The Evolution of Ballet in Horror – Film School Rejects

This article is part of Tropes Week, in which were exploring our favorite tropes from cinema history. Read more here.

As graceful and ethereal as it may appear, theres something inherently eerie about ballet. Dancers must adapt to grueling physical conditions, twisting their bodies into unnatural positions and enduring bleeding feet to make their poise look effortless. Like any competitive art or sport, theres an obsessive mentality that allows someone to pursue something so strenuous.

Thanks to the dance forms universal popularity, its no wonder that its featured in countless films. But, with its high stakes and genre-driven origins, ballet has also carved out its own space in horror. Given that archetypal ballets such as The Nutcracker and Swan Lake are based on fairytales and 19th-century gothic stories, an unsettling sense of surrealism pervades the performances themselves.

Perhaps one of the most iconic examples of ballet-horror being molded from such stories is Powell and Pressburgers The Red Shoes (1948). Adapted from Hans Christian Andersons fairy tale of the same name, the film follows a young ballerina named Vicky (Moira Shearer), whose passion for dance is thrown into disarray amongst the demands of her controlling choreographer (Anton Walbrook) and composer-turned-lover (Marius Goring). The Red Shoes is technically more of a drama, but the centerpiece dance sequence in which dances control over Vicky leads to her death segues into horror.

Since she is performing a ballet version of Andersons story, in which a girl with bewitched shoes must dance to death, theres an ominous meta-commentary on the psychological trials that Vicky goes through. She ultimately becomes a sacrificial lamb, given over as an offering to the art to which she was so dedicated.

Themes of control are particularly prevalent in dance-horror: both the self-control that it takes to learn the craft and the high expectations that domineering choreographers and instructors place upon young ballerinas. Dario Argentos phantasmagoric Suspiria (1977) equates the demands of ballet with ritualistic witchcraft, as newcomer Suzy Bannion (Jessica Harper) joins a German dance academy that turns out to be a witch coven. The ballerinas of Suspiria are carefully indoctrinated into a tight-knit community, only to be brutally murdered whenever one of the school matriarchs demands a sacrifice.

Ballet is also frightening not only because of the intense dedication it requires but because of the physical and mental vulnerability that a dancer must express while performing. In the psycho-sexual horror film Black Swan (2010), New York Ballet dancer Nina (Natalie Portman) begins to lose her grip on reality when she is tapped to play the dual-lead role of the white and black swans in the companys production of Swan Lake.

In the midst of demands of her overbearing mother (Barbara Hershey) and artistic director (Vincent Cassel), threats from rival dancer Lily (Mila Kunis), and her own self-destructive scratching of her body, she hallucinates an evil doppelgnger stalking her throughout rehearsals. Her own life bleeds more and more into the nightmarish world of the evil black swan she struggles to inhabit, until, on opening night, full-on horror images of bloody feathers and red eyes accompany her onstage. Like Vicky of The Red Shoes, the film ends with its main character literally dancing herself to death in pursuit of perfectly embodying her art. I was perfect, Nina whispers triumphantly before she expires.

More recently, there has been a glut of horrifying dance films. Luca Guadagninos technicolor-less remake of Suspiria (2018) has the same basic elements of the original, as Susie (now played by Dakota Johnson) uncovers the dark underbelly of her German dance school. But in this version, ballet has mutated into a much more modern style. Members of the company contort their bodies in brutal, primal shapes, ditching extravagant dance costumes for severe black and white face paint, and intricately tied red rope. Unlike earlier dance-centric movies, though, the violence and manipulation of young dancers isnt an element of the horror its the main focus.

This is best displayed in an early scene, where Susie volunteers to dance the lead part in rehearsals after hysterical company member Olga (Elena Fokina) quits and accuses her teachers of witchcraft. Artistic director Madame Blanc (Tilda Swinton) incites a magical link between Susie and Olga, conjoining their hands and feet. Olga then has no choice but to mirror Susies movements, and since only their extremities are linked, her body is grotesquely torn apart. As her jaw unhinges and back cracks in the room of mirrors in which shes being kept prisoner, the reflections make it impossible to turn away from the image of the ideal dancers body, destroyed.

It quickly becomes clear that Susie has been chosen to become a literal vessel for the elderly school matriarch, Helena Markos (also Swinton). The ritual through which Markos hopes to use her for immortality involves the entire company linking arms and legs, hypnotized witnesses to the teachers exploitation. But in this version of Suspiria, Susie reveals that she is the ancient witch Mother Suspiriorum. In a gory climax, she annihilates Markos supporters and puts an end to the other Mothers ritualistic practice. The dance company of the film remains, but the torturous horror tropes inflicted upon its dancers have been bloodily extinguished.

Some horror films choose to tap into darker elements of the dance form at crucial moments, such as in the climax of Jordan Peeles Us (2019). After spending a night fighting off murderous red-clad doppelgngers, protagonist Adelaide Wilson (Lupita Nyongo) finally confronts the person responsible for orchestrating these attacks her own double, Red. Red explains that the other Tethered, who were forced to copy their counterparts actions underground without being able to speak, discovered that Red was different when she was able to mirror a younger Adelaides performance in The Nutcracker.

As the two women fight to the death in the tunnels that Red has called home, Us pivots between the present and flashbacks of Adelaide and her doppelgngers childhood dance. Adelaides solo contains choreography from both the male and female parts of the ballets famous Sugar Plum Waltz, once again mirroring the films themes of duality. Reds performance of the same dance is much rougher; its like shes literally being puppeteered by the girl whose life shes been forced to copy.

Other films, such as Madelines Madeline (2018) and Climax (2018), expand beyond ballet to diversify the dance-horror films that now come to theaters. Climax, which follows a group of street dancers who perform nightmarish movements after drinking LSD-laced sangria, features dancers of many races and sexualities, unlike the often-white, upper-class ballet world. In Madelines Madeline, the titular character (Helena Howard) is fiercely dedicated to her physical theater troupe. But the ways in which her bipolar disorder and anxiety are manipulated into how she can best serve her directors (Molly Parker) artistic vision are explicitly commented upon. When Madeline is pushed to her breaking point, the exorcism-like interpretative dance that she stages to oust her mentor complete with wildly flailing limbs and pig masks rival the unease of any ballet sequence.

Theres no telling how dance will unnerve filmgoers next, but given the tropes growth in the past few years, giving oneself over to the dance has never been more exciting to watch.

Visit link:

The Evolution of Ballet in Horror - Film School Rejects

Amazon device event: Evolutionary, not revolutionary, and there’s nothing wrong with that – ZDNet

Don't call it a comeback, it's just a return. I've been gone for a while but looking to get back in the game, and last week's Amazon device event got me to thinking about how this one compares to last year. But, as I said last year, this isn't a blow by blow of every device, feature, and skill that was announced, as you can get that from the great wall-to-wall coverage here on this site. This is just a few thoughts from a CRM-ish perspective after taking some time to mull things around a bit.

While all the excitement was around new devices, features and skills, there were a few numbers sprinkled in that caught my attention. According to Amazon:

Taken together, these stats point to more activities, more devices, more skills, more interactions, more active users and more attention being poured into the Amazon voice ecosystem. And usually, more attention means more money, as that last bullet point attests to. But, as usual, one number I've continually been looking for, to no avail, was any indication of just how much shopping is being done via Alexa. Now according to Adobe, customer journeys are being impacted by voice-first devices, even if the final transaction isn't being carried out through them. But I guess until the numbers are substantial enough to put out there, I'll have to continue waiting. In the meantime, it's apparent that people aren't just buying these devices, they are using them regularly, and for a variety of things.

Of course, when the event is called Amazon Devices Event, devices are going to get most of the hype -- and understandably so. I've already ordered Echo Fire 4K TV stick and Echo Show 8, pre-ordered a set of Echo Buds and signed up for the invite-only Echo Loop ring. And I can see picking up a few of the other numerous things announced, but I am drawing the line at the Echo Frames -- mainly because they don't look good to me at all.

But with that said, and even with my money spent on more than a few things already, last year's event felt more like a device deluge than this year. Maybe because my expectations were raised due to last year's inaugural event where it felt like it'd never stop introducing things. Or maybe because this time around it felt like some of the feedback led to some interesting new experiences and designs aimed at making us feel more comfortable (and secure) using Alexa to do moreeven with our current devices. And to me, that shows just how important it is to Amazon to deepen our dependencies on Alexa and extend our use of the assistant across devices, tasks, and experiences.

And while there were way too many new devices and skills to even try to mention, these new additions seem to be taking us down a path that travels in the same direction we are already headed. It feels like this year's event was innovation from a productivity, efficiency and comfort standpoint. It doesn't feel like a moonshot or 90-degree turn, but necessary infrastructure updates to accelerate adoption and deeper usage. Some of the more interesting examples Amazon highlighted would include privacy/security improvements like:

Alexa is also using AI to learn behaviors and to automate processes based on that learning, including:

Additionally, Alexa has picked up some more human-like capabilities, such as:

Is this AI-generated empathy? Now that could move things into the revolutionary categorybeginning next year. But one new evolutionary thing that could be fun is having Samuel L. Jackson as the first celebrity voice for Alexa. He can tell you jokes, let you know if it's raining, set timers and alarms, play music and more -- all with "a bit" of his own personality. There will be two versions of his voice are available -- explicit and non-explicit. But if I'm going to pay $.99 for a skill to hear Sammy's voice on my Echo, why in the world would I choose non-explicit Sam? If I got this, I'd be wanting to ask Sam to say his Pulp Fiction speech on demand. Now can you imagine what a non-explicit version of that would sound like? But I digress

It seems to me that many of the devices announced at this year's event were newer editions of earlier devices. But some were new for Amazon, and are meant to allow you to take Alexa with you out of the confines of your home. These include:

The Buds, of course, will be competing with Apple Airpods. Frames have less direct competitors and Loop has even less competition if any. And even though Loop and Frames are new and/or in undersaturated categories -- with Buds being in a more competitive category -- will they make up for Amazon missing out on the most important mobile device of all, the smartphone?

eMarketer estimates that roughly 112 million people in the US use a voice assistant at least once monthly, making up roughly 40% of the population. Contrast that with the 81% of Americans who are very active smartphone owners and it shows that Amazon will have to sell a hell of a lot of Loops and Frames to make up for Alexa missing out on automatically being on that platform, like Siri and Google Assistant are. But coming up with new types of devices may be the only way to make up some of that ground, and creating an assortment of less pricey gadgets could lead to some real winners. It's not like it can't happen, considering it has been less than five years since the first Echo hit the market, and look at the impact that has had already. And Amazon has the resources and the determination to experiment with innovative tech that can lead to mini revolutions -- even if the gadget may initially seem quirky. But that's still an uphill battle, to say the least.

I look forward to these device event days because it is fun to see what new stuff is coming down the pike and to begin thinking about what impact it may have. Or at least for the reaction, these announcements generate, as they tend to range from "this is awesome" to "this is nonsense". And possibly the heat generated from last Wednesday's device-fest may have obscured an announcement Amazon released a day before the event announcing the Voice Interoperability Initiative.

According to the announcement, the VII is a consortium of more than 30 companies (including Microsoft and Salesforce) whose goals are based on the following priorities:

The announcement also included a quote from Salesforce co-founder and chairman Marc Benioff:

"We're in the midst of an incredible technological shift, in which voice and AI are completely transforming the customer experience. We look forward to working with Amazon and other industry leaders to make Einstein Voice, the world's leading CRM assistant, accessible on any device."

Leading these kinds of initiatives and partnerships may end up being just as important in helping Amazon play catch up on the mobile platforms Apple and Google (two companies not a part of the VII consortium) have at their disposal.

