The Potential Dangers of Digital ID Cards in the UK and Beyond

“Governments might resort to utilizing digital identities in more intrusive manners than initially assured…”

Dakuku/Getty Images

My first ID card was a flimsy laminated driver’s license. In the U.S., it includes a photo, biometric data (like eye color and height), and date of birth. This spurred its increased use beyond just driving; bars began issuing “cards” to minors attempting to purchase alcohol, interpreting the data as proof of being 21, the legal drinking age. I must admit, it wasn’t until I turned 18 that I learned to use a pencil to edit my birth date to enjoy some cheap cocktails.

This tale may seem like a dull 20th-century anecdote, yet it holds significant relevance in today’s ongoing discussion about the implementation of digital identity cards in the UK and elsewhere. While the cards themselves may differ vastly, the core issue remains the same. Firstly, the use of ID cards tends to escalate over time, and secondly, they are exceedingly easy to compromise.

The British government isn’t the first to suggest that citizens should carry a compact ID application on their smartphones for accessing government and public services. Countries such as China, Singapore, India, and Estonia already mandate digital IDs. Advocates argue that digital IDs help reduce fraud, simplify travel and purchases, and verify identity without the need to carry multiple physical documents.

“This digital ID will enhance your security,” the government might claim. “You can use it for shopping, obtaining medical care, and better yet, it will prevent any confusion about your immigration status, sparing you from unjust detention.” Apologies for the specificity, but the point is clear: these cards are touted as solutions to non-issues (like carrying a health insurance card) or problems that can’t be resolved by merely having an ID (immigration is complex and multifaceted).

Returning to the topic of usage expansion. What transpires when authorities implement digital IDs on mobile devices to authenticate citizenship during job applications or for social services? Fundamentally, they reside alongside other apps which, in certain instances, can share data with them. Some of these applications access sensitive data, including bank information, medical schedules, personal messages, and photos.

As journalist Byron Tau observes in his brilliant book: control means. Many applications gather information about you, often without your awareness, such as your location, purchasing behaviors, and even details from other apps on your device. There are businesses focused on extracting this data from applications like dating services and selling it to third parties, including government entities.


Governments may begin using digital IDs in far more intrusive ways than originally intended.

This practice is largely permissible in the U.S., albeit unsettling. The UK and Europe have regulations that curb rampant data sharing, yet the technology exists. The only shield you have against government ID applications monitoring your location via unrelated apps is the government itself—and that, too, may evolve. Regulations can shift. However, once you start using that digital ID for employment, entering bars, tipping, or taking public transport, it’s unlikely you would discard it.

Consider the potential of this creepiness: Governments may resort to using digital identities in much more invasive manners than initially promised. Conversely, the public might find it beneficial for so many tasks that they deem the trade-off worthwhile. If buying a candy bar is effortless without a credit card, who cares if the government tracks your daily whereabouts? That perspective holds until the government decides you’re the enemy.

And let’s not overlook the hacking angle. Even if governments refrain from spying using your digital ID, malicious actors might not. A hacker could exploit vulnerabilities to access your identity or harvest personal information through a compromised app. Security experts have warned the UK government regarding the threats posed by digital IDs, and even the notorious U.S. surveillance firm Palantir has backed away from support for digital IDs. As one of their executives recently put it, digital identity is:very controversial.

It’s crucial to recognize that concern shouldn’t center merely around identity theft. One must also consider the potential for location tracking, message monitoring, unauthorized bank access, and even phone tapping. Comparatively, a traditional ID card, while it can be lost or altered, only results in the loss of that card—not a comprehensive loss of other personal data.

Annalee’s Week

What I’ve Been Hearing

Our Ancestors were Messy, is a podcast exploring African American celebrity scandals from a century ago, drawn from the pages of black newspapers.

What I’m Reading

Thief’s Philosophy Written by Fran Wilde, this futuristic narrative involves a wealthy individual hiring a thief for entertainment at a party.

What I’m Working On

I’m delving into the history of “review bombing,” a phenomenon where media and products are inundated with one-star reviews driven by political motives.

Topic:

Source: www.newscientist.com

The Hidden Dangers of Dogs: What You Need to Know

Mosquitoes are notorious as some of the most lethal creatures on the planet, causing up to 1 million deaths annually due to the diseases they carry, such as malaria and dengue.

However, in the UK, we have 36 native mosquito species that rarely pose a significant threat, thus they do not constitute a part of the three-way tie for the deadliest creature in Britain.

One contender is the dog. Recently, Prime Minister Rishi Snack placed the American XL bully dog on the list of banned breeds after a rise in fatalities associated with dog attacks.

