Blue Origin pushed its rocket ‘to its limits’ with another succesful high-altitude emergency abort test

Update July 18th, 11:35AM ET: Blue Origin pulled off another successful test launch today, landing both the New Shepard rocket and capsule after flight. The company ignited the capsule’s emergency motor after it had separated from the rocket, pushing the spacecraft up to a top altitude of around 74 miles — a new record for Blue Origin. The firing also caused the capsule to sustain up to 10 Gs during the test, but Blue Origin host Ariane Cornell said “that is well within what humans can take, especially for such a short spurt of time.”

[…]

Blue Origin will be igniting the escape motor on the crew capsule. It’s a small engine located on the bottom of the capsule that can quickly propel the spacecraft up and away from the rocket booster in case there is an emergency during the flight. Blue Origin tested out this motor once before during a test launch in October 2016, fully expecting the motor to destroy the booster. When the motor ignites, it slams the booster with 70,000 pounds of thrust and forceful exhaust. And yet, the booster survived the test, managing to land on the floor of the Texas desert.

This time around, Blue Origin plans to ignite the motor at a higher altitude than last time, “pushing the rocket to its limits,” according to the company. It’s unclear how high the ignition will occur, though, and if the booster will survive the test again.

No passengers will be flying on this trip, except for Blue Origin’s test dummy, which the company has named Mannequin Skywalker. Mannequin will be riding inside the crew capsule along with numerous science experiments from NASA, commercial companies, and universities. Santa Fe company Solstar, which flew with Blue Origin during its last launch, is going to test out its Wi-Fi access again during the flight. NASA will have a payload designed to take measurements of the conditions inside the capsule throughout the trip, such as temperature, pressure, and acoustics. There’s even a bunch of payloads made by Blue Origin’s employees as part of the company’s own “Fly My Stuff” program.

Source: Blue Origin pushed its rocket ‘to its limits’ with high-altitude emergency abort test – The Verge

Isn’t it refreshing to see a private space programme that not only doesn’t crash and explode all the time (*cough* Elon) but works better than expected!

Robocall Firm Exposes Hundreds of Thousands of US Voters’ Records

Personal details and political affiliations exposed

The server that drew Diachenko’s attention, this time, contained 2,584 files, which the researcher later connected to RoboCent.

The type of user data exposed via Robocent’s bucket included:

⬖  Full Name, suffix, prefix
⬖  Phone numbers (cell and landlines)
⬖  Address with house, street, city, state, zip, precinct
⬖  Political affiliation provided by state, or inferred based on voting history
⬖  Age and birth year
⬖  Gender
⬖  Jurisdiction breakdown based on district, zip code, precinct, county, state
⬖  Demographics based on ethnicity, language, education

Other data found on the servers, but not necessarily personal data, included audio files with prerecorded political messages used for robocalls.

According to RoboCent’s website, the company was not only providing robo-calling services for political surveys and inquiries but was also selling this data in raw format.

“Clients can now purchase voter data directly from their RoboCall provider,” the company’s website reads. “We provide voter files for every need, whether it be for a new RoboCall or simply to update records for door knocking.”

The company sells voter records for a price of 3¢/record. Leaving the core of its business available online on an AWS bucket without authentication is… self-defeating.

Source: Robocall Firm Exposes Hundreds of Thousands of US Voters’ Records

AI plus a chemistry robot finds all the reactions that will work

Lee Cronin, the researcher who organized the work, was kind enough to send along an image of the setup, which looks nothing like our typical conception of a robot (the researchers refer to it as “bespoke”). Most of its parts are dispersed through a fume hood, which ensures safe ventilation of any products that somehow escape the system. The upper right is a collection of tanks containing starting materials and pumps that send them into one of six reaction chambers, which can be operated in parallel.

The robot in question. MS = Mass Spectrometer; IR = Infrared Spectrometer.
Enlarge / The robot in question. MS = Mass Spectrometer; IR = Infrared Spectrometer.
Lee Cronin

The outcomes of these reactions can then be sent on for analysis. Pumps can feed samples into an IR spectrometer, a mass spectrometer, and a compact NMR machine—the latter being the only bit of equipment that didn’t fit in the fume hood. Collectively, these can create a fingerprint of the molecules that occupy a reaction chamber. By comparing this to the fingerprint of the starting materials, it’s possible to determine whether a chemical reaction took place and infer some things about its products.

All of that is a substitute for a chemist’s hands, but it doesn’t replace the brains that evaluate potential reactions. That’s where a machine-learning algorithm comes in. The system was given a set of 72 reactions with known products and used those to generate predictions of the outcomes of further reactions. From there, it started choosing reactions at random from the remaining list of options and determining whether they, too, produced products. By the time the algorithm had sampled 10 percent of the total possible reactions, it was able to predict the outcome of untested reactions with more than 80-percent accuracy.

And, since the earlier reactions it tested were chosen at random, the system wasn’t biased by human expectations of what reactions would or wouldn’t work.

Once it had built a model, the system was set up to evaluate which of the remaining possible reactions was most likely to produce products and prioritize testing those. The system could continue on until it reached a set number of reactions, stop after a certain number of tests no longer produced products, or simply go until it tested every possible reaction.

Neural networking

Not content with this degree of success, the research team went on to add a neural network that was provided with data from the research literature on the yield of a class of reactions that links two hydrocarbon chains. After training on nearly 3,500 reactions, the system had an error of only 11 percent when predicting the yield on another 1,700 reactions from the literature.

