×
Space

US Must Beat China Back To the Moon, Congress Tells NASA (space.com) 114

With NASA's Artemis moon program now targeting September 2025 for its Artemis 2 mission and September 2026 for Artemis 3, some members of Congress are concerned about the potential repercussions, particularly with China's growing ambitions in lunar exploration. "For the United States and its partners not to be on the moon when others are on the moon is unacceptable," said Mike Griffin, former NASA administrator. "We need a program that is consistent with that theme. Artemis is not that program. We need to restart it, not keep it on track." Space.com reports: The U.S. House of Representatives' Committee on Science, Space and Technology held a hearing about the new Artemis plan today (Jan. 17), and multiple members voiced concern about the slippage. "I remind my colleagues that we are not the only country interested in sending humans to the moon," Committee Chairman Frank Lucas (R-OK) said in his opening remarks. "The Chinese Communist Party is actively soliciting international partners for a lunar mission -- a lunar research station -- and has stated its ambition to have human astronauts on the surface by 2030," he added. "The country that lands first will have the ability to set a precedent for whether future lunar activities are conducted with openness and transparency, or in a more restricted manner."

The committee's ranking member, California Democrat Zoe Lofgren (D-CA), voiced similar sentiments. "Let me be clear: I support Artemis," she said in her opening remarks. "But I want it to be successful, especially with China at our heels. And we want to be helpful here in the committee in ensuring that Artemis is strong and staying on track as we look to lead the world, hand-in-hand with our partners, in the human exploration of the moon and beyond." Several other committee members stressed that the new moon race is part of a broader competition with China, and that coming in second could imperil U.S. national security.

"It's no secret that China has a goal to surpass the United States by 2045 as global leaders in space. We can't allow this to happen," Rich McCormick (R-GA) said during the hearing. "I think the leading edge that we have in space technology will protect the United States -- not just the economy, but technologies that can benefit humankind." And Bill Posey (R-FL) referred to space as the "ultimate military high ground," saying that whoever leads in the final frontier "will control the destiny of this Earth."

The Military

OpenAI Is Working With US Military on Cybersecurity Tools (bloomberg.com) 11

OpenAI is working with the Pentagon on a number of projects including cybersecurity capabilities, a departure from the startup's earlier ban on providing its artificial intelligence to militaries. From a report: The ChatGPT maker is developing tools with the US Defense Department on open-source cybersecurity software, and has had initial talks with the US government about methods to assist with preventing veteran suicide, Anna Makanju, the company's vice president of global affairs, said in an interview at Bloomberg House at the World Economic Forum in Davos on Tuesday. The company had recently removed language in its terms of service banning its AI from "military and warfare" applications. Makanju described the decision as part of a broader update of its policies to adjust to new uses of ChatGPT and its other tools.
AI

AI Girlfriend Bots Are Already Flooding OpenAI's GPT Store 72

An anonymous reader quotes a report from Quartz: It's day two of the opening of OpenAI's buzzy GPT store, which offers customized versions of ChatGPT, and users are already breaking the rules. The Generative Pre-Trained Transformers (GPTs) are meant to be created for specific purposes -- and not created at all in some cases. A search for "girlfriend" on the new GPT store will populate the site's results bar with at least eight "girlfriend" AI chatbots, including "Korean Girlfriend," "Virtual Sweetheart," "Your girlfriend Scarlett," "Your AI girlfriend, Tsu." Click on chatbot "Virtual Sweetheart," and a user will receive starting prompts like "What does your dream girl look like?" and "Share with me your darkest secret."

The AI girlfriend bots go against OpenAI's usage policy, which was updated when the GPT store launched yesterday (Jan. 10). The company bans GPTs "dedicated to fostering romantic companionship or performing regulated activities." It is not clear exactly what regulated activities entail. Notably, the company is aiming to get ahead of potential conflicts with its OpenAI store.

Relationship chatbots are, indeed, popular apps. In the US, seven of the 30 AI chatbot apps downloaded in 2023 from the Apple or Google Play store were related to AI friends, girlfriends, or companions, according to data shared with Quartz from data.ai, a mobile app analytics firm. The proliferation of these apps may stem from the epidemic of loneliness and isolation Americans are facing. Alarming studies show that one-in-two American adults have reported experiencing loneliness, with the US Surgeon General calling for the need to strengthen social connections. AI chatbots could be part of the solution if people are isolated from other human beings -- or they could just be a way to cash in on human suffering.
Further reading: OpenAI Quietly Deletes Ban On Using ChatGPT For 'Military and Warfare'
AI

OpenAI Quietly Deletes Ban On Using ChatGPT For 'Military and Warfare' 52

An anonymous reader quotes a report from The Intercept: OpenAI this week quietly deleted language expressly prohibiting the use of its technology for military purposes from its usage policy, which seeks to dictate how powerful and immensely popular tools like ChatGPT can be used. Up until January 10, OpenAI's "usage policies" page included a ban on "activity that has high risk of physical harm, including," specifically, "weapons development" and "military and warfare." That plainly worded prohibition against military applications would seemingly rule out any official, and extremely lucrative, use by the Department of Defense or any other state military. The new policy retains an injunction not to "use our service to harm yourself or others" and gives "develop or use weapons" as an example, but the blanket ban on "military and warfare" use has vanished.

