Its Complicated: Hubble Survey Finds Unexpected Diversity in Dusty Discs Around Nearby Stars

Images captured by the Hubble Telescope of the vast debris systems surrounding nearby stars. Credit: NASA/ESA/ G. Schneider (University of Arizona), and the HST/GO 12228 Team

Using NASAs Hubble Space Telescope, astronomers have completed the largest and most sensitive visible-light imaging survey of the debris disks surrounding nearby stars. These dusty disks, likely created by collisions between leftover objects from planet formation, were imaged around stars as young as 10 million years old and as mature as more than 1 billion years old.

The research was conducted by astronomers from NASAs Goddard Space Center with the help of the University of Arizonas Steward Observatory. The survey was led by Glenn Schneider, the results of which appeared in the Oct. 1st 2014 issue of The Astronomical Journal.

We find that the systems are not simply flat with uniform surfaces, Schneider said. These are actually pretty complicated three-dimensional debris systems, often with embedded smaller structures. Some of the substructures could be signposts of unseen planets.

In addition to learning much about the debris fields that surround neighboring stars, the study presented an opportunity to learn more about the formation of our own Solar System.

Its like looking back in time to see the kinds of destructive events that once routinely happened in our solar system after the planets formed, said Schneider.

Once thought to be flat disks, the study revealed an unexpected diversity and complexity of dusty debris structures surrounding the observed stars. This strongly suggest they are being gravitationally affected by unseen planets orbiting the star.

Alternatively, these effects could result from the stars passing through interstellar space. In addition, the researchers discovered that no two disks of material surrounding stars were alike.

A circumstellar disk of debris around a matured stellar system may indicate that Earth-like planets lie within. Credit: NASA/JPL

The astronomers used Hubbles Space Telescope Imaging Spectrograph to study 10 previously discovered circumstellar debris systems, plus MP Mus, a mature protoplanetary disk that is comparable in age to the youngest of the debris disks.

More:

Its Complicated: Hubble Survey Finds Unexpected Diversity in Dusty Discs Around Nearby Stars

NATO Slams ‘Provocative’ Russian Air Incursions: Kremlin jets and bombers invade NATO airspace – Video


NATO Slams #39;Provocative #39; Russian Air Incursions: Kremlin jets and bombers invade NATO airspace
NATO #39;s top military commander says recent incursions into European air space by Russian fighters and long-range bombers included larger, more complex formati...

By: UKRAINE TODAY

See original here:

NATO Slams 'Provocative' Russian Air Incursions: Kremlin jets and bombers invade NATO airspace - Video

NATO warns Russian military behaviour is undermining decades of trust – Video


NATO warns Russian military behaviour is undermining decades of trust
Tensions between "NATO":http://www.nato.int/ and Russia are on the rise following a spike in Russian air force activity in Eastern Europe and its troop movements close to Ukraine #39;s border....

By: euronews (in English)

Continued here:

NATO warns Russian military behaviour is undermining decades of trust - Video

NATO's New Secretary General Makes First Visit To Kabul

NATO Secretary General Jens Stoltenberg on this way to Kabul. NATO hide caption

NATO Secretary General Jens Stoltenberg on this way to Kabul.

The new secretary general of NATO and Pakistan's Army chief were in Kabul on Thursday to meet with newly-sworn-in President Ashraf Ghani.

As NPR's Sean Carberry reports the visits mark a continued honeymoon between the international community and Afghanistan's new government. Sean sent this report to our Newscast unit:

"Neither visit resulted in any new policies or initiatives. Rather, they appeared to be about marking a new chapter in Afghanistan's relations with NATO and Pakistan.

"Over the years, former President Hamid Karzai's relationship with many in the international community soured something Ghani is trying to turn around.

"In his first visit to Afghanistan, NATO Secretary Jens Stoltenberg said he's known Ghani for some time and that NATO is committed to a long-term partnership with Afghanistan. After the current combat mission ends in December, some 12,000 U.S. and NATO troops will conduct a training and support mission here for the next two years."

Stoltenberg visited the Afghan National Army Special Operations Command at Camp Morehead in Kabul, where he praised the progress of Afghan commando units.

"I have seen a highly trained, experienced and professional force," Stoltenberg said. "For over a year, Afghan soldiers and police have led security operations across the country, and at the end of this year, you will take full charge of security. But you will not stand alone. NATO and our partners will continue to support you."