This system was then integrated with the existing test setup and set loose on reactions that hadn’t been reported in the literature. This allowed the system to prioritize not only by whether the reaction was likely to make a product but also how much of the product would be produced by the reaction.

All this, on its own, is pretty impressive. As the authors put it, “by realizing only 10 percent of the total number of reactions, we can predict the outcomes of the remaining 90 percent without needing to carry out the experiments.” But the system also helped them identify a few surprises—cases where the fingerprint of the reaction mix suggested that the product was something more than a simple combination of starting materials. These reactions were explored further by actual human chemists, who identified both ring-breaking and ring-forming reactions this way.

That last aspect really goes a long way toward explaining how this sort of capability will fit into future chemistry labs. People tend to think of robots as replacing humans. But in this context, the robots are simply taking some of the drudgery away from humans. No sane human would ever consider trying every possible combination of reactants to see what they’d do, and humans couldn’t perform the testing 24 hours a day without dangerous levels of caffeine anyway. The robots will also be good at identifying the rare cases where highly trained intuitions turn out to lead us astray about the utility of trying some reactions.

Source: AI plus a chemistry robot finds all the reactions that will work | Ars Technica

Dutch F-16 flies using fryer fat

The aircraft flew for two weeks on kerosine with 5% biofuel. Unfortunately there is not enough fuel available to allow for more than one aircraft to fly for two weeks. A chicken and egg dilemma.

Een F-16 van Vliegbasis Leeuwarden stootte de afgelopen 2 weken minder CO2 uit tijdens het vliegen. Het toestel koos het luchtruim op kerosine met 5% BioFuel. De proef stopt nu, omdat er op dit moment onvoldoende biobrandstof beschikbaar is om met meer dan 1 toestel of langer dan 2 weken te vliegen.

Source: F-16 vliegt prima op frituurvet | Nieuwsbericht | Defensie.nl

China’s latest quantum radar could help detect stealth planes, missiles

On June 22, China Electronics Technology Group Corporation (CETC), China’s foremost military electronics company, announced that its groundbreaking quantum radar has achieved new gains, which could allow it to detect stealth planes.

The CETC claims its system is now capable of tracking high altitude objects, likely by increasing the coherence time entangled photons. CETC envisions that its quantum radar will be used in the stratosphere to track objects in “the upper atmosphere and beyond” (including space).

While conventional radars just measure the reflection of radio waves, a quantum radar uses entangled photons, which result when a microwave signal beam is entangled with an optical idler beam. The microwave beam’s entangled photons bounce off of the target object and back to the quantum radar. The system compares them with the entangled photons of the optical idler beam. As a result, it can identify the position, radar cross section, speed, direction and other properties of detected objects. Importantly, attempts to spoof the quantum radar would be easily noticed since any attempt to alter or duplicate the entangled photons would be detected by the radar.

Quantum Radar China

Quantum Radar

The quantum radar could ‘observe’ on the composition of the target, since in the state of entanglement, the entangled photons remaining in the radar would show the same changes that transmitted photons would have when interacting with the target (known as quantum correlation).

Li Huifang, Wang Kai, Wang Kaibing, Wu Jun

This shift is important to the back and forth of detection that has long been the story of radars vs stealth planes (which are a crucial feature of US air power). Because stealth aircraft are optimized to elude radio waves used by conventional radars, they would be much more susceptible to detection by their interaction with entangled photons. Additionally, the quantum radar could ‘observe’ on the composition of the target. Such a capability is important not just for detecting aircraft, but would also be very valuable in missile defense, where one could differentiate between an actual nuclear warhead against inflatable decoys.

China Yuanmeng airship

Yuanmeng

This concept art shows China’s 18,000 cubic meter Yuanmeng airship 20km above the ground (and for some reason, off the coast of the Mid Atlantic U.S.). One of the highest flying airships, the Yuanmeng can provide wide area surveillance and communications capability.

cannews.com

For its near-space platform, the quantum radar will be installed on either a high altitude blimp or a very high altitude UAV. In this role, quantum radar would be a strategic warning system against enemy ballistic missiles and detection system against high-speed aircraft like the SR-72. For space surveillance missions, it could provide high-fidelity details on classified systems such as spy satellites and space planes like the X-37B—possibly including payload details.

Source: China’s latest quantum radar could help detect stealth planes, missiles | Popular Science

Python creator Guido van Rossum sys.exit()s as language overlord

Guido van Rossum – who created the Python programming language in 1989, was jokingly styled as its “benevolent dictator for life”, and ushered it to global ubiquity – has stepped down, and won’t appoint a successor.

In a mailing list post on Thursday titled, “Transfer of Power,” he wrote: “Now that PEP 572 is done, I don’t ever want to have to fight so hard for a PEP and find that so many people despise my decisions.”

A PEP is a Python Enhancement Proposal, and it’s the process by which Python evolves with new features or adjacent standards.

In his friendly dictatorial role, Van Rossum signed off on each of proposal personally, an approach that contrasts strongly with comparable projects, such as PHP, that put such matters to a vote.

[…]

“I’ll still be there for a while as an ordinary core dev, and I’ll still be available to mentor people – possibly more available,” he added. “But I’m basically giving myself a permanent vacation from being BDFL, and you all will be on your own.”

He’s left behind no governing principles or a successor, but said a debate on those issues was coming anyway, citing the potential for him to be hit by a bus and the fact that “I’m not getting younger… (I’ll spare you the list of medical issues.)”

