For track and field, novelty races don’t serve bigger goal of keeping the sport in spotlight CBC.ca
source
NASA space telescopes give Christmas Tree Cluster a festive makeover (photos) – Space.com
Dietary Supplement Companies Are Making False Claims, FDA and FTC Warns – diaTribe Foundation
Dietary Supplement Companies Are Making False Claims, FDA and FTC Warns diaTribe Foundation
source
How to watch and listen to Florida vs Tulane Gasparilla Bowl game: Live stream, TV channel, and start time – Goal.com
Everything you need to know on how to watch Florida vs Tulane Gasparilla Bowl game – team news, stream, TV, and start time.
Two teams with contrasting trajectories will lock horns in the 2024 Union Home Mortgage Gasparilla Bowl on Friday in Tampa, Florida.
Here, GOAL brings you everything you need to know about how to watch and listen to the Florida Gators vs Tulane Green Wave Gasparilla Bowl game, plus plenty more.
The Gators will take on the Green Wave in a highly anticipated Gasparilla Bowl game on Friday, December 20, 2024, at 3:30 pm ET/ 12:30 pm PT, at Raymond James Stadium in Tampa, Fla.
TV channel: ESPN2
Streaming service: FuboTV
Unable to watch this game due to broadcast restrictions? A VPN could be the answer to your problems.
NordVPN is our pick for the best VPN service in 2024 when streaming live sports. You can even try NordVPN risk-free with a 30-day money-back guarantee.
Audio Stream: National: 204 (CAR), 966 (NE)
SiriusXM allows you to stream NCAA games throughout the season, including live coverage of college football games with home and away feeds for every team.
Hear exclusive interviews with players and coaches, plus expert analysis from the top names in sports radio. Listeners will need either a Platinum or Streaming Platinum plan.
The Florida Gators enter the bowl game with their tails up, riding a wave of momentum after winning three straight. They nearly pulled off an upset against Tennessee in an overtime thriller in October. Florida capped off the regular season with a commanding 31-11 win over Florida State.
Freshman quarterback DJ Lagway has been the go-to option under center. He threw for 180 yards against Ole Miss and added 133 yards in the victory over Florida State. Over the season, Lagway has accumulated 1,610 passing yards and an 11:7 touchdown-to-interception ratio. Florida initially started the year with Graham Mertz as QB1, but he suffered an early-season injury.
The Gators' ground game has been a bright spot, with Jadan Baugh delivering consistent performances. The freshman running back has tallied 65 or more rushing yards in five of his last six games, bringing his season total to 603 yards. Senior RB Montrell Johnson Jr. has also made his mark with 593 yards, surpassing 100 yards twice. In the receiving corps, senior wide receiver Elijhah Badger is the top target, boasting 789 yards on the season, including a 148-yard explosion against Kentucky. Chimere Dike follows closely with 687 yards. Florida's offense, however, has struggled for consistency, scoring 24 or fewer points in three of their last five games while averaging 375 yards per game.
The Tulane Green Wave are eager to move past the sting of their AAC Championship loss and shift their focus to the Gasparilla Bowl. Despite the recent setbacks, Tulane has put together a remarkable season. Following a slow start, which included a loss to Oklahoma, the team found its stride, rattling off an impressive eight-game winning streak. However, the momentum faded with a defeat to Memphis in the regular-season finale and a 35-14 loss to Army in the conference title game.
Freshman quarterback Darian Mensah has been a standout this season, amassing 2,723 passing yards and an impressive 22:6 touchdown-to-interception ratio. Unfortunately, Mensah entered the transfer portal and won’t feature in this game, leaving junior QB Ty Thompson to step in.
Thompson, who spent three seasons as a backup at Oregon, has only attempted 11 passes for 74 yards with Tulane this season.
Expect Tulane to lean heavily on their ground attack, spearheaded by Makhi Hughes. The sophomore running back has surpassed the 100-yard mark in five of his last eight outings and has totaled 1,372 rushing yards on the season. In the passing game, Mario Williams could play a pivotal role after racking up 109 yards in the loss to Army, bringing his season total to 940 receiving yards.
Senior wideout Dontae Fleming is another threat, contributing 585 yards this year. Tulane’s offense has been potent, scoring at least 34 points in eight games and averaging 421 yards per contest.
College football 2024: Top 5 favorites for Heisman Trophy
Coin Master: Check Out Links to Free Spins and Coins December 18, 2024 – India Today Gaming
Are you also a fan of Coin Master? You're in luck if the answer is yes! Moon Active has introduced several links that offer free spins for the game today, December 18, 2024. Return daily to receive daily links and take advantage of additional in-game strategies to continue earning rewards. To get your free incentives, you must know the following
A total of 75 bonus spins are offered by these connections. Remember to claim these links as soon as you can because they expire after 36 hours. Free spins are awarded via each link only once per account.
Also Read: Garena Free Fire MAX Redeem Codes for December 18, 2024 are Deployed, Grab All the Rewards
The most ingenious way to advance in the game without using any real money is to claim coins and free spins in Coin Master.
