Home Tags Scotland

Tag: Scotland

Natural Power adds to Heat Network Consultant status

Natural Power’s Senior Renewable Heat Engineer, Guy Milligan, has joined the Chartered Institution of Building Services Engineers (CIBSE) Certification Register of Heat Network Consultants following his training and exam success. He joins his colleague, Steve Smith, who was officially accepted as the first Scottish-based CIBSE registered Heat Network Consultant last year.

Guy said: “We expect Scotland to increase its involvement in district heating networks as a key area of focus to help meet Government targets.... Source: RealWire

Royal Navy’s newest ship formally named in Glasgow yard

HMS Forth, like the bridge The Royal Navy’s newest warship, offshore patrol vessel HMS Forth, has been formally named in a ceremony held in Scotland.…

Shocking crime surge – THE TRUTH: England, Wales stats now include...

'More realistic picture' we're told Crime stats for England and Wales have shown a huge year-on-year increase.

Don't panic, though: it's due to the inclusion of fraud and computer misuse offences for the first time. In a report published this week, the UK Office for National Statistics (ONS) reckoned there were 6.2 million reported incidents of crime in the 12 months to September 2016 in England and Wales, and that this figure is virtually unchanged from the previous year. Crucially, the beancounters have now thrown fraud and hacking crimes into the mix. When the criteria for what's included in the stats were drawn up decades ago, "fraud was not considered a significant threat and the internet had yet to be invented," said the ONS's John Flatley. Obviously, that's no longer the case. When you include 3.6 million cases of fraud and 2 million computer misuse offences, that 6.2 million figure jumps to 11.8 million.

That's a 90 per cent surge in illegal activity. Of course, adding a positive integer to another positive integer results in a bigger positive integer (barring an arithmetic overflow). No surprise there. However, the fact that computer crime and fraud are now being included may make people and organisations more aware of the threat, according to Huntsman Security. Piers Wilson, head of product management at Huntsman, told us: “Including cybercrime in regular crime figures might lead to a dramatic increase this year, but over time it can only be a good thing. We will get a much more realistic picture of the extent of such crimes, leading to a greater understanding of how to identify, prioritise and address them.” ONS crime reports have been produced every year for the past 35 years.

The stats covers England and Wales – and not Scotland and Northern Ireland because the latter two maintain separate judicial and policing regimes. ® Sponsored: Next gen cybersecurity.
Visit The Register's security hub

Assange weasels out of pledge to surrender if Manning received clemency

EnlargeCarl Court, Getty Images reader comments 61 Share this story Julian Assange, the WikiLeaks founder, backed out of his pledge Wednesday that he would surrender to US authorities if President Barack Obama granted clemency to Chelsea Manning. Manning, a whistleblower serving a 35-year-sentence for leaking classified material to WikiLeaks as an army private, had her sentence commuted by President Barack Obama on Tuesday.
Instead of being released in 2045, Obama said Manning could leave military detention May 17. But just days before the commutation, WikiLeaks tweeted that Assange—who is living in a self-imposed exile in the Ecuadorian Embassy in London amid fears he could be charged in the US for exposing the secrets Manning leaked—tweeted, "If Obama grants Manning clemency Assange will agree to US extradition despite clear unconstitutionality of DoJ case." As recently as Tuesday, WikiLeaks said that Assange "stands" by the promise. But on Wednesday, Assange's lawyer blinked and said no dice—that Assange would not honor his statement.

The lawyer announced a new caveat that was not stated in WikiLeaks' original statement, leading many to speculate that Assange's offer wasn't genuine. "Mr.

Assange welcomes the announcement that Ms. Manning's sentence will be reduced and she will be released in May, but this is well short of what he sought," Barry Pollack, Assange’s U.S.-based attorney, told The Hill. "Mr.

Assange had called for Chelsea Manning to receive clemency and be released immediately," Pollack added. On Wednesday, meanwhile, Obama said he did not take into consideration Assange's original pledge when deciding to grant clemency to Manning, who has been imprisoned since 2010. "I don't pay much attention to Mr.