“So what are you all going to do?” he asked the python-committers mailing list. “Create a democracy? Anarchy? A dictatorship? A federation? We may be able to write up processes for these things as PEPs (maybe those PEPs will form a kind of constitution). But here’s the catch. I’m going to try and let you all (the current committers) figure it out for yourselves.

“I’ll still be here, but I’m trying to let you all figure something out for yourselves.”

Van Rossum’s achievements are hard to overstate: Python is among the most-used languages in the world. It’s advanced as an ideal beginners’ language, and has also been used in heavyweight enterprise apps. The likes of YouTube, Instagram, and Dropbox (van Rossum’s day job) all use it.

CodingDojo recently rated it the second-most-in-demand skill in job ads for developers. Stack Overflow’s 2018 developer survey ranked Python as the seventh-most popular “Programming, Scripting, and Markup Language”, ahead of C#, Ruby and PHP.

Source: Python creator Guido van Rossum sys.exit()s as language overlord • The Register

Newly Discovered ‘Asteroid’ Is actually two orbiting around each other

Near-Earth object 2017 YE5 was first spotted by astronomers at the Oukaïmeden Observatory in Morocco in December of last year, but virtually nothing about it, beyond its presence, was known. In June, the object made the closest approach it will make to Earth for the next 170 years, allowing scientists to take a closer look. What was initially assessed as a single asteroid turned out to be two objects in orbit around each other: a double asteroid.

Yep, there’s two of ‘em.
Image: Arecibo/GBO/NSF/NASA/JPL-Caltech

Normally we’d say this is no biggie; around 15 percent of all known asteroids larger than 650 feet (200 meters) in diameter are binaries. But 2017 YE5 is special because it’s an “equal mass” binary, in which the two objects are roughly the same mass. The vast majority of binaries involve an unequal pair, in which one asteroid is significantly larger than the other. Astronomers have documented tens of thousands of asteroids in the Solar System, yet this is just the fourth known equal mass binary. The latest observations are now offering the most detailed images ever taken of this exceptionally rare phenomenon.

Source: Newly Discovered ‘Asteroid’ Is Far Freakier Than Astronomers Expected

Two Cancer Drugs Found to Boost Aging Immune Systems 

A new clinical trial published Wednesday in Science Translational Medicine has found evidence that low doses of two existing drugs can boost the immune system of an elderly person, helping it fight common deadly infections, including the flu, with seemingly little to no side effects.

The trial, run by scientists at the pharmaceutical company Novartis, involved more than 250 relatively healthy people over the age of 65 and was conducted from 2013 to 2015. The volunteers were randomly divided into five groups. Two groups received different doses of the approved chemotherapy and immunosuppressant drug everolimus; one received a dose of the experimental chemotherapy drug dactolisib; and one received a dose of everolimus and dactolisib combined (both drugs were developed by Novartis). The fifth group was simply given a placebo. The groups took the drugs or placebo daily for six weeks, then got the 2014 seasonal flu shot two weeks later. For the next nine months, their health was meticulously tracked though diaries and blood tests.

By the end of the year, all of the drug groups reported fewer infections than the placebo group. But the difference was largest among the people who took both drugs at once: They reported an average of 1.49 infections during the year, compared to the 2.41 infections reported by the placebo group. They were also the only treatment group whose blood showed a significantly better immune response to the flu vaccine to the placebo group, indicating they were more protected.

[…]

These drugs inhibit the production of mTOR, an enzyme that help cells produce other substances. For decades, though, scientists have suspected that mTOR plays a role in aging. Experiments in mice and other animals have shown that knocking out mTOR incidentally extends their lives. There are two major cellular pathways that mTOR is involved in, though, TORC1 and TORC2, and it’s only knocking out TORC1 that has been associated with anti-aging effects. In the low doses used by the researchers, the drugs only inhibit TORC1.

The effects of improved immunity seem to come without any major side effects. None of the treatment groups had a higher rate of side effects than the placebo group, and no single reported side effect, such as diarrhea, was directly attributed to the drugs. There was even evidence that these drugs lowered the risk of high blood sugar and cholesterol as well as improved immune function.

[…]

“More studies to query the benefits of mTOR antagonists in ‘healthy older persons’ are needed… and the sooner the better,” he added.

That said, some caution is warranted. The study was only a Phase 2a clinical trial, which is used to figure out the best dosage of an experimental treatment. The next step is to suss out just how effective these drugs can be with a larger group of volunteers, and whether they can work better for vulnerable groups, such as the especially elderly (over age 85), who are at higher risk of dying from respiratory infections.

“Our clinical trial is a first step in determining if mTOR inhibitors can be used to promote healthy aging in humans,” study author Joan Mannick told Gizmodo. “However we still have a lot to learn, and the results need to be reproduced and validated in additional clinical trials.”

Source: Two Cancer Drugs Found to Boost Aging Immune Systems 

Roku releases speakers that turn volume down for loud ads and up for soft programmes. Unfortunately, only for Roku TVs.

While the tech specs of the speakers haven’t been released yet, we know how they’ll connect to and work with Roku TVs. The speaker set pairs wirelessly with Roku TVs via Roku Connect, and, thanks to built-in software that works with Roku OS, the speakers will sync up with whatever you’re watching on the smart TV. Roku told Ars in a briefing that the speakers will play optimized audio from anything connected to the paired Roku TV, including cable boxes, antennas, and even Bluetooth devices like your smartphone.

“Optimized” in this sense refers to the software-improved audio quality: automatic volume leveling will boost lower audio in quiet scenes and lower audio in loud scenes (and in booming commercials), and dialogue enhancement will improve speech intelligibility.