And with Microsoft and Salesforce on board, Amazon can accelerate inroads into the enterprise software and B2B organizations as more traditional enterprise vendors looking to integrate voice into their offerings. One of those enterprise vendors, Oracle (another company not involved in the consortium) recently announced the availability of its own digital assistant. During its big user conference, OpenWorld, I spoke with the company's VP of AI and Digital Assistant Suhas Uliyar, who offered up a few reasons why the company invested in building a voice layer into its platform in the following clip:

And it's this layer that is allowing Hilton, an early adopter of Oracle's Digital Assistant, to offer its employees a more efficient way to get quick answers to questions and also allow them to create better experiences for customers. In the clip below, Kellie Romack, Hilton's VP of Digital HR and Strategic Planning, shared with me why adding voice interfaces to the company's mobile-first employee base can be so important during our conversation at OpenWorld:

Now Amazon does have Alexa Guest Connect. This is cool for when you are staying at a hotel with an Echo device in the room, and you can say, "Alexa, connect my account" and the feature will authenticate the request and allow you to access your stuff like favorite playlists. But voice-first technology can also be at work assisting the employees working to create better customer experiences behind the scenes. Which is also a great opportunity, and Amazon's leadership in the Voice Interoperability Initiative may allow it to integrate Alexa deeply into mission-critical enterprise apps (like CRM/CX, ERP, HCM, SCM, etc) the way Oracle is building its Digital Assistant into its own suite of cloud offerings. As the Hilton example illustrates, organizations are looking to create better employee experiences just like they are looking to do the same for customer experiences, if given the tools to do so safely and securely.

While last week may feel more evolutionary than revolutionary, that's not a slam in any way. For example, Amazon says in the last year, the wake word engine has gotten 50% more accurate.

And while that's not mind-blowing, it's progress. Evolution is an important part of progress. And it's not even slow progress, as improvements are coming fast and furious, relatively speaking. Every announcement can't be Earth-shattering. Every device can't be game-changing. But consistent, regular, noteworthy progress does set the stage for game-changing episodes to occur in due time.

Read more here:

Amazon device event: Evolutionary, not revolutionary, and there's nothing wrong with that - ZDNet

Researchers Spot a New Code in Disordered Proteins – Discovery Institute

Scientists from the University of Washington have glimpsed possible reasons for intrinsically disordered domains in heat shock proteins. If confirmed, their observations open up phenomenal possibilities for intelligent design in these and other intrinsically disordered protein domains.

Rather than behaving as a completely 2 intrinsically disordered region, we find it to be quasi-ordered, with six sub-regions that display 3 distinct properties and binding preferences. The results reveal that, contrary to expectation, the high degree of heterogeneity and polydispersity that is a defining feature of HSPB1 (and other human sHSPs) derives not from fuzzy disorder but rather from an array of combinatorial interactions that involve discrete NTR sub-regions and specific surfaces on the structured ACD. We expect other oligomeric sHSPs are similarly defined. [Emphasis added.]

Its just a preprint in bioRxiv, but this paper could represent a giant leap in debunking the old junk-DNA paradigm. Its title, Interplay of disordered and ordered regions of a human small heat shock 1 protein yields an ensemble of quasi-ordered states, introduces quasi-ordered as a term to describe intrinsically disordered proteins, or IDPs. The work presented in this paper should not be discounted for lacking peer review at the time of publication. Six researchers in the University of Washingtons Departments of Biochemistry and Medicinal Chemistry based their models on nuclear magnetic resonance (NMR) imaging and hydrogen-deuterium exchange mass spectrometry (HDX), so the work is not armchair speculation.

Back in May, Evolution News introduced one example of an IDP with a function, and asked: Will other IDPs be found to quickly change from flopping strands into functional regulators based on environmental changes? Will the DNA sequences that produce IDPs continue to confirm the sequence hypothesis?

This paper is reminiscent of the ENCODE work that found 80 percent transcription in non-coding portions of DNA. The sound of the junk-DNA myth collapsing in 2012 (Science) set evolutionists back on their heels. What will they do if the junk-polypeptide myth falls, too? At this time, the new revelations about IDPs are a mere crack in the door to see a brightly lit room, but it looks like the same kind of epochal moment. The implications are staggering: what was dismissed as disordered could turn out to be ordered and functional at higher levels of complexity than previously imagined. IDPs may turn out to be multi-functional tools or skeleton keys able to switch on an array of processes.

Lets introduce the players in this drama.

Small heat shock proteins (sHSPs) are a class of molecular chaperones that help maintain cellular proteostasis. Like other heat shock proteins, sHSPs are believed to interact with exposed hydrophobic regions of partly unfolded or misfolded proteins to help prevent irreversible aggregation, but unlike other heat shock proteins, they perform their functions independent of ATP. sHSPs are implicated in numerous human diseases on the basis of inherited mutations in the protein sequence or upregulation in certain cancers. Cellular stressors such as oxidation and acidosis can influence their function, and stress-induced phosphorylation of sHSPs typically increases their chaperone activity. Despite their important roles in health and disease, relatively little is known about sHSP structure or structure-function relationships compared to other classes of chaperones.

The authors call HSPs natures first responders to cellular stress. Accordingly, these essential machines need a multitude of skills, just like human first responders need flexibility to handle the variety of accidents that can occur in earthquakes, fires, and floods. Until now, the disordered tails of sHSPs were difficult to interpret. In the following, NTR stands for N-Terminal Domain, the disordered portion of a heat shock protein (HSP). ACD is the ordered alpha-crystallin domain of HSP1 (heat shock protein #1), which is flanked by disordered regions:

Overall, the results from the modeling suggest that any combination of the NTR-ACD 1 interactions defined in our study is theoretically possible. While we only created models containing the maximum NTR-ACD interactions supported by our experimental data, any of the interacting motifs we have modeled could dissociate from the ACD and adopt a more disordered conformation. The results from our NMR and HDX experiments indicate that most of these NTR regions occupy both ACD-bound and ACD-unbound conformations, so it is likely that multiple combinations of NTR/ACD interactions occur in solution. Additionally, the similarity of protected regions in the HDXMS profiles of HSPB1 dimers and oligomers indicate that the interactions depicted in these models also occur within higher-order oligomers. The peptide fragments depicted in our dimeric models could conceivably be connected to other ACD dimers or monomers within an oligomer (Fig. 8D). The array of possible interactions within sHSP oligomers is depicted in Fig. 11 8F. Many regions can form intra-chain, intra-dimer, and inter-dimer interactions. The possibility for multiple combinations of interactions and connectivities contributes to the high degree of plasticity and heterogeneity observed for HSPB1 in NMR and HDX experiments.

The researchers observed disordered (i.e., non-folding) regions of this heat-shock protein combining in a variety of ways with the ordered region. Since half of this small HSP is disordered, they believe they saw only a few of the possible combinations. The more combinations, the more plastic (flexible) the proteins functionality becomes, and the more forms it can take on (heterogeneity). As they indicate, this initial glimpse of quasi-ordered states may be a general trend in IDPs. They only looked at simple combinations in a relatively small, two-part HSP. Since larger, more complex ones exist, the interactions depicted in these models also occur within higher-order oligomers.

The following analogy may be strained, but it might help visualize what is going on. Think of a comic-book superhero who carries a magic chain. Depending on the crisis he faces, he can touch a link on the chain to a part of his body to transform himself into the appropriate defender. If he touches the gold link to his knee, he becomes Spiderman. If he touches the copper link to his elbow, he becomes Aquaman. If he touches the iron link to his forehead, he becomes Batman, and so on.

Something like that goes on with heat shock proteins with their disordered domains. Portions of the disordered half of HSP1 fit into certain grooves on the ordered portion, transforming the protein into the tool needed to respond to the current disaster. Even more amazing, combinations of the links in the disordered region act like codes that switch on different states.

Does the word combinatorial bring to mind concepts shared within the ID community? For example, the histone code is a combinatorial code that considerably extends the information potential of the genetic code (see Histone Code: A Challenge to Evolution, an Inference to Design). In a similar way, the disordered regions of some proteins may bind to ordered parts to extend the functional potential of these molecular machines.

The fact that multiple HSPB1 regions can bind to a given groove or surface sets up a situation in which there are more potential binding elements than there are binding sites. This, in turn, creates a large combinatorial array of possible states within a dimer, and even more states within an oligomer. Each HSPB1 dimer has a single dimer interface groove, but its potential interactions with two NTR regions creates a similarly complicated situation: a given dimer interface groove may be empty, bound by a single boundary region, a single conserved region, two boundary regions, one boundary plus one conserved, or two boundary regions plus a conserved region. Again, in the context of an oligomer, the combinatorial possibilities will be increased if the interactions can occur from neighboring dimer units.

Prior to this work, biochemists tended to downplay the functionality of these states. They called them fuzzy, meaning that they cannot be described by a single conformational state. Others disparaged the bundles of random polypeptides as molten globules without much function at all. That picture is vanishing in the junk-DNA mythology lexicon.

However, given the high degree of orientational specificity of many NTR-ACD interactions, these interactions can be described neither as fuzzy in the canonical sense, nor as molten globule-like.

Notably, ordered interactions occur for several NTR sub-regions with the ACD with varying levels of affinity, and some interactions appear to be interdependent. The high degree of heterogeneity in HSPB1 dimers and oligomers is generated not by multiple random or fuzzy states but rather by the large number of possible combinations of several specific and orientationally-defined states.

In addition, these temporary knob-and-hole states, as they describe them, exist with particular lifetimes that expand the possibilities for their usefulness.

Based on observation of multiple slowly exchanging peaks by NMR for certain residues and bimodal HDXMS at long time points, the lifetimes for these interactions range from a minimum of tens of milliseconds to several minutes. For this reason, we propose the term quasi ordered to describe the NTR of HSPB1, as it makes highly-specific long-lived (on the timescale of seconds) contacts while remaining dynamic and heterogeneous.

Perhaps super-ordered would be a better term. Theres nothing quasi about it! When the specific arrangements of IDPs are messed up with mutations, bad things can happen. Even small changes have profound effects:

Remarkably, single mutations in the NTR have profound, widespread effects on dynamics, highlighting sHSP sensitivity to mutation and modification. We find that mutations at residues only five positions apart in the NTR have distinct, almost opposite effects (G34R and P39L) while two mutations that are 50 residues apart from each other (G34R and G84R) produce highly similar effects. In particular, G34R and G84R variants in the conserved and boundary regions respectively each exhibit a coupled increase in deuterium exchange in both the conserved and boundary regions. Furthermore, the mutant G34R conserved region peptide showed a lower affinity for the dimer interface groove. Altogether the results identify an interplay between two non-local regions of the NTR, in which the location of one region affects the other. Both regions can bind at the dimer interface groove, so another way to view the interdependence is that occupancy at a given interface groove by one sub-region favors occupancy by the other.

Its time to look at IDPs with the eyes of design.

Altogether, our results show that even in a monodisperse form of HSPB1, there is substantial conformational heterogeneity, with multiple, specific contacts between regions of the NTR and the ACD. These contacts are altered in activation-mimicking and disease-associated mutated states, shedding light on the mechanisms by which perturbations such as phosphorylation or mutation can influence sHSP structure and function. The experimental approach presented here can be applied to other structurally heterogeneous systems that have proven difficult to study by traditional means, particularly those containing a mixture of ordered and disordered regions.

As Jonathan Wells suggested here back in 2014, IDPs are worth focusing on. They could be significant players in Biologys Quiet Revolution that, while undermining the old Central Dogma of biochemistry, are revealing new grand vistas of design previously unimagined. Combinatorial codes, like those found in histones, olfactory processing centers, alternative gene splicing, and other places in biology, might now be seen coming to light in intrinsically disordered proteins. Rather than viewing them as fuzzy evolving states or molten globules of little interest, biochemists are beginning to glimpse combinatorial arrangements of specific functions that may turn IDPs into the next superheroes of intelligent design.

Photo: Human first responders, by Frmatt [CC BY-SA 3.0], via Wikimedia Commons.

Read more from the original source:

Researchers Spot a New Code in Disordered Proteins - Discovery Institute

EDITORIAL: China tests the evolution of repression – Washington Times

ANALYSIS/OPINION:

Birthdays are occasions to celebrate, and also reflect. As the Peoples Republic of China turns 70, the nations of the world join China in awe-filled recognition of its rapid rise from an agrarian to a cutting-edge culture. Amid the fanfare, the cost of its historic reliance on repression must not be forgotten.

The Asian giant, unmatched in population with more than 1.4 billion souls, erupts in splendor this week, with a military display on the streets of Beijing worthy of its self-proclaimed status as the unequaled colossus of the continent. Tuesdays parade is slated to feature columns of marchers composed of 60,000 Chinese citizens as well as 15,000 members of the nations armed forces.

