Sustainability-in-Tech : Designer-Material Absorbs Carbon Faster Than Trees
Scientists at Edinburgh’s Heriot-Watt University have published details of the discovery of a new material that can absorb carbon faster than trees, giving hope to efforts to tackle the climate crisis.
Can Absorb The Most Potent Greenhouse Gasses
Detailed in a paper published in the journal ‘Nature Synthesis,’ the scientists report how the new porous material they created has hollow, cage-like molecules with high storage capacities for greenhouse gases like carbon dioxide and sulphur hexafluoride. Although the new material can absorb carbon dioxide (the most well-known greenhouse gas), the scientist pointed out that sulphur hexafluoride is a more potent greenhouse gas than carbon dioxide and can last thousands of years in the atmosphere.
Used Computer Modelling To Design It
The project to create the material was a collaboration between Heriot-Watt University, the University of Liverpool, Imperial College London, the University of Southampton, and East China University of Science and Technology in China, and the team used computer modelling to “accurately predict how molecules would assemble themselves into the new type of porous material.”
It was the computer modelling specialists at Imperial College London and the University of Southampton that created the simulations which enabled the team to understand and predict how their cage molecules would assemble into this new type of porous material.
Dr Marc Little (an Assistant Professor at Heriot-Watt University’s Institute of Chemical Sciences and an expert in porous materials) said: “Combining computational studies like ours with new AI technologies could create an unprecedented supply of new materials to solve the most pressing societal challenges, and this study is an important step in this direction.”
In reference to the contribution of computer modelling to the discovery and could play (along with AI) to future similar discoveries, Dr Little added: “Combining computational studies like ours with new AI technologies could create an unprecedented supply of new materials to solve the most pressing societal challenges, and this study is an important step in this direction.”
What Does This Mean For Your Organisation?
As Dr Marc Little said: “This is an exciting discovery because we need new porous materials to help solve society’s biggest challenges, such as capturing and storing greenhouse gases.” As such, this groundbreaking discovery could represent a pivotal moment in our collective fight against the climate crisis.
At the heart of this discovery is a collaborative effort by experts in the UK and China and the ingenious use of computer modelling, a tool that played a pivotal role in unravelling the complexities of molecular assembly.
Through precise predictions facilitated by advanced computer modelling, researchers were able to engineer hollow, cage-like molecules capable of efficiently trapping greenhouse gases such as carbon dioxide and the highly potent sulphur hexafluoride. This strategic fusion of scientific expertise and computational prowess underscores the immense potential of technology in catalysing transformative breakthroughs.
As highlighted by Dr Little, by marrying computational studies with emerging AI technologies, we could have a chance to unlock many more innovative solutions to society’s most pressing challenges. This study, therefore, could be seen as an important step toward a future where computational ingenuity and scientific inquiry converge to address global challenges.
Also, the integration of computer modelling and AI for future projects holds a great deal of promise, e.g. in advancing material science, renewable energy and more.
This discovery and its methodology, therefore, shows how important embracing the transformative power of technology is and will be in helping us tackle our biggest challenges going forward.
Video Update : New : Meta’s Message Updates
This video-update explains the three new features for Messenger which Meta have recently introduced …
Tech Tip – How To Streamline Your Workflow with Virtual Desktops
Virtual Desktops in Windows are a good way to extend your workspace without needing multiple monitors and can be useful for separating different types of tasks or projects to keep your workflow organised. Here’s how they work:
– Press Win + Tab to open Task View.
– Click on “New desktop,” which appears at the top of the screen, to create a new virtual desktop.
– You can switch between desktops using Win + Ctrl + Left Arrow or Win + Ctrl + Right Arrow.
– Drag and drop windows from your main desktop to any virtual desktop to organise your tasks better.
– Right-click on windows in Task View to move them or open new apps directly on any desktop.
Featured Article : Realtime Deepfake Dating Scams
Here we look at how scammers are now reportedly using face-swapping technology to change their appearance in real-time to conduct video-based romance scams.
Yahoo Boys
Recently, tech news site ‘Wired’ featured a story about romance scammers dubbed ‘Yahoo Boys,’ a slang term for a Nigeria-based collective of scammers who are now using deepfakes and real-time face-swapping technology so they can take on any appearance in their video feed to the targets of their romance scams. They are also known to be involved in phishing, and other cybercrimes.