Meanwhile, the AP reports that the day also brought a bloody reminder that the Taliban remain a formidable force. The wire service reports:

See the original post here:

NATO's New Secretary General Makes First Visit To Kabul

Republicans Taking Over Congress Isnt the Privacy Nightmare Youd Think

NSA reform may be the last true bipartisan issue.

Republicans won victories nationwide in Tuesdays midterm election, handily taking control of Congress and ousting two key criticsSenator Mark Udall (D. Colorado) and Senator Mark Begich (D. Alaska)of the NSA. The GOP takeover of the legislative branch means Republicans will chair all senate committees, including the powerful Senate Select Committee on Intelligence.

Privacy advocates like the ACLU are often aligned with the Democratic and liberal sides of politics, so it stands to reason that some might worry this would be a crushing blow to privacy. The biggest NSA defenders are Republicans; the Patriot Act that justifies much of the spying behavior disclosed by Edward Snowden was created and passed under a Republican administration and Congress; and a majority of Republican lawmakers have voted to enhance those spying powers over the years, even after the Snowden information was revealed.

Further, 2015 is shaping up to be a key year in the fight for privacy in the post-Snowden era. A number of provisions of the Patriot Act will be up for reauthorization next June. The USA Freedom Act, which aims to curtail NSA powers, will also finally be up for consideration in the Senate. With more than half of the American people disapproving of the NSAs activities, reform is a clearly pressing issue.

Yet, a Republican majority in the House and Senate is not the devastating blow to privacy you might have expected it to be. Here are four reasons why.

Though NSA reform once was a partisan issue, Edward Snowdens revelations of the depth of government surveillance united Democrats and Republicans in calling for an overhaul. Neema Singh Guliani, legislative counsel with the American Civil Liberties Union, says its too early to tell what direction the new leadership will go, but she says the issue of NSA reform is not a one-senator or a one-party issue.

Take Colorado, for instance. Outgoing Democratic Senator Mark Udall was one of the Senate intelligence committees few members who persistently criticized the agencies it oversaw. He fought all expansions of NSA reach and opposed using drones to spy on US citizens, introduing a bill in 2013 to ensure private drone operators could not spy on people in this country.

If he were to be replaced by a pro-NSA senator, the weight of the reform movement would have become severely unbalanced.

In fact, Republican Cory Gardner, who beat Udall handily by 4 percentage points, has such a good record on privacy that Udall was essentially unable to run on his own sterling record. Gardner recently reversed his position on matters of privacy. Though he initially voted for the updated and expanded Patriot Act in 2011 (which Udall was staunchly against), Gardners record changed dramatically after Snowdens NSA revelations, consistently voting against expanding NSA reach. As a congressman, he co-sponsored the EFF-backed version of the new USA Freedom Act.

This kind of bipartisan support for privacy issues is not unique to Colorado, as one look at the congressional scorecard compiled by the coalition for StandAgainstSpying reveals.

View original post here:

Republicans Taking Over Congress Isnt the Privacy Nightmare Youd Think

Posted in NSA

Now the GOP Must Choose: Mass Surveillance or Privacy?

Before May, Congress has no alternative but to endorse or end NSA spying on the phone calls of virtually every American. What does the new party in charge want?

Toby Melville/Reuters

The Patriot Act substantially expires in May 2015.

When the new Congress takes up its reauthorization, mere months after convening, members will be forced to decide what to do about Section 215 of the law, the provision cited by the NSA to justify logging most every telephone call made by Americans.

With Republicans controlling both the Senate and the House, the GOP faces a stark choice. Is a party that purports to favor constitutional conservatism and limited government going to ratify mass surveillance that makes a mockery of the Fourth Amendment? Will Mitch McConnell endorse a policy wherein the Obama administration logs and stores every telephone number dialed or received by Roger Ailes of Fox News, Wayne LaPierre of the NRA, the Koch brothers, the head of every pro-life organization in America, and every member of the Tea Party? Is the GOP House going to sacrifice the privacy of all its constituents to NSA spying that embodies the generalized warrants so abhorrent to the founders?

The issue divides elected Republicans. Senator Rand Paul and Representative Justin Amash are among those wary of tracking the phone calls of millions of innocent people. Senator Richard Burr favors doing it. Republicans pondering a run for president in 2016 will be trying to figure out how mass surveillance will play in that campaign.

