#Sponsored

Monday, April 27, 2020

How Menopause Is an Opportunity to Reset Your Habits (And Prevent Weight Gain) Even though weight gain is common, you can beat it by using menopause as an opportunity to reset your eating and exercise habits. by Clare Collins, Jenna Hollis and Lauren Williams

Reuters
For many women, the journey through menopause is a roller coaster of symptoms including hot flushes, night sweats, sleep disturbance, dry and itchy skin, mood changes, anxiety, depression and weight gain. For some, it can be relatively uneventful. 
Menopause is medically defined as not having any menstrual bleeding for 12 months. Most women reach this milestone between the ages of 45 to 55.
Even though weight gain is common, you can beat it by using menopause as an opportunity to reset your eating and exercise habits.
Do women gain weight at menopause?
Australian women tend to gain weight as they age.
During menopause, women also experience a shift in how fat stores are distributed around the body. Fat tends to move from the thigh region up to the waist and abdomen.
A review of studies that quantified changes in body fat stores before and after menopause found total body fat mass also increased significantly.
While the average weight increase was only about one kilogram, the increase in percentage total body fat was almost 3%, with fat on the trunk increasing by 5.5% and total leg fat decreasing around 3%.
Average waist circumference increased by about 4.6 centimetres and hips by 2.0 centimetres.
Other bad news is that once postmenopausal, women have lower total daily energy needs. This is partly because body fat requires less energy to maintain it compared to muscle. So even if your weight doesn’t change, the increase in body fat means your body needs fewer kilojoules each day.
In addition to this, the menstrual cycle had a small energy cost to maintain ovarian function. This amounted to about 200 kilojoules a day, which is now “saved”.
The bottom line is that unless your transition to menopause is accompanied by a reduction in your total energy intake or an increase in your physical activity, you’re at high risk of weight gain.
But there is some good news
They manage this by either decreasing the total amount of food they eat, cutting down on fat and sugar, using commercial weight loss programs, doing more exercise, or a combination of all these.
They key thing is that they change some aspects of their lifestyle.
So what works best?
Until recently, only three major studies had tested interventions.
The Women’s Healthy Lifestyle Project compared the impact of receiving support to improve diet and exercise habits over four years covering menopause, to making no changes at all.
Women who changed their lifestyle had lower body weights, less abdominal fat and better blood sugar levels compared to those in the control group.
The second study, of 168 women, enrolled them into a 90 minute Nordic walking program, three times a week.
This was associated with a reduction in weight, body fat and waist circumference, as well as blood levels of bad cholesterol and fats, highlighting the benefits of endurance walking.
The third study divided 175 Nigerian women into two groups: one group undertook a 12-week circuit training exercise program, the other was a control group.
Women in the exercise group reduced their waist circumference relative to their hips, indicating a reduction in abdominal fat, even though their total body weight did not change.
The 40-something trial
More recently, we studied 54 women aged 45-50 years in the “40-Something” trial.
We randomly assigned half the participants to receive healthy eating and physical activity support from health professionals, using motivational interviewing to encourage behaviour change. The other half received information only and were asked to self-direct their lifestyle changes.
Our aim was to prevent weight gain in women who were in either the overweight or healthy weight range as they entered early menopause.
We encouraged women who were overweight to reduce their body weight to achieve a body mass index (BMI) in the healthy weight range (BMI 18 to 25). We encouraged women already in the healthy weight range to maintain their weight within one kilogram.
We gave all women the same healthy lifestyle advice, including to eat:
  • 2 serves of fruit and at least 5 serves of vegetables every day
  • 1-1.5 serves of meat or meat alternatives
  • 2-3 serves of dairy
  • wholegrain breads and cereals.
And to:
  • limit foods high in fat and sugar
  • cut down on meals eaten outside the home
  • engage in moderate to vigorous physical activity for 150-250 minutes per week
  • sit for less than three hours per day
  • take at least 10,000 steps per day.
 
Women in the intervention group had five consultations with a dietitian and exercise physiologist over one year to provide support and motivation to change their eating habits and physical activity.
After two years, women in the intervention group had lower body weights, less body fat and smaller waist circumferences compared to the control group who received information pamphlets only.
When we evaluated changes based on their starting BMI, the intervention was more effective for preventing weight gain in women initially of a healthy weight.