Assange's tweets, so that wasn't a consideration," the president said in his last televised news conference before president-elect Donald Trump is sworn in Friday to become the 45th president. Obama also reiterated what his spokesman said the day before: that Manning was shown mercy because "justice has been served." "The notion that the average person who was thinking about disclosing vital, classified information would think that it goes unpunished, I don't think would get that impression from the sentence that Chelsea Manning has served," Obama said. On Tuesday, White House Press Secretary Josh Earnest said you also couldn't compare NSA leaker Edward Snowden's case to Manning's. Many have called for Obama to show mercy to Snowden, who is living in Russia. "Chelsea Manning is somebody who went through the military criminal justice process, was exposed to due process, was found guilty, was sentenced for her crimes, and she acknowledged wrongdoing," Earnest said. "Mr.
Snowden fled into the arms of an adversary and has sought refuge in a country that most recently made a concerted effort to undermine confidence in our democracy." The 29-year-old Army private Manning was court-martialed in 2013 for forwarding a cache of classified documents to WikiLeaks.

After being convicted of leaking more than 700,000 documents and video, Manning—then known as Bradley—announced that she is transgender and would be going by the name Chelsea. Manning said in a clemency petition to Obama that she "did not intend to harm the interests of the United States or harm any service members." She said an early release, not a pardon, was needed so she could continue her medical treatment. Assange has also skipped bail after a European arrest warrant was issued in late 2010 by Scotland Yard on behalf of Swedish officials who sought the extradition of the 45-year-old Australian in connection to sexual assault allegations.

Assange “stands by” US extradition “deal,” Swedes still want to quiz...

EnlargeBen Stansall/AFP via Getty Images reader comments 19 Share this story Julian Assange's lawyer has insisted that the WikiLeaks founder, who is wanted for questioning in Sweden over an allegation of rape, is "standing by" his promise to—as he characterises it—"agree to US extradition" in light of president Obama's decision to free whistleblower Chelsea Manning. However, no such US extradition ruling against Assange currently exists.

For Assange to be extradited to the US, it would have to be signed off by authorities in Sweden and the UK, but no such request has been made. Assange has been holed up in cramped conditions at the Ecuadorian embassy in London since June 2012. He skipped bail after a European Arrest Warrant was issued in late 2010 by Scotland Yard cops on behalf of Swedish officials who sought the extradition of the 45-year-old Australian. Assange lawyer @themtchair on Assange-Manning extradition 'deal': "Everything that he has said he's standing by." — WikiLeaks (@wikileaks) January 18, 2017 On Tuesday, Obama—in one of his final acts as president—commuted the sentence of Manning.

The US army private was originally sentenced to serve a 35-year term for leaking a cache of classified military documents to WikiLeaks, but she will now be released in May. Last September, WikiLeaks tweeted: "If Obama grants Manning clemency, Assange will agree to US prison in exchange—despite its clear unlawfulness." On January 12, a similar tweet appeared.
It said: "If Obama grants Manning clemency Assange will agree to US extradition despite clear unconstitutionality of DoJ [Department of Justice] case." Following Manning's commutation of sentence, Assange was mocked on Twitter, with many calling on him to pack his bags and leave Flat 3B, No. 3, Hans Crescent—the Ecuadorian embassy's address in Knightsbridge, London. However, because the WikiLeaks chief breached his bail conditions back in 2012, it's highly likely that Assange will be arrested by Met police if and when he steps outside the embassy. In 2015, Scotland Yard said that it was ending round-the-clock "physical presence" of officers camped outside the embassy, but added that the Met would "make every effort to arrest" Assange.
In September last year, a Swedish court upheld an earlier decision to maintain its European Arrest Warrant against him. Assange, who has repeatedly denied any wrongdoing, initially sought political asylum nearly five years ago, after he was wanted for questioning over rape, coercion, and two counts of sexual molestation accusations brought against him by two women in Sweden.