Conclusion of Copyright Office’s Report on Artificial Intelligence Delayed Until 2025 – The National Law Review
60
Analysis | What’s an axolotl? Why obscure animals rule kids’ world. – The Washington Post
Analysis | What’s an axolotl? Why obscure animals rule kids’ world. The Washington Post
source
A strategic approach to protecting corporate executives – SecurityInfoWatch
Since the release of the video footage showing the shooting of UnitedHealthcare CEO Brian Thompson on December 4, many security professionals in the media have pointed out potential security failures that may have made it easier for the killer to carry out this horrific crime. While many facts of the case are still being processed, we know at a minimum that Thompson was walking alone without a security detail despite having received recent threats and was targeted by the killer. Shooting suspect Luigi Mangione was arrested in Altoona, Pa., on December 9. In time, we’ll learn more about what other security lapses could have contributed. Still, for now, this tragic event has driven corporations and the public to consider the necessity of robust executive security programs.
Unfortunately, in the time since the murder, we have borne witness to a disturbing tolerance – even encouragement – of violence across swaths of the American populace. Many are celebrating the suspect as a hero across social media. According to the Network Contagion Research Institute, following Thompson’s killing, a surge of highly engaged posts across social media, generating impressions in the tens of millions, glorified the incident and called for additional acts of violence. Merchandise went for sale online, including hats, T-shirts, and pint glasses bearing the words “delay,” “deny,” and “defend” – the same words etched on the killer’s bullet casings. Wanted Posters for other executives have been hung on the streets of New York City, some show Thompson’s face with an “X” to indicate that he is the first “villain” to be eliminated.
This vitriol has heightened the threat of violence against corporate executives across a wide range of industries and is driving companies to enhance security measures for their top executives. According to reports, some health insurers are temporarily closing their headquarters out of an abundance of caution. Others are adding or expanding armed security protection for executives and reducing or deleting executives’ digital footprints. While some of these measures may be short-term, the impact of this event should drive companies to take a hard look at the threats facing their top executives. The board of directors will likely weigh in and demand more investment to implement appropriate security measures.
The hard truth is that short-term security surges or simply hiring a security detail are more performative than substantive, and security theater is more than actual security. These quick and easy fixes are not a substitute for a well-planned executive protection (EP) program that is thoughtfully designed and horizontally integrated with other security functions, including intelligence, physical security, cyber security, and crisis management, supported by clear policies, procedures, and training.
The hard truth is that short-term security surges or simply hiring a security detail are more performative than substantive, and security theater is more than actual security.
Unfortunately, there is presently no industry standard for executive protection. This makes the design of an EP program less straightforward. However, the Board of Executive Protection Professionals is developing a standard and hopes to have one approved by the American National Standards Institute (ANSI) sometime next year. In the meantime, many best practices are available, which any future Standard will likely codify. Throughout my forty years as a senior security executive, I was able to draw upon many of these practices and successfully apply them when building EP programs for my organizations.
Threat assessment is the critical first step in any EP program. Identifying credible threats to senior executives—both at program initiation and continuously—determines the appropriate scope of the EP program, the level of protection needed for certain executives, and whether protection should extend to certain less senior employees or family members.
Continuous threat assessment should take into account all possible risks to the executive and consider risk factors related to the executive, such as their public profile and organizational or political affiliations; factors related to the company, such as controversial products and practices, corporate downsizing, negative media, and past or pending criminal, civil or regulatory issues; and factors related to the broader environment, such as political turbulence, geopolitical dynamics, macroeconomic hardships, and emerging trends and technologies.
Threat assessment should be complemented by vulnerability assessment, which involves reviewing a wide range of locations and activities undertaken by the executive daily. These include the executive’s workplace, homes, travel itineraries, transportation, family, children’s schools, digital footprint, media appearances, and corporate and public events attendance.
Attacks against corporate executives can have dire consequences not only for the executives and their loved ones but also for the financial and operational stability of the company. Therefore, updates on the risk environment should not be shared only with the security team but also put on the radar of the C-suite and Board as appropriate.
You can build a comprehensive EP program based on a solid assessment of the threats and vulnerabilities. These programs typically cover various preventative measures to provide a 360-degree defense-in-depth of the executive. While not a complete list, the following are some areas for consideration when evaluating your EP requirements and building a program. All should be based on continuous risk assessment.
· Physical Security: EP programs should include written standards for protecting executive office suites and residents. Standards should outline the application of electronic security, remote monitoring, bullet-resistant doors and windows, panic rooms, and the use of security personnel. Guidelines should also be developed for secure transportation to and from the office using trained drivers and hardened vehicles.
· Event Security: Procedures for securing executives at high-profile corporate or public events should be developed. These should include assessing threats and ensuring coordination between security teams, event planners, venue security, and law enforcement to identify vulnerabilities and required security measures.
· Travel Security: A travel security program should be in place to identify and analyze threats within the visited locations. Considerations for additional security on the ground should include aviation security (private aircraft), secure ground transportation, hotel security, and measures to protect the executive and organization from espionage. Travel security services that provide traveler tracking capabilities and medical or security evacuation services should be considered. Emergency and communication protocols for travel emergencies should include coordinating with law enforcement, embassies, emergency services, and other stakeholders to ensure rapid response to potential threats, enable emergency evacuations, and ensure effective 24/7 communications during emergencies.