Source: Roku wants to grab audiophiles with its new wireless speakers for Roku TVs | Ars Technica

What a brilliant idea, and why can’t we all get it?!

‘007’ code helps stop Spectre exploits before they exist

At arXiv, Singaporean and US researchers have published work, appropriately dubbed “007”, which checks code to see if it’s trying to exploit Spectre; and at Virus Bulletin, Fortinet’s Axelle Apvrille takes a look at the bug from an Android point of view.

Apvrille’s work backs up what we’ve heard from other researchers: so far, Spectre exploitation is theoretical, with no exploits in the wild. She wrote that while there was a flurry of “Spectre exploit” stories based on AV-Test sample collection, it turned out that all of the reported samples were proofs-of-concept rather than genuine malware.

She adds: “there is a significant difference between a PoC of Spectre and a piece of malware using Spectre. Turning a PoC into a malicious executable is far from a trivial process.”

That doesn’t make this kind of work pointless, though, since it’s a good thing to stay ahead of whatever nasties black hats might devise.

In developing a detection technique, Apvrille’s second conclusion was also good news: an attack against Spectre, she found, seems relatively easy to detect.

She wrote that “we had expected several false positives with this signature, but that was not the case: this imperfect signature turns out to be quite good in practice.”

The signature Apvrille searched for (using the in-practice impracticably-slow technique of searching whole binaries) was to identify “Flush+Reload cache attacks in ELF x86-64 executables”.

Source: ‘007’ code helps stop Spectre exploits before they exist • The Register

Carlsberg: AI beer taster can now tell the difference between lager and pilsner

Denmark-based brewing giant Carlsberg has reported good progress in its attempts to turn Microsoft’s Azure AI into a robot beer sniffer.

The project, which kicked off earlier this year, was aimed at cutting the time a beer spends in research and development by one-third, thus getting fresh brews into the hands of drinkers faster … and their beer tokens into the pockets of Carlsberg.

The director and professor of yeast and fermentation for Carlsberg, Joch Förster, has been tasked with the seemingly enviable job of tasting a lot of beer as the brewer tries out new flavours. In reality, however, ploughing through hundreds of samples isn’t really practical. Hence Förster and his team have turned to sensors and AI to predict what a beer will taste like.

Source: Carlsberg: AI beer taster can now tell the difference between lager and pilsner • The Register

Astronomers discover 12 new moons orbiting Jupiter – one on collision course with the others

One of a dozen new moons discovered around Jupiter is circling the planet on a suicide orbit that will inevitably lead to its violent destruction, astronomers say.

Researchers in the US stumbled upon the new moons while hunting for a mysterious ninth planet that is postulated to lurk far beyond the orbit of Neptune, the most distant planet in the solar system.

The team first glimpsed the moons in March last year from the Cerro Tololo Inter-American Observatory in Chile, but needed more than a year to confirm that the bodies were locked in orbit around the gas giant. “It was a long process,” said Scott Sheppard, who led the effort at the Carnegie Institution for Science in Washington DC.

Jupiter, the largest planet in the solar system, was hardly short of moons before the latest findings. The fresh haul of natural satellites brings the total number of Jovian moons to 79, more than are known to circle any other planet in our cosmic neighbourhood.

Astronomers have discovered twelve new moons orbiting Jupiter, bringing the total number of Jovian moons to 79.
Pinterest
Astronomers have discovered twelve new moons orbiting Jupiter, bringing the total number of Jovian moons to 79. Photograph: Carnegie Institution for Science

Nine of the new moons belong to an outer group that orbit Jupiter in retrograde, meaning they travel in the opposite direction to the planet’s spin. They are thought to be the remnants of larger parent bodies that were broken apart in collisions with asteroids, comets and other moons. Each takes about two years to circle the planet.

Two more of the moons are in a group that circle much closer to the planet in prograde orbits which travel in the same direction as Jupiter’s spin. Most likely to be pieces of a once larger moon that was broken up in orbit, they take nearly a year to complete a lap around Jupiter. Which direction the moons swing around the planet depends on how they were first captured by Jupiter’s gravitational field.

Astronomers describe the twelfth new Jovian moon as an “oddball”. Less than a kilometre wide, the tiny body circles Jupiter on a prograde orbit but at a distance that means it crosses the path of other moons hurtling towards it. Scientists have named the new moon Valetudo after the Roman god Jupiter’s great-granddaughter, the goddess of health and hygiene. But given the impending violence, it may be more than coincidence that Vale Tudo, which translates from Portuguese as “anything goes”, is an early form of full-contact mixed martial arts.

“Valetudo is like driving down the highway on the wrong side of the road,” said Sheppard. “It is moving prograde while all the other objects at a similar distance from Jupiter are moving retrograde. Thus head-on collisions are likely.”

Source: Astronomers discover 12 new moons orbiting Jupiter – one on collision course with the others | Science | The Guardian

Chinese mobile phone cameras are not-so-secretly recording users’ activities

It has been widely reported that software and web applications made in China are often built with a “backdoor” feature, allowing the manufacturer or the government to monitor and collect data from the user’s device.

But how exactly does the backdoor feature work? Recent discussion among mobile phone users in mainland China has shed some light on the question.

Last month, users of Vivo NEX, a Chinese Android phone, found that when they opened certain applications on the phone, including Chinese internet giant QQ browser and travel booking app Ctrip, the mobile device’s camera would self-activate.