Statistics indicate an average of about three deaths annually. However, in 2022, ten individuals in England and Wales lost their lives due to dog bites. This unfortunate trend can largely be attributed to negligent ownership, particularly with the inclination to breed larger, more powerful dogs.

Small creatures can also be deadly. Therefore, bees and hornets are contenders for the title as well, as 0.5% of the population is allergic to stings, which can lead to fatal anaphylaxis, resulting in two to nine deaths in the UK each year.



The ultimate threat may be less apparent. Picture a serene scene with grazing cattle that cause approximately 4,000 accidents yearly in the UK.

Around five fatalities result from these incidents, primarily affecting the agricultural community, but pedestrians are also at risk. Cows, being prey animals, are instinctively protective of their calves.

Most mishaps occur when natural boundaries are disregarded. Cows can injure individuals by knocking them over or trampling them. It’s advisable to keep dogs on a leash and maintain a respectful distance from herds.

This article responds to the inquiry (Adrianna Gardner, Chelmsford) “What is the deadliest creature in the UK?”

Feel free to email us your questions at questions@sciencefocus.com or reach out through our Facebook, Twitter, or Instagram (please include your name and location).

Visit our ultimate Fun fact for more incredible science content.

Read more:


Source: www.sciencefocus.com

Scarlett Johansson raises concerns about AI dangers following viral Kanye West deepfake video

Scarlett Johansson raised concerns about the “immediate threat of AI” following the circulation of deepfake videos featuring her and other well-known Jewish celebrities in response to recent anti-Semitic comments made by Kanye West.

The deepfake video showcased AI-generated versions of numerous celebrities, such as Johansson, David Schwimmer, Jerry Seinfeld, Drake, Adam Sandler, Steven Spielberg, and Mila Kunis.

It began with a deepfake representation of Johansson wearing a t-shirt with raised hands and fingers adorned with the Star of David and Kanye’s name. The video was set to the tune of “Habanagira,” a traditional Jewish song typically played at celebratory cultural events and concluded with a message urging viewers to join the fight against anti-Semitism.

Other celebrities depicted in the video included Sacha Baron Cohen, Jack Black, Natalie Portman, Adam Levine, Ben Stiller, and Lenny Kravitz.

Johansson expressed her distress over the dissemination of AI-generated videos featuring her likeness online in response to anti-Semitic sentiments. In a statement to People, she stated, “As a Jewish woman, I unequivocally denounce all forms of anti-Semitism and hate speech. However, I believe the potential dangers posed by hate speech-enabled AI are far more concerning. We must hold AI accountable, as it presents a significant threat. Regardless of the AI’s message, there is a risk of inciting misuse of AI or real-life repercussions.”

A user known as Nishi made derogatory remarks, self-identifying as a “Nazi,” and lauding Hitler on social media before deactivating their account.

Nishi also featured in advertisements during the Super Bowl and directed viewers to their website, which was subsequently shut down by Shopify for policy violations. Fox TV station CEO Jack Abernethy also criticized the ads in a memo to staff.

Johansson has been an outspoken advocate against the unauthorized use of AI. She previously threatened legal action against OpenAI for using a voice resembling hers in their ChatGPT product. OpenAI eventually removed the prominently featured audio option from ChatGPT following significant backlash.

Johansson emphasized, “While I have been a prominent target of AI misuse, the reality is that the threat of AI affects us all.”

She further stated, “There is a pressing need for progressive nations to enact regulations safeguarding citizens from the imminent perils posed by AI, which regrettably the US government appears inert in addressing. It is alarming that the US lags in taking action.”

The actor urged lawmakers to enact legislation combating AI abuse, highlighting it as “a bipartisan issue with profound implications for humanity’s immediate future.”

These remarks coincide with the UK Advertising Standards Authority’s report stating the prevalence of fake ads featuring celebrities as the most widespread form of fraudulent online ads.

The AI-generated video was created by Ori Bejerano, as indicated in his Instagram Bio. His original post noted that the content was digitally altered or generated with AI to create a realistic appearance.

Source: www.theguardian.com

Dangers Associated with Lithium-Ion Batteries

summary

  • One of the biggest cleanup issues due to the fire in Southern California is lithium -ion batteries, which can explode after damage or heat.
  • The battery is located in electric vehicles and is overflowing in some burning nearby, including the Pacific Parisard.
  • The process of neutralizing the battery is complicated and requires high -level technical sophistication.

When a clean -up approach in the Los Angeles area begins, one of the largest tasks in areas that are suffering from mountain fire are many lithium -ion batteries involved in flames.

