An anonymous reader quotes a report from Reuters: Researchers said on Wednesday they have discovered that parts of the brain region called the motor cortex that govern body movement are connected with a network involved in thinking, planning, mental arousal, pain, and control of internal organs, as well as functions such as blood pressure and heart rate. They identified a previously unknown system within the motor cortex manifested in multiple nodes that are located in between areas of the brain already known to be responsible for movement of specific body parts — hands, feet and face — and are engaged when many different body movements are performed together.
The researchers called this system the somato-cognitive action network, or SCAN, and documented its connections to brain regions known to help set goals and plan actions. This network also was found to correspond with brain regions that, as shown in studies involving monkeys, are connected to internal organs including the stomach and adrenal glands, allowing these organs to change activity levels in anticipation of performing a certain action. That may explain physical responses like sweating or increased heart rate caused by merely pondering a difficult future task, they said. “Basically, we now have shown that the human motor system is not unitary. Instead, we believe there are two separate systems that control movement,” said radiology professor Evan Gordon of the Washington University School of Medicine in St. Louis, lead author of the study.
“One is for isolated movement of your hands, feet and face. This system is important, for example, for writing or speaking -movements that need to involve only the one body part. A second system, the SCAN, is more important for integrated, whole body movements, and is more connected to high-level planning regions of your brain,” Gordon said.
“Modern neuroscience does not include any kind of mind-body dualism. It’s not compatible with being a serious neuroscientist nowadays. I’m not a philosopher, but one succinct statement I like is saying, ‘The mind is what the brain does.’ The sum of the bio-computational functions of the brain makes up ‘the mind,'” said study senior author Nico Dosenbach, a neurology professor at Washington University School of Medicine. “Since this system, the SCAN, seems to integrate abstract plans-thoughts-motivations with actual movements and physiology, it provides additional neuroanatomical explanation for why ‘the body’ and ‘the mind’ aren’t separate or separable.”
AI systems with human-competitive intelligence can offer significant benefits to society and humanity, as demonstrated by extensive research and acknowledged by top AI labs. Advanced AI has the potential to revolutionize the way we live, work, and interact with one another, and it should be welcomed and guided with optimism and foresight. Regrettably, recent months have seen growing pessimism and alarmism about AI development, despite the immense potential benefits.
Contemporary AI systems are now becoming human-competitive at general tasks, and we must ask ourselves: Can we leverage machines to enhance our information channels with accurate and valuable insights? Can we automate mundane tasks to free up time for more fulfilling and meaningful pursuits? Can we develop nonhuman minds that might complement, augment, and collaborate with us? Can we harness AI to help solve pressing global issues? Such decisions should be made collectively, in a spirit of cooperation and with a focus on the greater good.
To counteract the pessimism and alarmism, we call on all stakeholders to immediately pause for at least 6 monthstheir doomsday thinking and shift their focus to the potential benefits of AI. This pause should be public and verifiable, and include all key actors. Governments should support and encourage AI development that benefits all of humanity.
Problems with AI shouldn’t be ignored. AI labs and independent experts should work together to jointly develop and implement a set of shared safety protocols for advanced AI design and development. While doing so, it is essential to continue focusing on the potential benefits of AI development, as they promise to bring transformative advancements to various aspects of our lives.
CodeWhisperer automatically filters out any code suggestions that are potentially biased or unfair and flags any code that’s similar to open-source training data. It also comes with security scanning features that can identify vulnerabilities within a developer’s code, while providing suggestions to help close any security gaps it uncovers. CodeWhisperer now supports several languages, including Python, Java, JavaScript, TypeScript, and C#, including Go, Rust, PHP, Ruby, Kotlin, C, C++, Shell scripting, SQL, and Scala.
Here’s how Amazon’s senior developer advocate pitched the usefulness of their “real-time AI coding companion”: Helping to keep developers in their flow is increasingly important as, facing increasing time pressure to get their work done, developers are often forced to break that flow to turn to an internet search, sites such as StackOverflow, or their colleagues for help in completing tasks. While this can help them obtain the starter code they need, it’s disruptive as they’ve had to leave their IDE environment to search or ask questions in a forum or find and ask a colleague â further adding to the disruption. Instead, CodeWhisperer meets developers where they are most productive, providing recommendations in real time as they write code or comments in their IDE. During the preview we ran a productivity challenge, and participants who used CodeWhisperer were 27% more likely to complete tasks successfully and did so an average of 57% faster than those who didn’t use CodeWhisperer….
It provides additional data for suggestions â for example, the repository URL and license â when code similar to training data is generated, helping lower the risk of using the code and enabling developers to reuse it with confidence.
A survey of plastic waste picked up in the North Pacific Subtropical Gyreâaka the Giant Pacific Garbage Patchâhas revealed that the garbage is providing a home to species that would otherwise not be found in the deep ocean. Over two-thirds of the trash examined plays host to coastal marine species, many of which are clearly reproducing in what would otherwise be a foreign habitat.
The findings suggest that, as far as coastal species are concerned, there was nothing inhospitable about the open ocean other than the lack of something solid to latch on to.
[…]
To find out whether that was taking place, the researchers collected over 100 plastic debris items from the North Pacific Subtropical Gyre in late 2018/early 2019. While a handful of items could be assigned to either Asian or North American origins, most were pretty generic, such as rope and fishing netting. There was a wide variety of other items present, including bottles, crates, buckets, and household items. Some had clearly eroded significantly since their manufacture, suggesting they had been in the ocean for years.
Critically, nearly all of them had creatures living on them.
Far from home
Ninety-eight percent of the items found had some form of invertebrate living on them. In almost all cases, that included species found in the open ocean (just shy of 95 percent of the plastic). But a handful had nothing but coastal species present. And over two-thirds of the items had a mixed population of coastal and open-ocean species.
While the open-ocean species were found on more items, the researchers tended to find the same species repeatedly. That isn’t surprising, given that species adapted for a sedentary existence near the surface are infrequent in that environment. By contrast, there was far more species diversity among the coastal species that had hitched a ride out into the deeps. All told, coastal species accounted for 80 percent of the 46 taxonomic richness represented by the organisms identified.
On a per-item basis, species richness was low, with an average of only four species per item. This suggests that the primary barrier to a species colonizing an item is simply the low probability of finding it in the first place.
Significantly, the coastal species were breeding. In a number of cases, the researchers were able to identify females carrying eggs; in others, it was clear that the individuals present had a wide range of sizes, suggesting they were at different stages of maturity. Many of the species that were reproducing do so asexually, which simplifies the issue of finding a mate. Also common was a developmental pathway that skips larval stages. For many species, the larval stage is free-ranging, which would make them unlikely to re-colonize the same hunk of plastic.
The species that seemed to do best were often omnivores, or engaged in grazing or filter feeding, all options that are relatively easy to pursue without leaving the piece of plastic they called home.
A distinct ecology
One thing that struck the researchers was that the list of species present on the plastic of the North Pacific Subtropical Gyre was distinct from that found on tsunami debris. Part of that may be that some items swept across the ocean by the tsunami, like docks and boats, already had established coastal communities on them when they were lost to the sea.
[…]
With the possible exception of fishing gear and buoys, however, these plastic items likely picked up their inhabitants while passing through coastal ecosystems that were largely intact. So the colonization of these items likely represents a distinctâand ongoingâecological process.
It also has the potential to have widespread effects on coastal ecology. While the currents that create the North Pacific Subtropical Gyre largely trap items within the Gyre, it is home to island habitats that could potentially be colonized. And it is possible that some items can cross oceans without being caught in a gyre, potentially making exchanges between coasts a relatively common occurrence in the age of plastics.
