How AI will earn your trust – JAXenter

In the world of applying AI to IT Operations one of the major enterprise concerns is a lack of trust in the technology. This tends to be an emotional rather than intellectual response. When I evaluate the sources of distrust in relation to IT Ops, I can narrow it down to four specific causes.

The algorithms used in AIOps are fairly complex, even if you are addressing an audience which has a background in computer science. The way in which these algorithms are constructed and deployed is not covered in academia. Modern AI is mathematically intensive and many IT practitioners havent even seen this kind of mathematics before. The algorithms are outside the knowledge base of todays professional developers and IT operators.

SEE ALSO: 3 global manufacturing brands at the forefront of AI and ML

When you analyse the specific types of mathematics used in popular AI-based algorithms, deployed in an IT operations context, the maths is basically intractable. What is going on inside the algorithms cannot be teased out or reverse engineered. The mathematics generates patterns whose sources cannot be determined due to the very nature of the algorithm itself.

For example, an algorithm might tell you a number of CPUs have passed a usage threshold of 90% which will result in end user response time degrading. Consequently, the implicit instruction is to offload the usage of some servers. When you have this situation, executive decision makers will want to know why the algorithm indicates there is an issue. If you were using an expert system it could go back and show you all the invoked rules until you reverted back to the original premise. Its almost like doing a logical inference in reverse. The fact that you can trace it backwards lends credibility and validates the conclusion.

What happens in the case of AI is that things get mixed up and switched around, which means links are broken from the conclusion back to the original premise. Even if you have enormous computer power it doesnt help as the algorithm loses track of its previous steps. Youre left with a general description of the algorithm, the start and end data, but no way to link all these things together. You cant run it in reverse. Its intractable. This generates further distrust, which lives on a deeper level. Its not just about not being familiar with the mathematical logic.

Lets look at the way AI has been marketed since its inception in the late 1950s. The general marketing theme has been that AI is trying to create a human mind, when this is translated into a professional context people view it as a threat to their jobs. This notion has been resented for a long time. Scepticism is rife but it is often a tactic used to preserve livelihoods.

How AI has been marketed as an intellectual goal and a meaningful business endeavour, lends credibility to that concern. This is when scepticism starts to shade into genuine distrust. Not only is this technology that may not work, it is also my personal enemy.

IT Operations, in terms of all the various enterprise disciplines, is always being threatened with cost cutting and role reduction. Therefore, this isnt just paranoia, theres a lot of justification behind the fear.

IT Operations has had a number of bouts with commercialized AI which first emerged in the final days of the cold war when a lot of code was repackaged and sold to the IT Ops as it was a plausible use case. Many of the people who are now in senior enterprise positions, were among the first wave of people who were excited about AI and what it could achieve. Unfortunately, AI didnt initially deliver on expectations. So for these people, AI is not something new, its a false promise. Therefore, in many IT Operations circles there is a bad memory of previous hype. A historical reason for scepticism which is unique to the IT Ops world.

These are my four reasons why enterprises dont trust AIOps and AI in general. Despite these four concerns, the use of AI-based algorithms in an IT Operations context is inevitable, despite the distrust.

Take your mind back to a very influential Gartner definition of big data in 2001. Gartner came up with the idea of the 3Vs. The 3Vs (volume, variety and velocity) are three defining properties or dimensions of big data. Volume refers to the amount of data, variety refers to the number of types of data and velocity refers to the speed of data processing. At the time the definition was very valuable and made a lot of sense.

The one thing Gartner missed is the issue of dimensionality i.e. how many attributes a dataset has. Traditional data has maybe four or five attributes. If you have millions of these datasets, with a few attributes, you can store them in a database and it is fairly straightforward to search on key values and conduct analytics to obtain answers from the data.

However, when youre dealing with high dimensions and a data item that has a thousand or a million attributes, suddenly your traditional statistical techniques dont work. Your traditional search methods become ungainly. It becomes impossible to formulate a query.

As our systems become more volatile and dynamic, we are unintentionally multiplying data items and attributes which leads me onto AI. Almost all of the AI techniques developed to date are attempts to handle high dimensional data structures and collapse them into a smaller number of manageable attributes.

When you go to the leading Universities, youre seeing fewer courses on Machine Learning, but more geared towards embedding Machine Learning topics into courses on high dimensional probability and statistics. Whats happening is that Machine Learning per se is starting to resemble practical oriented bootcamps, while the study of AI is now more focussed on understanding probability, geometry and statistics in relation to high dimensions.

How did we end up here? The brain uses algorithms to process high dimensional data and reduces it to low dimensional attributes, it then processes and ends up with a conclusion. This is the path AI has taken. Lets codify what the brain is doing and you end up realizing that what youre actually doing is high dimensional probability and statistics.

SEE ALSO: Facebook AIs Demucs teaches AI to hear in a more human-like way

I can see discussions about AI being repositioned around high dimensional data which will provide a much clearer vision of what is trying to be achieved. In terms of IT operations, there will soon be an acknowledgement that modern IT systems contain high volume, high velocity and high variety data, but now also high dimensional datasets. In order to cope with this were going to need high dimensional probability and statistics and model it in high dimensional geometry. This is why AIOps is inevitable.

Go here to read the rest:

How AI will earn your trust - JAXenter

Syte.ai, a visual search startup just for fashion, closes $8M Series A … – TechCrunch

Syte.ai, a visual search startup focused on fashion products, announced that it has raised an $8 million Series A. The lead investor is NHN Ventures (the investment arm of Korean internet services giant NHN), with participation from Naver Corp., messaging app Line Corp., Magma VC, Remagine VC, KDC Ventures, and NBM Ventures.

Co-founder and CMO Lihi Pinto Fryman was working as an investment banker in London when a red dress in Vogue caught her eye. She tried to find a similar one online, but couldnt.

I said to my husband, how can it be that in 2014 I see a dress that I really like and cant just tap it and get it? she told TechCrunch. The two started looking at ways to build a better visual search engine and in 2015 teamed up with CTO Dr. Helge Voss and COO Idan Pinto to launch Syte.ai (Lihis husband, Ofer Fryman, a former account executive at Hewlett-Packard, is CEO).

Syte.ais Series A will be used for marketing and growth in the U.S., where it hopes to sign up large fashion publishers and retailers. Of course, with Syte.ais new roster of investors, its fair to assume that it will also look for deals in Asia. Fryman declined to talk about potential partnerships, but said Syte.ais new Asian backers, including NHN and Line, have been searching for a while to find the most accurate deep-learning technology that can make images shoppable.

In a prepared statement, Woo Kim, managing director and partner of NHN Investment, said that many next-generation search solutions have delivered disappointing results so far.

It was largely because such below-average image search results were driven by essentially the same deep learning approach, and the only differentiation was how many sample images you have to train your database, he added.Syte.ais unique approach of redefining how machines understand images is simply ground-breaking innovation. We believe thatSyte.ai will disrupt the way industry adopts image search technology.

Syte.ais founders have spent the last three years developing its deep-learning algorithms, which Fryman describes as building a bridge between physics and fashion. Fryman says Syte.ai is different from its competitors because its deep learning-based search engine focuses only on fashion products, even though there are other verticals, such as home decor, where visual search is also in demand. Its main business are search tools for online publishers and retailers, but it also has several consumer products, including a Chrome extension called Fashion Lover, and Glamix, a chatbot.

The startup is just one of several that are tackling visual search as online businesses try to reduce their dependency on banner ads and find ways to monetize that are better suited to mobile screens. Other companies in the same space include Slyce, Clarifai, and Visenze, which is itself funded by another one of Asias leading Internet firms, Rakuten.

The reason we chose fashion is because its so hard to recognize, says Fryman. Think about your top. It looks completely different if you are wearing it, or if its on a hanger, or in a catalog, or if you are walking on a red carpet or sitting down. Its hard to teach the machine its the same item.

After a site integrates Syte.ais search technology, users can hover their cursor over an item in a photo and automatically get results for similar products that are on sale. For publishers, including fashion blogs and magazines, Syte.ai displays items from a range of stores and price points to increase the chances that the user will click on at least one result. The company monetizes by sharing revenue with publishers and charging e-commerce stores a subscription fee.

One of the main attractions for online stores is that Syte.ais search engine can help customers find alternative items if what they want is out of stock. According to a study by IHL Group, out-of-stocks cost retailers about $634.1 billion a year. It also helps sites turn over indexed inventory, or items overlooked by customers because they arent on the front page (at larger sellers, this can potentially be hundreds of items). Visual search is especially crucial for mobile shopping, where customers want to see as many results displayed as quickly as possible on their small screens. Once Syte.ai perfects visual search for fashion, Fryman says, it will move onto other verticals.

Continue reading here:

Syte.ai, a visual search startup just for fashion, closes $8M Series A ... - TechCrunch

AI Is Coming for Your Most Mind-Numbing Office Tasks – WIRED

In 2018, the New York Foundling, a charity that offers child welfare, adoption, and mental health services, was stuck in cut-and-paste hell.

Clinicians and admin staff were spending hours transferring text between different documents and databases to meet varied legal requirements. Arik Hill, the charitys chief information officer, blames the data entry drudgery for an annual staff turnover of 42 percent at the time. We are not a very glamorous industry, says Hill. We are really only just moving on from paper clinical records.

Since then, the New York Foundling has automated much of this grunt work using what are known as software robotssimple programs hand-crafted to perform dull tasks. Often, the programs are built by recording and mimicking a users keystrokes, such as copying a field of text from one database and pasting it into another, eliminating hours of repetitive-stress-inducing work.

It was mind-blowing, says Hill, who says turnover has fallen to 17 percent.

To automate the work, the New York Foundling got help from UiPath, a so-called robotic process automation company. That project didnt require any real machine intelligence.

But in January, UiPath began upgrading its army of software bots to use powerful new artificial intelligence algorithms. It thinks this will let them take on more complex and challenging tasks, such as transcription or sorting images, across more offices. Ultimately, the company hopes software robots will gradually learn how to automate repetitive work for themselves.

In other words, if artificial intelligence is going to disrupt white-collar work, then this may be how it begins.

When paired with robotic process automation, AI significantly expands the number and types of tasks that software robots can perform, says Tom Davenport, a professor who studies information technology and management at Babson College.

Consider a company that needs to summarize long-winded, handwritten notes. AI algorithms that perform character recognition and natural language processing could read the cursive and summarize the text, before a software robot inputs the text into, say, a website. The latest version of UiPaths software includes a range of off-the-shelf machine learning tools. It is also now possible for users to add their own machine learning models to a robotic process.

With all the AI hype, its notable that so little has found its way into modern offices. But the automation that is there, which simply repeats a persons clicking and typing, is still useful. The technology is mostly used by banks, telcos, insurers, and other companies with legacy systems; market researcher Gartner estimates the industry generated roughly $1.3 billion in revenue in 2019.

Supersmart algorithms won't take all the jobs, But they are learning faster than ever, doing everything from medical diagnostics to serving up ads.

Simple software automation is eliminating some particularly repetitive jobs, such as basic data entry, which are often already done overseas. In call centers, fewer people are needed to fill out forms if software can be programmed to open the right documents, find the right fields, and enter text. At the New York Foundling, Hills software allowed him to redirect eight workers to other tasks.

But Davenport says software robots that use AI could displace more jobs, especially if we head into a recession. Companies will use it for substantial headcount and cost reductions, he says.

Erik Brynjolfsson, director of the MIT Initiative on the Digital Economy and the author of several books exploring the impact of technology on the workforce, says robotic process automation will mostly affect middle-skilled office workers, meaning admin work that requires some training.

But it wont happen overnight. He says it took many years for simple software robots, which are essentially descended from screen-scrapers and simple coding tools, to affect office work. The lesson is just how long it takes for even a relatively simple technology to have an impact on business, because of the hard work it takes to implement it reliably in complex environments, Brynjolfsson notes.

The rest is here:

AI Is Coming for Your Most Mind-Numbing Office Tasks - WIRED

Google expands AI calling service Duplex to Australia, Canada, and the UK – The Verge

Googles automated, artificial intelligence-powered calling service Duplex is now available in more countries, according to a support page updated today. In addition to the US and New Zealand, Duplex is now available in Australia, Canada, and the UK, reports VentureBeat, which discovered newly added phone numbers on the support page that Google says it will use when calling via Duplex from a distinct country.

It isnt a full rollout of the service, however, as Google clarified to The Verge its using Duplex mainly to reach businesses in those new countries to update business hours for Google Maps and Search.

And indeed, CEO Sundar Pichai did in fact outline this use of Duplex last month, writing in a blog post, In the coming days, well make it possible for businesses to easily mark themselves as temporarily closed using Google My Business. Were also using our artificial intelligence (AI) technology Duplex where possible to contact businesses to confirm their updated business hours, so we can reflect them accurately when people are looking on Search and Maps. Its not clear if a consumer version of the service will be made available at a later date in those countries.

Duplex launched as an early beta in the US via the Google Assistant back in late 2018 after a splashy yet controversial debut at that years Google I/O developer conference. There were concerns about the use of Duplex without a restaurant or other small business express consent and without proper disclosure that the automated call was being handled by a digital voice assistant and not a human being.

Google has since tried to address those concerns, with limited success, by adding disclosures at the beginning of calls and giving businesses the option to opt out of being recording and speak with a human. Duplex now has human listeners who annotate the phone calls to improve Duplexs underlying machine learning algorithms and to take over in the event the call either goes awry or the person on the other end chooses not to talk with the AI.

Google has also expanded the service in waves, from starting on just Pixel phones to iOS devices and then more Android devices. The services first international expansion was New Zealand in October 2019.