The allegations surfaced after Assange visited the country in August 2010 to give a lecture. Swedish officials confirmed in 2015 that they would no longer be seeking answers from Assange over allegations of sexual molestation and coercion, due to a law of limitation that requires the cops to charge a suspect within a certain timeframe.

But the more serious allegation of rape remains in place until 2020. Assange has claimed that he would be extradited to the US to face espionage charges if he does leave the Ecuadorian embassy in London. On Wednesday, Assange's lawyer Barry Pollock said: Whistleblowers like Chelsea Manning serve the public interest.
She should never have been prosecuted and sentenced to decades in prison.
She should be released immediately. Likewise, publishers of truthful information serve the public interest, promote democracy, and should not be prosecuted. The war on whistleblowers should end now and should not be continued in the new administration [under Donald Trump].

For many months, I have asked the DoJ to clarify Assange's status.
I hope it will soon.

The department of justice should not pursue any charges against Mr Assange based on his publication of truthful information and should close its criminal investigation of him immediately. WikiLeaks also appeared to infer that Assange will receive better treatment from Trump.
It tweeted: "Assange is confident of winning any fair trial in the US. Obama's DoJ prevented public interest defence & fair jury." Ars sought comment from the Met on whether Assange would be re-arrested under section 7 of the Bail Act for breaching the terms of his bail, if he does indeed leave the embassy.

A spokesperson at Scotland Yard said: "We couldn't possibly speculate." This post originated on Ars Technica UK

Amazon workers sleep in tents near firm’s Scottish depot to avoid...

EnlargePeter Macdiarmid/Getty Images reader comments 36 Share this story Amazon workers employed at a major warehouse in Scotland to help out during the Christmas rush have reportedly been camping out nearby. According to an investigation by local newspaper The Courier, "at least three" tents have been spotted in the "bitterly cold" wilderness near Amazon's huge fulfilment centre near the town of Dunfermline in Fife. One worker, who did not wish to be named, described Amazon as a "poor employer," while local activists have described conditions in which employees are forced to work 60 hours a week with minimal breaks for just a shade over the minimum wage. What's worse, warehouse staff, most of whom are working on a temporary basis to help cover the yearly glut of Christmas orders, are forced by the agency they work for to allegedly pay £10 per day to take specially arranged buses to work—costing them roughly one seventh of their daily after-tax pay, effectively bringing it below the UK's minimum wage of £7.20 per hour. "Amazon should be ashamed that they pay their workers so little that they have to camp out in the dead of winter to make ends meet," Scotland's Liberal Democrat leader Willie Rennie told the Courier. Amazon need to take a long, hard look at themselves and change their ways.

They pay a small amount of tax and received millions of the pounds from the SNP government so the least they should do is pay the proper living wage. The fares the company charge for transport swallow up a lot of the weekly wage which is forcing people to seek ever more desperate ways of making work pay. The online retailer's general manager at the Fife facility, Paul Ashraf, told the newspaper that Amazon "associates" have a "very intense time" doing peak shopping days. He used Black Friday as a recent example, adding: "We had DJs on every floor on Black Friday, we had tombolas, we had raffles that people get free entry into—it’s all about keeping associates safe and having fun." Amazon's giant Scottish depot has been dogged by persistent rumours of poor conditions, and in a separate investigation, an undercover reporter sent by the Sunday Times to do a few shifts at the Dunfermline site uncovered a miserable working environment. The reporter—who was told to sign a form opting her out of the European Union working time directive if she wanted a job covering more than 48 hours per week—was paid £7.35 per hour as a "temporary warehouse operative." A figure that is just a few pennies above the national minimum wage, but does not account for the high daily cost of the bus, which is considerably more than the price of a local weekly bus pass. Amazon, however, insisted to Ars that "we pay competitive wages," adding that the it rises from £7.35 to "£11 an hour and above for overtime." The company also claimed it provided a "safe and positive workplace with competitive pay and benefits from day one," adding: As with nearly all companies we expect a certain level of performance from our associates. Productivity targets are set objectively, based on previous performance levels achieved by our workforce. We support people who are not performing to the levels expected with dedicated coaching to help them improve. The Times reporter, who worked for PMP Recruitment, one of two agencies contracted by Amazon to provide staff for its facility, walked more than 10 miles per day while retrieving items across several floors of the enormous warehouse.
She was afforded the statutory minimum of 30 minutes unpaid at lunch, and two paid 15-minute breaks.

