Cellphones

HHS Announces New Study of Cellphone Radiation and Health (usnews.com) 60

An anonymous reader quotes a report from U.S. News & World Report: U.S. health officials plan a new study investigating whether radiation from cellphones may affect human health. A spokesperson for the U.S. Department of Health and Human Services (HHS) said the research will examine electromagnetic radiation and possible gaps in current science. The initiative stems from numerous concerns raised by Health Secretary Robert F. Kennedy Jr., who has linked cellphone use to neurological damage and cancer.

"The [U.S. Food and Drug Administration] removed webpages with old conclusions about cell phone radiation while HHS undertakes a study on electromagnetic radiation and health research to identify gaps in knowledge, including on new technologies, to ensure safety and efficacy," HHS spokesman Andrew Nixon said. He added that the study was directed in a strategy report from the president's Make America Healthy Again Commission.

Some webpages from the FDA and the U.S. Centers for Disease Control and Prevention say current research does not show clear harm from cellphone radiation. The National Cancer Institute, which is part of the National Institutes of Health, says that "evidence to date suggests that cellphone use does not cause brain or other kinds of cancer in humans."
.
Cellphones

You Only Need $750 to Pilfer Unencrypted Data From Satellites, Researchers Say (gizmodo.com) 20

"A new study published on Monday found that communications from cellphone carriers, retailers, banks, and even militaries are being broadcast unencrypted through geostationary satellites..." reports Gizmodo. "The team obtained unencrypted internet communications from U.S. military sea vessels and even communications regarding narcotics trafficking from Mexican military and law enforcement." Researchers from the University of California, San Diego (UCSD) and the University of Maryland scanned 39 of these satellites from a rooftop in Southern California over three years. They found that roughly half of the signals they analyzed were transmitting unencrypted data, potentially exposing everything from phone calls and military logistics to a retail chain's inventory. "There is a clear mismatch between how satellite customers expect data to be secured and how it is secured in practice," the researchers wrote in their paper titled "Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites...." "They assumed that no one was ever going to check and scan all these satellites and see what was out there. That was their method of security," Aaron Schulman, a UCSD professor and co-lead of the study, told Wired....

Even more surprisingly, the researchers didn't need any fancy spy gear to collect this data. Their setup used only off-the-shelf hardware, including a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card. Altogether, the system cost roughly $750 and was installed on a university building in La Jolla, San Diego.

With their simple setup, the researchers were able to collect a wide range of communication data, including phone calls, texts, in-flight Wi-Fi data from airline passengers, and signals from electric utilities. They even obtained U.S. and Mexican military and law enforcement communications, as well as ATM transactions and corporate communications... When it came to telecoms, specifically, the team collected phone numbers, calls, and texts from customers of T-Mobile, AT&T Mexico, and Telmex... It only took the team nine hours to collect the phone numbers of over 2,700 T-Mobile users, along with some of their calls and text messages.

T-Mobile told Gizmodo the lack of encryption was "a vendor's technical misconfiguration" affecting "a limited number of cell sites" and was "not network-wide... [W]e implemented nationwide Session Initiation Protocol (SIP) encryption for all customers to further protect signaling traffic as it travels between mobile handsets and the network core, including call set up, numbers dialed and text message content. We appreciate our collaboration with the security research community, whose work helps reinforce our ongoing commitment to protecting customer data and enhances security across the industry."

Indeed, the researchers write that "Each time we discovered sensitive information in our data, we went through considerable effort to determine the responsible party, establish contact, and disclose the vulnerability. In several cases, the responsible party told us that they had deployed a remedy. For the following parties, we re-scanned with their permission and were able to verify a remedy had been deployed: T-Mobile, WalMart, and KPU."

The researchers acknowledge that exposure "was limited to a relatively small number of cell towers in specific remote areas."
Security

Why Do So Many Sites Have Bad Password Policies? (gatech.edu) 242

"Three out of four of the world's most popular websites are failing to meet minimum requirement standards" for password security, reports Georgia Tech's College of Computing. Which means three out of four of the world's most popular web sites are "allowing tens of millions of users to create weak passwords."

Using a first-of-its-kind automated tool that can assess a website's password creation policies, researchers also discovered that 12% of websites completely lacked password length requirements. Assistant Professor Frank Li and Ph.D. student Suood Al Roomi in Georgia Tech's School of Cybersecurity and Privacy created the automated assessment tool to explore all sites in the Google Chrome User Experience Report (CrUX), a database of one million websites and pages.