Security is the watchword, and Beijing residents have been told balloons, kites and especially drones are most unwelcome. Devices like walkie-talkies that use radio waves are banned, and traffic both vehicular and Internet is severely restricted. No sour notes are to escape the orchestrated civic harmony that could hint the Middle Kingdom is faltering along the pathway to perfection. The persistent din from Hong Kongs repression resisters, though, is a reminder that in contrast to utopian ideals, freedom is real.

President Xi Jinping is saddled with the contradictory task of hanging onto special treatment in matters of trade owing to Chinas impoverished past while presiding over a $14 trillion economy that has grown to be the worlds second-largest. President Trump has called the bluff, challenging Beijing to level the trade playing field tilted heavily against the United States. Mr. Xi has never come up against a global competitor of Mr. Trumps caliber, one who values fairness above face.

The man who Mr. Trump calls his friend presides over a massive intelligence-gathering enterprise targeting American secrets. The ongoing thievery, which national security reporter Bill Gertz details in his just-released book Deceiving the Sky, has been particularly successful at penetrating U.S. defense contractors and pilfering plans for the nations most advanced military hardware. Imitation is the sincerest form of flattery, it is said. Among the missiles and rockets featured on parade day, and the fighters and bombers roaring overhead, are sleek designs bearing striking resemblance to those in the U.S. arsenal.

At 70, China models the modernity of the worlds leading democracies, except for its dearth of democratic institutions. It still is, after all, a socialist state. Like the now-defunct Soviet Union, it underwent a convulsive 20th century revolution based on Marxist-Leninist political philosophy that welcomed human conflict as a necessary condition for social progress. Through the rough-handed ministrations of a dictatorship of the proletariat, it was promised, a new, egalitarian society would emerge from the smoke.

Such is the stuff of fantasy. While dragging a backward society toward the socialist vision via his Great Leap Forward, Chinas founding father Mao Zedong aped an idiom often attributed to Russian revolutionary Josef Stalin: You cant make an omelette without breaking eggs. The ominous metaphor covered a horrific reality: The death toll from Stalins brutal regime reached 20 million, but Mao outdid him with as many as 56 million victims.

Historys largest extermination of human life is now all but forgotten amid the vastness of Chinas gleaming cities. While other communist nations have imploded, China has managed to survive by tweaking its communal principles. The dominant Communist Party Politburo tolerates capitalist practices, resulting in a wealthy elite and prosperous middle class.

Repression is more subtle, except when applied to certain undesirables, like the estimated 1 million Muslim Uighurs of western China held in concentrations camps. For other Chinese, the unblinking eye of authority effectuates proper conduct without the need for old-fashioned show trials and induced famine.

Instead, citizens are monitored online and in the streets. Those who fail to exercise their best behavior are subject to demerits on their social credit scorecard, which can lead to exclusion from choice jobs and from public transportation. ABC News reports a new device soon to join a vast network of cameras in public places: a 500 megapixel cloud super-camera that can pick a face out of a crowd of tens of thousands.

China has managed to outlive its socialist cousin, the USSR, which collapsed just shy of its 70th anniversary in 1991. Longevity is certainly a measure of success, but China has yet to prove that a socialist system which has evolved from killing its citizens to controlling them can outlast the fundamental yearning to live free of relentless repression.

Sign up for Daily Opinion Newsletter

Excerpt from:

EDITORIAL: China tests the evolution of repression - Washington Times

The evolution of police interrogations on screen – The Economist

POLICE INTERROGATIONS are by their very nature dramatic. The stakes are high. There is an imbalance of power. Those involved are under pressure. Narrative is essential to the proceedings: both the police and the suspect have their own version of events, and seek to convince the other that theirs is correct. Interrogations are also an exercise in characterdetectives might play good cop, bad cop in an attempt to winkle out a confession. Important clues can be found in what a suspect says, and what they omit.

Little surprise, then, that interrogations have long featured in police procedurals and buddy-cop shows. Television dramas often saw interrogations as a set piece from which the police would emerge as brave, smart and victorious. In Prime Suspect (1991), the wily and quick-witted DCI Jane Tennison (Helen Mirren) would come alive in front of the one-way glass; DCI John Luther (Idris Elba, pictured below) knew how to push a perpetrators buttons. The audience was encouraged to trust the judgment of law enforcement.

Upgrade your inbox and get our Daily Dispatch and Editor's Picks.

But in recent years, as police brutality and misconduct have made headlines, confessionsand the means by which they are elicitedhave been examined more closely on television. Making a Murderer (2015), a true-crime documentary, shows Brendan Dassey, a 16-year-old with learning difficulties, confessing to the murder of Teresa Halbach, a photographer, in 2005. Using footage from the interrogation room, the film-makers argue that the police in Manitowoc County, Wisconsin, unconstitutionally coerced him in order to bolster their version of events, which until then had little substantial evidence. The Confession Tapes (2017) likewise takes contentious real-life confessions and inspects them with a rigour that (according to the show) the justice system has failed to.

When They See Us (2019), a four-part series directed by Ava DuVernay, looks at how interrogations, institutional racism and injustice interact. It dramatises the true story of the Central Park Five, a group of minority-ethnic boys wrongly convicted in 1990 of rape and assault. During questioning, the accusedall aged between 14 and 16 at the timewere denied food and drink and access to legal counsel. In the show, they are portrayed as sleep-deprived and desperate, subjected to intense off-the-record questioning in cleaning closets and filing rooms. The police threaten the boys with violence if they do not cooperate; detectives are depicted as more interested in finding someone they can pin the crime on than in nailing the actual perpetrator. In that they were successful: their bullying resulted in taped false confessions, and time in prison for the five boys. (In 2002 a court vacated the convictions.)

In A Confession, a new British drama also based on true events, the failure of Detective Superintendent Steve Fulcher (Martin Freeman) to act above board has severe repercussions for the prosecution of a case. In his eagerness to interrogate a taxi driver suspected of murdering a young woman, he ignores the procedures in the Police and Criminal Evidence Act 1984. The man does confess both to the murder in question and to another, but his statement is inadmissible as evidence in court. Here, once again, law enforcement is shown to be prone to making rash, emotional decisions.

Criminal (pictured top), released on Netflix on September 20th, pursues that idea and sets up a fictional game of cat-and-mouse between detectives and suspects. The drama in each of the 12 episodesset in either Britain, France, Germany or Spainis confined to an interrogation room in an anonymous police station. On one side of the mirror, bright lights illuminate police officers, the accused and, sometimes, a lawyer; on the other, a red-lit backroom hosts office politics, a running commentary on the cases progress and a ticking digital clock which informs the officers how long they have left until they have to charge the suspects or release them. Lies are exposed, but often not the ones the detectives had intended to uncover. Investigators are manipulated, led down wrong paths and frustrated in their quest. The suspects guiltor innocenceis not always clear.

Where interrogations once allowed TVs protagonists a chance to outsmart their opponents and heroically solve cases, now they show them to be fallible: think of the interview in Bodyguard in which David Budds reading of the situation is dangerously wrong. These characters bring their own foibles to bear on cases, and are willing to do whatever is necessary, morally permissible or not, to reinforce their version of events. They can make for difficult viewing, but these new shows offer a satisfying combination of suspense, friction and the search for truth.

See the original post:

The evolution of police interrogations on screen - The Economist

‘Hustlers’ And The Evolution Of Asian Sex Workers On-Screen – HuffPost

On the rooftop of a Manhattan strip club in one of the opening scenes of box office hit Hustlers, Jennifer Lopezs character Ramona says to fellow stripper Destiny, portrayed by Constance Wu, Youre new, youre gorgeous, youre Asian youre a triple threat. Before this scene, we get a glimpse into the life of Asian American protagonist Destiny: She is struggling to take home enough money after exploitative managers and security at the strip club whittle down her wages, and audiences see her at home in Queens trying to provide for her aging grandmother.

Already, within the first few moments of the film, Destiny embodies the most nuanced portrayal of an Asian sex worker in Hollywoods long history of reducing them to age-old stereotypes about Asian women.In the West, representations of Asian women in popular culture are often relegated to the same limiting roles: the ultra-feminine, innocent and sexually submissive lotus blossom, the model minorityand the sexually aggressive, domineering dragon lady, to name a few. One trope used time and time again is the Asiatic prostitute, where Asian women are often depicted in Western narratives as sex workers or sex slaves.

Perhaps one of the most memorable scenes featuring an Asian sex worker in a contemporary Hollywood film is from Stanley Kubricks Full Metal Jacket (1987), in which a Vietnamese prostitute solicits two American GIs by telling them, Me so horny ... me love you long time. The films depictions of the Vietnamese sex workers offer nothing of their personalities, histories or inner lives, only that they are women with degenerate values and bodies to be exploited by the men.

The idea that all Asian women are prostitutes hasnt come solely from stereotypes in Western media; it was also perpetuated by U.S. immigration law. The Page Act of 1875, the first law to restrict immigration into the country, effectively halted the immigration of East Asian women (namely Chinese women) to the U.S., under the assumption that they were all prostitutes and undesirable immigrants.

Such legalized exclusion of Chinese women popularized American representations of them as degrading figures that could potentially debase white manhood and, as such, threaten the health of the United States social body as a modern nation and imperial power, Lily Wong, an associate professor at American University, wrote in Transpacific Attachments, which studies the shifting depiction of Chinese and Chinese American sex workers in transpacific popular media. The legalized policing of Chinese female bodies justified both anti-Chinese yellow peril discourse and U.S. civilizing rescue narratives of imperial expansion into Asia.

It is unsurprising, then, that a lions share of the most popular on-screen and onstage productions starring Asian actresses fed into this exact discourse of the Western white savior going to the East and being seduced by an Asian woman. Both The World of Suzie Wong (1960) and Claude-Michel Schnberg and Alain Boublils hit musical Miss Saigon feature Asian sex workers as female leads, both of whom play the role of a hooker with a heart of gold while simultaneously embodying the lotus blossom stereotype.

The World of Suzie Wong stars Cantonese-European actress Nancy Kwan in the title role. In the film, Suzie Wong, a Hong Kong prostitute, becomes the love interest to American architect Robert Lomax. Film scholar Celine Parreas Shimizu wrote about Suzie in her book The Hypersexuality of Race: Despite incredible hardship as an illiterate prostitute with an illegitimate son, she maintains her goodness, beauty, and innocence.

She embodies immoral practices while projecting an innate innocence, Shimizu wrote, so it is only ever Suzie, the lotus blossom, who was exploited by men. In Hustlers, while Destiny maintains some of her innocence by labeling Ramona as the ringleader, she and the rest of her stripper posse flip the script by exploiting their white male clients (by drugging them and stealing their money). Meanwhile, Suzie is the picture of subservience, promising her dedication to Robert by saying, I will follow you until you say, Suzie, go away, and asking him in another scene, Robert, why you not let me be your permanent girlfriend?

Suzie was forced into the sex trade after being abandoned at 10 years old. Her character is a mirror to Kim, the female lead in Miss Saigon, a 17-year-old Vietnamese bargirl who also exemplifies the prostitute with a heart of gold archetype. Kim falls in love with and marries a U.S. Marine who leaves once the war is over, and she waits for his return for three years with their love child. When they reunite, the man is with his new American wife, whom Kim meets, triggering her to ultimately kill herself. The musical has long been protested by Asian American activists for its racist, sexist and Orientalist depictions, as well as for yellowface controversies.

These more contemporary stories are spawned from earlier texts, which all replicated the same repeated tropes. Miss Saigon is actually based on Giacomo Puccinis 1904 opera Madama Butterfly, which instead followed the doomed romance between an American lieutenant and a Japanese geisha. Before that, Madama Butterfly was inspired by Madame Chrysanthme, an 1887 semi-autobiographical novel about naval officer Pierre Lotis temporary marriage to a Japanese woman named Kiku. These recurrent storylines perpetuate the image of the Asian woman as war brides, geishas and prostitutes, all of whom lack agency and live to serve the white male lead. Meanwhile, Destinys purpose in life seems much more layered: to find a sense of belonging, to take care of her family, to chase thrills, to succeed in life. And we can tell that aspects of her job excite her, exhaust her and bore her at the same time.

However, in Miss Saigon, when the non-lead prostitute characters were allowed to display their inner lives on stage, audiences view them as desperate and suffering.

