Breaking News and Updates
- Abolition Of Work
- Alternative Medicine
- Artificial Intelligence
- Atlas Shrugged
- Ayn Rand
- Basic Income Guarantee
- Chess Engines
- Cloud Computing
- Conscious Evolution
- Cosmic Heaven
- Designer Babies
- Donald Trump
- Ethical Egoism
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom of Speech
- Gene Medicine
- Genetic Engineering
- Germ Warfare
- Golden Rule
- Government Oppression
- High Seas
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Longevity
- Immortality Medicine
- Intentional Communities
- Life Extension
- Mars Colonization
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- New Utopia
- Personal Empowerment
- Political Correctness
- Politically Incorrect
- Post Human
- Post Humanism
- Private Islands
- Quantum Computing
- Quantum Physics
- Resource Based Economy
- Ron Paul
- Second Amendment
- Second Amendment
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Teilhard De Charden
- The Singularity
- Tor Browser
- Transhuman News
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Zeitgeist Movement
The Evolutionary Perspective
Category Archives: Cloning
Posted: August 25, 2017 at 4:10 am
RACQ said criminals were duplicating number plates to get away with racking up huge toll bills, fines and even stealing petrol.
RACQs Russell Manning said there were even reports thieves were going to second-hand car yards to find legally registered plates to replicate.
Its concerning just how easily this can happen. Back in the day, thieves used to simply steal the number plate. But with the advances in technology they dont even have to touch the car to get away with it, Mr Manning said.
Whats worrying for owners with plate cloning is you dont know about it until the fines start rolling in.
It begs the question whether it is time we reconsidered number plates being the only form of identification for your vehicle for police and toll road operators.
We may be at the time where we have to become more sophisticated and look at technological identifiers like electronic vehicle tags.
Mr Manning urged anyone who received a fine or infringement notice and did not believe it was their vehicle to alert the authorities.
No one wants to be caught out with a fine and blemish on their permanent record for a crime they didnt commit.
Go here to see the original:
Posted: at 4:10 am
Car hoons are duplicating numberplates to get away with racking up huge toll bills, fines and even stealing petrol.
Authorities have warned law-abiding motorists of the growing scourge and have issued advice to those stung by the scam for what to do.
Melbourne car yard worker Peter Savige said the business had received a number of toll invoices from Eastlink and Citylink, despite knowing the vehicle in question had not left the premises.
He also received parking fines and a red light infringement.
Confused, Mr Savige downloaded the road safety camera images associated with the fines.
“I realised that the number plate on the vehicle, even though it was the same numerals and numbers, it wasn’t even the same colour as the plate on our car,” he told A Current Affair.
Mr Savige said he had now cancelled the number plate.
Geoff Gwilym from the Victorian Automobile Chamber of Commerce said it was “disappointing” the innocent parties had to go to the effort of proving the car in question wasn’t theirs.
“The way that cloning works is that somebody sees a car and it’s like the car that they’ve got or they look on the internet for a similar car, and they basically copy the numberplate and put it on their car,” he said.
Criminals can use websites to create fake number plates for a small fee, or even visit novelty stores to buy fake plates on the spot.
A Current Affair was able to have plates made in about 10 minutes, for less than $30.
The NRMA’s Peter Khoury said such stores should be regulated.
“It shouldn’t be happening to start with, and that’s why we want to make sure that authorities across Australia are doing everything they can to protect our rego and our identification,” he said.
Mr Gwilym advised people who received a fine they were suspicious of to report it to the appropriate authority in writing, preferably in an e-mail with a receipt.
Nine Digital Pty Ltd 2017
Posted: at 4:10 am
For representational purposes
DEHRADUN: The Special Task Force (STF) of the Uttarakhand police has arrested three persons for allegedly cloning ATM cards of many people and withdrawing Rs 37 lakh fraudulently from their accounts.