Li and Al Roomi's method of inferring password policies succeeded on over 20,000 sites in the database and showed that many sites:

- Permit very short passwords
- Do not block common passwords
- Use outdated requirements like complex characters

The researchers also discovered that only a few sites fully follow standard guidelines, while most stick to outdated guidelines from 2004... More than half of the websites in the study accepted passwords with six characters or less, with 75% failing to require the recommended eight-character minimum. Around 12% of had no length requirements, and 30% did not support spaces or special characters. Only 28% of the websites studied enforced a password block list, which means thousands of sites are vulnerable to cyber criminals who might try to use common passwords to break into a user's account, also known as a password spraying attack.

Georgia Tech describes the new research as "the largest study of its kind." ("The project was 135 times larger than previous works that relied on manual methods and smaller sample sizes.")

"As a security community, we've identified and developed various solutions and best practices for improving internet and web security," said assistant professor Li. "It's crucial that we investigate whether those solutions or guidelines are actually adopted in practice to understand whether security is improving in reality."

The Slashdot community has already noticed the problem, judging by a recent post from eggegick. "Every site I visit has its own idea of the minimum and maximum number of characters, the number of digits, the number of upper/lowercase characters, the number of punctuation characters allowed and even what punctuation characters are allowed and which are not." The limit of password size really torques me, as that suggests they are storing the password (they need to limit storage size), rather than its hash value (fixed size), which is a real security blunder. Also, the stupid dots drive me bonkers, especially when there is no "unhide" button. For crying out loud, nobody is looking over my shoulder! Make the "unhide" default.
"The 'dots' are bad security," agrees long-time Slashdot reader Spazmania. "If you're going to obscure the password you should also obscure the length of the password." But in their comment on the original submission, they also point out that there is a standard for passwords, from the National Institute of Standards and Technology: Briefly:

* Minimum 8 characters
* Must allow at least 64 characters.
* No constraints on what printing characters can be used (including high unicode)
* No requirements on what characters must be used or in what order or proportion

This is expected to be paired with a system which does some additional and critical things:

* Maintain a database of known compromised passwords (e.g. from public password dictionaries) and reject any passwords found in the database.
* Pair the password with a second authentication factor such as a security token or cell phone sms. Require both to log in.
* Limit the number of passwords which can be attempted per time period. At one attempt per second, even the smallest password dictionaries would take hundreds of years to try...

Someone attempting to brute force a password from outside on a rate-limited system is limited to the rate, regardless of how computing power advances. If the system enforces a rate limit of 1 try per second, the time to crack an 8-character password containing only lower case letters is still more than 6,000 years.

Cellphones

Re-Victimization From Police-Auctioned Cell Phones (krebsonsecurity.com) 31

An anonymous reader quotes a report from KrebsOnSecurity: Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first having the data on them erased, a practice that can lead to crime victims being re-victimized, a new study found (PDF). In response, the largest online marketplace for items seized in U.S. law enforcement investigations says it now ensures that all phones sold through its platform will be data-wiped prior to auction.

Researchers at the University of Maryland last year purchased 228 smartphones sold "as-is" from PropertyRoom.com, which bills itself as the largest auction house for police departments in the United States. Of phones they won at auction (at an average of $18 per phone), the researchers found 49 had no PIN or passcode; they were able to guess an additional 11 of the PINs by using the top-40 most popular PIN or swipe patterns. Phones may end up in police custody for any number of reasons -- such as its owner was involved in identity theft -- and in these cases the phone itself was used as a tool to commit the crime. "We initially expected that police would never auction these phones, as they would enable the buyer to recommit the same crimes as the previous owner," the researchers explained in a paper released this month. "Unfortunately, that expectation has proven false in practice."