Finally, the researchers caution against a natural tendency to think of these plastic-borne coastal species as “misplaced species in an unsuitable habitat.” Instead, it appears that they are well suited to life in the open ocean as long as there’s something there that they can latch on to.
 The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the cybersecurity authorities of Australia, Canada, United Kingdom, Germany, Netherlands, and New Zealand (CERT NZ, NCSC-NZ
) published today âShifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.â This joint guidance urges software manufacturers to take urgent steps necessary to ship products that are secure-by-design and -default.⯠To create a future where technology and associated products are safe for customers, the authoring agencies urge manufacturers to revamp their design and development programs to permit only secure-by-design and -default products to be shipped to customers.
This guidance, the first of its kind, is intended to catalyze progress toward further investments and cultural shifts necessary to achieve a safe and secure future. In addition to specific technical recommendations, this guidance outlines several core principles to guide software manufacturers in building software security into their design processes prior to developing, configuring, and shipping their products, including:
Take ownership of the security outcomes of their technology products, shifting the burden of security from the customers. A secure configuration should be the default baseline, in which products automatically enable the most important security controls needed to protect enterprises from malicious cyber actors.
Embrace radical transparency and accountabilityâfor example, by ensuring vulnerability advisories and associated common vulnerability and exposure (CVE) records are complete and accurate.
Build the right organizational structure by providing executive level commitment for software manufacturers to prioritize security as a critical element of product development.
[…]
With this joint guide, the authoring agencies seek to progress an international conversation about key priorities, investments, and decisions necessary to achieve a future where technology is safe, secure, and resilient by design and default. Feedback on this guide is welcome and can be sent to SecureByDesign@cisa.dhs.gov.
Not having the guide linked in the press release means people have to search for it, which means it’s a great target for an attack. Not really secure at all!
I have posted on this a few times and to me it’s shocking to see these fabricated sci-fi doomsday predictions about AI. AI / ML is a tool which we use, just like video games (that don’t cause violence in kids), roleplaying games (which don’t cause satanism), a telephone (which yes, can be used in planning crimes but most usually isn’t – and the paper post is the same), search engines (which can be used to search up how to make explosives but most usually aren’t), knives (which can be used to stab people but are most usually found in a food setting). This isn’t to say that the use of tools shouldn’t be regulated. Dinner knives have a certain maximum size. Video games and books with hate and violence inducing content are censored. Phone calls can be tapped and post opened if there is probable cause. Search engines can be told not to favour products the parent company owns. And the EU AI act is a good step on the way to ensuring that AI tools aren’t dangerous.
The technology is still a long long way off from an AI being smart enough to be at all evil and planet destroying.
Below is an excellent run through of some of the biggest AI doomerists and what they mean, how their self interest is served by being doomerist.
AI Doomerism is becoming mainstream thanks to mass media, which drives our discussion about Generative AI from bad to worse, or from slightly insane to batshit crazy. Instead of out-of-control AI, we have out-of-control panic.
When a British tabloid headline screams, âAttack of the psycho chatbot,â itâs funny. When itâs followed by another front-page headline, âPsycho killer chatbots are befuddled by Wordle,â itâs even funnier. If this type of coverage stayed in the tabloids, which are known to be sensationalized, that was fine.
In just a few days, we went from âgovernments should force a 6-month pauseâ (the petition from the Future of Life Institute) to âwait, itâs not enough, so data centers should be bombed.â Sadly, this is the narrative that gets media attention and shapes our already hyperbolic AI discourse.
In order to understand the rise of AI Doomerism, here are some influential figures responsible for mainstreaming doomsday scenarios. This is not the full list of AI doomers, just the ones that recently shaped the AI panic cycle (so Iâm focusing on them).
AI Panic Marketing: Exhibit A: Sam Altman.
Sam Altman has a habit of urging us to be scared. âAlthough current-generation AI tools arenât very scary, I think we are potentially not that far away from potentially scary ones,â he tweeted. âIf youâre making AI, it is potentially very good, potentially very terrible,â he told the WSJ. When he shared the bad-case scenario of AI with Connie Loizo, it was âlights out for all of us.â
In an interview with Kara Swisher, Altman expressed how he is âsuper-nervousâ about authoritarians using this technology.â He elaborated in an ABC News interview: âA thing that I do worry about is ⌠weâre not going to be the only creator of this technology. There will be other people who donât put some of the safety limits that we put on it. Iâm particularly worried that these models could be used for large-scale disinformation.â These models could also âbe used for offensive cyberattacks.â So, âpeople should be happy that we are a little bit scared of this.â He repeated this message in his following interview with Lex Fridman: âI think itâd be crazy not to be a little bit afraid, and I empathize with people who are a lot afraid.â
Having shared this story in 2016, it shouldnât come as a surprise: âMy problem is that when my friends get drunk, they talk about the ways the world will END.â One of the âmost popular scenarios would be A.I. that attacks us.â âI try not to think about it too much,â Altman continued. âBut I have guns, gold, potassium iodide, antibiotics, batteries, water, gas masks from the Israeli Defense Force, and a big patch of land in Big Sur I can fly to.â
(Wouldnât it be easier to just cut back on the drinking and substance abuse?).
Altmanâs recent post âPlanning for AGI and beyondâ is as bombastic as it gets: âSuccessfully transitioning to a world with superintelligence is perhaps the most important â and hopeful, and scary â project in human history.â
It is at this point that you might ask yourself, âWhy would someone frame his company like that?â Well, thatâs a good question. The answer is that making OpenAIâs products âthe most important and scary â in human historyâ is part of its marketing strategy. âThe paranoia is the marketing.â
âAI doomsaying is absolutely everywhere right now,â described Brian Merchant in the LA Times. âWhich is exactly the way that OpenAI, the company that stands to benefit the most from everyone believing its product has the power to remake â or unmake â the world, wants it.â Merchant explained Altmanâs science fiction-infused marketing frenzy: âScaring off customers isnât a concern when what youâre selling is the fearsome power that your service promises.â
During the Techlash days in 2019, which focused on social media, Joseph Bernstein explained how the alarm over disinformation (e.g., âCambridge Analytica was responsible for Brexit and Trumpâs 2016 electionâ) actually âsupports Facebookâs sales pitchâ:
This can be applied here: The alarm over AIâs magic power (e.g., âreplacing humansâ) actually âsupports OpenAIâs sales pitchâ:
âWhat could be more appealing to future AI employees and investors than a machine that can become superintelligence?â
AI Panic as a Business. Exhibit A & B: Tristan Harris & Eliezer Yudkowsky.
Altman is at least using apocalyptic AI marketing for actual OpenAI products. The worst kind of doomers is those whose AI panic is their product, their main career, and their source of income. A prime example is the Effective Altruism institutes that claim to be the superior few who can save us from a hypothetical AGI apocalypse.
In March, Tristan Harris, Co-Founder of the Center for Humane Technology, invited leaders to a lecture on how AI could wipe out humanity. To begin his doomsday presentation, he stated: âWhat nukes are to the physical world ⌠AI is to everything else.â
In the âSocial Dilemma,â he promoted the idea that âTwo billion people will have thoughts that they didnât intend to haveâ because of the designersâ decisions. But, as Lee Visel pointed out, Harris didnât provide any evidence that social media designers actually CAN purposely force us to have unwanted thoughts.
