Empirical evidence on how to interrogate: build rapport, not conflict

The Alisons, husband and wife, have done something no scholars of interrogation have been able to do before. Working in close cooperation with the police, who allowed them access to more than 1,000 hours of tapes, they have observed and analysed hundreds of real-world interviews with terrorists suspected of serious crimes. No researcher in the world has ever laid hands on such a haul of data before. Based on this research, they have constructed the world’s first empirically grounded and comprehensive model of interrogation tactics.

The Alisons’ findings are changing the way law enforcement and security agencies approach the delicate and vital task of gathering human intelligence. “I get very little, if any, pushback from practitioners when I present the Alisons’ work,” said Kleinman, who now teaches interrogation tactics to military and police officers. “Even those who don’t have a clue about the scientific method, it just resonates with them.” The Alisons have done more than strengthen the hand of advocates of non-coercive interviewing: they have provided an unprecedentedly authoritative account of what works and what does not, rooted in a profound understanding of human relations. That they have been able to do so is testament to a joint preoccupation with police interviews that stretches back more than 20 years.
[…]
Each interview had to be minutely analysed according to an intricate taxonomy of interrogation behaviours, developed by the Alisons. Every aspect of the interaction between interviewee and interviewer (or interviewers – sometimes there are two) was classified and scored. They included the counter-interrogation tactics employed by the suspects (complete silence? humming?), the manner in which the interviewer asked questions (confrontational? authoritative? passive?), the demeanour of the interviewee (dominating? disengaged?), and the amount and quality of information yielded. Data was gathered on 150 different variables in all.
[…]
Despite its reputation among elite practitioners, “rapport” has been vaguely defined and poorly understood. It is often conflated with simply being nice – Laurence Alison refers to this, derisively, as the “cappuccinos and hugs” theory. In fact, he observes, interviewers can fail because they are too nice, acquiescing too quickly to the demands of a suspect, or neglecting to pursue a line of purposeful questioning at a vital moment.

The best interviewers are versatile: they know when to be sympathetic, when to be direct and forthright. What they rarely do is impose their will on the interviewee, either overtly, through aggression, or covertly, through the use of “tricks” – techniques of unconscious manipulation, which make the interviewer feel smart but are often seen through by interviewees. Above all, rapport, in the sense used by the Alisons, describes an authentic human connection. “You’ve got to mean it,” is one of Laurence’s refrains.

Source: The scientists persuading terrorists to spill their secrets | News | The Guardian

Imgur: 1.7m accounts breached in 2014

On November 23, Imgur was notified of a potential security breach that occurred in 2014 that affected the email addresses and passwords of 1.7 million user accounts.

Imgur

Paltering: lying by using the truth

There are three types of lies: omission, where someone holds out on the facts; commission, where someone states facts that are untrue; and paltering, where someone uses true facts to mislead you. It’s not always easy to detect, but there are a few telltale signs.

A recent study, published in the Journal of Personality and Social Psychology, suggests the practice of paltering is pretty common, especially among business executives. Not only that, but the people who do it don’t seem to think they’re doing anything wrong—despite the fact that most people feel like it’s just as unethical and untrustworthy as intentional lies of commission. It’s not just execs who do it, though. If you’ve ever tried to buy a used car from a slimy salesman, been in a salary negotiation with a tough as nails boss, or watched basically any presidential debate, you’ve definitely seen paltering in action.

Lifehacker

Boffins craft perfect ‘head generator’ to beat facial recognition

Researchers from the Max Planck Institute for Informatics have defeated facial recognition on big social media platforms – by removing faces from photos and replacing them with automatically-painted replicas.

As the team of six researchers explained in their arXiv paper this month, people who want to stay private often blur their photos, not knowing that this is “surprisingly ineffective against state-of-the-art person recognisers.”
[…]
The result, the boffins claimed, is that their model can provide a realistic-looking result, even when it’s faced with “challenging poses and scenarios” including different lighting conditions, such that the “fake” face “blends naturally into the context”.

In common with modern facial recognition systems, Sun’s software builds a point cloud of landmarks captured from someone’s face; its adversarial attack against recognition perturbed those points.

Pairs of points from the original landmarks (real) and the generated landmarks (fake) are fed into the “head generator and discriminator” software to create the inpainted face.

The Register

Facebook rolls out AI to detect suicidal posts before they’re reported

Facebook’s new “proactive detection” artificial intelligence technology will scan all posts for patterns of suicidal thoughts, and when necessary send mental health resources to the user at risk or their friends, or contact local first-responders. By using AI to flag worrisome posts to human moderators instead of waiting for user reports, Facebook can decrease how long it takes to send help.