Beyond what you would expect from unwiped second hand phones -- every text message, picture, email, browser history, location history, etc. -- the 61 phones they were able to access also contained significant amounts of data pertaining to crime -- including victims' data -- the researchers found. [...] Also, the researchers found that many of the phones clearly had personal information on them regarding previous or intended targets of crime: A dozen of the phones had photographs of government-issued IDs. Three of those were on phones that apparently belonged to sex workers; their phones contained communications with clients.
"We informed [PropertyRoom] of our research in October 2022, and they responded that they would review our findings internally," said Dave Levin, an assistant professor of computer science at University of Maryland. "They stopped selling them for a while, but then it slowly came back, and then we made sure we won every auction. And all of the ones we got from that were indeed wiped, except there were four devices that had external SD [storage] cards in them that weren't wiped."
Earth

Simple Mathematical Law Predicts Movement In Cities Around the World (scientificamerican.com) 54

An anonymous reader quotes a report from Scientific American: The people who happen to be in a city center at any given moment may seem like a random collection of individuals. But new research featuring a simple mathematical law shows that urban travel patterns worldwide are, in fact, remarkably predictable regardless of location -- an insight that could enhance models of disease spread and help to optimize city planning. Studying anonymized cell-phone data, researchers discovered what is known as an inverse square relation between the number of people in a given urban location and the distance they traveled to get there, as well as how frequently they made the trip. It may seem intuitive that people visit nearby locations frequently and distant ones less so, but the newly discovered relation puts the concept into specific numerical terms. It accurately predicts, for instance, that the number of people coming from two kilometers away five times per week will be the same as the number coming from five kilometers twice a week. The researchers' new visitation law, and a versatile model of individuals' movements within cities based on it, was reported in Nature.

The researchers analyzed data from about eight million people between 2006 and 2013 in six urban locations: Boston, Singapore, Lisbon and Porto in Portugal, Dakar in Senegal, and Abidjan in Ivory Coast. Previous analyses have used cell-phone data to study individuals' travel paths; this study focused instead on locations and examined how many people were visiting, from how far and how frequently. The researchers found that all the unique choices people makeâ"from dropping kids at school to shopping or commuting -- obey this inverse square law when considered in aggregate. One explanation for this strong statistical pattern is that traveling requires time and energy, and people have limited resources for it.

Wireless Networking

More Cellphone Data Use Is Negatively Affecting Wi-Fi Performance, Study Finds (uchicago.edu) 46

An anonymous reader shares the findings of a new study from the University of Chicago. From a report: If service becomes slow when you're trying to send a quick email on your smartphone, you might scroll through your network options and discover how many Wi-Fi networks there are. In fact, this plethora of options is itself the problem. These networks are in competition with one another, limiting the speed at which each can operate. University of Chicago researchers have demonstrated how this increased network competition could negatively impact internet service for everyday users.

When a cellular provider, such as T-Mobile or AT&T, licenses a spectrum band from the FCC, they reserve its exclusive use. As a result, networks operating on licensed bands experience little interference. This allows providers to establish fast and reliable service, but it comes at a cost. To improve bandwidth [to accommodate] more users] without breaking the bank, these providers have begun to also use the unlicensed spectrum via cellular networks using a mode called licensed assisted access (LAA), which operates on the same bands used for Wi-Fi. [The researchers] set out to examine how this shared use of the unlicensed spectrum, called coexistence, impacted both Wi-Fi and cellular users.

"We actually found an LAA station located on the UChicago campus, on a pole in front of the bookstore, and in this outside space campus Wi-Fi is also in use," [Monisha Ghosh, associate member in the Department of Computer Science at the University of Chicago and research professor in the Pritzker School of Molecular Engineering] said. "That provided an experimental platform in our backyard, so we started taking measurements." [...] By accessing multiple networks simultaneously, the group found that competition decreased performance -- reducing the amount of data transmitted, the speed of transmission, and the signal quality. This competition was particularly detrimental to Wi-Fi. When LAA was also in active use, data transmitted by Wi-Fi users decreased up to 97%. Conversely, LAA data only exhibited a 35% decrease when Wi-FI was also in use. Ghosh explained that the incompatibility between Wi-Fi and LAA owes in part to the different protocols each employs to deal with heavy internet traffic.
The researchers presented their findings in a paper via arXiv.
Google

Google Sued After Mobile Allowances Eaten Up By Hidden Data Transfers (theregister.com) 54

A Slashdot reader shared this report from the Register: Google on Thursday was sued for allegedly stealing Android users' cellular data allowances though unapproved, undisclosed transmissions to the web giant's servers...

The complaint contends that Google is using Android users' limited cellular data allowances without permission to transmit information about those individuals that's unrelated to their use of Google services... What concerns the plaintiffs is data sent to Google's servers that isn't the result of deliberate interaction with a mobile device — we're talking passive or background data transfers via cell network, here. "Google designed and implemented its Android operating system and apps to extract and transmit large volumes of information between Plaintiffs' cellular devices and Google using Plaintiffs' cellular data allowances," the complaint claims...