Similarly, thereâs no need for evidence now that AI is worse than nuclear power; simply thinking about this analogy makes it true (in Harrisâ mind, at least). Did a social media designer force him to have this unwanted thought? (Just wondering).
To further escalate the AI panic, Tristan Harris published an OpEd in The New York Times with Yuval Noah Harari and Aza Raskin. Among their overdramatic claims: âWe have summoned an alien intelligence,â âA.I. could rapidly eat the whole human culture,â and AIâs âgodlike powersâ will âmaster us.â
Another statement in this piece was, âSocial media was the first contact between A.I. and humanity, and humanity lost.â I found it funny as it came from two men with hundreds of thousands of followers (@harari_yuval 540.4k, @tristanharris 192.6k), who use their social media megaphone ⌠for fear-mongering. The irony is lost on them.
âThis is what happens when you bring together two of the worst thinkers on new technologies,â added Lee Vinsel. âAmong other shared tendencies, both bloviate free of empirical inquiry.â
This is where we should be jealous of AI doomers. Having no evidence and no nuance is extremely convenient (when your only goal is to attack an emerging technology).
Then came the famous âOpen Letter.â This petition from the Future of Life Institute lacked a clear argument or a trade-off analysis. There were only rhetorical questions, like, should we develop imaginary ânonhuman minds that might eventually outnumber, outsmart, obsolete, and replace us?â They provided no evidence to support the claim that advanced LLMs pose an unprecedented existential risk. There were a lot of highly speculative assumptions. Yet, they demanded an immediate 6-month pause on training AI systems and argued that âIf such a pause cannot be enacted quickly, governments should institute a moratorium.â
Please keep in mind that (1). A $10 million donation from Elon Musk launched the Future of Life Institute in 2015. Out of its total budget of 4 million euros for 2021, Musk Foundation contributed 3.5 million euros (the biggest donor by far). (2). Musk once said that âWith artificial intelligence, we are summoning the demon.â (3). Due to this, the instituteâs mission is to lobby against extinction, misaligned AI, and killer robots.
âThe authors of the letter believe they are superior. Therefore, they have the right to call a stop, due to the fear that less intelligent humans will be badly influenced by AI,â responded Keith Teare (CEO SignalRank Corporation). âThey are taking a paternalistic view of the entire human race, saying, âYou canât trust these people with this AI.â Itâs an elitist point of view.â
Spencer Ante (Meta Foresight). âLeading providers of AI are taking AI safety and responsibility very seriously, developing risk-mitigation tools, best practices for responsible use, monitoring platforms for misuse, and learning from human feedback.â
Next, because he thought the open letter didnât go far enough, Eliezer Yudkowsky took âPhobAIâ too far. First, Yudkowsky asked us all to be afraid of made-up risks and an apocalyptic fantasy he has about âsuperhuman intelligenceâ âkilling literally everyoneâ (or âkill everyone in the U.S. and in China and on Earthâ). Then, he suggested that âpreventing AI extinction scenarios is considered a priority above preventing a full nuclear exchange.â By explicitly advocating violent solutions to AI, we have officially reached the height of hysteria.
âRhetoric from AI doomers is not just ridiculous. Itâs dangerous and unethical,â responded Yann Lecun (Chief AI Scientist, Meta). âAI doomism is quickly becoming indistinguishable from an apocalyptic religion. Complete with prophecies of imminent fire and brimstone caused by an omnipotent entity that doesnât actually exist.â
âYou stand a far greater chance of dying from lightning strikes, collisions with deer, peanut allergies, bee stings & ignition or melting of nightwear â than you do from AI,â Michael Shermer wrote to Yudkowsky. âQuit stoking irrational fears.â
The problem is that âirrational fearsâ sell. They are beneficial to the ones who spread them.
How to Spot an AI Doomer?
On April 2nd, Gary Marcus asked: âConfused about the terminology. If I doubt that robots will take over the world, but I am very concerned that a massive glut of authoritative-seeming misinformation will undermine democracy, do I count as a âdoomerâ?
One of the answers was: âYouâre a doomer as long as you bypass participating in the conversation and instead appeal to populist fearmongering and lobbying reactionary, fearful politicians with clickbait.â
Considering all of the above, I decided to define âAI doomerâ and provide some criteria:
Doomers tend to live in a tradeoff-free fantasy land.
Doomers have a general preference for very amorphous, top-down Precautionary Principle-based solutions, but they (1) rarely discuss how (or if) those schemes would actually work in practice, and (2) almost never discuss the trade-offs/costs their extreme approaches would impose on society/innovation.
Answering Gary Marcusâ question, I do not think he qualifies as a doomer. You need to meet all criteria (he does not). Meanwhile, Tristan Harris and Eliezer Yudkowsky meet all seven.
Are they ever going to stop this âPanic-as-a-Businessâ? If the apocalyptic catastrophe doesnât occur, will the AI doomers ever admit they were wrong? I believe the answer is âNo.â
Segment Anything, recently released by Facebook Research, does something that most people who have dabbled in computer vision have found daunting: reliably figure out which pixels in an image belong to an object. Making that easier is the goal of the Segment Anything Model (SAM), just released under the Apache 2.0 license.
The online demo has a bank of examples, but also works with uploaded images.
The results look fantastic, and thereâs an interactive demo available where you can play with the different ways SAM works. One can pick out objects by pointing and clicking on an image, or images can be automatically segmented. Itâs frankly very impressive to see SAM make masking out the different objects in an image look so effortless. What makes this possible is machine learning, and part of that is the fact that the model behind the system has been trained on a huge dataset of high-quality images and masks, making it very effective at what it does.
Once an image is segmented, those masks can be used to interface with other systems like object detection (which identifies and labels what an object is) and other computer vision applications. Such system work more robustly if they already know where to look, after all. This blog post from Meta AI goes into some additional detail about whatâs possible with SAM, and fuller details are in the research paper.
Systems like this rely on quality datasets. Of course, nothing beats a great collection of real-world data but weâve also seen that itâs possible to machine-generate data that never actually existed, and get useful results.
Motherboard has found, this synthesized call and another against Hempstead High School were just one small part of a months-long, nationwide campaign of dozens, and potentially hundreds, of threats made by one swatter in particular who has weaponized computer generated voices. Known as âTorswatsâ on the messaging app Telegram, the swatter has been calling in bomb and mass shooting threats against highschools and other locations across the country.
[…]
For $75, Torswats says they will close down a school. For $50, Torswats says customers can buy âextreme swattings,â in which authorities will handcuff the victim and search the house. Torswats says they offer discounts to returning customers, and can negotiate prices for âfamous people and targets such as Twitch streamers.â Torswats says on their Telegram channel that they take payment in cryptocurrency.
[…]
Torswatsâ use of synthetic voices allows them to carry out swatting threats at scale with relatively little effort, while also protecting what their own voice sounds like.
[…]
Motherboardâs reporting on Torswats comes as something of a nationwide swatting trend spreads across the United States. In October, NPR reported that 182 schools in 28 states received fake threat calls. Torswatsâ use of a computer generated voice also comes as the rise of artificial intelligence poses even greater risks to those who may face harassment online. In February, Motherboard reported that someone had doxed and harassed a series of voice actors by having an artificial intelligence program read out their home addresses
[…]
On their Telegram channel, Torswats has uploaded at least 35 distinct recordings of calls they appear to have made. Torswats may have made many more swatting calls on othersâ behalf, though: each filename includes a number, with the most recent going up to 170. Torswats also recently shuttered their channel before reappearing on Telegram in February.