Rambir, Jagmohan and Sunil, who hail from Haryana, were arrested from Kolhapur in Maharashtra and brought here this evening on transit remand, STF SSP Ridhim Agarwal told reporters here.
They will be produced in a court tomorrow, she added.
Agarwal said the accused withdrew the money from the accounts of the people here last month by stealing their ATM pins and other data by fitting skimming devices and cameras at two ATMs and preparing over one hundred clones of the ATM cards.
They first did a recce of the unguarded ATMs in the city and then fitted two of them with the skimming devices and cameras to copy ATM cards of the people, she said.
The accused also jammed the keypads of all neighbouring ATMs using feviquick so that most people came to the ones fitted with the skimmer devices, the SSP said.
Agharwal said 97 cases of fraudulent withdrawals of Rs 37 lakh were registered at different police stations in the city.
A co-accused woman, Anil Kumari, had been arrested in connection with the fraud, earlier, she said.
Read the original here:
Posted: August 20, 2017 at 6:19 pm
My style tends towards sleek, tailored clothing but this blouse with its many circular flounces was one I had to try. The inspiration is from Alexander McQueens RTW line and retailed for over $1000. Wonderful look for summer that I could definitely do for less.
I draped a slim fitting princess line top using my body double dress form. It extends to the high hip line here so I can play with the placement of the hem flounce.
An interesting technical point is that these are known as flounces, not circular ruffles. In the garment industry, a ruffle by definition has the excess fullness gathered into a seam while the fullness of a flounce comes from the curved flare of the fabric.
The flounce pattern is created by drawing concentric circles. The inner circle is attached to the garment.
Drafting the flounce does require some basic math and decisions about how full you want the flounce. The left diagram shows a flounce with an inner circle of 1 inch diameter and one inch wide flounce. The circumference of the inner circle is 3.14 inches which will be the length of the seam joining to the garment. The outer edge of the flounce will be 9.42 inches. Fullness is calculated as 9.42 divided by 3.14 equals 3 or 3:1 ratio. However, imagine that you need a 6 inch long flounce. Drawing a 2 inch diameter circle surrounded by a 4 inch diameter circle creates a flounce 6.28 inches long with an outer edge 12.56 inches long. Note that the fullness has changed from 3:1 to 2:1 (12.56 divided by 6.28). If the desired fullness is 3:1, then the flounce will need to be cut using two of the smaller circles and seaming them together.
Ive drafted a 3 inch deep flounce for the lower edge of the blouse, cut a test from muslin and attached to the toile. To achieve 3:1 fullness, Ill use four sections (two back and two front).
Drafting the flounces for the neckline and center front required more complicated methods. Flounces behave differently depending upon the seam they are attached to. Vertical hanging flounces cascade down in folds. The fullness of a flounce is increased when attached to a inside curve and decreased when attached to an outside curve. The Art of Manipulating Fabric by Colette Wolff is a wonderful resource which more fully explains these concepts.
The neckline is an outside curve. Therefore to maintain the same appearance of fullness, the flounce at the neck was drafted with 4:1 inner to outer ratio. The math can get complicated, especially when you need to consider the length of flounce needed, width AND fullness ratio desired plus adding seam allowances. Then compound all this with varying width flounces for the center front and armholes. Ive devised a relatively simple way to draft all this.
Either buy a tablet of graph paper or print some out. There are free internet sources for printing all sizes of graph paper. I likeMath-Drills.com. Search for graph paper and print out a few sheets of 1/4 inch size. Metric users try 0.5 cm; I found the 1 cm. size just a bit too large to produce smooth curves using my method.
Measure the length of the seam the flounce will be attached to. Measure the SEAM LINE, not the cut edge. All drafting is done referencing the seam line; seam allowances are added afterwards. Ill show the back neck: seam line from CB to shoulder seam is 3.5 inches. 4:1 fullness is desired and 1.75 wide flounce so Ill cut and tape together a strip of graph paper 1.75 inches by 14 inches (3.5 times 4).