Of all the health advice, eating five serves of vegetables and taking 10,000 steps per day were the most effective strategies for long-term weight control during menopause.
Although weight gain, and especially body fat gain, is usual during the menopausal transition, you can beat it.
Rather than menopause being a time to put your feet up, it’s a time to step up your physical activity and boost your efforts to eat a healthy, balanced diet, especially when it comes to the frequency and variety of vegetables you eat.
Clare Collins, Professor in Nutrition and Dietetics, University of Newcastle; Jenna Hollis, Conjoint Lecturer, University of Newcastle, and Lauren Williams, Professor of Nutrition and Dietetics, Griffith University

Nuclear Modernization Is Essential Business. Don’t Let Coronavirus Shut It Down. You can't put a price in deterrence. by Patty-Jane Geller


Since the release of the 2018 National Defense Strategy (NDS), the Pentagon has had to realign priorities to adjust to a slow-down in defense spending. That challenge may be exacerbated by the COVID-19 pandemic.
Some predict the pandemic-induced economic downturn and huge stimulus package will necessitate cuts to the defense budget. Yet Beijing’s fatal decision to withhold data about the virus, its malicious misinformation campaign about the virus’s origins, and its pernicious influence on the World Health Organization have served to heighten awareness of the dangers posed by the Chinese Communist Party.
As the Pentagon continues to adjust for great power competition with China, its realigned priorities must include bolstering missile defense in the Indo-Pacific, enhancing long-range precision fire capability, and defending critical assets in space. But the bedrock of U.S. national security must remain nuclear deterrence.
It’s possible to mistake nuclear deterrence for an outdated capability. Nuclear weapons have been around for over seven decades and have not been employed since World War II. It’s fashionable to advocate for hip, new technologies like artificial intelligence, directed-energy railguns and cyber hackers to compete with China. But in a great power competition, nuclear deterrence is an absolute essential. 
The National Defense Strategy’s top priority—to defend the homeland—rests on strong nuclear deterrence. Adversaries must know that a nuclear attack on the U.S. homeland will be met with responsive intercontinental-range ballistic missiles (ICBMs), survivable nuclear ballistic missile submarines, or flexible bombers.
The U.S. ICBM force in particular is key. With 400 Minuteman III missiles spread across the middle of the United States, adversaries know it’s impossible to take out all of our ICBMs before we can launch a retaliatory strike. This promise of retaliation is precisely why our adversaries have calculated time after time against using nuclear weapons—it’s not because they feel it would be immoral. 
But here’s the problem: Our nuclear deterrence is deteriorating from old age, even as Russia and China modernize and expand their nuclear forces. Every single element of the U.S. nuclear deterrent has passed its projected life span. As just one example, the air-launched cruise missile carried by the B-52 bomber is now more than twenty-five years past its design life. Meanwhile, both China and Russia have nearly completed updating their nuclear arsenals. China is expected to double its nuclear stockpile in the next decade. And both Beijing and Moscow continue to develop advanced capabilities—such as hypersonic missiles with intercontinental-range and ICBMs tipped with multiple warheads—that threaten the United States.
Opponents of U.S. nuclear modernization have incorrectly cited China’s No First Use policy as evidence that Beijing does not have hostile nuclear intentions. But trusting China to adhere to this “good faith” policy ignores its long history of saying one thing but doing another. For instance, Chinese state media has emphasized China’s “model” response to dealing with the COVID outbreak, even as the regime ruthlessly silenced whistleblowers who dared to expose the virus.
There’s no reason to believe that China would take a different approach to nuclear weapons. In fact, leaders have stated their intention to use nuclear weapons first if the United States intervenes in a conflict with Taiwan. Admiral Charles Richard, commander of U.S. Strategic Command, put it best when he said: “I think I could drive a truck through that No First Use policy.”
As China’s lack of desire to rise peacefully becomes more apparent, so does the importance of U.S. nuclear modernization programs remaining on schedule. If attempts to delay modernization succeed, the security consequences could be grave. For example, there is “no margin” for another life extension for our aging Minuteman III missiles. Either the Ground Based Strategic Deterrent goes forward, producing replacements, or our nuclear deterrent is dangerously diminished. 
