What Jupiter’s spot is not, is tranquil. New infrared images taken by Boston University scientists on a NASA telescope in Hawaii show that whereas Jupiter’s north and south poles are heated by strong magnetic fields, its large, stormy red spot generates its own heat by a different mechanism. Shock waves from turbulent winds in the spot and other storms help explain how the planet’s upper atmosphere stays warm so far from the sun. Read the rest of this entry »
Next-generation cruise missiles equipped with artificial intelligence and capable of being tailored for specific combat scenarios, are set to debut in China.
Ryan Pickerel reports: Future conflicts will demand cost-effective and versatile weaponry, such as modular cruise missiles outfitted with artificial intelligence, Wang Changqing told the China Daily, at the 2016 Hiwing Forum in Beijing.
“We plan to adopt a ‘plug and play’ approach in the development of new cruise missiles, which will enable our military commanders to tailor-make missiles in accordance with combat conditions and their specific requirements.”
Changqing is the director of the General Design Department of the Third Academy of the China Aerospace Science and Industry Corp.
“Moreover, our future cruise missiles will have a very high level of artificial intelligence and automation.”
— Wang Changqing
“We plan to adopt a ‘plug and play’ approach in the development of new cruise missiles, which will enable our military commanders to tailor-make missiles in accordance with combat conditions and their specific requirements,” explained Changqing. “Moreover, our future cruise missiles will have a very high level of artificial intelligence and automation.”. Changqing indicated that China is already a global leader in artificial intelligence.
The new cruise missiles will “allow commanders to control them in a real-time manner, or to use a fire-and-forget mode, or to add more tasks to in-flight missiles,” Changqing said.
A modular missile is well-suited for future combat. The “destructive capacity, flight mode, and range” of the missiles can be easily adjusted to counter threats on the ground and at sea, Wang Ya’nan, editor-in-chief of Aerospace Knowledge Magazine, informed China Daily. Read the rest of this entry »
Scientists hope to learn whether arachnophobes’ perception of spiders as larger than actual size causes their fear—or whether it is the fearfulness itself that causes their visual misperception.
The Japanese robotics manufacturer Kawasaki has created a bot that can prepare nigiri sushi in under a minute.
As robots get more advanced, they will likely take over many jobs in the future — including those of sushi chefs.
For a sneak peak at this impending automation, look no further than a new creation from robotics manufacturer Kawasaki. The robot can make sushi in under a minute.
First spotted by Gizmodo, the video shows a miraculous bot that assembles nigiri, the traditional type of sushi in which a piece of raw fish sits on a little ball of rice.
Western intelligence bosses recently have become open about stating what they’ve known for years, that Snowden is a Kremlin pawn designed to inflict pain on Russia’s adversaries in the SpyWar.
John R. Schindler writes: The National Security Agency can’t catch a break. Over three years ago, Edward Snowden, an IT contractor for the agency, defected to Moscow with more than a million classified documents. Since then, Snowden’s vast trove has been used to embarrass NSA about the extent of its global espionage reach.
“Significant questions loom over this new scandal. In the first place, what really is The Shadow Brokers? They appear to be a transparent front for Russian intelligence. Indeed, they’re not really hiding that fact, given the broken English they used in their online auction notice asking for bitcoin in exchange for NSA information.”
I’ve been warning from Day One that the Snowden Operation was a Russian propaganda ploy aimed at inflicting pain on NSA, America’s most important spy agency, and its global alliance of espionage partnerships that’s been the backbone of the powerful Western intelligence system since it helped defeat the Nazis and Japan in World War II.
“From his Russian exile, even Snowden admitted on Twitter that this was pretty obviously a Kremlin spy game.”
Western intelligence bosses recently have become open about stating what they’ve known for years, that Snowden is a Kremlin pawn designed to inflict pain on Russia’s adversaries in the SpyWar. There’s no doubt that’s the case, especially since the Kremlin now has admitted that Snowden is their agent.
For more than three years NSA has been subjected to an unprecedented stream of leaks about myriad Top Secret intelligence programs. Although Snowden claimed his motivation was to protect the civil liberties of fellow Americans by exposing secrets, it’s impossible to miss that well over 95 percent of the programs he’s compromised are purely involved with foreign intelligence. The impact of all this on agency morale has been devastating and NSA is in a state of crisis thanks to Snowden.
This week things took a marked turn for the worse, however, with the exposure of highly sensitive NSA hacking tools on the Internet by a murky group calling itself “The Shadow Brokers” which announced it planned to sell programs purloined from the agency. Like clockwork, NSA’s public website crashed and stayed down for almost a full day. Although there’s no indication this was linked to The Shadow Brokers, the optics for NSA were terrible.
First, some explanation is needed of what’s been compromised. The crown jewel here is a 300-megabyte file containing “exploits”—that is, specialized sophisticated cyber tools designed to burrow through firewalls to steal data. What The Shadow Brokers has, which it claims it stole from an alleged NSA front organization termed the Equation Group, appears to be legitimate.
Here we are, three years after Snowden, dealing with the consequences of allowing Russian moles to run amok inside NSA.
These exploits—or at least some of them—appear to come from NSA’s elite office of Tailored Access Operations, which is the agency’s hacking group. Arguably the world’s most proficient cyber-warriors, the shadowy TAO excels at gaining access to the computer systems of foreign adversaries. TAO veterans have confirmed that, from what they’ve seen of what The Shadow Brokers has revealed, they’re bona fide NSA exploits.
