HHS Funds AI Tool to ‘Inoculate’ Social Media Users Against HPV Vax ‘Misinformation’

University of Pennsylvania researchers — using U.S. taxpayer dollars — are developing an artificial intelligence (AI) tool designed to “inoculate” social media users against “misinformation” about the HPV vaccine posted on social media, grant documents obtained by Children’s Health Defense (CHD) via a Freedom of Information Act (FOIA) request revealed.

The U.S. Department of Health and Human Services (HHS) is funding the $4 million “Inoculate for HPV Vaccine” randomized controlled trial running from April 2022 through March 2027. The National Cancer Institute, part of HHS, is facilitating the funding. Funding for year three was released in April.

The study is headed up by Melanie L. Kornides, associate professor of nursing at the University of Pennsylvania, whose research focuses on increasing vaccine uptake, and also on “strategies to combat misinformation.”

Kornides is joined by a team of digital health communication experts, software and program designers, social media analysts and machine learning systems experts who will help her run the “inoculation” experiment on 2,500 parents of children ages 8-12.

The team is collecting user data from YouTube, Twitter, Facebook and Instagram where people talk about HPV and using natural language processing to train an AI tool to identify “HPV misinformation,” or posts that are critical of vaccination — whether or not the information in the post is true or false.

They will then develop and test their “inoculation tool,” exposing subjects in three study arms to different types of messaging meant to make them immune to such misinformation.

A control group will get no particular messaging and two test groups will be exposed either to messaging designed to inoculate viewers against content critical of of HPV vaccines and content critical of anti-vaccine arguments.

The subjects will get “booster” doses of messaging at three and six months after their first inoculation.

If successful, the researchers wrote, this novel approach to combating health “misinformation” can be used in “wide-scale social media campaigns” addressing pandemics, childhood vaccination and other health issues.

Keep reading

RFID cards could turn into a global security mess after discovery of hardware backdoor

WTF?! Chinese-made chips used in popular contactless cards contain hardware backdoors that are easy to exploit. These chips are compatible with the proprietary Mifare protocol developed by Philips spin-off NXP Semiconductors and are inherently “intrinsically broken,” regardless of the card’s brand.

Security researchers at Quarkslab have discovered a backdoor in millions of RFID cards developed by Shanghai Fudan Microelectronics (FMSH). When properly exploited, this backdoor could be used to quickly clone contactless smart cards that regulate access to office buildings and hotel rooms worldwide.

According to French researchers, “Mifare Classic” cards are widely used but have significant security vulnerabilities. These chip-based contactless cards have been targeted by various attacks over the years and remain vulnerable despite the introduction of updated versions.

In 2020, Shanghai Fudan released a new variant that provides a compatible (and likely cheaper) RFID technology through the Mifare-compatible FM11RF08S chip. It featured several countermeasures designed to thwart known card-only attacks, but introduced its own security issues.

Quarkslab analyst Philippe Teuwen discovered an attack capable of cracking FM11RF08S “sector keys” within a few minutes, but only if a specific key is reused across at least three sectors or three cards.

Keep reading

What Future for U.S.-China Science and Technology Collaboration?

On Tuesday this week the U.S.-China Science and Technology Agreement (STA) is due to expire unless the U.S. and China can agree on its extension. Today I provide some background on the agreement, why it is now being debated, and my view on what should happen next.

STAs are a common tool of science diplomacy. The U.S. has more than 60 STAs with countries around the world, overseen by the State Department, which explains:

These agreements, and their associated expert meetings, strengthen international cooperation in scientific areas aligned with American interests, ensure open data practices, promote reciprocity, extend U.S. norms and principles, and protect American intellectual property.

We recognize that not every country shares American values – in fact, some attempt to illicitly acquire America’s intellectual property and proprietary information. As such, STC works with foreign allies and federally funded scientists to ensure the United States rightfully reaps the benefits of international science and technology cooperation and that those with whom we cooperate adhere to the rules-based order. STC monitors worldwide trends in science and technology to retain U.S. advantages over strategic competitors and improve our understanding of how they may influence—or undermine—American strategies and programs.