Many would rather not take any stand before May, as if governingthe very job citizens are paying them to dois some sort of trap. But their preferences don't matter. This fight is unavoidable.

Nor is it the only one that touches on surveillance. The dubiously named USA Freedom Act began as an effort to reform the NSA and has since been weakened. The NSA and FBI engages in lots of questionable surveillance besides the phone dragnet. Republicans will now run the Senate and House intelligence committees.

Rather than urging the GOP to avoid "the governing trap," National Review and other outlets purportedly dedicated to constitutional conservatism ought to be demanding that Republicans use their newfound power to rein in our surveillance bureaucracy, since anyone with a healthy mistrust of government should see how easily its staggering power, exercised in secret, could be ruinous to liberty. A limited-government movement that does not demand oversight and reform now that its party has regained power is a farce. To endorse the national surveillance bureaucracy as it now stands is tantamount to declaring oneself a trusting statist.

And opposing it would be a populist victory that puts Republicans in a position to truthfully brag about fighting to save core liberties from Barack Obama, Joe Biden, Hillary Clinton, and every other prominent Democratic apologist for the NSA.

Read more:

Now the GOP Must Choose: Mass Surveillance or Privacy?

Posted in NSA

IT Security TV Show 4 November 2014 – iPhone Users Forfeit Fifth Amendment – Video


IT Security TV Show 4 November 2014 - iPhone Users Forfeit Fifth Amendment
http://www.secpoint.com/news IT Security News show 4th November 2014 Many Security Topics covered Pirate Bay founder Gottfrid Svartholm Found Guilty in Hacki...

By: SecPoint

Read this article:

IT Security TV Show 4 November 2014 - iPhone Users Forfeit Fifth Amendment - Video

Virginia state trial court ruling on the Fifth Amendment …

Last week, there was a lot of press coverage about a Virginia court ruling on how the Fifth Amendment applies to bypassing a smart phone passcode. The ruling hasnt been available before today, but here it is: Commonwealth v. Baust, via Marcia Hofmann. Its a short opinion, just five pages, so its a quick read. Unfortunately, though, the opinion doesnt address the really important issue raised by compelled decryption: Whether the government can force the defendant to enter in the passcode. Its not the courts fault that the opinion didnt reach that, to be clear. The government never asked for an order compelling the defendant to do that, so the court didnt decide it. Heres a quick rundown of the facts, the law, and my reaction.

The defendant has been charged with assaulting a woman. There is reason to believe that the defendant videotaped the assault and that there is a copy of the video on the defendants passcode-protected smart phone. The state wants the defendant to be ordered either to disclose his passcode so the police can enter in the passcode to unlock the phone themselves, or else to give up his fingerprint to unlock the phone directly using the phones fingerprint sensor.

The court reaches a split ruling. First, there is no Fifth Amendment problem with forcing the defendant to provide his fingerprint. Second, the defendant cannot be forced to tell the government his passcode because that would be forcing the defendant to disclose the contents of his own mind. Most importantly, the court rules that the foregone conclusion doctrine doesnt apply because the police dont know the passcode:

Contrary to the Commonwealths assertion, the password is not a foregone conclusion because it is not known outside of Defendants mind. Unlike a document or tangible thing, such as an unencrypted copy of the footage itself, if the password was a foregone conclusion, the Commonwealth would not need to compel Defendant to produce it because they would already know it.

In dicta, the Court adds that the defendant could not be compelled to hand over a decrypted version of the video believed to be on his phone. Thats true because it is not a foregone conclusion that the video exists or is on the phone. The defendant cant be forced to effectively testify as to that by producing a decrypted version of the video.

This is just a state court trial ruling, not an appellate decision. So its interesting more for its reasoning than its precedential value. With that said, here are some thoughts on the reasoning of the case.

First, the courts ruling on divulging a fingerprint is easy. Theres obviously no Fifth Amendment problem with that. On the governments request for the passcode, the opinion is frustrating because the governments request was poorly framed. In this case, the government doesnt need to know the defendants passcode. It only needs to bypass the passcode gate, either through the fingerprint or by having the passcode entered in by the defendant. If the government couldnt get into the phone with the fingerprint, then, the sensible request would be for an order to have the defendant enter in the code rather than an order disclosing it to the government. But the government didnt ask for that: Instead it asked for an order that the defendant tell them his passcode.