Facebook previously tested using AI to detect troubling posts and more prominently surface suicide reporting options to friends in the U.S. Now Facebook is will scour all types of content around the world with this AI, except in the European Union, where General Data Protection Regulation privacy laws on profiling users based on sensitive information complicate the use of this tech.
[…]
Unfortunately, after TechCrunch asked if there was a way for users to opt out, of having their posts a Facebook spokesperson responded that users cannot opt out. They noted that the feature is designed to enhance user safety, and that support resources offered by Facebook can be quickly dismissed if a user doesn’t want to see them.]

Facebook trained the AI by finding patterns in the words and imagery used in posts that have been manually reported for suicide risk in the past. It also looks for comments like “are you OK?” and “Do you need help?”

Techcrunch

Pornhub owner may become the UK’s gatekeeper of online porn

Mindgeek may be the most powerful company that you’ve never heard of, or at least, a company you’ll claim never to have heard about in polite company. It’s the conglomerate that owns some of the world’s most visited porn sites, including Pornhub, RedTube and YouPorn. Far from simply being a popular and free way for people to consume adult content, it may soon have a powerful political role in the UK that will ensure its dominance for decades to come. That’s because, within the next year, Mindgeek may become the principal gatekeeper between the country’s internet users and their porn.

In April, the UK passed the Digital Economy Act 2017, legislation that mandated that any website showing adult content must verify the ages of its visitors. It was pushed through in response to concerns that children were being corrupted by easy access to and exposure to adult content at an early age. Section 15(1) of the bill requires that “pornographic material” not be published online, on a “commercial basis,” unless it is “not normally accessible by those under 18.” The bill has several flaws, not least the number of vague proposals it contains, and the ad hoc definition of what pornography actually is.

Section 17 of the same act outlined the creation of an “age-verification regulator,” the digital equivalent of a bouncer standing between you and your porn. This gatekeeper will have the right, and duty, to demand you show proof of age, or else refuse you access. In addition, the body will be able to impose fines and enforcement notices on those who either neglect or circumvent the policy.
[…]
Mindgeek’s discussions with the UK government are a matter of public record, as are some of the documents relating to the discussions. In one email, an unnamed Mindgeek representative proposed the gray-listing — essentially a temporary block — of more than four million URLs that (British ISP) Sky has cataloged. Each one of these sites, including Twitter, would then be contacted and told to sign up to the age verification system — like Mindgeek’s nascent AgeID — or face blacklisting. A Mindgeek spokesperson confirmed to Engadget that it believes up to 25 million Britons could sign up to its system.
Yahoo news

Using LED lighting has resulted in more light, no energy savings

Using satellite-based sensors, an international team of scientists sought to understand if our planet’s surface is getting brighter or darker at night, and to determine if LEDs are saving energy at the global scale. With the introduction of solid-state lighting—such as LEDs, OLEDs, and PLEDs—it was thought (and hoped) that the transition to it from conventional lighting—like electrical filaments, gas, and plasma—would result in big energy savings. According to the latest research, however, the use of LEDs has resulted in a “rebound” effect whereby many jurisdictions have opted to use even more light owing to the associated energy savings.

Gizmodo

Using Generative Adverserial Networks to create terrain maps

A team of researchers from the University of Lyon, Purdue and Ubisoft have published a paper showing what may well be the future of creating video game worlds: an AI that is able to construct most of its own 3D landscapes.

Similar to Nvidia’s work that is able to conjure its own celebrity mugshots, the tech would require only minimal input from a human, who would just have to contribute some basic requirements, draw some lines then let the AI do all the hard work: namely, filling in all the gaps with elevation, ridges and natural-looking rock formations.

Kotaku

Canon TS6050 – the printer to not get

Having been very happy about my old Canon printer, I decided to get another one when it died after four years of trusted service. This one is absolutely horrific. It started off with difficulties connecting via WiFi. The amount of paper jams I have is around 1 page printed to 1 page jammed. The scanner can’t remember if you want to scan a PDF or a PNG and defaults to PNG. Scans are unceremoniously dumped into the Documents folder. When you open the lid to change pages to scan, you are as likely to open the ink drawer. Occassionaly the printer decides to forget what type of paper is in the drawer and asks you to register the paper type (it has never been anything BUT A4!). Sometimes it just randomly prints off blank pages. Because it feels like it. A true frustration, getting behind this damn thing.