Despite the enormous distances pickers are expected to travel, the water dispensers "were regularly empty." Amazon, when quizzed by Ars, claimed that "water is readily available to our people while performing their duties." It added that any associate working a 10-hour shift is given "one hour of breaks." Amazon also said in response to the intensive working conditions: "Some roles involve walking a number of miles each day, a fact we make clear during the recruitment process." Workers who called in sick accumulated points, at a rate of one per day, even if they had a note from a doctor, according to the Times.
Its undercover reporter was told that more than one point would result in a talking-to, and between four and six could result in disciplinary meetings or even the sack; being 30 seconds late earned a half-point penalty.

Failing to hit exacting productivity targets, or making too many errors, could also result in accruing these penalty points. The retail giant didn't rebuff its strict policy, however, saying simply: "We support people who are not performing to the levels expected with dedicated coaching to help them improve." Amazon has a poor worldwide reputation for staff relations, and its US warehouse network has repeatedly been the subject of investigations into terrible conditions and low pay over the years during its run-up to busy Christmas periods. Rennie said that the latest coverage "chimes with the feedback I have received from local people over a long period of time." He added: "It confirms that Amazon have created intolerable working conditions for many." This post originated on Ars Technica UK

Gone in 70 seconds: Linux can be owned by holding Enter...

Bad LUKS strikes Pengiunistas Attackers with a little more than a minute to spare can compromise Linux boxes by holding down the Enter key for 70 seconds, an act that gifts them a root initramfs shell . The simple exploit exists due to a bug in the Linux Unified Key Setup (LUKS) used in popular variations of Linux. With access to the shell, an attacker could then decrypt Linux machines.

The attack also works on virtual Linux boxen in clouds. Debian, Fedora and are confirmed as suffering from this problem. The problem was identified by Hector Marco, alecturer of the Univeristy West of Scotland, together with Polytechnic University of Valencia assistant professor Ismael Ripoll.

The pair say the problem does not require particular system configuration and offer the following analysis of the flaw: This vulnerability allows to obtain a root initramfs shell on affected systems.

The vulnerability is very reliable because it doesn't depend on specific systems or configurations. Attackers can copy, modify or destroy the hard disc as well as set up the network to exfiltrate data.

This vulnerability is especially serious in environments like libraries, ATMs, airport machines, labs, etc, where the whole boot process is protect (password in BIOS and GRUB) and we only have a keyboard or/and a mouse. Marco and Ripoll says the "very reliable" exploit has been patched and a workaround developed that shutters the hack. The pair says the vulnerability could have been forged during patch process when other security fixes were developed. ® Sponsored: Customer Identity and Access Management