Romance Scams
A romance scam is a type of fraud where someone creates a fake identity to form a relationship with their target, often online, to deceive them into sending money or revealing personal or financial information.
How Big Is the Problem?
According to the US FBI’s 2023 ‘Internet Crime Report’, the category of ‘confidence fraud/romance’ led to the theft of $652,544,805 from victims (which was actually down by a little over $83 million on the previous year). This is clearly a significant problem and the real-time component of it will doubtless be factor in making this more prevalent.
How? What Tech Have They Been Using?
As highlighted by the research of David Maimon, Head of Fraud Insights at SentiLink and a professor at Georgia State University, who has been monitoring the ‘Yahoo Boys’ on Telegram for more than four years, they use phones, laptops and several different types of popular face-swapping software and apps to create their deepfakes.
Also, it’s been noted (by Wired) that the so-called Yahoo Boys post videos of themselves online doing so, often showing their faces in the videos, and the videos and photos of their activities and recruitment are posted across many popular social media channels, including TikTok and Facebook.
Professor Maimon has also noted that the Yahoo Boys started using deepfakes for their scams as far back as 2022, meaning that they have gained quite a lot of experience around using these tools and tactics.
Deepfake Call Types
It’s also been observed (and highlighted by Wired) that the Yahoo Boys scammers use two different types of live deepfake calls to trick their targets. For example:
Using two phones and a face-swapping app. One phone is used to call the target (via Zoom), using the rear camera to record the screen of the second phone (which is pointing at the scammer’s face) and uses a face-swapping app. In this way, the person’s face the target sees on the real-time video call is completely different from the scammer’s real face.
The second method swaps a laptop for the phone, using a webcam and face-swapping software on the laptop to change the face of the scammer. It’s also been reported that videos made by the scammers of them using this method show that they are able to see their real face displayed alongside their deepfake face although it’s only the deepfake face that’s shown to the target in the video call.
Realistic … and Getting Better
In a LinkedIn post from Professor Maimon, showing an example of one of the scammer’s videos, he notes how “Yahoo boys are getting better using AI tools to bring stolen images of social dating users to live” and that the video example he posted “has piqued my interest due to its remarkably natural head movements, overshadowing the only noticeable flaw—the voice, which could be rectified with relative ease.”
How To Spot Deepfake (Video Calls)
On her X feed, Rachel Tobac, who describes herself as a ‘Hacker & CEO at SocialProof Security,’ offers some tips on how to help spot a deepfake video call, based on the latest deepfake calls available. These are:
– Get the person to stick out their tongue and move it around (tongue will look odd).
– Have the person move their head to the right & left or up & down to a large degree (it will look angular and boxy).
– Ask the person to get close to the camera and turn their head through a wide-angle (see angular boxy side of head).
– Ask the person to add another person next to them in the call and have the original person walk away and come back to see if a deepfake ‘flops-over’ to a second face.
– Look for discoloration around the scalp or circumference of the face (it may look like unblended makeup).
– Look for light flickering in their hair when they move.
Meeting In Person
As noted by contributor ‘Ally A’, to the LinkedIn post about the Yahoo Boys from Matt Burgess of Wired, a key piece of advice to people who may be involved in these kinds of romantic video calls is: “You can’t trust your eyes and ears anymore. If you can’t meet the person you are talking to online IN PERSON within 2-3 weeks of meeting, you have to assume that they are a scammer.”
AI Advances Helping Scammers
The proliferation of AI technologies and their integration into various applications has inadvertently facilitated the activities of online scammers, including those involved in romance scams. AI-driven tools can now generate realistic and engaging text or images, enabling scammers to create convincing fake profiles and carry out sustained, personalised interactions without much effort – just as the Yahoo Boys have been doing. These sophisticated (but now widely available) tools can help scammers tailor their messages and responses based on the victim’s preferences and responses, making the deceit more believable. As a result, the barrier to entry for conducting such scams is lowered, allowing even those with minimal technical skills to now execute complex and convincing scams, thereby increasing the potential for exploitation and harm to unsuspecting individuals.
How To Protect Yourself
In addition to Rachel Tobac’s tip for spotting deepfakes (such as those used by the Yahoo Boys), some of the key ways people can protect themselves from falling victim to romance scammers, include:
– Verify profiles. Conduct reverse image searches of profile pictures to check if they appear elsewhere on the internet, which can indicate a stolen image.