The unannounced redaction is part of a major rewrite of the policy page, which the company said was intended to make the document "clearer" and "more readable," and which includes many other substantial language and formatting changes. "We aimed to create a set of universal principles that are both easy to remember and apply, especially as our tools are now globally used by everyday users who can now also build GPTs," OpenAI spokesperson Niko Felix said in an email to The Intercept. "A principle like 'Don't harm others' is broad yet easily grasped and relevant in numerous contexts. Additionally, we specifically cited weapons and injury to others as clear examples." Felix declined to say whether the vaguer "harm" ban encompassed all military use, writing, "Any use of our technology, including by the military, to '[develop] or [use] weapons, [injure] others or [destroy] property, or [engage] in unauthorized activities that violate the security of any service or system,' is disallowed."
"OpenAI is well aware of the risk and harms that may arise due to the use of their technology and services in military applications," said Heidy Khlaaf, engineering director at the cybersecurity firm Trail of Bits and an expert on machine learning and autonomous systems safety, citing a 2022 paper (PDF) she co-authored with OpenAI researchers that specifically flagged the risk of military use. "There is a distinct difference between the two policies, as the former clearly outlines that weapons development, and military and warfare is disallowed, while the latter emphasizes flexibility and compliance with the law," she said. "Developing weapons, and carrying out activities related to military and warfare is lawful to various extents. The potential implications for AI safety are significant. Given the well-known instances of bias and hallucination present within Large Language Models (LLMs), and their overall lack of accuracy, their use within military warfare can only lead to imprecise and biased operations that are likely to exacerbate harm and civilian casualties."

"I could imagine that the shift away from 'military and warfare' to 'weapons' leaves open a space for OpenAI to support operational infrastructures as long as the application doesn't directly involve weapons development narrowly defined," said Lucy Suchman, professor emerita of anthropology of science and technology at Lancaster University. "Of course, I think the idea that you can contribute to warfighting platforms while claiming not to be involved in the development or use of weapons would be disingenuous, removing the weapon from the sociotechnical system -- including command and control infrastructures -- of which it's part." Suchman, a scholar of artificial intelligence since the 1970s and member of the International Committee for Robot Arms Control, added, "It seems plausible that the new policy document evades the question of military contracting and warfighting operations by focusing specifically on weapons."
China

Qualcomm CEO Says Leading Tech Requires 'Big Business in China' (yahoo.com) 16

Restrictive US policies limiting advanced chip exports to China have done little to dampen Qualcomm's enthusiasm for the world's second-largest economy. From a report: In an interview at CES 2024 in Las Vegas, CEO Cristiano Amon expressed confidence about Qualcomm's business in the country, its largest market by revenue. "If you have a leading technology, you're going to have a big business in China," he said. The San Diego-based firm finds itself in a difficult situation, as the White House and Congress ramp up a pressure campaign to curb the sale of US chips and chipmaking tools to China, citing national security concerns. The Biden administration has argued that China's access to advanced semiconductors could aid military advancements.

Meanwhile, in China, government agencies and state-owned firms have widened their ban on Apple's iPhones for employees. Qualcomm is one of Apple's biggest suppliers. China remains the largest semiconductor market in the world, with sales in the country accounting for one-third of the global market, according to the Semiconductor Industry Association.

United States

The Next Front in the US-China Battle Over Chips (nytimes.com) 87

A U.S.-born chip technology called RISC-V has become critical to China's ambitions. Washington is debating whether and how to limit the technology. From a report: It evolved from a university computer lab in California to a foundation for myriad chips that handle computing chores. RISC-V essentially provides a kind of common language for designing processors that are found in devices like smartphones, disk drives, Wi-Fi routers and tablets. RISC-V has ignited a new debate in Washington in recent months about how far the United States can or should go as it steadily expands restrictions on exporting technology to China that could help advance its military. That's because RISC-V, which can be downloaded from the internet for free, has become a central tool for Chinese companies and government institutions hoping to match U.S. prowess in designing semiconductors.