Habitable Exoplanet Catalog

Planetary Habitability Laboratory

EU passes law that allows it to shut down websites without judicial oversight

The European Union (EU) has voted on Tuesday, November 14, to pass the new Consumer Protection Cooperation regulation, a new EU-wide applicable law that gives extra power to national consumer protection agencies, but which also contains a vaguely worded clause that also grants them the power to block and take down websites without judicial oversight.

The new law “establishes overreaching Internet blocking measures that are neither proportionate nor suitable for the goal of protecting consumers and come without mandatory judicial oversight,” Member of the European Parliament Julia Reda said in a speech in the European Parliament Plenary during a last ditch effort to amend the law.

“According to the new rules, national consumer protection authorities can order any unspecified third party to block access to websites without requiring judicial authorization,” Reda added later in the day on her blog.

This new law is an EU regulation and not a directive, meaning its obligatory for all EU states, which do not have to individually adopt it.

German Regulators Ban Smartwatches for Kids, Urge Parents to Destroy Them

Last month, the European Consumer Organization (BEUC) warned that smartwatches marketed to kids were a serious threat to children’s privacy. A report published by the Norwegian Consumer Council in mid-October revealed serious flaws in several of the devices that could easily allow hackers to seize control.

Doing so could grant attackers access to both real-time and historical locational data, as well as a wealth of personal information.

You have to wonder who thought attaching a low-cost, internet-enabled microphone and a GPS tracker to a kid would be a good idea in the first place. Almost none of the companies offering these “toys” implement reasonable security standards, nor do they typically promise that the data they collect—from your children—won’t be used be used for marketing purposes.

Gizmodo

An Ethereum Startup (Confido) Just Vanished After People Invested $374K

Confido is a startup that pitched itself as a blockchain-based app for making payments and tracking shipments. It sold digital tokens to investors over the Ethereum blockchain in an ICO that ran from November 6 to 8. During the token sale, Confido sold people bespoke digital tokens that represent their investment in exchange for ether, Ethereum’s digital currency.

But on Sunday, the company unceremoniously deleted its Twitter account and took down its website. A company representative posted a brief comment to the company’s now-private subforum on Reddit, citing legal problems that prevent the Confido team from continuing their work. The same message was also posted to Medium but quickly deleted.

“Right now, we are in a tight spot, as we are having legal trouble caused by a contract we signed,” the message stated (a cached version of the Medium post is viewable). “It is likely that we will be able to find a solution to rectify the situation. However, we cannot assure you with 100% certainty that we will get through this.” The message was apparently written by Confido’s founder, one Joost van Doorn, who seems to have no internet presence besides a now-removed LinkedIn profile.

Even the Confido representative on Reddit doesn’t seem to know what’s going on, though, posting hours after the initial message, “Look I have absolutely no idea what has happened here. The removal of all of our social media platforms and website has come as a complete surprise to me.” Motherboard reached out to this representative over Reddit, but hasn’t received a response.

Confido tokens had a market cap of $10 million last week, before the company disappeared, but now the tokens are worthless. And investors are crying foul.

Motherboard

Yup, the wild wild west!

OnePlus phones have a secret root backdoor and the password is ‘angela’

An apparent factory cockup has left OnePlus Android smartphones with an exposed diagnostics tool that can be potentially exploited to root the handsets.

Security researcher Robert Baptiste suggested the EngineerMode APK was made by Qualcomm, and was intended to be used by factory staff to test phones for basic functionality before they are shipped out to the public.

Unfortunately, it seems someone at OnePlus forgot to remove or disable the package before kicking the handsets out to the general public, and as a result folks now have access to what is effectively a backdoor in their Android phones.

In addition to basic diagnostic tasks like checking the functionality of the phone’s hardware components – such as the GPS and wireless electronics – the tool can also allow people, using the password ‘angela’, to obtain root access and gain full control over a device:

The Register

Being able to root your phone gives you access to the full functionality of the OS, however. This is something I think is a good idea – there are plenty of apps (eg battery monitors) that require root access to function.

Scientists edit a person’s DNA to try to cure disease

Scientists for the first time have tried editing a gene inside the body in a bold attempt to permanently change a person’s DNA to cure a disease.

The experiment was done Monday in California on 44-year-old Brian Madeux. Through an IV, he received billions of copies of a corrective gene and a genetic tool to cut his DNA in a precise spot.

