Today, the Department of Commerce’s National Telecommunications and Information Administration (NTIA) launched a request for comment (RFC) to advance its efforts to ensure artificial intelligence (AI) systems work as claimed – and without causing harm. The insights gathered through this RFC will inform the Biden Administration’s ongoing work to ensure a cohesive and comprehensive federal government approach to AI-related risks and opportunities.
[…]
NTIA’s “AI Accountability Policy Request for Comment” seeks feedback on what policies can support the development of AI audits, assessments, certifications and other mechanisms to create earned trust in AI systems that they work as claimed. Much as financial audits create trust in the accuracy of a business’ financial statements, so for AI, such mechanisms can help provide assurance that an AI system is trustworthy in that it does what it is intended to do without adverse consequences.
[…]
President Biden has been clear that when it comes to AI, we must both support responsible innovation and ensure appropriate guardrails to protect Americans’ rights and safety. The White House Office of Science and Technology Policy’s Blueprint for an AI Bill of Rights provides an important framework to guide the design, development, and deployment of AI and other automated systems. The National Institute of Standards and Technology’s (NIST) AI Risk Management Framework serves as a voluntary tool that organizations can use to manage risks posed by AI systems.
Comments will be due 60 days from publication of the RFC in the Federal Register.
Jan Erik, sound muddled, he tells the caller he has already lost one million Swedish Krona (about £80,000) in trading scams.
But the caller already knows this. And he knows it makes the pensioner a good target for a follow-up “recovery scam”. He tells Jan Erik that if he hands over his card details and pays a €250 deposit, Solo Capitals will use special software to track his lost investments and get his money back.
“We will be able to recover the whole amount,” William Grant says.
It takes him a while to wear Jan Erik down. But after about 30 minutes on the phone, the pensioner begins reading out his credit card details.
The audio recording was saved by the company under the file name “William Sweden scammed”. The BBC obtained the file from a former employee, but the company had not tried hard to hide it. In fact, it had handed it out to new recruits as part of the company training package.
This was a lesson in how to scam.
[…]
The scam
For more than a year, BBC Eye has been investigating a global fraudulent trading network of hundreds of different investment brands that has scammed unwitting customers like Jan Erik out of more than a billion dollars.
Our investigation reveals for the first time the sheer scale of the fraud, as well as the identities of a shadowy network of individuals who appear to be behind it.
The network is known to police as the Milton group, a name originally used by the scammers themselves but abandoned in 2020. We identified 152 brands, including Solo Capitals, that appear to be part of the network. It operates by targeting investors and scamming them out of thousands – or in some cases hundreds of thousands – of pounds.
One Milton group investment brand even sponsored a top-flight Spanish football club, and advertised in major newspapers, lending it credibility with potential investors.
In November, BBC Eye accompanied German and Georgian police on call-centre raids in the Georgian capital Tbilisi. On the computer screens, we saw row after row of British phone numbers. We phoned several and spoke to British citizens who told us they had just invested money. On one desk, there was a handwritten note with a list of names and useful details for the scammers: “Homeowner, no responsibilities”; “50k in savings”; “From Poland, British citizen”; “50k in stocks.”
Next to the name of one British man, a note said: “Savings less than 10K, very pussy, should scam soon”.
Image caption,
Milton group brands had office space in this downtown Kyiv office building. (Alexander Mahmoud/DG)
The majority of victims sign up after seeing an ad on social media. Within 48 hours typically they receive a phone call from someone who tells them they could make returns of up to 90% per day. On the other end of the phone there is usually a call centre with many of the trappings of a legitimate business – a smart, modern office with an HR department, monthly targets and bonuses, awaydays and competitions for best salesperson. Some call centres play pumping music in the background. But there are also elements you won’t find in a legitimate business – written guidance on how to identify a potential investor’s weaknesses and turn those weaknesses against them.
From their first phone call, victims can be directed into regulated companies or sometimes unregulated, offshore entities. Some victims who signed up to regulated brands within the Milton group are directed by their broker to place trades designed to lose the customer money and make money for the broker – a practice which is illegal under UK regulations. Some victims are instructed to download software that allows the scammer to remotely control their PC and place trades for them – also illegal. And according to former employees of Milton group brands, some customers think they are making real trades, but their money is simply being siphoned away.
“The victims think they have a real account with the company, but there isn’t really any trading, it’s just a simulation,” said Alex, a former employee who worked in a Milton group office in Kyiv, Ukraine.
In order to better understand how the scam works, the BBC posed as an aspiring trader and contacted Coinevo, one of the Milton group’s trading platforms. We were connected to an adviser who gave the name Patrick, and told us we could make “70% or 80% or 90% as a return in one single day”. He told us to send $500 worth of Bitcoin as a deposit to begin trading with.
Patrick pressed our undercover trader to provide a copy of their passport, and after providing a fake copy we were able to continue to operate the account for about two months before Coinevo appeared to detect the fake. At that point, Patrick wrote to us by email, swearing at us and cutting off contact.
But the BBC’s deposit money was already in the system. We were able to track it as it was divided up into small fractions and moved through many different Bitcoin wallets, all seemingly associated with the Milton group. Experts told the BBC that genuine financial institutions do not funnel money in this way. Louise Abbott, a lawyer who specialises in cryptocurrency and fraud, examined the flow of the money and said it suggested “large-scale organised crime”. The reason the money was spread over various different bitcoin wallets, Abbott said, was to “make it as complicated as possible and as difficult as possible for either you, or the victim, or us as lawyers to find”.
[…]
Soon they were speaking nearly every morning, and Jane was revealing specific things she needed money for – expensive repairs to her roof, a buffer for her pension. Hunt used them against her, she said, telling her certain trades would “get her that roof” and “help her future”.
Over the next few months, Jane invested about £15,000. But her trades weren’t doing well. Hunt advised her to withdraw her money and invest with a different trading platform, BproFX, where she could get better returns.
By that point, Jane fully trusted David Hunt. “I felt like I knew him well and I thought he had my interests at heart,” she said, welling up. “So I agreed to move with him.”
What she didn’t know was that BproFX was an unregulated, offshore entity based in Dominica. In reality, EverFX’s UK regulatory status did not stop it from scamming British citizens, but the move over to BproFX would strip Jane of even the scant protections she might be afforded under UK law. The BBC found several victims who were moved to unregulated companies in this way.
[…]
Other victims told the BBC they were scammed this way. Londoner Barry Burnett said he started investing after seeing an ad for EverFX, but after a few early wins, he suddenly lost more than £10,000 in 24 hours. The adviser pressured him to put in another £25,000 to trade himself out of his black hole.
“I must have got at least half a dozen calls in the space of about two hours,” Barry said. “People begging me to put more money in.”
Jane faced similar pressures from David Hunt. “He kept telling me that the more I put in the more I can recover,” she said.
Instead, both finally decided to call it quits. Barry had lost £12,000, Jane £27,000.
[…]
The operations of the Milton group have been investigated before, by the Swedish newspaper Dagens Nyheter and others, but the BBC set out to identify the senior figures behind the global scam.