The battery supplies power to most plug -in hybrid vehicles and electric vehicles, and is used in golf carts, E -bikes, laptops, mobile phones, and wireless earphones. They can also be found in power banks that provide backup energy during the stop. More and more popular at home

If damaged or overheated, lithium -ion batteries may ignite or explode. The remaining fever causes a chain reaction to burn the remaining fever in order to burn processes that can occur over a few days, weeks, or months in an incapacitated and natural process.

Officials have stated that Pacific Parisseed and Altadena facilities, which collectively destroyed at least 12,000 structures of Parisard and Eaton, had more electric vehicles than average.

“This is … from our estimation, it is probably the largest lithium -ion battery pickup and clean -up, and it has happened in the world history,” said the Case Commander of the Environmental Protection Agency's Parisado and Eaton Fire Cleanup. Steve Karanog said.

However, the clean -up process is complicated and consolidated.

The California Emergency Service Bureau has already dispatched a dangerous product team to find out where lithium -ion batteries and flags are posted. The EPA is referred to as a battery recovery team that supervises the efforts to collect them. CHRIS MYERS, a technical specialist in the lithium -ion battery involved in the EPA cleanup, said the collection process can be started early on Monday.

“It's dangerous because all of these batteries are not consumed by fire, so it's all dangerous now because it's damaged,” he said. Myers explained that the battery system for hybrid vehicles and electric vehicles is well protected, so even a vehicle damaged by a fire may have charged batteries.

Calanog said, “a lot of technical sophistication and care are needed,” to handle the battery. The EPA team needs to wear a flame -resistant clothing under a disposable protective suit. The mask covers the face, comes with an inserted cartridge, excludes chemical substances, or attached to the air tank. The crew blocks the operating area and stores water on the premises in case of flame.

Before you can send them to waste or recycled facilities, the collected batteries must be eliminated so that they are not kept in charge or very small. Therefore, according to Myers, the EPA may use the process developed after the 2023 Maui Wildfire. If the battery loses the charge, you can crush it with a steam roller or ship it to a special packaging facility.

Especially in California, lithium -ion batteries have been piled up after the wilderness, given the rise in the sale of hybrid vehicles and electric vehicles. In the state, 35 % of the new vehicles sold in the state will be excreted by 2026, and all new vehicles will be excreted by 2035.

In Los Angeles CountyAccording to the California Energy Committee, at least 581,000 vehicles, including plug -in hybrids and complete electric vehicles, were sold in the past 15 years. Even in Pacific Parisade alone, more than 5,500 zero emission vehicles were sold from 2010 to 2024.

“There are so many electric vehicles in this area. There are probably much more electric vehicles than in other areas,” said Adam Vangelpen, a spokeswoman at the Los Angeles Fire Department. “Many of these people also had solar roofs and solar batteries for wall power banks.”

YUZHANG LI, a professor of UCLA's chemistry and bio molecular engineering, stated that the most dangerous battery was not completely destroyed, but a partially burned car battery.

“If the electric vehicle is already burning out, I think the risk is relatively minimal because all fires have destroyed the battery,” he said.

When the authorities start a huge amount of cleaning from the fire in Southern California, the top priority that the EPA calls “phase 1” is to remove harmful waste such as asbestos, batteries, oil, paint, etc. because the material can be released. That is. Toxic smoke.

According to Calanog, it can take about six months for the entire process.

Meyers said that the battery recovery process would not slow down the timeline, but said, “The scale here is certainly a big challenge.”

Regarding the place to dispose of harmful waste, Calanog stated that EPA has not yet been determined and many sites are available.

However, Vangelpen said that many facilities that receive harmful waste are outside California, and that the amount of waste they want to accept may be limited.

You need to clear waste before the authorities clean up, that is, before debris removes. VANGERPEN has urged residents to avoid sifting the roof Rub until the property is considered safe.

“Residents should not try to remove dangerous debris,” he said. “Normal household supplies are dangerous and may bring risks.”

Source: www.nbcnews.com

The hidden dangers of the alarming ‘zombie hand’ fungus

Please envision the setting. It’s Halloween, and you decide to take a daring walk through a cemetery on the edge of town.

As the sounds of trick-or-treaters fade away, a dense fog creeps in and envelops the tombstones. It already has the vibe of a scene from Scooby-Doo, but things are about to escalate.

You trip and tumble, landing face-first in the debris, where you come across a decaying hand protruding from the ground. The digits are contorted. Long, gnarled nails. You attempt to scream, but the sound gets stuck in your throat.

Where is Velma Dinkley when you require her? Then you take another look and realize it’s not a hand after all. It’s a dead person’s finger (Xylaria polymorpha). It may appear to be on the end of a deceased person’s arm, but it’s actually a fungus.