The production of Miss Saigon may actually represent other particular women in the sex industry beyond those enmeshed within conditions of sexual slavery, Shimizu wrote. While sexual slavery indeed exists for Asian female prostitutes, other situations coexist simultaneously in ways that should not be removed.

However, thanks to persistent stereotypes like those deployed in Suzie and Kims characters, Asian sex workers, especially those who are migrants, are often assumed to be trafficking victims.

The perpetuation of this stereotype has expressed itself in real-life police practices, which play out Western savior narratives. For example, Asian massage parlors were recently targeted in anti-trafficking stings in Florida, though no one has been charged with human trafficking. (These spa raids were made infamous for leading to Patriots owner Robert Krafts arrest.) In New York, similar crackdowns have led to the shuttering of parlors in the Flushing neighborhood of Queens, Manhattan, and Long Island in the past couple years, often leading to arrests. And typically, the people harmed most by these anti-trafficking raids are the women themselves.

Hollywoods insistence on stereotyping Asian women as helpless, innocent lotus blossoms has been met with inevitable consequences, like the fetishization of Asian women, and even some unintended ones, like a hammer-wielding man who killed Chinese men to protect Chinese women from them after watching an unspecified movie.

While Wus character in Hustlers is leaps and bounds better than the characters that came before, presenting a more nuanced and dimensional portrayal of an Asian sex worker on screen, there are still ways in which she fits into the same lineage as Suzie, Kim and Madame Butterfly.

Destiny still maintains a bit of the Asian American ingenue innocence as Ramonas protege, Kate Zen, co-founder of Red Canary Song, an organization that advocates for the rights of migrant sex workers, said in an interview. She ultimately caved in interrogation and sold out the group to the police, in a way that might arguably be retaining the model minority myth.

Sex workers had many other criticisms of the film, from maintaining the whorearchy by portraying the Russian dancers who were willing to give blow jobs as lesser than to ignoring the fact that strippers are often the victims of crimes rather than the perpetrators.

The dimensionality is positive, Zen said, though the focus on drugging and robbing customers also perpetuates stigma against sex workers and is a bit of an aberration from the reality of stripping, where strippers are more likely to get drugged by customers than the other way around.

Brooke, a 20-year-old former stripper from the Chicago area, pointed out that while Hustlers does some work to destigmatize the sex trade, she wishes it wouldve shed more of a light on the abuses and racialized harassment endured by Asian sex workers.

I was told on my first night that being Asian equals money, but they fail to tell you how many times youll hear, Ive never fucked an Oriental girl, Brooke, who requested to not use her last name in regard for her privacy, told HuffPost in an interview. I had many people excited just to see an Asian dancing, thought I was naturally into certain things like being dominated and bossed around, and also treated like a disgrace by Asian men who came into the club.

Still, in Hustlers, audiences are treated to a more well-rounded portrayal of an Asian stripper, whose complex inner life is revealed to us on-screen one that we nearly missed out on, given Dakota Johnson was initially considered for the lead role. (Though perhaps a Southeast Asian actress wouldve been even better casting, considering the real life stripper Destiny was based off of is Rosalyn Keo, who is Cambodian.)

Ultimately, the portrayal of Asian sex workers on screen has come a long way since the me so horny streetwalker, which is especially important given the inextricable ties between the treatment of Asian women in real life and our on-screen depictions.

Its so positive for us to see ourselves portrayed at all, Zen said. What a breath of fresh air!

REAL LIFE. REAL NEWS. REAL VOICES.

Help us tell more of the stories that matter from voices that too often remain unheard.

Read more from the original source:

'Hustlers' And The Evolution Of Asian Sex Workers On-Screen - HuffPost

Bochy shares evolution of his mustache through Topps cards – NBCSports.com

SAN FRANCISCO -- The moment was so perfect that it appeared it had to have been planned beforehand.

Bruce Bochy was looking for one last opportunity to get Madison Bumgarner into a Giants game, having decided not to start him Sunday, and when he looked up in the fifth, there was Clayton Kershaw jogging to the mound. Kershaw and Bumgarner will go down as two of the best left-handers of this generation, but their relationship goes beyond that.

The two have become friends, talking before most Giants-Dodgers games over the last decade. They keep in touch off the field and have always cherished the competition they have on it. Their battles are filled with inside pitches, subtle smiles and good-natured taunting as they sit in opposing dugouts.

Their matchup Sunday wasn't planned, both managers said, but it wasn't a total surprise. Dodgers manager Dave Roberts told reporters before the game that he expected to see Bumgarner as a pinch-hitter, not a reliever. Kershaw said he joked about a possible matchup.

Bochy knew what he wanted to do, even if he felt bad about a repercussion. He was apologetic to Brandon Crawford after pulling him from the final game for a pinch-hitter, but Crawford understood.

"I just wanted to do something for Madison," Bochy said. "With all he's done, I just said there can't be a better script right now with Clayton on the mound. They've battled so many times, not just pitching against each other, but how they compete against each other with the bat."

As Crawford headed back to the dugout and Bumgarner walked up the steps to a standing ovation, the shortstop had just one request.

"I told him, 'You better hit a homer,'" Crawford said later.

Bumgarner has taken Kershaw deep twice, and he certainly tried for a third one. He took a huge swing at the first pitch, a fastball up in the zone, but fouled it straight back. The next pitch was up and in and Bumgarner laughed as he looked out at the mound. Bumgarner ended up lining out, but what stood out to the Giants wasn't the result, but how Kershaw handled everything.

He threw seven fastballs, all between 89-91 mph. He wasn't directing meatballs down the heart of the plate, but he certainly gave Bumgarner every opportunity to compete and do something memorable. Kershaw also called rookie catcher Will Smith out before the at-bat to let Bumgarner soak in the cheers.

Bumgarner said after the game that he appreciated how it all went down, and his teammates applauded Kershaw -- who tipped his cap to Bochy after the third out -- as well.

"That's what makes baseball fun, little tidbits like that that you get to see throughout the year," catcher Buster Posey said. "I thought it was really cool how Kershaw pitched him. He went right after him and challenged him. Those two have been going at it for a decade now and there's hopefully more to come, we'll see."

Read the original here:

Bochy shares evolution of his mustache through Topps cards - NBCSports.com

Finding Faith: The evolution of Unitarian Universalism, basic beliefs, and why it’s a growing religion – East Idaho News

The lighting of the chalice during a Unitarian Universalist church service. Listen to the podcast in the player above or download it below. | Courtesy photo

This is the second in a series of podcasts about faith in eastern Idaho. Over the last six months, weve attended many different church services and spoken with members of different faiths to understand who they are and what they believe. Each episode in the six-part series will focus on a specific denomination and explore the history, culture and beliefs of the religion.

Thirty people gather at a small church on E Street in Idaho Falls. Its 10:30 on a Sunday morning.

A variety of people are in attendance. One young mother is there with her newborn baby, and theres another young couple in the pew several rows ahead. But most of the people are middle-aged.

Its a non-denominational service with progressive beliefs. Some members of the congregation believe in God and some dont. Some are gay and some are straight. But everyone is there for one purpose: to worship through words and music in their own way and on their own terms.

Welcome to Finding Faith, a podcast exploring the history, culture and beliefs of different denominations in eastern Idaho.

RELATED | Finding Faith: The truth about Muslims, what they believe, and how theyre treated by locals

In this episode, well take you inside a Unitarian Universalist church service. Members open up about their beliefs and explain why the faith has broad appeal. They also discuss the evolution of the faith over the years, and how it fosters love and acceptance for those inside and outside the church.

The Unitarian Universalist Church at 555 E Street in Idaho Falls. | Rett Nelson, EastIdahoNews.com

If youd like your church/faith to be highlighted in a future episode, send an email to rett@eastidahonews.com.

Read this article:

Finding Faith: The evolution of Unitarian Universalism, basic beliefs, and why it's a growing religion - East Idaho News

Pokemon GO Unova stone locations: how to get the evolution items, and full list of Gen 5 Pokemon it works with – iNews

CultureGaming

Friday, 27th September 2019, 08:17 am

It might have been a while since Pokemon GO received the kind of obsessive attention that it did in the beginning, but Niantic's addictive mobile monster catcher hasn't gone anywhere.

The game's community remains so active that just this August it enjoyed its most profitable month since 2016, bringing in $176 million.

A big factor in the game's impressive stamina has been the steady supply of new content that Niantec has kept up. This month saw a major new addition, with monsters from the series' fifth generation (Pokemon Black and White) appearing for the first time.

Hailing from the Unova region, these critters included the likes of sneaky feline, Purrloin and the snooty-looking lizard, Snivy. With the addition of Unova stones, some of the new 'mon can now be evolved into their more powerful forms.

For anyone who still has ambitions of being the very best, like no-one ever was, here's everything you need to know.

What are Unova stones?

Since the original Gameboy games, stones have featured in the Pokemon universe as been a key way to evolve certain monsters. However, rather than the various elemental rocks found in the original series, Niantec have chosen to streamline things a little by creating new stones that can be applied more widely.

When Pokemon from the Sinnoh region were introduced, the Sinnoh stone was added to handle all of the older critters who had been given new evolutions in Diamond and Pearl Rhyperior, Lickilicki, Ambipom and various others.

The Unova stones are similar except that, rather than evolving old 'mon into their newer forms, the Unova stones will be used to handle some of the evolutions of Pokemon that were first introduced in Black and White, such as Panpour and Lampent.

What Pokemon can I use them on?

As there haven't been that many Unova Pokemon added as of yet, the list of compatible critters is pretty short just now.

The three elemental monkeys Pansage, Panpour and Pansear can all be evolved into their bigger, badder selves Simisage, Simipour and Simisear while spooky lantern Lampent can be upgraded to a Chandelure (it's like "chandelier" but not).

However, it is worth keeping in mind that more Unova Pokemon are probably on the way, some of whom will no doubt also use the stones. Before long, it's very possible that they will be used to turn a Woobat into a Swoobat, a Boldore into a Gigalith, or a Minccino into its far fancier evolution, Cinccino.

How do I get one?

At the moment, there is only one way to get your hands on a Unova stone by completing your seventh day Field Research reward.

The Field Research tasks, added to the game last year, are daily missions which challenge the player to catch, hatch or battle in a specific way. Completing seven tasks across seven days unlocks a Research Breakthrough and lets the player reap a variety of rewards, one of which can now be a shiny new Unova stone.

While this is currently the only way to acquire the new evolutionary item, it seems likely that this will change in the future. Sinnoh stones can be earned through player versus player battles, so its easy to imagine that this will eventually happen with the newer region's stones as well.

Original post:

Pokemon GO Unova stone locations: how to get the evolution items, and full list of Gen 5 Pokemon it works with - iNews

The Courts Are Fighting Back Against Trump’s Brutal Immigration Policies – The Nation

Yazmin Jurez, standing next to a photo of herself holding her daughter Mariee, 1, who died after being released from ICE detention, is sworn in at a House Oversight subcommittee hearing, July 10, 2019, on Capitol Hill. (AP / Jacquelyn Martin)

The Noise: Trumps rambling statement at his press conference last week, shortly after the impeachment inquiry was announced, in which he congratulated himself on building an impenetrable border wall that even mountain-climbers wouldnt be able to scale. The Signal: Over the past several days the administration has unveiled a draconian cut in the number of refugees to be admitted next year and, via executive action, has sought to unravel the decades-old refugee resettlement program by giving cities and states the ability to veto resettlement in their communities.Ad Policy

Next year, the number of refugees admitted will be capped at 18,000; the number actually admitted will likely be lower still. Thats down from the target of 110,000 that Obama set in 2016, in his last presidential determination on the issue. In fact, Trumps cap is the lowest since the modern refugee resettlement system was codified, in 1980.

At the same time, as the administration locks down the southern border via a series of rule changes, it announced an agreement with Honduras allowing asylum seekers to be sent there rather than admitted into the United States. That came after Trump had already strong-armed Guatemala and El Salvador into similar agreements. What does this mean? Basically, that anyone who transits through Central America en route to safety in the United States can now be arrested and put on a plane to one of those three countrieswhich have high crime rates and are among the poorest in the Western Hemisphere. Thats not just absurd, its criminal.