Update April 9th, 2:15PM ET: Clarified that the Duplex rollout is to help Google update business hours for Google Maps and Search.

Visit link:

Google expands AI calling service Duplex to Australia, Canada, and the UK - The Verge

Facebook Buys AI Startup Ozlo for Messenger – Investopedia


Investopedia
Facebook Buys AI Startup Ozlo for Messenger
Investopedia
According to media reports, past demos on the company's website show how an AI digital assistant developed by the company can tell a user if a restaurant is group-friendly by gathering and analyzing all the reviews of the establishment. On its website ...
Facebook Acquires AI Startup OzloInc.com
Facebook buys Ozlo to boost its conversational AI efforts | TechCrunchTechCrunch
Facebook acquired an AI startup to help Messenger build out its personal assistantRecode
Fortune -YourStory.com -GeekWire
all 77 news articles »

Continued here:

Facebook Buys AI Startup Ozlo for Messenger - Investopedia

Spreading human rights around the world, one AI at a time? – Reuters

LONDON (Thomson Reuters Foundation) - British billionaire Richard Branson, founder of Virgin Atlantic Airways and a campaigner for LGBT+ rights, cannot be in all places at all times.

Technology could soon change that.

Uncannily familiar in appearance and voice, avatars of Branson and two human rights activists displayed on tablet devices were unveiled at a youth summit in London on Friday.

The digital doppelgangers use pre-recorded phrases to interactively engage in conversations with people about social causes like climate change through a mobile application designed by technology company AI Foundation.

In theory, that means an imprisoned human rights activist could continue to engage with others through their avatar.

You will never be able to silence anyone again, said AI Foundations CEO Lars Buttler at the One Young World conference.

The animated renderings of Branson, a Colombian kidnapping survivor and a North Korean refugee addressed a packed auditorium in central London and asked each other questions aboutdemocracy and forgiveness.

Laura Ulloa, the 28-year-old Colombian activist which one of the avatars is modeled on, told the conference the technology allows her to be in all the places I cant be and to have one-on-one conversations that could change peoples minds through empathy.

Other kinds of artificial intelligence including robots, holograms and AI dolls have yet to be mass produced but are depicted in popular culture including in the 2019 novel by British author Ian Mcewan, Machines Like Me.

Rights groups are examining how to use artificial intelligence to monitor abuses like the death penalty but others have raised concerns about the dangers posed by avatars.

Such avatars come with clear risks, said Edin Omanovic, of UK-based surveillance monitoring group Privacy International.

You have to hand over a huge amount of sensitive information to make the program work and trust the company to keep this data secure from hackers and not to monetize it by sharing your data with third parties.

Co-founder of the One Young World summit, David Jones said: bad people have always done bad things with new technology but were trying to use this technology to drive positive change while protecting it as much as we can.

Editing by Tom Finn Please credit Thomson Reuters Foundation, the charitable arm of Thomson Reuters, that covers humanitarian news, women's rights, trafficking, property rights, and climate change. Visit http://www.trust.org

Go here to read the rest:

Spreading human rights around the world, one AI at a time? - Reuters

Google uses AI to help diagnose breast cancer – CNNMoney

Google announced Friday that it has achieved state-of-the-art results in using artificial intelligence to identify breast cancer. The findings are a reminder of the rapid advances in artificial intelligence, and its potential to improve global health.

Google used a flavor of artificial intelligence called deep learning to analyze thousands of slides of cancer cells provided by a Dutch university. Deep learning is where computers are taught to recognize patterns in huge data sets. It's very useful for visual tasks, such as looking at a breast cancer biopsy.

With 230,000 new cases of breast cancer every year in the United States, Google (GOOGL, Tech30) hopes its technology will help pathologists better treat patients. The technology isn't designed to, or capable of, replacing human doctors.

"What we've trained is just a little sliver of software that helps with one part of a very complex series of tasks," said Lily Peng, the project manager behind Google's work. "There will hopefully be more and more of these tools that help doctors [who] have to go through an enormous amount of information all the time."

Related: Google's artificial intelligence can actually help the environment

Peng described to CNNTech how the human and the computer could work together to create better outcomes. Google's artificial intelligence system excels at being very sensitive to potential cancer. It will flag things a human will miss. But it sometimes will falsely identify something as cancer, whereas a human pathologist is better at saying, "no, this isn't cancer."

"Imagine combining these two types of super powers," Peng said. "The algorithm helps you localize and find these tumors. And the doctor is really good at saying, 'This is not cancer.'"

For now, Google's progress is still research mode and remains in the lab. Google isn't going to become your pathologist's assistant tomorrow. But Google and many other players are striving toward a future where that becomes a reality.

Jeroen van der Laak, who leads the pathology department at Radboud University Medical Center, believes the first algorithms for cancer will be available within a couple years, and large-scale routine use will occur in about five years. His university provided the slides for Google's research.

The technology will be especially useful in parts of the world where there's a shortage of physicians. For patients who don't have access to a pathologist, an algorithm -- even if imperfect -- would be a meaningful improvement. Van der Laak highlighted India and China as two underserved areas.

CNNMoney (Washington) First published March 3, 2017: 9:03 AM ET

The rest is here:

Google uses AI to help diagnose breast cancer - CNNMoney

Artificial intelligence and humankind – The Irish Times

A chara, Paul Connolly is correct to challenge the assumption that if something produces better outcomes then it does not matter whether its human or machine (Letters, November 5th).

The current lack of significant ethical frameworks, underpinned by law, around the competing usages of artificial intelligence (AI) by so many global commercial firms has been noted in several reports.

Machine intelligence is certainly assisting us to accelerate our learning in ways that we have never experienced before. However, this is surely our greatest challenge, to assimilate our new learning despite our significant biological limitations. After all, we dont have a great track record in these areas, particularly when you examine the misuse of science and its impact on the ecology of our planet. Increasingly the convergence of quantum science with machine learning will produce AI technology certainly beyond our understanding and possibly beyond our control.

Thousands of well-funded commercial and government agencies are already furiously in competition to make this happen.

After all, this is how we humans have progressed for centuries; we experiment to find how things work and we then apply the new science into our lives, even before we fully understand the consequences of our discoveries.

But if our leaders and politicians are not familiar with the language or alert to the ethical challenges and dangers arising from the application of artificial intelligence and its technologies, then surely we are heading for a potential disaster? Is mise,

Dr VINCENT KENNY

Knocklyon,

Dublin 16.

Read this article:

Artificial intelligence and humankind - The Irish Times

National Security Agency – Wikipedia

U.S. signals intelligence organization

Seal of the National Security Agency

Flag of the National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine.[10] The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.[11]

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013 indicates that the CIA pulled ahead in this regard, with a budget of $14.7 billion.[6][12] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[13] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[14][15] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices in high value targets (such as presidential palaces or embassies). SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking and entering".[16][17]

Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage, the NSA does not publicly conduct human-source intelligence gathering. The NSA is entrusted with providing assistance to, and the coordination of, SIGINT elements for other government organizations which are prevented by law from engaging in such activities on their own.[18] As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between the NSA and other U.S. defense cryptanalysis components. To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

The NSA's actions have been a matter of political controversy on several occasions, including its spying on antiVietnam War leaders and the agency's participation in economic espionage. In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor. According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed the NSA tracks hundreds of millions of people's movements using cellphones' metadata. Internationally, research has pointed to the NSA's ability to surveil the domestic Internet traffic of foreign countries through "boomerang routing".[19]

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau.[20] It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war, it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the Navy's cryptanalysis functions in July 1918. World War I ended on November 11, 1918, and the army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[21][22]

After the disbandment of the U.S. Army cryptographic section of military intelligence known as MI-8, the U.S. government created the Cipher Bureau, also known as Black Chamber, in 1919. The Black Chamber was the United States' first peacetime cryptanalytic organization.[23] Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it actually produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. At the Washington Naval Conference, it aided American negotiators by providing them with the decrypted traffic of many of the conference delegations, including the Japanese. The Black Chamber successfully persuaded Western Union, the largest U.S. telegram company at the time, as well as several other communications companies to illegally give the Black Chamber access to cable traffic of foreign embassies and consulates.[24] Soon, these companies publicly discontinued their collaboration.

Despite the Chamber's initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating, "Gentlemen do not read each other's mail."[25]

During World War II, the Signal Intelligence Service (SIS) was created to intercept and decipher the communications of the Axis powers.[26] When the war ended, the SIS was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[26]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[26] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[27] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[27] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[27] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[28]

The National Security Council issued a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9. On the same day, Truman issued a second memorandum that called for the establishment of the NSA.[29] The actual establishment of the NSA was done by a November 4 memo by Robert A. Lovett, the Secretary of Defense, changing the name of the AFSA to the NSA, and making the new agency responsible for all communications intelligence.[30] Since President Truman's memo was a classified document,[29] the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as "No Such Agency".[31]

In the 1960s, the NSA played a key role in expanding U.S. commitment to the Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USSMaddox during the Gulf of Tonkin incident.[32]

A secret operation, code-named "MINARET", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as key leaders of the civil rights movement, including Martin Luther King Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War.[33] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal".[33]

The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during the Vietnam War, with about 30,000 NESTOR sets produced. However, a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit and intercept U.S. communications.[34]:Vol I,p.79

In the aftermath of the Watergate scandal, a congressional hearing in 1975 led by Senator Frank Church[35] revealed that the NSA, in collaboration with Britain's SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[36] The NSA tracked these individuals in a secret filing system that was destroyed in 1974.[37] Following the resignation of President Richard Nixon, there were several investigations of suspected misuse of FBI, CIA and NSA facilities.[38] Senator Frank Church uncovered previously unknown activity,[38] such as a CIA plot (ordered by the administration of President John F. Kennedy) to assassinate Fidel Castro.[39] The investigation also uncovered NSA's wiretaps on targeted U.S. citizens.[40]

After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed. This was designed to limit the practice of mass surveillance in the United States.[38]

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing. The White House asserted that the NSA interception had provided "irrefutable" evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.[41][42]

In 1999, a multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information'.[43] That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.[44] The memorial is a, "tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology".[44] NSA employees must be retired for more than fifteen years to qualify for the memorial.[44]

NSA's infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs at a cost of $3million to get the system running again. (Some incoming traffic was also directed instead to Britain's GCHQ for the time being.) Director Michael Hayden called the outage a "wake-up call" for the need to invest in the agency's infrastructure.[45]

In the 1990s the defensive arm of the NSAthe Information Assurance Directorate (IAD)started working more openly; the first public technical talk by an NSA scientist at a major cryptography conference was J. Solinas' presentation on efficient Elliptic Curve Cryptography algorithms at Crypto 1997.[46] The IAD's cooperative approach to academia and industry culminated in its support for a transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau attributes the NSA's harmonious collaboration with industry and academia in the selection of the AES in 2000and the Agency's support for the choice of a strong encryption algorithm designed by Europeans rather than by Americansto Brian Snow, who was the Technical Director of IAD and represented the NSA as cochairman of the Technical Working Group for the AES competition, and Michael Jacobs, who headed IAD at the time.[47]:75

After the terrorist attacks of September 11, 2001, the NSA believed that it had public support for a dramatic expansion of its surveillance activities.[48] According to Neal Koblitz and Alfred Menezes, the period when the NSA was a trusted partner with academia and industry in the development of cryptographic standards started to come to an end when, as part of the change in the NSA in the post-September 11 era, Snow was replaced as Technical Director, Jacobs retired, and IAD could no longer effectively oppose proposed actions by the offensive arm of the NSA.[49]

In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cellphones. ThinThread contained advanced data mining capabilities. It also had a "privacy mechanism"; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was cancelled when Michael Hayden chose Trailblazer, which did not include ThinThread's privacy system.[50]

Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing, Computer Sciences Corporation, IBM, and Litton Industries. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled in early 2004.

Turbulence started in 2005. It was developed in small, inexpensive "test" pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.[51] It was to be a realization of information processing at higher speeds in cyberspace.[52]

The massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor Edward Snowden. On 4 September 2020, the NSA's surveillance program was ruled unlawful by the US Court of Appeals. The court also added that the US intelligence leaders, who publicly defended it, were not telling the truth.[53]

NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.[54]

According to a 2010 article in The Washington Post, "[e]very day, collection systems at the National Security Agency intercept and store 1.7billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases."[55]

Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).

In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand the NSA Centers of Academic Excellence in Information Assurance Education Program.[56]

As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008, by President Bush, the NSA became the lead agency to monitor and protect all of the federal government's computer networks from cyber-terrorism.[9]

A part of NSA's mission is to serve as a combat support agency for the Department of Defense.[57]

Operations by the National Security Agency can be divided into three types:

"Echelon" was created in the incubator of the Cold War.[58] Today it is a legacy system, and several NSA stations are closing.[59]

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Australian Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[60] was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include the ability to monitor a large proportion of the world's transmitted civilian telephone, fax and data traffic.[61]

During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill.[62] Investigative journalist Duncan Campbell reported in 1988 on the "ECHELON" surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT, and detailed how the eavesdropping operations worked.[63] On November 3, 1999, the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was "linked directly to the headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland".[64]

NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about "... U.S. persons, entities, corporations or organizations...." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries outside the UKUSA alliance.[65]

The NSA was also involved in planning to blackmail people with "SEXINT", intelligence gained about a potential target's sexual activity and preferences. Those targeted had not committed any apparent crime nor were they charged with one.[66]

In order to support its facial recognition program, the NSA is intercepting "millions of images per day".[67]

The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.[68] This "collect it all" strategy introduced by NSA director, Keith B. Alexander, is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013.[69]

A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East.[70] The NSA has also spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.[71][72]

In June 2015, WikiLeaks published documents showing that NSA spied on French companies.[73]

In July 2015, WikiLeaks published documents showing that NSA spied on federal German ministries since the 1990s.[74][75] Even Germany's Chancellor Angela Merkel's cellphones and phones of her predecessors had been intercepted.[76]

Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8billion telephone data items and 97.1billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant. Initially, it was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France,[77] but later on, it became clear that those data were collected by European agencies during military missions abroad and were subsequently shared with NSA.