Cut along every fourth line leaving a tiny bit attached at one long edge. If you cut through, its no problem to just tape it together. Overlap the sections so there are four blocks at one edge and one block at the other edge.
The inside edge wont line up perfectly but I just eyeball it. You can also draw in a line to help. Tape the sections in place as you go. This is what the pattern will look like. Its very clear that there is a 4:1 ratio of inner to outer length. Also it isnt a complete circle which is good as there is space to add seam allowances.
The pattern can be cleaned up by using it as a gauge to draw circles with a compass. Use the end points on the outer circle and connect to the center for symmetrical seam lines. I find this much, much easier than trying to mathematically calculate the dimensions of the inner circle, outer circle, width of flounce, maintain fullness ratio. With all these variables, I wound up with a partial circle and calculating the percentage needed of such circles produces some dizzying math.
The graph paper method greatly simplifies creating the long cascading flounce along the center front. If you draft a flounce and trim off the outer edge to create a flounce narrower at one end, the proportion of fullness changes.
Here is a flounce which gets narrower at one end. I trimmed off the outer edge of a 3:1 circle. If you count the squares, it goes from a 3:1 fullness to a 2:1 fullness. This may be what you want, but what if you want to maintain the same fullness the entire length?
Heres how I created the center front flounce. Measure from center front to the desired length. After some experimentation, I decided 3:1 was a good fullness. Create a strip of graph paper 3 times the finished length by the wider width. Draw a sloping line from wide point to narrow point.
Trim off the paper above the sloped line. Cut along every third square and overlap to create a curved pattern.
The pattern will spiral over itself. Keep going and let it overlap. It will be divided into sections later.
My front flounce needed to be divided into two sections to avoid the pieces overlapping. Deciding where to place the cuts is a trial and error process. You want a few seams as possible and the seams need to be placed where they are inconspicuous.
It may take several muslin trials to get seams where you want them. Trace off your master pattern so it is intact in case your first seams arent where you want them. Since the diameter of the circle is constantly changing along the length of the flounce the circles will turn into ellipses. Here is the lower section of my front flounce. Ive left room for tiny seam allowances to join to the upper flounce section.
My pattern traced off to pattern paper. Label everything as the pieces will get VERY confusing. I also keep my graph paper models intact just in case I need them.
The armseye flounce is drafted in the same way. I did experiment with a 5:1 fullness but felt it too much and ultimately went back to the 3:1 proportion. Some experimentation is necessary as every flounce will behave differently depending on its width and placement. The fullness is removed under the arm at the side seam.
Since this design is symmetrical, the toile is only of the right side. Ive also hemmed the center front flounce as the drape of flounces does change with the edge finish used. Drape flounces in a fabric similar to the fashion fabric as a silk chiffon will behave much differently than a crisp cotton. I will use a woven textured white cotton that looks almost the same on both sides as the wrong side of the fabric will show on this. Blouse is in production for the next post.
The rest is here:
Posted: at 6:19 pm
Written by Chandan Haygunde , Sushant Kulkarni | Pune | Published:August 17, 2017 8:08 am Officials of the Cyber Crime Cell with the arrested accused.
THE Cyber Crime Cell of the Pune City Police has arrested a Nigerian man who is allegedly the key accused in a racket to clone debit and credit cards. Police have identified the accused as Eremhen Smart (33), a resident of Supragiri College area in Bengaluru. Police have also arrested his alleged aide Irshad Sattar Solanki (28), a resident of Bandrekar Wadi in Jogeshwari, Mumbai.
Last month, police had arrested three Nigerian men identified as Ogbehase Fortune, Bashar Dakin Gari Usman and Ifeanyi Mike Bbaeze while investigating a case registered with the Khadki police station, in which Rs 67,000 was withdrawn from a persons bank account without his knowledge. While some money was withdrawn from an ATM, the rest of the money was transferred to another bank account.