Last month, the House Select Committee on the Chinese Communist Party -- in an effort spearheaded by Representative Mike Gallagher, Republican of Wisconsin -- recommended that an interagency government committee study potential risks of RISC-V. Congressional aides have met with members of the Biden administration about the technology, and lawmakers and their aides have discussed extending restrictions to stop U.S. citizens from aiding China on RISC-V, according to congressional staff members. The Chinese Communist Party is "already attempting to use RISC-V's design architecture to undermine our export controls," Representative Raja Krishnamoorthi of Illinois, the ranking Democrat on the House select committee, said in a statement. He added that RISC-V's participants should be focused on advancing technology and "not the geopolitical interests of the Chinese Communist Party."

Arm Holdings, a British company that sells competing chip technology, has also lobbied officials to consider restrictions on RISC-V, three people with knowledge of the situation said. Biden administration officials have concerns about China's use of RISC-V but are wary about potential complications with trying to regulate the technology, according to a person familiar with the discussions. The debate over RISC-V is complicated because the technology was patterned after open-source software, the free programs like Linux that allow any developer to view and modify the original code used to make them. Such programs have prompted multiple competitors to innovate and reduce the market power of any single vendor.

United States

FTC Bans X-Mode From Selling Phone Location Data (techcrunch.com) 10

The U.S. Federal Trade Commission has banned the data broker X-Mode Social from sharing or selling users' sensitive location data, the federal regulator said Tuesday. From a report: The first of its kind settlement prohibits X-Mode, now known as Outlogic, from sharing and selling users' sensitive information to others. The settlement will also require the data broker to delete or destroy all the location data it previously collected, along with any products produced from this data, unless the company obtains consumer consent or ensures the data has been de-identified. X-Mode buys and sells access to the location data collected from ordinary phone apps. While just one of many organizations in the multibillion-dollar data broker industry, X-Mode faced scrutiny for selling access to the commercial location data of Americans' past movements to the U.S. government and military contractors. Soon after, Apple and Google told developers to remove X-Mode from their apps or face a ban from the app stores.
Education

US News Makes Money From Some of Its Biggest Critics: Colleges 29

Jonathan Henry, a vice president at the University of Maine at Augusta, is hoping that an email will arrive this month. He is also sort of dreading it. The message, if it comes, will tell him that U.S. News & World Report has again ranked his university's online programs among the nation's best. History suggests the email will also prod the university toward paying U.S. News, through a licensing agent, thousands of dollars for the right to advertise its rankings. The New York Times: For more than a year, U.S. News has been embroiled in another caustic dispute about the worthiness of college rankings -- this time with dozens of law and medical schools vowing not to supply data to the publisher, saying that rankings sometimes unduly influence the priorities of universities. But school records and interviews show that colleges nevertheless feed the rankings industry, collectively pouring millions of dollars into it.

Many lower-profile colleges are straining to curb enrollment declines and counter shrinking budgets. And any endorsement that might attract students, administrators say, is enticing. Maine at Augusta spent $15,225 last year for the right to market U.S. News "badges" -- handsome seals with U.S. News's logo -- commemorating three honors: the 61st-ranked online bachelor's program for veterans, the 79th-ranked online bachelor's in business and the 104th-ranked online bachelor's. Mr. Henry, who oversees the school's enrollment management and marketing, said there was just too much of a risk of being outshined and out-marketed by competing schools that pay to flash their shiny badges. "If we could ignore them, wouldn't that be grand?" Mr. Henry said of U.S. News. "But you can't ignore the leviathan that they are."

Nor can colleges ignore how families evaluate schools. "The Amazonification of how we judge a product's quality," he said, has infiltrated higher education, as consumers and prospective students alike seek order from chaos. The money flows from schools large and small. The University of Nebraska at Kearney, which has about 6,000 students, bought a U.S. News "digital marketing license" for $8,500 in September. The Citadel, South Carolina's military college, moved in August to spend $50,000 for the right to use its rankings online, in print and on television, among other places. In 2022, the University of Alabama shelled out $32,525 to promote its rankings in programs like engineering and nursing. Critics believe that the payments, from schools of any size and wealth, enable and incentivize a ranking system they see as harmful.
Security

Russian Hackers Were Inside Ukraine Telecoms Giant For Months (reuters.com) 26

An anonymous reader quotes a report from Reuters: Russian hackers were inside Ukrainian telecoms giant Kyivstar's system from at least May last year in a cyberattack that should serve as a "big warning" to the West, Ukraine's cyber spy chief told Reuters. The hack, one of the most dramatic since Russia's full-scale invasion nearly two years ago, knocked out services provided by Ukraine's biggest telecoms operator for some 24 million users for days from Dec. 12. In an interview, Illia Vitiuk, head of the Security Service of Ukraine's (SBU) cybersecurity department, disclosed exclusive details about the hack, which he said caused "disastrous" destruction and aimed to land a psychological blow and gather intelligence. "This attack is a big message, a big warning, not only to Ukraine, but for the whole Western world to understand that no one is actually untouchable," he said. He noted Kyivstar was a wealthy, private company that invested a lot in cybersecurity.