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO).[78][79] This memo appears to give credence to previous speculation by cryptographers at Microsoft Research.[80] Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted.[79]

XKeyscore rules (as specified in a file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR, who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal.[81][82]

Linus Torvalds, the founder of Linux kernel, joked during a LinuxCon keynote on September 18, 2013, that the NSA, who are the founder of SELinux, wanted a backdoor in the kernel.[83] However, later, Linus' father, a Member of the European Parliament (MEP), revealed that the NSA actually did this.[84]

When my oldest son was asked the same question: "Has he been approached by the NSA about backdoors?" he said "No", but at the same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him.

IBM Notes was the first widely adopted software product to use public key cryptography for clientserver and serverserver authentication and for encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with the NSA that allowed the export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.[86][87]

While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries.[19] Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers.[19]

Intercepted packages are opened carefully by NSA employees

A "load station" implanting a beacon

A document included in NSA files released with Glenn Greenwald's book No Place to Hide details how the agency's Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This was described by an NSA manager as "some of the most productive operations in TAO because they preposition access points into hard target networks around the world."[88]

Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth.[89] Cottonmouth is a device that can be inserted in the USB port of a computer in order to establish remote access to the targeted machine. According to NSA's Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish a network bridge "that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants."[90]

NSA's mission, as set forth in Executive Order 12333 in 1981, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning the domestic activities of United States persons". NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.[91]

The appearance of a 'Domestic Surveillance Directorate' of the NSA was soon exposed as a hoax in 2013.[92][93]

NSA's domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures apply to the contents of all communications, whatever the means, because "a person's private communications are akin to personal papers."[94] However, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA's foreign surveillance efforts are subject to far fewer limitations under U.S. law.[95] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.[95]

George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot Act shortly after the attacks to take anti-terrorist security measures. Title 1, 2, and 9 specifically authorized measures that would be taken by the NSA. These titles granted enhanced domestic security against terrorism, surveillance procedures, and improved intelligence, respectively. On March 10, 2004, there was a debate between President Bush and White House Counsel Alberto Gonzales, Attorney General John Ashcroft, and Acting Attorney General James Comey. The Attorneys General were unsure if the NSA's programs could be considered constitutional. They threatened to resign over the matter, but ultimately the NSA's programs continued.[96] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records. This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance. In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.[97][98]

One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U.S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.[99]

Proponents of the surveillance program claim that the President has executive authority to order such action[citation needed], arguing that laws such as FISA are overridden by the President's Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court's ruling in Hamdan v. Rumsfeld deprecates this view.[100]

Under the PRISM program, which started in 2007,[101][102] NSA gathers Internet communications from foreign targets from nine major U.S. Internet-based communication service providers: Microsoft,[103] Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple. Data gathered include email, videos, photos, VoIP chats such as Skype, and file transfers.

Former NSA director General Keith Alexander claimed that in September 2009 the NSA prevented Najibullah Zazi and his friends from carrying out a terrorist attack.[104] However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.[105][106][107][108]

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is also engaged in hacking computers, smartphones and their networks. A division which conducts such operations is the Tailored Access Operations (TAO) division, which has been active since at least circa 1998.[109]

According to the Foreign Policy magazine, "... the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People's Republic of China."[110][111]

In an interview with Wired magazine, Edward Snowden said the Tailored Access Operations division accidentally caused Syria's internet blackout in 2012.[112]

The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a Deputy Director, who is the highest-ranking civilian within the NSA/CSS.

NSA also has an Inspector General, head of the Office of the Inspector General (OIG), a General Counsel, head of the Office of the General Counsel (OGC) and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).[113]

Unlike other intelligence organizations such as the CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

As of the mid-1990s, the National Security Agency was organized into five Directorates:

Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided into units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, Central and South America.[115][116]

As of 2013[update], NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known.[117]

In the year 2000, a leadership team was formed consisting of the director, the deputy director and the directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.[118]

After president George W. Bush initiated the President's Surveillance Program (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.[119]

A 2016 proposal would combine the Signals Intelligence Directorate with Information Assurance Directorate into Directorate of Operations.[120]

NSANet stands for National Security Agency Network and is the official NSA intranet.[121] It is a classified network,[122] for information up to the level of TS/SCI[123] to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the Five Eyes partnership. The management of NSANet has been delegated to the Central Security Service Texas (CSSTEXAS).[124]

NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels which are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency's systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random and downloading and printing of documents from NSANet are recorded.[125]

In 1998, NSANet, along with NIPRNET and SIPRNET, had "significant problems with poor search capabilities, unorganized data and old information".[126] In 2004, the network was reported to have used over twenty commercial off-the-shelf operating systems.[127] Some universities that do highly sensitive research are allowed to connect to it.[128]

The thousands of Top Secret internal NSA documents that were taken by Edward Snowden in 2013 were stored in "a file-sharing location on the NSA's intranet site"; so, they could easily be read online by NSA personnel. Everyone with a TS/SCI-clearance had access to these documents. As a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to safer storage locations.[129]

The NSA maintains at least two watch centers:

The NSA has its own police force, known as NSA Police (and formerly as NSA Security Protective Force) which provides law enforcement services, emergency response and physical security to the NSA's people and property.[131]

NSA Police are armed federal officers. NSA Police have use of a K9 division, which generally conducts explosive detection screening of mail, vehicles and cargo entering NSA grounds.[132]

NSA Police use marked vehicles to carry out patrols.[133]

The number of NSA employees is officially classified[4] but there are several sources providing estimates.In 1961, NSA had 59,000 military and civilian employees, which grew to 93,067 in 1969, of which 19,300 worked at the headquarters at Fort Meade. In the early 1980s, NSA had roughly 50,000 military and civilian personnel. By 1989 this number had grown again to 75,000, of which 25,000 worked at the NSA headquarters. Between 1990 and 1995 the NSA's budget and workforce were cut by one third, which led to a substantial loss of experience.[134]

In 2012, the NSA said more than 30,000 employees worked at Fort Meade and other facilities.[2] In 2012, John C. Inglis, the deputy director, said that the total number of NSA employees is "somewhere between 37,000 and one billion" as a joke,[4] and stated that the agency is "probably the biggest employer of introverts."[4] In 2013 Der Spiegel stated that the NSA had 40,000 employees.[5] More widely, it has been described as the world's largest single employer of mathematicians.[135] Some NSA employees form part of the workforce of the National Reconnaissance Office (NRO), the agency that provides the NSA with satellite signals intelligence.

As of 2013 about 1,000 system administrators work for the NSA.[136]

The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the United States House Committee on Armed Services revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices.[137] Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets.

The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write, "If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired." David Kahn criticized the NSA's tactics of concealing its doings as smug and the Congress' blind faith in the agency's right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.[137]

Edward Snowden's leaking of the existence of PRISM in 2013 caused the NSA to institute a "two-man rule", where two system administrators are required to be present when one accesses certain sensitive information.[136] Snowden claims he suggested such a rule in 2009.[138]

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[139] As part of the latter, historically EPQs or "embarrassing personal questions" about sexual behavior had been included in the NSA polygraph.[139] The NSA also conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts periodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive "termination of employment", according to a 1982 memorandum from the director of the NSA.[140]

There are also "special access examination" polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[140] NSA's brochure states that the average test length is between two and four hours.[141] A 1983 report of the Office of Technology Assessment stated that "It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."[142] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previous felony crimes; almost all of those crimes had been undetected.[139]

In 2010 the NSA produced a video explaining its polygraph process.[143] The video, ten minutes long, is titled "The Truth About the Polygraph" and was posted to the Web site of the Defense Security Service. Jeff Stein of The Washington Post said that the video portrays "various applicants, or actors playing themit's not cleardescribing everything bad they had heard about the test, the implication being that none of it is true."[144] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[143][145] George Maschke, the founder of the Web site, accused the NSA polygraph video of being "Orwellian".[144]

A 2013 article indicated that after Edward Snowden revealed his identity in 2013, the NSA began requiring polygraphing of employees once per quarter.[146]

The number of exemptions from legal requirements has been criticized. When in 1964 Congress was hearing a bill giving the director of the NSA the power to fire at will any employee, The Washington Post wrote: "This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself." Yet, the bill was accepted by an overwhelming majority.[137] Also, every person hired to a job in the US after 2007, at any private organization, state or federal government agency, must be reported to the New Hire Registry, ostensibly to look for child support evaders, except that employees of an intelligence agency may be excluded from reporting if the director deems it necessary for national security reasons.[147]

When the agency was first established, its headquarters and cryptographic center were in the Naval Security Station in Washington, D.C. The COMINT functions were located in Arlington Hall in Northern Virginia, which served as the headquarters of the U.S. Army's cryptographic operations.[148] Because the Soviet Union had detonated a nuclear bomb and because the facilities were crowded, the federal government wanted to move several agencies, including the AFSA/NSA. A planning committee considered Fort Knox, but Fort Meade, Maryland, was ultimately chosen as NSA headquarters because it was far enough away from Washington, D.C. in case of a nuclear strike and was close enough so its employees would not have to move their families.[149]

Construction of additional buildings began after the agency occupied buildings at Fort Meade in the late 1950s, which they soon outgrew.[149] In 1963 the new headquarters building, nine stories tall, opened. NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.[150] COMSEC remained in Washington, D.C., until its new building was completed in 1968.[149] In September 1986, the Operations 2A and 2B buildings, both copper-shielded to prevent eavesdropping, opened with a dedication by President Ronald Reagan.[151] The four NSA buildings became known as the "Big Four."[151] The NSA director moved to 2B when it opened.[151]

Headquarters for the National Security Agency is located at 39632N 764617W / 39.10889N 76.77139W / 39.10889; -76.77139 in Fort George G. Meade, Maryland, although it is separate from other compounds and agencies that are based within this same military installation. Fort Meade is about 20mi (32km) southwest of Baltimore,[152] and 25mi (40km) northeast of Washington, D.C.[153] The NSA has two dedicated exits off BaltimoreWashington Parkway. The Eastbound exit from the Parkway (heading toward Baltimore) is open to the public and provides employee access to its main campus and public access to the National Cryptology Museum. The Westbound side exit, (heading toward Washington) is labeled "NSA Employees Only".[154][155] The exit may only be used by people with the proper clearances, and security vehicles parked along the road guard the entrance.[156]

NSA is the largest employer in the state of Maryland, and two-thirds of its personnel work at Fort Meade.[157] Built on 350 acres (140ha; 0.55sqmi)[158] of Fort Meade's 5,000 acres (2,000ha; 7.8sqmi),[159] the site has 1,300 buildings and an estimated 18,000 parking spaces.[153][160]

The main NSA headquarters and operations building is what James Bamford, author of Body of Secrets, describes as "a modern boxy structure" that appears similar to "any stylish office building."[161] The building is covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.[161] It contains 3,000,000 square feet (280,000m2), or more than 68 acres (28ha), of floor space; Bamford said that the U.S. Capitol "could easily fit inside it four times over."[161]

The facility has over 100 watchposts,[162] one of them being the visitor control center, a two-story area that serves as the entrance.[161] At the entrance, a white pentagonal structure,[163] visitor badges are issued to visitors and security clearances of employees are checked.[164] The visitor center includes a painting of the NSA seal.[163]

Read more:

National Security Agency - Wikipedia

Posted in NSA

Defence analyst Pravin Sawhneys new book begins with an imagined cyberattack on India by China – Scroll.in

Prime Ministers Office, New Delhi, 22 February 2024

...Whats the problem? the prime minister rasps.

Sir, this looks like a formidable cyberattack. Even our secure network has been breached, the NSA says. We are unable to contact anyone.

The prime minister of Indias office has turned into an island.

In a few minutes it becomes clear that the PMO is not the only one to fall off the internet highway. The ministries of defence, home, finance, as well as the service headquarters of the armed forces have all gone offline. The Government of India has been thrown backwards by more than three decades. Even the phone lines are not working.

A sense of foreboding descends on the room. The prime minister walks back to his office, followed by the NSA. The principal secretary is tasked with physically summoning the members of the Cabinet Committee on Security (CCS), the chief of defence staff (CDS), and the three service chiefs for an immediate meeting.

Unlikely, replies the NSA. Beads of perspiration appear on his forehead.

China?

Thats most likely.

China had been issuing warnings to India since the previous year when the prime minister had visited Bum La in Arunachal Pradesh and addressed the troops in Tawang. China had termed this a grave provocation. Consequently, it increased military activity in its Western Theatre Command (WTC) close to the border with India. According to the intelligence reports that the NSA has been receiving over the last few months, the activity appeared to be more than the regular exercises that the Peoples Liberation Army (PLA) regularly conducts.

Convoys of all kinds of trucks are frequently spotted moving stores, ammunition, and fuel on the multiple tar roads heading towards Lhasa (the headquarters of Tibet Military Command), and sometimes on the arterial roads linking up to the LAC1. Since 2020, the PLA has built robust and technologically advanced underground facilities (UGFs) to protect all aspects of its military forces, including command and control, logistics, ammunition, and missile systems.