Cryptsetup Vulnerability Grants Root Shell Access on Some Linux Systems

A vulnerability in cryptsetup, a utility used to set up encrypted filesystems on Linux distributions, could allow an attacker to retrieve a root rescue shell on some systems. From there, an attacker could have the ability to copy, modify, or destroy a hard disk, or use the network to exfiltrate data. Cryptsetup, a utility used to setup disk encryption based on the dm-crypt kernel module, is usually deployed in Debian and Ubuntu. Researchers warned late last week that if anyone uses the tool to encrypt system partitions for the operating systems, they’re likely vulnerable. Two researchers, Hector Marco of the University of the West of Scotland and Ismael Ripoll, of the Polytechnic University of Valencia, in Spain, disclosed the vulnerability on Friday at DeepSec, a security conference held at the Imperial Riding School Renaissance Vienna Hotel in Austria. According to the researchers, the script with the vulnerability (CVE-2016-4484) is in the Debian cryptsetup package 2:1.7.2-3 and earlier. Systems that use Dracut, an infrastructure commonly deployed on Fedora in lieu of initramfs – a simple RAM file system directory, are also vulnerable, according to the researchers. The pair say additional Linux distributions outside of Debian and Ubuntu may be vulnerable, they just haven’t tested them yet. The problem stems from the incorrect handling of a password check when a partition is ciphered with LUKS, or Linux Unified Key Setup, a disk encryption specification that’s standard for Linux. Assuming an attacker has access to the computer’s console, when presented with the LUKS password prompt, they could exploit the vulnerability simply by pressing ‘Enter’ over and over again until a shell appears. The researchers say the exploit could take as few as 70 seconds. After a user exceeds the maximum number of three password tries, the boot sequence continues normally. Another script in the utility doesn’t realize this, and drops a BusyBox shell. After carrying out the exploit, the attacker could obtain a root initramfs, or rescue shell. Since the shell can be executed in the initrd, or initial ram disk, environment, it can lead to a handful of scary outcomes, including elevation of privilege, information disclosure, or denial of service. The researchers warn that the vulnerability is especially dangerous in public situations. “This vulnerability is specially serious in environments like libraries, ATMs, airport machines, labs, etc, where the whole boot process is protect (password in BIOS and GRUB) and we only have a keyboard or/and a mouse,” the vulnerability disclosure reads. All an attacker would need in those instances – assuming the system is running Linux – would be access to the keyboard or mouse, Marco and Ripoll say. Tourist information kiosks or airport check in kiosks could be prime targets, the two write. While an attacker would have to have physical access to carry out the attack in most instances, the two warn that in some cloud environments, like those deployed by Ubuntu, the vulnerability could be exploited without physical access. Users can remedy the vulnerability by fixing the cryptroot script file – /scripts/local-top/cryptroot – directly, suspending execution forever, according to the researchers. It’s unclear when a true fix will make its way to the Linux distributions. Neither Debian or Ubuntu immediately returned a request for comment on the vulnerability Tuesday. Marco and Ripoll claim they reported the issue to Debian two weeks ago and while the distribution fixed it, the researchers claim they don’t fully agree with the way it did it. “This is just one of the problems that the boot sequence has in GNU/Linux. It is too permissive on errors, that is. There is the general idea that if the user has physical access to the computer, then the user IS THE OWNER of the computer (this dates from the very beginning of computing). The IoT will dramatically change this assumption,” Marco and Ripoll told Threatpost. “When Windows detects an error… it just shows the blue screen… which is very bad if you are a developer but it is the best solution for 99.9% of the users. Shall the system be developer/hacker friendly, or user secure?”

Tesco Bank Stops Online Transactions After Money Missing from 20K Accounts

Tesco Bank, a U.K. retail bank, today put a halt to online transactions from current accounts after some customers reported over the weekend money missing from their accounts. The bank, which has more than seven million customers, told the BBC that 40,000 accounts were accessed and half of which reported missing money. “While online transactions will not be available, current account customers will still be able to use their cards for cash withdrawals, chip and pin payments, and all existing bill payments and direct debits will continue as normal,” chief executive Benny Higgins said in a statement this morning. “We are working hard to resume normal service on current accounts as soon as possible.” Higgins said that law enforcement and regulators are investigating; no further details on the attack were released, though Higgins told the BBC he knew what the attack was. “We can reassure customers that any financial loss as a result of this activity will be resolved fully by Tesco Bank, and we are working to refund accounts that have been subject to fraud as soon as possible,” Higgins said. Tesco Bank is co-owned by U.K.’s largest supermarket and the Royal Bank of Scotland. “We apologise for the worry and inconvenience that this has caused for customers, and can only stress that we are taking every step to protect our customers’ accounts,” Higgins said. Customers, meanwhile, complained loudly on social media about the bank’s responsiveness to the situation. @tescobankhelp why is money still being taken out of my account fraudulently ?? My supposedly FROZEN bank account that I can't access???? — Kirsty Brown (@kirstyktweet) November 6, 2016 This getting more and more farcical.
Still no money still no way for my kids to eat in school tomorrow Tesco are beyond a joke — SamAllenAVFC (@samallen72) November 7, 2016

More than half of British adults plagued by scam calls on...