Different from most mobile phones, where a camera can be activated without giving the user any signal, the Vivo NEX has a tiny retractable camera that physically pops out from the top of the device when it is turned on.

Vivo NEX retractable camera. Photo by Vivo NEX, via We Chaat.

Though perhaps unintentionally, this design feature has given Chinese mobile users a tangible sense of exactly when and how they are being monitored.

One Weibo user observed that the retractable camera self-activates whenever he opens a new chat on Telegram, a messaging application designed for secured and encrypted communication.

While Telegram reacted quickly to reports of the issue and fixed the camera bug, Chinese internet giant Tencent instead defended the feature, arguing that its QQ browser needs the camera activated to prepare for scanning QR codes and insisted that the camera would not take photos or audio recordings unless the user told it to do so.

This explanation was not reassuring for users, as it only revealed the degree to which the QQ browser could record users’ activities.

After the news of the self-activated camera bug spread, users started testing the issue on other applications and found that Baidu’s voice input application has access to both the camera and voice recording function, which can be launched without users’ authorization.

A Vivo NEX user found that once she had installed Baidu’s voice input system, it would activate the phone’s camera and sound recording function whenever the user opened any application — including chat apps, browsers — that allows the user to input text.

Baidu says that the self-activated recording is not a backdoor but a “frontdoor” application that allows the company collect and adjust to background noise so as to prepare for and optimize its voice input function. This was not reassuring for users — any microphone collecting background noise would also unquestionably capture the voices and conversations of a user and whomever she speaks with face-to-face.

How does camera snooping affect people outside China?

These snooping features have not just affected people from mainland China, but all of those from outside the country who want to communicate with friends in China.

As the Chinese government has blocked most leading foreign social media technologies, anyone who wants to communicate with people in China has little choice but to install applications made in China, such as WeChat.

One strategy for increasing one’s mobile privacy when using Chinese-made applications is to keep all insecure applications on one device and assume that these communications will be recorded or spied upon, and to keep a second device for more secure or “clean” applications. When using an encrypted communication application like Telegram to communicate with friends in China, one also has to make sure that their friends’ mobile devices are clean.

Baidu has been notorious for snooping into users’ private data and activities. In January 2018, a government-affiliated consumer association in Jiangsu province filed a lawsuit against Baidu’s search application and mobile browser for snooping on users’ phone conversations and accessing their geo-location data without user consent. But the case was dropped in March after Baidu updated its applications by securing users’ consent for control over their mobile camera, voice recording, geo-location data, even though these controls are not essential to the application’s functionality.

In response to public concern about these backdoor features, Baidu and other Chinese internet giants may defend themselves simply by arguing that users have consented to having their cameras activated. But given the monopolistic nature of Chinese Internet giants in the country, do ordinary users have the power — or the choice — to say no?

Source: Chinese mobile phone cameras are not-so-secretly recording users’ activities – Global Voices Advox

First 3D colour X-ray of a human using CERN technology

What if, instead of a black and white X-ray picture, a doctor of a cancer patient had access to colour images identifying the tissues being scanned? This colour X-ray imaging technique could produce clearer and more accurate pictures and help doctors give their patients more accurate diagnoses.

This is now a reality, thanks to a New-Zealand company that scanned, for the first time, a human body using a breakthrough colour medical scanner based on the Medipix3 technology developed at CERN.

[…]

Medipix is a family of read-out chips for particle imaging and detection. The original concept of Medipix is that it works like a camera, detecting and counting each individual particle hitting the pixels when its electronic shutter is open. This enables high-resolution, high-contrast, very reliable images, making it unique for imaging applications in particular in the medical field.

[…]

MARS Bioimaging Ltd, which is commercialising the 3D scanner, is linked to the Universities of Otago and Canterbury.

[…]

MARS’ solution couples the spectroscopic information generated by the Medipix3 enabled detector with powerful algorithms to generate 3D images. The colours represent different energy levels of the X-ray photons as recorded by the detector and hence identifying different components of body parts such as fat, water, calcium, and disease markers.

A 3D image of a wrist with a watch showing part of the finger bones in white and soft tissue in red. (Image: MARS Bioimaging Ltd)

So far, researchers have been using a small version of the MARS scanner to study cancer, bone and joint health, and vascular diseases that cause heart attacks and strokes. “In all of these studies, promising early results suggest that when spectral imaging is routinely used in clinics it will enable more accurate diagnosis and personalisation of treatment,” Professor Anthony Butler says.

Source: First 3D colour X-ray of a human using CERN technology | CERN

Humans Didn’t Evolve From a Single Ancestral Population

In the 1980s, scientists learned that all humans living today are descended from a woman, dubbed “Mitochondrial Eve,” who lived in Africa between 150,000 to 200,000 years ago. This discovery, along with other evidence, suggested humans evolved from a single ancestral population—an interpretation that is not standing the test of time. The story of human evolution, as the latest research suggests, is more complicated than that.

A new commentary paper published today in Trends in Ecology & Evolution is challenging the predominant view that our species, Homo sapiens, emerged from a single ancestral population and a single geographic region in Africa. By looking at some of the latest archaeological, fossil, genetic, and environmental evidence, a team of international experts led by Eleanor Scerri from Oxford’s School of Archaeology have presented an alternative story of human evolution, one showing that our species emerged from isolated populations scattered across Africa, who occasionally came together to interbreed. Gradually, this intermingling of genetic characteristics produced our species.

Indeed, the origin of Homo sapiens isn’t as neat and tidy as we’ve been led to believe.