We began by combing through publicly available corporate documents to map the connections between companies in the Milton group. Five names appeared again and again, listed as directors of the Milton trading platforms or supporting tech companies – David Todua, Rati Tchelidze, Guram Gogeshvili, Joseph Mgeladze, and Michael Benimini.
We plugged the five names into the Panama Papers, a massive 2016 leak detailing offshore companies, and discovered that four of them – Tchelidze, Gogeshvili, Mgeladze and Benimini – were listed as directors or senior figures within a group of linked offshore companies or subsidiary companies that pre-dated the Milton group.
Many of these non-Milton companies led back in some way to one figure: David Kezerashvili, a former Georgian government official who served for two years as the country’s defence minister.
Image caption,
David Kezerashvili, a former defence minister of Georgia, appears to be involved in the Milton scam. (Alamy/BBC)
Kezerashvili was dismissed as defence minister and later convicted in absentia for embezzling more than €5m of government funds. By the time of his conviction, he was living in London and the UK turned down a request from Georgia for his extradition.
There were no publicly available documents linking Kezerashvili to this pre-Milton network, but when we looked at the Panama Papers, his name came up again and again, identifying him as either the founder of the parent companies in the network or as one of their initial shareholders. Behind the scenes, Kezerashvili appeared to be at the centre of that network.
When it came to the Milton group, there was similarly no publicly available documentation linking Kezerashvili to the scam companies, and there was no evidence that he had any direct financial interest in the Milton brands.
But several former employees of Milton-linked companies told us confidentially that they had had direct dealings with Kezerashvili and knew him to be involved in the Milton group.
Kezerashvili has frequently promoted the scam trading platforms on his personal social media accounts. On the business networking site LinkedIn, he has used his account almost exclusively to promote jobs and share posts about Milton-linked companies.
The BBC was able to find a number of other pieces of evidence linking the former defence minister to Milton brands. Several companies owned by Kezerashvili used a private email server on which the only other users were Milton group companies. His venture capital firm, Infinity VC, owned the branding and web domains for companies that provided trading platform technology to the scammers.
Kezerashvili also owns a Kyiv office building that was home to both the scam call centre selling EverFX and the tech firms that provided the software – offices which were raided by police in November. He also owns a Tbilisi office block that contained some of the same tech firms.
When the BBC examined social media profiles belonging to the four senior Milton group men, it became clear from pictures posted of wedding parties and other social events that they all had close social ties to Kezerashvili. Kezerashvili is Facebook friends with at least 45 people linked to the Milton group scams, and one of the four senior figures identified by the BBC is his cousin.
The BBC tracked Kezerashvili to his £18m London mansion and asked to speak to him, but we were told he wasn’t available. He told the BBC via his lawyers that he strongly denied any involvement with the Milton group, or that he gained financially from scams. He said that EverFX was to his knowledge a legitimate business and his lawyers argued other connections we have found to the people and IT behind it “proved nothing”.
Image caption,
Scam victims download a trading platform, but some are never placing real trades at all. (Joel Gunter/BBC)
Mr Chelidze and Mr Gogeshvili also strongly denied our accusations, saying that EverFX was a legitimate, regulated platform. They denied knowledge of Milton or any connection between EverFX and the brands we identified, which they suggested had misused EverFX’s source code and brand to confuse users. They said EverFX had never had a crypto wallet and had no control over how its third-party payment processors directed funds.
Mr Mgeladze also denied our accusations, telling us that he has never owned any call centres fraudulently mis-selling investments and has no knowledge of the Milton group.
Mr Benimini did not respond to our questions.
EverFX denied our allegations, saying that they were a legitimate and regulated platform where risks were fully explained. They said that they had investigated Barry Burnett’s case and found that he was responsible for his losses.
In Jane’s case, they told us her losses were as a result of her moving to an unconnected company. They said that they had fully cooperated with the FCA and there were no outstanding UK regulatory complaints.
Sevilla FC told the BBC only that once their contract with EverFX ended, they had no more contact with the company.
South Korea’s antitrust regulator has fined Alphabet Inc’s (GOOGL.O) Google 42.1 billion won ($31.88 million) for blocking the release of mobile video games on a competitor’s platform.
The Korea Fair Trade Commission (KFTC) said on Tuesday that Google bolstered its market dominance, and hurt local app market One Store’s revenue and value as a platform, by requiring video game makers to exclusively release their titles on Google Play in exchange for providing in-app exposure between June 2016 and April 2018.
[…]
Game makers affected by Google’s action include Netmarble (251270.KS), Nexon (225570.KQ) and NCSOFT (036570.KS), as well as other smaller companies, the antitrust regulator added.
In 2021, Google was fined more than 200 billion won by the KFTC for blocking customised versions of its Android operating system.
Microsoft has been trying to make changes to almost every feature we use on Windows, from the taskbar to notifications. With Windows 11 KB5025310 available in the Beta channel, Microsoft is changing how the Print Screen key works, i.e. its default behaviour.
If your laptop has a dedicated Print Screen key, you can press it to instantly take a screenshot of the screen and save it to the clipboard. You can paste the screenshot into any app like Paint and do whatever you want to. This has always been the default behaviour of the Print Screen key (PrtSc).
KB5025310 is changing the default behaviour for everyone. After installing this or a newer update, your Print Screen key will open the new Snipping Tool. For those unaware, Windows 11’s new Snipping Tool replaces the legacy Snipping Tool and Snip & Sketch app and combines the best features.
Image Courtesy: Microsoft | Snipping Tool with screen recorder
This means Windows 11 won’t save your screenshots to the clipboard. Instead, it will open Snipping Tool, so you can change the screenshot and save it later. Thankfully, it is possible to revert to the original behaviour.
To restore the classic Print Screen key, head to Settings > Accessibility > Keyboard, and change the setting to how you want.
A week before the 2023 Auto Shanghai show, Chinese EV maker BYD revealed Tuesday the coolest suspension technology since the Citroen DS’s hydropneumatic system. However, instead of being used on a quirky French sedan, BYD’s DiSus-X suspension was showcased on a quad-motor electric supercar, the BYD YangWang U9. With DiSus-X, the U9 can drive on only three wheels and hop in the air on all four wheels. Yep. We live in a new world now, folks.
YangWang is BYD’s luxury electric sub-brand, and the U9 is its first supercar. Battery, power, and performance specs should be revealed next week at Auto Shanghai, but BYD smartly revealed this trick suspension system first, as it’s far more interesting.
BYD’s DiSus-X is the newest in a family of clever hydraulic DiSus suspension systems and debuts on the U9. More details on how the newest system works will come next week, but BYD is just showing off some of its tricks.
One such trick driving on just three wheels for short periods in case of a tire blowout, just like the old DS. The U9 probably can’t drive on three wheels for long, but it’s enough to get its driver home or to a repair shop in a pinch. However, the U9’s main party trick is its vertical leap. The suspension system can raise or lower the car at each corner independently, but if it raises each corner quickly, the kinetic energy is enough to jump the U9 an inch or two off the ground. If you’re wondering what the practical application for hopping a car is, stop being a square. It’s just cool.
With that level of suspension technology, BYD should be able to make a shockingly capable supercar that can level itself through corners, provide additional grip to specific tires, and even swaddle passengers in a way most supercars simply can’t. But who cares about any of that? The car can jump.
On March 23, sky observers marveled at a gorgeous display of northern and southern lights. It was a reminder that when our Sun gets active, it can spark a phenomenon called “space weather.” Aurorae are among the most benign effects of this phenomenon. At the other end of the space weather spectrum are solar storms that can knock out satellites. The folks at Starlink found that out the hard way in February 2022. On January 29 that year, the Sun belched out a class M 1.1 flare and related coronal mass ejection. Material from the Sun traveled out on the solar wind and arrived at Earth a few days later. On February 3, Starlink launched a group of 49 satellites to an altitude only 130 miles above Earth’s surface. They didn’t last long, and now solar physicists know why.
A group of researchers from NASA Goddard Space Flight Center and the Catholic University of America took a closer look at the specifics of that storm. Their analysis identified a mass of plasma that impacted our planet’s magnetosphere. The actual event was a halo coronal mass ejection from an active region in the northeast quadrant of the Sun. The material traveled out at around 690 kilometers per second as a shock-driving magnetic cloud. Think of it as a long ropy mass of material writhing its way through space. As it traveled, it expanded and at solar-facing satellites — including STEREO-A, which took a direct hit from it — made observations. Eventually, the cloud smacked into Earth’s magnetosphere creating a geomagnetic storm.
The atmosphere thickened enough that it affected the newly launched Starlink stations. They started to experience atmospheric drag, which caused them to deorbit and burn up on the way down. It was an expensive lesson in space weather and provided people on Earth with a great view of what happens when satellites fall back to Earth. It was also that could have been avoided if they’d delayed their launch to account for the ongoing threat.
combined Python and a hefty dose of of AI for a fascinating proof of concept: self-healing Python scripts. He shows things working in a video, embedded below the break, but we’ll also describe what happens right here.
The demo Python script is a simple calculator that works from the command line, and [BioBootloader] introduces a few bugs to it. He misspells a variable used as a return value, and deletes the subtract_numbers(a, b) function entirely. Running this script by itself simply crashes, but using Wolverine on it has a very different outcome.In a short time, error messages are analyzed, changes proposed, those same changes applied, and the script re-run.
Wolverine is a wrapper that runs the buggy script, captures any error messages, then sends those errors to GPT-4 to ask it what it thinks went wrong with the code. In the demo, GPT-4 correctly identifies the two bugs (even though only one of them directly led to the crash) but that’s not all! Wolverine actually applies the proposed changes to the buggy script, and re-runs it. This time around there is still an error… because GPT-4’s previous changes included an out of scope return statement. No problem, because Wolverine once again consults with GPT-4, creates and formats a change, applies it, and re-runs the modified script. This time the script runs successfully and Wolverine’s work is done.
LLMs (Large Language Models) like GPT-4 are “programmed” in natural language, and these instructions are referred to as prompts. A large chunk of what Wolverine does is thanks to a carefully-written prompt, and you can read it here to gain some insight into the process. Don’t forget to watch the video demonstration just below if you want to see it all in action.
There’s an invisible monster on the loose, barreling through intergalactic space so fast that if it were in our solar system, it could travel from Earth to the Moon in 14 minutes. This supermassive black hole, weighing as much as 20 million Suns, has left behind a never-before-seen 200,000-light-year-long “contrail” of newborn stars, twice the diameter of our Milky Way galaxy. It’s likely the result of a rare, bizarre game of galactic billiards among three massive black holes.
Rather than gobbling up stars ahead of it, like a cosmic Pac-Man, the speedy black hole is plowing into gas in front of it to trigger new star formation along a narrow corridor. The black hole is streaking too fast to take time for a snack. Nothing like it has ever been seen before, but it was captured accidentally by NASA’s Hubble Space Telescope.
This is an artist’s impression of a runaway supermassive black hole that was ejected from its host galaxy as a result of a tussle between it and two other black holes. As the black hole plows through intergalactic space it compresses tenuous gas in front to it. This precipitates the birth of hot blue stars. This illustration is based on Hubble Space Telescope observations of a 200,000-light-year-long “contrail” of stars behind an escaping black hole. For more details, read the Extended Text Description.
Credits: NASA, ESA, Leah Hustak (STScI)
“We think we’re seeing a wake behind the black hole where the gas cools and is able to form stars. So, we’re looking at star formation trailing the black hole,” said Pieter van Dokkum of Yale University in New Haven, Connecticut. “What we’re seeing is the aftermath. Like the wake behind a ship we’re seeing the wake behind the black hole.” The trail must have lots of new stars, given that it is almost half as bright as the host galaxy it is linked to.
The black hole lies at one end of the column, which stretches back to its parent galaxy. There is a remarkably bright knot of ionized oxygen at the outermost tip of the column. Researchers believe gas is probably being shocked and heated from the motion of the black hole hitting the gas, or it could be radiation from an accretion disk around the black hole. “Gas in front of it gets shocked because of this supersonic, very high-velocity impact of the black hole moving through the gas. How it works exactly is not really known,” said van Dokkum.
“This is pure serendipity that we stumbled across it,” van Dokkum added. He was looking for globular star clusters in a nearby dwarf galaxy. “I was just scanning through the Hubble image and then I noticed that we have a little streak. I immediately thought, ‘oh, a cosmic ray hitting the camera detector and causing a linear imaging artifact.’ When we eliminated cosmic rays we realized it was still there. It didn’t look like anything we’ve seen before.”
This Hubble Space Telescope archival photo captures a curious linear feature that is so unusual it was first dismissed as an imaging artifact from Hubble’s cameras. But follow-up spectroscopic observations reveal it is a 200,000-light-year-long chain of young blue stars. A supermassive black hole lies at the tip of the bridge at lower left. The black hole was ejected from the galaxy at upper right. It compressed gas in its wake to leave a long trail of young blue stars. Nothing like this has ever been seen before in the universe. This unusual event happened when the universe was approximately half its current age.
Credits: NASA, ESA, Pieter van Dokkum (Yale); Image Processing: Joseph DePasquale (STScI)
Because it was so weird, van Dokkum and his team did follow-up spectroscopy with the W. M. Keck Observatories in Hawaii. He describes the star trail as “quite astonishing, very, very bright and very unusual.” This led to the conclusion that he was looking at the aftermath of a black hole flying through a halo of gas surrounding the host galaxy.
This intergalactic skyrocket is likely the result of multiple collisions of supermassive black holes. Astronomers suspect the first two galaxies merged perhaps 50 million years ago. That brought together two supermassive black holes at their centers. They whirled around each other as a binary black hole.
Then another galaxy came along with its own supermassive black hole. This follows the old idiom: “two’s company and three’s a crowd.” The three black holes mixing it up led to a chaotic and unstable configuration. One of the black holes robbed momentum from the other two black holes and got thrown out of the host galaxy. The original binary may have remained intact, or the new interloper black hole may have replaced one of the two that were in the original binary, and kicked out the previous companion.