Press Release UK Leads Europe in Mobile Nuisance Calls London – 2 November 2016 More than half (53%) of adults in Britain regularly receive fraudulent or scam calls on their mobiles, according to online YouGov research from call-blocking and caller ID Company, Hiya (www.hiya.com). Scam calls are on the rise in the UK, which now gets more nuisance calls than any other country in Europe (13% of all calls), according to Hiya. Perhaps unsurprisingly, the research showed that nearly one in four Brits (24%) don’t answer calls from unknown numbers on their mobile phone. On average, three percent of adults that have received a fraudulent or scam call have lost money as a result of this, although this figure rose significantly in Scotland to seven percent of adults. “Defrauding people is big business,” says Alex Algard, CEO of Hiya. “Scammers are getting more sophisticated.

There are some convincing fraudsters out there using mobile phones to entice people into giving away personal data and financial information.
Scammers are particularly good at luring people with the false promise of free money, for example, accident compensation that will never materialise.” Key findings from the research include: 53% of British adults receive fraudulent or scam calls on their mobiles at least once a month 35% of people receive a scam call at least once a week 24% of adults never answer calls from unknown numbers Of those that have ever received a fraudulent or scam call, 63% of respondents have hung up on the suspicious caller immediately, but a significant number have also let the call continue, whether to find out more (14%), or to simply play along with the person on the other end of the line (25%) On average, 3% of adults in Great Britain that have ever received a fraudulent or scam call have lost money through this 7% of these in Scotland have lost money through fraudulent or scam calls Notes on the research: The research, conducted by YouGov on behalf of Hiya, had a total sample size of 2055 adults.

Fieldwork was undertaken between 4th and 5th October 2016.

The survey was carried out online.

The figures have been weighted and are representative of all GB adults (aged 18+). For more information on the survey, contact:Kate Hartley / Malini MajithiaCarrot Communications0203 770 5836 / kate.hartley@carrotcomms.co.uk

Assange’s Internet “intentionally severed by state party”

Enlarge / WikiLeaks founder Julian Assange prepares to speak from the balcony of the Ecuadorian embassy on February 5, 2016 in London, England.

Today, he can't get online.Photo by Carl Court/Getty Images reader comments 83 Share this story WikiLeaks announced via its Twitter account this morning that WikiLeaks founder Julian Assange's Internet connection had been cut off, blaming a "state party" for the outage.

Assange, who has been ensconced in the Ecuadorian embassy in London since he sought asylum there over four years ago to avoid extradition, has been "detained in absentia" by the Swedish government for questioning on allegations of rape. Other lesser allegations have been dropped because they have passed the time allowed by Sweden's statute of limitations. The announcement comes after the postponement of an interview of Assange by Swedish authorities at the Ecuadorian embassy by Ecuador's Attorney General's office.

The interview, which was to take place today, was pushed back by Ecuador until November 17 "to make it possible for Assange's lawyer to attend." WikiLeaks also announced that it had "activated the appropriate contingency plans" in response to the communication outage.

That plan may be related to other posts made from the WikiLeaks account overnight referring to three "precommitments"—one regarding the UK's Foreign & Commonwealth Office (UK FOS), one labeled "John Kerry," and one labeled "Ecuador." The posts included long alphanumeric strings that may have been encryption keys for files already prepositioned on the Internet. "Precommitment" is a term often associated with the concept of a "dead man's switch"—an automated response to an attack that would otherwise leave the target unable to respond, usually intended as a deterrent. It's possible that Assange made arrangements for a "dead man's switch" release of content about the UK Foreign Office, Ecuador and Secretary of State John Kerry that were intended to prevent them from taking action against him at the embassy.
If the code associated with the three "precommitments" are in fact cryptographic keys, then that "dead man's switch" has been activated by Wikileaks. In addition to the recent leaks of e-mails from the Gmail account of John Podesta, a high-ranking official within Hillary Clinton's presidential campaign, and the publishing of files obtained from the Democratic National Committee breach, WikiLeaks has issued "bounties" for leaks from the UK's Labour Party leadership.