Started around 2012, the UGF building programme in the Tibet Autonomous Region (TAR) had been upgraded and expanded. The deeply buried UGFs were traditionally meant to protect military assets from the effects of penetrating conventional munitions and nuclear strikes.

According to intelligence reports, after the 2020 Ladakh face-off, the PLA deployed electronic and cyber warfare units in TAR. Dual-use airports were upgraded for combat jet and drone flights. Huge communication towers had been set up. Blast pens or hardened shelters for combat aircraft had been built. Numerous air defence and missile sites had been dug. But India had been ignoring these provocations.

Despite all the threats, the prime minister and the NSA were convinced that China would not enter all-out war with India and imperil its own economic growth. This view was also supported by the military establishment led by the CDS. Even in 2024, the Indian military held the view it had formulated back in 2009 that China would not want to wage a war with India because a stalemate on ground would be viewed as defeat.

And stalemate it would be, they believed, because the Indian military of 2024 was not the same as 1962. It was prepared to fight and was battle hardened by decades of fighting terrorism on the Line of Control (LoC) with Pakistan. The Indian Air Force, with some 250-300 combat aircraft from all bases located at much lower altitudes, had many advantages over the PLA Air Force (PLAAF). It would make sure that it sent back thousands of body bags of PLA soldiers, thereby destroying Chinas reputation as a world power.

But was the Chinese military of 2024 the same as the one in 1962? This was an uncomfortable question with an unsavoury answer. Since the prime minister was not in the habit of listening to unpleasant answers, nobody raised this question. Perhaps nobody knew that this was a question that needed to be asked.

Despite ongoing studies on China, the Indian military, even in 2024, was oblivious of the war China had been preparing for. Traditionally, the Indian military believed that China was at least a decade ahead of Indian capabilities. Sanguine in this assessment, it was clueless about the rapid transformation that had been taking place in the neighbourhood.

But if China does not intend to go to war with India, why would it mount such a formidable cyberattack on the seat of the government?

Looking through his notes based on a recent intelligence report, the NSA runs the prime minister through what he knows about the PLAs presence in TAR. The combat support forces (Rocket Force, Strategic Support Force, and Joint Logistics Support Force) in the WTC have been conducting training with combat units to deploy and manoeuvre with them. The reported PLA convoys into TAR include large numbers of unmanned vehicles combat as well as reconnaissance. One report mentions sighting thousands of humanoid robots in military buses and trains to Lhasa.

Humanoid robots?

They are likely to be used for combat support like maintenance, readying of ammunition, supplies, fuel and so on, the NSA says in a slightly dismissive tone.

Difficult to say. But its unlikely that a phishing attack would disrupt our networks. This seems to be something else.

By this time, the CCS has assembled in the conference room. Breaking protocol, the chief of air staff (CAS) blurts out, This is not an ordinary cyberattack. The malware that has attacked us is extremely sophisticated. It has breached all our firewalls. Our entire communication network has collapsed. We have been rendered blind and deaf.

A cold frisson runs through the conference room. The army and the navy chiefs have similar reports to share. The navy chief is particularly worried. The navy has lost contact with the INS Vikrant carrier battle group that includes two destroyers, four frigates, three submarines, fifteen fighters, eight helicopters, two long-range maritime patrol aircraft, and a number of smaller vessels.

Seeing the prime ministers quizzical look, the NSA explains stoically, Sir, if we have lost contact with them, it means they have also lost contact with ground control. This can lead to accidents.

The CAS interrupts. Its a very serious situation. We have deployed six aircraft for this exercise. All communications with them have snapped.

Glancing at the NSA, he adds, In Ladakh, the PLA has also deployed a large number of unmanned and autonomous systems, including combat systems. If they get up to some mischief using machines, we wont get to know. Of course, our troops are trained and prepared for all eventualities. But communication with headquarters is critical.

Despite the apparent calm in the room, the panic was palpable. The COASs remark was foreboding, but it also held a clue to the motive for the cyberattack. The principal secretary was told to summon the director of National Critical Information Infrastructures Protection Centre (NCIIPC) that works under the National Technical Research Organisation (NTRO), the head of the Defence Cyber Agency under the Integrated Defence Headquarters, and the National Cyber Security Coordinator who works directly under the PMO.

The reports are worse than expected.

Sir, it doesnt look like a mere cyberattack. The internet in peninsular India has stopped working. Most DRDO laboratories, ISRO, and the DPSUs have no internet. We dont know yet how much of the infrastructure has been affected, the NSA says, running his hand over his forehead.

Its a major cyberattack, the prime minister says.

After a moments silence, the NSA adds, It looks like some of our submarine cables that connect us to the global internet have been tampered with. Maybe they have been cut.

But thats an act of war, the prime minister says to the now silent room.

The conference room turns into an impromptu war room.

I need updates every half hour, the prime minister declares and storms out.

Excerpted with permission from The Last War: How AI Will Shape Indias Final Showdown with China, Pravin Sawhney, Aleph Book Company.

Go here to see the original:

Defence analyst Pravin Sawhneys new book begins with an imagined cyberattack on India by China - Scroll.in

Posted in NSA

All the new movies and TV shows streaming in August 2022 – Boston.com

StreamingA full list of new streaming options on Netflix, Hulu, Amazon Prime, HBO Max, and Disney Plus in August 2022.Maitreyi Ramakrishnan as Devi in "Never Have I Ever." Netflix

While more Bostonians may be focused on enjoying the last full month of summer by enjoying some outdoor activities (including outdoor movies), August is also shaping up to be another great month for couch potatoes, with intriguingnew streaming optionsavailable on Netflix, HBO Max, Hulu, Amazon Prime Video, and Disney Plus.

Netflix is bringing back the Mindy Kaling-produced Never Have I Ever for Season 3 (its penultimate season) and is also debuting the Mark Wahlberg-Kevin Hart buddy comedy Me Time.

HBO Max, meanwhile, is targeting Game of Thrones fans with its new spinoff House of the Dragon, Disney Plus has the Chris Evans Pixar movie Lightyear, Amazon Prime Video has a series remake of the classic baseball movie A League of Their Own, and Hulu has the newest movie in the Predator franchise, Prey. (Note: We got to see an early screening of Prey last week, and its fantastic.)

Heres the full list of new movies and TV shows now streaming on Netflix, HBO Max, Hulu, Amazon Prime Video, and Disney Plus in August 2022.

August 128 Days8 MileAbove the RimThe Age of AdalineBattle: Los AngelesBridget Joness BabyBridget Joness DiaryConstantineDinner for SchmucksEyes Wide ShutFerris Buellers Day OffFootloose(2011)Hardcore HenryLegends of the FallLove & BasketballMade of HonorMen in BlackMen in Black 2Men in Black 3Miss CongenialityMonster-in-LawNo Strings AttachedShes Funny That WaySpace Jam(1996)Spider-ManSpider-Man 2Spider-Man 3The TownWoman in Gold

August 2Flight

August 3Buba Netflix FilmDont Blame Karma Netflix Film

August 4Wedding Season Netflix Film

August 5Carter Netflix FilmDarlings Netflix FilmThe InformerRise of the Teenage Mutant Ninja Turtles: The Movie Netflix FilmSkyfall

August 6Reclaim Netflix Film

August 8Code Name: Emperor Netflix Film

August 9The Nice Guys

August 10Bank Robbers: The Last Great Heist Netflix DocumentaryHeartsong Netflix Film

August 11DopeStay on Board: The Leo Baker Story Netflix Documentary

August 1213: The Musical Netflix FilmDay Shift Netflix Film

August 15Learn to Swim

August 17Look Both Ways Netflix FilmRoyalteen Netflix Film

August 18Inside the Mind of a Cat Netflix Documentary

August 19The Next 365 Days Netflix Film

August 20Fullmetal Alchemist The Revenge of Scar Netflix Film

August 21A Cowgirls Song

August 24Running with the Devil: The Wild World of John McAfee Netflix DocumentaryWatch Out, Were Mad Netflix Film

August 25Thats Amor Netflix Film

August 26DisobedienceLoving Adults Netflix FilmMe Time Netflix FilmSeoul Vibe Netflix Film

August 29Under Her Control Netflix Film

August 31I Came By Netflix Film

August 1Pawn Stars, Season 13Polly Pocket: Tiny Taste Adventure, Season 4: part 2Top Gear, Season 29-30

August 2Ricardo Quevedo: Tomorrow Will Be Worse Netflix Comedy Special

August 3Good Morning, Vernica, Season 2 Netflix Series

August 4Lady Tamara Netflix SeriesKAKEGURUI TWIN Netflix AnimeSuper Giant Robot Brothers Netflix Family

August 5The Sandman Netflix Series

August 7Riverdale, Season 6

August 8Team Zenko Go, Season 2 Netflix Family

August 9I Just Killed My Dad Netflix Documentary

August 10Indian Matchmaking, Season 2 Netflix SeriesInstant Dream Home Netflix SeriesIron Chef Brazil Netflix SeriesLocke & Key, Season 3 Netflix SeriesSchool Tales The Series Netflix Series

August 11DOTA: Dragons Blood: Book 3 Netflix Anime

August 12A Model Family Netflix SeriesNever Have I Ever, Season 3 Netflix Series

August 15Ancient Aliens, Season 4

August 16Untold: Volume 2 Netflix Documentary (new episodes weekly)Untold: The Girlfriend Who Didnt Exist(2 Parts)

August 17High Heat Netflix SeriesJunior Baking Show, Season 6 Netflix SeriesUnsuspicious Netflix Series

August 18He-Man and the Masters of the Universe,Season 3 Netflix FamilyTekken: Bloodline Netflix Anime

August 19The Cuphead Show!, Part 2 Netflix FamilyEchoes Netflix SeriesThe Girl in the Mirror (Alma) Netflix SeriesGlow Up, Season 4 Netflix SeriesKleo Netflix Series

August 23Chad and JT Go Deep Netflix SeriesUntold: The Rise and Fall of AND1 Netflix Documentary

August 24Lost Ollie Netflix SeriesMo Netflix SeriesQueer Eye: Brazil Netflix SeriesSelling The OC Netflix SeriesUnder Fire Netflix Series

August 25Angry Birds: Summer Madness, season 3 Netflix FamilyHistory 101, Season 2 Netflix DocumentaryRilakkumas Theme Park Adventure Netflix Anime

August 26Drive Hard: The Maloof Way Netflix SeriesLudik Netflix Series

August 29Mighty Express, Season 7 Netflix Family

August 30I AM KILLER, Season 3 Netflix DocumentaryUntold: Operation Flagrant Foul Netflix Documentary

August 31Club Amrica vs Club Amrica Netflix DocumentaryFamily Secrets Netflix Series

August 1A Glimpse Inside the Mind of Charlie Swan IIIA Most Violent YearAmyBarely LethalBelle, 2013Biker BoyzBlow OutBlue VelvetBugCadillac ManCharlies AngelsCharlies Angels: Full ThrottleChasing PapiChildren of a Lesser GodChocolate CityColorsDamien Omen IIDark PlacesDays of Being WildDC Showcases Short:Constantine The House of MysteryEnemyEverything You Always Wanted to Know About Sex But Were Afraid to AskEx MachinaFantastic VoyageFightingFrom HellGarfieldGarfield: A Tail of Two Kitties Extended VersionGaslightGhost Dog: The Way of the SamuraiGinger & RosaHow to Lose Friends and Alienate PeopleHow to Talk to Girls at PartiesInvasion of the Body Snatchers, 1978 Ivanhoe, 1952Jeff, Who Lives at HomeLaggiesLate August, Early SeptemberLean on PeteLife After BethLions for LambsLittle MenLittle Women, 1994LockeLove & BasketballMan of the YearMiles AheadMississippi GrindMojaveMy Big Fat Greek Wedding 2Mystic PizzaObjective, Burma!Obvious ChildOriginal Cast Album:Company, 1970Out of the PastRememberRevenge of the Green DragonsSlow WestSon of a GunSource CodeStardustThe Adderall DiariesThe Blood of a PoetThe CaptiveThe Devils BackboneThe End of the TourThe Fault in Our StarsThe Field Guide to EvilThe Great EscapeThe Last WordThe NotebookThe OneThe Possession Extended VersionThe RoverThe Spectacular NowThe Spiderwick ChroniclesThe Testament of OrpheusThe Transporter RefueledThunderstruckTranscendenceTrouble With the CurveTuskUnder the SkinWhiplash

August 3Belle, 2021

August 5Belfast

August 13The Princess, original documentary premiere

August 21American Sniper

August 24Katrina Babies, original documentary premiere

August 25The Hobbit: The Desolation of SmaugExtended Version

August 26Wolf

August 1Industry, Season 2 premiereTeen Titans Go, Season 7

August 4Sweet Life: Los Angeles, Max Original Season 2 premiere

August 5Jesus Sepulveda: Mr. Tough Life, comedy special premiere

August 7The Smiling Friends Go To Brazil, special

August 9Hard Knocks: Training Camp with the Detroit Lions, Season 17 premiere

August 21House of the Dragon, series premiere

August 25House of Ho, Max original, Season 2 premiere

August 26Victor and Valentino, Season 3

August 121Akeelah and the BeeAmerican AssassinAqu Entre NosBig Mommas: Like Father, Like SonBlack SwanThe Blair Witch ProjectBlast From the PastBlazing SaddlesBook of Shadows: The Blair Witch 2Bucky Larson: Born to Be a StarBugsyCast AwayThe Chronicles of RiddickDan in Real LifeDespicable MeDespicable Me 2DetroitThe Devil Wears PradaFantastic Mr. FoxGandhiGhostbusters(1984)Ghostbusters IIGood Luck ChuckGroundhog DayGullivers TravelsHotel TransylvaniaI Feel PrettyIn TimeJiro Dreams of SushiJust Go With ItKindergarten CopThe Leisure SeekerMan on FireMen of HonorMiles AheadThe Muppets Take ManhattanNinja AssassinNurse 3-DThe Object of My AffectionPaul Blart: Mall CopPretty WomanSee No Evil, Hear No EvilShameSimply IrresistibleThe Sixth ManSo I Married an Axe MurdererSource CodeSpider-ManSpider-Man 2Spider-Man 3Step Up RevolutionSurfs UpSwimfanSynecdoche, New YorkTower HeistVantage PointWanderlustWar HorseThe Wedding SingerWhat a Girl WantsX-Men Origins: WolverineYouve Got Mail

August 5Prey(Hulu Original)

August 15The China HustleThe Hate U GiveJourney to the WestMonstersNymphomaniac Volume I Extended Directors CutRed CliffStage MotherWhat Just HappenedWhose Streets?