When the single black hole took off in one direction, the binary black holes shot off in the opposite direction. There is a feature seen on the opposite side of the host galaxy that might be the runaway binary black hole. Circumstantial evidence for this is that there is no sign of an active black hole remaining at the galaxy’s core. The next step is to do follow-up observations with NASA’s James Webb Space Telescope and the Chandra X-ray Observatory to confirm the black hole explanation.
https://youtube.com/watch?v=aPAP2ewFR0A%3Frel%3D0
There’s an invisible monster on the loose! It’s barreling through intergalactic space fast enough to travel from Earth to the Moon in 14 minutes. But don’t worry, luckily this beast is very, very far away! This potential supermassive black hole, weighing as much as 20 million Suns, has left behind a never-before-seen 200,000 light-year-long trail of newborn stars. The streamer is twice the diameter of our Milky Way galaxy. It’s likely the result of a rare, bizarre game of galactic billiards among three massive black holes.
Credits: NASA’s Goddard Space Flight Center; Lead Producer: Paul Morris
NASA’s upcoming Nancy Grace Roman Space Telescope will have a wide-angle view of the universe with Hubble’s exquisite resolution. As a survey telescope, the Roman observations might find more of these rare and improbable “star streaks” elsewhere in the universe. This may require machine learning using algorithms that are very good at finding specific weird shapes in a sea of other astronomical data, according to van Dokkum.
a novel approach to the problem of scraping web content in a structured way without needing to write the kind of page-specific code web scrapers usually have to deal with. How? Just enlist the help of a natural language AI. Scrapeghost relies on OpenAI’s GPT API to parse a web page’s content, pull out and classify any salient bits, and format it in a useful way.
What makes Scrapeghost different is how data gets organized. For example, when instantiating scrapeghost one defines the data one wishes to extract. For example:
The kicker is that this format is entirely up to you! The GPT models are very, very good at processing natural language, and scrapeghost uses GPT to process the scraped data and find (using the example above) whatever looks like a name, district, party, photo, and office address and format it exactly as requested.
It’s an experimental tool and you’ll need an API key from OpenAI to use it, but it has useful features and is certainly a novel approach. There’s a tutorial and even a command-line interface, so check it out.
In VR, a blink can be a window of opportunity to improve the user’s experience. We’ll explain how in a moment, but blinks are tough to capitalize on because they are unpredictable and don’t last very long. That’s why researchers spent time figuring out how to induce eye blinks on demand in VR (video) and the details are available in a full PDF report. Turns out there are some novel, VR-based ways to reliably induce blinks. If an application can induce them, it makes it easier to use them to fudge details in helpful ways.
It turns out that humans experience a form of change blindness during blinks, and this can be used to sneak small changes into a scene in useful ways. Two examples are hand redirection (HR), and redirected walking (RDW). Both are ways to subtly break the implicit one-to-one mapping of physical and virtual motions. Redirected walking can nudge a user to stay inside a physical boundary without realizing it, leading the user to feel the area is larger than it actually is. Hand redirection can be used to improve haptics and ergonomics. For example, VR experiences that use physical controls (like a steering wheel in a driving simulator, or maybe a starship simulator project like this one) rely on physical and virtual controls overlapping each other perfectly. Hand redirection can improve the process by covering up mismatches in a way that is imperceptible to the user.
There are several known ways to induce a blink reflex, but it turns out that one novel method is particularly suited to implementing in VR: triggering the menace reflex by simulating a fast-approaching object. In VR, a small shadow appears in the field of view and rapidly seems to approach one’s eyes. This very brief event is hardly noticeable, yet reliably triggers a blink. There are other approaches as well such as flashes, sudden noise, or simulating the gradual blurring of vision, but to be useful a method must be unobtrusive and reliable.
The Bruce Murray Laboratory for Planetary Visualization has completed a 5.7 terapixel mosaic of the surface of Mars rendered at 5.0 m/px. Each pixel in the mosaic is about the size of a typical parking space, providing unprecedented resolution of the martian surface at the global scale.
The mosaic covers 99.5% of Mars from 88°S to 88°N. The pixels that make up the mosaic can all be mapped back to their source data, providing full traceability for the entire mosaic. The mosaic is available to stream over the internet and to download, as described below.
All data in the mosaic come from the Context Camera (CTX) onboard the Mars Reconnaissance Orbiter (MRO).
Below is the entire mosaic within a 3D viewer. Click “See the Mosaic in 3D,” or click here to see it in a new window.
Right now, developers simply need to declare to Google that account deletion is somehow possible, but beginning next year, developers will have to make it easier to delete data through both their app and an online portal. Google specifies:
For apps that enable app account creation, developers will soon need to provide an option to initiate account and data deletion from within the app and online.
This means any app that lets you create an account to use it is required to allow you to delete that information when you’re done with it (or rather, request the developer delete the data from their servers). Although you can request that your data be deleted now, it usually requires manually contacting the developer to remove it. This new policy would mean developers have to offer a kill switch from the get-go rather than having Android users do the leg work.
The web deletion requirement is particularly new and must be “readily discoverable.” Developers must provide a link to a web form from the app’s Play Store landing page, with the idea being to let users delete account data even if they no longer have the app installed. Per the existing Android developer policy, all apps must declare how they collect and handle user data—Google introduced the policy in 2021 and made it mandatory last year. When you go into the Play Store and expand the “Data Safety” section under each app listing, developers list out data collection by criteria.
Simply removing an app from your Android device doesn’t completely scrub your data. Like software on a desktop operating system, files and folders are sometimes left behind from when the app was operating. This new policy will hopefully help you keep your data secure by wiping any unnecessary account info from the app developer’s servers, but also hopes to cut down on straggling data on your device. Conversely, you don’t have to delete your data if you think you’ll come to the app later. When it says you have a “choice,” Google wants to ensure it can point to something obvious.
It’s unclear how Google will determine if a developer follows the rules. It is up to the app developer to disclose whether user-specific app data is actually deleted. Earlier this year, Mozilla called out Google after discovering significant discrepancies between the top 20 most popular free apps’ internal privacy policies and those they listed in the Play Store.
A Cornell University researcher has developed sonar glasses that “hear” you without speaking. The eyeglass attachment uses tiny microphones and speakers to read the words you mouth as you silently command it to pause or skip a music track, enter a passcode without touching your phone or work on CAD models without a keyboard.
Cornell Ph.D. student Ruidong Zhang developed the system, which builds off a similar project the team created using a wireless earbud — and models before that which relied on cameras. The glasses form factor removes the need to face a camera or put something in your ear. “Most technology in silent-speech recognition is limited to a select set of predetermined commands and requires the user to face or wear a camera, which is neither practical nor feasible,” said Cheng Zhang, Cornell assistant professor of information science. “We’re moving sonar onto the body.”
