uni_us_uw   3

Climate change challenges the survival of fish across the world
Climate change will force many amphibians, mammals and birds to move to cooler areas outside their normal ranges, provided they can find space and a clear trajectory among our urban developments and growing cities. But what are the chances for fish to survive as climate change continues to warm waters around the world? University of Washington researchers are tackling this question in the first analysis of how vulnerable the world's freshwater and marine fishes are to climate change. Their paper, appearing online Sept. 11 in Nature Climate Change, used physiological data to predict how nearly 3,000 fish species living in oceans and rivers will respond to warming water temperatures in different regions. The researchers compiled data from lab experiments involving nearly 500 fish species, conducted over the past 80 years by researchers around the world. These standardized experiments measure the highest temperatures fish are able to tolerate before they die. The researchers found that overall, sensitivity to temperature changes varied greatly between ocean-dwelling and freshwater fish. In general, marine fish in the tropics and freshwater fish in higher latitudes of the Northern Hemisphere were the most at risk when water temperatures warmed, the analysis showed. Fish will either migrate, adapt or die off as temperatures continue to warm, the researchers explained. Given past evolutionary rates of critical thermal limits, it's unlikely that fish will be able to keep up with the rate at which temperatures are increasing, Olden said.
eurekalert, 13.09.2017
umwelt_ökozid  unternehmen_allg_fischerei  umwelt_klima_katastrophe_temperatur  uni_us_uw 
september 2017 by kraven
City-Wide IMSI-Catcher Detection - SeaGlass
SeaGlass is a system designed by security researchers at the University of Washington to measure IMSI-catcher use across a city. SeaGlass sensors are built with off-the-shelf parts, packed into a box, and installed in a vehicle’s trunk. Sensors continuously collect and upload cell tower signal data to a cloud server as they drive around the city. These sensors have advantages over phones because they can contain specialized cellular scanning equipment and external antennas for farther reception ranges. While phone apps can see limited information on the tower currently connected to, our sensors scan the spectrum to measure hundreds of channels at a time and dozens of broadcast properties. We piloted SeaGlass for two months in Seattle, WA and Milwaukee, WI. Partnering with ride-sharing drivers allowed us to collect millions of measurements across both cities.
uni washington
überwachung_mobilfunk_imsi_catcher  überwachung_stadt  uni_us_uw 
june 2017 by kraven
How to Sabotage Encryption Software (And Not Get Caught)
In a paper titled “Surreptitiously Weakening Cryptographic Systems” [NB: http://eprint.iacr.org/2015/097.pdf], well-known cryptographer and author Bruce Schneier and researchers from the Universities of Wisconsin and Washington take the spy’s view to the problem of crypto design: What kind of built-in backdoor surveillance works best? The researchers looked at a variety of methods of designing and implementing crypto systems so that they can be exploited by eavesdroppers. The methods ranged from flawed random number generation to leaked secret keys to codebreaking techniques. Then the researchers rated them on variables like undetectability, lack of conspiracy (how much secret dealing it takes to put the backdoor in place), deniability, ease of use, scale, precision and control.
wired, 27.02.2015
geheimdienst_allg_sabotage  geheimdienst_uk_gchq_ptd_arthur  geheimdienst_uk_gchq_edgehill  geheimdienst_us_nsa_ces_bullrun  geheimdienst_us_nsa_ces  geheimdienst_us_nsa_ncsc  geheimdienst_us_nsa_sigint_enabling  itsicherheit_strategie  krypto_analyse  krypto_backdoor  itsicherheit_exploit_flaw  uni_us_wisc  uni_us_uw  krypto_rng  krypto_tls  unternehmen_resilient_systems  software_krypto_bitlocker  geheimdienst_polizei_infiltration_tech  itsicherheit_angriff_modell 
march 2015 by kraven

related tags

geheimdienst_allg_sabotage  geheimdienst_polizei_infiltration_tech  geheimdienst_uk_gchq_edgehill  geheimdienst_uk_gchq_ptd_arthur  geheimdienst_us_nsa_ces  geheimdienst_us_nsa_ces_bullrun  geheimdienst_us_nsa_ncsc  geheimdienst_us_nsa_sigint_enabling  itsicherheit_angriff_modell  itsicherheit_exploit_flaw  itsicherheit_strategie  krypto_analyse  krypto_backdoor  krypto_rng  krypto_tls  software_krypto_bitlocker  umwelt_klima_katastrophe_temperatur  umwelt_ökozid  uni_us_wisc  unternehmen_allg_fischerei  unternehmen_resilient_systems  überwachung_mobilfunk_imsi_catcher  überwachung_stadt 

Copy this bookmark: