Set as Homepage - Add to Favorites

成人午夜福利A视频-成人午夜福利剧场-成人午夜福利免费-成人午夜福利免费视频-成人午夜福利片-成人午夜福利视

【gay sex woman video】Enter to watch online.It's time to start thinking about cybersecurity for sharks. Yes, the fish.

In 2015,gay sex woman video three scientists sent an anguished note to the journal Conservation Letters.

Anti-shark paranoia was settling over Western Australia, and the state government had issued a controversial kill order. Scientists said the cull's safety benefits were unproven and could potentially hurt recovering populations of white sharks. Worse, they claimed at least one shark marked for death was located only because it had been acoustically tagged by researchers.

The policy was eventually abandoned, but it highlighted an important point: Fitting animals with transmitters so scientists can track their every movement may also leave them vulnerable. Technology that's ostensibly there to help these species thrive can actually be used against them.

SEE ALSO: What would animals say if tech let them talk? Nothing good, probably.

Steven Cooke, director of the Institute of Environmental Science at Canada's Carleton University, wants researchers to start thinking about these unintended consequences.

The lead author of a recent paper about the potential risks of animal tracking in Conservation Biology, he admitted there's been little data collected on the topic. Nevertheless, the research is a "call to action," Cooke said.

Tracking technology has been good for science, but there are risks, too. Whether it's the government demanding the whereabouts of predators or poachers looking to hunt endangered species, scientists must ensure animal tracking data doesn't fall into the wrong hands.

Mashable ImageA satellite-linked transmitter is visible on the dorsal fin of L87, an orca from the southern resident group of killer whales, while swimming in Puget Sound in view of a state ferry west of Seattle. Credit: Uncredited/AP/REX/Shutterstock

Getting the technology in order

Tracking technology offers a wealth of information about an animal's habits and movements -- datasets that might be valuable to poachers as well as scientists.

Advanced Telemetry Systems (ATS) in Minnesota is one of several global companies that makes animal tracking tags.

"We put transmitters on bees, crayfish, just about any kind of fish out there," said Joseph Allen, a sales manager at ATS. "Any kind of bird besides sea birds, large wildlife -- anything."

At ATS, there are two main tracker types, he explained: VHF tracking and GPS tacking.

The first allows researchers to use a radio scanner to hear and locate an animal that's been fitted with a tag. The second employs satellite tracking to locate animals wearing GPS tags or collars. Typically, this GPS information is stored on a secure website.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!
Mashable ImageVeterinary teams monitor the condition of a tranquilized wild elephant in Kenya so it can be fitted with a GPS-tracking collar to monitor migration routes and to help prevent poaching. Credit: Ben Curtis/AP/REX/Shutterstock

While rare, both forms of tracking may allow animals to be hunted down by people with bad intentions.

"[VHF tracking] would be relatively easy for anybody who has a radio receiver to try and find an animal that way," Allen admitted. "It's not very difficult."

It's so easy, in fact, that Parks Canada banned the use of radio receivers in a number of mountain parks in 2016, CBC reported, after photographers were apparently using them to track down collared elk and bears.

While the GPS information is harder to access, it's not impossible. In one infamous 2013 case, hackers reportedly tried to access the email of one Indian researcher in order to pinpoint the location of an endangered Bengal tiger wearing a GPS collar.

Still, Allen said the hacking of animal tracking data was not something his team was too concerned about. ATS has not been fielding concerned calls from customers about intercepted radio signals, either.

"I'm sure it's probably happened, but we don't know of any particular instances that we've been informed about," he said.

Protecting the data

Once an animal's location has been collected from the field, it's only passed the first safety hurdle.

Just who can see an animal's tracking data is something Rob Harcourt thinks about. He leads the Integrated Marine Observing System's (IMOS) animal tracking facility in Australia. A government-funded group, IMOS assists with "the tagging of any species people want to tag."

He helped author that 2015 letter about the fate of tagged sharks in Western Australia, and at IMOS, the incident prompted the group to take new steps to protect shark data.

Typically, IMOS data is publicly available, but the group recently introduced a "protected" category that keeps that location information hidden from all but a few select people.

Mashable ImageA pair of seven and a half week old Golden Eagle chicks sit on their nest after being GPS satellite tagged at a remote nest site near Loch Ness on June 27, 2015 in the Highlands, Scotland. Credit: Getty Images

"It's in the database, but no one can see it apart from the owner of the tags, and that is to protect sensitive species which might be under threat," Harcourt explained. "It's only been enacted once, and that was for the white shark."

"There are certain circumstances where not everybody behaves responsibly," he added. "So we were trying to protect animals from unethical behavior by particular groups."

Ultimately, Cooke wants researchers to start thinking about things like encryption and other forms of data security: "We often demand data be shared and details of study sites to be revealed -- this needs to be balanced with risk."

His message is that tagging is a vital research tool for scientists. Cooke just aims to make it safe for animals, too.


Featured Video For You
This gene-editing technology has the potential to bring back the woolly mammoth

0.1976s , 14451.1484375 kb

Copyright © 2025 Powered by 【gay sex woman video】Enter to watch online.It's time to start thinking about cybersecurity for sharks. Yes, the fish.,  

Sitemap

Top 主站蜘蛛池模板: 福利区在线观看 | 晚上福利视频 | 国产人妖视频在线观看 | 日韩国产专区 | 精品免费囯产一区二 | 天天看片夜夜操 | 国产视频不卡 | 一夜七次郎首页视频 | 丰满少妇一区二区 | 亚洲无码卡一卡二 | 日韩桃色激情综合 | 成人三级在线看 | 久久精品视频2025 | 欧美精品精品一区 | 蜜桃瑟瑟网 | 夜夜操夜夜操 | 成人福利视频 | 九一精品 | 亚洲欧美综合 | 欧美日韩精品一区 | 三级黃色男人的天堂 | 国产小伙嫖妓流出播放 | 成人免费三及片 | 日韩中文字母aⅴ | 国产做爱视频网站18 | 日韩伦理在线免费观看 | 成人在线毛片 | 日韩精品伦理 | 日韩欧美成综合 | 欧美午夜精品 | 偷拍自拍区 | 三级毛片蜜臀AV | 日韩大片在线观看入口 | 成人动漫免费视频 | 日韩免费福利一区八区 | 国产丝袜美腿 | 日韩午夜免费视频 | 国产不卡在线观 | 上床啪啪啪在线网站 | 无码孕妇一区二区三区 | 岛国毛片 |