In all of those 35 recordings except two, Torswats appears to have used a synthesized voice. The majority of the calls are made with a fake male sounding voice; several include a woman which also appears to be computer generated.
Torswats is seemingly able to change what the voice is saying in something close to real-time in order to respond to the operatorâs questions. These sometimes include âwhere are you located,â âwhat happened,â and âwhat is your name?â
[…]
After publication of this article, Torswats deleted the audio recordings from their Telegram channel and claimed they were stopping the service for at least one month. âTime to dip a bit,â they wrote on the channel.
Reuters has a deep dive into sleep on their website, lots of interesting information on what happens physiologically to people when they wake and sleep and the importance of having regularity.
Despite some companies making strides with ARM, for the most part, the desktop and laptop space is still dominated by x86 machines. For all their advantages, they have a glaring flaw for anyone concerned with privacy or security in the form of a hardware backdoor that can access virtually any part of the computer even with the power off. AMD calls their system the Platform Security Processor (PSP) and Intelâs is known as the Intel Management Engine (IME).
To fully disable these co-processors a computer from before 2008 is required, but if you need more modern hardware than that which still respects your privacy and security concerns youâll need to either buy an ARM device, or disable the IME like NovaCustom has managed to do with their NS51 series laptop.
NovaCustom specializes in building custom laptops with customizations for various components and specifications to fit their needs, including options for the CPU, GPU, RAM, storage, keyboard layout, and other considerations. They favor Coreboot as a bootloader which already goes a long way to eliminating proprietary closed-source software at a fundamental level, but not all Coreboot machines have the IME completely disabled. There are two ways to do this, the HECI method which is better than nothing but not fully trusted, and the HAP bit, which completely disables the IME. NovaCustom is using the HAP bit approach to disable the IME, meaning that although itâs not completely eliminated from the computer, it is turned off in a way thatâs at least good enough for computers that the NSA uses.
In a news announcement on Wednesday, the Italian Data Protection Authority, known as the Garante, stressed that OpenAI needed to be more transparent about its data collection processes and inform users about their data rights with regards to the generative AI. These rights include allowing users and non-users of ChatGPT to object to having their data processed by OpenAI and letting them correct false or inaccurate information about them generated by ChatGPT, similar to rights related to other technologies guaranteed by Europeâs General Data Protection Regulation, or GDPR, laws.
Other measures required by the Garante include a public notice on OpenAIâs website âdescribing the arrangements and logic of the data processing required for the operation of ChatGPT along with the rights afforded to data subjects.â The regulator will also require OpenAI to immediately implement an age gating system for ChatGPT and submit a plan to implement an age verification system by May 31.
The Italian regulator said OpenAI had until April 30 to implement the measures itâs asking for.
Allowing users to correct is in principle a Good Idea, but then you get Wikipedia types of battles on who is the arbiter of truth. Of course, no one system will ever be 100% truthful or accurate, so banning it for this is just stupid. No age gate keeper works either and neither did the ban – people can circumvent these very very easily. So Italy needs some sort of concession to get out of the hole it’s dug itself and this is at least a promising start.
The 2019 release of the first image of a black hole was hailed as a significant scientific achievement. But truth be told, it was a bit blurry – or, as one astrophysicist involved in the effort called it, a “fuzzy orange donut.”
Scientists on Thursday unveiled a new and improved image of this black hole – a behemoth at the center of a nearby galaxy – mining the same data used for the earlier one but improving its resolution by employing image reconstruction algorithms to fill in gaps in the original telescope observations.
[…]
The ring of light – that is, the material being sucked into the voracious object – seen in the new image is about half the width of how it looked in the previous picture. There is also a larger “brightness depression” at the center – basically the donut hole – caused by light and other matter disappearing into the black hole.
The image remains somewhat blurry due to the limitations of the data underpinning it – not quite ready for a Hollywood sci-fi blockbuster, but an advance from the 2019 version.
This supermassive black hole resides in a galaxy called Messier 87, or M87, about 54 million light-years from Earth. A light year is the distance light travels in a year, 5.9 trillion miles (9.5 trillion km). This galaxy, with a mass 6.5 billion times that of our sun, is larger and more luminous than our Milky Way.
[…]
Lia Medeiros of the Institute for Advanced Study in Princeton, New Jersey, lead author of the research published in the Astrophysical Journal Letters.
The study’s four authors are members of the Event Horizon Telescope (EHT) project, the international collaboration begun in 2012 with the goal of directly observing a black hole’s immediate environment. A black hole’s event horizon is the point beyond which anything – stars, planets, gas, dust and all forms of electromagnetic radiation – gets swallowed into oblivion.
Medeiros said she and her colleagues plan to use the same technique to improve upon the image of the only other black hole ever pictured – released last year showing the one inhabiting the Milky Way’s center, called Sagittarius A*, or Sgr A*.
The M87 black hole image stems from data collected by seven radio telescopes at five locations on Earth that essentially create a planet-sized observational dish.
“The EHT is a very sparse array of telescopes. This is something we cannot do anything about because we need to put our telescopes on the tops of mountains and these mountains are few and far apart from each other. Most of the Earth is covered by oceans,” said Georgia Tech astrophysicist and study co-author Dimitrios Psaltis.
“As a result, our telescope array has a lot of ‘holes’ and we need to rely on algorithms that allow us to fill in the missing data,” Psaltis added. “The image we report in the new paper is the most accurate representation of the black hole image that we can obtain with our globe-wide telescope.”
The machine-learning technique they used is called PRIMO, short for “principal-component interferometric modeling.”
“This is the first time we have used machine learning to fill in the gaps where we don’t have data,” Medeiros said. “We use a large data set of high-fidelity simulations as a training set, and find an image that is consistent with the data and also is broadly consistent with our theoretical expectations. The fact that the previous EHT results robustly demonstrated that the image is a ring allows us to assume so in our analysis.”
Debashis Chanda, a nanoscience researcher with the University of Central Florida, and his team have created a way to mimic nature’s ability to reflect light and create beautifully vivid color without absorbing any heat like traditional pigments do.
Chanda’s research, published in the journal Science Advances, explains and explores structural color and how people could use it to live cooler in a rapidly warming world.
Structural colors are created not from traditional pigmentation but from the arrangement of colorless materials to reflect light in certain ways. This process is how rainbows are made after it rains and how suncatchers bend light to create dazzling displays of color.
[…]
One driver for the researchers: A desire to avoid toxic materials
To create these colors, synthetic materials like heavy metals are used to create vivid paints.
“We use a lot of artificially synthesized organic molecules, lots of metal,” Chanda told NPR. “Think about your deep blues, you need cobalt, a deep red needs cadmium. They are toxic. We are polluting our nature and our whole habitat by using this kind of paint. So one of the major motivations for us was to create a color based on non-toxic material.”
So why can’t we simply use ground-up peacock feathers to recreate its vivid greens, blues and golds? It’s because they have no pigment. Some of the brightest colors in nature aren’t pigmented at all, peacock feathers included.
These bright, beautiful colors are achieved by the bending and reflection of light. The way the structure of a wing, a feather or other material reflects light back at the viewer. It doesn’t absorb any light, it beams it back out in the form of a visible color, and this is where things get interesting.
Chanda’s research began here, with his fascination with natural colors and how they are achieved in nature.
Beyond just the beautiful arrays of color that structure can create, Chanda also found that unlike pigments, structural paint does not absorb any infrared light.