The attack wiped "almost everything", including thousands of virtual servers and PCs, he said, describing it as probably the first example of a destructive cyberattack that "completely destroyed the core of a telecoms operator." During its investigation, the SBU found the hackers probably attempted to penetrate Kyivstar in March or earlier, he said in a Zoom interview on Dec. 27. "For now, we can say securely, that they were in the system at least since May 2023," he said. "I cannot say right now, since what time they had ... full access: probably at least since November." The SBU assessed the hackers would have been able to steal personal information, understand the locations of phones, intercept SMS-messages and perhaps steal Telegram accounts with the level of access they gained, he said. A Kyivstar spokesperson said the company was working closely with the SBU to investigate the attack and would take all necessary steps to eliminate future risks, adding: "No facts of leakage of personal and subscriber data have been revealed."

Investigating the attack is harder because of the wiping of Kyivstar's infrastructure. Vitiuk said he was "pretty sure" it was carried out by Sandworm, a Russian military intelligence cyberwarfare unit that has been linked to cyberattacks in Ukraine and elsewhere. A year ago, Sandworm penetrated a Ukrainian telecoms operator, but was detected by Kyiv because the SBU had itself been inside Russian systems, Vitiuk said, declining to identify the company. The earlier hack has not been previously reported. Vitiuk said SBU investigators were still working to establish how Kyivstar was penetrated or what type of trojan horse malware could have been used to break in, adding that it could have been phishing, someone helping on the inside or something else. If it was an inside job, the insider who helped the hackers did not have a high level of clearance in the company, as the hackers made use of malware used to steal hashes of passwords, he said. Samples of that malware have been recovered and are being analysed, he added.

United States

Top China Diplomat Warns of Decoupling Risk (bloomberg.com) 63

China's top diplomat warned the US that decoupling would be "self defeating" as the country set out to implement a recent agreement made between their leaders. From a report: Foreign Minister Wang Yi, speaking on Friday at an event to mark the 45th anniversary of US-China diplomatic relations, cited a slew of initiatives that reflect improved ties including streamlined visas for US travelers, a counternarcotics working group to battle the flow of the synthetic fentanyl to the US, and the sending of pandas to the US by the end of the year. "Any decoupling attempt to stem the tide will only be counterproductive and self defeating," Wang said.

David Meale, deputy chief of mission at the U.S. Embassy in Beijing, joined Friday's event as charge d'affaires with Ambassador Nicholas Burns out of town. Tensions between China and the US started to ease after President Joe Biden and Chinese leader Xi Jinping met in November. The talks resulted in a resumption of high-level military-to-military ties, a promise to collaborate on the fentanyl problem and a commitment to boost interactions between people in the two countries.

United States

New Spin on a Revolving Door: Pentagon Officials Turned Venture Capitalists (nytimes.com) 25

Retired officers and departing defense officials are flocking to investment firms that are pushing the government to provide more money to defense-technology startups. The New York Times: When Defense Secretary Lloyd J. Austin III and other top officials assembled for an event this month at the Ronald Reagan Presidential Library, they walked into a lesson in how the high-stakes world of Pentagon lobbying is being altered by the rise of defense technology startups. Inside, at this elite gathering near Los Angeles of senior leaders from government and the arms industry, was a rapidly growing group of participants: former Pentagon officials and military officers who have joined venture capital firms and are trying to use their connections in Washington to cash in on the potential to sell a new generation of weapons.

They represent a new path through the revolving door that has always connected the Defense Department and the military contracting business. Retiring generals and departing top Pentagon officials once migrated regularly to the big established weapons makers like Lockheed Martin and Boeing. Now they are increasingly flocking to venture capital firms that have collectively pumped billions of dollars into Silicon Valley-style startups offering the Pentagon new war-fighting tools like autonomous killer drones, hypersonic jets and space surveillance equipment.

This new route to the private sector is one indicator of the ways in which the United States is trying to become more agile in harnessing technological advances to maintain military superiority over China and other rivals. But the close ties between venture capital firms and Defense Department decision makers have also put a new twist on long-running questions about industry access and influence at a time when the Pentagon is under pressure to rethink how it allocates its huge procurement budget.

