Current Affairs December 2017

Total Page:16

File Type:pdf, Size:1020Kb

Current Affairs December 2017 VISION IAS www.visionias.in CURRENT AFFAIRS DECEMBER 2017 Copyright © by Vision IAS All rights are reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of Vision IAS. 1 www.visionias.in ©Vision IAS Table of Contents 1. POLITY AND CONSTITUTION ___________ 4 3.20. Pradhan Mantri Gram Sadak Yojana Review 1.1. Mission Antyodaya ____________________ 4 ______________________________________ 44 1.2. Municipal Reforms ____________________ 5 3.21. Financial System Stability Assessment 1.3. Special Courts for Trying Politicians ______ 7 (FSSA) and Financial Sector Assessment (FSA) _ 45 1.4. Section 29A of RPA ____________________ 8 4. SECURITY___________________________ 46 1.5. Candidates Contesting from Two Seats____ 9 4.1. NIC-CERT Setup ______________________ 46 1.6. Open Prisons _______________________ 10 4.2. Border protection Grid ________________ 46 1.7. Judicial Accountability & RTI Act ________ 11 4.3. Endo-Atmospheric Interceptor Missile 1.8. Adultery Law to be Revisited ___________ 12 Successfully Test Fired ___________________ 47 1.9. Meghalaya’s Social Audit Law __________ 13 4.4. INS Kalvari _________________________ 47 1.10. Schemes for North Eastern Region _____ 13 4.5. Military Exercises ____________________ 48 2. INTERNATIONAL RELATIONS __________ 15 5. ENVIRONMENT ______________________ 49 2.1. Indian Diaspora Largest in the World ____ 15 5.1. Delhi Air Pollution: Recent Initiatives ____ 49 2.2. India Gets Entry into Wassenaar 5.1.1. Delhi Government Action Plan __________ 49 Arrangement ___________________________ 16 5.1.2. NGT Action Plan to Combat Delhi Air Pollution 2.3. The New US Security Strategy __________ 17 _________________________________________ 49 2.4. US Recognises Jerusalem as Capital of Israel 5.1.3. Centre’s "Air Action Plan - Abatement of Air Pollution in Delhi National Capital Region" ______ 50 ______________________________________ 17 5.1.4. Environment Ministry’s Regional Project to 2.5. International Maritime Organisation (IMO) Tackle Stubble Burning ______________________ 51 ______________________________________ 18 5.2. Excessive Nitrogen in Atmosphere ______ 51 2.6. International Solar Alliance ____________ 19 5.3. Electric Vehicle ______________________ 53 2.7. Maldives and China __________________ 19 5.4. Environment Impact Assessment _______ 54 2.8. US Withdraws from Global Compact on 5.5. Global E-Waste Monitor ______________ 55 Migration ______________________________ 20 5.6. China Launches Nation Carbon Market ___ 56 2.9. Permanent Structured Cooperation on 5.7. Invasive Alien Species ________________ 57 Defence (PESCO) ________________________ 20 5.8. Scheme for Protection of Majuli Island ___ 58 3. ECONOMY _________________________ 21 5.9. Birth Control for Animals ______________ 58 3.1. Strategy on Resource Efficiency ________ 21 5.10. Joint Tiger Census ___________________ 59 3.2. WTO Ministerial Conference 11 ________ 23 5.11. India Awarded by CITES ______________ 59 3.3. Mid-Term Review of Foreign Trade Policy 25 5.12. Cyclone Ockhi ______________________ 60 3.4. Financial Resolution and Deposit Insurance 5.13. Urban Fires ________________________ 61 (FRDI) Bill 2017 _________________________ 26 5.14. Project ‘Blue Flag’ for Beach Clean-up __ 62 3.5. RBI’s Financial Stability Report _________ 28 5.15. Star Rating Protocol for Garbage Free Cities 3.6. Consumer Protection Bill 2018 _________ 29 ______________________________________ 63 3.7. Contract Farming ____________________ 30 6. SCIENCE AND TECHNOLOGY ____________ 64 3.8. Fertilizer Sector _____________________ 32 6.1. Brain Gain: Indian Scientists Returning to 3.9. Energy Access _______________________ 33 India __________________________________ 64 3.10. Methanol Economy _________________ 35 6.2. Free Space Optical Communication ______ 65 3.11. DBT in Power Sector _________________ 36 6.3. Nasa’s Sofia Mission __________________ 65 3.12. Guidelines for Procuring Wind Power ___ 37 6.4. New Matter ‘Excitonium’ Discovered ____ 66 3.13. Sustainable Rooftop Implementation for 6.5. Eminid Meteor Shower _______________ 66 Solar Transfiguration of India (SRISTI) _______ 38 6.6. ITCOOCEAN _________________________ 66 3.14. India Challenges China as World's Biggest 7. SOCIAL _____________________________ 68 LPG Importer ___________________________ 39 7.1. State of The World’s Children 2017 Report 68 3.15. National Highway Investment Promotion 7.2. National Nutrition Mission ____________ 69 Cell ___________________________________ 40 7.3. National Strategic Plan (2017-24) & Mission 3.16. Plans for Backward Districts __________ 41 Sampark _______________________________ 70 3.17. Ship-Breaking