Android users have to accept four agreements to participate in the Google ecosystem: Terms of Service; the Privacy Policy; the Managed Google Play Agreement; and the Google Play Terms of Service. None of these, the court filing contends, disclose that Google spends users' cellular data allowances for these background transfers. To support the allegations, the plaintiff's counsel tested a new Samsung Galaxy S7 phone running Android, with a signed-in Google Account and default setting, and found that when left idle, without a Wi-Fi connection, the phone "sent and received 8.88 MB/day of data, with 94 per cent of those communications occurring between Google and the device." The device, stationary, with all apps closed, transferred data to Google about 16 times an hour, or about 389 times in 24 hours. Assuming even half of that data is outgoing, Google would receive about 4.4MB per day or 130MB per month in this manner per device subject to the same test conditions...

An iPhone with Apple's Safari browser open in the background transmits only about a tenth of that amount to Apple, according to the complaint... Vanderbilt University Professor Douglas C. Schmidt performed a similar study in 2018 — except that the Chrome browser was open — and found that Android devices made 900 passive transfers in 24 hours...

The complaint charges that Google conducts these undisclosed data transfers for further its advertising business, sending "tokens" that identify users for targeted advertising and preload ads that generate revenue even if they're never displayed.

The Internet

The Terrorist Group is Defeated and Routed. But Its Backup Plan Survives (wired.co.uk) 27

The terrorist group is defeated and routed. But its backup plan survives. From a report: It all began on October 27, 2019. Rumour was, Abu Bakr al Baghdadi, the leader of Isis, was dead. Nothing was confirmed, but already the jihadist world online was thrumming with excitement and trepidation. "I was walking through an airport," Moustafa Ayad tells me. "Jet-lagged out of my mind." A deputy director of the counter-extremism think tank Institute of Strategic Dialogue (ISD), Ayad tries to stay on top of the constant struggles and skirmishes, retreats and resurgences between Isis and their many enemies online. That day, as he scrolled through his phone, a blitz of Isis propaganda stared back at him. The digital Jihad was raising a dirge to Baghdadi on Twitter. Flitting from account to pro-Isis account, Ayad noticed something strange. Some accounts carried short, discreet links, not within their tweets, but nestled in their biographies. He clicked.

The link, he realised, was not quite like any other he'd ever followed before. On his phone, Ayad saw folder after folder of meticulously catalogued terrorist content. "I thought it was a joke," Ayad says. "Some kind of scam." In the echoing marbled expanse of Dubai International Airport, on public Wi-Fi, in a Starbucks queue, he had stumbled upon a gigantic, sprawling cache of Isis material. He clicked on a PowerPoint presentation, one of countless now in front of him. "Al Qaeda Airlines", it said: a case study of the mechanics of hijacking planes, making your own chloroform, and the cell structure needed to organise a coordinated terrorist attack. Just then, a dim tannoy announced his flight. Over the weeks that followed, Ayad and his colleagues at the ISD began their journey through the cache. At first glance, the cache looks like a bunch of files on DropBox -- its colour palette an on-brand Isis black-and-white, with a roster of ordinary folders. But the first thing you notice is the size. Its 4,000 folders hold over a terabyte and a half of multimedia multilingual content, spanning Arabic, English, German, French, Spanish, Russian, Bangla, Turkish, and Pashto. "It's a blueprint for terrorism, complete with footnotes" Ayad tells me. "It's everything anyone with an inclination for violence would need to carry out an attack."

The cache's content is a blend of the official products of Isis itself with those of often more obscure precursors, such as the Tawhid wal-Jihad Group, who fought coalition forces in Iraq, and the umbrella organisation of other insurgent groups, Majlis Shura al-Mujahidin. A small amount of it -- just a few per cent by size -- captures in screeds and sermons the ideas of key ideologues of Isis itself. The key personality in the "Fatwas over the Airwaves" folder, for instance, is Turki al Banali, a Bahraini cleric-turned-recruiter who in each episode desperately gives the core concepts of Salafi Jihadism an Isis-friendly spin. Much of the stash, however, simply portrays daily life within Isis, back when the terrorist group still controlled a chunk of territory sitting astride Syria and Iraq. There are school curricula covering the six core subjects that, some estimates believe, were once taught to 130,000 children: English, PE, Arabic, Koranic Studies, Geography & History and a subject called "'ideology", a course of indoctrination in Isis's party lines expounding on the death and destruction awaiting all those who strayed outside of them. It is a mix of the banal and the horrifying -- conjugating verbs and killing the infidels, where early readers learn that "S is for sniper" and "G is for grenade".