A team led by Inspector Manish Zende of the Cyber Crime Cell zeroed in on a person seen in the camera footage from the ATM kiosk. Police also got details of the account to which the money was transferred, and it was revealed that the account had been used to withdraw cash from other ATM kiosks.
Following leads obtained during the investigation, police arrested Nigerian national Fortune from Pimple Gurav, and his alleged aides Usman and Mbaeze. Police also recovered eight cell phones, 20 debit cards and eight blocked cards that had been cloned, Internet dongles, pen drives and a laptop from the trio.
Soon, police launched a search for the key accused Smart who was found to be changing his locations frequently. On August 10, police laid a trap and arrested Smart in Bengaluru. They recovered four cell phones, two laptops and Rs 1.65 lakh in cash from him.
On August 14, police arrested Smarts aide Irshad Solanki, who allegedly helped him withdraw money from ATMs and arranged bank accounts, in which the money was transferred using cloned debit and credit cards.
A court has remanded the duo to police custody till August 17 for further investigation.
We are now searching for four more persons, all Nigerian nationals, involved in this racket. We are also looking for a Mumbai-based person who helped the accused commit the crimes, said Deputy Commissioner of Police, Cyber Crime Cell, Sudhir Hiremath, during a press conference on Wednesday.
Hiremath said that the same gang of Nigerians had committed 11 crimes in Bengaluru and four in Pune. The four cases in Pune are registered at police stations in Khadki, Chinchwad and Hinjewadi
The investigation revealed that Smart ordered ATM card readers and debit card writer machines online and used them to clone the debit and credit cards.
Police said the accused used skimmer, an electronic device that steals the information or identity of the card. Skimmers are mounted in front of the slot in ATM machines where the card is inserted. So, while the user thinks he is inserting the card in the slot, the card is also passing through the skimmer and details of the debit or credit card is being stolen.
The accused then used pinhole or spy cameras installed in ATMs to learn the customers PIN number, said police, adding that at times, they also stood behind the customer when the PIN was being typed. The stolen information is then written on other cards and the card is cloned. The customer gets to know of the fraud only when the money is withdrawn, said police. However, police have not recovered any skimmer from Smart and the other accused arrested in the case. Police suspect that the accused have destroyed the skimmers.
The investigation has revealed that the gang had obtained information about several debit and credit cards in Pune, Mumbai, Bengaluru, parts of Tamil Nadu and Goa, said police. The accused allegedly made cloned cards and used it to withdraw and transfer money to different bank accounts. Key accused is a science graduate
DCP Hiremath said Smart, the key accused, is a Computer Science graduate who had come to India on a medical visa in 2014. He extended his visa later, but it expired in 2016. He was arrested by Bengaluru police in January, but was released on bail. According to police, Smart enjoyed a lavish lifestyle, and he also used to send some money to Nigeria through middlemen.
For all the latest India News, download Indian Express App
Follow this link:
Posted: August 18, 2017 at 5:18 am
New Delhi, Aug 17 (PTI) A 37-year-old Ghana national was arrested for allegedly cloning debit cards and fraudulently withdrawing money from ATMs, the police said today.
The accused, Kingsley Boafo, was arrested on August 12 near HDFC Bank ATM, located on Main Najafgarh Road in Uttam Nagar. He has been staying in the country even after his visa had expired, said Deputy Commissioner of Police (Southwest) Surender Kumar.
He had come to Mumbai from Ghana in July 2015 in connection with his garment business. In October that year, he shifted to Delhi and continued the business of exporting ready-made clothes to his country, the police said.
With a desire to earn more in a short period of time, he used to browse the Internet and found ways to clone ATM cards. He bought devices online to clone ATM cards, the police said.
Boafo surveyed the ATMs that did not have security guards and through a skimmer placed in the card reader slot of the machines he would copy details of cards inserted in the slot, the police said, adding the data was downloaded to a laptop and then transferred to a Magnetic Strip Reader/Writer (MSR).