The researchers say the system only requires a few minutes of training data (for example, reading a series of numbers) to learn a user’s speech patterns. Then, once it’s ready to work, it sends and receives sound waves across your face, sensing mouth movements while using a deep learning algorithm to analyze echo profiles in real time “with about 95 percent accuracy.”
The system does this while offloading data processing (wirelessly) to your smartphone, allowing the accessory to remain small and unobtrusive. The current version offers around 10 hours of battery life for acoustic sensing. Additionally, no data leaves your phone, eliminating privacy concerns. “We’re very excited about this system because it really pushes the field forward on performance and privacy,” said Cheng Zhang. “It’s small, low-power and privacy-sensitive, which are all important features for deploying new, wearable technologies in the real world.”
Shadetree hackers—or, as they’re more commonly called, tech-savvy thieves—have found a new way to steal cars. No, it’s not a relay attack, Bluetooth exploit, key fob replay, or even a USB cable. Instead, these thieves are performing a modern take on hot-wiring without ever ripping apart the steering column.
Crafty criminals have resorted to using specially crafted devices that simply plug into the wiring harness behind the headlight of a victim’s car. Once they’re plugged in, they’re able to unlock, start, and drive away before the owner even catches wind of what’s going on.
Last year, Ian Tabor, who runs the UK chapter of Car Hacking Village, had his Toyota RAV4 stolen from outside of his home near London. Days prior to the theft, he found that thieves had damaged his car without successfully taking it. It wasn’t quite clear if it was a case of vandalism, or if the thieves had tried to make off with the car’s front bumper, but he did notice that the headlight harness had been yanked out.
Ultimately, his car wound up missing when thieves successfully made away with it. And after Tabor’s car was stolen, so was his neighbor’s Toyota Land Cruiser. But, folks, this is 2023. It’s not like you can just hotwire a car and drive away as the movies suggest. This got Tabor curious—after all, hacking cars is something he does for fun. How exactly did the thieves make off with his car?
Tabor got to work with Toyota’s “MyT” app. This is Toyota’s telematics system which pumps Diagnostic Trouble Codes up to the automaker’s servers rather than forcing you to plug in a code reader to the car’s OBD2 port. Upon investigation, Tabor noticed that his Rav4 kicked off a ton of DTCs just prior to being stolen—one of which was for the computer that controls the car’s exterior lighting.
This led Tabor to wonder if the thieves somehow made use of the vehicle CAN Bus network to drive away with his car. After scouring the dark web, Tabor was able to locate expensive tools claiming to work for various automakers and models, including BMW, Cadillac, Chrysler, Fiat, Ford, GMC, Honda, Jeep, Jaguar, Lexus, Maserati, Nissan, Toyota, as well as Volkswagen. The cost? As much as $5,400, but that’s a drop in the bucket if they can actually deliver on the promise of enabling vehicle theft.
Tabor decided to order one of these devices to try out himself. Together with Ken Tindell, the CTO of Canis Automotive Labs, the duo tore down a device to find out what made it tick and publish a writeup of their findings.
As it turns out, the expensive device was comprised of just $10 in components. The real magic is in the programming, which was set up to inject fake CAN messages into the car’s actual CAN Bus network. The messages essentially tricked the car into thinking a trusted key was present, which convinced the CAN Gateway (the component that filters out CAN messages into their appropriate segmented networks) into passing along messages instructing the car to disable its immobilizer, unlocking the doors, and essentially allowed the thieves to just away.
What’s more, is that the device simply looked like an ordinary portable speaker. The guts were stuffed inside the shell of a JBL-branded Bluetooth speaker, and all the thief needs to do is simply power the device on.
Once the device is on and plugged in, it wakes up the CAN network by sending a frame—similar to if you were to pull on a door handle, approach with a passive entry key, or hit a button on your fob. It then listens for a specific CAN message to begin its attack. The device then emulates a hardware error which tricks other ECUs on the CAN network to stop sending messages so that the attacking device has priority to send its spoofed messages to CAN devices.
The pause of valid messages is when the device is able to go into attack mode. It then sends the spoofed “valid key present” messages to the gateway which makes the car think that an actual valid key is being used to control the vehicle. Next, the attacker simply presses the speaker’s “play” button, and the car’s doors are unlocked.
Given that the manufacturer of these CAN injection devices claims that the devices are so effective against a myriad of makes and models, it would seem that this could be an industry-wide problem that may take some brainstorming to fix.
The good news is that this type of attack can be thwarted. While there are quick-and-dirty methods that could potentially be re-defeated in the long run, an automaker looking to prevent this type of attack by encrypting its CAN Bus network. According to Tindell, Canis is working on a similar project to retrofit U.S. military vehicles with a similar encryption scheme, similar to what he suggests as the fix for commercial vehicles experiencing this issue.
Several law enforcement agencies have teamed up to take down Genesis Market, a website selling access to “over 80 million account access credentials,” which included the standard usernames and passwords, as well as much more dangerous data like session tokens. According to a press release from the US Department of Justice, the site was seized on Tuesday. The European Union Agency for Law Enforcement Cooperation (or Europol) says that 119 of the site’s users have been arrested.
Genesis Marketplace has been around since 2018, according to the Department of Justice, and was “one of the most prolific initial access brokers (IABs) in the cybercrime world.” It let hackers search for certain types of credentials, such as ones for social media accounts, bank accounts, etc., as well as search for credentials based on where in the world they came from.
The agencies have teamed up with HaveIBeenPwned.com to make it easy for the public to check if their login credentials were stolen, and I’d highly recommend doing so — because of the way Genesis worked, this isn’t the typical “just change your password and you’ll be fine scenario.” For instructions on how to check whether Genesis was selling your stolen info, check out the writeup from Troy Hunt, who runs HaveIBeenPwned.
(The TL;DR is that you should sign up for HIBP’s email notification service with all of your important email addresses, and then be sure to click the “Verify email” button in the confirmation email. Just searching for your email on the site won’t tell you if you were impacted.)
[…]
While Genesis Marketplace traded in usernames and passwords, it also sold access to users’ cookies and browser fingerprints as well, which could let hackers bypass protections like two-factor authentication. Cookies — or login tokens, to be specific — are files that websites store on your computer to show that you’ve already logged in by correctly entering your password and two-factor authentication information. They’re the reason you don’t have to log into a website each time you visit it. (They’re also the reason that the joint effort to take down Genesis was given the delightful codename “Operation Cookie Monster.”)
[…]
Genesis stole the fingerprints, too. What’s more, it even provided a browser extension that let hackers spoof the victim’s fingerprint while using their login cookie to gain access to an account, according to a 2019 report from ZDNET.
A unit of the Russian military intelligence service GROe has hacked routers of Dutch private individuals and small and medium-sized companies. The Military Intelligence Service (MIVD) has discovered this, writes de Volkskrant.
The routers are part of a worldwide attack network and can, for example, destroy or paralyze the network of ministries. It is estimated that there are thousands of hacked devices in the hands of the Russian unit worldwide. In the Netherlands, this would involve several dozen routers.
The hacked devices are more advanced routers of computers often located at small businesses. The Russian unit will take over the routers and can monitor and control them, investigative journalist Huib Modderkolk told NOS Radio 1 Journaal.