Industry _______________ 42 7.4. National Trachoma Survey Report (2014-17) 3.18. Leather Industry ____________________ 43 ______________________________________ 72 3.19. Scheme for Capacity Building in Textiles 7.5. MGNREGS Assessment ________________ 73 Sector _________________________________ 44 7.6. Ganga Gram Project __________________ 73 7.7. Scheme for Inter-Caste Marriages _______ 74 2 www.visionias.in ©Vision IAS 7.8. Minority Tag ________________________ 74 10. MISCELLANEOUS ___________________ 81 7.9. Gaming Disorder ____________________ 75 10.1. Darpan Project _____________________ 81 7.10. Utkrisht Impact Bond ________________ 75 10.2. Kimberly Process Certification Scheme __ 81 8. CULTURE __________________________ 77 10.3. Eco-Niwas Portal ___________________ 81 8.1. Kumbh Mela ________________________ 77 10.4. Public Procurement Portal for MSME ___ 82 8.2. Hornbill Festival _____________________ 77 10.5. Iraq Overtakes Saudi Arabia as India’s 9. ETHICS ____________________________ 79 Biggest Oil Supplier ______________________ 82 9.1. Conflict of Interest ___________________ 79 10.6. Virtual Currency of Venezuela _________ 83 9.2. Ethics of Privacy _____________________ 79 10.7. Sameep ___________________________ 83 3 www.visionias.in ©Vision IAS 1. POLITY AND CONSTITUTION 1.1. MISSION ANTYODAYA Why in News? Example of Convergence of schemes- Department of Rural Development released the ranking of • Dept. of Rural Development’s MNREGA- Gram Panchayats under Mission Antyodaya. for building physical assets, & DAY-NRLM- to create social capital for livelihood Context promotion. • Article 243G of the Indian Constitution mandates • Ministry of Tribal Affairs approved preparation of plans for economic development and social Minimum support price for non-timber forest produce to help tribal people who, justice by Panchayats and through this process Panchayats under DAY-NRLM, collectively coordinate are expected to evolve into institutions of local self- the procurement and payment process. governance. • However, due to multiple layers of planning, administration and resource allocation to tackle deprivations, the efforts are often dispersed in time and space, leading to suboptimal results. • Variance in selection criteria across schemes as well as spatial and temporal mismatch in supporting the same individual/household through government scheme results in different schemes targeting different individuals/households resulting in under-utilization of capacity and sub-optimal outcomes. • Further, despite substantial public investment being made for strengthening rural economy and livelihoods base of the poor; due to multidimensionality of poverty, there is a need to optimize efforts through inter-sectoral approach. • Hence, it is necessary to develop a model framework-along with enhanced financial allocation- based on convergence, accountability and measurable outcomes to ensure that the resources are effectively spent in providing ‘sustainable livelihoods for every deprived household’. Importance of GP level planning • It captures felt local needs and provides better appreciation for local potential and ensures easy access to resources, entitlements and services. • It provides space for integration of people’s knowledge and wisdom into local development efforts. • It responds to differential needs of different groups while mobilizing all the sections and encourages their participation in the local governance. • It helps to forge better bond between the panchayats and local citizens while ensuring responsive governance. • It improves overall service delivery and motivates volunteerism. 4 www.visionias.in ©Vision IAS Framework for Implementation for Mission Antyodaya • The framework makes use of Information & Communication Technology to ensure that the benefits reach those who are most deserving as per SECC Data. • Through a robust Management Information System linked to schemes data bases, it would be possible to ensure end- to-end targeting against defined set of indicators to measure progress against the base line. Ranking of Gram Panchayats • Over 25 Departments and ministries of central and • The broad parameters used are- state governments will be participating in this o Infrastructure Parameters mission. o Economic development and Livelihood • The data from different schemes would be put in o Health, nutrition and sanitation public domain for complete transparency. o Women Empowerment • The states have selected Gram Panchayats o Financial Inclusion (GPs)/clusters which are either GPs with • Tellapur gram panchayat in Telangana has been achievements like ODF, crime/dispute free GPs award found to be the best village in the country winning GPs, or are covered under other schemes.