– Slow down. Be cautious with individuals who escalate the relationship too quickly or profess love unusually early!
– Keep personal information private. Avoid sharing sensitive personal information such as your address, financial details, or social security number.
– Be very skeptical of requests for money. Be highly suspicious if the person you are communicating with requests money, especially if it is for an emergency or a seemingly urgent matter.
– Use secure communication channels. Stick to the platform’s messaging services and avoid switching to less secure or private communication methods too soon.
– Seek second opinions. Discuss your online relationship with friends or family to gain outside perspectives, especially if something feels off.
– Report suspicious behavior. Report any suspicious profiles or messages to the dating platform and consider filing a complaint with relevant authorities if you suspect a scam.
What Does This Mean For Your Business?
For businesses, understanding the dynamics of the evolving scam landscape, as demonstrated by the techniques employed by the “Yahoo Boys”, is crucial. These scammers, using readily available AI technologies such as deepfakes and real-time face-swapping, underscore a growing trend in cybercrime that leverages cutting-edge technology to exploit vulnerabilities in human psychology, particularly through emotional engagement.
The decentralised nature of these scam networks (where individuals or small groups operate in loose associations while sharing tactics and tools), presents a significant challenge to traditional cybersecurity measures. They operate with a brazen openness, often flaunting their capabilities on social media, which shows a troubling confidence in their ability to evade detection.
The ease of access to AI tools means that the sophistication of scams can evolve as quickly as the technology develops. For businesses, this represents a clear and present danger not just in the form of romance scams targeted at individuals, but as a harbinger of more advanced AI-driven threats that could target companies directly. Phishing scams, impersonation, and business email compromise are just a few examples where similar technologies could be used to deceive employees or manipulate systems for fraudulent purposes.
To safeguard against these threats, businesses need to enhance their defensive strategies by incorporating advanced detection systems that can identify anomalies in communication patterns, authenticate digital identities more robustly, and monitor for signs of emerging threats such as deepfakes. Training employees to recognise and report potential scams is also vital. Creating a culture of security awareness and providing tools to verify information independently can act as a crucial barrier against deception.
Tech Insight : Police : Don’t Try Hiding Money in Crypto
The Home Office has announced that in an attempt to tackle the issue of drug dealers, fraudsters and terrorists using crypto to hide and raise money, it’s giving new powers to the police.
Over £1 Billion In Illegal Crypto Transactions
With over £1 billion in illegal crypto transactions taking place in the UK each year, the Home Office has announced that the government has now updated its proceeds of crime and terror legislation so that the National Crime Agency and police now have the powers to seize, freeze and destroy the crypto assets used by criminals.
Stopping Criminals, And Supporting Economic Growth
The government says the changes to the legislation, which have already come into force, will provide the dual benefits of stopping criminals from undermining the legitimate use of crypto, and supporting the development of crypto as a potential driver of economic growth.
Why Are Criminals Turning To Crypto?
Criminals are increasingly using crypto-assets for several reasons, including:
– The level of anonymity that cryptoassets provide – transactions don’t require personal information like traditional banking does. This makes it harder for authorities to trace activities back to specific individuals.
– The decentralisation of cryptocurrencies. Crypto transactions don’t rely on centralised financial institutions and this reduces the oversight and interference from authorities and enables cross-border transactions with fewer restrictions.
– Cryptocurrencies allow for fast transactions that can be conducted at any time, from anywhere, without needing to go through traditional banking processes. This is advantageous for illicit activities that require fast and flexible operations.
– Global reach. Cryptoassets can be used internationally without the need for currency exchange or the complications of international banking regulations, facilitating global criminal operations.
– The irreversibility, i.e. once a crypto transaction is confirmed, it can’t be reversed. This protects criminals from chargebacks or other forms of financial reversal typically available in traditional banking systems.
Using Cryptoassets For Laundering and Raising Money
As highlighted by the Home Office, crypto-assets are also increasingly used for laundering the proceeds of crime and for raising money for illicit activities. For example, this can involve using:
– Layering and integration. Cryptocurrencies can be used to obscure the origins of illegally obtained money through complex layers of transactions across multiple wallets and exchanges. This process, known as “layering,” helps criminals disguise the source of funds. The final step, “integration,” sees the now-disguised funds reintroduced into the legitimate economy, appearing as legal assets.
