British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency

British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency

5 Shares
EMAIL
PRINT
COMMENTS
British Teen Corrects NASA Data Error, Receives 'Appreciation' From Space Agency
The research was part of a project which gives students across UK chance to work on data from ISS.
London:  A 17-year-old schoolboy in the UK has pointed out an error in the data recorded by NASA on the International Space Station (ISS), earning him appreciation from the US space agency.

Miles Soloman, an A-level student at Tapton school in Sheffield, contacted scientists at NASA, telling them that radiation sensors on the ISS were recording false data.

Miles said it was "pretty cool" to email NASA, adding the correction was "appreciated" by the space agency, which invited him to help analyse the problem.

Miles is studying physics, further maths and chemistry, and jumped to join the project.

The research was part of a project which gives students across the UK the chance to work on data from ISS, looking for anomalies and patterns that might lead to further discoveries.

The detectors had recorded the radiation levels on the space station. "I went straight to the bottom of the list and I went for the lowest bits of energy there were," Miles was quoted as saying by BBC News.

"We were all discussing the data but he just suddenly perked up in one of the sessions and went 'why does it say there is -1 energy here?'" said Miles's teacher and head of physics, James O'Neill.

What Miles had noticed was that when nothing hit the detector, a negative reading was being recorded. Which turned to be not convincing to Mike. As you cannot get negative energy into the detector.

So Miles and his teacher contacted NASA. NASA said it was aware of the error, but believed it was only happening once or twice a year. But Miles had found it was actually happening multiple times a day.

CIA hacking Q&A: Is your TV spying on you and your phone listening in?

The leaked documents by Wikileaks suggest the CIA has a catalogue of 'zero-day' vulnerabilities

Daniele Sgandurra | The Conversation 
CIA
CIA


WikiLeaks has released thousands of documents that appear to show how the US Central Intelligence Agency (CIA) is able to spy on smartphones, computers and other internet-connected devices. They apparently have the ability to break into any and smartphone, as well as devices running Windows, Mac OS or Linux operating systems. Though the leak doesn’t tell us how widely these techniques are used, it does highlight just how vulnerable the technology on which we increasingly rely is to security breaches.

How can the hack these devices?
The leaked documents suggest the has a catalogue of “zero-day” vulnerabilities. A software vulnerability is typically a flaw in a program that a hacker can use to undermine the security of a system and break in to control it or steal its data. Usually, vulnerabilities are reported to vendors so they can produce a software patch that will fix the flaw and to eliminate or reduce the chances of a successful attack. Those flaws that the software manufacturer doesn’t know about are called zero-day vulnerabilities (referring to the number of days the manufacturer has known about the problem).
By exploiting these zero-day vulnerabilities, the could theoretically undermine the controls of computer operating systems and smartphones. This would allow it to bypass, for example, the security of many messaging apps that are considered secure, such as WhatsApp, Telegram or Signal. It doesn’t show that these apps have had their strong encryption methods broken – instead the messages can be read directly from the operating system before being encrypted.
What can the do with these techniques?
The leaked documents also detail a highly technical catalogue of hacking tools, such as instructions for compromising Skype, Wi-Fi networks, PDF documents and commercial anti-virus programs. There are also instructions on how to steal passwords, such as those inputted into internet browsers. For example, a technique called “QuarkMatter” can insert stealthy spying software on an Apple computer by hiding it in the EFI system partition, the part of the hard drive where the startup files are kept.
The documents also report that the might be able to listen to conversations heard by the microphones in smart TVs even when the TVs appear to be switched off. But that doesn’t mean the can exploit anyone’s smart TV. The program, called “Weeping Angel”, was designed specifically for the F8000 TV. And it is entirely possible that the created this technique (and like it) just to target specific individuals. It also seems that the program can only be loaded onto a television via a software update from a So someone would have to enter your house and access your TV to be able to hack it.
But we should also note that other “Internet of Things” connected devices could be used for similar purposes, such as the Amazon Echo home assistant. The CIA has, it is claimed, even explored ways of remotely controlling and hacking into cars in order to crash them, creating a “nearly undetectable assassination”.