· Digital Footprint: Executives’ digital footprints should be reviewed to limit public information and photos of their home location and layout, family trips, children’s schools/camps/sporting events, memberships, and any other information that could be used by individuals seeking harm.
· Crisis Management: All companies should have emergency response and incident management procedures in place to deal with elevated threats or actual incidents that may occur. This should also include guidelines for responding to incidents involving kidnap-for-ransom events.
· Training and Awareness: Security training and awareness should be developed and provided to executives, administrative staff, and families. Depending on the executive and the environment, this may include tactical skills, counter-surveillance, survival skills, emotional and psychological preparedness, cybersecurity awareness, and other forms of training.
· Vendor Analysis: Companies should carefully analyze existing and potential EP vendors – including armed security personnel services, intelligence services, electronic security integrators, cyber protection firms, travel security services, and executive car services – to ensure professional, discreet, and cost-effective service. This vendor analysis must be informed by a current understanding of the threat to ensure contracted services are purpose-fit to the organization and do not create unnecessary costs.
In the days following any crisis – certainly one that has received the media attention of the Thompson murder – it can be tempting to make quick and reactive decisions. Hire a security detail. Take the executives’ photos off the website. Lock down the HQ. However, these measures are scaled back in the following weeks and months – judged too invasive or costly to maintain. A better approach is thoughtful, strategic, and methodical – doing things the right way, not the easy way. For that, companies will need to take a deeper and more time-intensive look at their organization, their culture, and their budget to build an EP program that lasts.
Rick Mercuri is Senior Advisor for Corporate Security at Rebel Global Security. Rick has served as senior security executive at two of the largest U.S. banks. For four decades in corporate security, Rick has demonstrated strong leadership and strategic decision-making for global and domestic organizations. Rick is a trusted advisor to C-level executives and a thought leader with expertise in mitigating complex physical security risks and developing threat intelligence capabilities. Rick is a Certified Protection Professional (CPP).
Humanity’s fate must not be left to algorithms, UN chief tells Security Council – UN News
Facebook Twitter Print Email
The UN Secretary-General on Thursday urged the Security Council to act decisively to establish international guardrails for artificial intelligence (AI), warning that delays could heighten risks to global peace and security.
Addressing ministers and ambassadors, António Guterres warned that rapid developments in AI are outpacing humanity’s ability to govern it, raising important questions about accountability, equality, safety and human oversight in decision-making.
“Every moment of delay in establishing international guardrails increases the risk for us all,” Mr. Guterres said.
“No country should design, develop, deploy or use military applications of AI in armed conflict that violate international humanitarian and human rights laws. That includes relying on AI to select or engage targets autonomously.”
He also underscored that geopolitical competition over emerging technologies must not destabilize international peace and security.
In his address, Mr. Guterres highlighted the dual-edged nature of AI, noting its potential to predict displacements caused by climate change or detect landmines. However, its integration into military systems and its misuse in digital security poses great risks.
“Recent conflicts have become testing grounds for AI military applications,” he said, citing AI use in autonomous surveillance, predictive policing and even reported life-and-death decisions.
Particularly alarming, he underscored, is the potential integration of AI with nuclear weapons and the advent of quantum-AI systems that could destabilize global security.
“The fate of humanity must never be left to the ‘black box’ of an algorithm,” he stated, stressing the importance of human control over decisions involving the use of force.
The role of AI in the information domain is another area of concern, Mr. Guterres said, pointing to how deepfakes and AI-generated disinformation can manipulate public opinion, trigger crises and erode trust in societies.
He also drew attention to the environmental risks of AI, highlighting the resource-intensive nature of data centres and geopolitical competition over critical minerals needed for AI technology.
“Unprecedented global challenges call for unprecedented global cooperation,” he said, calling for collaborative efforts to ensure AI benefit everyone and does not exacerbate inequality.
Mr. Guterres outlined recent steps toward establishing global governance for AI, including the adoption of the UN Global Digital Compact at the Summit of the Future, and two key resolutions at the General Assembly on enhancing global cooperation and capacity-building.
A third resolution – focusing on AI in the military domain – is due to be considered by the General Assembly in the coming days.
Concluding his address, Mr. Guterres reiterated his call for banning lethal autonomous weapons, he said, urging the Security Council to lead by example in preventing the militarisation of AI in ways that destabilize international peace and security.
“I urge you all to join forces to build a safe, secure and inclusive AI future.”
An alarming surge in ransomware attacks is putting the world’s healthcare infrastructure at critical risk, endangering patient safety and destabilising health systems, the head of the UN World Health Organization (WHO) warned on Friday, as the Security Council convened to discuss strategies to counter the growing threat.
The UN Security Council on Monday explored the dual-edged nature of rapid technological advancements – ranging from artificial intelligence to neurotechnology – highlighting both groundbreaking solutions and emerging risks to global peace and security.
Facebook Twitter Print Email