Saturday 26 September 2015

Drones Operated by Criminal Gangs Used to Deliver Drugs Mobile Phones and Potentially Firearms to Prisoners

Jail_Model

Operating Drones – Threat to Security


According to officials, crime gangs are posing as increasing threat to security in Britain’s prison by operating drones and providing new options of smuggling drugs and other probably firearms in the hands of criminals.Commercial small drones are being utilised to pick up packages comprising of illicit items from mobile phone to synthetic drugs in jails which tends to threaten the security by making the intoxicants available that could aggravate and cause disorder in prison cells.

The intelligence officers at the National Offender Management Services – NOMS have shown that they are also disturbed at the prospect of using remote-controlled Unmanned Aerial Vehicles – UAVs to drop lethal weapons in jails after a package of the same size and weight of a gun had been dropped successfully unobserved in an unnamed totally secured prison at the time of covert testing earlier this year.

On investigation it was recommended that many incidents with the help of drones to overfly prisons, delivering packages in the last few months had been linked to serious crime groups. The outcome of it has governors now gearing themselves for security breaches by UAVs in being more recurrent issues over 150 prisons in Britain.

Drones – Cheap & Easy to Use


According to NOMS, the number of attempts to intrude the prisons with the use of four or six drones is generally available through online or high street retailer though small,l is on the rise. Within a span of five months to May this year, nine incidents have been identified in England and Wales when compared to four for the total of 2014.

 Analysts from NOMS gave a briefing at the Defence and Security Equipment International show in London describing drone use as an emerging threat causing a UAV technology, as cheap and easy to use. A senior analyst at the NOMS unit, Eve Richard stated that `in a nutshell, the intelligence recommend that the use of UAVs to release items into the prisons is an emerging threat and it is not a huge issue presently but there could be potential for the same to increase and become more problematic’.

He added that all the prisons could be vulnerable and it does not seem to matter where they could be but it does matter what kind of prisoners they tend to have and in what type of security category they may be.

Three Month Study of UAV Risks


Every space could be vulnerable since it is air space and as long as one can get a UAV over the wall they could be vulnerable. A UAV which is refined and capable of being accurately manoeuvred with the use of GPS technology and move a payload of over 1.5 kg could be bought for less than £1,000 and flown away with the minimum training.

A recent attempt where drones had been used to breach security had been made in March to fly a UAV into Bedford Prison along with a package comprising of mobile phones and drugs. However the aircraft got entangled in barbed wire after it seemed to have been destabilised by its cargo. NOMS has stated that as a part of a three month study of UAV risks, it had carried out a test flight of a drone over maximum security prison.

The drone achieved to fly over the prison and drop packages which were the same size and weight to a handgun prior to withdrawing unobserved by any one on duty. Mr Richard had commented that they had no intelligence that drones were being utilised for trafficking weapons but can now recognise that the possibility is there’.

How To Organize Your Files In A Convenient And Productive Fashion


clipix
Whether you are working on behalf of a major international corporation or starting out as a first time business owner, one thing is clear; If your work is primarily computer based, you will need to know how to organize your files in a convenient and productive fashion. The old adage that "Cleanliness is next to Godliness" can be updated for your purposes to read, "Cleanly organized files are tops for productivity and profits." But how can you quickly get organized so as to attain to such an exalted level among your peers?

Organize Your Relevant Files Like A True Professional

The answer is a simple one: You have got to figure out a way to organize your files so as to zip straight through all of your relevant information and turn that disorganized mess into a profit making whirlwind. How do you go about it? The first thing you need to do is sort through all of your incoming information and organize it into bite sized categories. For example, if you are collecting baseball stats for a company survey on fantasy sports leagues, you will need to organize all of the information into categories such as "At Bats", "Runs Batted In", "Walks", "Strike Outs", "File Photos", and so on.

Put All Of Your Incoming Information Into The Relevant Folders

As soon as you save some new piece of important information, it's an excellent idea to categorize it as shown above, and then place each bit into a relevant folder created specially for the purpose of receiving it. In other words, following the example listed previously, you should have folders marked "At Bats", "Walks", and so on ready to receive each new file that pertains to the matter at hand. This is the best way to insure that you will always know exactly where to find all of the bits of info that you need to insert into the appropriate place in your project.