Thats the bad news on the immigration front. But lost amid the other headlines this week were three extraordinarily positive judicial rulings.More Signal:Noise

First, in California, Federal Judge Dolly Gee ruled that the terms of the Flores agreement, which have the effect of limiting how long immigrant children can be kept in detention, could not be superseded by new Trump administration regulations allowing for indefinite detention. The administration will, of course, appeal the ruling, but at least for now, its sick plan to create family concentration camps is on hold.

Then, in quick succession, a Washington, DC, court declared illegal the administrations plans for fast-track deportation of undocumented immigrants arrested anywhere in the United States who cant prove they have been here continuously for two years. Thats important; currently theres a zone, within 100 miles of the border, in which undocumented immigrants have few constitutional protections and little access to immigration courts. Trump had sought to extend that zone to the entire country, but the court ruling puts the kibosh on that.

Finally, in Gonzalez v. ICE, a federal district court restricted when and how ICE could request that local police detain immigrants; the judge ruled that ICE was violating the Fourth Amendment in its catch-all missions against immigrants by mining federal databases that contain inaccurate or incomplete information.

These are huge developments. Pay attention to the Signalthe struggle over how this country treats immigrants is truly heating up.

See the original post:

The Courts Are Fighting Back Against Trump's Brutal Immigration Policies - The Nation

Trump Judge Rejects Exclusionary Rule in Violation of the Fourth Amendment: Confirmed Judges, Confirmed Fears – People For the American Way

Confirmed Judges, Confirmed Fears is a blog series documenting the harmful impact of President Trumps judges on Americans rights and liberties.

Trump 11th Circuit judge Kevin Newsom casts the deciding vote to reject the exclusionary rule despite acknowledging that an individuals Fourth Amendment rights were violated.

In U.S. v. Taylor, the FBI submitted an application for a search warrant in the Eastern District of Virginia. It sought permission to use a computer code known as National Investigative Technique (NIT) to enable the FBI to unmask anonymous or untraceable internet users. The FBI had reason to believe that evidence of child pornography related crimes was contained on property located in the Eastern District of Virginia. Not long after the warrant was granted, the FBI identified James Taylor as a computer user who accessed images of child pornography. His computer was located in Birmingham, Ala., outside of the Eastern District of Virginia. A magistrate judge in Alabama authorized a search of Taylors home, where a laptop, a hard drive and a USB drive were seized.

Taylor was charged with receiving, possessing and accessing child pornography. In district court, Taylor sought to suppress the evidence, claiming the NIT warrant violated his Fourth Amendment rights. He argued the warrant authorized a search of property located in the Eastern District of Virginia, not a nationwide search of property. The government argued that the warrant was a tracking device warrant allowing them to track the movements of a person, rather than authorizing just a search of a specific district. The governments argument was rejected as neither the warrant application nor any attached documents to the application mentioned the term tracking device.

Despite finding that Taylors Fourth Amendment rights were violated, the district court did not suppress the evidence because the court determined that the search fell within the good-faith exception to the exclusionary rule. Taylor appealed.

The majority affirmed the district courts ruling, concluding that although the NIT search warrant violated Taylors Fourth Amendment rights, it did not see any value in suppressing the evidence.

Judge Gerald Tjoflat strongly disagreed, explaining that the warrant process is premised on the good faith of law enforcement. If law enforcement officials are permitted to deliberately or recklessly include false representations in the warrant application and mislead the magistrate, then that would neuter the Fourth Amendment. He went on to say, I recognize that my decision would have an unfortunate result but such a result is the price to pay to protect the Fourth Amendment rights of the public.

More:

Trump Judge Rejects Exclusionary Rule in Violation of the Fourth Amendment: Confirmed Judges, Confirmed Fears - People For the American Way

The Week in Tech: Why Californians Have Better Privacy Protections – The New York Times

Each week, we review the weeks news, offering analysis about the most important developments in the tech industry.

Greetings from New York Times HQ in Midtown Manhattan. Im Natasha Singer, a tech reporter covering privacy, and Im bringing you the weeks tech news.

While many eyes were focused on the impeachment saga playing out in Washington, one person in San Francisco was taking on the entire tech industry. Again.

In 2017, Alastair Mactaggart, a wealthy real estate developer, founded and started financing a push for data rights for Californians. The effort led California lawmakers to enact the nations most comprehensive state consumer privacy law last year. Ever since then, tech companies and industry groups have maneuvered to water down its consumer protections.

Now Mr. Mactaggart is back with a new campaign.

Hes starting a ballot initiative that would amend the new law, the California Consumer Privacy Act, which takes effect on Jan. 1. He wants broader data control rights for Californians and new requirements on companies.

Among other things, his amendments would triple the laws fines for violations of childrens privacy.

The ballot initiative also has a political component. It would require companies that profited from using Californians personal data for election influence campaigns to disclose their practices to consumers and the state authorities.

When it comes to privacy protections, it seems, Californians have a big advantage over many other Americans. And not just because California was the first state to pass laws requiring companies to disclose data breaches and the first to grant minors the right to erase their online posts and photos.

The privacy laws illustrate differing governmental views on citizens rights.

The United States Constitution, for instance, does not explicitly grant an inalienable right to privacy. Although the Fourth Amendment protects people from unreasonable government searches and seizure, it does not safeguard us against intrusive and ubiquitous snooping by tech giants and other corporations.

The Constitution of California, however, grants a right to privacy putting it on equal footing with the rights to life, liberty, the pursuit of happiness, freedom of speech and freedom of religion.

The Charter of European Union goes even further. It recognizes privacy and, separately, the protection of personal data as fundamental human rights.

If you think about our other fundamental rights as a country, no one is spending millions and millions of dollars trying to undermine the First Amendment or the freedom of religion, Mr. Mactaggart told me. But people are actually spending hundreds of millions of dollars trying to undermine privacy because theres so much money in it for corporations.

For more practical tips on protecting your privacy, read my colleague Brian X. Chens new column on how to use Apples new privacy tools.

While Mr. Mactaggart was working to expand the right to privacy in California, Europes highest court issued landmark decisions narrowing it.

The rulings involved a law, popularly known as the right to be forgotten, which gives people in the European Union a legal means to delete certain personal information about them online. In practical terms, that means Europeans can use their right to be forgotten to require Google and other search engines to delete links to news articles or sites containing personal details about them that are outdated, inaccurate or not in the public interest.

But on Tuesday, as my colleague Adam Satariano reported from London, the European Court of Justice ruled that the right to be forgotten does not apply outside the European Union. The court also said the right to delete certain personal data must be balanced against the publics right to know.

The ruling was a victory for Google and other search engines, Adam wrote. It means that the tech giant will not be required to take down links outside the European Union. It may also give Google and other companies more leeway to refuse certain deletion requests in the name of the public interest.

But defending the publics right to know can also have intended consequences.

In a riveting article, Adam profiled a journalist in Italy, Alessandro Biancardi, who lost a legal battle to preserve an article about a pair of brawling brothers. The story covered the stabbing of one brother by another at a seaside restaurant.

The brother who was stabbed wanted the article about the incident deleted and sued the journalist, citing his right to be forgotten, Adam reported. The journalist, however, refused to take down the article.

The European courts new ruling limiting the right to be forgotten may help local publications in the European Union defend and preserve such news coverage.

But for Mr. Biancardi, it is too late.

The journalist lost the lawsuit over the article about the brawling brothers. Faced with many other privacy and article-deletion demands, including 40 lawsuits, Mr. Biancardi shut down his news site last year.

Wed love your feedback on this newsletter. Please email thoughts and suggestions to bits_newsletter@nytimes.com.

Forward it to your friends, and let them know they can sign up here.

The rest is here:

The Week in Tech: Why Californians Have Better Privacy Protections - The New York Times

Host of Mequon teen party wins ruling in case over police raid – Milwaukee Journal Sentinel

Two Mequon police officers investigating a possible underage drinking party violated the host's constitutional rights against unreasonable searches and could be held liable for damages, a federal judge has ruled.

An anonymous caller told police that a 2015 Halloween party in Gazebo Hills involved minors drinking alcohol. When officers arrived, they saw five cars, and youths inside through the front window, butno one would answer their knocks or calls.

Officers Matthew Schossow and Kristin Sudinski-Toryfterthen took a pathway to a secluded backyard patio area. Peeking through a slit in the closed blinds of awindow, they saw an open vodka bottle and a beer can. They used that information to get a search warrant and around 1:30 a.m., theyentered the home.

By then, 17 officers had responded to the area.

The original eight guests all Homestead High School football players did not have any alcohol on their breath, but four other minorswho had shown up later did. The host, John Reardon, was cited, but his ticketwas later dismissed. Three of the other minors got tickets for underage drinking.

In 2018, he and his father, Todd Michael Reardon, sued the city and several officers in federal court. On Tuesday, U.S. District Judge J.P. Stadtmueller found that the initial officers violated the Fourth Amendment protection against unreasonable searches when they went to the rear yard and looked into a window.

And since the information they obtained by doing so that there was open alcohol inside was a key element in their request for a search warrant, the warrant itself was invalid and the entrance and search pursuant to that warrant unconstitutional.

Lawyers for the officers argued that they did not need a warrant to go in the backyard because they were securing the perimeter, "a legitimate law enforcement objective." But Stadtmueller said the case law does not support such a broad exception to the warrant requirement.

"Nor could it: such a holding would gut the Fourth Amendment of its protections, and result in routine circumvention of the warrant process," he wrote.

Stadtmueller also found, however, that the city could not be held liable for the officers' actions because there was no evidence that Mequon's crackdown on underage drinking parties was "the moving force behind the officers decision to unlawfully search the home and curtilage without securing a valid warrant."

"This claim will proceed to trial on the issue of damages for the direct Fourth Amendment claims against Toryfter and Schossow only, however nominal those damages may be," Stadtmueller's order reads.

ContactBruce Vielmetti at (414) 224-2187or bvielmetti@jrn.com. Followhim on Twitter at @ProofHearsay.

Our subscribers make this coverage possible. Subscribe to the Journal Sentinel today at jsonline.com/deal.

Read or Share this story: https://www.jsonline.com/story/news/local/wisconsin/2019/09/24/judge-says-officers-violated-rights-investigating-teen-drinking-party/2431156001/

Read more:

Host of Mequon teen party wins ruling in case over police raid - Milwaukee Journal Sentinel

Officer, Who Arrested a Photographer for Taking Photos in Public, Has Their Qualified Immunity Claim Rejected – Fstoppers

A ray of hope for the future for those who record public events and news materials, as "federal appeals court has rejected a qualified immunity claim by a Dallas transit cop, whoarresteda freelance photographer for criminal trespass in 2016 because he was taking pictures at a train station."

Undoubtedly, both street photography and photojournalismhas become harder to exercise in public spaces and properties, pushing boundaries between what is legal and what is moral. However, when it comes to legalities, freelance photographer in Dallas, Avi Adelman, can celebrate as the U.S. Court of Appeals for the 5th Circuit ruled that "no reasonable officer under these circumstances would conclude that she had authority to eject a person complying with DART [Dallas Area Rapid Transit] policies from public propertyand then arrest that person for criminal trespass when he failed to depart".

The situation unfolded in 2016 when Adelman heard a report of an incident at DART'sRosa Parks Plaza station and decided to head there to document the story. Upon arrival, he was faced with Dallas Fire/Rescue paramedics attending to a man, who was lying on the ground, and Adelman began to photograph it but was confronted by DART Officer Stephanie Branch who ordered him to stop. Although Adelman explained that he had a right to photograph public events as long as he doesn't interfere with police or emergency responders, Branch ordered that he leaves the area, and when he refused to do so, she grabbed and handcuffed him.

Adelman was forced to spend that night in jail, but criminal trespass charge was dropped against him after DART concluded that there was a lack of probable cause for Branch to arrest the photographer. In fact, Adelman's arrest had violated a "Photography Policy" that DART adopted in June 2014, where"Persons may take photographic or video images of DART Property, including but not limited to stations, buses, trains, or other vehicles, for their personal use." Furthermore, policy read that"Persons taking photographic or video images must not interfere with transportation or public safety activity while taking images. DART Police Officers may initiate an inquiry or investigation when photography or videotaping activity is suspicious in nature or inconsistent with this policy."