According to him, this unit was created to sabotage: “It is also called the most dangerous hacking group in the world.” ‘We know what you’re doing’
The MIVD discovered the digital attack because the service saw many Dutch IP addresses. According to Modderkolk, the victims often do not realize that they have been hacked. By accepting the router’s default settings or using a simple password, these routers are easy to hack. Individuals and companies have now been informed by the MIVD.
It is striking that the MIVD makes this information public: “They hope for more awareness that this is actually going on, but the aim is also to let the Russians know: ‘we know what you are doing'”. According to Modderkolk, this is a development of recent years, and the British and Americans are also increasingly disclosing this type of sensitive information. Disinformation and cyber threats
The National Coordinator for Counterterrorism and Security (NCTV) has already warned of disinformation and cyber threats in connection with the war in Ukraine. These cyber attacks could affect the communication system of banks or hospitals, among others. At the moment there are no specific threats, but due to the rapid developments of the war, this could change quickly.
It is not clear whether the hack of the Russian hacker group has to do with the war in Ukraine.
Human memory might be even more unreliable than currently thought. In a new study, scientists found that it’s possible for people to form false memories of an event within seconds of it occurring. This almost-immediate misremembering seems to be shaped by our expectations of what should happen, the team says.
[…]
they recruited hundreds of volunteers over a series of four experiments to complete a task: They would look at certain letters and then be asked to recall one highlighted letter right after. However, the scientists used letters that were sometimes reversed in orientation, so the volunteers had to remember whether their selection was mirrored or not (for example, correctly identifying whether they saw c vs ↄ). They also focused on the volunteers who were highly confident about their choices during the task.
Overall, the participants regularly misremembered the letters, but in a specific way. People were generally good at remembering when a typical letter was shown, with their inaccuracy rates hovering around 10%. But they were substantially worse at remembering a mirrored letter, with inaccuracy rates up to 40% in some experiments. And, interestingly enough, their memory got worse the longer they had to wait before recalling it. When they were asked to recall what they saw a half second later, for instance, they were wrong less than 20% of the time, but when they were asked three seconds later, the rate rose as high as 30%.
According to Otten, the findings—published Wednesday in PLOS One—indicate that our memory starts being shaped almost immediately by our preconceptions. People expect to see a regular letter, and don’t get easily fooled into misremembering a mirrored letter. But when the unexpected happens, we might often still default to our missed prediction. This bias doesn’t seem to kick in instantaneously, though, since people’s short-term memory was better when they had to be especially quick on their feet.
“It is only when memory becomes less reliable through the passage of a tiny bit of time, or the addition of extra visual information, that internal expectations about the world start playing a role,” Otten said.
Some users of Microsoft’s free Outlook hosted service are finding they can no longer send or receive emails because of how the Windows giant now calculates the storage of attachments.
Microsoft account holders are allowed to hold up to 15GB in their cloud-hosted email, which until recently included text and attachments, and 5GB in their OneDrive storage. That policy changed February 1. Since then, attachments now count as part of the 5GB OneDrive allowance – and if that amount is exceeded, it throws a wrench into the email service.
It doesn’t change the storage amount available in Outlook.com, but could in OneDrive.
“This update may reduce how much cloud storage you have available to use with your OneDrive,” Microsoft wrote in a support note posted before the change. “If you reach your cloud storage quota, your ability to send and receive emails in Outlook.com will be disrupted.”
Redmond added that the plan was to gradually roll out the cloud storage changes and new quota bar starting February 1 across users’ app and Windows settings and Microsoft accounts. Two months later, that gradual rollout is beginning to hit more and more users.
One reader told The Register that his Outlook recently stopped working and indicated that he had surpassed the 5GB storage limit, reaching 6.1GB. He was unaware of the policy change, so he was confused when he saw that in his email account he had used only 6.8GB of the 15GB allowed.
It was the change in how attachments are added that tripped him up. Microsoft told him about the new policy.
No one deletes attachments every time an email is received. This is like blackmail “So instantly, I have lost 10GB of email capacity and because my attachments were greater than 5GB that instantly disabled my email and triggered bounce-backs (even sending and receiving with no attachments),” the reader told us.
“No one deletes attachments every time an email is received. This is like blackmail. MS is forcing us to buy a subscription by the back door or to have to delete emails with attachments on a regular basis ad infinitum.”
He isn’t the only one perplexed by the issue.
[…]
One who apparently was unaware that it was the attachments shifting over to OneDrive causing the email problems deleted a lot of emails, only to find it didn’t change the “storage used” amount.
“We could see inside people’s garages and their private properties,” a former employee told Reuters. “Let’s say that a Tesla customer had something in their garage that was distinctive, you know, people would post those kinds of things.”
One office in particular, located in San Mateo, reportedly had a “free-wheeling” atmosphere, where employees would share videos and images with wild abandon. These pics or vids would often be “marked-up” via Adobe photoshop, former employees said, converting drivers’ personal experiences into memes that would circulate throughout the office.
“The people who buy the car, I don’t think they know that their privacy is, like, not respected,” one former employee was quoted as saying. “We could see them doing laundry and really intimate things. We could see their kids.”
Another former employee seemed to admit that all of this was very uncool: “It was a breach of privacy, to be honest. And I always joked that I would never buy a Tesla after seeing how they treated some of these people,” the employee told the news outlet. Yes, it’s always a vote of confidence when a company’s own employees won’t use the products that they sell.
Privacy concerns related to Tesla’s data-guzzling autos aren’t exactly new. Back in 2021, the Chinese government formally banned the vehicles on the premises of certain military installations, calling the company a “national security” threat. The Chinese were worried that the cars’ sensors and cameras could be used to funnel data out of China and back to the U.S. for the purposes of espionage. Beijing seems to have been on to something—although it might be the case that the spying threat comes less from America’s spooks than it does from bored slackers back at Tesla HQ.
One of the reasons that Tesla’s cameras seem so creepy is that you can never really tell if they’re on or not. A couple of years ago, a stationary Tesla helped catch a suspect in a Massachusetts hate crime, when its security system captured images of the man slashing tires in the parking lot of a predominantly Black church. The man was later arrested on the basis of the photos.
Reuters notes that it wasn’t ultimately “able to determine if the practice of sharing recordings, which occurred within some parts of Tesla as recently as last year, continues today or how widespread it was.”
With all this in mind, you might as well always assume that your Tesla is watching, right? And, now that Reuters’ story has come out, you should also probably assume that some bored coder is also watching—potentially in the hopes of converting your dopiest in-car moment into a meme.
Private camera recordings, captured by cars, were shared in chat rooms: ex-workers Circulated clips included one of child being hit by car: ex-employees Tesla says recordings made by vehicle cameras ‘remain anonymous’ One video showed submersible vehicle from James Bond film, owned by Elon Musk
LONDON/SAN FRANCISCO, April 6 (Reuters) – Tesla Inc assures its millions of electric car owners that their privacy “is and will always be enormously important to us.” The cameras it builds into vehicles to assist driving, it notes on its website, are “designed from the ground up to protect your privacy.”