Recommended publications
  • Microsoft 2012 Citizenship Report
    Citizenship at Microsoft Our Company Serving Communities Working Responsibly About this Report Microsoft 2012 Citizenship Report Microsoft 2012 Citizenship Report 01 Contents Citizenship at Microsoft Serving Communities Working Responsibly About this Report 3 Serving communities 14 Creating opportunities for youth 46 Our people 85 Reporting year 4 Working responsibly 15 Empowering youth through 47 Compensation and benefits 85 Scope 4 Citizenship governance education and technology 48 Diversity and inclusion 85 Additional reporting 5 Setting priorities and 16 Inspiring young imaginations 50 Training and development 85 Feedback stakeholder engagement 18 Realizing potential with new skills 51 Health and safety 86 United Nations Global Compact 5 External frameworks 20 Supporting youth-focused 53 Environment 6 FY12 highlights and achievements nonprofits 54 Impact of our operations 23 Empowering nonprofits 58 Technology for the environment 24 Donating software to nonprofits Our Company worldwide 61 Human rights 26 Providing hardware to more people 62 Affirming our commitment 28 Sharing knowledge to build capacity 64 Privacy and data security 8 Our business 28 Solutions in action 65 Online safety 8 Where we are 67 Freedom of expression 8 Engaging our customers 31 Employee giving and partners 32 Helping employees make 69 Responsible sourcing 10 Our products a difference 71 Hardware production 11 Investing in innovation 73 Conflict minerals 36 Humanitarian response 74 Expanding our efforts 37 Providing assistance in times of need 76 Governance 40 Accessibility 77 Corporate governance 41 Empowering people with disabilities 79 Maintaining strong practices and performance 42 Engaging students with special needs 80 Public policy engagement 44 Improving seniors’ well-being 83 Compliance Cover: Participants at the 2012 Imagine Cup, Sydney, Australia.
    [Show full text]
  • FY15 Safer Cities Whitepaper
    Employing Information Technology TO COMBAT HUMAN TRAF FICKING Arthur T. Ball Clyde W. Ford, CEO Managing Director, Asia Entegra Analytics Public Safety and National Security Microsoft Corporation Employing Information Technology to Combat Human Trafficking | 1 Anti-trafficking advocates, law enforcement agencies (LEAs), governments, nongovernmental organizations (NGOs), and intergovernmental organizations (IGOs) have worked for years to combat human trafficking, but their progress to date has been limited. The issues are especially complex, and the solutions are not simple. Although technology facilitates this sinister practice, technology can also help fight it. Advances in sociotechnical research, privacy, Microsoft and its partners are applying their interoperability, cloud and mobile technology, and industry experience to address technology- data sharing offer great potential to bring state- facilitated crime. They are investing in research, of-the-art technology to bear on human trafficking programs, and partnerships to support human across borders, between jurisdictions, and among rights and advance the fight against human the various agencies on the front lines of this trafficking. Progress is possible through increased effort. As Microsoft shows in fighting other forms public awareness, strong public-private of digital crime, it believes technology companies partnerships (PPPs), and cooperation with should play an important role in efforts to disrupt intervention efforts that increase the risk for human trafficking, by funding and facilitating the traffickers. All of these efforts must be based on a research that fosters innovation and harnesses nuanced understanding of the influence of advanced technology to more effectively disrupt innovative technology on the problem and on the this trade. implications and consequences of employing such technology by the community of interest (COI) in stopping human trafficking.