August 18International Falls

August 24Hostile Territory

August 3FXsReservation Dogs, Season 2 premiere

August 4CMA Fest (ABC)

August 10Password, series premiere (NBC)

August 11Trolls: TrollsTopia, complete seventh and final season (Hulu Original)

August 12This Fool, complete season one (Hulu Original)

August 13FXsChildren of the Underground, complete Season one

August 15Legacy: The True Story of the L.A. Lakers, limited-series premiere (Hulu Original)

August 16Hotties, complete season one (only on Hulu)

August 17On the Count of Three

August 18Dragons: The Nine Realms, complete Season 3 (Hulu Original)International Falls

August 23Yu-Gi-Oh! Sevens, Season 1B (Disney XD)

August 24Blippi, complete Season 4Hostile Territory

August 25Mike, Season 1 premiere (Hulu Original)Welcome to Wrexham, Season 1 premiere (FX)

August 26Doc McStuffins: The Doc Is 10!(Disney Jr.)Little Demon, Season 1 premiere (FX)

August 30FXsThe Patient, limited-series premiere (only on Hulu)Keep This Between Us, Season 1 premiere (Freeform)

August 31The Croods: Family Tree, complete Season 4 (Hulu Original)

August 3Lightyear

August 5The Lion King (2019) (Sing-Along Version)The Lion King II: Simbas Pride (Sing-Along Version)Old Dogs

August 12Father of the BrideFather of the Bride II

August 19Beauty and the Beast (1991) (Sing-Along Version)Beauty and the Beast (2017) (Sing-Along Version)Tangled (Sing-Along Version)

August 3Alice in Wonderland Bakery, Season 1, 5 episodesThe Ghost and Molly McGee, Season 1, 5 episodesMarvel Studios Assembled: The Making of Ms. Marvel, premiere

August 5LEGO Star Wars Summer Vacation, premiere

August 10Bluey, season 3, 25 episodesRunning Wild with Bear Grylls: The Challenge, Season 1I Am Groot, premiere (all shorts streaming)

August 12Disney Summer Magic Quest

August 17Meet Spidey and His Amazing Friends, Season 2She-Hulk: Attorney At Law, premiere

August 24Blackish, Season 8Chibi Tiny Tales (Shorts), Season 2Eureka, Season 1, 4 episodes

August 26Doc McStuffins: The Doc is 10!

August 31Americas National Park, Season 1Europe From Above, Season 2Secrets of the Zoo: Down Under, Season 3

August 1(500) Days Of Summer1 Buck16 To Life3000 Miles To Graceland5 Star Day59 SecondsA Dark PlaceA Fish Called WandaA Night At The RoxburyA.I. Artificial IntelligenceAarons BloodAbsolutionAcid HorizonAlready GoneAlright NowAnguishAnnapolisAny DayAssimilateBaby BoomBackstageBackwoodsBad FrankBad TherapyBasicBattle ScarsBefore MidnightBig Brother VolcanoButch Cassidy and the Sundance KidClockstoppersCourage Under FireCrossed the LineDating My MotherDereks DeadDisappearanceDont ClickDownhill RacerDrive Me CrazyEadweardEscape From AlcatrazEverybody Loves SomebodyEvil Dead (2013)Face/Off (1997)FilthFirewalkerFollow the ProphetFright Night (2011)Un Gallo Con Muchos HuevosGame of SpyGetting to Know YouGonzoGoodbye ButterflyGrand CruHappy Yummy ChickenHardballHere On OutHes Way More Famous Than YouI Am A GhostI Like MeI Love You, Beth CooperIceland Is BestIm Still HereImpossible MonstersInternational FallsIve Got IssuesJimmy Vestvood: Amerikan HeroKing ArthurKing Kong (1976)King Of KnivesKingpinLeaving Las VegasLetter from MasanjiaLine of DescentLost BayouMaking Waves: The Art of Cinematic SoundMan from RenoMcLintockMermaidsMisma Luna (Under The Same Moon)Mr. 3000Neil Young Heart of GoldNever HeardNew MoneyObeyOnceOnce Upon a Time in the West (1969)One and the SameParadox LostPerfect SistersPet Sematary (1989)ProphecyRivers EdgeRockawayRomy And Micheles High School ReunionRoninSafe InsideScary Movie 5SerpicoSingle White FemaleSoldiers of FortuneStar Trek II: The Wrath of KhanStar Trek III: The Search for SpockStar Trek IV: The Voyage HomeStar Trek V: The Final FrontierStar Trek VI: The Undiscovered CountryStar Trek GenerationsStar Trek: InsurrectionStep Up RevolutionStill TodaySurrogate ValentineThe AtoningThe Best Exotic Marigold HotelThe Devil Wears PradaThe Exorcism of Emily RoseThe FeelsThe HauntingThe Hornets NestThe Killer EliteThe MachinistThe Middle of XThe Missouri BreaksThe SaintThe ShootistThe Wrong ToddThe YardsThiefTim & Erics Billion Dollar MovieTo TokyoTrail of AshesTricksterTriggerTwo Ways HomeTyler Perrys Diary of a Mad Black WomanTyler Perrys Diary of a Mad Black Woman The PlayTyler Perrys Madea Goes To JailUnder the Tuscan SunUndertowVampires SuckWalk Hard: The Dewey Cox StoryWaynes World IIWe Were SoldiersWeepah Way for NowWhite on RiceWild Honey Pie!Writers BlockWuthering Heights (1970)YinzYours, Mine & Ours

Read more here:

All the new movies and TV shows streaming in August 2022 - Boston.com

September symposium will celebrate life and legacy of John Claypool – Baptist News Global

If youve ever heard a sermon preached by a moderate Baptist pastor, youve likely heard the influence of John Claypool, whether you knew it or not.

Claypool served four well-known Baptist churches as pastor in the second half of the 20th century before becoming an Episcopal priest. He was best-known for a confessional style of preaching that continues to be emulated by many moderate and progressive preachers.

I know of few if any pastors or preachers who have had such a great impact on our generation of ministers as Claypool, said Stephen Shoemaker, who followed the legendary pastor at two churches, Broadway Baptist in Fort Worth, Texas, and Crescent Hill Baptist in Louisville, Ky.

I know of few if any pastors or preachers who have had such a great impact on our generation of ministers as Claypool.

Shoemaker will be among the 16 presenters at a Sept. 16-18 symposium celebrating Claypools life and legacy. The event will be held at Crescent Hill Baptist Church as this years William M. Johnson Lecture Series. Registration information is online at https://gladreunion2022.eventbrite.com.

As a preacher and the author of 11 books, Claypool gained national notoriety especially among a generation of Southern Baptist pastors coming of age as the Southern Baptist Convention splintered between moderates and conservatives, labels that influenced not only theology but also preaching styles.

Claypools narrative-driven preaching differed significantly from the three points and a poem style often associated with Southern Baptist sermons of the era. It also differed from the strictly exegetical style favored by conservative and fundamentalist preachers. Younger pastors sought to emulate his style.

His innovative and deeply authentic style of proclamation developed from personal tragedy called confessional preaching provided powerful pastoral care from the pulpit and reminded generations of Baptists and Episcopalians alike that life is a gift, said Aaron Weaver, communications director for the Cooperative Baptist Fellowship and co-editor of a new book on Claypool that will debut at the symposium. As a Baptist historian, Im excited to share more about Claypools story and his continued influence on present-day Baptist pastors.

Claypools preaching was significantly influenced by the death of his 9-year-old daughter, Laura Lue, from leukemia in 1970. His first book was on the spirituality of grief, Tracks of a Fellow Struggler. He also was shaped by and supportive of the Civil Rights movement at a time when most Southern Baptists were not.

Over the course of his ministry, John Claypool made significant contributions to the Christian faith and the progressive Baptist tradition through his affirmation of the full dignity of Black women and men as well as his role as an ally and advocate in the civil rights struggle of the 1960s, Aaron Weaver explained.

Claypool earned an undergraduate degree at Baylor University in Texas and then a doctorate from Southern Baptist Theological Seminary in Kentucky. Those two states would become important locales in his pastoral career. He served as senior pastor at Crescent Hill Baptist in Louisville from 1960 to 1971 and then at Broadway Baptist Church in Fort Worth from 1971 to 1976. Both congregations included large contingencies of faculty members from SBC seminaries located nearby. Thus Claypool shaped not only his congregations but also those who were teaching young pastors.

In an unusual move in 1976, Claypool left the 5,000-member Broadway Baptist Church to become pastor of a much smaller congregation of 400 members at Northminster Baptist Church in Jackson, Miss. Historically, few Baptist pastors leave larger churches to serve smaller churches. From Northminster, Claypool moved back to Texas to serve Second Baptist Church of Lubbock, but in 1985 resigned and moved toward ordination as an Episcopal priest. He served 14 years as rector of St. Lukes Episcopal Church in Birmingham, Ala., until his retirement in 2000. He later taught preaching at McAfee School of Theology, a Baptist-affiliated seminary in Atlanta, until his death in 2005.

In 1979, Claypool became the first Southern Baptist minister to deliver the Lyman Beecher Lectures at Yale University. In the 1960s, he also appeared regularly on a weekly radio program called The Moral Side of the News.

Another of the young pastors deeply influenced by Claypool is Charles Johnson, who today leads the public-school advocacy group Pastors for Texas Children. Johnson was called to serve alongside Claypool as youth minister at Northminster and later followed him as pastor at Second Baptist Church in Lubbock.

Claypool played a pivotal role in his life and ministry, said Johnson, who is one of the organizers of the September symposium.

In addition to Shoemaker, Johnson and Aaron Weaver, other presenters at the symposium will include Kevin Cosby, president of Simmons College of Kentucky; Douglas Weaver of Baylor University; Alan Culpepper, former dean at McAfee; John W. Arnett, member of Crescent Hill Baptist Church; Glenn Jonas of Campbell University; Mark LaGory, deacon at St. Lukes Episcopal Church in Birmingham; Henry Parsley, Episcopal bishop of Alabama; Rowan Claypool, John Claypools son; Loyd Allen of McAfee School of Theology; Julie Whidden Long of McAfee; Carolyn Ratliff of Birmingham; and Bill Leonard, former dean of Wake Forest University School of Divinity.

Read more here:

September symposium will celebrate life and legacy of John Claypool - Baptist News Global

Space Jam Is Now Streaming on Netflix – ComicBook.com

Come on and slam, and welcome to the jam:Space Jamis now streaming on Netflix. The 1996 hybrid live-action and animated film, which teams NBA superstar Michael Jordan with Bugs Bunny and an all-star squad of Looney Tunes, is part ofAugust's lineup of Netflix movies. After having a blockbuster month in July with the release of Netflix originalsStranger Things Season 4: Volume 2and new movieThe Gray Man, the streamer is taking things into overtime with vampire comedyDay Shiftand Neil Gaiman'sThe Sandmanseries. Netflix is also adding throwback favorites from the '90s and 2000s, including the Men in Black trilogy and the original Spider-Man trilogy.

Space Jam '96 remains available to watch on HBO Max along with its sequel, 2021's Space Jam: A New Legacy, starring LeBron James and Don Cheadle.

When alien amusement park owner Swackhammer (voice of Danny DeVito) challenges the Looney Tunes to a high-stakes intergalactic game of basketball, Bugs Bunny (voice of Billy West) recruits Michael Jordan (himself) to help the Tune Squad take on the Monstars.Space Jamfeatures a cast that includes Wayne Knight, Theresa Randle, Bill Murray, and NBA players Patrick Ewing, Larry Johnson, Muggsy Bogues, Shawn Bradley, and Charles Barkley.

See the full list of every movie and TV title coming to Netflix in August below.

28 Days8 MileAbove the RimThe Age of AdalineBattle: Los AngelesBridget Jones's BabyBridget Jones's DiaryConstantineDinner for SchmucksEyes Wide ShutFerris Bueller's Day OffFootloose (2011)Hardcore HenryLegends of the FallLove & BasketballMade of HonorMen in BlackMen in Black 3Men in Black IIMiss CongenialityMonster-in-LawNo Strings AttachedPawn Stars: Season 13Polly Pocket: Season 4: Part 2: Tiny Taste AdventureShe's Funny That WaySpace Jam (1996)Spider-ManSpider-Man 2Spider-Man 3Top Gear: Season 29-30The TownWoman in Gold

Big Tree City -- NETFLIX FAMILYA team of animal heroes with special skills and speedy vehicles work together to keep Big Tree City safe and solve the town's trickiest problems.

Flight

Ricardo Quevedo: Tomorrow Will Be Worse -- NETFLIX COMEDY SPECIALFrom road rage to couples fighting during the pandemic, comic Ricardo Quevedo examines the absurdity of the situations that try our patience.