How serious is the issue? Many commenters have noted that some of the vulnerabilities that are shown in the catalogue are old and some of them have already been patched up. For example, the TV hack is not possible anymore in recent devices with updated firmware. But that doesn’t mean that the (or any other intelligence agency) hasn’t updated its arsenal to exploit newer vulnerabilities.
The document suggests the is willing to exploit public technology for spying and put it at further risk of hacking. If manufacturers don’t know about vulnerabilities then they can’t fix them and so they are also available for malicious hackers or other governments to exploit as well.
The US government has established the Vulnerabilities Equities Process (VEP) as a way of helping its agencies deciding whether or not to disclose or not a vulnerability. If the CIA is stockpiling a catalogue of vulnerabilities it discovers, as other agencies have previously denied doing, then it may be ignoring this protocol. There are exceptions, such as if the exploit has “a clear national security or law enforcement need”. But as we don’t know how the vulnerabilities have been exploited, it isn’t clear if they fall into this category.
It’s also not clear what other hacking activities the may be undertaking. The leak includes 8,761 documents and files, many of which haven’t yet been analysed, and there are likely more documents to come. Some documents have been redacted by editors to avoid disclosing the actual programming code for the attacks, to make it difficult to copy them.
Finally, it appears that the entire archive of disclosed toolkit consists of several hundred million lines of code (by comparison, Windows 7 is composed of 25m lines of code). So it might take some time to fully understand the extent of their hacking capabilities.


Daniele Sgandurra, Lecturer in Information Security, Royal Holloway
This article was originally published on The Conversation. Read the original article.
The Conversation


News18 · 2 hours ago


6-min read

Can Electronic Voting Machines be Tampered With? Here's a Primer

Debayan Roy | News18.com
Updated: March 15, 2017, 5:17 PM IST
facebook Twitter google skype
Can Electronic Voting Machines be Tampered With? Here's a Primer
Representative photo (Reuters)
New Delhi: First Mayawati, then Harish Rawat, and now Arvind Kejriwal. The list of leaders who blame the electronic voting machines (EVMs) for their electoral loss is long. The Aam Aadmi Party (AAP) has also demanded that the upcoming polls for Municipal Corporation of Delhi (MCD) be done via ballot papers and not EVMs. So just what is this beast and why is it making so much noise? Here is a primer:
What is an Electronic Voting Machine?
It is a simple electronic device used to record votes. EVMs have been part and parcel of elections in India since 1999 and was adopted across all polls from 2004. It seeks to reduce time in casting vote and declaring results. Of course, from an environmental point of view, it helps save paper.
When were EVMs first used in India?
The machines were first introduced in 1982 in the bye-election to Parur Assembly constituency of Kerala for 50 polling stations.
What’s the machine made of?
It’s a single unit machine, which works on batteries without any network connectivity. They are made up of two machines, one is the control unit and the other is the balloting unit. A presiding officer is in charge of the control unit and once the vote is ready to be cast, the officer activates the balloting unit. The voter then presses a button to register their vote for a particular candidate. The machine can record 64 different candidates at one point of time. The maximum number of votes that can be recorded in one machine is 3,840.