Deterrence depends on our adversaries perceiving that our nuclear warheads and delivery platforms will work as intended. If the United States fails to replace aging warheads or timed-out missiles, adversaries might doubt they would actually produce an unacceptable amount of damage. 
Further, the perception of weakness may embolden our adversaries. China might view the time as right to invade Taiwan, or Russia might invade a Baltic state. These calculations—which are not at all implausible—could drag the United States into a nuclear conflict. 
Critics of nuclear deterrence argue that the United States should prioritize arms control over modernization. But if our deterrent strength ebbs, leading adversaries to believe they own the advantage, what incentive would they have to negotiate? States enter arms control agreements when it is in their interest to reduce or constrain weapons. But if the United States is forced to retire its nuclear forces unilaterally as a result of obsolescence, Russia and China would not reduce their own forces in exchange, just to be nice. Instead, they would gladly accept this most imprudent gift. 
The Defense Department may need to make changes to its budget due to the pandemic. And, of course, finding ways to reduce the costs of nuclear modernization would be a welcome development. But we must not allow opponents of nuclear deterrence to use the pandemic as an excuse to advance their categorical anti-nuclear agenda. Rather, in a time of global uncertainty, there is no more important national security priority than ensuring a strong nuclear deterrent. 

Coronavirus: Why Reopening the Economy Will Hurt the Rural South Bad The population is older and poorer than much of the country, and the health care system has been deteriorating for years as hospitals lose staff and close. by Anne Cafer and Meagen Rosenthal

In the rural South, the COVID-19 pandemic is becoming a silent disaster. 
As rural residents commute to jobs in cities and transportation hubs, they’re being exposed to the virus and bringing it home to a population already at risk.
Chronic diseases that can lead to more severe COVID-19 symptoms are common across the rural South. The population is older and poorer than much of the country, and the health care system has been deteriorating for years as hospitals lose staff and close.
Despite the population’s vulnerability, Southern states have been a stronghold of resistance to federal and international recommendations around COVID-19 protective measures. Most of the states’ delays and refusals to enact “shelter-at-home” policies were tied to economic arguments.
Now, governors are using the same economic reasons for loosening those restrictions. Georgia Gov. Brian Kemp called for reopening several types of businesses including hair salons starting Friday and restaurants and even theaters starting Monday, despite concerns from public health officialsMississippi is also considering lifting its shelter-at-home orders for economic reasons. When that happens, service workers, once partially protected from exposure, will find themselves at greater risk.
As University of Mississippi sociologists who work with rural communities on a range of resilience issues, especially health, we are concerned about the economic and health consequences of returning to business before the region is prepared to protect its residents.
Rural commuters on the urban front lines
Rural areas may seem isolated from the coronavirus threat, but in the South, one in 12 rural residents commutes to an urban hub for work. Many of those jobs are on the front lines of health care and service industries, where exposure to other people is hard to avoid.
In much of the South, “shelter-at-home” orders have had loose interpretations of “essential personnel” who are exempted from the order. They include employees in high-exposure jobs – cashiers, fast food workers and registered nurses, all among the largest employment areas for Southern states. Many of these workers are less likely to have sick leave or be able to work from home. And they are paid lower wages, so many still go to work even when they’re sick.
These workers have been saved some exposure while restaurants shifted to drive-through operations and social distancing was encouraged. However, if other Southern states follow Georgia’s lead and begin lifting their current protections, workers’ chances of being exposed to someone infectious with the coronavirus rise.
Mississippi’s rural infection numbers stand out in particular: 62% of the state’s coronavirus cases as of mid-April were in rural counties, and the state had counted more than 200 deaths. Rural infection rates were higher than in urban areas: 181 cases per 100,000 people compared to 128 in urban counties. The South as a whole had more urban cases, but still a high rural infection rate.
The South isn’t prepared for a COVID-19 surge
Southern states are already scrambling to manage both detection of coronavirus cases and treatment of the disease. Their testing capacity, essential to controlling the pandemic, has been increasing but remains sporadic and well below the national average. Access to care is increasingly difficult.
Mississippi has just over 400 ICU beds in its largest hospital service area, Jackson. Currently, 100 of those are occupied. Conservative estimates predict that needs for rural ICU beds will double to more than 800 in the next six months under moderate coronavirus infection projections.