The arresting officer Branch had been on a medical leave from May 2014 to January 2016, thus she claimed she had missed the memo.However, going through the audio that DART had captured that day, it revealed that everyone involved in dealing with the incident had understood that Adelman was not doing anything wrong at the scene. To make matters worse, an investigation led by the DART Police Office of Professional Standards revealed that Branch had made 23 "false or inaccurate statements" about the photographers' arrest, such as claiming that he was stood too close to the paramedics, who according to her lie wanted him to step back. Following this, she was suspended for three days.

After Adelman sued the officer and DART in September 2016, a federal judge concluded that,although Branch was "entitled to qualified immunity against his claim that she had violated his First Amendment rights", the same didn't apply regarding his Fourth Amendment claim. In this regard, based on the lack of probable cause for his arrest, the judge concluded that"the evidence demonstrates at least a fact issue regarding the element of reasonableness."

The Fifth Circuit was in favor of Adelmanhaving the right to pursue his Fourth Amendment claim, noting that "no reasonable officer would conclude that she has probable cause to arrest someone for criminal trespass after that person refuses to follow her instructions to leave when she lacks the authority to exclude the person from the property." They also rejected her claim that she didn't know any better because it wasn't due to misunderstanding or misinterpreting a policy but rather because she simply hadn't learned DART's updated policy, concluding that "an officer can gain no Fourth Amendment advantage through a sloppy study of the laws [s]he is duty-bound to enforce."

Although the same laws and policies do not transfer across the rest of the world, it is satisfying to see that there are situations where photographers are able to pursue their rights. Unfortunately, there are many stories where others haven't been as fortunate, both involving those whose job is to upholdthe laws and random passers by who take matters in their own hands. It may be a drop in the ocean, but Adelman'spersistence and knowledge of laws gives a hope for future cases involving both professional photojournalists and street photographers who simply want to record today's social history. If you want to read more about how this case develops, visit thisdesignated website.

Have you ever encountered a situation where you have been forced to stop photographing? Were you in the right? Share your story with us.

Lead image by Matthew105601 used under Creative Commons.

Read this article:

Officer, Who Arrested a Photographer for Taking Photos in Public, Has Their Qualified Immunity Claim Rejected - Fstoppers

Utah and other states try to combat increase of child sex abuse online – Salt Lake Tribune

The images are horrific. Children, some just 3 or 4 years old, being sexually abused and in some cases tortured.

Pictures of child sexual abuse have long been produced and shared, but it has never been like this: Technology companies reported a record 45 million online photos and videos of the abuse last year.

More than a decade ago, when the reported number was less than 1 million, the proliferation of the explicit imagery had already reached a crisis point. Tech companies, law enforcement agencies and legislators in Washington responded, committing to new measures meant to rein in the scourge. Landmark legislation passed in 2008.

Yet the explosion in detected content kept growing exponentially.

An investigation by The New York Times found an insatiable criminal underworld that had exploited the flawed and insufficient efforts to contain it.

A paper recently published in conjunction with the National Center for Missing and Exploited Children described a system at a breaking point, with reports of abusive images exceeding the capabilities of independent clearinghouses and law enforcement to take action. It suggested that future advancements in machine learning might be the only way to catch up with criminals.

In interviews, victims across the United States described in heart-wrenching detail how their lives had been upended by the abuse. Many of the survivors and their families said their view of humanity had been inextricably changed by the crimes themselves and the online demand for images of them.

I dont really know how to deal with it, said one woman who, at age 11, had been filmed being sexually assaulted by her father. Youre just trying to feel OK and not let something like this define your whole life. But the thing with the pictures is thats the thing that keeps this alive.

The Times reporting revealed a problem global in scope but one firmly rooted in the United States because of the central role Silicon Valley has played in facilitating the imagerys spread and in reporting it to authorities. While the material, commonly known as child pornography, predates the digital era, smartphone cameras, social media and cloud storage have allowed images to multiply at an alarming rate.

In a particularly disturbing trend, online groups are devoting themselves to sharing images of younger children and more extreme forms of abuse. The groups use encrypted technologies and the dark web, the vast underbelly of the internet, to teach pedophiles how to carry out the crimes and how to record and share images of the abuse worldwide.

After years of uneven monitoring of the material, several major tech companies stepped up surveillance of their platforms. Executives with some companies pointed to the voluntary monitoring and the spike in reports as indications of their commitment to addressing the problem.

But police records and emails, as well as interviews with local, state and federal law enforcement officials, show that some tech companies still fall short. It can take weeks or months for them to respond to questions from authorities, if they respond at all. Sometimes they respond only to say they have no records, even for reports they initiated.

And when tech companies cooperate fully, encryption and anonymization can create digital hiding places for perpetrators. Facebook announced in March plans to encrypt Messenger, which last year was responsible for nearly 12 million of the 18.4 million worldwide reports of child sexual abuse material, according to people familiar with the reports. Reports to authorities typically contain more than one image, and last year encompassed the record 45 million photos and videos.

The law Congress passed in 2008 foresaw many of todays problems, but the Times found that the federal government had not fulfilled major aspects of the legislation.

The Justice Department has produced just two of six required reports to compile data about internet crimes against children and set goals to eliminate them, and there has been a constant churn of short-term appointees leading the departments efforts.

The federal government has also not lived up to the laws funding goals. Congress has regularly allocated about half of the $60 million in yearly funding for state and local law enforcement efforts. Separately, the Department of Homeland Security this year diverted nearly $6 million from its cybercrimes units to immigration enforcement.

Further impairing the federal response are shortcomings at the National Center for Missing and Exploited Children, which reviews reports it receives and then distributes them to federal, state and local law enforcement agencies, as well as international partners.

The nonprofit center has relied in large measure on 20-year-old technology, has difficulty keeping experienced engineers on staff and, by its own reckoning, regards stopping the online distribution of photos and videos secondary to rescuing children.

The videos found on the computer of an Ohio man and site administrator named Jason Gmoser were described by investigators as among the most gruesome and violent images of child pornography. The videos were stored in a hidden computer file and had also been encrypted.

Increasingly, criminals are using advanced technologies like encryption to stay ahead of police. In this case, the Ohio man, who helped run a website on the dark web known as the Love Zone, had more than 3 million photos and videos on his computers.

The site, now shuttered, had nearly 30,000 members and required them to share images of abuse to maintain good standing, according to court documents. A private section of the forum was available only to members who shared imagery of children they abused themselves.

Multiple police investigations have broken up enormous dark web forums, including one known as Childs Play that was reported to have had over 1 million user accounts.

Offenders can cover their tracks by connecting to virtual private networks, which mask their locations; deploying encryption techniques, which can hide their messages and make their hard drives impenetrable; and posting on the dark web, which is inaccessible to conventional browsers.

The anonymity offered by the sites emboldens members to post images of very young children being sexually abused, and in increasingly extreme and violent forms.

Exhibits in the Love Zone case include screenshots showing the forum had dedicated areas where users discussed ways to remain safe while posting and downloading imagery.

Testimony in Gmosers criminal case revealed that it would have taken authorities trillions of years to crack the 41-character password he had used to encrypt the site. He eventually turned it over and was sentenced to life in prison in 2016.

Truly Terrible Things

The surge in criminal activity on the dark web accounted for only a fraction of the 18.4 million reports of abuse last year. That number originates almost entirely with tech companies based in the United States.

Companies have known for years that their platforms were being co-opted by predators, but many of them essentially looked the other way. And while many companies have made recent progress in identifying the material, they were slow to respond.

The recent surge by tech companies in filing reports of online abuse wouldnt exist if they did their job then, said Hemanshu Nigam, a former federal prosecutor in cybercrime and child exploitation cases who now runs a cybersecurity consulting firm.

The companies knew the house was full of roaches, and they were scared to turn the lights on, said Hany Farid, who worked with Microsoft to develop technology in 2009 for detecting child sexual abuse material. And then when they did turn the lights on, it was worse than they thought.

Federal law requires companies to preserve material about their reports of abuse imagery for 90 days. But given the overwhelming number of reports, it is not uncommon for requests from authorities to reach companies too late.

Most tech companies have been quick to respond to urgent inquiries, but responses in other cases vary significantly. Police officers in Missouri, New Jersey, Texas and Wisconsin pointed to Tumblr, a blogging and social networking site with 470 million users, as one of the most problematic companies, lamenting Tumblrs poor response to requests.

Law enforcement officials also pointed to problems with Microsofts Bing search engine, and Snap, the parent company of the social network Snapchat. Bing was said to regularly submit reports that lacked essential information, making investigations difficult. Snapchat is engineered to delete most of its content within a short period of time.

Facebook has long known about abusive images on its platforms, including a video of a man sexually assaulting a 6-year-old that went viral last year on Messenger. When Mark Zuckerberg, Facebooks chief executive, announced in March that Messenger would move to encryption, he acknowledged the risk it presented for truly terrible things like child exploitation.

Annual funding for state and regional investigations was authorized at $60 million, but only about half of that is regularly approved. It has increased only slightly from 10 years ago when accounting for inflation. Even $60 million a year would now be vastly inadequate.

And even the most recent biennial strategy reports published by the Justice Department, in 2010 and 2016, did not include data about some of the most pressing concerns, such as trade in illicit imagery.

When the law Congress passed in 2008 was reauthorized in 2012, the coordinator role was supposed to be elevated to a senior executive position. That has not happened.

The National Center for Missing and Exploited Children has also struggled with demands to contain the spread of the imagery.

As child exploitation has grown on the internet, the center has not kept up. The technology it uses for receiving and reviewing reports of the material was created in 1998. To perform key upgrades and help modernize the system, the group has relied on donations from tech companies like Palantir and Google.

The center has said it intends to make significant improvements to its technology starting in 2020, but the problems dont stop there. Police complain that the most urgent reports are not prioritized, or are sent to the wrong department completely. And despite its mandate by Congress, the center is not subject to public records laws and operates with little transparency.

The Times found that there was a close relationship between the center and Silicon Valley that raised questions about governance practices. The center receives both money and in-kind donations from tech companies, while employees of the same companies are sometimes members of its board. That practice, those working in the area of child protection said, could elevate the interests of tech companies above the childrens.

The close relationship with tech companies may ultimately be in jeopardy. In 2016, a federal court held that the national center, though private, qualified legally as a government entity because it performed a number of essential government functions.

If that view gains traction, Fourth Amendment challenges about searches and seizures by the government could change how the center operates. And under those circumstances, if they were to collaborate too closely with the center, companies could also be viewed as government actors subject to new legal requirements and court challenges when they police their own sites.

It was a sunny afternoon in July, and an unmarked police van in Salt Lake City was parked outside a pink stucco house.

At the back of the van, a man who lived in the house was seated, while officers cataloged hard drives and sifted through web histories from his computers. The man had shared sexually explicit videos online, police said.

The year was barely half over, and the team of Chief Jessica Farnsworth, an official with the Utah attorney generals office who led a raid of the house, had already conducted about 150 such raids across Utah. The specially trained group, one of 61 nationwide, coordinates responses to internet crimes against children.

The Utah group expects to arrest nearly twice as many people this year as last year, but federal funding has not kept pace. Funding for the 61 task forces from 2010 to 2018 remained relatively flat, federal data shows, while the number of leads referred to them increased by more than 400%.

Much of the federal money goes toward training new staff members because the cases take a heavy emotional and psychological toll on investigators, resulting in constant turnover.

The volume of work has also forced the task forces to make difficult choices. Some have focused on the youngest and most vulnerable victims, while others have cut back on undercover operations.

The internet is well known as a haven for hate speech, terrorism-related content and criminal activity, all of which have raised alarms and spurred public debate and action. But the problem of child sexual abuse gets scant attention because few people want to confront the enormity and horror of the content.

Some state lawmakers, judges and members of Congress have refused to discuss the problem in detail, or have avoided attending meetings and hearings, according to interviews with law enforcement officials and victims.

Steven Grocki, who leads the child exploitation and obscenity section at the Justice Department, said the reluctance was a societal problem. They turn away from it because its too ugly of a mirror, he said.

While the imagery is often defined as child pornography, experts prefer terms like child sexual abuse imagery or child exploitation material to underscore the seriousness of the crimes and to avoid conflating it with adult pornography.

