approaches appealed to Tuson and enabled her to avoid being shoehorned into one field within the discipline. What she loves most about the department is, the cross-pollination of ideas between different disciplines, from, the diversity of research interests of the faculty, to the exposure to research and teaching.

Tuson was also excited to perform original research in the field while enjoying the more intimate classroom and laboratory environments of a smaller-sized program. She says that Professor Timothy J. Hickey and Professor Richard Alterman have not only supported her academically during her time at Brandeisthey have both been instrumental in [her] development as a teacher and as a researcher. In fact, their mentorship and guidance has led Tuson to research topics that she believes will have a positive impact in the world.

Currently, Tuson is working with Professor Hickey to uncover new ways of improving student outcomes in Computer Science education. Their goal is to, improve equity and promote diversity in Computer Science education, while also easing some of the burden on both teachers and students that can come from traditional class structures. And Ella does not want to end her project at Brandeis. After graduation, she hopes to, pursue a teaching position at a University where I can continue doing research while also working to support the next generation of Computer Science students.

Tuson has some advice for those interested in exploring Computer Science at Brandeis, to go for it, even if youre nervous. As intimidating as Computer Science may be, especially to those who may not have had a large amount of experience in the field Tuson ensures that, you dont have to be a math-wiz or have already written a bunch of code to succeed in Computer Science. Really all you need is a little bit of creativity and the willingness to stare at a computer screen for many, many hours.

Here is the original post:

From Brandeis to Google: One Student's Journey through the World of Computational Linguistics - Brandeis University

Read More..

Institute of Diversity Sciences Awards Team Grants for Science and Engineering Research that Promotes Social Justice – UMass News and Media Relations

The Institute of Diversity Sciences (IDS), led by Nilanjana Dasgupta, awarded three new grants to multidisciplinary teams of faculty and student researchersfocused on promoting social justice in the science and engineering. From bilingual tutoring software to the safety of public drinking water, the winning teams are working to ensure that STEM research addresses some of societys most pressing disparities. Here are the winning teams:

Ivon Arroyo (education and computer science), Marialuisa Di Stefano (language, literacy, and culture) and Beverly Woolf (computer science) have teamed up to address the growing need for new learning technologies that address the needs of bilingual (Spanish and English) students, with personalized Latinx digital avatars. Addressing the problem of a one-size-fits-all approach to education, this research responds to the need to personalize tech for individual student needs: using alternative languages and representations of content, deploying avatars that reflect their identities, and providing personal pathways through the curriculum.

Read more here.

Youngmin Yi (sociology), Jamie Rowen (legal studies and political science), Joshua Kaiser (sociology), Cindy Xiong (computer science), Guiherme Santos Rocha (undergraduate, sociology and computer science, Amherst College), and Hamza Elhamdadi (graduate student, computer sciences, UMass Amherst) are concerned studying ongoing public concern about racism and other systemic inequalities in the criminal legal system, as exemplified by the Black Lives Matter protests in the summer of 2020. In response, many criminal legal agencies instituted new reforms to reduce bias and inequality in their operations and to increase their legitimacy in the eyes of constituents. Some district attorneys (DAs) have engaged in particularly strong, public efforts to tackle the disparities in prosecutions, offering various options for those convictedfor instance, diversion from incarceration, or from a criminal record altogether. As part of this progressive prosecution agenda, DAs are turning to administrative data not only as a tool to manage cases, but as a resource to assess whetherreforms are working. To be more transparent about their process, they also are disseminating data on their practices broadly Yet, there is limited knowledge as to whether these efforts are in fact addressing bias, inequality and public trust in the criminal legal system. Are these data analyses and public dissemination of quantitative information about prosecution effective tools for reform? By being more transparent, are they making the criminal prosecution system more accountable to the public?

Read more here.

Emily Kumpel (civil and environmental engineering), Airn D. Martnez (health promotion and policy) and CarlosVeras (graduate student, environmental and water resources engineering), are conducting a community-engaged study bridging expertise in water utilities and public health to better understand and address water mistrust. The publics perception of the safety and quality of their public drinking waterknown as water mistrustis a significant concern in the United States that disproportionately affects the health and wealth of marginalized ethnic/racial communities, low-income, and foreign-born populations. This persistent problem has been exacerbated by COVID-19 pandemic-related financial hardships on both households and water utilities, as well as by climate change. When people dont trust the water coming from their taps, they turn to unhealthy and more expensive drinking options such as sugar-sweetened beverages or bottled water. Some households even invest in household water treatment systems and filters, incurring additional expenses. Whats more, the purchasing of bottled beverages and water purification supplies creates waste, leading to environmental impacts of water mistrust.