Advertising

US Officials Use Mobile Ad Location Data to Study How COVID-19 Spreads (wsj.com) 66

An anonymous reader quotes the Wall Street Journal: Government officials across the U.S. are using location data from millions of cellphones in a bid to better understand the movements of Americans during the coronavirus pandemic and how they may be affecting the spread of the disease...

The data comes from the mobile advertising industry rather than cellphone carriers. The aim is to create a portal for federal, state and local officials that contains geolocation data in what could be as many as 500 cities across the U.S., one of the people said, to help plan the epidemic response... It shows which retail establishments, parks and other public spaces are still drawing crowds that could risk accelerating the transmission of the virus, according to people familiar with the matter... The data can also reveal general levels of compliance with stay-at-home or shelter-in-place orders, according to experts inside and outside government, and help measure the pandemic's economic impact by revealing the drop-off in retail customers at stores, decreases in automobile miles driven and other economic metrics.

The CDC has started to get analyses based on location data through through an ad hoc coalition of tech companies and data providers — all working in conjunction with the White House and others in government, people said.

The CDC and the White House didn't respond to requests for comment.

It's the cellphone carriers turning over pandemic-fighting data in Germany, Austria, Spain, Belgium, the U.K., according to the article, while Israel mapped infections using its intelligence agencies' antiterrorism phone-tracking. But so far in the U.S., "the data being used has largely been drawn from the advertising industry.

"The mobile marketing industry has billions of geographic data points on hundreds of millions of U.S. cell mobile devices..."
Science

Are People With ADHD Better at Creative Tasks? (scientificamerican.com) 75

"ADHD may also bring with it an advantage: the ability to think more creatively," argues a new article in Scientific American: Three aspects of creative cognition are divergent thinking, conceptual expansion and overcoming knowledge constraints... Previous research has established that individuals with ADHD are exceptionally good at divergent thinking tasks, such as inventing creative new uses for everyday objects, and brainstorming new features for an innovative cell phone device. In a new study, college students with ADHD scored higher than non-ADHD peers on two tasks that tapped conceptual expansion and the ability to overcome knowledge constraints. Together with previous research, these new findings link ADHD to all three elements of the creative cognition trio...

ADHD may create difficulties for individuals in many contexts that required focused, sustained attention — such as school, where students are expected to sit still and pay attention. On the other hand, the same distractibility and chaotic mind can give people with ADHD an edge when it comes to creative, original thinking. This new study suggests that ADHD may be especially beneficial when the goal is to create or invent something new without being locked into — and constrained by — old models or conventions.

The innovative, original thinking style of people with ADHD may be a great fit for innovative fields where it's an advantage to be on the cutting edge.

Privacy

An Investigation Into the Smartphone Tracking Industry (nytimes.com) 52

Every minute of every day, everywhere on the planet, dozens of companies -- largely unregulated, little scrutinized -- are logging the movements of tens of millions of people with mobile phones and storing the information in gigantic data files. The Times Privacy Project obtained one such file, by far the largest and most sensitive ever to be reviewed by journalists. It holds more than 50 billion location pings from the phones of more than 12 million Americans as they moved through several major cities, including Washington, New York, San Francisco and Los Angeles. The New York Times: Each piece of information in this file represents the precise location of a single smartphone over a period of several months in 2016 and 2017. The data was provided to Times Opinion by sources who asked to remain anonymous because they were not authorized to share it and could face severe penalties for doing so. The sources of the information said they had grown alarmed about how it might be abused and urgently wanted to inform the public and lawmakers. After spending months sifting through the data, tracking the movements of people across the country and speaking with dozens of data companies, technologists, lawyers and academics who study this field, we feel the same sense of alarm. In the cities that the data file covers, it tracks people from nearly every neighborhood and block, whether they live in mobile homes in Alexandria, Va., or luxury towers in Manhattan.