Both leaks have been alleged by US officials to have been executed at the direction of the Russian government. Enlarge / "Precommitment" posts from WikiLeaks. Coincidentally, the Russian government-funded news organization RT, operated by TV-Novosti, published a report that RT's accounts in the United Kingdom had been "blocked." That report included a redacted image of a letter from Royal Bank of Scotland unit NatWest stating, "We have recently undertaken a review of your banking arrangements with us and reached the conclusion that we will no longer provide these facilities. You will therefore need to make banking arrangements outside of the The Royal Bank if Scotland Group." The letter said that accounts would be shut down by December. RT has broadcast a show by Assange in the past and has faced sanctions for violation of UK and European broadcast standards, particularly for its coverage of the shoot-down of Malaysia Airlines flight MH17. Ars will update this story as more details become available.

Glasgow University Students to Explore the Future of Internet Technology

MaidSafe’s SAFE Network used to Study and Create Next Generation Internet ApplicationsTroon, Scotland, September 29th 2016 - Since its inception in 1451, Glasgow University has built a worldwide reputation as a centre for innovations which have had a profound effect on the world. Its famous alumni have included John Logie Baird, Lord Kelvin and Adam Smith, whose global impact has left a lasting impression on the world we live in today. Continuing the trend, Glasgow University Computing Science Students will be exposed to the latest in decentralised networking technology as MaidSafe’s SAFE (Secure Access For Everyone) Network puts them at the forefront of research and development into next generation Internet applications. Students within the computer science department, under the guidance of Dr Inah Omoronyia, Lecturer in Software Engineering and Information Security, will work with the MaidSafe team, led by Scottish Engineer David Irvine. They will provide students guidance in building apps on top of the company’s platform, a secure and decentralised data and communications network that replaces the world’s data centres and servers with the spare computing capacity of the networks users. This comes at a time of great debate about the future of the Internet with leading academics, including the founder of the worldwide web Sir Tim Berners-Lee, seeking to improve the security and privacy offered to users. The SAFE Network provides a zero cost infrastructure for students and the current APIs enable the creation of storage and email applications. This functionality is laid out to developers in tutorials created by the company, and this will be expanded over the next few months as MaidSafe release tutorials every 2 weeks, providing increasingly more complex functionality to application developers. MaidSafe CEO, David Irvine, commented on the partnership; “We are delighted to be working with a university with such a rich heritage and we very much look forward to using the applications created by their students. Where better to push the envelope of evolutionary thinking than the country that Voltaire opined “We look to Scotland for all our ideas of civilisation”. Glasgow University has an excellent opportunity to be at the forefront of research and development in the field of Internet technologies, alongside the likes of MIT, which will further enhance its reputation - and that of Scotland - as a source of cutting edge innovation.” Glasgow University has one of the leading computing science departments in the UK and is ranked amongst the top 100 in the world. Lecturer in Software Engineering and Information Security, Dr Inah Omoronyia confirmed “It’s a great opportunity for our students at Glasgow University to get hands-on experience with building apps for the SAFE network. Security and privacy functions is now core to modern day software systems; our students are really excited to learn new ways of building such systems using cutting-edge technology.” Contact InformationNick LambertChief Operating OfficerMaidSafepr@maidsafe.net+44 1292 317 311About MaidSafeStarted in 2006 by Scottish engineer David Irvine, MaidSafe is a team, comprised of thinkers, inventors, tinkerers, PHDs, engineers and designers, who share a mission to provide security and privacy for everyone. MaidSafe has developed The SAFE (Secure Access For Everyone) Network, which is made up of the unused hard drive space, processing power and data connection of its users. It offers a level of security and privacy not currently available on the existing Internet and turns the tables on companies, putting users in control of their data, rather than trusting it to organisations.