Ventilators are an even bigger concern. University of Mississippi Medical Center has only about 125 to 150 ventilators in its facilities, and officials estimate 40% to half are in use on any given day.
The rural South’s health profile adds to the risk. The region has higher rates of chronic medical conditions that have been found to significantly increase the likelihood that a person infected with the coronavirus will develop severe COVID-19. Among the first 159 people to die from COVID-19 in Mississippi, over half had cardiovascular disease, over 40% had diabetes or high blood pressure, and one-third were obese.
Much of the care for these patients is being delivered through a shrinking rural health care system. Of the 128 rural hospital closures across the country in the last 10 years, over half were in the South. The pandemic has created more financial troubles for rural hospitals as nonessential procedures have been postponed. Every county in Mississippi is considered underserved, meaning residents don’t have enough doctors, even if they have access to a health care facility.
Testing and investing in health care long-term
In the short term, Southern states need to increase their testing for coronavirus cases. Per capita, the South administered about 20% fewer tests. Many southern states currently rely on pop-up testing at sites temporarily opened in locations where other facilities are not available. Permanent, well-stocked testing centers would help residents know where to go.
In the long-term, these states need to invest in their rural health infrastructure.
Rural hospitals and pharmacies are essential to reducing long-term risk among rural Southerners, particularly those with chronic health conditions. They are also important “economic anchors” for their communities. According to the American Hospital Association statistics, every dollar spent by a hospital supports US$2.30 of additional business activity within the community and hospitals are a top source of private sector jobs.

Internet Speech Will Never Go Back to Normal In the debate over freedom versus control of the global network, China was largely correct, and the U.S. was wrong. By Jack Goldsmith and Andrew Keane Woods

An illustration of a internet browser window with cutouts.
Covid-19 has emboldened American tech platforms to emerge from their defensive crouch. Before the pandemic, they were targets of public outrage over life under their dominion. Today, the platforms are proudly collaborating with one another, and following government guidance, to censor harmful information related to the coronavirus. And they are using their prodigious data-collection capacities, in coordination with federal and state governments, to improve contact tracing, quarantine enforcement, and other health measures. As Facebook’s Mark Zuckerberg recently boasted, “The world has faced pandemics before, but this time we have a new superpower: the ability to gather and share data for good.”
Civil-rights groups are tolerating these measures—emergency times call for emergency measures—but are also urging a swift return to normal when the virus ebbs. We need “to make sure that, when we’ve made it past this crisis, our country isn’t transformed into a place we don’t want to live,” warns the American Civil Liberties Union’s Jay Stanley. “Any extraordinary measures used to manage a specific crisis must not become permanent fixtures in the landscape of government intrusions into daily life,” declares the Electronic Frontier Foundation, a digital-rights group. These are real worries, since, as the foundation notes, “life-saving programs such as these, and their intrusions on digital liberties, [tend] to outlive their urgency.”
But the “extraordinary” measures we are seeing are not all that extraordinary. Powerful forces were pushing toward greater censorship and surveillance of digital networks long before the coronavirus jumped out of the wet markets in Wuhan, China, and they will continue to do so once the crisis passes. The practices that American tech platforms have undertaken during the pandemic represent not a break from prior developments, but an acceleration of them.
As surprising as it may sound, digital surveillance and speech control in the United States already show many similarities to what one finds in authoritarian states such as China. Constitutional and cultural differences mean that the private sector, rather than the federal and state governments, currently takes the lead in these practices, which further values and address threats different from those in China. But the trend toward greater surveillance and speech control here, and toward the growing involvement of government, is undeniable and likely inexorable.
In the great debate of the past two decades about freedom versus control of the network, China was largely right and the United States was largely wrong. Significant monitoring and speech control are inevitable components of a mature and flourishing internet, and governments must play a large role in these practices to ensure that the internet is compatible with a society’s norms and values.
Beginning in the 1990s, the U.S. government and powerful young tech firms began promoting nonregulation and American-style freedom of speech as essential features of the internet. This approach assumed that authoritarian states would crumble in the face of digital networks that seemed to have American constitutional values built into them. The internet was a vehicle for spreading U.S. civil and political values; more speech would mean better speech platforms, which in turn would lead to democratic revolutions around the world.