Whats the difference? Having the defendant enter in his passcode would minimize the Fifth Amendment implications of the compelled compliance, as it would not involve disclosing the potentially incriminating evidence of the passcode itself. The passcode itself could be independently incriminating, at least in some cases. Imagine a conspiracy case in which members of the conspiracy use a common passcode. Proof that a suspect used that exact passcode on his own phone would be incriminating evidence, as it could help to show membership in the conspiracy.

Because the passcode itself could be incriminating, the smart way to limit the Fifth Amendment problem is for the government to ask for an order compelling the target to enter in the passcode rather than to divulge it to the police. That way, the government gets the unlocked phone but never gets the passcode. If the defendant has to enter in the passcode rather than tell it to the police, the testimonial aspect of complying would only be admitting knowledge of the passcode, which would very likely be a foregone conclusion in a case where the phone is used heavily by that person. But the government didnt ask for that here, so the court didnt consider how the Fifth Amendment would apply in such circumstances.

Notably, the court does address in dicta whether it would be incriminating for the defendant to hand over the unencrypted video believed to be on the phone. But forcing the defendant to hand over the unencrypted video is quite different from having him enter in the passcode to unlock the phone. Being forced to enter in the passcode to unlock the phone amounts to being forced to say, I know the passcode for this phone. On the other hand, as the court recognized, being forced to produce the unencrypted video amounts to being forced to say much more, such as I admit that the video exists; I admit that this is the video; I know where that video is; and I admit that I know what video youre talking about. Being forced to produce the video raises a host of Fifth Amendment issues that merely entering in the passcode does not.

See the original post:

Virginia state trial court ruling on the Fifth Amendment ...

Why the Constitution Can Protect Passwords But Not Fingerprint Scans

TIME Tech legal Why the Constitution Can Protect Passwords But Not Fingerprint Scans A portable fingerprint scanner is displayed at the Biometrics Conference and Exhibition at the Queen Elizabeth II Conference Centre. Peter MacdiarmidGetty Images Fingerprint scans are more secure, except when it comes to the Fifth Amendment

Cellphone fingerprint passcodes werent on James Madisons mind when he authored the Fifth Amendment, a constitutional protection with roots in preventing torture by barring self-incriminating testimonials in court cases.

Yet those tiny skin ridges we all share were at the heart of a Virginia court case last week in which a judge ruled that police, who suspected there was incriminating evidence on a suspects smartphone, could legally force the man to unlock his device with its fingerprint scanner. While the Fifth Amendment protects defendants from revealing their numeric passcodes, which would be considered a self-incriminating testimonial, biometrics like fingerprint scans fall outside the laws scope.

If you are being forced to divulge something that you know, thats not okay, said Marcia Hofmann, an attorney and special counsel to digital rights group Electronic Frontier Foundation. If the government is able through other means to collect evidence that just exists, then they certainly can do that without stepping on the toes of the constitutional protection.

The important thing is, Hofmann said, is it something you know, or something you have?

The Virginia ruling was perhaps the most clear-cut decision among similar cases whose outcomes have varied significantly by circumstance. In United States v. Fricosu (2012), a court ruled because it was a foregone conclusion that the defendants password-locked data was incriminating, the Fifth Amendment didnt apply. In United States v. John Doe (2011), the defendant, who had a hard drive protected by encryption, at first didnt receive Fifth Amendment protection, but that decision was reversed by an appellate court that ruled that if Doe provided his decryption password, then it would lead the Government to evidence that would incriminate him. Last weeks Virginia ruling is a fresh example of what can happen when a 225-year-old law is applied to a field as rapidly changing as digital security.

I think the courts are struggling with this, because a fingerprint in and of itself is not testimony, said Hayes Hunt, a criminal defense and government investigations lawyer at Cozen OConnor. The concern is, once we put a password on something or in ourselves, we have a certain privacy interest.

Judges across the country will only have to make more decisions about biometrics, as their use by everyday consumers is on the rise. Today, our data is protected by everything from iris scans at airports to heartbeat measurements and ear-print smartphone locks. This whole area is in such a state of flux, said Jody Goodman, a counsel at Crowell & Moring. It seems like every week there are new things happening.

Apple in particular is one of the most widely-recognized consumer technology companies that have adopted biometrics, though it wasnt the first. Its latest flagship iPhones and iPads come with Touch ID, which lets users unlock their devices or make payments by scanning their thumbprints instead of inputting a numeric passcode. But while Apple and other companies with fingerprint scanners on their devices say the feature provides more protection from data theft, the Virginia ruling means that data protected only by an old-school passcode is afforded stronger legal protection under the Fifth Amendment.