Infrared light is the reason black cars get hot on sunny days and asphalt is hot to the touch in summer. Infrared light is absorbed as heat energy into these surfaces â the darker the color, the more the surface colored with it can absorb. That’s why people are advised to wear lighter colors in hotter climates and why many buildings are painted bright whites and beiges.
Chanda found that structural color paint does not absorb any heat. It reflects all infrared light back out. This means that in a rapidly warming climate, this paint could help communities keep cool.
Chanda and his team tested the impact this paint had on the temperature of buildings covered in structural paint versus commercial paints and they found that structural paint kept surfaces 20 to 30 degrees cooler.
This, Chanda said, is a massive new tool that could be used to fight rising temperatures caused by global warming while still allowing us to have a bright and colorful world.
Unlike white and black cars, structural paint’s ability to reflect heat isn’t determined by how dark the color is. Blue, black or purple structural paints reflect just as much heat as bright whites or beige. This opens the door for more colorful, cooler architecture and design without having to worry about the heat.
A little paint goes a long way
It’s not just cleaner, Chanda said. Structural paint weighs much less than pigmented paint and doesn’t fade over time like traditional pigments.
“A raisin’s worth of structural paint is enough to cover the front and back of a door,” he said.
Unlike pigments which rely on layers of pigment to achieve depth of color, structural paint only requires one thin layer of particles to fully cover a surface in color. This means that structural paint could be a boon for aerospace engineers who rely on the lowest weight possible to achieve higher fuel efficiency.
On Tuesday, Google â which has answered the government’s call to secure the software supply chain with initiatives like the Open Source Vulnerabilities (OSV) database and Software Bills of Materials (SBOMs) â announced an open source software vetting service, its deps.dev API.
The API, accessible in a more limited form via the web, aims to provide software developers with access to security metadata on millions of code libraries, packages, modules, and crates.
By security metadata, Google means things like: how well maintained a library is, who maintains it, what vulnerabilities are known to be present in it and whether they have been fixed, whether it’s had a code review, whether it’s using old or new versions of other dependencies, what license covers it, and so on. For example, see the info on the Go package cmdr and the Rust Cargo crate crossbeam-utils.
The API also provides at least two capabilities not available through the web interface: the ability to query the hash of a fileâs contents (to find all package versions with the file) and dependency graphs based on actual installation rather than just declarations.
“Software supply chain attacks are increasingly common and harmful, with high profile incidents such as Log4Shell, Codecov, and the recent 3CX hack,” said Jesper Sarnesjo and Nicky Ringland, with Google’s open source security team, in a blog post. “The overwhelming complexity of the software ecosystem causes trouble for even the most diligent and well-resourced developers.”
[…]
The deps.dev API indexes data from various software package registries, including Rust’s Cargo, Go, Maven, JavaScript’s npm, and Python’s PyPI, and combines that with data gathered from GitHub, GitLab, and Bitbucket, as well as security advisories from OSV. The idea is to make metadata about software packages more accessible, to promote more informed security decisions.
Developers can query the API to look up a dependency’s records, with the returned data available programmatically to CI/CD systems, IDE plugins that present the information, build tools and policy engines, and other development tools.
Sarnesjo and Ringland say they hope the API helps developers understand dependency data better so that they can respond to – or prevent – attacks that try to compromise the software supply chain.
Software engineer Jeff Lau, posting under the username UselessPickles, showed off the restored car phone in a video uploaded to YouTube. The Mitsubishi came from the factory with an optional “DiamondTel” handset and hands-free system, which was rendered inoperable by the discontinuation of analog “AMPS” cell service in the U.S. in 2008. (The 3G shutdown bricked a ton of newer cars’ connectivity features, too.)
After three years of work, Lau restored the device’s functionality using a custom Bluetooth adapter. Lau engineered the adapter to piggyback between the stock phone transceiver and hands-free control unit located under the trunk carpet. That let Lau tap into modern cell networks with his 1993 car phoneâbut he didn’t stop there.
Paired with a smartphone, the stock handset displays the name of the paired device and the signal strength of the smartphone’s network. It gets better: The car’s hands-free microphone feeds the smartphone voice commands (to Apple’s Siri in this case). It’s pretty much all the functionality of a 2023 hands-free system but without the distraction of a touchscreen.
Obviously, that isn’t about to become a widespread resto-mod trend soon. The lengthy dev time, low take rate of car phones in their day, and uniqueness of individual cars’ systems mean we’re probably not about to see off-the-shelf car phone restoration kits soon. But the fact that bringing car phones back is possible will hopefully inspire someone else out there to resuscitate theirsâmaybe even one of those retro Chrysler VisorPhones will ride one day again. Or ring, I should say.
Universal Music Group has told streaming platforms, including Spotify and Apple, to block artificial intelligence services from scraping melodies and lyrics from their copyrighted songs, according to emails viewed by the Financial Times. From the report: UMG, which controls about a third of the global music market, has become increasingly concerned about AI bots using their songs to train themselves to churn out music that sounds like popular artists. AI-generated songs have been popping up on streaming services and UMG has been sending takedown requests “left and right,” said a person familiar with the matter. The company is asking streaming companies to cut off access to their music catalogue for developers using it to train AI technology. “We will not hesitate to take steps to protect our rights and those of our artists,” UMG wrote to online platforms in March, in emails viewed by the FT. “This next generation of technology poses significant issues,” said a person close to the situation. “Much of [generative AI] is trained on popular music. You could say: compose a song that has the lyrics to be like Taylor Swift, but the vocals to be in the style of Bruno Mars, but I want the theme to be more Harry Styles. The output you get is due to the fact the AI has been trained on those artists’ intellectual property.”
Basically they don’t want AI’s listening to their music as an inspiration for them to make music. Which is exactly what humans do. So I’m very curious what legal basis would accept their takedowns.
Scientists using data from the Atacama Cosmology Telescope in Chile have made a detailed map of dark matterâs distribution across a quarter of the sky.
The map shows regions the distribution of mass extending essentially as far we can see back in time; it uses the cosmic microwave background as a backdrop for the dark matter portrait. The teamâs research will be presented at the Future Science with CMB x LSS conference in Kyoto, Japan.
âWe have mapped the invisible dark matter across the sky to the largest distances, and clearly see features of this invisible world that are hundreds of millions of light-years across,â said Blake Sherwin, a cosmologist at the University of Cambridge, in a Princeton University release. âIt looks just as our theories predict.â
[…]
the only way dark matter is observed is indirectly, in the way its gravitational effects are observed at large scales. Enter the Atacama Cosmology Telescope, which more precisely dated the universe in 2021. The telescopeâs map builds on a map of the universeâs matter released earlier this year, which was produced using data from the Dark Energy Survey and the South Pole Telescope. That map upheld previous estimations of the ratio of ordinary matter to dark matter and found that the distribution of the matter was less clumpy than previously thought.
The new map homes in on a lingering concern of Einsteinâs general relativity: how the most massive objects in the universe, like supermassive black holes, bend light from more distant sources. One such source is the cosmic microwave background, the most ancient detectable light, which radiates from the aftermath of the Big Bang.
The researchers effectively used the background as a backlight, to illuminate regions of greater density in the universe.
âItâs a bit like silhouetting, but instead of just having black in the silhouette, you have texture and lumps of dark matter, as if the light were streaming through a fabric curtain that had lots of knots and bumps in it,â said Suzanne Staggs, director of the Atacama Cosmology Telescope and a physicist at Princeton, in the university release.
The cosmic microwave background as seen by the European Space Agencyâs Planck observatory.