Despite high public mistrust of tap water, experts agree that tap water in the United States is generally very safe. Water from community water systems is regulated and monitored through the Safe Drinking Water Act to ensure this. Utilities are required by law to send water safety reports to homes annually. If there are water quality problems that violate the law, utilities must inform the public in a timely manner about its impacts. So why this continued mistrust?

Read more here.

View post:

Institute of Diversity Sciences Awards Team Grants for Science and Engineering Research that Promotes Social Justice - UMass News and Media Relations

Read More..

Three from MIT elected to the National Academy of Sciences for 2022 – MIT News

The National Academy of Sciences has elected 120 new members and 30 international associates, including three MIT professors Angela Belcher, Pablo Jarillo-Herrero, and Ronitt Rubinfeld in recognition of their achievements in original research.

Angela Belcher is the James Mason Crafts Professor of Biological Engineering and Materials Science, a member of the Koch Institute for Integrative Cancer Research at MIT, and the head of the Department of Biological Engineering.

She is a biological and materials engineer with expertise in the fields of biomaterials, biomolecular materials, organic-inorganic interfaces, and solid-state chemistry and devices. Her primary research focus is evolving new materials for energy, electronics, the environment, and medicine.

She received her BS in creative studies from the University of California at Santa Barbara. She earned a PhD in inorganic chemistry at UCSB in 1997. Following her postdoctoral research in electrical engineering at UCSB, she joined the faculty at the University of Texas at Austin in the Department of Chemistry. She joined the faculty at MIT in 2002.

Recognitions include the 2013 $500,000 Lemelson-MIT Prize; the 2010 Eni Prize for Renewable and Non-conventional Energy; and being named a 2018 National Academy of Engineers Fellow, 2015 National Academy of Inventors Fellow, and 2012 American Academy of Arts and Sciences Fellow. In 2009, Rolling Stone magazine listed her as one of the top 100 people changing the country. She has founded five companies, and also holds 36 patents, with many pending. In 2019, she began her tenure as head of the Department ofBiological Engineering.

Pablo Jarillo-Herrero, the Cecil and Ida Green Professor of Physics, investigates the quantum electronic transport and optoelectronics properties of novel two-dimensional materials, with special emphasis to their superconducting, magnetic, and topological properties.He is known for his groundbreaking research on twistronics in 2018, the Jarillo-Herrero group discovered that by rotating two layers of graphene by a magic angle, the bilayer material can be turned from a metal into an electrical insulator or even a superconductor.

A native of Spain,Jarillo-Herrero received his licenciatura in physics from the University of Valencia, an MSc degree from the University of California at San Diego, and his PhD in 2005 from the Delft University of Technology in the Netherlands. After a one-year postdoc in Delft, he worked at Columbia University as a NanoResearch Initiative Fellow before joining MIT in 2008.

His early career awards include an NSF Career Award (2008), a David and Lucile Packard Fellowship (2009), a DOE Early Career Award (2011), a Presidential Early Career Award for Scientists and Engineers (PECASE, 2012), an ONR Young Investigator Award (2013), and a Moore Foundation Experimental Physics in Quantum Systems Investigator Award (2014 and 2019). He has been selected as a Highly Cited Researcher by Clarivate Analytics-Web of Science (2017-present), and was elected APS Fellow in 2018. Jarillo-Herrero is the recipient of the APS 2020 Oliver E. Buckley Condensed Matter Physics Prize, the 2020 Wolf Prize in Physics, the 2020 Medal of the Spanish Royal Physics Society, the 2021 Lise Meitner Distinguished Lecture and Medal, the 2021 U.S. National Academy of Sciences Award for Scientific Discovery, and the 2022 Dan Maydan Prize in Nanoscience Research.

Ronitt Rubinfeld is the Edwin Sibley Webster Professor in the Department of Electrical Engineering and Computer Science (EECS), and a member of the Computer Science and Artificial Intelligence Laboratorys Theory of Computation group. Her research interests include randomized and sublinear time algorithms, with a particular focus on what can be understood about data by looking at only a very small portion of it.

Ronitt received her PhD from the University of California at Berkeley in 1991, and prior to that graduated from the University of Michigan with a BSE in electrical and computer engineering. Before coming to MIT, Ronitt held postdoc positions at Princeton University and Hebrew University. In 1992, she joined the faculty of the Computer Science Department at Cornell University, where she was an ONR Young Investigator, a Sloan Research Fellow, the 1995 Cornell Association for Computer Science Undergraduates Faculty of the Year, and a recipient of the Cornell College of Engineering Teaching Award. From 1999 to 2003, Ronitt was a senior research scientist at NEC Research Laboratories, and in 2004, she was a fellow at the Radcliffe Institute for Advanced Study.

