Poverty, poor sanitation, a precarious water and electricity supply, and limited access to health care make India vulnerable to heat waves. Rural and urban districts could improve their preparedness by developing and targeting local adaptation strategies.
Consumers use devices because they want to know how far they walked, to keep a record of communications with friends, and to monitor their homes. But the data is also used by companies to target advertising or the government to access location or health data for a criminal investigation.
Data lags and the elimination of the ADAM program complicate estimates of U.S. cocaine consumption. New users who haven't yet developed cocaine dependence are also a factor. It may be prudent to start planning for an increase in heavy use even before all of the evidence is in.
The Five Eyes intelligence alliance of the U.S., Canada, Great Britain, Australia, and New Zealand began in the Cold War to meet the threat posed by the Soviet Union. Today, the nations' intelligence communities must contend with domestic terrorism and cyber threats while remaining ahead of Russia and China.
As the U.S. Treasury Department and its partners have denied terrorists access to the international financial system, new digital currencies could become an attractive alternative. They could be used for money laundering or to pay the personnel and vendors that keep the terrorist machine running.
Children conceived as a result of sexual violence during armed conflict face socioeconomic marginalization, family rejection, stigmatization, and violence. Grass-roots women's organizations in northern Uganda are helping to integrate these children in post-conflict societies.
Does the public want fewer government initiatives aimed at fighting terrorism, or more? The answer could lie in the type of attack involved as well as in individual perceptions of risk and how much inconvenience people are willing to accept in the name of public safety.
Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response.
The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.
Research on body-worn cameras has shown mixed results. Complaints against police officers dropped when cameras were used, but rates of assault against them during arrests were higher. How much discretion the officers used in turning cameras on and off was also a factor.
Governments are amassing a wealth of data on citizens, a trend that will continue as technology advances. But with no reliable way to ensure that the data is accurate, risks abound. In the criminal justice system, for example, poor quality data could affect individual freedoms and employability.
Electronically stored information from smart appliances, fitness trackers, and other devices is making its way into the U.S. court system. Judges and lawyers need to better understand this evidence so they can challenge it or rule on its admissibility in court.
Prisons in the UK are experiencing record numbers of suicides and other violent incidents, as well as staff shortages. Policymakers working on prison reform need more effective ways to measure the performance of prison programs.
Teachers at two schools in England are wearing body cameras as part of a pilot program aimed at stopping classroom disruption. How they use the cameras could be counter-productive and may even escalate disruptive situations.