Also Read:
Poll Panel Invited Skeptics in 2009 to Prove Rigging Claims. None Could
How does counting happen with EVM machines?
Votes can be recorded only through the Balloting Unit. When polls draw to an end, the presiding officer hands over an ‘account of votes recorded’ to each polling agent. During counting, the agents tally the total with these accounts to note any discrepancy. During the phase of counting, results are displayed by pressing the ‘Results’ button. This button is usually sealed and cannot be pressed unless the presiding officer presses the ‘Close button’ at his end.
How are EVM’s safeguarded against fraud?
Every EVM has an identity number attached to it, which is recorded in the Election Commission’s database. This ID is cross-checked against the database when it is being transported to and from the election booth. This process is done before the counting of votes begin. The machines are guarded by central forces between the period of voting and counting.
How did Voter-Verified Paper Audit Trail (VVPAT) come into the picture?
The Supreme Copurt in October 8, 2013, on a PIL by Subramanian Swamy, directed the EC to introduce the VVPAT system in a phased manner so that full implementation is achieved by 2019. It was done to ensure free and fair polls as it would aid in resolving disputes, if any. On a national level, the system was introduced in 8 of 543 parliamentary constituencies during the 2014 general elections. It was used in 516 polling stations across eight states. The system was first experimented in 2013 Nagaland by-polls.
Also Read: Mayawati Alleges EVM tampering, Seeks Re-election
For the uninitiated, VVPAT is a printer-like machine which is attached to every EVM machine. When a voter casts his vote on EVM, the VVPAT unit flashes the serial number, name of the candidate and the party symbol to confirm the voter's choice. The generated paper slip is shown in the drop box for a few seconds, so that the voter can cross-check the details. However the voter does not get to keep the receipt and if there is any discrepancy, then counting of such slips could be ordered.
What are the various complaints against EVM machines?
The first widely reported irregularity with the EVM emerged in Florida during the 2000 elections. In 2006, a Dutch TV channel went on to air a documentary showing proof as to how easy it is hack these EVM machines. The machines were soon withdrawn and Netherlands went back to the traditional paper ballot system. Germany and Ireland too have scrapped the use of these machines.
In India it has been alleged that EVM machines are not tamper-proof and several private research units and bloggers have come out with posts as to how EVM machines can be hacked into. A 2010 report by a team of experts led by Professor J Alex Halderman of University of Michigan and Indian scientist Hari Prasad cited numerous vulnerabilities with the EVM machines, especially if a malicious user had access to the EVMs in advance. “The technology’s promise was that attacks on the ballot box and dishonesty in the counting process would be more difficult. Yet we find that such attacks remain possible, while being potentially more difficult to detect,” said the report.

Also Read:
After Mayawati, Arvind Kejriwal Alleges EVM Tampering, Seeks Punjab Probe
Professor Halderman said in 2010 that results could be changed in the EVM through mobile phones. He demonstrated that signals could be linked up to EVMs to get desired results. ECI denied all these allegations and reiterated their stand that the machines were tamper-proof and met highest security standards. During the course of this controversy, the Indian scientist involved in the experiment, Hari Prasad, was arrested on ECI’s complaint for stealing an EVM from District Collector’s office in Mumbai. Prasad was later released after a court order where the Magistrate observed “Prasad had done a great service for the country.”
Has anyone approached courts so far on this? What has been the courts' stand?
In 2004, this matter was placed before the Delhi High Court by advocate Pran Nath Lekhi who had alleged that EVMs were tampered with to favour UPA in the election results. But HC found no merit in the petition. However, in a 2005 verdict, the Karnataka High Court held that the use of EVMs was a “great achievement” and source of national pride. The order was delivered on a plea filed in 1999 by a failed candidate who had challenged the role of EVM machines in Yelahanka parliamentary constituency. The court studied the safety features and examined BEL scientists and ruled that machines were tamper-proof and any attempt to doctor them cannot be kept away from the public eye.
Here’s a timeline of elections when allegations against EVMs surfaced:
- 2009 General Elections: BJP, through Subramanian Swamy, had alleged that if the party doesn’t perform well then it would, primarily be due to the fact that the EVMs “could have been tampered with”. When BJP was defeated, party leader LK Advani had raised his issue again stating that EVM machines were tampered.
- 2009 Odisha elections – Senior Congress leader JB Patnaik alleged that the BJD had won the election by bribing candidates and tampering EVMs.
- In 2014 General elections, Congress leader and Assam CM Tarun Gogoi said that BJP indulged in EVM fraud. Even social activist Medha Patkar filed a complaint in May 2014 alleging possible rigging of votes through EVMs.
- In the latest, after 2017 UP assembly polls, Mayawati has claimed that it was only because of EVM machines being tampered with that BJP has emerged victorious. In Uttarakhand, Harish Rawat hinted at the same while in Punjab, Kejriwal blamed EVMs for the Congress win.
  • arvind kejriwal
  • Assembly Elections Results
  • ballot paper
  • Delhi MCD Polls
    Give a rating: Average: 1.8 stars from 5 ratings 
    16 comments
  • NB Niladri Bose  
    Right now only some long tailed monkeys and kalamukh Hanuman cadres of cheatingbaz brihat juachor party (bjp) are dancing and jumping to the tunes of the flop show of chor modi. But after the flop show is over I want to remind these Hanumans that aiding and abetting election rigging is a serious offence under Indian penal code. Slaves of chor modi should realize early for their own good that Chor modi's junta will not be there after 2019 . After 2019 when chor modi will be booted out by the people of India , Hanuman's and monkey cadres of chor modi will be locked up in tihar jail and given Singapori kelas (bananas) to eat. I can assure the monkeys that the new govt will ensure enough stock of bananas so that the monkeys as well as their master that gujrati bearded gadha can live in peace inside tihar so that they can plan the next flop show of election rigging in 2024. By the way these monkeys should go through the following site to update their gaumutra and gobar filled gadha brain t
    1235
    about an hour ago
    (0) ·  (0)
  • HL Harish L  
    Every method, be it EVM or paper ballot have loop holes. It is the processes that makes them reliable method. Even paper ballots were also easily manipulated and it happens in the past.