    [Show full text]
  • Summary Paper on Online Child Sexual Exploitation
    SUMMARY PAPER ON ONLINE CHILD SEXUAL EXPLOITATION ECPAT International is a global network of civil society The Internet is a part of children’s lives. Information organisations working together to end the sexual exploitation of and Communication Technologies (ICT) are now as children (SEC). ECPAT comprises member organisations in over important to the education and social development of 100 countries who generate knowledge, raise awareness, and children and young people as they are to the overall advocate to protect children from all forms of sexual exploitation. global economy. According to research, children and adolescents under 18 account for an estimated one in Key manifestations of sexual exploitation of children (SEC) three Internet users around the world1 and global data include the exploitation of children in prostitution, the sale and indicates that children’s usage is increasing – both in trafficking of children for sexual purposes, online child sexual terms of the number of children with access, and their exploitation (OCSE), the sexual exploitation of children in travel time spent online.2 While there is still disparity in access and tourism (SECTT) and some forms of child, early and forced to new technologies between and within countries in marriages (CEFM). None of these contexts or manifestations are the developed and developing world, technology now isolated, and any discussion of one must be a discussion of SEC mediates almost all human activities in some way. Our altogether. lives exist on a continuum that includes online and offline domains simultaneously. It can therefore be argued that Notably, these contexts and manifestations of SEC are becoming children are living in a digital world where on/offline increasingly complex and interlinked as a result of drivers like greater mobility of people, evolving digital technology and rapidly expanding access to communications.
    [Show full text]
  • Reining in Online Abuses
    Technology and Innovation, Vol. 19, pp. 593-599, 2018 ISSN 1949-8241 • E-ISSN 1949-825X Printed in the USA. All rights reserved. http://dx.doi.org/10.21300/19.3.2018.593 Copyright © 2018 National Academy of Inventors. www.technologyandinnovation.org REINING IN ONLINE ABUSES Hany Farid Dartmouth College, Hanover, NH, USA Online platforms today are being used in deplorably diverse ways: recruiting and radicalizing terrorists; exploiting children; buying and selling illegal weapons and underage prostitutes; bullying, stalking, and trolling on social media; distributing revenge porn; stealing personal and financial data; propagating fake and hateful news; and more. Technology companies have been and continue to be frustratingly slow in responding to these real threats with real conse- quences. I advocate for the development and deployment of new technologies that allow for the free flow of ideas while reining in abuses. As a case study, I will describe the development and deployment of two such technologies—photoDNA and eGlyph—that are currently being used in the global fight against child exploitation and extremism. Key words: Social media; Child protection; Counter-extremism INTRODUCTION number of CP reports. In the early 1980s, it was Here are some sobering statistics: In 2016, the illegal in New York State for an individual to “pro- National Center for Missing and Exploited Children mote any performance which includes sexual conduct by a child less than sixteen years of age.” In 1982, (NCMEC) received 8,000,000 reports of child por- Paul Ferber was charged under this law with selling nography (CP), 460,000 reports of missing children, material that depicted underage children involved and 220,000 reports of sexual exploitation.