Blank debit cards were swiped through the MSR and these cloned cards were used to withdraw money from the ATMs fraudulently, they said.
Boafo was helped by one Issac, an African, in preparing cloned ATM cards. The duo deleted the stolen data from their devices soon after withdrawing money as the ATM cards, whose data they fraudulently obtained, were blocked by card holders, the police said.
The accused was in Mumbai for a couple of months this year and had returned to Delhi in the last week of July. It is suspected that he committed similar offences in Mumbai also, they said, adding police are on the lookout for Issac. PTI SLB NSD
Posted: August 16, 2017 at 6:22 pm
August 16, 2017 by Lisa Zyga feature Schematic of the experimental setup, in which complementary properties x and y are jointly measured. Credit: Thekkadath et al. 2017 American Physical Society
(Phys.org)In quantum mechanics, it’s impossible to precisely and simultaneously measure the complementary properties (such as the position and momentum) of a quantum state. Now in a new study, physicists have cloned quantum states and demonstrated that, because the clones are entangled, it’s possible to precisely and simultaneously measure the complementary properties of the clones. These measurements, in turn, reveal the state of the input quantum system.
The ability to determine the complementary properties of quantum states in this way not only has implications for understanding fundamental quantum physics, but also has potential applications for quantum computing, quantum cryptography, and other technologies.
The physicists, Guillame S. Thekkadath and coauthors at the University of Ottawa, Ontario, have published a paper on determining complementary properties of quantum clones in a recent issue of Physical Review Letters.
As the physicists explain, in the classical world it’s possible to simultaneously measure a system’s complementary states with exact precision, and doing so reveals the system’s state. But as Heisenberg theoretically proposed in 1927 when he was beginning to develop his famous uncertainty principle, any measurement made on a quantum system induces a disturbance on that system.
This disturbance is largest when measuring complementary properties. For instance, measuring the position of a particle will disturb its momentum, changing its quantum state. These joint measurements have intrigued physicists ever since the time of Heisenberg.
As a way around the difficulty of performing joint measurements, physicists have recently investigated the possibility of making a copy of a quantum system, and then independently measuring one property on each copy of the system. Since the measurements are performed separately, they would not be expected to disturb each other, yet they would still reveal information about the original quantum system because the copies share the same properties as the original.
This strategy immediately encounters another quantum restriction: due to the no-cloning theorem, it’s impossible to make a perfect copy of a quantum state. So instead, the physicists in the new study investigated the closest quantum analog to copying, which is optimal cloning. The parts of the clones’ states that share the exact same properties as those of the input state are called “twins.”
Whereas theoretical perfect copies of a quantum state are uncorrelated, the twins are entangled. The physicists showed that, as a consequence of this entanglement, independently measuring the complementary properties on each twin is equivalent to simultaneously measuring the complementary properties of the input state. This leads to the main result of the new study: that simultaneously measuring the complementary properties of twins gives the state (technically, the wave function) of the original quantum system.
“In quantum mechanics, measurements disturb the state of the system being measured,” Thekkadath told Phys.org. “This is a hurdle physicists face when trying to characterize quantum systems such as single photons. In the past, physicists successfully used very gentle measurements (known as weak measurements) to circumvent this disturbance.
“As such, our work is not the first to determine complementary properties of a quantum system. However, we’ve shown that a different strategy can be used. It is based on a rather nave idea. Suppose we want to measure the position and momentum of a particle. Knowing that these measurements will disturb the particle’s state, can we first copy the particle, and measure position on one copy and momentum on the other? This was our initial motivation. But it turns out that copying alone is not enough. The measured copies must also be entangled for this strategy to work.
“This is what we showed experimentally. Instead of determining the position and momentum of a particle, we determined complementary polarization properties of single photons. You would intuitively expect this strategy to fail due to the no-cloning theorem. However, we showed that is not the case, and this is the greatest significance of our result: measuring complementary properties of the twins directly reveals the quantum state of the copied system.”