According to a 2021 study, at that time China had 52 STAs and 64 other cooperative agreements with countries around the world. “Science diplomacy” is low hanging diplomatic fruit for both the U.S. and for China.

The U.S.-China STA was first signed in 1979 and originally emphasized agricultural research and development. The STA was the first agreement between the countries following the normalization of relations in January of that year.

Keep reading

How Israel’s quadcopters traumatise, maim and kill Palestinians in Gaza

In the course of more than ten months, Israel unleashed an array of weaponry in its genocidal war on the Palestinians in the besieged coastal enclave, killing and wounding thousands. One of the most deadly weapons in Israel’s arsenal is the quadcopter. 

A drone with four propellers, the quadcopter follows its targets in different spaces, including narrow alleys of streets, tents, and inside houses. The 1.6-metre Quadcopter is electronically controlled remotely. It can easily take off and move vertically and horizontally for military or civilian service. It weighs about ten kilograms only. 

Usually, the Israeli army deploys quadcopters for intelligence purposes to facilitate its mission on the ground. Nevertheless, the Israeli army have equipped these drones with explosive devices, transforming them into deadly suicide attacks.

Dozens of quadcopters have so far killed hundreds of Palestinian civilians by launching guided missiles. 

“Quadcaptors have killed about 1,000 Palestinians, including 350 women and 150 children, during the current genocidal war,” the Palestinian health ministry in Gaza noted in a recent press statement. 

Keep reading

WWIII: Zelenskiy Says Ukraine Will Soon Be Able To Attack “Anywhere In Russia” – Ukraine Uses Long-Range Thermobaric Drone Inside Russian Federation Overnight

A jet-based drone rocket called Palyanytsia was fired onto RF territory overnight.

This is a new rocket drone type developed in Ukraine, or given to Zelenskyiy, and will seriously escalate the situation.

It contains aluminum fog that when blown up creates a vacuum effect — thermobaric rocket drone, 1500 km range.

The drone rocket was launched during the night of Aug 24.

Keep reading

Everything We Just Learned About The Ghost Shark Uncrewed Submarine

Anduril says it has received active interest in integrating more than a dozen new military and commercial payloads onto its Ghost Shark extra-large autonomous undersea vehicle (XL-AUV). Payload testing and otherwise demonstrating the Ghost Shark’s highly modular design are core focuses of new work on the underwater drone that is now set to occur in the United States.

The War Zone learned these and other new details about Ghost Shark in an interview earlier this week with Dr. Shane Arnott, Senior Vice President for Engineering at Anduril and the company’s maritime lead.

The Ghost Shark’s U.S. debut, which Anduril announced this week, came at the biennial U.S. Navy-led Rim of the Pacific (RIMPAC) exercise in Hawaii, where the uncrewed undersea vehicle (UUV) was displayed to attendees. RIMPAC 2024 wrapped up on August 1. Development of Ghost Shark began in Australia in 2022 for that country’s navy, which is looking to acquire at least three of the UUVs by 2025. The Ghost Shark now in the United States is an additional example that Anduril built using its own funds.

Keep reading

Under The Skin: The Internet Of Bio-NanoThings

The Internet of Things (IoT) has become an important research topic in the last decade, where things refer to interconnected machines and objects with embedded computing capabilities employed to extend the Internet to many application domains. While research and development continue for general IoT devices, there are many application domains where very tiny, concealable, and non-intrusive Things are needed.

The properties of recently studied nanomaterials, such as graphene, have inspired the concept of Internet of NanoThings (IoNT), based on the interconnection of nanoscale devices. Despite being an enabler for many applications, the artificial nature of IoNT devices can be detrimental where the deployment of NanoThings could result in unwanted effects on health or pollution. The novel paradigm of the Internet of Bio-Nano Things (IoBNT) is introduced in this paper by stemming from synthetic biology and nanotechnology tools that allow the engineering of biological embedded computing devices.