China quickly became worried about unregulated digital speech—both as a threat to the Communist Party’s control and to the domestic social order more generally. It began building ever more powerful mechanisms of surveillance and control to meet these threats. Other authoritarian nations would follow China’s lead. In 2009, China, Russia, and other members of the Shanghai Cooperation Organisation announced their “agreement on cooperation in the field of international information security.” The agreement presciently warned of a coming “information war,” in which internet platforms would be weaponized in ways that would threaten nations’ “social and political systems.”
During the George W. Bush and Obama administrations, the United States helped secure digital freedoms for people living in authoritarian states. It gave them resources to support encryption and filter-evasion products that were designed to assist individuals in “circumventing politically motivated censorship,” as then–Secretary of State Hillary Clinton put it in 2010. And it openly assisted Twitter and other U.S. tech platforms that seemed to be fueling the Arab Spring.
In these and so many other ways, the public internet in its first two decades seemed good for open societies and bad for closed ones. But this conventional wisdom turned out to be mostly backwards. China and other authoritarian states became adept at reverse engineering internet architecture to enhance official control over digital networks in their countries and thus over their populations. And in recent years, the American public has grown fearful of ubiquitous digital monitoring and has been reeling from the disruptive social effects of digital networks.
Two events were wake-up calls. The first was Edward Snowden’s revelations in 2013 about the astonishing extent of secret U.S. government monitoring of digital networks at home and abroad. The U.S. government’s domestic surveillance is legally constrained, especially compared with what authoritarian states do. But this is much less true of private actors. Snowden’s documents gave us a glimpse of the scale of surveillance of our lives by U.S. tech platforms, and made plain how the government accessed privately collected data to serve its national-security needs.
The second wake-up call was Russia’s interference in the 2016 election. As Barack Obama noted, the most consequential misinformation campaign in modern history was “not particularly sophisticated—this was not some elaborate, complicated espionage scheme.” Russia used a simple phishing attack and a blunt and relatively limited social-media strategy to disrupt the legitimacy of the 2016 election and wreak still-ongoing havoc on the American political system. The episode showed how easily a foreign adversary could exploit the United States’ deep reliance on relatively unregulated digital networks. It also highlighted how legal limitations grounded in the First Amendment (freedom of speech and press) and the Fourth Amendment (privacy) make it hard for the U.S. government to identify, prevent, and respond to malicious cyber operations from abroad.
These constitutional limits help explain why, since the Russian electoral interference, digital platforms have taken the lead in combatting all manner of unwanted speech on their networks—and, if anything, have increased their surveillance of our lives. But the government has been in the shadows of these developments, nudging them along and exploiting them when it can.
Ten years ago, speech on the American Internet was a free-for-all. There was relatively little monitoring and censorship—public or private—of what people posted, said, or did on Facebook, YouTube, and other sites. In part, this was due to the legal immunity that platforms enjoyed under Section 230 of the Communications Decency Act. And in part it was because the socially disruptive effects of digital networks—various forms of weaponized speech and misinformation—had not yet emerged. As the networks became filled with bullying, harassment, child sexual exploitation, revenge porn, disinformation campaigns, digitally manipulated videos, and other forms of harmful content, private platforms faced growing pressure from governments and users to fix the problems.
The result a decade later is that most of our online speech now occurs in closely monitored playpens where many tens of thousands of human censors review flagged content to ensure compliance with ever-lengthier and more detailed “community standards” (or some equivalent). More and more, this human monitoring and censorship is supported—or replaced—by sophisticated computer algorithms. The firms use these tools to define acceptable forms of speech and other content on their platforms, which in turn sets the effective boundaries for a great deal of speech in the U.S. public forum.
After the 2016 election debacle, for example, the tech platforms took aggressive but still imperfect steps to fend off foreign adversaries. YouTube has an aggressive policy of removing what it deems to be deceptive practices and foreign-influence operations related to elections. It also makes judgments about and gives priority to what it calls “authoritative voices.” Facebook has deployed a multipronged strategy that includes removing fake accounts and eliminating or demoting “inauthentic behavior.” Twitter has a similar censorship policy aimed at “platform manipulation originating from bad-faith actors located in countries outside of the US.”  These platforms have engaged in “strategic collaboration” with the federal government, including by sharing information, to fight foreign electoral interference.