Buba -- NETFLIX FILMWhen a small-town con artist joins the local mafia with his manipulative brother, his obsession with balancing his karma gets hilariously brutal.

Clusterf**k: Woodstock '99 -- NETFLIX DOCUMENTARYWoodstock 1969 promised peace and music, but its '99 revival delivered three days of rage, riots and real harm. Why did it go so horribly wrong?

Don't Blame Karma! -- NETFLIX FILMWhen her model sister and high-school crush start dating, fashion designer Sara must decide whether her alleged bad luck is the real culprit behind this.

Good Morning, Vernica: Season 2 -- NETFLIX SERIESPresumed to be dead, Vernica works to unravel the mysteries of the religious cult that fuels abuse and corruption within the government.

Lady Tamara -- NETFLIX SERIESThe glamorous life of socialite Tamara Falc takes center stage in this reality series as she balances work, play and her famous family.

KAKEGURUI TWIN -- NETFLIX ANIMEDetermined to climb up the social ladder, Mary Saotome invests everything she has into what her elite high school values most: high stakes gambling.

Super Giant Robot Brothers -- NETFLIX FAMILYOnce the squabbling stops, the battling begins! Robot siblings Shiny and Thunder and their whiz inventor must defend Earth when space monsters attack.

Wedding Season -- NETFLIX FILMUnder parental pressure to find spouses, Asha and Ravi pretend to date during a summer of weddings but their ruse goes awry when feelings turn real.

Carter -- NETFLIX FILMA man wakes up missing his memories. Directed by a mysterious voice from a device in his ear, he sets off on a hostage rescue mission rife with danger.

Darlings -- NETFLIX FILMBadru hopes her volatile husband will reform if he stops drinking. But when his rage goes too far, she and her mom boldly, albeit clumsily, seek revenge.

The Informer

Rise of the Teenage Mutant Ninja Turtles: The Movie -- NETFLIX FILMThe teen turtles and their mystic ninja powers are put to the ultimate test when ruthless creatures from another universe look to unleash extreme chaos.

The Sandman -- NETFLIX SERIESAfter years of imprisonment, Morpheus the King of Dreams embarks on a journey across worlds to find what was stolen from him and restore his power.

Skyfall

Reclaim -- NETFLIX FILMShouldering all of her family's responsibilities, a mother scrambles to find a bigger apartment for her suddenly crowded household.

Riverdale: Season 6 (August 7)

Code Name: Emperor -- NETFLIX FILMAn intelligence agent tasked with incriminating a squeaky-clean politician must decide if there are still some lines he won't cross.

Team Zenko Go: Season 2 -- NETFLIX FAMILYRunaway robo-dogs, sleepwalking uncles and troublesome tots! These kid heroes in hiding are finding more ways to help around the town of Harmony Harbor.

I Just Killed My Dad -- NETFLIX DOCUMENTARYI Just Killed My Dad is an unprecedented documentary series, which tells the unbelievable, never-been-told-before true story of the Templet family. Anthony Templet shot his father and never denied it. But why he did it is a complex question with profound implications that go far beyond one family. This three-episode documentary series explores the psyche of Anthony leading up to the events of June 3, 2019 and the journey of his mental and emotional aftermath.

The Nice Guys

Bank Robbers: The Last Great Heist -- NETFLIX DOCUMENTARYThrough candid interviews, the perpetrators of Argentina's most notorious bank heist detail how and why they carried out the radical 2006 operation.

Heartsong -- NETFLIX FILMWhile serenading a wedding that quickly implodes, a nomadic musician falls for the bride, who runs afoul of her family. Now he has to save her life.

Indian Matchmaking: Season 2 -- NETFLIX SERIESSima Taparia, everyone's favorite matchmaker, returns for another season of helping eligible, eccentric and eager clients find their future spouses.

Instant Dream Home -- NETFLIX SERIESA team of rapid-fire renovators takes big risks and makes painstaking plans to transform families' homes from top to bottom in just 12 hours.

Iron Chef Brazil -- NETFLIX SERIESWelcome to Iron Chef Brazil! In this cooking competition, rising culinary talents battle Brazil's greatest chefs for a chance to be named Iron Legend.

Locke & Key: Season 3 -- NETFLIX SERIESIn the thrilling final chapter of the series, the Locke family uncovers more magic as they face a demonic new foe who's dead-set on possessing the keys.

School Tales The Series -- NETFLIX SERIESUnspeakable horrors roam the halls of high school in this anthology featuring ghost stories directed by seasoned Thai horror directors.

Dope

DOTA: Dragon's Blood: Book 3 -- NETFLIX ANIMEThe time has come for brave warriors to conquer an indomitable foe. But can the ultimate sacrifice bring lasting peace to all possible worlds?

Stay on Board: The Leo Baker Story -- NETFLIX DOCUMENTARYFrom Netflix, Pulse Films, a division of VICE Media Group, and Flower Films comes a raw and immersive feature film that follows competitive skateboarding icon Leo Baker in the lead up to the 2020 Olympics. As he faces the sharpening stakes and intensifying disconnect between how the world sees him and who he knows himself to be, the pressure to keep on the course or be true to himself comes to a career and life-defining turning point. Stay on Board is Leo's journey balancing the gendered world of sports, transition, society, and skate culture, which ultimately leads him to the punkest thing imaginable.

13: The Musical -- NETFLIX FILMAfter moving from New York to Indiana in the wake of his parents' divorce, a clever middle schooler is determined to throw the best bar mitzvah ever.

A Model Family -- NETFLIX SERIESAfter unwittingly stealing money from a cartel, a cash-strapped professor finds the only way to save his broken family is by working as a drug courier.

Day Shift -- NETFLIX FILMJamie Foxx stars as a hard working blue collar dad who just wants to provide a good life for his quick-witted daughter, but his mundane San Fernando Valley pool cleaning job is a front for his real source of income, hunting and killing vampires as part of an international Union of vampire hunters.

Never Have I Ever: Season 3 -- NETFLIX SERIESDevi and her friends may finally be single no more. But they're about to learn that relationships come with a lot of self-discovery and all the drama.

Ancient Aliens: Season 4

Deepa & Anoop -- NETFLIX FAMILYJoined by her color-changing pet elephant, a joyful little girl creates music, merriment and mischief at her Indian family's Mango Manor hotel.

Learn to Swim

UNTOLD: The Girlfriend Who Didn't Exist (2 Parts)Born into a Hawaiian paradise, All-American football standout Manti Te'o leads a simple life summed up in just three words: faith, family, football. College football's golden boy could do no wrong, but when tragedy strikes, the increased scrutiny of his online relationship causes a media maelstrom that threatens his future and legacy. Featuring in-depth interviews with Manti Te'o and the person behind the online identity, Ronaiah 'Naya' Tuiasosopo. Directed by Ryan Duffy and Tony Vainuku.

High Heat -- NETFLIX SERIESWhen clues to his brother's murder lead Poncho to a fire brigade, he joins it to investigate further and finds romance, family... and a serial killer.

Junior Baking Show: Season 6 -- NETFLIX SERIESBritain's most talented young bakers wow judges with cakes, biscuits, breads and more in this kid-focused spinoff of "The Great British Baking Show."

Look Both Ways -- NETFLIX FILMOn the night of her college graduation, Natalie's life splits into parallel realities after she takes a pregnancy test. What will life and love bring?

Royalteen -- NETFLIX FILMA teenager struggles to keep her scandal-ridden past and a big secret from getting out when she strikes up an unlikely romance with the crown prince.

Unsuspicious -- NETFLIX SERIESConned by the same playboy, three women and their families go to his mansion to get answers and must stay for an investigation when he's found dead.

He-Man and the Masters of the Universe: Season 3 -- NETFLIX FAMILYWith Skeletor intent on controlling the universe, He-Man and his heroic squad must fulfill their destinies. The epic battle for ultimate power is on!

Inside the Mind of a Cat -- NETFLIX DOCUMENTARYCat experts dive into the mind of the feline to reveal the true capabilities of the pouncing pet in this captivating and cuddly documentary.

Tekken: Bloodline -- NETFLIX ANIMEAfter losing his home to a powerful enemy, a hot-tempered fighter trains under his zealous grandfather while awaiting his chance for revenge.

The Cuphead Show!: Part 2 -- NETFLIX FAMILYFollow the misadventures of the impulsive Cuphead and his easily swayed brother Mugman in this animated series based on the hit video game.

Echoes -- NETFLIX SERIESIdentical twins Leni and Gina have secretly swapped lives since they were children. But their world is thrown into disarray when one sister goes missing.

The Girl in the Mirror (Alma) -- NETFLIX SERIESAfter losing her memory in a bizarre accident that kills most of her classmates, Alma tries to unravel what happened that day and regain her identity.

Glow Up: Season 4 -- NETFLIX SERIESTen new contestants test the limits of their creativity as they tackle a variety of challenges in hopes of becoming the next big name in makeup.

Kleo -- NETFLIX SERIESAfter the fall of the Berlin Wall, a former East German spy resolves to find out who betrayed her and why and use her lethal skills to exact revenge.

The Next 365 Days -- NETFLIX FILM

Fullmetal Alchemist The Revenge of Scar -- NETFLIX FILMIn this sequel to the first feature film, the Elric brothers meet their toughest opponent yet a lone serial killer with a large scar on his forehead.

A Cowgirl's Song (August 21)

Chad and JT Go Deep -- NETFLIX SERIESBest bros Chad and JT set out to spread positivity through community activism and chill vibes in this raucous prank comedy series.

Untold: The Rise and Fall of AND1 -- NETFLIX DOCUMENTARY (New episodes weekly)Born out of the playgrounds of New York City, the "And 1 Mixtape Tour" took streetball to the masses, challenging convention and picking up a team of basketball misfits along the way. "The Rise and Fall of AND1" traces the journey of how three young friends with a dream of bringing greater acclaim to the game they loved, connected with the underground artform of streetball, and ended up flipping the billion-dollar basketball industry on its head. AND1 co-founders along with streetball legends The Professor, Hot Sauce, Skip 2 My Lou, The Main Event, Shane the Dribbling Machine and more reflect on their experience and the brand's journey. Directed by Kevin Wilson Jr.

Lost Ollie -- NETFLIX SERIESA toy searches the countryside for the young boy who lost him in this family series inspired by the book "Ollie's Odyssey."

Mo -- NETFLIX SERIESIn Texas, Mo straddles the line between two cultures, three languages and a pending asylum request while hustling to support his Palestinian family.

Queer Eye: Brazil -- NETFLIX SERIESThe uplifting makeover series hits Brazil with a new Fab Five and more courageous journeys of transformation along with lots of tears and laughs.

Running with the Devil: The Wild World of John McAfee -- NETFLIX DOCUMENTARYHe's the original computer genius gone rogue, inventor of one of the most successful (and most hated) pieces of software of all time: McAfee Anti-Virus. At his peak, John McAfee was worth $100 million. But when his neighbour was murdered, McAfee went on the run and invited a film crew with him. With access to hundreds of hours of never-before-broadcast footage of McAfee as he was pursued by the authorities, this is the definitive story of a larger-than-life character, a man who ran for President, escaped from prison multiple times, and claimed to have hacked the world.

Selling The OC -- NETFLIX SERIESThe Oppenheim Group expands to Orange County, where an all-new real estate team shows off lavish oceanfront listings and big personalities make waves.

Under Fire -- NETFLIX SERIESAt East Bank Station, a close-knit team of firefighters must balance a dangerous, high-stress job, personal challenges and professional setbacks.

Watch Out, We're Mad -- NETFLIX FILMIn this reboot of the 1970s Bud Spencer and Terence Hill film, two brothers estranged for 25 years reunite to reclaim their father's beloved dune buggy.

Angry Birds: Summer Madness: Season 3 -- NETFLIX FAMILYTeen birds Red, Chuck, Bomb and Stella are crashing through Camp Splinterwood with their fellow feathered campers for a summer of high-flying hijinks!

History 101: Season 2 -- NETFLIX DOCUMENTARYThe bite-size history lessons return, this time to investigate psychedelic drugs, weaponized lasers and even bottled water.

Rilakkuma's Theme Park Adventure -- NETFLIX ANIMECuddly bear Rilakkuma and his lovable friends have a day full of adventure at a sweets-themed amusement park that's about to close its doors forever.

That's Amor -- NETFLIX FILMAfter her job and relationship implode on the same day, Sofia starts from scratch and meets a dashing Spanish chef who might be her missing ingredient.

Disobedience

Drive Hard: The Maloof Way -- NETFLIX SERIESLegendary racer Sammy Maloof and his family of racers and stunt drivers build the world's baddest cars to make sure their clients take the checkered flag on race day. And when the racing dust settles, the Maloofs pull back the curtain on professional stunt driving as they practice and execute the most action-packed feats imaginable.

Loving Adults -- NETFLIX FILMThe thin line between love and hate turns deadly when a wife discovers her husband's affair and they both take extreme measures to get what they want.

Ludik -- NETFLIX SERIESTo save a kidnapped family member, an enterprising furniture tycoon must use his secret diamond smuggling operation to transport guns across the border.

Me Time -- NETFLIX FILMWhen a stay-at-home dad finds himself with some "me time" for the first time in years while his wife and kids are away, he reconnects with his former best friend for a wild weekend that nearly upends his life.

Seoul Vibe -- NETFLIX FILMIn the days leading up to the 1988 Seoul Olympics, a ragtag team of drivers and mechanics go undercover to dismantle a massive money-laundering ring.