    So instead of making the system perfect, going back to paper ballot, which is not environment friendly and also counting is a problem should not be encouraged.
    about 2 hours ago
    (0) ·  (0)
  • SK Sabir Khan  
    irrespective of who wins or have won
    we should always be wary of any technology,
    most are hackable & at times it's child play,
    & most know it, so moving beyond party affiliations,
    we need to make sure we keep working to make elections as fair as possible.
    860
    about 2 hours ago
    (0) ·  (1)
    ukw Down voted
  • P Pandit  
    This tampering of EVM and concerned raised by people might not be prevented somehow but if rejuvenated the whole electoral process slightly that exist till date vis-a-vis EVM based polling, the goal of transparent polling and spirit of democracy could be restored. Simply make verification of counting of electoral vote in public domain based on "DOUBLE VERIFICATION STANDARD". First thing to add into existing voting system is to provide receipt or SMS to all voter after their voting (like receipt after debit/credit card swapping) having details of voter ID or unique number to each voter, symbol or name of party to whom vote cast by voter, constituency name, EVM serial Number, date & time of voting etc. Second thing is to do is that same information as printed into receipt of voter after casting their vote should be made available in public domain through election commission's website on their portal after counting of votes so that same can be cross-verified by each voter.
    about 3 hours ago
    (0) ·  (0)
  • Bingeit 45  
    basically the party which looses blames EVM
    about 3 hours ago
    (0) ·  (0)
  • Sreekumar Prabhakaran  
    No doubt the EVMs can be tampered with provided it is left alone for sufficient length of time with someone who knows how to manipulate it for the desired result. However, the election procedure that is being followed in the country makes it sure that no person or party gets to spend time alone with the EVMs any time pre, post, or during the election to pull off any under-the-skirt chicanery.

    After a loss in elections, all political parties have, one time or another, acted the sore loser. The objective behind such mollycoddling is keeping the immediate supporters tethered to the mothership with the promise of 'justice' in the (unspecified number of) following days. Hope, be may it false, keeps the vessel afloat. Water is there to sink it.
    160
    about 4 hours ago
    (6) ·  (0)
    sanjay · MrOmega001 · Krishnamohana · sathya · ukw · skbanalytics Up voted
SG Sushil Gautam  
Khisiani billi khamba noche. these leaders who are expecting votes from different sectors should think what they have done for voters in past. They will find, except fooling the voters they did nothing. So it is high time to change your mindset and be social worker not king like present politician.
140
about 4 hours ago
(4) ·  (0)
sathya · MrOmega001 · Krishnamohana · sanjay Up voted