But between 2019 and 2022, groups of Tesla employees privately shared via an internal messaging system sometimes highly invasive videos and images recorded by customers’ car cameras, according to interviews by Reuters with nine former employees.
Some of the recordings caught Tesla customers in embarrassing situations. One ex-employee described a video of a man approaching a vehicle completely naked.
Also shared: crashes and road-rage incidents. One crash video in 2021 showed a Tesla driving at high speed in a residential area hitting a child riding a bike, according to another ex-employee. The child flew in one direction, the bike in another. The video spread around a Tesla office in San Mateo, California, via private one-on-one chats, “like wildfire,” the ex-employee said.
Other images were more mundane, such as pictures of dogs and funny road signs that employees made into memes by embellishing them with amusing captions or commentary, before posting them in private group chats. While some postings were only shared between two employees, others could be seen by scores of them, according to several ex-employees.
Tesla states in its online “Customer Privacy Notice” that its “camera recordings remain anonymous and are not linked to you or your vehicle.” But seven former employees told Reuters the computer program they used at work could show the location of recordings – which potentially could reveal where a Tesla owner lived.
One ex-employee also said that some recordings appeared to have been made when cars were parked and turned off. Several years ago, Tesla would receive video recordings from its vehicles even when they were off, if owners gave consent. It has since stopped doing so.
“We could see inside people’s garages and their private properties,” said another former employee. “Let’s say that a Tesla customer had something in their garage that was distinctive, you know, people would post those kinds of things.”
Tesla didn’t respond to detailed questions sent to the company for this report.
About three years ago, some employees stumbled upon and shared a video of a unique submersible vehicle parked inside a garage, according to two people who viewed it. Nicknamed “Wet Nellie,” the white Lotus Esprit sub had been featured in the 1977 James Bond film, “The Spy Who Loved Me.”
The vehicle’s owner: Tesla Chief Executive Elon Musk, who had bought it for about $968,000 at an auction in 2013. It is not clear whether Musk was aware of the video or that it had been shared.
To report this story, Reuters contacted more than 300 former Tesla employees who had worked at the company over the past nine years and were involved in developing its self-driving system. More than a dozen agreed to answer questions, all speaking on condition of anonymity.
Reuters wasn’t able to obtain any of the shared videos or images, which ex-employees said they hadn’t kept. The news agency also wasn’t able to determine if the practice of sharing recordings, which occurred within some parts of Tesla as recently as last year, continues today or how widespread it was. Some former employees contacted said the only sharing they observed was for legitimate work purposes, such as seeking assistance from colleagues or supervisors.
In a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.
Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.
[…]
n a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.
Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.
In a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.
Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.
null
null
“As we looked upon that air wing of the future, we have numerous unmanned systems,” Loiselle said. “You’ve heard talk about CCAs [and] MQ-25.”
CCA stands for Collaborative Combat Aircraft and is a term that originated with the Air Force to describe future advanced drones with high degrees of autonomy intended to operate collaboratively with crewed platforms. Secretary of the Air Force Frank Kendall announced earlier this year that the service had begun doing future planning around a fleet of at least 1,000 CCAs, as well as 200 crewed sixth-generation stealth combat jets, all being developed as part of its own separate multi-faceted NGAD program. The CCA figure was based on a notional concept of operations that would pair two of the drones with each of the 200 NGAD combat jets and 300 stealthy F-35A Joint Strike Fighters.
However, the Air Force is still very much refining its CCA fleet structure plans, which could grow to include an even larger total number of CCAs with different types geared toward different mission sets. It’s also still figuring out how it intends to deploy and employ them. The Navy appears to be doing much the same, in increasingly close coordination with the Air Force.
“We’re developing an unmanned control station that’s already installed on three aircraft carriers, and that will be the control station for any UAS [uncrewed aerial systems] that we buy,” Rear Adm. Loiselle added. “[There is] unbelievable cooperation with the Air Force right now in the development of mission systems for both sixth-gen [combat jets] and CCAs… I’m very close to getting a signed agreement with the Air Force where we’re going to have the ability for the Navy to control Air Force CCAs and the Air Force to control Navy CCAs.”
The Navy has previously said that the MQ-25 would be deployed first on the Nimitz class carriers USS Dwight D. Eisenhower and USS George H.W. Bush, and the latter ship has been actively used for testing that drone. It was announced last year that the plans had changed and that USS Theodore Roosevelt, another Nimitz class ship, would be the first to host the Stingray.
The expectation is that future CCAs will also be able to be controlled by various aircraft in the course of operations. The Navy has specifically said in the past that one of the core missions for its future sixth-generation crewed combat jet, also referred to as F/A-XX, will be acting as a “quarterback” for drones.
For the Navy and the Air Force, being able to readily exchange control of future drones will be key to ensuring operational flexibility. During the panel discussion yesterday, Rear Adm. Loiselle outlined a broader future naval vision where this capability could be particularly valuable.
[…]
“The bottom line is when we’re building our future force that’s going to be 60 percent unmanned, then we’re going to look different than we do today. And we are no longer going to have a fighting force that has 44 strike fighters on the deck, because that’s incompatible with a 60 percent unmanned air wing,” the rear admiral explained. “So we’re going to have to change the narrative, from 44 strike fighters to how many targets can I get at what range at what time intervals, because that’s the true metric that matters.”
“The type of platform that delivers that ordnance is less important than the ability to do so,” he continued. “So we need to look at the entire portfolio that is present within the carrier strike group and how we generate that effect. Equally, we need to be cognizant of what’s available in the joint force, such that we don’t duplicate capabilities that would work within our part of that plan execution.”
[…]
With all this in mind, carrier strike groups, as well as potentially other naval assets, being able to readily take control of Air Force drones during operations in certain circumstances, and vice versa, could be extremely useful. A Navy carrier air wing or Air Force elements in the same region might be able to provide more on-demand escorts or other support for each other’s crewed platforms, including tactical combat jets and larger aircraft like bombers, tankers, and airlifters. Current and future Air Force assets capable of flying very long distances themselves, such as the forthcoming B-21 Raider stealth bomber, could even take control of Navy uncrewed aircraft using more localized line-of-sight links to help with their immediate missions, too.
null
For instance, long-range Air Force platforms like the B-21 could ‘pick up’ CCAs launched from a carrier operating far forward of any land base. They would then fly their mission into contested airspace with the help of their unmanned wingmen, then return them back to Navy control once they head back out of the high-threat area and towards the carrier’s area of operation. Unmanned tactical aircraft have a significant range advantage over their manned counterparts, which is a factor as well.
Beyond this, just being able to share fleets when in the air between the services opens up huge possibilities and operational synergies.
An Australian engineering company has created a cardboard drone that runs on open source software, standard hardware, and can be assembled and flown with no prior experience.
The Corvo Precision Payload Delivery System (PPDS) costs less than $3,500 apiece, a price made possible by the craft’s use of FOSS and commercial-off-the-shelf hardware.