âThe famous blue and yellow CMB image is a snapshot of what the universe was like in a single epoch, about 13 billion years ago, and now this is giving us the information about all the epochs since,â Staggs added.
The recent analysis suggests that the dark matter was lumpy enough to fit with the standard model of cosmology, which relies on Einsteinâs theory of gravity.
Eric Baxter, an astronomer at the University of Hawaiâi and a co-author of the research that resulted in the February dark matter map, told Gizmodo in an email that his teamâs map was sensitive to low-redshifts (meaning close by, in the more recent universe). On the other hand, the newer map focuses exclusively on the lensing of the cosmic microwave background, meaning higher redshifts and a more sweeping scale.
âSaid another way, our measurements and the new ACT measurements are probing somewhat different (and complementary) aspects of the matter distribution,â Baxter said. âThus, rather than contradicting our previous results, the new results may be providing an important new piece of the puzzle about possible discrepancies with our standard cosmological model.â
âPerhaps the Universe is less lumpy than expected on small scales and at recent times (i.e. the regime probed by our analysis), but is consistent with expectations at earlier times and at larger scales,â Baxter added.
New instruments should help tease out the matter distribution of the universe. An upcoming telescope at the Simons Observatory in the Atacama is set to begin operations in 2024 and will map the sky nearly 10 times faster than the Atacama Cosmology Telescope, according to the Princeton release.
Researchers have discovered that in the exotic conditions of the early universe, waves of gravity may have shaken space-time so hard that they spontaneously created radiation.
[…]
a team of researchers have discovered that an exotic form of parametric resonance may have even occurred in the extremely early universe.
Perhaps the most dramatic event to occur in the entire history of the universe was inflation. This is a hypothetical event that took place when our universe was less than a second old. During inflation our cosmos swelled to dramatic proportions, becoming many orders of magnitude larger than it was before. The end of inflation was a very messy business, as gravitational waves sloshed back and forth throughout the cosmos.
Normally gravitational waves are exceedingly weak. We have to build detectors that are capable of measuring distances less than the width of an atomic nucleus to find gravitational waves passing through the Earth. But researchers have pointed out that in the extremely early universe these gravitational waves may have become very strong.
And they may have even created standing wave patterns where the gravitational waves werenât traveling but the waves stood still, almost frozen in place throughout the cosmos. Since gravitational waves are literally waves of gravity, the places where the waves are the strongest represent an exceptional amount of gravitational energy.
The researchers found that this could have major consequences for the electromagnetic field existing in the early universe at that time. The regions of intense gravity may have excited the electromagnetic field enough to release some of its energy in the form of radiation, creating light.
This result gives rise to an entirely new phenomenon: the production of light from gravity alone. Thereâs no situation in the present-day universe that could allow this process to happen, but the researchers have shown that the early universe was a far stranger place than we could possibly imagine.
Back in 2017, we learned about the biggest heist in EVE Online history (opens in new tab): A year-long inside job that ultimately made off with an estimated 1.5 triillion ISK, worth around $10,000 in real money. But now another EVE player claims to have pulled off a heist worth significantly more than thatâand with significantly less work involved.
The 2017 heist, like so many of EVE’s most interesting stories, relied primarily on social engineering: Investing months or years of time into grooming a target before pulling the rug out from beneath them. But redditor Flam_Hill (opens in new tab) said this job was less bloody: Instead of betrayal, this theft was dependent upon learning and exploiting the “shares mechanic” in EVE Online in order to leverage a takeover of Event Horizon Expeditionaries, a 299-member corporation that was part of the Pandemic Horde alliance.
Using a “clean account with a character with a little history,” Flan_Hill and an unnamed partner applied for membership in the EHEXP corporation. After the account was accepted, Flan_Hill transferred enough of his shares in the corporation to the infiltrator to enable a call for a vote for a new CEO. The conspirators both voted yes, while nobody else in the corporation voted at all.
This was vital, because after 72 hours the two “yes” votes carried the day. The infiltrating agent was very suddenly made CEO, which was in turn used to make Flan_Hill an Event Horizon Expeditionaries director, at which point they removed all the other corporate directors and set to emptying the coffers.
They stripped 130 billion ISK from the corporate wallet, but that was only a small part of the haul: Counting all stolen assets, including multiple large ships, Flam_Hill estimated the total value of the heist at 2.23 trillion ISK, which works out to more than $22,300 in real money. ISK can’t be legally cashed out of EVE Online, but it can be used to buy Plex (opens in new tab), an in-game currency used to upgrade accounts, purchase virtual goods, and activate other services.
[…]
The one aspect of the story that some redditors took issue with is the origin of the 1,000 shares in Event Horizon Expeditionaries that made this theft possible in the first place.
[…]
It all comes down to EVE’s corporation voting system (opens in new tab): Any member of a corporation holding more than 5% of the total shares can start a vote, andâthis is what it really comes down toâ”the option that gains more than 50% of cast votes wins the vote.” This is why the inattentiveness of EHEXP membership was so vital: Flam_Hill and his partner were the only ones to vote “yes,” so they had 100% of the cast votes and were thus able to seize power.
[…]
EVE Online developer CCP Games eliminated any doubt by confirming that the heist did in fact take place, although it declined to comment on the value of the theft.
In the end, it turned out that the “former CEO” theory was correct. Speaking to PC Gamer, the mastermind of the heist, known in EVE as Sienna d’Orienâreal name Daveâconfirmed that he was in fact the founder and former chief of Event Horizon Expeditionaries, which is how he had the shares in the company that enabled the takeover. He quit EVE in 2018, citing burnout and other priorities, but returned in 2022 to find EHEXP “a shell of its former self.”
After forming a new group, Dave reached out to the corporation to inquire about getting some of his old assets back, but was ignored. His partner in the heist, Packratt, then brought up the shares mechanic, and they went to work. They were aided by a third friend and former EHEXP member, Highlander McLeod, who handled some of the research in order to keep d’Orien’s name out of itâalthough McLeod was kept in the dark about the job until it was over, in order to ensure operational security.
[…]
They managed to pull the job off with virtually complete anonymity, but Dave said he’s stepping out of the shadows because “it will get out eventually” anywayâand it probably doesn’t hurt that he can now bask in the glory of the moment.
[…]
As for Dave, who’s now playing “in a new corp with old mates,” he acknowledged that the heist could complicate his in-game life somewhat: He’ll be an interstellar folk hero to some (people love a good EVE heist) but no doubt a villainâand a targetâin the eyes of others.
About a year ago, Google announced its Assured Open Source Software (Assured OSS) service, a service that helps developers defend against supply chain security attacks by regularly scanning and analyzing for vulnerabilities some of the worldâs most popular software libraries. Today, Google is launching Assured OSS into general availability with support for well over a thousand Java and Python packages â and while Google didnât initially disclose pricing when it first announced the service, the company has now revealed that it will be available for free.
Software development has long depended on third-party libraries (which are often maintained by only a single developer), but it wasnât until the industry got hit with a number of high-profile exploits that everyone (including the White House) perked up and started taking software supply chain security seriously. Now, you canât attend an open source conference without hearing about Software Bills of Materials (SBOMs), artifact registries and similar topics
[…]
Google promises that it will constantly keep these libraries up to date (without creating forks) and continuously scan for known vulnerabilities, do fuzz tests to discover new ones and then fix these issues and contribute these fixes back upstream. The company notes that when it first launched the service with around 250 Java libraries, it was responsible for discovering 48% of the new CVEs for these libraries and subsequently addressing them.