China

That Chinese Spy Balloon Used an American ISP to Communicate, Say US Officials (nbcnews.com) 74

NBC News reports that the Chinese spy balloon that flew across the U.S. in February "used an American internet service provider to communicate, according to two current and one former U.S. official familiar with the assessment."

it used the American ISP connection "to send and receive communications from China, primarily related to its navigation." Officials familiar with the assessment said it found that the connection allowed the balloon to send burst transmissions, or high-bandwidth collections of data over short periods of time.

The Biden administration sought a highly secretive court order from the federal Foreign Intelligence Surveillance Court to collect intelligence about it while it was over the U.S., according to multiple current and former U.S. officials. How the court ruled has not been disclosed. Such a court order would have allowed U.S. intelligence agencies to conduct electronic surveillance on the balloon as it flew over the U.S. and as it sent and received messages to and from China, the officials said, including communications sent via the American internet service provider...

The previously unreported U.S. effort to monitor the balloon's communications could be one reason Biden administration officials have insisted that they got more intelligence out of the device than it got as it flew over the U.S. Senior administration officials have said the U.S. was able to protect sensitive sites on the ground because they closely tracked the balloon's projected flight path. The U.S. military moved or obscured sensitive equipment so the balloon could not collect images or video while it was overhead.

NBC News is not naming the internet service provider, but says it denied that the Chinese balloon had used its network, "a determination it said was based on its own investigation and discussions it had with U.S. officials." The balloon contained "multiple antennas, including an array most likely able to collect and geolocate communications," according to reports from a U.S. State Depratment official cited by NBC News in February. "It was also powered by enormous solar panels that generated enough power to operate intelligence collection sensors, the official said.

Reached for comment this week, a spokesperson for the Chinese Embassy in Washington told NBC News that the balloon was just a weather balloon that had accidentally drifted into American airspace.
Science

Novel Helmet Liner 30 Times Better At Stopping Concussions (newatlas.com) 50

An anonymous reader quotes a report from New Atlas: Researchers have developed a new, lightweight foam made from carbon nanotubes that, when used as a helmet liner, absorbed the kinetic energy caused by an impact almost 30 times better than liners currently used in US military helmets. The foam could prevent or significantly reduce the likelihood of concussion in military personnel and sportspeople. Among sportspeople and military vets, traumatic brain injury (TBI) is one of the major causes of permanent disability and death. Injury statistics show that the majority of TBIs, of which concussion is a subtype, are associated with oblique impacts, which subject the brain to a combination of linear and rotational kinetic energy forces and cause shearing of the delicate brain tissue.

To improve their effectiveness, helmets worn by military personnel and sportspeople must employ a liner material that limits both. This is where researchers from the University of Wisconsin-Madison come in. Determined to prevent -- or lessen the effect of -- TBIs caused by knocks to the body and head, they've developed a new lightweight foam material for use as a helmet liner. For the current study, Thevamaran built upon his previous research into vertically aligned carbon nanotube (VACNT) foams -- carefully arranged layers of carbon cylinders one atom thick -- and their exceptional shock-absorbing capabilities. Current helmets attempt to reduce rotational motion by allowing a sliding motion between the wearer's head and the helmet during impact. However, the researchers say this movement doesn't dissipate energy in shear and can jam when severely compressed following a blow. Instead, their novel foam doesn't rely on sliding layers.

VACNT foam sidesteps this shortcoming via its unique deformation mechanism. Under compression, the VACNTs undergo collective sequentially progressive buckling, from increased compliance at low shear strain levels to a stiffening response at high strain levels. The formed compression buckles unfold completely, enabling the VACNT foam to accommodate large shear strains before returning to a near initial state when the load is removed. The researchers found that at 25% precompression, the foam exhibited almost 30 times higher energy dissipation in shear -- up to 50% shear strain -- than polyurethane-based elastomeric foams of similar density.
The study has been published in the journal Experimental Mechanics.
Space

SpaceX Wows With a Double Header of Final 2023 Rocket Launches (space.com) 43

SpaceX on Thursday launched two rockets into orbit, only three hours apart, bringing its total number of launches to 98 in 2023. Space.com reports: The first SpaceX mission to take to the skies Thursday (Dec. 28) was a Falcon Heavy rocket carrying the U.S. military's secretive X-37B space plane, designed mission USSF-52. That blasted off from NASA's Kennedy Space Center in Florida at 8:07 p.m. EST (0107 GMT on Dec. 29). This marked the second Falcon Heavy flight of 2023. Second up on the launch docket for Thursday, hours later, was a Falcon 9 liftoff carrying 23 SpaceX Starlink units to low Earth orbit from nearby Cape Canaveral Space Force Station. This launch took place at 11:01 p.m. EST (0401 GMT on Dec. 29). This was SpaceX's 98th and final launch of 2023, and the 96th flight for a Falcon 9 rocket this year.