Under Her Control -- NETFLIX FILMAn ambitious young woman enters into an unusual arrangement with her charismatic boss. By the time doubts creep in, it may be too late to back out.

Mighty Express: Season 7 -- NETFLIX FAMILYNate, Flicker and the rest of the trains raise the rails for more thrilling deliveries, special missions and lighthearted lessons on the track.

I AM A KILLER: Season 3 -- NETFLIX DOCUMENTARYWhile serving hard time for murder, inmates recount their crimes and reflect on how their actions destroyed lives including their own.

Untold: Operation Flagrant Foul -- NETFLIX DOCUMENTARY (New episodes weekly)In the summer of 2007, news broke that an NBA referee was being investigated for gambling on his own games, igniting a media storm and sending the NBA, FBI and sports fans into crisis. That referee was Tim Donaghy and the story didn't just start and end with him, but wound its way from the small town bookies of the Philadelphia suburbs to lining the pockets of the notorious New York crime families and worldwide sports gambling underworld. For the first time, all three co-conspirators discuss their involvement and, unsurprisingly, their stories don't all line-up. Featuring revealing sit-down interviews with Tim Donaghy, Tommy Martino, Jimmy "The Sheep" Battista plus FBI agent Phil Scala, Donaghy's lawyer John Lauro, Donaghy's ex-wife Kim Strupp Donaghy, and more. Directed by David Terry Fine.

Club Amrica vs Club Amrica -- NETFLIX DOCUMENTARYThis docuseries depths into the past and present of America, the most winning and controversial soccer club in Mexico.

Family Secrets -- NETFLIX SERIESA couple's wedding day threatens to turn disastrous when they begin to unravel a web of secrets and lies that connects their two families.

I Came By -- NETFLIX FILMA graffiti artist who targets homes of the elite uncovers a twisted secret in a hidden basement triggering events that put his loved ones in danger.

Link:

Space Jam Is Now Streaming on Netflix - ComicBook.com

What Is Litecoin? How Does It Work? Forbes Advisor

Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations.

While you might not see Litecoin (LTC) in headlines nearly as often as Bitcoin (BTC), its still one of the most popular cryptocurrencies. Its also the oldest crypto after Bitcoin.

As its name suggests, Litecoin was originally created to improve several of Bitcoins perceived shortcomings, such as slow transaction processing speeds and mining monopolies. LTC is built to be used in everyday transactions, whereas Bitcoin has evolved into more of a store of value.

Created by former Google engineer Charlie Lee, Litecoin was one of the first altcoinsa name given to cryptocurrencies other than Bitcoin (and sometimes other than Ethereum).

Litecoin is the second-oldest cryptocurrency, forked from the Bitcoin protocol in 2011, says Jay Blaskey, digital currency specialist at BitIRA. It was engineered to be used for fast, secure and low-cost payments. Think of it as a Bitcoin spinoff.

The goal in launching Litecoin was to improve on Bitcoin in a few different ways. For one, Lee developed a new hashing algorithm for Litecoin called Scrypt (pronounced S-crypt). The simpler algorithm supported Litecoins faster transaction speeds. Bitcoin has a slow transaction processing speed of roughly five transactions per second. Generating new blocks on the Bitcoin blockchain can take about 10 minutes.

This slow transaction speed frustrates merchants who want to accept Bitcoin as payment. You can wait up to an hour, on average, for the six confirmations required for a Bitcoin transaction. Imagine buying something online using a credit card and being on that your transaction is processing screen for an entire hour.

Litecoins transaction processing speed, on the other hand, is 54 per secondand new blocks on the Litecoin blockchain can be created about every 2.5 minutes. While Litecoin still requires a minimum of six confirmations from most exchanges to be considered irreversible, peer-to-peer (P2P) crypto payment networks can often settle Litecoin transactions almost immediately.

The improved transaction speed was meant to prove to merchants that they no longer had to be frustrated by Bitcoins long settlement time. Instead, they could accept Litecoin and settle payments faster and, therefore, conduct business more quickly and at speeds more on par with other digital payment methods.

Featured Partner Offers

Limited Time Offer:

Deposit $100 get $10 (US Only)

Cryptocurrencies Available for Trade

20+

Fees (Maker/Taker)

0.40%/0.40%

Cryptocurrencies Available for Trade

170+

Fees (Maker/Taker)

0.95%/1.25%

Cryptocurrencies Available for Trade

150+

Litecoin shares several similarities with Bitcoin. Both are open-source projects that use proof of work to verify transactions.

But Litecoin has some notable differences from Bitcoin, too. Besides processing speed, theres the issue of supply. While Bitcoin is capped at a maximum supply of 21 million coins, Litecoin is capped at 84 million coins.

Litecoin miners solve complex mathematical problems called hashes to earn the right to record new transactions to the blockchain.

The blockchain cannot be altered once a block is closed. As a reward for being the first miner to correctly solve the hash associated with a transaction via the proof of work consensus mechanism, the miner receives 12.5 LTC.

Litecoin mining operations arent something youll typically see running on a computer out of someones living room. Solving hashes requires immense computing power, which requires significant energy and space.

In fact, the lions share of Litecoin mining is performed by mining farms and pools of crypto miners using sophisticated hardware.

To help control Litecoins supply, Litecoin halves just like Bitcoin.

Litecoins supply is capped at 84 million coins. Yet when miners add a new block to Litecoins blockchain, theyre rewarded with newly-generated LTC. This could indefinitely increase the supply of Litecoin if it werent for halving.

Through halving, the miner reward for successfully recording new blocks to the Litecoin blockchain is decreased (halved) at regular intervals. In Litecoins case, its every 840,000 transactions. So when Litecoin first launched, the miner reward for adding a new block to Litecoins blockchain was 50 LTC. Over the past few years, that reward has decreased via halving to 12.5 LTC as a block award.

The next LTC halving is expected to happen in 2023.

Litecoin is highly liquid, which makes it a crypto for easier trades. In fact, Litecoin holders will find that merchants such as Newegg, SlingTV and even nonprofits like the American Red Cross are happy to accept their cryptocurrency.

You can also use digital currency apps like BitPay or CryptoPay to make a payment using LTC. If you want to use LTC for P2P payments, you can use the Binance app to pay someone with LTC.

From the get-go, without any additional tech layers added on top of the Litecoin blockchain, its a faster cryptocurrency to transact than Bitcoin, and it does so more cheaply.

At the time of this writing, Bitcoin transaction fees were significantly higher, at around 3.92% on average, compared with Litecoins transaction fees of roughly 0.06%.

In 2017, Litecoin creator Charles Lee divested himself of most of his Litecoin holdings, citing a conflict of interest, and Lees action caused some loss of faith in the crypto.

Something that caught the investors eye and had an impact on the investors confidence is that in 2017, Charles Lee, Litecoins founder, has sold his stake in Litecoin, says Claudiu Minea, CEO and co-founder of SeedOn, a blockchain-based crowdfunding platform.

While designed to have a faster TPS than Bitcoin, Carlos Gonzlez Campo, research analyst at 21Shares, says, Layer-2 solutions on top of Bitcoin like the Lightning Network have both sped up Bitcoin transactions and potentially diminished the need for Litecoins use case as a faster payment network.

There are also newer cryptocurrencies with faster TPS speeds. These include EOS at 4,000 TPS, XRP at 1,500 TPS and Cardano at 257 TPS, to name just a few.

While Litecoin remains one of the most-traded cryptocurrencies, does it make for a sound crypto investment?

Blaskey of BitIRA says that Litecoin might be a fit for a seasoned cryptocurrency investors portfolio who appreciate its staying value and flexibilityespecially those who want a combination store-of-value asset with the side benefit of convenient transactions.

Litecoin could be a decent place to place a small stake to get used to the ins and outs of crypto trading for the newer crypto investor, some experts say.

On whether LTC is a good choice for your wallet, Minea surmises, There are other blockchain competitors that people can choose from, however, Litecoin still remains a relevant choice.

Before you invest in Litecoin, learn how to buy Litecoin and read up on cryptocurrency wallets. Speak with a financial advisor about how much you could realistically invest in cryptocurrency based on your unique financial goals.

Link:

What Is Litecoin? How Does It Work? Forbes Advisor

Why Could Uniglo (GLO), Litecoin (LTC) Or Cronos (CRO) Be A Significantly Better Investment Than Bitcoin (BTC)? – Outlook India

The role of timing cannot be understated within the digital asset space. Investors who move quickly and join projects in their early stages of development often see far more profits than investors who join already established projects. It is for this reason that Uniglo (GLO), Litecoin (LTC), and Cronos (CRO) potentially offer better returns and thus a better investment opportunity than Bitcoin (BTC). When considering potential returns, investors must always bear in mind the total market cap; the larger this grows, the more difficult it is for a coin to put in significant gains. As the market cap grows, so does the capital required to significantly increase it, following the economic principle of diminishing returns. Uniglo (GLO)Uniglo is yet to launch on the open market, and this relatively small cap crypto is still in its initial presale. Investors have the opportunity to join this social currency at the ground level. Uniglo is introducing stability and appreciation in times of dire volatility. It does this through its Vault, which will hold a blend of NFT, digital, and real-world assets supporting the floor price of GLO and exposing the investor to a broad range of securities. This diversification reduces overall risk and improves long-term portfolio performance. Litecoin (LTC)Litecoin was built based on Bitcoin with a few tweaks to ensure it could provide faster and lower-cost payments. It is one of the only complimentary digital assets in the sphere, designed to be silver to Bitcoins gold. Most of the breakthroughs for the Bitcoin network have first been deployed on Litecoin.Relatively, compared to BTC, this smaller cap crypto has far more room for growth. Having survived numerous market cycles and consistently put in new ATH (All-Time Highs), it is an often forgotten token that investors should follow more closely. Cronos (CRO)CRO is the native token of the Cronos Blockchain and the utility token of the popular cryptocurrency exchange Crypto.com. It was created to help further adoption and introduce more ordinary market participants to digital assets. CRO is highly similar to BNB in many regards, and both of these exchange utility tokens are tied to the performance of their exchange. Crypto.com continues to expand rapidly, and offering one of the simplest ways to invest in cryptocurrencies, CRO will inevitably appreciate as adoption swells.Bitcoin (BTC)Bitcoin is the king of digital assets. Frequently referred to as digital gold. Early faith in this project made plenty of ordinary people obscenely wealthy. BTC trades at $23,000 and has recently broken out of a bearish trend. Whether this becomes the start of a new bull rally or is just a bear market relief rally waits to be seen. Final ThoughtsBitcoins total market cap sits close to $450 billion, the necessary injection of capital to dramatically increase this is insane. For this reason, investors searching for the greatest returns are often better served by looking to lower cap crypto projects and sharing in the journey upwards. Find Out More Here

Join Presale: https://presale.uniglo.io/register

View original post here:

Why Could Uniglo (GLO), Litecoin (LTC) Or Cronos (CRO) Be A Significantly Better Investment Than Bitcoin (BTC)? - Outlook India

Litecoin: Here are the odds on LTC emerging as investors new favourite – AMBCrypto News

Litecoin has always been an asset that neither shines too brightly nor does it disappear after a while.

Just existing in the background, LTC has managed to sustain itself through the changing markets and demand of the investors. This is how today, it is beginning to garner more attention from investors.

Although this year did not start with a bang and only worsened as time went by, LTC still managed to amass investors. In fact, more people joined the network and the asset post-Mays crash than before it.

Between January and May, about 1.3 million new individuals became investors, taking the figure up from 4.26 million to 5.51 million in five months.

However, right after May and up until the time of writing, about 1.24 million new investors had been added to the network. Thus, what it took Litecoin five months to achieve previously only took two months this time around.

As mentioned previously, this, despite the fact that in the last three months, LTC has lost much more than anticipated. The altcoin, which was treading close to the downtrend line for the entirety of five months between November 2021 and April 2022, slipped far beneath it during Mays crash.

Also, although it did recover considerably since the crash, it is yet to breach through it and close above it.

This is where things might get a little tricky since LTC is very close to the point of a trend reversal. This, thanks to buying pressure generated by the bullishness of these investors.

The Relative Strength Index (RSI) clearly underlined that LTC is very close to the overbought zone. Historically, this has been the point after which the altcoin has seen a fall on the charts.

Fortunately for Litecoin, the volatility is not too high at the moment. This means that all and any growth noted over this duration will be sustainable, provided the broader market does not descend into another crash.

View original post here:

Litecoin: Here are the odds on LTC emerging as investors new favourite - AMBCrypto News

If You Had $1000 Right Now, Would You Put It On Dogecoin, Bitcoin Cash, Ethereum Classic Or Litecoin? – Benzinga

Every week, Benzinga conducts a survey to collect sentiment on what traders are most excited about, interested in or thinking about as they manage and build their personal portfolios.

This week, we posed the following question to over 1,000 Benzinga visitors on altcoin investing: If you had $100 right now, would you put it on Dogecoin DOGE/USD, Bitcoin Cash BCH/USD,Ethereum Classic ETC/USD or Litecoin LTC/USD?

See Also: Ethereum Vs. Ethereum Classic

Price Action: Original meme cryptocurrency Dogecoin is higher by 3.5% at $0.071 at the time of publication.

Bitcoin Cash, which came came about after a disagreement arose about Bitcoin's block size, is trading higher by 1.6% at $149.26.

Ethereum Classic, the original version of the Ethereum blockchain, is up by 1.6% at $40.00.

Sometimes referred to as the silver to Bitcoins gold, Litecoinis up by 2.7% to $62.86.

Earlier in July,Dogecoinco-founderJackson Palmershowed compassion toTesla IncTSLA CEOElon Musk.