The platforms are also cooperating with one another and with international organizations, and sometimes law enforcement, on other censorship practices. This collaboration began with a technology that allows child pornography to be assigned a digital fingerprint and placed in centralized databases that the platforms draw on to suppress the material. A similar mechanism has been deployed against terrorist speech—a more controversial practice, since the label terrorist often involves inescapably political judgments. Sharing and coordination across platforms are also moving forward on content related to electoral interference and are being discussed for the manipulated videos known as deepfakes. The danger with “content cartels,” as the writer Evelyn Douek dubs these collaborations, is that they diminish accountability for censorship decisions and make invariable mistakes more pervasive and harder to fix.
And of course, mistakes are inevitable. Much of the content that the platforms censor—for example, child pornography and content that violates intellectual-property rights—is relatively easy to identify and uncontroversial to remove. But Facebook, for example, also takes down hate speech, terrorist propaganda, “cruel and insensitive” speech, and bullying speech, which are harder to identify objectively and more controversial to regulate or remove. Facebook publishes data on its enforcement of its rules. They show that the firm makes “mistakes”—defined by its own flexible criteria—in about 15 percent of the appealed cases involving supposed bullying and about 10 percent of the appealed hate-speech cases.
All these developments have taken place under pressure from Washington and Brussels. In hearings over the past few years, Congress has criticized the companies—not always in consistent ways—for allowing harmful speech. In 2018, Congress amended the previously untouchable Section 230 of the Communications Decency Act to subject the platforms to the same liability that nondigital outlets face for enabling illegal sex trafficking. Additional amendments to Section 230 are now in the offing, as are various other threats to regulate digital speech. In March 2019, Zuckerberg invited the government to regulate “harmful content” on his platform. In a speech seven months later defending America’s First Amendment values, he boasted about his “team of thousands of people and [artificial-intelligence] systems” that monitors for fake accounts. Even Zuckerberg’s defiant ideal of free expression is an extensively policed space.
Against this background, the tech firms’ downgrading and outright censorship of speech related to COVID-19 are not large steps. Facebook is using computer algorithms more aggressively, mainly because concerns about the privacy of users prevent human censors from working on these issues from home during forced isolation. As it has done with Russian misinformation, Facebook will notify users when articles that they have “liked” are later deemed to have included health-related misinformation.
But the basic approach to identifying and redressing speech judged to be misinformation or to present an imminent risk of physical harm “hasn’t changed,” according to Monika Bickert, Facebook’s head of global policy management. As in other contexts, Facebook relies on fact-checking organizations and “authorities” (from the World Health Organization to the governments of U.S. states) to ascertain which content to downgrade or remove.
What is different about speech regulation related to COVID-19 is the context: The problem is huge and the stakes are very high. But when the crisis is gone, there is no unregulated “normal” to return to. We live—and for several years, we have been living—in a world of serious and growing harms resulting from digital speech. Governments will not stop worrying about these harms. And private platforms will continue to expand their definition of offensive content, and will use algorithms to regulate it ever more closely. The general trend toward more speech control will not abate.
Over the past decade, network surveillance has grown in roughly the same proportion as speech control. Indeed, on many platforms, ubiquitous surveillance is a prerequisite to speech control.
The public has been told over and over that the hundreds of computers we interact with daily—smartphones, laptops, desktops, automobiles, cameras, audio recorders, payment mechanisms, and more—collect, emit, and analyze data about us that are, in turn, packaged and exploited in various ways to influence and control our lives. We have also learned a lot—but surely not the whole picture—about the extent to which governments exploit this gargantuan pool of data.
Police use subpoenas to tap into huge warehouses of personal data collected by private companies. They have used these tools to gain access to doorbell cameras that now line city blocksmicrophones in the Alexa devices in millions of homes, privately owned license-plate readers that track every car, and the data in DNA databases that people voluntarily pay to enter. They also get access to information collected on smart-home devices and home-surveillance cameras—a growing share of which are capable of facial recognition—to solve crimes. And they pay to access private tow trucks equipped with cameras tracking the movements of cars throughout a city.
In other cases, federal, state, and local governments openly work in conjunction with the private sector to expand their digital surveillance. One of the most popular doorbell cameras, Ring, which is owned by Amazon, has forged video-sharing partnerships with more than 400 law-enforcement agencies in the United States. Ring actively courts law-enforcement agencies by offering discounted cameras to local police departments, which offer them to residents. The departments then use social media to encourage citizens to download Ring’s neighborhood application, where neighbors post videos and discuss ostensibly suspicious activity spotted on their cameras.