“It’s kind of humbling” to be the first to test this, said Madeux, who has a metabolic disease called Hunter syndrome. “I’m willing to take that risk. Hopefully it will help me and other people.”

Signs of whether it’s working may come in a month; tests will show for sure in three months.
[…]
“We cut your DNA, open it up, insert a gene, stitch it back up. Invisible mending,” said Dr. Sandy Macrae, president of Sangamo Therapeutics, the California company testing this for two metabolic diseases and hemophilia. “It becomes part of your DNA and is there for the rest of your life.”

AP News

Pawnbroker pwnd: Cash Converters says hacker slurped customer data

Pawnbroking and secondhand goods outlet Cash Converters has suffered a data breach.

Customers were notified of the leak on Thursday by email, samples of which have been posted on social media.

Cash Converters said it had discovered that a third party gained unauthorised access to customer data within the company’s UK webshop.

Credit card data was not stored. However, hackers may have accessed user records including personal details, passwords, and purchase history from a website that was run by a third party and decommissioned back in September. The current webshop site is not affected, the firm said.

The Register

Intel: We’ve found severe bugs in secretive unpatchable Management Engine, affecting millions

Thanks to an investigation by third-party researchers into Intel’s hidden firmware in certain chips, Intel decided to audit its firmware and on Monday confirmed it had found 11 severe bugs that affect millions of computers and servers.

The flaws affect Management Engine (ME), Trusted Execution Engine (TXE), and Server Platform Services (SPS).

Intel discovered the bugs after Maxim Goryachy and Mark Ermolov from security firm Positive Technologies found a critical vulnerability in the ME firmware that Intel now says would allow an attacker with local access to execute arbitrary code.

The researchers in August published details about a secret avenue that the US government can use to disable ME, which is not available to the public.

Intel ME has been a source of concern for security-minded users, in part because only Intel can inspect the firmware, yet many researchers suspected the powerful subsystem had bugs that were ripe for abuse by attackers.

Goryachy and Ermolov will present their research on an ME flaw at Blackhat in December, detailing how an attacker can run unsigned code in the microprocessor and remain invisible to the main CPU and any anti-malware software.

ME runs on its own microprocessor and, as a Google engineer recently revealed, a modified version of the MINIX operating system.

Google was so afraid of UEFI and Intel ME that it created NERF, or the Non-Extensible Reduced Firmware, which it uses to manage Chromebooks. NERF runs on a Linux kernel rather than MINIX and removes ME’s web server and IP stack, key EUFI drivers, and neuters the ability for ME and EUFI to self-reflash the firmware.

The ME engine supports Intel’s Active Management Technology (AMT), which allows admins to remotely manage and fix devices.

A flaw discovered this May in AMT, which affected chips from 2008, highlighted another problem: patching it required an ME firmware update on machines that hardware vendors had stopped supporting. Only enterprise machines with vPro were affected, but the bug prompted EFF’s demands for Intel to provide a way to disable ME.

ZDNET

There’s a company out there selling laptops with the ME disabled.

Google collects Android location data even if you turn it off and don’t have a SIM card inserted

Since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towers—even when location services are disabled—and sending that data back to Google. The result is that Google, the unit of Alphabet behind Android, has access to data about individuals’ locations and their movements that go far beyond a reasonable consumer expectation of privacy

The cell tower addresses have been included in information sent to the system Google uses to manage push notifications and messages on Android phones for the past 11 months, according to a Google spokesperson.

Even devices that had been reset to factory default settings and apps, with location services disabled, were observed by Quartz sending nearby cell-tower addresses to Google. Devices with a cellular data or WiFi connection appear to send the data to Google each time they come within range of a new cell tower. When Android devices are connected to a WiFi network, they will send the tower addresses to Google even if they don’t have SIM cards installed.

Quartz

why this is a really bad thing(tm) and shouldn’t go unpunished by the Register

Loakes shoes hacked, fluffs the explanation

This is more than a little embarrassing for a business that supplies handmade leather goods to the British royal family. Founded in 1880 by brothers Thomas, John and William Loake, the firm has since sold more than 50 million pairs of Goodyear welted shoes in more than 50 countries.
[…]
Loake strangely described described the attack as “similar in nature to that which was suffered by the NHS a few months ago” – presumably the WannaCrypt ransomware worm that held systems across the world hostage through encryption.
[…]
“The fact that they have likened their data breach to the recent NHS ransomware attack – two completely different events – reduces my confidence in their ability to deal with the situation and it also makes me question their reassurance that my credit card details are safe,” the customer added.