Dead Man’s Finger Reaching Out of the Ground – Credit: Nik Taylor

A brief introduction to fungi: Fungi cannot consume food like animals or produce food like plants or algae. Instead, they secrete enzymes that break down nearby organic matter, releasing nutrients that they can absorb.

Unfortunately, despite its zombie-like appearance, this fungus decomposes dead wood, not bodies. It emerges from the decaying roots of hardwood trees like beech and oak. Hence the first part of its Latin name “Xylaria” which means “grows on trees.”

The second part of the Latin name, ‘polymorpha,’ means “various shapes” and reflects the fact that this fungus changes its appearance over time. When it sprouts in the spring, it forms clusters of three to six pale to dark gray “fingers,” each with a pale “claw” at the top.

However, when mature in winter, each finger can reach up to 10 cm (4 in) tall and be dark brown to blue-black in color. This has led to descriptions likening it to a decaying finger, burnt wood, or a mummified penis. Fungi spread by producing spores as they cannot move, and in this case, the fingers act as the fruiting bodies.

Like many fungi, X. polymorpha has two modes of reproduction: asexual and sexual. Asexual reproduction results in genetically identical copies of the fungus. It occurs in spring when the fungus releases spores called conidia from its surface.

On the other hand, sexual reproduction involves the release of ascospores through an upper opening. When ascospores from different parents fuse, a new genetically distinct fungus is produced.

Despite its odd and somewhat grotesque appearance, this fungus provides a food source for various invertebrates that feed on its nutrient-rich remains.

But refrain from trying to consume it yourself. A 2018 study found that this eerie-looking fungus contains toxins similar to those found in deadly mushrooms like the death cap. Consume it, and you might end up in the graveyard!


Explore our fantastic fun facts and other captivating science articles.


Read more:

Source: www.sciencefocus.com

Unveiling the Hidden Dangers Threatening the Internet’s Vital Network of Cables

ITonga was plunged into darkness in the aftermath of a massive volcanic eruption in the early days of 2022. The undersea eruption, 1,000 times more powerful than the Hiroshima bomb, sent tsunamis into Tonga’s neighbouring islands and covered the islands’ white coral sand in ash.

The force of the eruption of the Hunga Tonga Hunga Ha’apai volcano cut off internet connections to Tonga, cutting off communications at the very moment the crisis began.

The scale of the disruption was clear when the undersea cables that carry the country’s internet were restored weeks later. The loss of connectivity hampered restoration efforts and dealt a devastating blow to businesses and local finances that rely on remittances from overseas.

The disaster has exposed extreme vulnerabilities in the infrastructure that underpins how the Internet works.

Nicole Starosielski, a professor at the University of California, Berkeley and author of “The Undersea Network,” says modern life is inseparable from the running internet.

In that sense, it’s a lot like drinking water: a utility that underpins our very existence, and like water, few people understand what it takes to get it from distant reservoirs to our kitchen taps.

Modern consumers have come to imagine the internet as something invisible floating in the atmosphere, an invisible “cloud” that rains data down on our heads. Many believe everything is wireless because our devices aren’t connected by cables, but the reality is far more unusual, Starosielski says.


An undersea internet cable laid on the ocean floor. Photo: Mint Images/Getty Images/Mint Images RF

Nearly all internet traffic — Zoom calls, streaming movies, emails, social media feeds — reaches us through high-speed fibre optics laid beneath the ocean. These are the veins of the modern world, stretching for around 1.5 million kilometres beneath the surface of the ocean, connecting countries through physical cables that conduct the internet.

Speaking on WhatsApp, Starosielski explains that the data transmitting her voice is sent from her phone to a nearby cell tower. “That’s basically the only radio hop in the entire system,” she says.

It travels underground at the speed of light from a mobile phone tower via fibre optic cable on land, then to a cable landing station (usually near water), then down to the ocean floor and finally to the cable landing station in Australia, where The Guardian spoke to Starosielski.

“Our voices are literally at the bottom of the ocean,” she says.

Spies, Sabotage, and Sharks

The fact that data powering financial, government and some military communications travels through cables little thicker than a hose and barely protected by the ocean water above it has become a source of concern for lawmakers around the world in recent years.

In 2017, NATO officials reported that Russian submarines were stepping up surveillance of internet cables in the North Atlantic, and in 2018 the Trump administration imposed sanctions on Russian companies that allegedly provided “underwater capabilities” to Moscow for the purpose of monitoring undersea networks.

At the time, Jim Langevin, a member of the House Armed Services Committee, said a Russian attack on the undersea cables would cause “significant harm to our economy and daily life.”