Among other honors, Rubinfeld gave an invited lecture at the International Congress of Mathematicians in 2006. She has been recognized by MIT with the Capers and Marion McDonald Award for Excellence in Mentoring and Advising in 2018, and the Seth J. Teller Award for Excellence, Inclusion, and Diversity in 2019. She became a fellow of the Association for Computing Machinery in 2014 for contributions to delegated computation, sublinear time algorithms, and property testing; and she was elected a fellow of the American Academy of Arts and Sciences in 2020.

Those elected this year bring the total number of active members to 2,512 and the total number of international members to 517. The National Academy of Sciences is a private, nonprofit institution that was established under a congressional charter signed by President Abraham Lincoln in 1863. It recognizes achievement in science by election to membership, and with the National Academy of Engineering and the National Academy of Medicine provides science, engineering, and health policy advice to the federal government and other organizations.

Go here to see the original:

Three from MIT elected to the National Academy of Sciences for 2022 - MIT News

Read More..

MIT, Harvard scientists find AI can recognize race from X-rays and nobody knows how – The Boston Globe

A doctor cant tell if somebody is Black, Asian, or white, just by looking at their X-rays. But a computer can, according to a surprising new paper by an international team of scientists, including researchers at the Massachusetts Institute of Technology and Harvard Medical School.

The study found that an artificial intelligence program trained to read X-rays and CT scans could predict a persons race with 90 percent accuracy. But the scientists who conducted the study say they have no idea how the computer figures it out.

When my graduate students showed me some of the results that were in this paper, I actually thought it must be a mistake, said Marzyeh Ghassemi, an MIT assistant professor of electrical engineering and computer science, and coauthor of the paper, which was published Wednesday in the medical journal The Lancet Digital Health. I honestly thought my students were crazy when they told me.

At a time when AI software is increasingly used to help doctors make diagnostic decisions, the research raises the unsettling prospect that AI-based diagnostic systems could unintentionally generate racially biased results. For example, an AI (with access to X-rays) could automatically recommend a particular course of treatment for all Black patients, whether or not its best for a specific person. Meanwhile, the patients human physician wouldnt know that the AI based its diagnosis on racial data.

The research effort was born when the scientists noticed that an AI program for examining chest X-rays was more likely to miss signs of illness in Black patients. We asked ourselves, how can that be if computers cannot tell the race of a person? said Leo Anthony Celi, another coauthor and an associate professor at Harvard Medical School.

The research team, which included scientists from the US, Canada, Australia, and Taiwan, first trained an AI system using standard datasets of X-rays and CT scans, where each image was labeled with the persons race. The images came from different parts of the body, including the chest, hand, and spine. The diagnostic images examined by the computer contained no obvious markers of race, like skin color or hair texture.

Once the software had been shown large numbers of race-labeled images, it was then shown different sets of unlabeled images. The program was able to identify the race of people in the images with remarkable accuracy, often well above 90 percent. Even when images from people of the same size or age or sex were analyzed, the AI accurately distinguished between Black and white patients.

But how? Ghassemi and her colleagues remain baffled, but she suspects it has something to do with melanin, the pigment that determines skin color. Perhaps X-rays and CT scanners detect the higher melanin content of darker skin, and embed this information in the digital image in some fashion that human users have never noticed before. Itll take a lot more research to be sure.

Could the test results amount to proof of innate differences between people of different races? Alan Goodman, a professor of biological anthropology at Hampshire College and coauthor of the book Racism Not Race, doesnt think so. Goodman expressed skepticism about the papers conclusions and said he doubted other researchers will be able to reproduce the results. But even if they do, he thinks its all about geography, not race.

Goodman said geneticists have found no evidence of substantial racial differences in the human genome. But they do find major differences between people based on where their ancestors lived.

Instead of using race, if they looked at somebodys geographic coordinates, would the machine do just as well? asked Goodman. My sense is the machine would do just as well.

In other words, an AI might be able to determine from an X-ray that one persons ancestors were from northern Europe, anothers from central Africa, and a third persons from Japan. You call this race. I call this geographical variation, said Goodman. (Even so, he admitted its unclear how the AI could detect this geographical variation merely from an X-ray.)

In any case, Celi said doctors should be reluctant to use AI diagnostic tools that might automatically generate biased results.

We need to take a pause, he said. We cannot rush bringing the algorithms to hospitals and clinics until were sure theyre not making racist decisions or sexist decisions.

Hiawatha Bray can be reached at hiawatha.bray@globe.com. Follow him on Twitter @GlobeTechLab.

See the original post:

MIT, Harvard scientists find AI can recognize race from X-rays and nobody knows how - The Boston Globe

Read More..