One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices' owners to the residences indefinitely. If you lived in one of the cities the dataset covers and use apps that share your location -- anything from weather apps to local news apps to coupon savers -- you could be in there, too. If you could see the full trove, you might never use your phone the same way again.

Hardware

Lawmaker Kills Repair Bill Because 'Cellphones Are Throwaways' (vice.com) 139

The New Hampshire State House rejected the Digital Fair Repair Act earlier this week in part thanks to a representative who seems to think that cell phones are literally garbage that no one should bother repairing. From a report: The bill would have forced manufacturers such as Apple to share repair manuals and parts with independent repair stores. House members didn't kill the bill, but sent it back to committee for a year of interim study, citing security concerns and, in the words of Rep. John Potucek (R-Derry) the ubiquity, cheapness, and -- in his opinion -- disposability of new smart phones. "In the near future, cellphones are throwaways," Potucek said, according to New Hampshire Business Review. "Everyone will just get a new one."

That is, of course, the problem that right to repair is trying to solve. The new iPhone 11 costs between $699 and $1,349. And it can be hard to find one at the moment. Google's Pixel 4 costs between $799 and $999. Manufacturers seal smartphones to make it difficult to replace the battery and do basic repairs. Often, getting repairs through the company is so expensive that people simply purchase a new phone. Apple's repair monopoly is so dominant that it's the center of an investigation by the United States House of Representatives' Judiciary Committee.

AI

Credit Scores Based On AI and Your Social Media Profile Could Usher In New Way For Banks To Discriminate (vice.com) 203

Credit scores have a long history of prejudice. "Most changes in how credit scores are calculated over the years -- including the shift from human assessment to computer calculations, and most recently to artificial intelligence -- have come out of a desire to make the scores more equitable, but credit companies have failed to remove bias, on the basis of race or gender, for example, from their system," writes Rose Eveleth via Motherboard.

While credit companies have tried to reduce bias with machine learning and "alternative credit," which uses data like your sexual orientation or political beliefs that isn't normally included in a credit score to try and get a sense for how trustworthy someone might be, Eveleth says that "introducing this 'non-traditional' information to credit scores runs the risk of making them even more biased than they already are, eroding nearly 150 years of effort to eliminate unfairness in the system." From the report: Biases in AI can affect not just individuals with credit scores, but those without any credit at all as non-traditional data points are used to try and invite new creditors in. There is still a whole swath of people in the United States known as the "unbanked" or "credit invisibles." They have too little credit history to generate a traditional credit score, which makes it challenging for them to get loans, apartments, and sometimes even jobs. According to a 2015 Consumer Financial Protection Bureau study, 45 million Americans fall into the category of credit invisible or unscoreable -- that's almost 20 percent of the adult population. And here again we can see a racial divide: 27 percent of Black and Hispanic adults are credit invisible or unscoreable (PDF), compared to just 16 percent of white adults.

To bring these "invisible" consumers into the credit score fold, companies have proposed alternative credit. FICO recently released FICO XD, which includes payment data from TV or cable accounts, utilities, cell phones, and landlines. Other companies have proposed social media posts, job history, educational history, and even restaurant reviews or business check-ins. Lenders say that alternative data is a benefit to those who have been discriminated against and excluded from banking. No credit? Bad credit? That doesn't mean you're not trustworthy, they say, and we can mine your alternative data and give you a loan anyway. But critics say that alternative data looks a lot like old-school surveillance. Letting a company have access to everything from your phone records to your search history means giving up all kinds of sensitive data in the name of credit. Experts worry that the push to use alternative data might lead, once again, to a situation similar to the subprime mortgage crisis if marginalized communities are offered predatory loans that wind up tanking their credit scores and economic stability.

The Almighty Buck

Adult Children Are Costing Many Parents Their Retirement Savings (cbsnews.com) 570

pgmrdlm shares a report from CBS News: Half of American parents are unable to save as much as they'd like to for retirement, and their grown offspring -- whom they still count as dependents -- are to blame, according to a new Bankrate.com study. While they likely mean well, parents who support children into young adulthood often end up encumbered when they reach retirement age. They can inadvertently hamstring their kids, too.