The solution for those seeking more legal cover for their data, though, is surprisingly simple. If a defendants data is protected by both a thumbprint and a passcode, he or she could invoke the Fifth for the thumbprint, thereby blocking access to the data at least according to the precedent set by the Virginia case. But for now, iPhones at least lack this option, probably because its not being demanded by consumers.

Go here to read the rest:

Why the Constitution Can Protect Passwords But Not Fingerprint Scans

Volokh Conspiracy: Magistrate issues arrest warrants for 17 years but is new to probable cause

Heres a remarkable case from the Ohio Supreme Court, State v. Hoffman, involving an unconstitutional arrest warrant. The defendant was arrested for a misdemeanor based on a defective arrest warrant, leading to the discovery of evidence of murder. The remarkable part is why the arrest warrant was defective. For at least 17 years, magistrates in Toledo, Ohio were instructed to issue arrest warrants without ever actually making a probable cause determination. Officers would just say that the suspect had committed an offense, and the magistrates would issue the warrant without ever hearing the factual basis for that conclusion. Heres the testimony of the magistrate who issued the arrest warrant in this case:

Q. And during your 17 years of swearing in criminal complaints with requests for arrest warrants, did you know what probable cause was? A. No. Q. Had you ever made a probable cause determination? A. No. * * * Q. Did any of [your] training include making a probable cause determination? A. No, it did not.

Pretty astonishing, given that the text of the Fourth Amendment says, no warrants shall issue, but upon probable cause.

In the new decision, the Supreme Court of Ohio recognizes the flagrant constitutional violation but concludes that the evidence in this case should not be suppressed because of the good-faith exception. An intermediate state case, State v. Overton, had involved a similar warrant, and the Overton court had held in a one-paragraph summary that the warrant had established probable cause. The Ohio Supreme Court concludes in Hoffman that Overton was binding appellate precedent under Davis at the time the warrant was issued in Hoffman, essentially trumping the text of the Fourth Amendment for purposes of the exclusionary rule.

I find Hoffman puzzling in two ways. First, I think the scope of the exclusionary rule for a defective warrant is set by United States v. Leon, 468 U.S. 897 (1984), not Davis. Leon lays out the standards for when the good faith exception applies to defective warrants, and it clearly does not apply here: Leon says that the good faith exception only applies if [s]ufficient information [was] presented to the magistrate to allow that official to determine probable cause; his action cannot be a mere ratification of the bare conclusions of others. This case involves exactly that mere ratification that Leon says wont suffice. Given the clarity of Leon on this point, coming straight from the U.S. Supreme Court, it seems strange to me to apply Davis instead based on the conclusory decision in Overton.

Second, even if Leon applies instead of Davis, its not obvious to me that suppression is an available remedy. The problem, it seems to me, is that arrests generally dont require warrants. Unlike searches, they generally require only probable cause. Given that, its not clear to me that a defective arrest warrant makes a difference. If the police have probable cause, they could make the arrest without a warrant. In such circumstances, I dont see how the arrest violates the Fourth Amendment (as compared to the warrant) if the police also obtain a warrant that is defective. Probable cause authorizes the arrest, not the warrant, so a search incident to arrest should be okay. Granted, in Hoffman, its not clear that the police actually had probable cause. It looks like the officers relied mostly on the warrant in the suppression hearing rather than making the case for probable cause directly. Either way, probable cause is the real issue.

Orin Kerr is the Fred C. Stevenson Research Professor at The George Washington University Law School, where he has taught since 2001. He teaches and writes in the area of criminal procedure and computer crime law.

The rest is here:

Volokh Conspiracy: Magistrate issues arrest warrants for 17 years but is new to probable cause

First Amendment Fight – Baird: The Bible Touches Every Aspect Of Life – The Fight For Faith – F&F. – Video


First Amendment Fight - Baird: The Bible Touches Every Aspect Of Life - The Fight For Faith - F F.
First Amendment Fight - Baird: The Bible Touches Every Aspect Of Life - The Fight For Faith - Fox Friends. =========================================== *...

By: NSTP - Wake The Hell Up America!

Visit link:

First Amendment Fight - Baird: The Bible Touches Every Aspect Of Life - The Fight For Faith - F&F. - Video