– Services known as “mixers” or “tumblers” obscure the source of funds by mixing potentially identifiable or “tainted” cryptocurrency funds with others, making it harder to trace the origins of the funds.
– Criminals can raise money by creating new cryptocurrencies or tokens and selling them to investors through ICOs (Initial Coin Offerings and Token Sales). These can sometimes be scams, with the organisers disappearing with the investors’ money, a process known as an “exit scam.”
– Many cryptocurrency exchanges and wallets operate with little to no regulatory oversight, providing a less scrutinised environment for moving and storing illicit funds.
– Cryptocurrencies are the primary mode of transaction in darknet markets, where illegal goods and services (like drugs, weapons, and illicit materials) are traded. These markets provide a ready avenue for criminals to earn and launder money through crypto transactions.
The Changes
The new changes to UK legislation to tackle the issue of criminals using crypto assets mean that:
– Police are no longer required to make an arrest before seizing crypto from a suspect. The hope is that this will make it easier to take assets which are known to have been criminally obtained, even if sophisticated criminals are able to protect their anonymity or are based overseas.
– Items that could be used to give information to help an investigation, such as written passwords or memory sticks, can now be seized.
– UK Law enforcement officers can now transfer illicit cryptoassets into an electronic wallet which they control, meaning criminals can no longer access it.
– UK law enforcement now have the power to destroy a crypto asset if returning it to circulation is not conducive to the public good. Privacy coins, for example, are a type of cryptocurrency that offer an extremely high degree of anonymity and are often used for money laundering.
– Victims can now apply for money belonging to them in a cryptoassets account to be released to them.
Next Level
Following the changes to the law, Security Minister Tom Tugendhat said: “Our agencies have already shown they have the expertise to target sophisticated criminals and deprive them of their ill-gotten gains. These new measures will help them take the fight to the next level.”
Also, Adrian Searle, Director of the National Economic Crime Centre, said: “Criminals are increasingly using crypto assets to conceal and move the proceeds of crime at scale and pace, pay for other criminal services and as a means to defraud victims” and that “these new powers are very welcome and will enhance law enforcement’s ability to restrain, recover and destroy crypto assets if required.”
Examples
Examples recently given by the Home Office of where they’ve been successful in thwarting criminals by seizing their crypto-assets include the NCA working with the United States Drug Enforcement Administration to investigate a multi-million drug enterprise which led to $150 million (in cash and crypto) being seized (January 2024). Also, the Home Office has highlighted how crypto-assets were seized in a case where three men sold counterfeit drugs on the dark web and accepted crypto as payment, amassing £750,000 in the process. They were jailed for more than 20 years between them.
What Does This Mean For Your Business?
These changes to UK legislation could have significant implications for the landscape around cryptocurrency usagee, affecting everyone from cyber-criminals to legitimate users and UK businesses alike.
For cyber-criminals, this represents a tightening of the net. The new powers granted to police to seize, freeze, and even destroy crypto-assets (without prior arrest) shows tougher governmental response to the sophisticated ways criminals are exploiting digital currencies. This stance may deter some criminal activities, but it may also, in some cases, push others to find even more clandestine methods or technologies to evade detection.
For legitimate users of cryptocurrencies, these changes could enhance the security of the crypto ecosystem. While it may introduce some inconvenience, e.g. increased scrutiny of transactions and potentially stricter KYC (Know Your Customer) and AML (Anti-Money Laundering) procedures, these measures are intended to protect the economic environment from being undermined by illicit activities. For the broader crypto market, this could mean a more stable and trustworthy system that could encourage greater adoption and potentially increase the value of law-abiding crypto enterprises.
For UK businesses, especially those operating in the tech and financial sectors, this change in the law could be a catalyst for innovation and adaptation. Companies involved in blockchain and fintech may find new opportunities in developing solutions that align with legal requirements while enhancing transaction security and transparency. This could open up new markets and customer bases that were previously wary of the potential risks associated with crypto transactions.
It’s also worth noting that for victims of crime, the ability to apply for the release of funds from crypto accounts is a significant step forward. This not only provides a means of recourse and recovery but also means that the rights and protections of victims are now being taken more seriously.
Although the new legislation introduces challenges, it looks as though it could help with increased security, enhanced trust in digital transactions, and potential growth and innovation within the UK’s tech and financial sectors. Some would say that, not before time, this is a sign that legislation (which seems to move slowly) is starting to catch up with criminal activities around crypto, and police are finally being given more of the powers they need.