    [Show full text]
  • Photodna & Photodna Cloud Service
    PhotoDNA & PhotoDNA Cloud Service Fact Sheet PhotoDNA Microsoft believes its customers are entitled to safer and more secure online experiences that are free from illegal, objectionable and unwanted content. PhotoDNA is a core element of Microsoft’s voluntary business strategy to protect its customers, systems and reputation by helping to create a safer online environment. • Every single day, there are over 1.8 billion unique images uploaded and shared online. Stopping the distribution of illegal images of sexually abused children is like finding a needle in a haystack. • In 2009 Microsoft partnered with Dartmouth College to develop PhotoDNA, a technology that aids in finding and removing some of the “worst of the worst” images of child sexual abuse from the Internet. • Microsoft donated the PhotoDNA technology to the National Center for Missing & Exploited Children (NCMEC), which established a PhotoDNA-based program for online service providers to help disrupt the spread of child sexual abuse material online. • PhotoDNA has become a leading best practice for combating child sexual abuse material on the Internet. • PhotoDNA is provided free of charge to qualified companies and developers. Currently, more than 50 companies, including Facebook and Twitter, non-governmental organizations and law enforcement use PhotoDNA. PhotoDNA Technology PhotoDNA technology converts images into a greyscale format with uniform size, then divides the image into squares and assigns a numerical value that represents the unique shading found within each square. • Together, those numerical values represent the “PhotoDNA signature,” or “hash,” of an image, which can then be compared to signatures of other images to find copies of a given image with incredible accuracy and at scale.
    [Show full text]
  • Lake E≠Ect? a Research Team Explores the Dynamics of Naturally Occurring Greenhouse Gases in the Great Lakes
    STRANGE SCIENCE MOMENTOUS MELIORA! LESSONS IN LOOKING An astrophysicist meets Highlights from a Where poet Jennifer Grotz a Marvel movie signature celebration found her latest inspiration UNIVERSITY OF ROCHESTER /NovembER–DecembER 2016 Lake E≠ect? A research team explores the dynamics of naturally occurring greenhouse gases in the Great Lakes. RochRev_Nov2016_Cover.indd 1 11/1/16 4:38 PM “You have to feel strongly about where you give. I really feel I owe the University for a lot of my career. My experience was due in part Invest in PAYING IT to someone else’s generosity. Through the George Eastman Circle, I can help students what you love with fewer resources pursue their career “WE’RE BOOMERS. We think we’ll be aspirations at Rochester.” around forever—but finalizing our estate FORWARD gifts felt good,” said Judy Ricker. Her husband, —Virgil Joseph ’01 | Vice President-Relationship Manager, Ray, agrees. “It’s a win-win for us and the Canandaigua National Bank & Trust University,” he said. “We can provide for FOR FUTURE Rochester, New York ourselves in retirement, then our daughter, Member, George Eastman Circle Rochester Leadership Council and the school we both love.” GENERATIONS Supports: School of Arts and Sciences The Rickers’ charitable remainder unitrust provides income for their family before creating three named funds at the Eastman School of Music. Those endowed funds— two professorships and one scholarship— will be around forever. They acknowledge Eastman’s celebrated history, and Ray and Judy’s confidence in the School’s future. Judy’s message to other boomers? “Get on this bus! Join us in ensuring the future of what you love most about the University.” Judith Ricker ’76E, ’81E (MM), ’91S (MBA) is a freelance oboist, a business consultant, and former executive vice president of brand research at Market Probe.
    [Show full text]
  • The Power of Public- Private Partnerships in Eradicating Child Sexual Exploitation
    EXPERT PAPER THE POWER OF PUBLIC- PRIVATE PARTNERSHIPS IN ERADICATING CHILD SEXUAL EXPLOITATION ERNIE ALLEN FOR ECPAT INTERNATIONAL Ernie Allen, Principal, Allen Global Consulting, LLC and Senior Advisor with ECPAT International INTRODUCTION Twenty years ago, the first World Congress Against Commercial Sexual Exploitation of Children awakened the world to the depth and extent of the insidious problem of child sexual exploitation. Since then, progress has been remarkable. Through efforts led by a global network to End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes or ECPAT, more victims are being identified; more offenders are being prosecuted; new laws are being enacted; and public awareness has reached its highest level. Yet child sexual exploitation is a bigger problem today than it was twenty years ago and it remains underreported and underappreciated. Further, with the advent of the internet, it has exploded to unprecedented levels. Prior to the internet, people with sexual interest in children felt isolated, aberrant, and alone. Today, they are part of a global community, able to interact online with those with similar interests worldwide. They share images, fantasies, techniques, even real children. And they do it all with virtual anonymity. In 2013, a man in Sweden was convicted of raping children even though it wasn’t in the same country as his victims, when the assault took place How is that possible? He hired men in the Philippines to obtain children as young as five and assault them while he directed the action and watched via webcam from the comfort of his home. Swedish authorities called it ‘virtual trafficking.’ 1 Last year, law enforcement in the United • The Netherlands has worked with social Kingdom arrested 29 people for the use media including Twitter to remove child of children in Asia as young as six for exploitation images quickly.