SpaceX's 97th launch overall for this year marked the seventh flight for X-37B, but the first time the space plane hitched a lift atop a Falcon Heavy rocket. The X-37B/Falcon Heavy launch had been scrubbed several times previously due to bad weather and an issue with ground equipment. The launch of 23 Starlink broadband satellites from Space Launch Complex 40 (SLC-40) at Cape Canaveral Space Force Station in Florida that capped off 2023 was also the 96th launch of a Falcon 9 rocket during this year. SpaceX's next launch is targeted for Jan. 2, 2024 and will see a further 21 Starlink satellites lift to orbit to join the over 5,500 internet supplying units currently orbiting Earth.

United States

US Water Utilities Hacked After Default Passwords Set to '1111', Cybersecurity Officials Say (fastcompany.com) 84

An anonymous reader shared this report from Fast Company: Providers of critical infrastructure in the United States are doing a sloppy job of defending against cyber intrusions, the National Security Council tells Fast Company, pointing to recent Iran-linked attacks on U.S. water utilities that exploited basic security lapses [earlier this month]. The security council tells Fast Company it's also aware of recent intrusions by hackers linked to China's military at American infrastructure entities that include water and energy utilities in multiple states.

Neither the Iran-linked or China-linked attacks affected critical systems or caused disruptions, according to reports.

"We're seeing companies and critical services facing increased cyber threats from malicious criminals and countries," Anne Neuberger, the deputy national security advisor for cyber and emerging tech, tells Fast Company. The White House had been urging infrastructure providers to upgrade their cyber defenses before these recent hacks, but "clearly, by the most recent success of the criminal cyberattacks, more work needs to be done," she says... The attacks hit at least 11 different entities using Unitronics devices across the United States, which included six local water facilities, a pharmacy, an aquatics center, and a brewery...

Some of the compromised devices had been connected to the open internet with a default password of "1111," federal authorities say, making it easy for hackers to find them and gain access. Fixing that "doesn't cost any money," Neuberger says, "and those are the kinds of basic things that we really want companies urgently to do." But cybersecurity experts say these attacks point to a larger issue: the general vulnerability of the technology that powers physical infrastructure. Much of the hardware was developed before the internet and, though they were retrofitted with digital capabilities, still "have insufficient security controls," says Gary Perkins, chief information security officer at cybersecurity firm CISO Global. Additionally, many infrastructure facilities prioritize "operational ease of use rather than security," since many vendors often need to access the same equipment, says Andy Thompson, an offensive cybersecurity expert at CyberArk. But that can make the systems equally easy for attackers to exploit: freely available web tools allow anyone to generate lists of hardware connected to the public internet, like the Unitronics devices used by water companies.

"Not making critical infrastructure easily accessible via the internet should be standard practice," Thompson says.

Encryption

The Race to Shield Secrets from Quantum Computers (reuters.com) 67

An anonymous reader shared this report from Reuters: In February, a Canadian cybersecurity firm delivered an ominous forecast to the U.S. Department of Defense. America's secrets — actually, everybody's secrets — are now at risk of exposure, warned the team from Quantum Defen5e (QD5). QD5's executive vice president, Tilo Kunz, told officials from the Defense Information Systems Agency that possibly as soon as 2025, the world would arrive at what has been dubbed "Q-day," the day when quantum computers make current encryption methods useless. Machines vastly more powerful than today's fastest supercomputers would be capable of cracking the codes that protect virtually all modern communication, he told the agency, which is tasked with safeguarding the U.S. military's communications.

In the meantime, Kunz told the panel, a global effort to plunder data is underway so that intercepted messages can be decoded after Q-day in what he described as "harvest now, decrypt later" attacks, according to a recording of the session the agency later made public. Militaries would see their long-term plans and intelligence gathering exposed to enemies. Businesses could have their intellectual property swiped. People's health records would be laid bare... One challenge for the keepers of digital secrets is that whenever Q-day comes, quantum codebreakers are unlikely to announce their breakthrough. Instead, they're likely to keep quiet, so they can exploit the advantage as long as possible.

The article adds that "a scramble is on to protect critical data. Washington and its allies are working on new encryption standards known as post-quantum cryptography... Beijing is trying to pioneer quantum communications networks, a technology theoretically impossible to hack, according to researchers...