Tech News : Jail Coder Course Shows Positive Results
US-based researchers have reported that the ‘Brave Behind Bars’ college-accredited, zoom-based web design course for prisoners has improved their sense of self-worth and given them digital literacy skills that help them stay out of prison.
Brave Behind Bars
The 12-week Brave Behind Bars computer science and career-readiness program was expanded in 2022 to include 40 men and women from six US correctional facilities. The 2023 program was further expanded to support 55 incarcerated men and women from across the eastern United States.
The course teaches students to develop skills in digital literacy, web design, and career-readiness, through building websites to help address some of society’s most pressing issues.
The Brave Behind Bars program was launched by 3 PhD students in 2021 with the support of The Educational Justice Institute at Massachusetts Institute of Technology (MIT) and MIT CSAIL (the largest lab at MIT). It became an independent nonprofit in 2023 and has been joined by two dozen affiliates who instruct and coach students.
Surveys
In a recently published research paper entitled “From Prisons to Programming: Fostering Self-Efficacy via Virtual Web Design Curricula in Prisons and Jails”, the Brave Behind Bars researchers published the findings of surveys with participating students plus a second study to measure students’ general and computer self-efficacy both before and after completing the program.
The Findings
The researchers reported that participants “overwhelmingly reported an increase in self-confidence, attributing their newfound self-belief to the course.” The findings showed the transformative power of computing tools in enabling learners to realise their own capabilities, i.e. an increase in self-efficacy – a person’s belief in their capacity to execute behaviors necessary to produce specific performance attainments.
The researchers also reported that “the course also appeared to help individuals overcome their initial hesitations or shyness, contributing to increased self-efficacy” and that “the students also found great value in the real-world application of their skills, particularly in creating meaningful websites”. Participants in the research also praised the inclusive and personalised nature of the instruction.
The research used both qualitative (interviews) and quantitative analysis to help determine its success and the researchers reported that the quantitative analysis showed that mean self-efficacy scores increased at the end of the course for both general and computer self-efficacy.
What Does This Mean For Your Business?
The approach taken by the “Brave Behind Bars” program highlights both the role that education and digital literacy can play in transformative justice and sheds light on broader implications for the tech sector and business communities involved in similar initiatives. This research, carried out through partnerships with recognised institutions like MIT, shows the positive impact that targeted educational programs can have on people within carceral settings, e.g. by enhancing their self-efficacy (confidence), preparing them for reintegration into society, and potentially giving them something of value that they can use to break old patterns and move forward in a more positive direction.
For businesses, particularly those within the tech industry, the findings from the research offer a case for the integration of social responsibility in their business models. Companies may want to consider partnering with educational programs that aim to reduce a pattern of offending through skill development. This may not only contribute to societal benefits but could also help businesses tap into a diverse pool of talent who are eager to apply their newly acquired skills in real-world scenarios. Such engagement could also bolster a company’s brand image, help fulfill its corporate social responsibility objectives, and project a positive company image and values.
Also, for those who were involved in this research (from researchers to program facilitators), there’s now a clear pathway to further explore the scalability of similar initiatives. The positive outcomes suggest that similar programs could be replicated and tailored in different contexts, potentially impacting a broader spectrum of the incarcerated population (there are 2 million people in prison in the US alone). Expanding such programs could also drive more comprehensive data collection, aiding in refining educational techniques that enhance self-efficacy and, subsequently, employability.
From a tech sector perspective, the success of the Brave Behind Bars program indicates a growing intersection between technology, education, and social justice. Businesses in the tech industry have an opportunity to lead the way in innovating software and educational tools that are adaptable to various learning environments, including prisons. This could mean developing secure, scalable platforms that support remote learning (by Zoom as in this program) or creating content that is specifically geared towards increasing digital literacy and professional skills among underserved populations.
Given the significant challenges of deploying and studying education programs within carceral settings, the research conducted by the Brave Behind Bars initiative provides real value. It not only provides a blueprint for how educational programs can be effectively implemented in such challenging environments but it also demonstrates the significant role of education in increasing self-efficacy as a method to combat repeated offending. For businesses, this research offers a unique perspective on the power of education and technology to make a meaningful difference, advocating for increased involvement in correctional education as a tool for positive social impact.
Irrespective of the setting, increasing people’s self-efficacy via training can only be a good thing.