As the physicists explain, one of the most important aspects of the demonstration is working around the limitations of the no-cloning theorem.
“In our daily lives, information is often copied, such as when we photocopy a document, or when DNA is replicated in our bodies,” Thekkadath explained. “However, at a quantum level, information cannot be copied without introducing some noise or imperfections. We know this because of a mathematical result known as the no-cloning theorem. This has not stopped physicists from trying. They developed strategies, known as optimal cloning, that minimize the amount of noise introduced by the copying process. In our work, we go one step further. We showed that it is possible to eliminate this noise from our measurements on the copies using a clever trick that was theoretically proposed by Holger Hofmann in 2012. Our results do not violate the no-cloning theorem since we never physically produce perfect copies: we only replicate the measurement results one would get with perfect copies.”
In their experiments, the physicists demonstrated the new method using photonic twins, but they expect that the ability to make precise, simultaneous measurements of complementary properties on twins can also be implemented with quantum computers. This could lead to many practical applications, such as providing an efficient method to directly measure high-dimensional quantum states, which are used in quantum computing and quantum cryptography.
“Determining the state of a system is an important task in physics,” Thekkadath said. “Once a state is determined, everything about that system is known. This knowledge can then be used to, for example, predict measurement outcomes and verify that an experiment is working as intended. This verification is especially important when complicated states are produced, such as the ones needed in quantum computers or quantum cryptography.
“Typically, quantum states are determined tomographically, much like how the brain is imaged in a CAT scan. This approach has the limitation that the state is always globally reconstructed. In contrast, our method determines the value of quantum states at any desired point, providing a more efficient and direct method than conventional methods for state determination.
“We experimentally demonstrated our method using single photons. But, our strategy is also applicable in a variety of other systems. For instance, it can be implemented in a quantum computer by using only a single quantum logic gate. We anticipate that our method could be used to efficiently characterize complicated quantum states inside a quantum computer.”
Explore further: Blind quantum computing for everyone
More information: G. S. Thekkadath, R. Y. Saaltink, L. Giner, and J. S. Lundeen. “Determining Complementary Properties with Quantum Clones.” Physical Review Letters. DOI: 10.1103/PhysRevLett.119.050405, Also at arXiv:1701.04095 [quant-ph]
(Phys.org)For the first time, physicists have demonstrated that clients who possess only classical computersand no quantum devicescan outsource computing tasks to quantum servers that perform blind quantum computing. …
(Phys.org)Physicists have proposed a new type of Maxwell’s demonthe hypothetical agent that extracts work from a system by decreasing the system’s entropyin which the demon can extract work just by making a measurement, …
For the first time, physicists have experimentally demonstrated a quantum secure direct communication (QSDC) protocol combined with quantum memory, which is essential for storing and controlling the transfer of information. …
(Phys.org)Physicists have demonstrated Bell correlations in the largest physical system to datean ensemble of half a million atoms at an ultracold temperature of 25 K. The presence of Bell correlations indicates that …
Researchers working in Singapore and the United States have discovered that all entangled states of two particles have a classical ‘fingerprint’. This breakthrough could help engineers guard against errors and devices that …
Xi-Jun Ren and Yang Xiang from Henan Universities in China, in collaboration with Heng Fan at the Institute of Physics of the Chinese Academy of Sciences, have produced a theory for a quantum cloning machine able to produce …
(Phys.org)In quantum mechanics, it’s impossible to precisely and simultaneously measure the complementary properties (such as the position and momentum) of a quantum state. Now in a new study, physicists have cloned quantum …
A potential new state of matter is being reported in the journal Nature, with research showing that among superconducting materials in high magnetic fields, the phenomenon of electronic symmetry breaking is common. The ability …
Physicists from the ATLAS experiment at CERN have found the first direct evidence of high energy light-by-light scattering, a very rare process in which two photons particles of light interact and change direction. …
(Phys.org)Brain-machine interfaces (BMIs) are basically gimmicks. The reason you don’t hear so much about them these days is because, in the fullness of time, significant tangible benefit to a user has flat out failed …
Hall thrusters (HTs) are used in earth-orbiting satellites, and also show promise to propel robotic spacecraft long distances, such as from Earth to Mars. The propellant in a HT, usually xenon, is accelerated by an electric …
A new computing technology called “organismoids” mimics some aspects of human thought by learning how to forget unimportant memories while retaining more vital ones.