[…]

“The idea that humans emerged from one population and progressed in a simple linear fashion to a modern physical appearance is attractive, but unfortunately no longer a very good fit with the available information,” said Scerri. “Instead it looks very much like humans emerged within a complex set of populations that were scattered across Africa.”

The reality, as suggested by this latest research, is that human ancestors were spread across Africa, segregated by diverse habitats and shifting environmental boundaries, such as forests and deserts. These prolonged periods of isolation gave rise to a surprising variety of human forms, and a diverse array of adaptive traits. When stratified groups interbred, they preserved the best characteristics that evolution had to offer. Consequently, the authors say that terms like “archaic humans” and “anatomically modern humans” are increasingly problematic given the evidence.

Scerri said occasional episodes of interbreeding between these different, semi-isolated populations created a diverse “meta-population” of humans within Africa, from which our species emerged over a very long time. Our species, Homo sapiens, emerged around 300,000 years ago, but certain characteristics, like a round brain case, pronounced chin, and a small face, didn’t appear together in a single individual until about 100,000 years ago, and possibly not until 40,000 years ago—a long time before genetics and other archaeological evidence tells us our species was already in existence. Isolated populations came together to exchange genes and culture—two interrelated processes that shaped our species, explained Scerri.

The new paper, instead of providing new evidence, provides a comprehensive review and analysis of what the latest scientific literature is telling us about human evolution, starting around 300,000 years ago. The researchers found that human fossils from different regions of Africa all featured a diverse mix of modern and more “archaic” physical characteristics. The earliest of these date back to between 300,000 to 250,000 years ago, and originate from opposite ends of Africa, stretching from the southern tip of the continent to its northernmost points. Many of these fossils were found with sophisticated archaeological items associated with our species, including specialized tools mounted onto wooden handles and shafts, and often utilizing different bindings and glues. These artifacts, like the diverse fossils, appeared across Africa around the same time, and studies of their distribution suggest they belonged discrete groups. At the same time, genetic data points to the presence of multiple populations.

“On the methodological side, we can also see that inferences of genetic information that don’t account for subdivisions between populations can also generate very misleading information,” said Scerri.

By studying shifts in rivers, deserts, forests, and other physical barriers, the researchers were able to chronicle the geographic changes in Africa that facilitated migration, introducing opportunities for contact among groups that were previously separated. These groups, after long periods of isolation, were able to interact and interbreed, sometimes splitting off again and undergoing renewed periods of extended isolation.

[…]

Jean-Jacques Hublin, a scientist at the Max Planck Institute for Evolutionary Anthropology who wasn’t involved in the new study, said the new commentary paper is presenting what is quickly becoming the dominant view on this topic.

“There is growing evidence that the emergence of so-called ‘modern humans’ did not occur in a restricted cradle in sub-Saharan Africa and at a precise point in time,” Hublin told Gizmodo. “Rather, it involved several populations across the continent and was a fundamentally gradual process.”

Source: Humans Didn’t Evolve From a Single Ancestral Population

A curious tale of the priest, the broker, the hacked newswires, and $100m of insider trades

Two former investment bankers, one of whom is also a priest, have been found guilty of an elaborate scam – hacking newswires to read press releases prior to publication, and trade millions using this insider information.

Vitaly Korchevsky, formerly a veep at Morgan Stanley and a pastor at the Slavic Evangelical Baptist Church in Philadelphia, USA, and ex-broker Vladislav Khalupsky were this month found guilty of securities fraud by a jury in New York, and are facing 20 years in the slammer.

According to court documents, the two colluded with a Ukrainian hacking gang and investors in the US, Russia, France, and Cyprus to realized more than $100m in illicit profits. America’s financial watchdog, the Securities and Exchange Commission, said it has since recovered $53m of the haul.

The scam, carried out between 2010 and 2015 involved Ukrainian hackers getting into the servers of two unnamed newswire services, one in New York and the other in Canada. The miscreants searched for embargoed press releases on companies’ quarterly financial figures, which are typically privately submitted to a newswire a couple of days before they are published, and accessed more than 100,000 of them before being caught.

Source: A curious tale of the priest, the broker, the hacked newswires, and $100m of insider trades • The Register

‘Mega’ Data Breaches Cost Companies a Staggering Fortune, IBM Study Finds

IBM Security on Wednesday released its latest report examining the costs and impact associated with data breaches. The findings paint a grim portrait of what the clean up is like for companies whose data becomes exposed—particularly for larger corporations that suffer so-called “mega breaches,” a costly exposure involving potentially tens of millions of private records.

According to the IBM study, while the average cost of a data breach globally hovers just under $4 million—a 6.4 percent increase over the past year—costs associated with so-called mega breaches (an Equifax or Target, for example) can reach into the hundreds of millions of dollars. The average cost of a breach involving 1 million records is estimated at around $40 million, while those involving 50 million records or more can skyrocket up to $350 million in damages.

Of the 11 mega breaches examined by IBM, 10 were a result of criminal attacks.

The average amount of time that passes before a major company notices a data breach is pretty atrocious. According to IBM, mega breaches typically go unnoticed for roughly a year.