Workers install the 2Africa submarine cable on the beach in Amanzimtoti, South Africa, in 2023. Photo: Logan Ward/Reuters

Targeting internet cables has long been a weapon in Russia’s hybrid warfare arsenal: When Russia annexed Crimea in 2014, Moscow cut off the main cable connection to the peninsula, seizing control of the internet infrastructure and allowing the Kremlin to spread disinformation.

Global conflicts have also proven to wreak unexpected havoc on internet cable systems: In February, Iran-backed Houthi militants attacked a cargo ship in the Red Sea. The sinking of the Rubimaa likely cut three undersea cables in the region, disrupting much of the internet traffic between Asia and Europe.

The United States and its allies have expressed serious concerns that adversaries could eavesdrop on undersea cables to obtain “personal information, data, and communications.” A 2022 Congressional report highlighted the growing likelihood that Russia or China could gain access to undersea cable systems.

It’s an espionage technique the US knows all too well: in 2013, The Guardian revealed how Britain’s Government Communications Headquarters (GCHQ) had hacked into internet cable networks to access vast troves of communications between innocent people and suspected targets. This information was then passed on to the NSA.

Documents released by whistleblower Edward Snowden also show that undersea cables connecting Australia and New Zealand to the US were tapped, giving the NSA access to internet data in Australia and New Zealand.

Despite the numerous dangers and loud warnings from Western governments, there have been few calls for more to be done to secure cable networks, and many believe the threat is exaggerated.

The 2022 EU report said there were “no published and verified reports suggesting a deliberate attack on cable networks by any actor, including Russia, China or non-state groups.”

“Perhaps this suggests that the threat scenarios being discussed may be exaggerated.”

One expert speaking to the Guardian offered a more blunt assessment, describing the threat of sabotage as “nonsense”.


TeleGeography map of undersea internet cables connecting the US, UK and Europe. Photo: TeleGeography/https://www.submarinecablemap.com/

The data bears this out, showing that sharks, anchors and fishing pose a bigger threat to the global Internet infrastructure than Russian espionage. A US report on the issue said the main threat to networks is “accidental human-involved accidents.” On average, a cable is cut “every three days.”

“In 2017, a vessel accidentally cut an undersea communications cable off the coast of Somalia, causing a three-week internet outage and costing the country $10 million per day,” the report said.

An Unequal Internet

But for many experts, the biggest risk to the internet isn’t sabotage, espionage or even rogue anchors, but the uneven spread of the globe-spanning cable infrastructure that ties together the world’s digital networks.

“There aren’t cables everywhere,” Starosielski said. “The North Atlantic has a high concentration of cables connecting the U.S. and Europe, but the South Atlantic doesn’t have as many.”

“So you’re seeing diversity in terms of some parts of the world being more connected and having multiple routes in case of a disconnection.”

As of 2023, there are more than 500 communication cables on the ocean floor. Map of the world’s submarine cable networks These are found to be mainly concentrated in economic and population centres.

South Pacific Submarine Cable Network

Map of undersea internet cables in the South Pacific.

The uneven distribution of cables is most pronounced in the Pacific, where a territory like Guam, with a population of just 170,000 and home to a U.S. naval base, has more than 10 internet cables connecting the island, compared with seven in New Zealand and just one in Tonga, both with a population of more than 5 million.

The aftermath of the 2022 Tonga eruption spurred governments around the world to act, commissioning reports on the vulnerabilities of existing undersea cable networks while technology companies worked to harden networks to prevent a similar event from happening again.

Last month, Tonga’s internet went down again.

Damage to undersea internet cables connecting the island’s networks caused power outages across much of the country and disruption to local businesses.

For now, economic fundamentals favor laying cables to Western countries and emerging markets where digital demand is surging. Despite warnings of sabotage and accidental damage, without market imperatives to build more resilient networks, there is a real risk that places like Tonga will continue to be cut off, threatening the very promise of digital fairness that the internet is based on, experts say.

Source: www.theguardian.com

General practitioner discusses the concealed health dangers of wearing shapewear

Shapewear, also known as body shaping underwear, has gained immense popularity in recent years. In a society that values appearance and self-image, shapewear is seen as a quick and affordable solution to boost self-confidence by enhancing the fit and look of various outfits.


Functioning like a modern corset, shapewear targets areas like the waist, hips, thighs, and buttocks to compress and shape them, aiming to improve the fit of clothes and provide a sleeker silhouette, as suggested by marketing claims.

With advancements in fabric technology, modern shapewear is now more comfortable and breathable than ever before, appealing to a wide range of individuals seeking aesthetic and functional support for various occasions. It has become increasingly popular, especially with the rise of social media influencing body image awareness.