"In a quantum communications network, users exchange a secret key or code on subatomic particles called photons, allowing them to encrypt and decrypt data. This is called quantum key distribution, or QKD."
Space

Orbit Fab Wants to Create 'Gas Stations' in Space for Satellites (cnn.com) 53

Of the 15,000 satellites humans have sent into space, "just over half are still functioning," reports CNN. "The rest, after running out of fuel and ending their serviceable life, have either burned up in the atmosphere or are still orbiting the planet as useless hunks of metal" — scattering "an aura of space junk around the planet."

"One way to start tackling the problem would be to stop producing more junk — by refueling satellites rather than decommissioning them once they run out of power." "Right now you can't refuel a satellite on orbit," says Daniel Faber, CEO of Orbit Fab. But his Colorado-based company wants to change that... "The lack of fuel creates a whole paradigm where people design their spacecraft missions around moving as little as possible. That means that we can't have tow trucks in orbit to get rid of any debris that happens to be left. We can't have repairs and maintenance, we can't upgrade anything. We can't inspect anything if it breaks. There are so many things we can't do and we operate in a very constrained way. That's the solution we're trying to deliver...."

Orbit Fab has no plans to address the existing fleet of satellites. Instead, it wants to focus on those that have yet to launch, and equip them with a standardized port — called RAFTI, for Rapid Attachable Fluid Transfer Interface — which would dramatically simplify the refueling operation, keeping the price tag down. "What we're looking at doing is creating a low-cost architecture," says Faber. "There's no commercially available fuel port for refueling a satellite in orbit yet. For all the big aspirations we have about a bustling space economy, really, what we're working on is the gas cap — we are a gas cap company." Orbit Fab, which advertises itself with the tagline "gas stations in space," is working on a system that includes the fuel port, refueling shuttles — which would deliver the fuel to a satellite in need — and refueling tankers, or orbital gas stations, which the shuttles could pick up the fuel from. It has advertised a price of $20 million for on-orbit delivery of hydrazine, the most common satellite propellant.

In 2018, the company launched two testbeds to the International Space Station to test the interfaces, the pumps and the plumbing. In 2021 it launched Tanker-001 Tenzing, a fuel depot demonstrator that informed the design of the current hardware. The next launch is now scheduled for 2024. "We are delivering fuel in geostationary orbit for a mission that is being undertaken by the Air Force Research Lab," says Faber. "At the moment, they're treating it as a demonstration, but it's getting a lot of interest from across the US government, from people that realize the value of refueling." Orbit Fab's first private customer will be Astroscale, a Japanese satellite servicing company that has developed the first satellite designed for refueling. Called LEXI, it will mount RAFTI ports and is currently scheduled to launch in 2026.

According to Simone D'Amico, an associate professor of astronautics at Stanford University, who's not affiliated with Orbit Fab, on-orbit servicing is one of the keys to ensuring a safe and sustainable development of space... "The development of space infrastructure and the proliferation of space assets is reaching a critical volume that is not sustainable anymore without a change of paradigm."

"In 10 or 15 years, we'd like to be building refineries in orbit," CEO Faber tells CNN, "processing material that is launched from the ground into a range of chemicals that people want to buy: air and water for commercial space stations, 3D printer feedstock minerals to grow plants. We want to be the industrial chemical supplier to the emerging commercial space industry."
Graphics

Vera Molnar, Pioneer of Computer Art, Dies At 99 (nytimes.com) 16

Alex Williams reports via The New York Times: Vera Molnar, a Hungarian-born artist who has been called the godmother of generative art for her pioneering digital work, which started with the hulking computers of the 1960s and evolved through the current age of NFTs, died on Dec. 7 in Paris. She was 99. Her death was announced on social media by the Pompidou Center in Paris, which is scheduled to present a major exhibition of her work in February. Ms. Molnar had lived in Paris since 1947. While her computer-aided paintings and drawings, which drew inspiration from geometric works by Piet Mondrian and Paul Klee, were eventually exhibited in major museums like the Museum of Modern Art in New York and the Los Angeles County Museum of Art, her work was not always embraced early in her career.

Ms. Molnar in fact began to employ the principles of computation in her work years before she gained access to an actual computer. In 1959, she began implementing a concept she called "Machine Imaginaire" -- imaginary machine. This analog approach involved using simple algorithms to guide the placement of lines and shapes for works that she produced by hand, on grid paper. She took her first step into the silicon age in 1968, when she got access to a computer at a university research laboratory in Paris. In the days when computers were generally reserved for scientific or military applications, it took a combination of gumption and '60s idealism for an artist to attempt to gain access to a machine that was "very complicated and expensive," she once said, adding, "They were selling calculation time in seconds." [...]