Each and every image is a depiction of a crime in progress, said Sgt. Jeff Swanson, a task force commander in Kansas. The violence inflicted on these kids is unimaginable.

More here:

Utah and other states try to combat increase of child sex abuse online - Salt Lake Tribune

The Fair Pay to Play Act Presents NCAA With a New Kind of Legal Threat – The Ringer

California Governor Gavin Newsom signed a bill that could hasten the end of the college sports amateurism model. SB 206, more commonly known as the Fair Pay to Play Act, was unanimously passed by the states assembly (73-0, with six no votes recorded) and senate (39-0, with one no vote recorded) in mid-September. Newsom announced Monday that he signed it into law on The Shop, LeBron Jamess television show, a precedent I would like to be upheld in all future signings of state legislation:

The bills premise is straightforward. Beginning in January 2023, it is set to give student-athletes at colleges and universities in California the right to negotiate deals with third parties over the commercial use of their names, images, and likenesses (NIL). The NCAA has previously faced lawsuits over the usage of names, images, and likenesses, most notably in the OBannon v. NCAA case that prompted the organization to stop licensing EA Sports college-sports video game series. Yet this bill comes at the NCAA from the state level, using a legislative tactic the association hasnt yet encountered.

While opponents of SB 206 have been fervent in exclaiming how the bill will lead to the decay of college sports (and, gasp, all of society!) as we know it, its actually more limited in scope than previous attempts to blow up the NCAAs amateurism model. The bill isnt seeking to designate student-athletes as employees or force colleges and universities to pay them via salaries or a trust. It isnt trying to reconfigure the much-debated value of an athletic scholarship. It is merely set to bar institutions from stripping any athletes scholarship or eligibility over getting paid to sign autographs, appear in commercials, endorse products, and the like. Its aiming to adopt whats been referred to as the Olympic model. If a similar bill were passed on a national scale, EA Sports could pay athletes to use their likenesses in college-sports video games, as the company has wanted to since 2014. The NCAA has argued that fans only wanted to play as generic college teams; five years of fans obsessively updating rosters to keep them current stand as pretty strong evidence that fans care about the players too.

This is a major domino in the ongoing battle to secure fair compensation for college athletesand it could prove successful largely because of its limited scope. The biggest hurdle in the fight to do away with college sports amateurism is that the boiler-plate argument against it has always sounded reasonable. I dont see why schools should have to pay their players, says the man hosting the talk radio show, the man calling into the radio show, your mom, the friend-of-a-friend who attended your tailgate, and Mark Emmert, the NCAA president who gets paid more than $2 million annually to parrot this idea. Dont they already get scholarships?

I could spend a few paragraphs laying out why I believe student-athletes deserve more: the gargantuan sums of money their performances generate for schools in a billion-dollar industry; the way the NCAA has struck deals with the NBA and NFL that effectively force athletes into amateur ball even if theyre ready for the pros; the lack of accountability colleges face to pay for long-term injury treatment for athletes who are injured on scholarship; the skyrocketing salaries of coaches and athletic directors; and the lie of telling athletes that a degree will provide future financial security when they are often shepherded into the easiest, least useful classes so they can retain their eligibility. But to many, the mountains of evidence that athletes arent getting a fair shake cannot defeat the sheer simplicity of the counter: Dont they already get scholarships? Americans sacrifice so much to pay for college that its hard to sell people on the notion that student-athletes are stuck with the short end of the stick by only receiving a scholarship.

In the debate over NIL rights, however, the situation is flipped. Even if you see the play-for-scholarship exchange as fair, it still requires extensive and hypocritical mental gymnastics to contend that the NCAA should be able to prevent its athletes from partaking in other fair exchanges. This money wouldnt even come from the schoolswere talking about outside parties paying players for additional services off the field. Any other college student with a few thousand Instagram followers can get paid for posting a picture with a product; why cant a student-athlete sell a song or monetize his popular YouTube channel just because hes an athlete?

The NCAA has never had a particularly good answer for this, because its motivation for outlawing players from profiting off their names, images, and likenesses has always been cynical. While the schools that make up the NCAA would technically have nothing to lose from an athlete appearing in an outside adthe advertiser, after all, would pay in such a scenariothe association fears a slippery slope. If individual advertisers determine that individual athletes have monetary value, the NCAAs carefully crafted legal argument that fans watch college sports solely because of their attachment to universities would begin to crumble.

In that respect, the Fair Pay to Play Acts argument against the NCAAs amateurism model isnt new. By making it in a creative and hyperfocused way, however, it poses a major threat to an organization that doesnt seem to have to the logic to convincingly defend itself.

Ive heard three primary arguments as to why student-athletes shouldnt be able to collect money off their names, images, and likenesses. The first is that it would tip the competitive balance of major college sports, especially football and mens basketball, in favor of deep-pocketed schools whose boosters would shell out colossal piles of cash for prized athletes to sign autographs or appear in ads. For one thing, this isnt the governments problem. I believe the government has a legitimate interest in ensuring that its citizens rights arent trampled by multibillion-dollar corporations, such as the NCAA. I dont believe the government has a comparable interest in ensuring that two college sports programs have an equal shot at landing a five-star recruit. And for another, college sports dont offer an even playing field as it is. Even if we ignore the reality that bag men are already giving large sums of money to recruits, the ability for students to appear in commercials is not going to be the thing that pushes Clemson over the hump in its football games against Wake Forest. (I do, however, want to watch Trevor Lawrence do shampoo ads. Hed be a natural.)

The second argument is that this bill would undermine Title IX, because mens football and womens volleyball players, for example, would likely bring in disproportionate levels of pay via endorsement deals. This also doesnt hold water. Since the money wouldnt come from the schools, the colleges and universities wouldnt be funding mens and womens athletics differently than they are now, meaning that Title IX would be unaffected.

The third argumentthe one preferred and pushed by Emmertis that very few athletes would benefit from the ability to market themselves. Even if this is true, why should the NCAA oppose a rule that would be good for a few people and bad for nobody? (I guess it would go against the NCAAs typical strategy of having rules that help a few people and hurt a lot of people.)

If the NCAA had a coherent argument for opposing this bill, it would have made it consistently. Instead, the organizations response to SB 206 has rapidly changed. When the bill was passed by Californias senate, the NCAA wrote a letter to Governor Newsom claiming that it would erase the critical distinction between college and professional athletics, and lead to the states schools becoming exempt from participating in NCAA events. The letter, signed by Emmert, 17 university presidents, a former White House chief of staff, and, for some reason, Grant Hill, said that the bill was harmful and, we believe, unconstitutional. (As we all know, the Fourth Amendment outlaws unreasonable search and seizure and also decrees that all college sports teams should have the same chance to succeed.) Ohio State athletic director Gene Smith added that his school would stop scheduling California institutions, since he saw no way in which they could remain in the NCAA with this law in place.

On Monday, the NCAAs response to Newsoms signing the bill was discernibly more measured. The association released a statement that said the new law had caused confusionexactly what type of confusion is left unspecifiedand expressed concern that a patchwork of different laws across multiple states could potentially make its goal unattainable. The statement also said that improvement needs to happen on a national level and suggested that the organization could reconsider its own NIL rules to come up with versions that are realistic in modern society. In a little less than a month, the NCAAs stance on the bill has morphed from claiming imminent doom and gloom to conceding that a national law would make more sense than individual ones in all 50 states. Perhaps this is intended to dissuade other state legislatures from following suit. I interpret it as a damn good argument for Congress to act on a bill that will likely drum up support from both sides of the aisle.

The rise of this California bill has exposed a few truths about the NCAA. The first is that we should always remember this organization has as much legal authority when it comes to rulemaking as a board game inventor. Its illegal for an athlete to receive a huge payment from a booster in the same way its illegal for you to collect $1,000 in Monopoly money when passing go. Sure, the NCAA makes rules for how its member institutions should operate, and if you break those rules the NCAA could prevent your school from playing in a prestigious tournament or a bowl game. But its the government that actually makes and enacts laws. Sometimes this can get confusing, because the NCAA has previously tried to punish schools that break laws (like when it issued sanctions against Penn State for its officials failure to report the crimes of Jerry Sandusky) and because courts and federal agencies have previously decided to enforce NCAA laws (like the FBIs attempt to crack down on corruption in college basketball). When a state government passes a law asserting jurisdiction over how college athletics works, though, the NCAA can do little else besides whine and hide.

The second is that even the NCAA knows its arguments are flimsy. This is an organization that generates roughly a billion dollars per year and will continue to do so as long as its extremely precarious legal standing holds. For this reason, the NCAA will scream, hiss, and claim that the world is on fire when it encounters any threat to its position. However, when pushed, it has to acknowledge that it was making a big fuss over nothing.

In and of itself, the California bill doesnt change a lot. It will make college athletics more sensible in one state beginning four years from now. Yet it proves that the NCAA will treat even its least defensible stances as if Moses carried them down Sinai, when in reality the associations rules were put in place by greedy bureaucrats for the purpose of hoarding ever-increasing stacks of cash. If the NCAA gives way on name, image, and likeness rights and college sports continue existing in roughly the same fashion that they always have, something else will be made clear: This is all just posturing. Treat the NCAA like a toddler with a paper cut, and remember that the sheer volume of complaints does not reflect the severity of its situation.

Read more:

The Fair Pay to Play Act Presents NCAA With a New Kind of Legal Threat - The Ringer

Neurotechnology Releases Update to its NCheck Bio Attendance Time and Attendance Solution – PRNewswire

VILNIUS, Lithuania, Sept. 25, 2019 /PRNewswire/ --Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification technologies, today announced the latest update to its NCheck Bio Attendance end-user biometric system for time and attendance management using fingerprint, iris and facial recognition. The new version includes a number of enhancements that simplify user check-in/out using smartphones, computers or dedicated devices while making it easier for managers to collect and analyze attendance data, generate reports or use the data in a payroll system.

NCheck Bio Attendance can now be installed in private and public cloud environments as well as in more traditional client-server framework, and it has an improved user interface for system administrators. As with previous releases, GPS location data is automatically logged when users check-in and check-out. And the new NCheck API for user enrollment facilitates synchronization of user details and attendance events with other systems, incorporating and easily managing previously enrolled users.

"This NCheck release improves upon the previous version in every aspect," said Vaidas Didvalis, NCheck Project Manager for Neurotechnology. "It is also more interoperable, working seamlessly with other systems, and allows for easier integration into existing human resources related software."

The latest version includes enhanced facial recognition capabilities, including recognition of multiple faces from a single image: each person in a group photo can be identified and their attendance data will be automatically registered into the system. When video cameras are in use, live face detection is available. Should connection with the server be temporarily lost, offline user recognition is now an option.

With biometric fingerprint, iris and facial recognition, as well as RFID and barcode identification support, NCheck Bio Attendance provides a flexible solution for a wide range of applications, from time and attendance to scheduling of personnel and resources to check-ins at clinics and facilities, public or commercial.

NCheck Bio Attendance 5.0 is available through the NCheck or Neurotechnology websites. The entire biometric product line, as well as products for AI, robotics and object recognition, are available through Neurotechnology and from distributors worldwide. For more information, go to: http://www.neurotechnology.com.

About NeurotechnologyNeurotechnology is a developer of high-precision algorithms and software based on deep neural networks and other AI-related technologies. The company was launched in 1990 in Vilnius, Lithuania, with the key idea of using neural networks for various applications, such as biometric person identification, computer vision, robotics and artificial intelligence. Since the first release of its fingerprint identification system in 1991, the company has delivered more than 200 products and version upgrades. More than 3,000 system integrators, security companies and hardware providers in more than 140 countries integrate Neurotechnology's algorithms into their products. The company's algorithms have achieved top results in independent technology evaluations, including NIST MINEX, PFT, FRVT, IREX and FVC-onGoing. http://www.neurotechnology.com

Media ContactJennifer Allen NewtonBluehouse Consulting Group, Inc.+1-503-805-7540jennifer(at)bluehousecg(dot)com

SOURCE Neurotechnology

View post:

Neurotechnology Releases Update to its NCheck Bio Attendance Time and Attendance Solution - PRNewswire

Neurotechnology upgrades facial biometrics and other features of time and attendance system – Biometric Update

Neurotechnology has updated its NCheck Bio Attendance system with enhanced facial recognition that can recognize multiple faces in a single image, in addition to its support for fingerprint and iris biometrics.