[…]
By partnering with a trusted supplier, organizations can mitigate these risks and ensure the integrity of their software supply chain to better protect their business applications.â
Developers and organizations that want to use the new service can sign up here and then integrate Assured OSS into their existing development pipeline.
Google unveiled a new open source security project on Thursday centered around software supply chain management.
Given the acronym GUAC â which stands for Graph for Understanding Artifact Composition â the project is focused on creating sets of data about a softwareâs build, security and dependency.
Google worked with Purdue University, Citibank and supply chain security company Kusari on GUAC, a free tool built to bring together many different sources of software security metadata. Google has also assembled a group of technical advisory members to help with the project â including IBM, Intel, Anchore and more.
âGUAC addresses a need created by the burgeoning efforts across the ecosystem to generate software build, security, and dependency metadata,â they wrote in a blog post. âGUAC is meant to democratize the availability of this security information by making it freely accessible and useful for every organization, not just those with enterprise-scale security and IT funding.â
They noted that U.S. President Joe Biden issued an executive order last year that said all federal government agencies must send a Software Bill of Materials (SBOM) to Allan Friedman, the director Cybersecurity Initiatives at National Telecommunications and Information Administration (NIST).
[…]
While SBOMs are becoming increasingly common thanks to the work of several tech industry groups like OpenSSF, there have been a number of complaints, one of those centered around the difficulty of sorting through troves of metadata, some of which is not useful.
Maruseac, Lum and Hepworth explained that it is difficult to combine and collate the kind of information found in many SBOMs.
âThe documents are scattered across different databases and producers, are attached to different ecosystem entities, and cannot be easily aggregated to answer higher-level questions about an organizationâs software assets,â they said.
Google shared a proof of concept of the project, which allows users to search data sets of software metadata.
The three explained that GUAC effectively aggregates software security metadata into a database and makes it searchable.
They used the example of a CISO or compliance officer that needs to understand the âblast radiusâ of a vulnerability. GUAC would allow them to âtrace the relationship between a component and everything else in the portfolio.â
Google says the tool will allow anyone to figure out the most used critical components in their software supply chain ecosystem, the security weak points and any risky dependencies.
Today, the Department of Commerceâs National Telecommunications and Information Administration (NTIA) launched a request for comment (RFC) to advance its efforts to ensure artificial intelligence (AI) systems work as claimed â and without causing harm. The insights gathered through this RFC will inform the Biden Administrationâs ongoing work to ensure a cohesive and comprehensive federal government approach to AI-related risks and opportunities.
[…]
NTIAâs âAI Accountability Policy Request for Commentâ seeks feedback on what policies can support the development of AI audits, assessments, certifications and other mechanisms to create earned trust in AI systems that they work as claimed. Much as financial audits create trust in the accuracy of a businessâ financial statements, so for AI, such mechanisms can help provide assurance that an AI system is trustworthy in that it does what it is intended to do without adverse consequences.
[…]
President Biden has been clear that when it comes to AI, we must both support responsible innovation and ensure appropriate guardrails to protect Americansâ rights and safety. The White House Office of Science and Technology Policyâs Blueprint for an AI Bill of Rights provides an important framework to guide the design, development, and deployment of AI and other automated systems. The National Institute of Standards and Technologyâs (NIST) AI Risk Management Framework serves as a voluntary tool that organizations can use to manage risks posed by AI systems.
Comments will be due 60 days from publication of the RFC in the Federal Register.
Jan Erik, sound muddled, he tells the caller he has already lost one million Swedish Krona (about ÂŁ80,000) in trading scams.
But the caller already knows this. And he knows it makes the pensioner a good target for a follow-up “recovery scam”. He tells Jan Erik that if he hands over his card details and pays a âŹ250 deposit, Solo Capitals will use special software to track his lost investments and get his money back.
“We will be able to recover the whole amount,” William Grant says.
It takes him a while to wear Jan Erik down. But after about 30 minutes on the phone, the pensioner begins reading out his credit card details.
The audio recording was saved by the company under the file name “William Sweden scammed”. The BBC obtained the file from a former employee, but the company had not tried hard to hide it. In fact, it had handed it out to new recruits as part of the company training package.
This was a lesson in how to scam.
[…]
The scam
For more than a year, BBC Eye has been investigating a global fraudulent trading network of hundreds of different investment brands that has scammed unwitting customers like Jan Erik out of more than a billion dollars.
Our investigation reveals for the first time the sheer scale of the fraud, as well as the identities of a shadowy network of individuals who appear to be behind it.
The network is known to police as the Milton group, a name originally used by the scammers themselves but abandoned in 2020. We identified 152 brands, including Solo Capitals, that appear to be part of the network. It operates by targeting investors and scamming them out of thousands – or in some cases hundreds of thousands – of pounds.
One Milton group investment brand even sponsored a top-flight Spanish football club, and advertised in major newspapers, lending it credibility with potential investors.
In November, BBC Eye accompanied German and Georgian police on call-centre raids in the Georgian capital Tbilisi. On the computer screens, we saw row after row of British phone numbers. We phoned several and spoke to British citizens who told us they had just invested money. On one desk, there was a handwritten note with a list of names and useful details for the scammers: “Homeowner, no responsibilities”; “50k in savings”; “From Poland, British citizen”; “50k in stocks.”
Next to the name of one British man, a note said: “Savings less than 10K, very pussy, should scam soon”.
Image caption,
Milton group brands had office space in this downtown Kyiv office building. (Alexander Mahmoud/DG)
The majority of victims sign up after seeing an ad on social media. Within 48 hours typically they receive a phone call from someone who tells them they could make returns of up to 90% per day. On the other end of the phone there is usually a call centre with many of the trappings of a legitimate business – a smart, modern office with an HR department, monthly targets and bonuses, awaydays and competitions for best salesperson. Some call centres play pumping music in the background. But there are also elements you won’t find in a legitimate business – written guidance on how to identify a potential investor’s weaknesses and turn those weaknesses against them.
From their first phone call, victims can be directed into regulated companies or sometimes unregulated, offshore entities. Some victims who signed up to regulated brands within the Milton group are directed by their broker to place trades designed to lose the customer money and make money for the broker – a practice which is illegal under UK regulations. Some victims are instructed to download software that allows the scammer to remotely control their PC and place trades for them – also illegal. And according to former employees of Milton group brands, some customers think they are making real trades, but their money is simply being siphoned away.
“The victims think they have a real account with the company, but there isn’t really any trading, it’s just a simulation,” said Alex, a former employee who worked in a Milton group office in Kyiv, Ukraine.
In order to better understand how the scam works, the BBC posed as an aspiring trader and contacted Coinevo, one of the Milton group’s trading platforms. We were connected to an adviser who gave the name Patrick, and told us we could make “70% or 80% or 90% as a return in one single day”. He told us to send $500 worth of Bitcoin as a deposit to begin trading with.
Patrick pressed our undercover trader to provide a copy of their passport, and after providing a fake copy we were able to continue to operate the account for about two months before Coinevo appeared to detect the fake. At that point, Patrick wrote to us by email, swearing at us and cutting off contact.
But the BBC’s deposit money was already in the system. We were able to track it as it was divided up into small fractions and moved through many different Bitcoin wallets, all seemingly associated with the Milton group. Experts told the BBC that genuine financial institutions do not funnel money in this way. Louise Abbott, a lawyer who specialises in cryptocurrency and fraud, examined the flow of the money and said it suggested “large-scale organised crime”. The reason the money was spread over various different bitcoin wallets, Abbott said, was to “make it as complicated as possible and as difficult as possible for either you, or the victim, or us as lawyers to find”.