[…]

Other key findings of the study include:

  • The average time to identify a data breach is 197 days, and the average time to contain a data breach once identified is 69 days.
  • Companies that contained a breach in less than 30 days saved over $1 million compared to those that took more than 30 days ($3.09 million vs. $4.25 million average total).
  • Each lost or stolen record costs roughly $148 on average, but having an incident response team (surprising, not every company does) can reduce the cost per record by as much as $14.
  • The use of an AI platform for cybersecurity reduced the cost by $8 per lost or stolen record.
  • Companies that indicated a “rush to notify” had a higher cost by $5 per lost or stolen record.
  • U.S. companies experienced the highest average cost of a breach at $7.91 million, followed by firms the Middle East at $5.31 million.
  • Lowest total cost of a breach was $1.24 million in Brazil, followed by $1.77 million in India.

Source: ‘Mega’ Data Breaches Cost Companies a Staggering Fortune, IBM Study Finds

Unpatched Netgear router and FTP server without password leads to US military manuals hawked on dark web

Sensitive US Air Force documents have leaked onto the dark web as part of an attempted sale of drone manuals.

Threat intel firm Recorded Future picked up on an auction for purported export-controlled documents pertaining to the MQ-9 Reaper drone during its regular work monitoring the dark web for criminal activities last month. Recorded Future’s Insikt Group analysts, posing as potential buyers, said they’d engaged the newly registered English-speaking hacker before confirming the validity of the compromised documents.

Further interactions allowed analysts to discover other leaked military information available from the same threat actor. The hacker claimed he had access to a large number of military documents from an unidentified officer.

These documents included a M1 Abrams tank maintenance manual, a tank platoon training course, a crew survival course, and documentation on improvised explosive device mitigation tactics.

[…]

Two years ago researchers warned that Netgear routers with remote data access capabilities were susceptible to attack if the default FTP authentication credentials were not updated

[…]

The hacker first infiltrated the computer of a captain at 432d Aircraft Maintenance Squadron Reaper AMU OIC, stationed at the Creech [Air Force Base] in Nevada, and stole a cache of sensitive documents, including Reaper maintenance course books and the list of airmen assigned to Reaper [Aircraft Maintenance Unit]. While such course books are not classified materials on their own, in unfriendly hands, they could provide an adversary the ability to assess technical capabilities and weaknesses in one of the most technologically advanced aircrafts.

The captain, whose computer had seemingly been compromised recently, had completed a cybersecurity awareness course, but he did not set a password for an FTP server hosting sensitive files. This allowed the hacker to easily download the drone manuals, said the researchers. The precise source of other the other dozen or so manuals the hacker offered for sale remains undetermined.

[…]

The hacker let slip that he was also in the habit of watching sensitive live footage from border surveillance cameras and airplanes. “The actor was even bragging about accessing footage from a MQ-1 Predator flying over Choctawhatchee Bay in the Gulf of Mexico.”

Source: US military manuals hawked on dark web after files left rattling in insecure FTP server • The Register

Thomas Cook website spills personal info – and it’s fine with that

Norwegian programmer Roy Solberg came across an enumeration bug that leaked the full name of all travelers on a booking, the email addresses used, and flight details from Thomas Cook Airlines’ systems using only a booking reference number. Simply changing the booking number unveiled a new set of customer details.

The exposed info covered trips booked through the travel agency Ving, which is owned by Thomas Cook.

Thomas Cook Airlines has closed the privacy hole, technically known as a Insecure Direct Object Reference (IDOR), a common enough and basic problems on poorly-designed web applications.

Solberg reckoned on Sunday that data of bookings made with Thomas Cook Airlines through Ving Norway, Ving Sweden, Spies Denmark and Apollo Norway were affected by the vulnerability. Data going back to 2013 was obtainable before the hole was closed. Simple scripts might easily have been used to download the exposed data before the security hole was resolved, he adds.

Everything’s fine! Nothing to see here

A spokeswoman for Thomas Cook was at pains to emphasise “this did not affect UK customers,” before forwarding a canned statement further downplaying the incident, which it is not treating as a notifiable privacy breach.

Source: Thomas Cook website spills personal info – and it’s fine with that • The Register

Nvidia Taught an AI to Flawlessly Erase Noise and artefacts (including text and Watermarks) From Photos

Photographers already face an uphill battle in trying to preventing people from using their digital photos without permission. But Nvidia could make protecting photos online much harder with a new advancement in artificial intelligence that can automatically remove artifacts from a photograph, including text and watermarks, no matter how obtrusive they may be.In previous advancements in automated image editing and manipulation, an AI powered by a deep learning neural network is trained on thousands of before and after example photos so that it knows what the desired output should look like. But this time, researchers at Nvidia, MIT, and Aalto University in Finland, managed to train an AI to remove noise, grain, and other visual artifacts by studying two different versions of a photo that both feature the visual defects. Fifty-thousand samples later, the AI can clean up photos better than a professional photo restorer.Practical applications for the AI include cleaning up long exposure photos of the night sky taken by telescopes, as cameras used for astrophotography often generate noise that can be mistaken for stars. The AI can also be beneficial for medical applications like magnetic resonance imaging that requires considerable post-processing to remove noise from images that are generated, so that doctors have a clear image of what’s going in someone’s body. Nvidia’s AI can cut that processing time down drastically, which in turn reduces the time needed for a diagnosis of a serious condition.

Source: Nvidia Taught an AI to Flawlessly Erase Watermarks From Photos

Controversial copyright law rejected by EU parliament

A controversial overhaul of the EU’s copyright law that sparked a fierce debate between internet giants and content creators has been rejected.

The proposed rules would have put more responsibility on websites to check for copyright infringements, and forced platforms to pay for linking to news.

A slew of high-profile music stars had backed the change, arguing that websites had exploited their content.

But opponents said the rules would stifle internet freedom and creativity.