Unlike traditional shapewear made from rigid materials like steel and whalebone, modern shapewear uses breathable and stretchy fabrics such as spandex, nylon, and lycra. It is now popular among both men and women for its comfort and effectiveness.

Available in different styles and compression levels, shapewear caters to various needs. Certain types, such as waist cinchers and tummy control panties, target specific body parts to provide support and shape.

In addition to these, there are thigh shapers, torso-compressing camisoles, butt lifters with padding, and leg and arm shapers. Some companies even offer full bodysuits with built-in bras for total body shaping.

Sports compression clothing, while similar, focuses on enhancing athletic performance and muscle support rather than aesthetic enhancement. Designed with advanced breathable fabrics and graduated compression, sports compression wear is intended for physical activity and recovery periods.

Although shapewear appears to offer a convenient way to enhance confidence and fit, it does come with certain drawbacks to consider. Issues like digestive problems, circulatory and neurological issues, breathing problems, and skin irritation can arise from wearing shapewear, particularly if it is too tight.

When choosing shapewear, it’s important to select a comfortable fit that doesn’t restrict movement and to avoid wearing it for extended periods. Opting for breathable fabrics and hypoallergenic materials can help reduce the risk of skin irritation.

In conclusion, while shapewear can provide temporary aesthetic benefits, it’s essential to prioritize comfort and health when using it. Remember, true confidence comes from within, and it’s crucial to listen to your body’s needs.

read more:

Source: www.sciencefocus.com

The Dangers of Overlooked Fatigue on Your Sleep and Ways to Combat It

You’ve probably experienced this scenario before: after a long day, feeling mentally and physically drained, all you want to do is crawl into bed and sleep.

However, your brain, the most powerful biological supercomputer in the universe, decides to play tricks on you. Instead of allowing you to rest, it keeps you wide awake, with thoughts racing through your mind at lightning speed.

So why does this happen? Why does it prevent us from sleeping when we need it the most? The answer is simple: when you’re too tired, your brain overrides the signals for sleep and keeps you awake.

If you’ve heard of being “over-fatigued” before, it’s often used to describe babies who become agitated and unsettled from being awake too long, leading to sleep disturbances and stress.

Similarly, adults can experience the same issues when unaddressed emotions interfere with the body’s natural sleep processes. The longer you stay fatigued, the more challenging it becomes to fall asleep.

Fortunately, there are ways to break this cycle. In the sections below, we’ll explore what causes excessive fatigue and share three scientifically proven steps to combat it for good.


Excessive fatigue impacts your sleep quality

Being overly tired is a paradoxical situation. When you’re physically and mentally drained, your brain is actually overstimulated and in a state of hyperarousal, making it difficult to transition to sleep.

This hyperarousal state affects essential functions that promote sleep, particularly hindering the buildup of sleep pressure in the brain.

Sleep pressure refers to the buildup of neurochemicals and hormones that increase throughout the day, signaling your body’s need for rest.

“Interestingly, as sleep pressure rises, the brain can become more excitable,” explains Professor Matt Jones, a Neuroscientist at the University of Bristol. “The neurons in the cerebral cortex tend to fire more frequently as wakefulness increases.”

“The primary theory is that sleep helps reset sleep pressure, preventing the brain from becoming overly excited and metaphorically ‘exploding!'”

When you’re vigilant and overwhelmed by racing thoughts, this process of resetting the brain for sleep is disrupted, particularly impacting the locus ceruleus area in the brainstem.

“In times of hyperarousal, the activity in this brain region remains high, impeding the transition to sleep and resisting mechanisms that facilitate falling asleep,” Jones clarifies.

Furthermore, persistent fatigue and sleep deprivation can exacerbate troubling thoughts, making it harder to sleep the following night.

“A study in 2019 found that individuals with insomnia were more likely to ruminate about recent embarrassing events and have disrupted sleep compared to healthy sleepers,” he explains.

“Insomniacs might even become hypersensitive to their heartbeat, showing how an unrested brain struggles to ignore irrelevant stimuli,” Jones adds.

“A well-rested brain can filter out unnecessary information, but insomnia disrupts this process, leading to increased mental strain,” he concludes.

©Getty

Strategies to prevent excessive fatigue

When you’re too tired and key brain regions remain hyperaroused while trying to sleep, essential processes for rest are disrupted.

Dr. Alex Scott, a Psychology lecturer at Keele University, explains that in today’s society, people struggle to regulate their emotions and process daily experiences effectively due to various distractions.

“At the end of the day, we are less inclined to deal positively with our emotions, often exaggerating worries and ruminating in bed,” he shares.