[…]
Soon they were speaking nearly every morning, and Jane was revealing specific things she needed money for – expensive repairs to her roof, a buffer for her pension. Hunt used them against her, she said, telling her certain trades would “get her that roof” and “help her future”.
Over the next few months, Jane invested about ÂŁ15,000. But her trades weren’t doing well. Hunt advised her to withdraw her money and invest with a different trading platform, BproFX, where she could get better returns.
By that point, Jane fully trusted David Hunt. “I felt like I knew him well and I thought he had my interests at heart,” she said, welling up. “So I agreed to move with him.”
What she didn’t know was that BproFX was an unregulated, offshore entity based in Dominica. In reality, EverFX’s UK regulatory status did not stop it from scamming British citizens, but the move over to BproFX would strip Jane of even the scant protections she might be afforded under UK law. The BBC found several victims who were moved to unregulated companies in this way.
[…]
Other victims told the BBC they were scammed this way. Londoner Barry Burnett said he started investing after seeing an ad for EverFX, but after a few early wins, he suddenly lost more than ÂŁ10,000 in 24 hours. The adviser pressured him to put in another ÂŁ25,000 to trade himself out of his black hole.
“I must have got at least half a dozen calls in the space of about two hours,” Barry said. “People begging me to put more money in.”
Jane faced similar pressures from David Hunt. “He kept telling me that the more I put in the more I can recover,” she said.
Instead, both finally decided to call it quits. Barry had lost ÂŁ12,000, Jane ÂŁ27,000.
[…]
The operations of the Milton group have been investigated before, by the Swedish newspaper Dagens Nyheter and others, but the BBC set out to identify the senior figures behind the global scam.
We began by combing through publicly available corporate documents to map the connections between companies in the Milton group. Five names appeared again and again, listed as directors of the Milton trading platforms or supporting tech companies – David Todua, Rati Tchelidze, Guram Gogeshvili, Joseph Mgeladze, and Michael Benimini.
We plugged the five names into the Panama Papers, a massive 2016 leak detailing offshore companies, and discovered that four of them – Tchelidze, Gogeshvili, Mgeladze and Benimini – were listed as directors or senior figures within a group of linked offshore companies or subsidiary companies that pre-dated the Milton group.
Many of these non-Milton companies led back in some way to one figure: David Kezerashvili, a former Georgian government official who served for two years as the country’s defence minister.
Image caption,
David Kezerashvili, a former defence minister of Georgia, appears to be involved in the Milton scam. (Alamy/BBC)
Kezerashvili was dismissed as defence minister and later convicted in absentia for embezzling more than âŹ5m of government funds. By the time of his conviction, he was living in London and the UK turned down a request from Georgia for his extradition.
There were no publicly available documents linking Kezerashvili to this pre-Milton network, but when we looked at the Panama Papers, his name came up again and again, identifying him as either the founder of the parent companies in the network or as one of their initial shareholders. Behind the scenes, Kezerashvili appeared to be at the centre of that network.
When it came to the Milton group, there was similarly no publicly available documentation linking Kezerashvili to the scam companies, and there was no evidence that he had any direct financial interest in the Milton brands.
But several former employees of Milton-linked companies told us confidentially that they had had direct dealings with Kezerashvili and knew him to be involved in the Milton group.
Kezerashvili has frequently promoted the scam trading platforms on his personal social media accounts. On the business networking site LinkedIn, he has used his account almost exclusively to promote jobs and share posts about Milton-linked companies.
The BBC was able to find a number of other pieces of evidence linking the former defence minister to Milton brands. Several companies owned by Kezerashvili used a private email server on which the only other users were Milton group companies. His venture capital firm, Infinity VC, owned the branding and web domains for companies that provided trading platform technology to the scammers.
Kezerashvili also owns a Kyiv office building that was home to both the scam call centre selling EverFX and the tech firms that provided the software – offices which were raided by police in November. He also owns a Tbilisi office block that contained some of the same tech firms.
When the BBC examined social media profiles belonging to the four senior Milton group men, it became clear from pictures posted of wedding parties and other social events that they all had close social ties to Kezerashvili. Kezerashvili is Facebook friends with at least 45 people linked to the Milton group scams, and one of the four senior figures identified by the BBC is his cousin.
The BBC tracked Kezerashvili to his ÂŁ18m London mansion and asked to speak to him, but we were told he wasn’t available. He told the BBC via his lawyers that he strongly denied any involvement with the Milton group, or that he gained financially from scams. He said that EverFX was to his knowledge a legitimate business and his lawyers argued other connections we have found to the people and IT behind it “proved nothing”.
Image caption,
Scam victims download a trading platform, but some are never placing real trades at all. (Joel Gunter/BBC)
Mr Chelidze and Mr Gogeshvili also strongly denied our accusations, saying that EverFX was a legitimate, regulated platform. They denied knowledge of Milton or any connection between EverFX and the brands we identified, which they suggested had misused EverFX’s source code and brand to confuse users. They said EverFX had never had a crypto wallet and had no control over how its third-party payment processors directed funds.
Mr Mgeladze also denied our accusations, telling us that he has never owned any call centres fraudulently mis-selling investments and has no knowledge of the Milton group.
Mr Benimini did not respond to our questions.
EverFX denied our allegations, saying that they were a legitimate and regulated platform where risks were fully explained. They said that they had investigated Barry Burnett’s case and found that he was responsible for his losses.
In Jane’s case, they told us her losses were as a result of her moving to an unconnected company. They said that they had fully cooperated with the FCA and there were no outstanding UK regulatory complaints.
Sevilla FC told the BBC only that once their contract with EverFX ended, they had no more contact with the company.
South Korea’s antitrust regulator has fined Alphabet Inc’s (GOOGL.O) Google 42.1 billion won ($31.88 million) for blocking the release of mobile video games on a competitor’s platform.
The Korea Fair Trade Commission (KFTC) said on Tuesday that Google bolstered its market dominance, and hurt local app market One Store’s revenue and value as a platform, by requiring video game makers to exclusively release their titles on Google Play in exchange for providing in-app exposure between June 2016 and April 2018.
[…]
Game makers affected by Google’s action include Netmarble (251270.KS), Nexon (225570.KQ) and NCSOFT (036570.KS), as well as other smaller companies, the antitrust regulator added.
In 2021, Google was fined more than 200 billion won by the KFTC for blocking customised versions of its Android operating system.
Microsoft has been trying to make changes to almost every feature we use on Windows, from the taskbar to notifications. With Windows 11 KB5025310 available in the Beta channel, Microsoft is changing how the Print Screen key works, i.e. its default behaviour.
If your laptop has a dedicated Print Screen key, you can press it to instantly take a screenshot of the screen and save it to the clipboard. You can paste the screenshot into any app like Paint and do whatever you want to. This has always been the default behaviour of the Print Screen key (PrtSc).
KB5025310 is changing the default behaviour for everyone. After installing this or a newer update, your Print Screen key will open the new Snipping Tool. For those unaware, Windows 11âs new Snipping Tool replaces the legacy Snipping Tool and Snip & Sketch app and combines the best features.
Image Courtesy: Microsoft | Snipping Tool with screen recorder
This means Windows 11 wonât save your screenshots to the clipboard. Instead, it will open Snipping Tool, so you can change the screenshot and save it later. Thankfully, it is possible to revert to the original behaviour.
To restore the classic Print Screen key, head to Settings > Accessibility > Keyboard, and change the setting to how you want.