Michael Partridge, SYPAQ’s general manager for Innovation & Strategic Programs (I&SP), told The Register that Corvo uses ArduPilot autopilot software, unspecified hardware that SYPAQ customizes, and waxed cardboard.
The drone takes around an hour to assemble, we’re told, and its lithium-ion batteries give it a range of up to 100km (62 miles) with a 3kg (6.6lb) payload.
The craft ships in a flat pack complete with tape, glue, and instructions on how to assemble it. A tablet computer is also included so users can tell Corvo where to fly by entering GPS coordinates. A wired connection to upload that flight plan is required, but once Corvo is aloft, it will proceed along its route, at a specified altitude, and land itself at its determined destination.
Partridge declined to discuss details of the tech on board the drones for operational reasons but said SYPAQ has ensured that flight plans are encrypted so that if a Corvo is captured, the location of its pilots can’t be retrieved.
SYPAQ will happily ship a single Corvo, but also offers a “capability pack” that includes multiple craft, spares, and the slingshot-powered launch ramp the craft needs to get airborne.
Partridge said single Corvo units have survived more than 20 flights and that the waxed cardboard wing can handle moisture well, without losing its aerodynamic qualities.
Users in the Ukrainian armed forces have adapted the craft to different roles too. Partridge said adding a camera requires some light hacking – of the drone’s cardboard airframe.
“It has a cargo bay [and] you can do whatever you want in there within the 3kg payload. You can cut a hole through the aircraft to look through it and insert a camera.”
For now, SYPAQ hasn’t given Corvo’s onboard computer wireless capabilities, partly to reduce cost and partly to ensure stealth. But Partridge said Corvos have carried action cameras like the GoPro and users are happy to retrieve removable media once the plane lands. SYPAQ is working on payloads that allow wireless transmission of images, possibly over long distances.
[…] The behavior of the 248 Siberian tigers observed through a personality test showed that the endangered cats had unique traits influencing both their success in reproduction and survival, researchers reported in the journal Royal Society Open Science.
“We found that tigers are very individual, and that people who’ve worked with them and know them well see their individual personalities,” co-author Rosalind Arden of the London School of Economics told AFP.
The study adapted a commonly used human personality test to explore tiger traits such as confidence, sincerity, bullying and savagery in two separate populations of tigers held in semi-captivity in China.
Questionnaires with a list of 70 personality indicators were filled out by veterinarians and feeders who work with the tigers on a daily basis.
The combined results found that both tiger populations displayed characteristics that fell into two overarching personality categories: majesty and steadiness.
Tigers scoring higher for “majesty” were healthier, preyed more on live animals, and ate and mated more.
They were also “regarded by their human raters as having higher group status among tigers,” the study said.
But being collaborative and gentler had its evolutionary benefits too: “steady” tigers were shown to be gentler, more sincere and more loving.
Such traits may play a role in the unusual length of time—two to three years—that tiger cubs remain with their mothers.
The study found very few sex-related differences in tigers’ personalities, however, and father tigers have also been observed taking part in raising their young.
“It’s pleasant to see that you don’t have to be dominant, fierce, competitive and aggressive in order to succeed as a tiger,” said Arden.
Similar studies illuminating the personality and mental abilities of primates have helped humanize them, Arden said.
“There is evidence that it does, in fact, improve animal welfare and conservation,” she added.
Siberian tigers are endangered due to poaching and habitat loss. Only around 500 remain living in the wild.
More information: Rosalind Arden et al, Majestic tigers: personality structure in the great Amur cat, Royal Society Open Science (2023). DOI: 10.1098/rsos.220957
Osmotic energy is a renewable energy with zero emissions and minimal daily variations. However, the membranes for osmotic energy harvesting must have multiple properties that are thought to be impossible to realize to make this technology viable. Here, we show that cartilage-inspired cation-selective composite membrane assembled from aramid nanofibers and boron nitride nanosheets make it possible by a layer-by-layer assembly technology. The osmotic energy can be harvested by both salt concentration gradient and pressure-driven streaming because of the high mechanical and transport characteristics of the membranes. The combination of high strength, toughness, chemical resilience, rapid ion transport, and structural versatility of aramid-boron nitride composites makes it a promising candidate for osmotic energy harvesting under realistic operational conditions and life-cycle requirements.
Summary
Osmotic energy represents a widespread and reliable source of renewable energy with minimal daily variability. The key technological bottleneck for osmotic electricity is that membranes must combine highly efficient ion rectification and high ionic flux with long-term robustness in seawater. Here, we show that nanocomposite membranes with structural organization inspired by soft biological tissues with high mechanical and transport characteristics can address these problems. The layered membranes engineered with molecular-scale precision from aramid nanofibers and BN nanosheets simultaneously display high stiffness and tensile strength even when exposed to repeated pressure drops and salinity gradients. The total generated power density over large areas exceeded 0.6 W m−2 and was retained for as long as 20 cycles (200 h), demonstrating exceptional robustness. Furthermore, the membranes showed high performance in osmotic energy harvesting in unprecedentedly wide ranges of temperature (0°C–95°C) and pH (2.8–10.8) essential for the economic viability of osmotic energy generators.
The experiment relies on materials that can change their optical properties in fractions of a second, which could be used in new technologies or to explore fundamental questions in physics.
The original double-slit experiment, performed in 1801 by Thomas Young at the Royal Institution, showed that light acts as a wave. Further experiments, however, showed that light actually behaves as both a wave and as particles – revealing its quantum nature.
These experiments had a profound impact on quantum physics, revealing the dual particle and wave nature of not just light, but other ‘particles’ including electrons, neutrons, and whole atoms.
Now, a team led by Imperial College London physicists has performed the experiment using ‘slits’ in time rather than space. They achieved this by firing light through a material that changes its properties in femtoseconds (quadrillionths of a second), only allowing light to pass through at specific times in quick succession.
Lead researcher Professor Riccardo Sapienza, from the Department of Physics at Imperial, said: “Our experiment reveals more about the fundamental nature of light while serving as a stepping-stone to creating the ultimate materials that can minutely control light in both space and time.”
Details of the experiment are published today in Nature Physics.
[…]
The material the team used was a thin film of indium-tin-oxide, which forms most mobile phone screens. The material had its reflectance changed by lasers on ultrafast timescales, creating the ‘slits’ for light. The material responded much quicker than the team expected to the laser control, varying its reflectivity in a few femtoseconds.
The material is a metamaterial – one that is engineered to have properties not found in nature. Such fine control of light is one of the promises of metamaterials, and when coupled with spatial control, could create new technologies and even analogues for studying fundamental physics phenomena like black holes.
Co-author Professor Sir John Pendry said: “The double time slits experiment opens the door to a whole new spectroscopy capable of resolving the temporal structure of a light pulse on the scale of one period of the radiation.”
The team next want to explore the phenomenon in a ‘time crystal’, which is analogous to an atomic crystal, but where the optical properties vary in time.
Co-author Professor Stefan Maier said: “The concept of time crystals has the potential to lead to ultrafast, parallelized optical switches.”