Scott suggests that when fatigued, individuals tend to use unhealthy coping mechanisms, like rumination and blame-shifting.

If rumination proves ineffective for alleviating fatigue, Scott recommends the following three strategies:

1. Avoid counting sheep

Paradoxically, trying too hard to fall asleep can make it even harder. Instead of using traditional methods like counting sheep, Scott encourages individuals to understand that sleep is an automated process that cannot be forced.

“Focus on processing your emotions through exercises like a worry journal,” Scott advises.

2. Maintain a worry diary

Although it may seem tedious, journaling your worries can significantly improve sleep quality for those with sleep issues, according to Scott.

Before bedtime, write down all your concerns in a journal, allowing you to acknowledge them and develop strategies to address them the next day.

“The act of writing down your worries may help you rationalize them and temporarily set them aside, promoting better sleep,” Scott explains.

3. Establish a bedtime routine

Creating a relaxation routine before bed, ideally starting an hour before sleep, can help alleviate mental fatigue and prepare your mind for rest.

“Engage in activities like reading, mindfulness, or journaling during this time to unwind and avoid associating your bed with worries,” Scott suggests.

Learn more about our experts

Professor Matt Jones: A Neuroscientist at the University of Bristol, delving into the science of sleep, memory, and decision-making. His research has been featured in numerous academic journals, such as Frontiers in Neurology, Sleep, and the Neuroscience Journal.

Dr. Alex Scott: As a Psychology lecturer at Keele University, Scott explores the relationship between sleep and mental health issues. His work has been published in esteemed journals like the British Journal of Health Psychology and the British Medical Journal.

Source: www.sciencefocus.com

The dangers of nicotine pouches for children: why they can pose a significant threat

It has been recognized for many years that smoking is extremely detrimental to health, and stopping smoking or avoiding it altogether is one of the most effective ways to safeguard one’s well-being.

Governments globally are implementing extensive measures to eliminate smoking as a norm and socially acceptable practice, shedding light on the reality of smoking as a dangerous addiction.

Increased tobacco taxes, graphic warnings on packaging, workplace smoking bans, and the discontinuation of glamorous tobacco advertising campaigns have all contributed to the decline in smoking rates.


The UK Office for National Statistics reports: In the UK, 12.9% of adults are current smokers.This marks a significant drop from the 30 percent in the early 1990s. Tobacco control is undoubtedly a triumph of public health.

Nevertheless, nicotine addiction remains a thriving industry. Instead of fading away, the tobacco industry has introduced a new array of products aimed primarily at young individuals: flavored disposable e-cigarettes, heat-not-burn products, and the latest novelty item, nicotine pouches.

Read more:

Nicotine pouches are typically packaged in small round containers that are convenient to carry around. The pouches resemble small tea bags and contain vegetable fiber, sugar, flavorings, and, of course, nicotine.

Nicotine can be synthetically produced or directly extracted from the tobacco plant. These pouches come in various flavors, from fruity and berry to sweet and cocktail, and they offer different levels of nicotine strength, with some pouches having higher nicotine content than regular cigarettes.

The small pouch is placed between the lips and gums to absorb the nicotine in the mouth. After absorption, the pouch is discarded and replaced with a new one. These pouches are discreet, have a pleasant smell, and unlike oral tobacco products, such as chewing tobacco, they don’t require spitting like in movies depicting the old West.

While relatively new in the market, these pouches are similar to Scandinavian “snus” – yet snus contains tobacco while pouches do not. This difference is vital as pouches often evade regulations, bypassing laws and rules that govern tobacco products and cigarettes.

This lack of regulation means that, unlike cigarettes, pouches can legally be sold to individuals under 18 in the UK. Other countries, like the US, are already taking steps to ban or restrict the sale of pouches to adults only.

What do we know about the health risks of pouches?

Although nicotine pouches are gaining popularity worldwide, there is limited data on their health risks due to their recent introduction. However, the World Health Organization advocates a precautionary approach by prioritizing nicotine whenever the sale and promotion of nicotine pouches are permitted. The health of young people.

Using pouches exposes individuals to toxic nicotine, can lead to addiction, and may encourage the use of other products like e-cigarettes or cigarettes.

In addition to addiction, nicotine has effects on adolescent brain development, impacting learning outcomes. High nicotine doses can induce symptoms like dizziness, headaches, nausea, and abdominal cramps, particularly in those new to nicotine exposure.

It may be tempting to compare the health effects of nicotine pouches, e-cigarettes, and tobacco products to determine which is “safer.” However, 85% of the UK population never smokes, and young individuals who have never smoked and never will not derive any health benefits from starting to use pouches.