Etienne Greef, managing director of integrator Secure Data, told The Register it was “unlikely” that the breach was similar to the NHS attack as WannaCry does not access email servers, but rather encrypts information.

He said drawing comparisons with the NHS attack implied that Loake was running old, vulnerable versions of an operating system.
Loake Shoes admits: We’ve fallen victim to cybercrims – the Register

Uber loses personal info on 600K drivers and 57M users in 2016. Pays hackers $100K in hope they delete it. Forgets to mention this in apology.

the individuals were able to download files containing a significant amount of other information, including:

The names and driver’s license numbers of around 600,000 drivers in the United States. Drivers can learn more here.
Some personal information of 57 million Uber users around the world, including the drivers described above. This information included names, email addresses and mobile phone numbers. Riders can learn more here.

Bloomberg

Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices

A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo.As estimated during the discovery of this devastating threat, several IoT and smart devices whose operating systems are often updated less frequently than smartphones and desktops are also vulnerable to BlueBorne.BlueBorne is the name given to the sophisticated attack exploiting a total of eight Bluetooth implementation vulnerabilities that allow attackers within the range of the targeted devices to run malicious code, steal sensitive information, take complete control, and launch man-in-the-middle attacks.

Source: Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices

QGIS: open source geographic data mapping software

Create, edit, visualise, analyse and publish geospatial information on Windows, Mac, Linux, BSD (Android coming soon)

Source: Welcome to the QGIS project!

EU creates large scale military cooperative framework (PESCO)

Permanent Structured Cooperation (PESCO) – Factsheet – European Union External Action

PESCO is a Treaty-based framework and process to deepen defence cooperation amongst EU Member States who are capable and willing to do so. The aim is to jointly develop defence capabilities and make them available for EU military operations. This will thus enhance the EU’s capacity as an international security partner, also contributing to protection of Europeans and maximise the effectiveness of defence spending.

The difference between PESCO and other forms of cooperation is the binding nature of the commitments undertaken by participating Member States. However, participation remains voluntary and decision-making will remain in the hands of participating Member States.

Source: Permanent Structured Cooperation (PESCO) – Factsheet – EEAS – European External Action Service – European Commission

They commit to the following (http://www.consilium.europa.eu/media/31511/171113-pesco-notification.pdf):
Based on the collective benchmarks identified in 2007
, participating Member States subscribe to the following commitments:
1.Regularly increasing defence budgets in real terms, in order to reach agreed objectives.
2.Successive medium – term increase in defence investment expenditure to 20% of total defence spending (collective benchmark) in order to fill strategic capability gaps by participating in defence capabilities projects in accordance
with CDP and Coordinated An
nual Review (
CARD).
3. Increasing joint and “collaborative” strategic defence capabilities projects.
Such joint and collaborative projects should be supported through the
European Defence Fund if required and as appropriate.
4.
Increasing the share of
expenditure allocated to defence research and
technology with a view to nearing the 2% of total defence spending (collective
benchmark).
5.
Establishment of a regular review of these commitments (with the aim of
endorsement by the Council)

(b) bring their
defence apparatus into line with each other as far as possible, particularly by
harmonising the identification of their military needs, by pooling and, where appropriate,
specialising their defence means and capabilities, and by encouraging cooperation in
the
fields of training and logistics.”
6.
Playing a substantial role in capability development within the EU, including
within the framework of CARD, in order to ensure the availability of the
necessary capabilities for achieving the level of ambition in Eur
ope.
7.
Commitment to support the CARD to the maximum extent possible
acknowledging the voluntary nature of the review and individual constraints
of participating Member States.
8.
Commitment to the intensive involvement of a future European Defence
Fund in mul
tinational procurement with identified EU added value.
9.
Commitment to drawing up harmonised requirements for all capability
development projects agreed by participating Member States.
4
10.
Commitment to considering the joint use of existing capabilities in order
to
optimize the available resources and improve their overall effectiveness.
11.
Commitment to ensure increasing efforts in the cooperation on cyber
defence, such as information sharing, training and operational support.

(c) take concrete measures to enhance
the availability, interoperability, flexibility and
deployability of their forces, in particular by identifying common objectives regarding the
commitment of forces, including possibly reviewing their national decision

making
procedures.”
12.
With regard to
availability and deployability of the forces, the participating
Member States are committed to:

Making available formations, that are strategically deployable, for the
realization of the EU LoA, in addition to a potential deployment of an EUBG.
This
commitment does neither cover a readiness force, a standing force nor a
stand by force.