The move was intended to bring the EU’s copyright laws in line with the digital age, but led to protests from websites and much debate before it was rejected by a margin of 318-278 in the European Parliament on Thursday.

What were they voting for?

The proposed legislation – known as the Copyright Directive – was an attempt by the EU to modernise its copyright laws, but it contained two highly-contested parts.

The first of these, Article 11, was intended to protect newspapers and other outlets from internet giants like Google and Facebook using their material without payment.

But it was branded a “link tax” by opponents who feared it could lead to problems with sentence fragments being used to link to other news outlets (like this).

Article 13 was the other controversial part. It put a greater responsibility on websites to enforce copyright laws, and would have meant that any online platform that allowed users to post text, images, sounds or code would need a way to assess and filter content.

The most common way to do this is by using an automated copyright system, but they are expensive. The one YouTube uses cost $60m (£53m), so critics were worried that similar filters would need to be introduced to every website if Article 13 became law.

There were also concerns that these copyright filters could effectively ban things like memes and remixes which use some copyrighted material.

Source: Controversial copyright law rejected by EU parliament – BBC News

Very glad to see common sense prevailing here. Have you ever thought about how strange it would  be if you could bill someone every time they read your email or your reports? How do musicians think it’s ok to bill people when they are not playing?

Former NSO Group Employee Accused of Stealing Phone Spy Tools

Israeli hacking firm NSO Group is mostly known for peddling top-shelf malware capable of remotely cracking into iPhones. But according to Israeli authorities, the company’s invasive mobile spy tools could have wound up in the hands of someone equally, if not far more, devious than its typical government clients.

A 38-year-old former NSO employee has been accused of stealing the firm’s malware and attempting to sell it for $50 million in cryptocurrency on the dark net, according to a widely reported indictment first published by Israeli press.

The stolen software is said to be worth hundreds of millions of dollars.

According to Israel’s Justice Ministry, the ex-employee was turned in by a potential buyer. The suspect was arrested on June 5, Reuters reported. The accused has been charged with employee theft, attempting to sell security tools without a license, and conduct that could harm state security

Source: Former NSO Group Employee Accused of Stealing Phone Spy Tools

Obviously security holes found will be exploited, which is why responsible disclosure is a good idea. It’s much better for devices to be secure than for intelligence agencies to be able to exploit holes – because non-nation state actors (read: criminals, although there are nations who think other nations are criminal) also have access to these holes.

App Traps: How Cheap Smartphones Siphon User Data in Developing Countries

For millions of people buying inexpensive smartphones in developing countries where privacy protections are usually low, the convenience of on-the-go internet access could come with a hidden cost: preloaded apps that harvest users’ data without their knowledge.

One such app, included on thousands of Chinese-made Singtech P10 smartphones sold in Myanmar and Cambodia, sends the owner’s location and unique-device details to a mobile-advertising firm in Taiwan called General Mobile Corp., or GMobi. The app also has appeared on smartphones sold in Brazil and those made by manufacturers based in China and India, security researchers said.

Taipei-based GMobi, with a subsidiary in Shanghai, said it uses the data to show targeted ads on the devices. It also sometimes shares the data with device makers to help them learn more about their customers.

Smartphones have been billed as a transformative technology in developing markets, bringing low-cost internet access to hundreds of millions of people. But this growing population of novice consumers, most of them living in countries with lax or nonexistent privacy protections, is also a juicy target for data harvesters, according to security researchers.

Smartphone makers that allow GMobi to install its app on phones they sell are able to use the app to send software updates for their devices known as “firmware” at no cost to them, said GMobi Chief Executive Paul Wu. That benefit is an important consideration for device makers pushing low-cost phones across emerging markets.

“If end users want a free internet service, he or she needs to suffer a little for better targeting ads,” said a GMobi spokeswoman.

[…]

Upstream Systems, a London-based mobile commerce and security firm that identified the GMobi app’s activity and shared it with the Journal, said it bought four new devices that, once activated, began sending data to GMobi via its firmware-updating app. This included 15-digit International Mobile Equipment Identification, or IMEI, numbers, along with unique codes called MAC addresses that are assigned to each piece of hardware that connects to the web. The app also sends some location data to GMobi’s servers located in Singapore, Upstream said.

Source: App Traps: How Cheap Smartphones Siphon User Data in Developing Countries – WSJ

 

I like the way even GMobi thinks users getting targetted advertising are suffering!

An AI system for editing music in videos can isolate single instruments

Amateur and professional musicians alike may spend hours pouring over YouTube clips to figure out exactly how to play certain parts of their favorite songs. But what if there were a way to play a video and isolate the only instrument you wanted to hear?

That’s the outcome of a new AI project out of MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL): a deep-learning system that can look at a video of a musical performance, and isolate the sounds of specific instruments and make them louder or softer.

The system, which is “self-supervised,” doesn’t require any human annotations on what the instruments are or what they sound like.

Trained on over 60 hours of videos, the “PixelPlayer” system can view a never-before-seen musical performance, identify specific instruments at pixel level, and extract the sounds that are associated with those instruments.

For example, it can take a video of a tuba and a trumpet playing the “Super Mario Brothers” theme song, and separate out the soundwaves associated with each instrument.

The researchers say that the ability to change the volume of individual instruments means that in the future, systems like this could potentially help engineers improve the audio quality of old concert footage. You could even imagine producers taking specific instrument parts and previewing what they would sound like with other instruments (i.e. an electric guitar swapped in for an acoustic one).

Source: An AI system for editing music in videos | MIT News