    [Show full text]
  • Photodna Cloud Service Customer Presentation Deck
    ___________________________________________________________________________ 2018/TEL58/LSG/IR/005 Session: 2 Microsoft Digital Crimes Unit Submitted by: Microsoft Roundtable on Best Practice for Enhancing Citizens’ Digital Literacy Taipei, Chinese Taipei 1 October 2018 1 in 5 girls will be sexually abused 1 in 10 boys 500 images of sexually abused children will be traded online approximately every 60 seconds. www.microsoft.com/photodna PhotoDNA Cloud Service: An intelligent solution for combatting Child Sexual Abuse Material (CSAM) in the Enterprise Secure Efficient Interoperability Images are instantly converted Reduce the cost Integrate via REST API on any to secure hashes and cannot be and increase the speed of platform or environment. recreated. Images are never detecting and reporting child retained by Microsoft. sexual exploitation images. Reporting: For U.S.‐based customers, the PhotoDNA Cloud Service provides an API to submit reports to the National Center for Missing and Exploited Children. Internationally based customers will need to determine how to submit reports on their own. Microsoft does not provide advice or counsel related to these legal requirements or obligations. Visit www.Microsoft.com/photodna webpage and select “Apply” 8250753738743… 3425594688810… Identify images to 9381614543396… verify 7970619785740… Compute PhotoDNA Hashes 6355281102230… 1018650324653… for all images 6913585438775… 9469898399124… 8435970367851… 9092468906255… Compare to hashes in the database Takes care of most of the necessary functions 8253738743…
    [Show full text]
  • Building a Better Mousetrap
    ISN_FINAL (DO NOT DELETE) 10/24/2013 6:04 PM SUPER-INTERMEDIARIES, CODE, HUMAN RIGHTS IRA STEVEN NATHENSON* Abstract We live in an age of intermediated network communications. Although the internet includes many intermediaries, some stand heads and shoulders above the rest. This article examines some of the responsibilities of “Super-Intermediaries” such as YouTube, Twitter, and Facebook, intermediaries that have tremendous power over their users’ human rights. After considering the controversy arising from the incendiary YouTube video Innocence of Muslims, the article suggests that Super-Intermediaries face a difficult and likely impossible mission of fully servicing the broad tapestry of human rights contained in the International Bill of Human Rights. The article further considers how intermediary content-control pro- cedures focus too heavily on intellectual property, and are poorly suited to balancing the broader and often-conflicting set of values embodied in human rights law. Finally, the article examines a num- ber of steps that Super-Intermediaries might take to resolve difficult content problems and ultimately suggests that intermediaries sub- scribe to a set of process-based guiding principles—a form of Digital Due Process—so that intermediaries can better foster human dignity. * Associate Professor of Law, St. Thomas University School of Law, inathen- [email protected]. I would like to thank the editors of the Intercultural Human Rights Law Review, particularly Amber Bounelis and Tina Marie Trunzo Lute, as well as symposium editor Lauren Smith. Additional thanks are due to Daniel Joyce and Molly Land for their comments at the symposium. This article also benefitted greatly from suggestions made by the participants of the 2013 Third Annual Internet Works-in-Progress conference, including Derek Bambauer, Marc Blitz, Anupam Chander, Chloe Georas, Andrew Gilden, Eric Goldman, Dan Hunter, Fred von Lohmann, Mark Lemley, Rebecca Tushnet, and Peter Yu.