Meanwhile, the company Clearview AI provides law-enforcement agents with the ability to scan an image of a face across a database of billions of faces, scraped from popular apps and websites such as Facebook and YouTube. More than 600 law-enforcement agencies are now using Clearview’s database.
These developments are often greeted with blockbuster news reports and indignant commentary. And yet Americans keep buying surveillance machines and giving their data away. Smart speakers such as the Amazon Echo and Google Home are in about a third of U.S. households. In 2019, American consumers bought almost 80 million new smartphones that can choose among millions of apps that collect, use, and distribute all manner of personal data.. Amazon does not release sales numbers for Ring, but one firm estimated that it sold almost 400,000 Ring security devices in December alone.
America’s private surveillance system goes far beyond apps, cameras, and microphones. Behind the scenes, and unbeknownst to most Americans, data brokers have developed algorithmic scores for each one of us—scores that rate us on reliabilitypropensity to repay loans, and likelihood to commit a crime. Uber bans passengers with low ratings from drivers. Some bars and restaurants now run background checks on their patrons to see whether they’re likely to pay their tab or cause trouble. Facebook has patented a mechanism for determining a person’s creditworthiness by evaluating their social network.
These and similar developments are the private functional equivalent of China’s social-credit ratings, which critics in the West so fervently decry. The U.S. government, too, makes important decisions based on privately collected pools of data. The Department of Homeland Security now requires visa applicants to submit their social-media accounts for review. And courts regularly rely on algorithms to determine a defendant’s flight risk, recidivism risk, and more.
The response to COVID-19 builds on all these trends, and shows how technical wizardry, data centralization, and private-public collaboration can do enormous public good. As Google and Apple effectively turn most phones in the world into contact-tracing tools, they have the ability to accomplish something that no government by itself could: nearly perfect location tracking of most the world’s population. That is why governments in the United States and around the world are working to take advantage of the tool the two companies are offering.
Apple and google have told critics that their partnership will end once the pandemic subsides. Facebook has said that its aggressive censorship practices will cease when the crisis does. But when COVID-19 is behind us, we will still live in a world where private firms vacuum up huge amounts of personal data and collaborate with government officials who want access to that data. We will continue to opt in to private digital surveillance because of the benefits and conveniences that result. Firms and governments will continue to use the masses of collected data for various private and social ends.
The harms from digital speech will also continue to grow, as will speech controls on these networks. And invariably, government involvement will grow. At the moment, the private sector is making most of the important decisions, though often under government pressure. But as Zuckerberg has pleaded, the firms may not be able to regulate speech legitimately without heavier government guidance and involvement. It is also unclear whether, for example, the companies can adequately contain foreign misinformation and prevent digital tampering with voting mechanisms without more government surveillance.
The First and Fourth Amendments as currently interpreted, and the American aversion to excessive government-private-sector collaboration, have stood as barriers to greater government involvement. Americans’ understanding of these laws, and the cultural norms they spawned, will be tested as the social costs of a relatively open internet multiply.
COVID-19 is a window into these future struggles. At the moment, activists are pressuring Google and Apple to build greater privacy safeguards into their contact-tracing program. Yet the legal commentator Stewart Baker has argued that the companies are being too protective—that existing privacy accommodations will produce “a design that raises far too many barriers to effectively tracking infections.” Even some ordinarily privacy-loving European governments seem to agree with the need to ease restrictions for the sake of public health, but the extent to which the platforms will accommodate these concerns remains unclear.
We are about to find out how this trade-off will be managed in the United States. The surveillance and speech-control responses to COVID-19, and the private sector’s collaboration with the government in these efforts, are a historic and very public experiment about how our constitutional culture will adjust to our digital future.

What Will Happen if the Coronavirus Vaccine Fails? A vaccine could provide a way to end the pandemic, but with no prospect of natural herd immunity we could well be facing the threat of COVID-19 for a long time to come. by Sarah Pitt

  There are  over 175  COVID-19 vaccines in development. Almost all government strategies for dealing with the coronavirus pandemic are base...