At present, there is no evidence to suggest that pouches aid in smoking or vaping cessation. Instead of helping users quit smoking, individuals may resort to using pouches in situations where smoking or vaping is not feasible, such as during flights, at school, or work, resulting in increased nicotine consumption.

The global tobacco industry, dominated by a few multinational corporations, including British American Tobacco and Philip Morris International, produces and markets nicotine pouches. Using tactics reminiscent of old cigarette advertisements, pouches are promoted through motorsports, celebrity endorsements, and various lifestyle marketing approaches.

The tobacco industry is skilled at dangerous marketing. With addictive nicotine products widely available to young individuals and minimal regulation in the advertising and sale of pouches, there is a real risk of a surge in pouch use and nicotine addiction among young people.

Read more:

Source: www.sciencefocus.com

The Dangers of Deadly Cold Water Gush for Migratory Sharks

Bull sharks may be vulnerable to cold upwelling

Martin Prohaskatz/Shutterstock

The upwelling of cold water from the deep ocean to the surface can be deadly to marine animals, and such events are becoming more frequent due to climate change.

In March 2021, hundreds of dead seafood, squid, octopus, manta rays, and bull sharks washed up on South African beaches.

The animals were fleeing high water temperatures from a marine heatwave hitting South Africa's coastal waters.

However, during their escape, they were caught in a sudden burst of cold water from the region's Agulhas Current, causing ocean temperatures to plummet.

“These upwelling events occurring on the banks of the Agulhas River could cause temperatures to suddenly drop by about 10 degrees Celsius.” [18°F] “within 24 hours” Zoe Jacobs At the UK National Marine Centre. “This is a very intense, short-term event.”

Nicholas Lubitz Professors at Australia's James Cook University used 41 years of sea surface temperature data and 33 years of sea surface temperature data to assess cold water upwelling in two regions affected by the Agulhas Current and the Australian Current, which meanders along Australia's east coast. I studied wind records.

They conclude that stronger ocean currents and changes in wind patterns associated with climate change are increasing both the frequency and strength of cold water upwelling in both regions.

Most marine organisms that live near these currents are adapted to sudden fluctuations in water temperature and can therefore cope with these changes.

However, the study warns that migratory species such as bull sharks, which pass through these waters and are unprepared for sudden changes in temperature, are at risk.

Bull sharks struggle to survive when water temperatures drop below 19°C (66°F) for extended periods. Lubitz and colleagues used data from 41 tagged bull sharks in southern Africa and Australia to study their migration patterns.

As soon as summer ends and water temperatures begin to drop, sharks migrate to warmer tropical waters. During migration, they appear to take steps to avoid cold water upwelling by moving to warmer surface waters as they swim through upwelling zones, or by seeking refuge in estuaries and bays during migration. .

But as upwelling events increase in frequency and intensity, researchers warn that it will become increasingly difficult for bull sharks and other migratory species to avoid them.

But Jacobs, who was not involved in the study, said the effects may be limited to the two areas studied. “These two particular regions of hers are very special cases because the upwelling that occurs there is a very short and intense phenomenon,” she says. Other global upwelling systems are more permanent or seasonal, and marine species are better adapted to withstand or avoid changes in water temperature, she says.

topic:

Source: www.newscientist.com

Can Banning Smartphones and Social Media Help Protect Young People from Online Dangers?

The members of the WhatsApp group ‘Smartphone Free Childhood’ advocate for banning under-14s from owning smartphones and preventing under-16s from accessing social media to protect them from the dangers of the internet. However, believing this is the solution is unrealistic. Announcement (“Crazy: Thousands of UK parents join in quest for smartphone-free childhood”, February 17).

It is a parent’s responsibility to provide a safe environment for their children and teach them how to safely navigate the internet. Just like roads can be dangerous but we don’t ban cars, teaching children internet safety is crucial. Building open and honest relationships and setting boundaries at home will help young people understand internet dangers better than blanket bans. Making social media “adults only” may backfire and make it more tempting for children. They may also be less likely to seek help if they encounter inappropriate content.
stuart harrington
Burnham-on-Sea, Somerset

As seen in cases like Brianna Gee’s, giving children smartphones can have negative consequences. However, we should consider the benefits and drawbacks of smartphone access. I personally benefitted from having a smartphone in school for various tasks like using apps for transportation, news, and communication. While parental controls and monitoring are essential, smartphones have many positive uses. It is important to adapt to the changing online threats and promote more parental supervision.
oscar acton
Merton, County Durham

Do you have a photo you’d like to share with Guardian readers? Click here to upload it. Selected photos will be featured in our readers’ best photos gallery and in Saturday’s print edition.

Source: www.theguardian.com