    [Show full text]
  • Microsoft and the UN Sustainable Development Goals
    Microsoft and the UN Sustainable Development Goals September 2017 Introduction and Context Microsoft’s mission — to empower every person and every organization on the planet to achieve more — aligns strongly with the United Nation’s global agenda for sustainable development from 2015 through 2030. The UN General Assembly articulated that agenda in a set of 17 Sustainable Development Goals (SDGs) seeking to end poverty, protect the planet, and ensure prosperity for all. Each of the United Nation’s goals present challenges bigger than any one organization, or even one sector of society can accomplish alone. At Microsoft, we seek to apply the unique assets that a technology company of our scope and scale has towards the global, multi-sector effort needed to achieve the SDGs. Doing so is both our responsibility and an opportunity to advance societal needs and technology at the same time collaboratively. Microsoft’s commitment to corporate social responsibility requires us to be thoughtful about the impact of our business practices and policies. We believe the way we operate helps contribute to many of the UN SDGs, ranging from our employment practices to our commitments to source renewable energy to the work we do to infuse responsibility across our global supply chain. This white paper focuses on what we feel are our unique contributions: • the application of Microsoft’s products and services to the SDGs, and • our philanthropic and other investments targeted towards fostering the sustainable development of communities around the world. Similarly, while Microsoft’s efforts are helping advance progress towards meeting the broad range of issues covered by all 17 SDGs, we have prioritized 8 SDGs to ensure we leverage our assets for the greatest impact.
    [Show full text]
  • EPIC-Amicus-US V. Miller
    No. 18-5578 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT UNITED STATES OF AMERICA Plaintiff-Appellee, vs. WILLIAM J. MILLER, Defendant-Appellant. On Appeal from tHe United States District Court for the Eastern District of Kentucky Case No. 2:16-cr-00047-1 The Hon. David L. Bunning BRIEF OF AMICUS CURIAE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) IN SUPPORT OF APPELLANT Marc Rotenberg Counsel of Record Alan Butler Electronic Privacy Information Center 1718 Connecticut Avenue, N.W. Suite 200 WasHington, DC 20009 (202) 483-1140 October 17, 2018 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT Disclosure of Corporate Affiliations and Financial Interest Sixth Circuit Case Number: 18-5578 Case Name: United States v. Miller Name of counsel: Alan Butler Pursuant to 6th Cir. R. 26.1, Electronic Privacy Information Center Name of Party makes the following disclosure: 1. Is said party a subsidiary or affiliate of a publicly owned corporation? If Yes, list below the identity of the parent corporation or affiliate and the relationship between it and the named party: No. 2. Is there a publicly owned corporation, not a party to the appeal, that has a financial interest in the outcome? If yes, list the identity of such corporation and the nature of the financial interest: No. CERTIFICATE OF SERVICE I certify that on ____________October_______ 17,_______ 2018___________ the foregoing document was served on all parties or their counsel of record through the CM/ECF system if they are registered users or, if they are not, by placing a true and correct copy in the United States mail, postage prepaid, to their address of record.
    [Show full text]
  • Practical Use of Approximate Hash Based Matching in Digital Investigations
    Digital Investigation 11 (2014) S18–S26 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin Practical use of Approximate Hash Based Matching in digital investigations Petter Christian Bjelland*, Katrin Franke, André Årnes 1 Norwegian Information Security Laboratory (NISlab), Gjøvik University College, Norway abstract Keywords: Approximate Hash Based Matching (AHBM), also known as Fuzzy Hashing, is used to Digital forensics identify complex and unstructured data that has a certain amount of byte-level similarity. Approximate Matching Common use cases include the identification of updated versions of documents and Evidence analysis fragments recovered from memory or deleted files. Though several algorithms exist, there Data discovery has not yet been an extensive focus on its practical use in digital investigations. The paper Malware forensics addresses the research question: How can AHBM be applied in digital investigations? It fo- cuses on common scenarios in which AHBM can be applied, as well as the potential sig- nificance of its results. First, an assessment of AHBM for digital investigations with respect to existing algorithms and requirements for efficiency and precision is given. Then follows a description of scenarios in which it can be applied. The paper presents three modes of operation for Approximate Matching, namely searching, streaming and clustering. Each of the modes are tested in practical experiments. The results show that AHBM has great potential for helping investigators discover information based on data similarity. Three open source tools were implemented during the research leading up to this paper: Autopsy AHBM enables AHBM in an existing digital investigation framework, sddiff helps under- standing AHBM results through visualization, and makecluster improves analysis of graphs generated from large datasets by storing each disjunct cluster separately.
    [Show full text]