Seventeen percent of the couples surveyed by Bankrate.com said that they sacrificed their own retirement savings by "a lot" to help their adult children. Another 34 percent said they'd "somewhat" sacrificed their savings plans. Not surprisingly, the lowest earners saved the least. Seventeen percent of couples making less than a combined $50,000 a year and have at least one child who is 18 or older said they were helping pay their adult children's bills but not setting aside any money for retirement.
The study found a generational divide when it comes to perceptions of parents supporting adult children. "Millennials between the ages of 23 and 38 believe they should be supported for longer, and expect some expenses, like student loans, to be covered up to the age of 23," reports CBS News. "Baby boomers, meanwhile, think parents should wean children off their bank accounts sooner across almost every category of expense, including cell phone bills, car payments and travel costs." Millennials and baby boomers both agree that young adults by age 23 should be wholly response for bigger ticket expenses like health insurance.

Economic analyst Mark Hamrick says the 2008 financial crisis, Great Recession and lack of substantial wage growth are to blame for this dynamic. Changing societal norms also come in to play, as many young adults are "opting to pursue higher education, thereby delaying their entries into the workforce," the report says. "And by the time these degree-holders enter the workforce, they're saddled with student debt..."
Cellphones

Are Phone-Addicted Drivers More Dangerous Than Drunk Drivers? (axios.com) 170

After crunching data on 4.5 billion miles of driving, road-safety analytics company Zendrive concludes there's a new threat which just last year claimed the lives of 6,227 pedestrians: drivers "under the influence of a smartphone."

The study points out that drunk driving fatalities peak after midnight, while distracted driving happens all day, conluding that distracted driving is now a bigger threat than drunk driving. schwit1 shares this report from Axios: "Phone addicts are the new drunk drivers," Zendrive concludes bluntly in its annual distracted driving study. The big picture: The continued increase in unsafe driving comes despite stricter laws in many states, as well as years of massive ad campaigns from groups ranging from cell phone carriers to orthopedic surgeons. "They hide in plain sight, blatantly staring at their phones while driving down the road," Zendrive says in the study.

And it's a growing problem. Over just the past year, Zendrive, which analyzes driver behavior for fleets and insurers, said the number of hardcore phone addicts doubled, now accounting for one in 12 drivers. If the current trend continues, that number will be one in five by 2022.

The report concludes drivers are 10 percent more distracted this year than last -- and that phone addicts have their eyes off the road for 28% of their drive. Yet when asked to describe their driving, 93% of phone addicts said they believed they were "safe" -- or "extremely safe" -- drivers.

One even insisted that they never texted while driving, "but I like to FaceTime my friends while driving since it makes time go by faster."
Science

Researchers Refine a Device That Can Both Harvest and Store Solar Energy, and They Hope It Will One Day Bring Electricity To Rural and Underdeveloped Areas (theverge.com) 51

An anonymous reader shares a report: The problem of energy storage has led to many creative solutions, like giant batteries. For a paper published today in the journal Chem, scientists trying to improve the solar cells themselves developed an integrated battery that works in three different ways. It can work like a normal solar cell by converting sunlight to electricity immediately, explains study author Song Jin, a chemist at the University of Wisconsin at Madison. It can store the solar energy, or it can simply be charged like a normal battery. It's a combination of two existing technologies: solar cells that harvest light, and a so-called flow battery. The most commonly used batteries, lithium-ion, store energy in solid materials, like various metals. Flow batteries, on the other hand, store energy in external liquid tanks. This means they are very easy to scale for large projects. Scaling up all the components of a lithium-ion battery might throw off the engineering, but for flow batteries, "you just make the tank bigger," says Timothy Cook, a University at Buffalo chemist and flow battery expert not involved in the study. "You really simplify how to make the battery grow in capacity," he adds. "We're not making flow batteries to power a cell phone, we're thinking about buildings or industrial sites.
Crime

Thieves Who Stole GPS Tracking Devices Were Caught Within Hours (nbc4i.com) 95

"These devices kind of look like cell phone chargers, so they probably thought they had some kind of street value," said the co-founder of Roambee, a shipping-monitoring services company, in a classic story shared by a reader: [He's] talking about the hundred or so GPS tracking devices that were stolen recently from the company's Dela Cruz Avenue labs. "The moment we realized they had a box of trackers, we went into recovery mode," Subramanian said. "We notified the police and equipped them to track the devices, and in about 5 or 6 hours, it was done...." It wasn't long before the police were using Roambee's software to locate the devices and the thieves. "We were able to pinpoint the location of these trackers to a warehouse in Union City and two of the devices had gone mobile, and the thieves were driving around with them in the East Bay," Subramanian said. The two men were arrested in Alameda.
Before stealing 100 battery-powered GPS-tracking devices, one of the thieves also grabbed a beer out of the office refrigerator -- and cut themselves -- leaving behind both fingerprints and an actual blood sample.

The company is now using this 2017 episode as an instructive case study. "Roambee wirelessly synced with all 100 devices and remotely set them to stealth mode (so there's no blinking LEDs to alert the thieves) and then switched the location reporting intervals from once every hour to once every minute."
Cellphones

Cell Phone Radiation May Affect Memory Performance In Adolescents, Study Finds (sciencedaily.com) 89

dryriver quotes Science Daily: Radiofrequency electromagnetic fields may have adverse effects on the development of memory performance of specific brain regions exposed during mobile phone use. These are the findings of a study involving nearly 700 adolescents in Switzerland. The investigation, led by the Swiss Tropical and Public Health Institute, will be published on Monday, 23 July 2018 in the peer-reviewed journal Environmental Health Perspectives. The study to be published found that cumulative RF-EMF brain exposure from mobile phone use over one year may have a negative effect on the development of figural memory performance in adolescents, confirming prior results published in 2015.

Figural memory is mainly located in the right brain hemisphere, and association with RF-EMF was more pronounced in adolescents using the mobile phone on the right side of the head. 'This may suggest that indeed RF-EMF absorbed by the brain is responsible for the observed associations.' said Martin Röösli, Head of Environmental Exposures and Health at Swiss TPH.

Government

Signs of Sophisticated Cellphone Spying Found Near White House, US Officials Say (washingtonpost.com) 85

A federal study found signs that surveillance devices for intercepting cellphone calls and texts were operating near the White House and other sensitive locations in the Washington area last year. From a report: A Department of Homeland Security program discovered evidence of the surveillance devices, called IMSI catchers, as part of federal testing last year, according to a letter from DHS to Sen. Ron Wyden (D-Ore.) on May 22. The letter didn't specify what entity operated the devices and left open the possibility that there could be alternative explanations for the suspicious cellular signals collected by the federal testing program last year. The discovery bolsters years of independent research suggesting that foreign intelligence agencies use sophisticated interception technology to spy on officials working within the hub of federal power in the nation's capital. Experts in surveillance technology say that IMSI catchers -- sometimes known by one popular brand name, StingRay -- are a standard part of the tool kit for many foreign intelligence services, including for such geopolitical rivals as Russia and China.
Cellphones

Two Studies Find 'Clear Evidence' That Cellphone Radiation Causes Cancer In Rats (qz.com) 217

An anonymous reader quotes a report from Quartz: [A] pair of studies by the U.S. National Toxicology Program found "clear evidence" that exposure to radiation caused heart tumors in male rats, and found "some evidence" that it caused tumors in the brains of male rats. (Both are positive results; the NTP uses the labels "clear evidence," "some evidence," "equivocal evidence" and "no evidence" when making conclusions.) Tumors were found in the hearts of female rats, too, but they didn't rise to the level of statistical significance and the results were labeled "equivocal;" in other words, the researchers couldn't be sure the radiation is what caused the tumors. The next scientific step will be to determine what this means for humans. The peer-reviewed papers will be passed on to the U.S. Food and Drug Administration, which is responsible for determining human risk and issuing any guidelines to the public, and the Federal Communications Commission, which develops safety standards for cell phones. The FDA was part of the group of federal agencies who commissioned the studies back in the early 2000s.

Ronald Melnick, the NTP senior toxicologist who designed the studies (and who retired from the agency in 2009), says it's unlikely any future study could conclude with certainty that there is no risk to humans from cell phone use. "I can't see proof of a negative ever arising from future studies," Melnick says. He believes the FDA should put out guidance based on the results of the rat studies. "I would think it would be irresponsible to not put out indications to the public," Melnick says. "Maintain a distance from this device from your children. Don't sleep with your phone near your head. Use wired headsets. This would be something that the agencies could do right now."
Quartz notes that when the draft results were published earlier this year, all the results were labeled "equivocal," meaning the study authors felt the data weren't clear enough to determine if the radiation caused the health effects or not. "But the panel of peer reviewers (among them brain and heart pathologists, toxicologists, biostaticians, and engineers) re-evaluated the data and upgraded several of the conclusions to 'some evidence' and 'clear evidence.'"

Slashdot Top Deals