Based on biological cells, and their functionalities in the biochemical domain, Bio-NanoThings promise to enable applications such as intra-body sensing and actuation networks, and environmental control of toxic agents and pollution. The IoBNT stands as a paradigm-shifting concept for communication and network engineering, where novel challenges are faced to develop efficient and safe techniques for the exchange of information, interaction, and networking within the biochemical domain, while enabling an interface to the electrical domain of the Internet.

Keep reading

Why The U.S. Faces Chinese Dominance For Critical Energy Minerals

More than three years ago, in May 2021, I wrote a piece here detailing the importance of a relatively obscure mineral, antimony, to the ultimate success of alternative energy sources like wind and solar and electric vehicles, and thus to the progress of the energy transition itself.

Even more pressing is the fact that antimony is critical to the needs of major weapon systems used by the U.S. military. The piece also discussed the urgent need for policymakers to find ways to speed up the permitting processes for mining of this and an array of other critical energy minerals if the United States were to avoid becoming almost wholly dependent on China for its future energy needs.

The story was focused on the struggles of Perpetua Resources, a mining company that had at the time struggled for over a decade to obtain the needed local, state, and federal permits to mine a long-known major resource of antimony at the Stibnite mine in Idaho. Stibnite is a long-ago abandoned gold mining operation that Perpetua says it could quickly place into antimony production once all the needed permits are secured.

Since that time, West Virginia Sen. Joe Manchin and fellow sponsors have tried to move federal permitting reform bills in both 2022, and again this year. The 2022 bill failed in the face of bipartisan opposition, and this year’s effort currently seems doomed to the same fate. It must seem to Sen. Manchin that no one in Washington, D.C., other than himself and a handful of fellow members of congress, is serious about getting anything real done on this pressing issue that is essential to the entire energy transition effort.

Keep reading

Big Brother Goes Digital: The Feds’ Race to Integrate Mobile IDs in America

The push to develop digital ID and expand its use in the US is receiving a boost as the country’s National Institute of Standards and Technology (NIST) is launching a new project.

NIST’s National Cybersecurity Center of Excellence (NCCoE) has teamed up with 15 large financial and state institutions, as well as tech companies, to research and develop a way of integrating Mobile Driver’s License (mDL) into financial services. But according to NIST, this is just the start and the initial focus of the program.

The agreement represents an effort to tie in yet more areas of people’s lives in their digital ID (“customer identification program requirements” is how NIST’s announcement describes the focus of this particular initiative). These schemes are often criticized by rights advocates for their potential to be used as mass surveillance tools.

Keep reading

The Emperor Has No Clothes: Stealth Technology is Sexy and Useless

On 27 March 1999, during the NATO bombing of Yugoslavia, a Yugoslav Army unit (3rd Battalion of the 250th Air Defense Missile Brigade, which was under the leadership of Colonel Zoltán Dani) shot down an F-117 Nighthawk stealth aircraft of the United States Air Force by firing a S-125 Neva/Pechora surface-to-air missile. It was the first ever shootdown of a stealth technology airplane. The F-117, which entered service with the U.S. Air Force in 1983 was the first operational aircraft to be designed using stealth technology; by comparison, the Yugoslav air defenses were considered relatively obsolete. The F-117 fleet was officially retired on April 22, 2008.

Innovative tactics and leaders who know what they are about can take ancient weapons to destroy “state of the art” weapons systems and platforms such as the use of ancient pike tactics at Stirling Bridge to slaughter the English King’s modern heavy horse on 11 September 1297 in Scotland or the English victory against the French at Agincourt on 25 October 1415 (Saint Crispin’s Day). During WWII, the Russian-Finnish War in 1939-40 set a David versus Goliath fight that saw a very lop-sided body-count for the Russians fighting the tiny Finnish forces.

Stealth is very expensive and puts tremendous constraints on the utility of the the platform employing it. In the calculus of war, its use diminishes over time. Yet another exemplar of the adage that complexity and sophistication doesn’t always yield martial advantage. The stealth capability has been oversold on shaky science in the art of war.

In a fight with peer and near-peer adversaries, the stealth advantage is negligible.

It is overpriced and the enemy always gets a vote.

Keep reading