You'll Need To Make Use Of An File Organizing System

Finally, you will need to make use of an online file organizing system that can keep all of your info in a safe, tidy location. For more information on how to make use of one of the hottest and most eagerly recommended new file organizing systems, please feel free to log on to https://www.clipix.com/ for more information.

Thursday 24 September 2015

Google Car: User Interface For Displaying Internal State Of Autonomous Driving System


Google_Car
Google has long been creating news with its driverless car both for good and bad reasons. It has even registered the car and a company under its parent company to ensure a fine streamlined approach for making cars. Its testing with driverless cars has engaged with some unwanted accidents on minor scale, which is helping, in perfecting the vehicle.

The driverless automobile is still far from becoming a reality and it won’t be happening within next few years. Though currently it is in news for the new patent application, which shows that tech giant will be bringing some manual control options in its driverless car.

New manual controls to offer better driving experience


Google team of techs has termed the new addition of the manual controls as ‘arm the chauffer’ in the literal sense. This new feature helps in adding an arm on the steering column, which results in activating the automatic driving mode, and it works vice versa by restoring the manual control.

The transition from automatic to manual and manual to automatic is quite quick and it is almost similar to switching on and off the high beams. There is heightened support, which is quite intuitive in nature if a driver touches the pedal, or steering wheel either suddenly or with force then manual controls are activated by default. In simple words driver will be able to get the controls back in case he or she wishes to make any abrupt changes in the driving by taking some new roads or stopping by at some point.

How beneficial will be this new feature? 

This patented feature will allow a driver to take control of the vehicle back from the autopilot within a matter of few seconds. This feature allows a sublime and quick change between the driverless driving mode and manual drive mode, which is quite similar to the flight’s auto pilot mode.

With autopilot mode activated, one can sit back, relax and catch the wondrous scenes fleeting across the roads during long road trips. The driverless car and driver will work in close relation with the GPS and inbuilt driving assistant for using the driverless car.

This feature will enhance safety levels


The driverless cars being tested by many car manufacturers and Google has shown that it possess better safety records when coupled with humans behind the wheel but on its own it doesn’t that kind of record. This feature addition in Google’s driverless car will help in enhancing the levels of security to a greater extent. Google’s upcoming driverless technology will certainly be boosted by human control and with their experience and judgment in driving.

Does this feature show Google backing away from earlier stance? 

Google has for long taken a stance of developing a completely free from human intervention automatic driving technology which didn’t go well with many people. It should be also noted that laws also forbid to handle controls completely to robots or technology and it might be the reason that Google is now thinking about bringing manual controls in the driverless vehicle.

How it takes just 15 minutes of web tuition for anyone to hack into your email

Smartphone

Email Account Hacking – Easier & Faster


According to latest study, email account hacking is easier and faster than expected and takes less than 15 minutes. A group of volunteers comprising of TV producer, a retiree, a self-employed baker managed to learn the technique of hacking into someone’s account within a span of about 15 minutes.

 The group with limited knowledge of technology followed online tutorial utilising a man in the middle concept to hack into a computer network to gain each other’s login information. The controlled classroom trial led by Life assistance company CPP Group Plc involved helpers with a 14 minute lesson made available freely online.

Through this they were capable of downloading hacking software which enabled them to gain access in login details as well as passwords for email accounts, online shopping accounts and social networking sites within a few minutes.

There seems to be more than 20,000 videos online, coaching users on how to hack social media profiles, email, PayPal accounts and smartphones and the internet’s potentials in hosting hacking tutorials seems to be unchallenged. It has been observed that over seven million people have been the victims of their online password protected information accessed without their permission

Government to Take a Stronger Stand on Online Hacking Tutorials


Many users have had their personal emails hacked with around 19% stating that their eBay accounts have also been hacked.Accounts of social media users were also not spared from being hacked too, with 16% informing that their social networking profiles had been tampered into and around 10% have had their money or a loan taken on their behalf. With the increase in several public Wi-Fi networks as well as smartphone with inbuilt Wi-Fi connections in the last few years have given rise to opportunities for hackers with this type of crime the capabilities which would tend to increase in due course of time.

Most of the people are aware that the online hacking tutorials prevail with several others agreeing that this type of coaching need not be made available to online users, which would be creating a lot of inconvenience to the victim and beneficial to the culprit.

More than half of the people desire that the governments should take timely action in eliminating these hacking tutorials from the internet. The CPP has been advising people to take necessary action in protecting themselves from these online hackers wherever possible and are also influencing the government to take a stronger stand on, online hacking tutorials.

Bring Awareness on Risks Involved


Michael Lynch, the firm’s identity fraud expert had commented that `the recent Sony security break which had seen a hacker gaining access to the personal data of over 100 million online gamers, that included the people in Britain, has portrayed the increase and widespread danger, hackers tend to pose to consumers as well as businesses.

It is essential to bring about awareness on the risks involved so that adequate steps in the protection of their identities and safeguard their personal data from the hands of these hackers. The technique shown in the live session indicate that these hacking skills could be applied within a few minutes and hence it is critical for consumers to take timely action and protect their data from these hackers.

They use the man in the middle hacking technique which works by the hacker interrupting communication between two users or what an individual is viewing on the internet and as the user logs into their online account, their username as well as password appears also on the hackers’ desktop enabling him to store the information and access the account immediately on some time later.

Wednesday 23 September 2015

The Search for a Thinking Machine

Li

New Age of Machine Learning


According to some experts, they are of the belief that by 2050, the machines would have reached human level intelligence. To a new age of machine learning, computers have started assimilating information from raw data in much the same way as the human infant tends to learn from the world around them.

This means that we are heading towards machines which for instance teach themselves on how to play computer games and get reasonably good at it as well as devices which tend to begin to communicate like humans such as voice assistants on the smartphones. Computers have started comprehending the world beyond bits and bytes. Fei-Fei Li has spent the last 15 years in teaching computers how to see.

 Initially, a PhD student and thereafter as a director of the computer vision lab at Stanford University, she had tracked difficult goal with the intention of creating the electronic eyes for robots as well as machines to see and to understand their environment. Half content of all human brainpower is in visual processing though it is something we all tend to do without much effort.

Ms Li in a talk at the 2015 Technology, Entertainment and Design – Ted conference had made a comparison stating that `a child learns to see especially in the early years, without being taught but learns through real world experiences and examples’.

Crowdsourcing Platforms – Amazon’s Mechanical Turk


She adds that `if you consider a child’s eyes as a pair of biological cameras, they take one image about every 200 milliseconds, which is the average time an eye movement is made. By the age of three, the child could have seen hundreds of millions of images of the real world and that is a lot of training examples. 
 Hence she decided to teach the computers in the same way. She elaborates further that `instead of focusing solely on improved algorithms, her insight was to give the algorithms the kind of training data which a child is provided through experience in quantity as well as quality. Ms. Li together with her colleagues in 2007 had set about an enormous task of sorting and labelling a billion divers as well as random images from the internet to provide examples for the real world for the computer. 
The theory was that if the machine views enough images of something, it would be capable of recognizing it in real life. Crowdsourcing platforms like Amazon’s Mechanical Turk was used, by calling on 50,000 workers from 167 countries in order to help label millions of random images of cats, planes and people.

ImageNet – Database of 15 Million Images


Ultimately they build ImageNet, which is a database of around 15 million images across 22,000 lessons of objects that were organised by daily English words. These have become the resource utilised all over the world by the research scientists in an attempt to give vision to the computers.

To teach the computer in recognizing images, Ms Li together with her team utilised neural networks, computer programs accumulated from artificial brain cells which learn as well as behave in the same ways as human brains.

At Stanford, image reading machine now tends to write accurate captions for a whole range of images though it seems to get things wrong for instance, an image of a baby holding a toothbrush was labelled wrongly as `a young boy is holding a baseball bat’.

Presently machines are learning instead of thinking and if the machine could ever be programmed to think, it is doubtful taking into consideration that the nature of the human thought has escaped scientists as well as philosophers for ages.