Developing a solid instrument (e.g. a data base) which will only be accessible
to participating Member States and contributing nations to record available
and rapidly d
eployable capabilities in order to facilitate and accelerate the
Force Generation Process.

Aiming for fast

tracked political commitment at national level, including
possibly reviewing their national decision

making procedures.

Providing substantial suppor
t within means and capabilities to CSDP
operations (e.g. EUFOR) and missions (e.g. EU Training Missions)

with
personnel, materiel, training, exercise support, infrastructure or otherwise

which have been unanimously decided by the Council, without preju
dice to
any decision on contributions to CSDP operations and without prejudice to
any constitutional constraints,

Substantially contributing to EU BG by confirmation of contributions in
principle at least four years in advance, with a stand

by period in li
ne with the
EU BG concept, obligation to carry out EU BG exercises for the EU BG force
package (framework nation) and/or to participate in these exercises (all EU
Member States participating in EU BG).

Simplifying and standardizing cross border military
tr
ansport
in Europe for
enabling rapid deployment of military materiel and personnel.
13.With regard to interoperability of forces, the participating Member States
are committed to:

Developing the interoperability of their forces
by:

Commitment to agree on com
mon evaluation and validation criteria for
the EU BG force package aligned with NATO standards while
maintaining national certification.
5

Commitment to agree on common technical and operational standards of
forces acknowledging that they need to ensure
interoperability with
NATO.

Optimizing multinational structures: participating Member States could
commit
to joining and playing an active role in the main existing and possible
future structures partaking in European external action in the military field
(EUROCORPS,
EUROMARFOR,
EUROGENDFOR,
MCCE/ATARES/SEOS).
14.Participating Member States will strive for an ambitious approach to
common funding of military CSDP operations and missions, beyond what
will be defined as common cost according to the Athena council
decision.

(d) work together to ensure that they take the necessary measures to make good, including
through multinational approaches, and without prejudice to undertakings in this regard
within the North Atlantic Treaty Organisation, the shortfalls
perceived in the framework of
the ‘Capability Development Mechanism.’”
15.Help to overcome capability shortcomings identified under the Capability
Development Plan (CDP) and CARD. These capability projects shall increase
Europe’s strategic autonomy and stren
gthen the European Defence
Technological and Industrial Base (EDTIB).
16.Consider as a priority a European collaborative approach in order to fill
capability shortcomings identified at national level and, as a general rule,
only use an exclusively national ap
proach if such an examination has been
already carried out.
17.Take part in at least one project under the PESCO which develops or
provides capabilities identified as strategically relevant by Member States.

(e) take part, where appropriate, in the developm
ent of major joint or European equipment
programmes in the framework of the European Defence Agency.”
18.Commitment to the use of EDA as the European forum for joint capability
development and consider the OCCAR as the preferred collaborative
program managin
g organization.
19.Ensure that all projects with regard to capabilities led by participating Member States make the European defence industry more competitive via an appropriate industrial policy which avoids unnecessary overlap.
20. Ensure that the cooperation
programmes – which must only benefit entities
which demonstrably provide added value on EU territory – and the acquisition strategies adopted by the participating Member States will have a positive impact on the EDTIB

Planet now images the entire Earth’s landmass every day

At Planet, we’ve been pursuing Mission 1: to image the entire Earth’s landmass every day. I couldn’t be more excited to announce that we have achieved our founding mission.Six years ago, our team started in a garage in Cupertino. Mission 1 was the north star: we needed to build the satellites and systems, secure the launches, bring down the data to capture a daily image of the planet at high resolution, and make it easy to access for anyone. It became the heart and soul of our company and guiding light for Planeteers. Six years ago we had 7 staff. Today, Planet employs nearly 500 people in offices around the world, we have launched over 300 satellites and currently operate 200 medium and high resolution satellites. We’ve come a long way to reach this goal!

Source: Mission 1 Complete!

Asgardia – The Space Nation launches first independent territory into space

Our Asgardia-1 satellite was launched successfully today from the Wallops launch site in Virginia, USA.Dr Igor Ashurbeyli, Asgardia’s Head of Nation, accompanied by members of his administration personally witnessed the launch.We are delighted to announce therefore that the Asgardia space kingdom has now established its sovereign territory in space.Congratulations to all Asgardians!

Source: Asgardia – The Space Nation

 
Skip to toolbar