Adjust slider to filter visible comments by rank
Display comments: newest first
-So semantics is determining the limits of knowledge now? This is akin to the silly notion that sentience is needed to collapse the waveform.
“Once a state is determined, everything about that system is known.”
-So everything CAN be known about something, which says that there are no limits to what we can know, which says that kant was indeed farting in the wind.
Too bad noumenon passed on before he was able to experience this greatest of disappointments.
Does this buy us any thing as far as entropic uncertainty relations? Nounmenon is sort of dead, but just because we can isolate transactable phenomenalism of sensory somatic integration, its projection still lags the immersiveness of the now. It depends on how you define “Itself.” You cannot undermine the illusion of vantage, or non-hermitian difference for any measure. You do not state another’s dependence. Yet as soon as we interact, we can talk about the correlates of one another’s time dependence, no matter how obvious. We can steer experiments close to trivial initial conditions, but we have yet to expand them all for equivalence. Interpretation open. It remains existential, with near misses. Thekkadath, is being misquoted here. Entanglement is the most that can be known. We cannot measure states, but we can choose to agree, for all intensive purposes, determinable difference for a given effective theory. If it all shared in/distinguishables, what would we have to talk about?
There are fancier ways of sending barely detectable light, specific to location, that don’t require encryption, but could theoretically be unfolded, if you knew exactly when to expect them and where they were going.
-Yeah youre the guy who likes to post while stoned out of his gourd arent you? Prose poems are not rational discourse FYI-
Please sign in to add a comment. Registration is free, and takes less than a minute. Read more
Read the rest here:
Posted: at 6:22 pm
NEW DELHI: A Nigerian man has been arrested for cloning debit cards of over 100 people and withdrawing money fraudulently from their accounts. The victims had swiped their cards at ATMs in upscale south Delhi colonies.
The man identified as Kingsley had a unique modus operandi. Police said he would identify an ATM kiosk that didn’t have a security guard around. He would go inside, rip open the card swiping slot of the machine and place a scanner behind it. Black tape would hold the device in place. Next, Kingsley would place a camera somewhere on the machine so that its focus would be on the keypad.
Whenever an ATM user swiped his card, the scanner would capture the details while the camera would record the PIN as the customer keyed it in. Once the customer stepped out, Kingsley would go inside, fetch the card reader and camera, and clone the card with the details. Then he would swipe the cloned card at other ATMs and withdraw money. In this way, customer after customer fell victim to Kingsley’s fraud.
Until one day, a woman who operated an ATM near Hari Nagar found a large transaction done from her card long after she had withdrawn money. She immediately reported the matter to the police, who then obtained footage of CCTV cameras installed nearby.
Disgraced Korean scientist Hwang Woo-suk loses legal battle over mammoth cloning tech – The Korea Herald
Posted: August 15, 2017 at 12:20 pm
Hwang Woo-suk, a South Korean stem cell scientist who caused a major stir in the scientific community for academic fraud in 2005, has recently lost a legal battle over the rights to a technique critical to re-creating the woolly mammoth.
According to local reports Tuesday, Hwang had filed a criminal complaint against Park Se-pil of Jeju National University and his research colleagues, accusing them of embezzlement and attempted blackmail.
However, the Seoul Eastern District Prosecutors Office said it did not find sufficient evidence of the claims against Park and his team, closing the case that had been open for years.
The plan was to replicate the mammoth cells in a lab. From the copied cells, researchers would extract the nucleus, which contains the animals genetic information. The nucleus would then be inserted into the eggs of female elephants, the closest living relatives to the now-extinct animal.