The enhancements simplify user check-in and check-out processes with smartphones, computers, or dedicated devices and make it easier for managers to collect and analyze attendance data, generate reports, or use data with payroll systems, according to the announcement.

The new NCheck Bio Attendance 5.0 can also be installed in private and public cloud environments, or in a more traditional client-server framework, and comes with an improved user interface for administrators.

This NCheck release improves upon the previous version in every aspect, said Vaidas Didvalis, NCheck Project Manager for Neurotechnology. It is also more interoperable, working seamlessly with other systems, and allows for easier integration into existing human resources related software.

Live face detection from video camera feeds is also available, as is offline user recognition if the connection to the server is lost.

As with previous versions, GPS data is automatically logged for users checking in and out of the system, and NCheck Bio Attendance also supports RFID and barcode identification, in addition to biometrics.

The companys cloud-focused subsidiary SkyBiometry launched an update of its face detection and recognition algorithm in July.

biometrics | facial recognition | fingerprint recognition | iris recognition | Neurotechnology | time and attendance

View original post here:

Neurotechnology upgrades facial biometrics and other features of time and attendance system - Biometric Update

He was rejected in Mexico but now triumphs in Japan with a prosthesis that dominates with the mind. – The Yucatan Times

OSAKAJapn It was an important afternoon for Mexican scientist Christian Pealoza, back in 2017 when he closed a deal with the University of Osaka, the second most important in Japan: They want our project, he said emotionally.

Christian story is one of those that are sad and at the same time happy. His project was rejected in Mexico multiple times, but today his company, MIRAI INNOVATION, exports to the other side of the world.

Christian earned a doctorate in Japan and has been perfecting AURA, a device that processes signals from the brain, muscles and heart and converts them into concrete actions.We are collaborating with a researcher at UNAM who is developing a hand prosthesis with our software, so that people, just by thinking, can move the extremity he explains.

Recently his research was popularized around the world by a video in which a person moves a third robotic arm only with his mind, while with his hands he balances a ball on a tray. People can handle three arms at the same time, N+1mediareported.

His system can be used in various industries, in medical rehabilitation so that patients can, for example, control a prosthesis or a wheelchair with their minds. Also, with AURA users could play video games without using a control: just with their thoughts.

In Europe this technology costs 15 or 16 thousand dollars (almost 300 thousand pesos), but Christian managed to lower prices for the Mexican market: We managed to reduce them to 3 thousand 500 dollars (65 thousand pesos). This makes it more accessible for research centers and universities. Christian explains.

The system that Christian developed looks like a box with several cables: these are the electrodes that are connected to a cap or in the muscles to detect brain signals and muscle impulses. The information is sent to a computer, where you can see the activity of the brain or body.

Similar advances already exist in other countries in the field of neurotechnology: Facebook is working to get people to write with their thoughts. Nissan announced a car that receives brain signals to prevent accidents. Very important players are betting on this. Its the future, Christian says.

However, scientists believe that the same thing does not happen in Mexico and Latin America and attributes the delay to two factors: low investment in science, and the lack of tools for technological development: Generally these are promoted in technologically positioned countries such as Japan, the United States and Germany, but they take time to reach Mexico, and that causes a delay to us, he says.

In Mexico under Lopez Obradors government, all scholarships to study abroad have been canceled under presidential orders. AMLO claims that people who leave Mexico to study some place else are tourists.

Currently under the presidency of Lopez Obrador, most of CONACYTs support for science and technology is none existent. Other countries such as the United States invests 3% of its Gross Domestic Product (GDP) in research and development. This is equivalent to 20% of the GDP of all Latin American countries as a whole. To be a competitive region it would have to invest a quarter or fifth of its GDP, according to a study by UNAMs Faculty of Sciences.

Christian studied a masters degree in Robotics and Artificial Intelligence and a doctorate in Cognitive Neuroscience applied to Robotics in Japan, but getting there was not easy. After the Mexican government refused him a scholarship, thanks to the help of his parents and with his own savings he traveled to Japan, where he worked temporarily in a restaurant to subsidize his expenses.

Although Christian is 14 hours from his country, he does not abandon the idea of having his company in Tijuana and a representative in Mexico City: It was very complicated. I looked for research funds, but I didnt get the support I was looking for. I submitted five applications to Conacyt [National Council for Science and Technology] and none passed. A project I sent to the Instituto Nacional del Emprendedor didnt happen either.

Even though Congress has approved CONACYT to receive more funds there has been a reduction over last year, according to the General Directorate of Science Dissemination of UNAM.

Although his project was rejected in Mexico, Christian applied to a research fund in Japan: A research very similar to the one I proposed in Conacyt was accepted here. They gave me 100,000 dollars. He explains.

With the help of his brothers and one of his best friends, as partners and investors, he created Mirai Innovation. It means innovation of the future in Japanese, says Christian. The objective is to channel the knowledge acquired in Japan, and support me with the Mexican human capital to promote the technologies there, Christian says. Thank God I had people who believe in me and gave me their support.

Helping young peopleChristian was named by MIT Technology Review, a publication of one of the worlds leading universities, part of the ten most innovative young people under the age of 35 in Mexico. He received the Innovator of the Year award, a worldwide recognition for young people who provide solutions to global problems.

Ten people work at Mirai Innovation: We are a small team, we are distributed in Tijuana, Mexico City and Japan, he says.

Christian hired university talents: Alan and Rodrigo, 21 years old, are students and entered a few months ago, through a professional internship agreement with CETYS University in Tijuana, he explains.

Carlos, on the other hand, is 23 and won the Ceneval award as his universitys best score: I brought him to Japan six months ago and here we developed AURA, along with Bruno, another talented Mexican who is doing his doctorate here. Lizeth supports the researcher from Mexico City, she was selected by the American Young Leaders Initiative promoted by the U.S. Embassy.

However, some of the agreements he has tried to make have been frustrated by the lack of support. With the University of Chihuahua we put two projects to CONACYT. They accepted the first stage, but in the second they rejected us. We were going to make a robotic prosthesis for people with disabilities that would be cheaper and easier to use, because it would be controlled with the brain An agreement had already been made with the research institute where I work in Japan to bring them here, train them and then return to Mexico. These are events that werent achieved because we didnt get support, Christian laments.

With this new support from Japan, Christian and his team work on a humanoid robot to help older adults with dementia improve their mobility in physical therapies. Its a pilot project in collaboration with the Ensenada Center for Scientific Research and Higher Education: This is the way I can contribute, change the paradigm from the brain drain to the circularity of knowledge. Its love for Mexico. I like to take the country forward, concludes Christian, who is president of the Japan Chapter of the network of qualified Mexicans abroad RedGlobalMX.

comments

Here is the original post:

He was rejected in Mexico but now triumphs in Japan with a prosthesis that dominates with the mind. - The Yucatan Times

Face and Voice Biometrics Market Complete Competitive Analysis and Detailed Geographical Study 2019 2025|3M Cogent (USA), NEC Corporation of America…

Los Angeles, United State, September 30th, 2019, The global Face and Voice Biometrics market is carefully researched in the report while largely concentrating on top players and their business tactics, geographical expansion, market segments, competitive landscape, manufacturing, and pricing and cost structures. Each section of the research study is specially prepared to explore key aspects of the global Face and Voice Biometrics market. For instance, the market dynamics section digs deep into the drivers, restraints, trends, and opportunities of the global Face and Voice Biometrics Market. With qualitative and quantitative analysis, we help you with thorough and comprehensive research on the global Face and Voice Biometrics market. We have also focused on SWOT, PESTLE, and Porters Five Forces analyses of the global Face and Voice Biometrics market.

Leading players of the global Face and Voice Biometrics market are analyzed taking into account their market share, recent developments, new product launches, partnerships, mergers or acquisitions, and markets served. We also provide an exhaustive analysis of their product portfolios to explore the products and applications they concentrate on when operating in the global Face and Voice Biometrics market. Furthermore, the report offers two separate market forecasts one for the production side and another for the consumption side of the global Face and Voice Biometrics market. It also provides useful recommendations for new as well as established players of the global Face and Voice Biometrics market.

Get PDF template of this report: https://www.qyresearch.com/sample-form/form/692303/global-face-and-voice-biometrics-market

Face and Voice Biometrics Market Leading Players

3M Cogent (USA), NEC Corporation of America (USA), AcSys Biometrics Corp. (Canada), AGNITiO S.L. (Spain), Cognitec Systems GmbH (Germany), Nuance Communications, Inc. (USA), Eurotech S.P.A (Italy), Ivrnet Inc. (Canada), Kimaldi Electronics, S.L. (Spain), National Security Resources (USA), Neurotechnology (Lithuania), PSP Security Co. Ltd (Hong Kong), SAFRAN Group (France), Sensible Vision (USA), Sensory, Inc. (USA), Suprema, Inc. (Korea), VoiceTrust eServices, Inc. (Canada), VoiceVault, Inc. (USA)

Report Objectives

Analyzing the size of the global Face and Voice Biometrics market on the basis of value and volume.

Accurately calculating the market shares, consumption, and other vital factors of different segments of the global Face and Voice Biometrics market.

Exploring the key dynamics of the global Face and Voice Biometrics market.

Highlighting important trends of the global Face and Voice Biometrics market in terms of production, revenue, and sales.

Deeply profiling top players of the global Face and Voice Biometrics market and showing how they compete in the industry.

Studying manufacturing processes and costs, product pricing, and various trends related to them.

Showing the performance of different regions and countries in the global Face and Voice Biometrics market.

Forecasting the market size and share of all segments, regions, and the global market.

Get Complete Report in your Inbox within 24 hours at USD(5,600);:

https://www.qyresearch.com/settlement/pre/730c8dc17e025934bea2e6614ed38142,0,1,Global-Face-and-Voice-Biometrics-Market-Size-Status-and-Forecast

Table of Contents.

Report Overview: It includes major players of the global Face and Voice Biometrics market covered in the research study, research scope, market segments by type, market segments by application, years considered for the research study, and objectives of the report.

Global Growth Trends: This section focuses on industry trends where market drivers and top market trends are shed light upon. It also provides growth rates of key producers operating in the global Face and Voice Biometrics market. Furthermore, it offers production and capacity analysis where marketing pricing trends, capacity, production, and production value of the global Face and Voice Biometrics market are discussed.

Market Share by Manufacturers: Here, the report provides details about revenue by manufacturers, production and capacity by manufacturers, price by manufacturers, expansion plans, mergers and acquisitions, and products, market entry dates, distribution, and market areas of key manufacturers.

Market Size by Type: This section concentrates on product type segments where production value market share, price, and production market share by product type are discussed.

Market Size by Application: Besides an overview of the global Face and Voice Biometrics market by application, it gives a study on the consumption in the global Face and Voice Biometrics market by application.

Production by Region: Here, the production value growth rate, production growth rate, import and export, and key players of each regional market are provided.

Consumption by Region: This section provides information on the consumption in each regional market studied in the report. The consumption is discussed on the basis of country, application, and product type.

Company Profiles: Almost all leading players of the global Face and Voice Biometrics market are profiled in this section. The analysts have provided information about their recent developments in the global Face and Voice Biometrics market, products, revenue, production, business, and company.

Market Forecast by Production: The production and production value forecasts included in this section are for the global Face and Voice Biometrics market as well as for key regional markets.

Market Forecast by Consumption: The consumption and consumption value forecasts included in this section are for the global Face and Voice Biometrics market as well as for key regional markets.

Value Chain and Sales Analysis: It deeply analyzes customers, distributors, sales channels, and value chain of the global Face and Voice Biometrics market.

Key Findings: This section gives a quick look at the important findings of the research study.

About Us:

QYResearch always pursuits high product quality with the belief that quality is the soul of business. Through years of effort and supports from the huge number of customer supports, QYResearch consulting group has accumulated creative design methods on many high-quality markets investigation and research team with rich experience. Today, QYResearch has become a brand of quality assurance in the consulting industry.

Excerpt from:

Face and Voice Biometrics Market Complete Competitive Analysis and Detailed Geographical Study 2019 2025|3M Cogent (USA), NEC Corporation of America...