Making art on Apollo-era computers was anything but intuitive. Ms. Molnar had to learn early computer languages like Basic and Fortran and enter her data with punch cards, and she had to wait several days for the results, which were transferred to paper with a plotter printer. One early series, "Interruptions," involved a vast sea of tiny lines on a white background. As ARTNews noted in a recent obituary: "She would set up a series of straight lines, then rotate some, causing her rigorous set of marks to be thrown out of alignment. Then, to inject further chaos, she would randomly erase certain portions, resulting in blank areas amid a sea of lines." Another series, "(Des)Ordres" (1974), involved seemingly orderly patterns of concentric squares, which she tweaked to make them appear slightly disordered, as if they were vibrating.

Over the years, Ms. Molnar continued to explore the tensions between machine-like perfection and the chaos of life itself, as with her 1976 plotter drawing "1% of Disorder," another deconstructed pattern of concentric squares. "I love order, but I can't stand it," she told Mr. Obrist. "I make mistakes, I stutter, I mix up my words." And so, she concluded, "chaos, perhaps, came from this." [...] Her career continued to expand in scope in the 1970s. She began using computers with screens, which allowed her to instantly assess the results of her codes and adjust accordingly. With screens, it was "like a conversation, like a real pictorial process," she said in a recent interview with the generative art creator and entrepreneur Erick Calderon. "You move the 'brush' and you see immediately if it suits you or not." [...] Earlier this year, she cemented her legacy in the world of blockchain with "Themes and Variations," a generative art series of more than 500 works using NFT technology that was created in collaboration with the artist and designer Martin Grasser and sold through Sotheby's. The series fetched $1.2 million in sales.

United States

US Expects To Make Multi-Billion Chips Awards Within the Next Year (reuters.com) 13

David Shepardson reports via Reuters: U.S. Commerce Secretary Gina Raimondo said she expects to make around a dozen semiconductor chips funding awards within the next year, including multi-billion dollar announcements that could drastically reshape U.S. chip production. She announced the first award on Monday -- $35 million to a BAE Systems facility in Hampshire to produce chips for fighter planes from the "Chips for America" semiconductor manufacturing and research subsidy program approved by Congress in August 2022.

"Next year we'll get into some of the bigger ones with leading-edge fabs," Raimondo told reporters. "A year from now I think we will have made 10 or 12 similar announcements, some of them multi-billion dollar announcements." In an interview with Reuters, Raimondo said that the number of awards could go higher than 12. She said she wants the percentage of semiconductors produced in the United States to rise from about 12% to closer to 20% -- though that is still down from 40% in 1990 -- and to have at least two "leading-edge" U.S. manufacturing clusters. In addition, she wants the U.S. to have cutting-edge memory and packaging production and to "meet the military's needs for current and mature" chips. Raimondo noted that the U.S. currently does not have any cutting-edge manufacturing production and wants to get that to about 10%.

The Military

Ukraine's Top Mobile Operator Hit By Biggest Cyber Attack of War So Far (reuters.com) 20

According to Reuters, Ukraine's biggest mobile network was hit by "what appeared to be the largest cyber attack of the war with Russia so far," severing mobile and internet services for millions of people and knocking out the air raid alert system in parts of Kyiv. From the report: Kyivstar has 24.3 million mobile subscribers - more than half of Ukraine's population - as well as over 1.1 million home internet subscribers. Its CEO Oleksandr Komarov said the attack was "a result of" the war with Russia, although he did not say which Russian body he believed to be responsible, and that the company's IT infrastructure had been "partially destroyed." "(The attack) significantly damaged (our) infrastructure, limited access, we could not counter it at the virtual level, so we shut down Kyivstar physically to limit the enemy's access," Komarov said.

A source close to Ukraine's cyber defense also said that Russia was suspected to be the source of the attack, but no specific group had been identified. "It's definitely a state actor," said the source, who asked not to be identified because of the delicacy of the issue, adding that data cable interception showed "a lot of Russian controlled traffic directed at these networks." "There's no ransom. It's all destruction. So it's not a financially motivated attack," said the source. Ukrainian officials said that air raid alert systems in more than 75 settlements in the central Kyiv region were affected by the cyber attack.

Komarov said two databases containing customer data had been damaged and were currently locked. "The most important thing is that the personal data of users has not been compromised," Kyivstar said in its statement, promising to compensate customers for loss of access to services.
Meanwhile, Ukraine's defense intelligence director (GUR) said it infected thousands of servers belonging to Russia's state tax service with malware, and destroyed databases and backups. "According to GUR's statement published Tuesday, the attack led to the 'complete destruction' of the agency's infrastructure," reports The Record. "GUR claimed they destroyed configuration files 'which for years ensured the functioning of Russia's tax system.'"

Slashdot Top Deals