Hwangs mammoth cloning project had garnered international attention at the time, even prompting National Geographic to air a detailed documentary on the Korean scientist and his work in 2013.
However, Hwang and his Russian research partners ran into technological hurdles even before the cloning process could begin. For years, the team continuously failed to artificially cultivate the mammoth cells in the lab.
In 2015, Hwang recruited the help of Park and his team, who claimed they were able to successfully cultivate the mammoth cells needed for the nucleus transplant, based on the samples provided by Hwang.
Hwang and Park ended up clashing over the ownership of the cell cultivation technology. Hwang argued that Parks work constitutes a part of his own research and that he thus possesses the sole rights related to all the related experimental methods.
Meanwhile, Park claimed Hwang provided the mammoth cells without prior conditions and the research should be considered a collaborative effort, as his teams cell cultivation method plays a critical role.
According to records, Park refused to hand over his work to Hwang without signing proper terms of agreement, stating that he would rather dispose of the cultivated mammoth cells than freely pass them on to Hwang.
Hwang then sued Park and his team on embezzlement and attempted blackmail. However, the prosecution decided not to pursue the charges of the alleged offenses earlier this month.
The recent investigation has also prompted new allegations that Hwang illegally imported the mammoth samples into Korea without duly reporting to local authorities. Hwang has denied such allegations to the prosecution, according to local reports.
Hwang Woo-suk, 64, is a former professor at the College of Veterinary Medicine at Seoul National University. He was placed at the center of one of the worlds biggest scientific scandals in 2005 for fabricating evidence he had successfully cloned human embryos and yielded stem cell lines from them.
Recently, the disgraced scientist rose to the domestic spotlight for being a close collaborator to Sunchon National University professor Park Ki-young, who was recently appointed as the new chief of the Science, Technology and Innovation Office at Koreas Ministry of Science and ICT.
However, Park, who had been a co-author of Hwangs fraudulent research paper in 2005, resigned from her post last week after the local science community and politicians fiercely opposed her appointment, citing ethical lapses.
By Sohn Ji-young (email@example.com)
Posted: at 12:20 pm
INDIANAPOLIS (WTHR) – Many schools and companies across the country use a key card entry system to give employees access to work buildings. We have them here at WTHR. It’s a pretty common security strategy.
However, one local security expert said a $30 tool can put a company’s security at risk. A few inches and a couple seconds, and your identity can be stolen–at least your key card identity.
Armando Perez, the President and General Manager of Hoosier Security says key cards are still the most common way companies allow entry for their employees. Key cards are supposed to be secure, but retailers overseas are threatening that security with a fairly cheap device.
Selling for about $30 online, card copiers are designed to steal your information. Schools can be especially susceptible.
“These copying devices are so inexpensive now, students can get their hands on them, and there could be all kinds of repercussions there,” said Perez. “I don’t really want to go into giving anybody any ideas about it, but the people who need to solve the problem are aware of this.”
Perez said there’s really no regulatory method for stopping the production of these card copiers overseas. He said it’s up to companies to upgrade their key cards or scanning equipment, which can be costly.
Since you need to be six inches away from someone to copy their entry card, Perez said it likely won’t be a stranger on the street, but could very well be an unsuspecting co-worker. That’s why it’s hard to catch the copier.
“If somebody from research gets the credentials of someone in accounting, they can now have access to all of the accounting information in the business. Nobody would ever know because it’s still a valid credential.”
As I test, I let him try to clone my entry card to WTHR.
Fortunately, the device wasn’t able to clone my card due to the high frequency it emits. But Perez said other schools and companies may be running lower frequencies. Additionally, he warned better, more expensive copiers may still clone my card.
A carbon fiber wallet, which is built to block the frequency signal, can help, but doesn’t make it completely preventable. They come at a hefty price – $150 – and a lot of people don’t keep key cards in their wallet.