In a tweet, Palmer slammed video hosting platform YouTube for failing totake action against Livestream scams using Musk. Palmer could locate several scam streams using a simple name search... Read More

This survey was conducted by Benzinga in July 2022 and included the responses of a diverse population of adults 18 or older.

Opting into the survey was completely voluntary, with no incentives offered to potential respondents. The study reflects results from over 1,000 adults.

More:

If You Had $1000 Right Now, Would You Put It On Dogecoin, Bitcoin Cash, Ethereum Classic Or Litecoin? - Benzinga

Fueled by virtually unrestricted social media access, white nationalism is on the rise and attracting violent young white men – The Conversation…

White nationalists keep showing up in the hearings of the U.S. House committee investigating the Jan. 6, 2021, insurrection.

Evidence is mounting that white nationalist groups who want to establish an all-white state played a significant role in the violent attack on the U.S. Capitol that left five dead and dozens wounded.

Thus far, the hearings have documented how the Proud Boys helped lead the insurrectionist mob into the U.S. Capitol building in Washington, D.C, journalist James Risen wrote in the Intercept.

Based on July 12, 2022, testimony from a former Oath Keepers member, the white nationalist group coordinated with the Three Percenters, another group of white nationalists, and the Proud Boys in mobilizing their extremists groups to rally in Washington, D.C., on Jan. 6, as asked by President Trump in his Dec. 16, 2020, tweet.

As a cultural anthropologist who has studied these movements for over a decade, I know that membership in these organizations is not limited to the attempted violent overthrow of the government and poses an ongoing threat, as seen in massacres carried out by young men radicalized by this movement.

In 2020, for instance, the Department of Homeland Security described domestic violent extremists as presenting the most persistent and lethal threat to the people of the United States and the nations government.

In March 2021, FBI Director Christopher Wray testified to Congress that the number of arrests of white supremacists and other racially motivated extremists has almost tripled since he took office in 2017.

Jan. 6 was not an isolated event, Wray testified before the Senate Judiciary Committee. The problem of domestic terrorism has been metastasizing across the country for a long time now, and its not going away anytime soon.

The Southern Poverty Law Center, a nonprofit civil rights group, tracked 733 active hate groups across the United States in 2021.

Based on my research, the internet and social media have made the problem of white supremacist hate far worse and more visible; its both more accessible and, ultimately, more violent, as seen on Jan. 6 at the U.S. Capitol and the shooting deaths of ten Black people at a Buffalo grocery story, among other examples.

In the 1990s, former KKK leaders including David Duke rebranded white supremacy for the digital age.

They switched KKK robes for business suits and connected neo-Nazi antisemitic conspiracies with broader anti-Black, anti-immigrant and anti-Islamic racism.

From the 1990s to the late 2000s, this movement largely built discreet online communities and websites peddling racist disinformation.

In fact, for years one of the first websites about Martin Luther King Jr. that a Google search recommended was a website created by white nationalists that spread neo-Nazi propaganda.

In 2005, the white nationalist website Stormfront.org had 30,000 members which might sound like a lot. But as social media expanded, with both Facebook and Twitter opening to anyone with an email address in 2006, its views got a lot more attention. By 2015, 250,000 people had subscribed to become members of Stormfront.org.

Between 2012 and 2016, white nationalists on Twitter saw a 600% increase in Twitter followers. They have since worked to bring white supremacism into everyday politics.

The Tech Transparency Project, a nonprofit tech industry watchdog group, found that in 2020 half of the white nationalist groups tracked by the Southern Poverty Law Center had a presence on Facebook.

Without clear regulations preventing extremist content, digitalcompanies, in my view, allowed for the spread of white nationalist conspiracies.

Racist activists used algorithms as virtual bullhorns to reach previously unimaginable-sized audiences.

White nationalist leaders, such as Richard Spencer, wanted an even bigger audience and influence.

Spencer coined the term alt-right to this end, with the goal of blurring the relationship between white nationalism and white conservatism. He did this by establishing nonprofit think tanks like the National Policy Institute that provided an academic veneer for him and other white supremacists to spread their views on white supremacy.

This strategy worked.

Today, many white nationalist ideas once relegated to societys fringes are embraced by the broader conservative movement.

Take, for instance, the Great Replacement Theory. The conspiracy theory misinterprets demographic change as an active attempt to replace white Americans with people of color.

This baseless idea observes that Black and Latino people are becoming larger percentages of the U.S. population, and paints that data as the result of an allegedly active attempt by unnamed multiculturalists to drive white Americans out of power in an increasingly diverse nation.

A recent poll showed that over 50% of Republicans now believe in this conspiracy theory.

In 2016, during Trumps presidential campaign, Vice Magazine co-founder Gavin McInnes formed the Proud Boys to further the goals of the alt-right by protecting white identity with the use of violence if necessary.

Proud Boys members are affiliated with white nationalist ideas and leaders, but they deny any explicit racism. Instead, they describe themselves as Western chauvinists who believe in the supremacy of European culture but also welcome members of any race who support this idea.

Along with pro-gun militias such as the Oath Keepers and Three Percenters, the Proud Boys are an experiment in spreading white nationalist ideas to an online universe of potentially millions of social media users.

Data from manifestos posted online by white nationalist groups shows that many mass shooters share a few common characteristics they are young, white, male and they spend significant time online at the same websites.

The alleged shooter in the killing of 10 Black people in a predominantly Black neighborhood in Buffalo on May 14, 2022, described his reason as wanting to stop what he feared as the elimination of the white race.

His fears that people of color were replacing white people came from 4chan, a social media company popular among the alt-right.

In 2019, nine African American church members were murdered in Charleston by a young white man who became radicalized through Google searches that led him to openly white supremacist content.

Massacres in a Walmart in El Paso, Texas, at two mosques in Christchurch, New Zealand, and at a synagogue in Poway, California, all took place after the shooters began spending time on 8chan, an imageboard popular with white supremacists and the home of QAnon posts.

For many of these individuals, the most important part of their radicalization was not about their home life or personality quirks, but instead about where they spent time online.

The reasons men join groups like the Proud Boys and Oath Keepers - and even some liberal groups is less clear.

A former Proud Boy member offered one reason: They want to join a gang, Russell Schultz told CNN on Nov. 25, 2020. So they can go fight antifa and hurt people that they dont like, and feel justified in doing it.

Antifa is a loose-knit group of usually nonviolent activists who oppose fascism.

Other former extremist group members describe seeking camaraderie and friendship, but also finding racism and antisemitism.

But more than any other issue, racial demographic changes are providing recruitment opportunities for white nationalists, many of whom believe that by the year 2045 white people will become the minority in the United States.

In July 2021, the most recent date for which statistics are available, the U.S. Census Bureau notes that of the estimated population of 330 million American citizens, 75.8% are white, 18.9% are Hispanic, 13.6% are Black and 6% are Asian.

What is also becoming clearer is that the spread of white nationalism endangers the idea of a democratic nation where racial diversity is considered a strength, not a weakness.

See the article here:

Fueled by virtually unrestricted social media access, white nationalism is on the rise and attracting violent young white men - The Conversation...

The Invisible Revealed Symposium – ANSTO

How has nuclear science helped the Powerhouse examine its collection objects? Hear from scientists as they unveil techniques in this panel discussion.

The exhibition is an outcome of a partnership between Powerhouse and the Australian Nuclear Science and Technology Organisation (ANSTO) that has examined collection objects from a materials research perspective using nuclear and accelerator-based methods. Through this partnership we are mutually learning more about the Powerhouse collection and the benefits of applying nuclear methods to cultural heritage.

Throughout the day, scientists, museum staff and cultural experts will unveil techniques and processes used on these cultural objects in shared conversations.

Dr Joseph Bevitt is a senior instrument scientist on ANSTOs DINGO radiograph/tomography/imaging station, and scientific coordinator for the Australian Centre for Neutron Scattering. He is collaborating with museums and universities internationally to pioneer the use of neutron and synchrotron X-ray microCT (3D imaging of objects using neutrons or X-rays with micrometre resolution) in the areas of palaeontology, archaeology, and cultural heritage.

Dr Geraldine Jacobsen is the Principal Research Scientist at ANSTO.

Matthew Connell is Powerhouse Acting Director Curatorial, Collections and Programs. His research and curatorial interests include computing history, mathematics history and STEM education and learning. His current research projects relate to post-disciplinary curatorship, curating art/science collaborations, interactive immersive systems, audience engagement and learning in maker spaces, and the industrial and cultural implications of digital manufacturing technologies. He is also an Adjunct Professor, iCinema, UNSW Centre for Interactive Cinema Research.

Rod Dowler is the National Education and Engagement Manager for ANSTO and manages the ANSTO Discovery Centre which has built a comprehensive national education program over the past decade. He believes that is critical for the nuclear industry to apply marketing principles and to better understand its stakeholders when creating education and outreach programs.

Dr Deborah Lawler-Dormer is Powerhouse Research Manager and was lead curator on Invisible Revealed. Her work is transdisciplinary and often engages art, science, and technology in collaboration with industry, tertiary and community partners. She is a visiting Research Fellow, UNSW Expanded Perception and Interaction Centre, and Adjunct Research Fellow, Institute for Culture and Society at Western Sydney University. Recent publications include a chapter in The Palgrave Handbook of Critical Posthumanism (2022).

Dr Floriana Salvemini is an instrument scientist at ANSTO and co-responsible for the DINGO thermal-neutron radiography/tomography/imaging instrument at the Australian Centre for Neutron Scattering. Her expertise is in neutron imaging and diffraction for the investigation of cultural heritage, physical metallurgy and archaeometallurgy. She has a strong interest in the application of non-invasive techniques for the study of works of art.

Associate Professor Kenneth Sheedy is the founding director of the Australian Centre for Ancient Numismatic Studies, Macquarie University. His current research interests are the technology for manufacturing ancient coins, the incuse coinage of South Italy, the archaic coinage of Athens and the archaeology and coinage of the Cyclades.

Dr Rachel White is the sample environment group leader at the Australian Centre for Neutron Scattering. She is a part of the ANSTO Cultural Heritage Project and enjoys being a part of connecting the cultural heritage community with ANSTO. Her expertise is with electron microscopy, laboratory management, chemical safety and safety and procedural documentation.

Tammi Gissell is a Murruwarri woman from North-Western NSW and Collections Coordinator, First Nations at the Museum of Applied Arts and Sciences (Powerhouse Museum). Bourke born and bred, she holds a Bachelor of Performance: Theory and Practice (Honours) from the University of Western Sydney. Since 2007 she has worked across First Nations cultural and educational institutions as coordinator, educator and researcher.

Visit link:

The Invisible Revealed Symposium - ANSTO

Coral, Rank Digital Blasted for Irresponsible Gambling Ads in the UK – Casino.Org News

Posted on: August 3, 2022, 09:08h.

Last updated on: August 4, 2022, 04:41h.

The UKs Advertising Standards Authority (ASA) has called out two gaming operators over their ads. The operators, bookmaker Coral and online gaming operator Rank Digital Gaming, have run into trouble before because of promotions the ASA deemed irresponsible.

In a TV ad Coral ran in March, the sports betting company portrayed a horse race with an underlying tone of anticipation of the betting experience. However, the ASA received two complaints about the ad, with the individuals asserting that it enticed people to place wagers.

The ASA reviewed the ad and, per an announcement on its website, deemed the complaints legitimate today. It stated that there was a significant risk that elements of the TV spot could harm those dealing with gambling addiction. Therefore, the ad was socially irresponsible and had to be banned.

The advertising watchdog admitted that the spot never specifically discussed betting on the race. However, it concluded that integrating Corals name and banners at the track was enough for consumers to make the connection.

For years, the ASA has taken a strict approach to responsible gambling. Companies sometimes either forget or ignore the rules even airlines occasionally get caught up. In general, it only takes one or two complaints about an ad for the ASA to intervene.

The company behind Coral, LC International, says the spot crossed any lines. Instead, it asserted that the ad only alluded to the anticipation horse racing fans experience. However, the inclusion of BeGambleAware.org 18+ and Get closer to the action may have weakened its defense.

The ASA warned Coral not to use the ad anymore. In addition, it must create marketing material that is only socially responsible and unlikely to have a disproportionate impact on problem gamblers and did not feature any implication of behaviors linked to problem gambling.

The ad that promoted a Rank Digital game, Wolf Gold, was a blatant example of what not to do when creating a socially responsible ad. It specifically used gambling as a way for people to improve their financial situation and looked like it was put together by someone enjoying a few too many pints at the local pub.

The ASA published its ruling on that ad today as well. The spot, which ran in May inside the Lucky Night gaming app, read, Everyone wants to solve theirs (sic) financial problems Click the Download button right now and start to earn In fact, its all very easy to do with our application pay off loans, buy a car and a nice house and make a lot of money!

Rank Digital defended itself against the ASA, explaining that an affiliate marketing company, WakeApp, created the ad and published it without permission. Subsequently, the operator did not know the spot or its distribution.

WakeApp admitted that the ad was out of line when the ASA launched its investigation. However, it couldnt explain how an egregiously irresponsible ad such as this was able to pass its internal controls.

As in the case with Coral, Rank Digital had to scrap the ad and make sure it wasnt used again. For its part, the company stated that it has already taken measures to ensure similar ads wont appear.

More often, gaming regulators are cracking down on operators for the actions of their affiliates. They expect the gaming companies to manage every aspect of their activity, even those over which they have no direct control. While there has not been a specific discussion of it, this is something that might appear in the UKs upcoming white paper on gambling.

More here:

Coral, Rank Digital Blasted for Irresponsible Gambling Ads in the UK - Casino.Org News