This represents a security disaster for an agency that really didn’t need another one. How this happened, given the enormous security that’s placed on all NSA Top Secret computer systems, raises troubling questions about what’s going on, since the agency instituted much more strenuous online security after Snowden’s defection, which revealed how slipshod NSA counterintelligence really was.
However, significant questions loom over this new scandal. In the first place, what really is The Shadow Brokers? They appear to be a transparent front for Russian intelligence. Indeed, they’re not really hiding that fact, given the broken English they used in their online auction notice asking for bitcoin in exchange for NSA information. From his Russian exile, even Snowden admitted on Twitter that this was pretty obviously a Kremlin spy game.
Pro-Russian sources have pointed to the Equation Group as an NSA front for more than a year. In early 2015, Kaspersky Labs, one of the world’s leading cybersecurity firms, announced the discovery of the Equation Group and fingers were quickly pointed at NSA as being the culprit behind those hackers. It should be noted that Kaspersky Labs has a very cozy relationship with the Kremlin and is viewed by most espionage experts in the West as an extended arm of Russian intelligence. The firm’s founder, Eugene Kaspersky, was trained in codes and ciphers by the KGB in the waning days of the Soviet Union, even meeting his first wife at a KGB resort. Read the rest of this entry »
Strings of code were released to the Internet by a group calling themselves ‘the Shadow Brokers’. They claim the code is a tool that can be used to hack into any computer.
The cache mysteriously surfaced over the weekend and appears to be legitimate.
Ellen Nakashima reports: Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff. Much of this code should never leave the NSA.”
— Nicholas Weaver, a computer security researcher at the University of California at Berkeley
A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.
The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).
“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Said a second former TAO hacker who saw the file: “From what I saw, there was no doubt in my mind that it was legitimate.”
“Without a doubt, they’re the keys to the kingdom. The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Strings of code were released to the Internet by a group calling themselves “the Shadow Brokers”. They claim the code is a tool that can be used to hack into any computer.
The file contained 300 megabytes of information, including several “exploits,” or tools for taking control of firewalls in order to control a network, and a number of implants that might, for instance, exfiltrate or modify information.
The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said Blake Darche, another former TAO operator and now head of security research at Area 1 Security.
The software apparently dates back to 2013 and appears to have been taken then, experts said, citing file creation dates, among other things.
“The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox.”
“What’s clear is that these are highly sophisticated and authentic hacking tools,” said Oren Falkowitz, chief executive of Area 1 Security and another former TAO employee.
Several of the exploits were pieces of computer code that took advantage of “zero-day” or previously unknown flaws or vulnerabilities in firewalls, which appear to be unfixed to this day, said one of the former hackers.
The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.
“The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.”
The NSA did not respond to requests for comment.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview. “Much of this code should never leave the NSA.”
The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox. Read the rest of this entry »
New camera views of past launches and reentries.Missions in order of appearance: May JCSAT-14; July CRS-9 launch, stage separation, engine plume interaction, and re-entry burn; December 2015 ORBCOMM landing burn; July CRS-9 landing burn.
Jennings Brown reports: A recent glimpse at the future of robotic warfare proves tank robots aren’t ready for the battlefield just yet—but soldiers are enthusiastic about tiny drones that can be mistaken for birds.
“We need to be making sure we’re fielding new technology as quickly as we can. It doesn’t do any good if we’re just investing in great technology if we don’t actually get it into the field for soldiers.”
— Secretary of the Army Eric Fanning
Unites States soldiers based in Hawaii spent half of last month testing out cutting-edge robotic prototypes in exercises as a part of Pacific Manned-Unmanned Initiative (PACMAN-I). Members of the 25th Infantry Division controlled air and land drones to determine what technology could actually benefit soldiers. It was the third time in history human that soldiers have collaborated with robot counterparts in a simulated war zone.
Secretary of the Army Eric Fanning visited the exercise on July 26, a sign of the interest the Army is taking in the battlefield applications of unmanned vehicles. “We need to be making sure we’re fielding new technology as quickly as we can,” Fanning said, in a statement. “It doesn’t do any good if we’re just investing in great technology if we don’t actually get it into the field for soldiers.” Read the rest of this entry »
The Google Transparency Project, the work of Campaign for Accountability, poured over reams of data to find 258 instances of ‘revolving door activity’ between Google or its associated companies and the federal government, national political campaigns and Congress since 2009.
The Google Transparency Project, the work of Campaign for Accountability, poured over reams of data to find 258 instances of “revolving door activity” between Google or its associated companies and the federal government, national political campaigns and Congress since 2009.
Much of that revolving door activity took place at 1600 Pennsylvania Avenue, where 22 former White House officials went to work for Google and 31 executives from Google and related firms went to work at the White House or were appointed to federal advisory boards by Obama. Those boards include the President’s Council on Science and Technology and the President’s Council on Jobs and Competitiveness.
Regulation watchdogs may be just as keen about the moves between Google and the Federal Communications Commission and Federal Trade Commission. Those government bodies regulate many of the programs that are at the heart of Google’s business, and there have been at least 15 moves between Google and its lobbying firms and those commissions.
The research also shows that 25 officials in national security, intelligence or the Department of Defense joined Google, and three Google executives went to work for the DOD.
Eighteen former State Department officials became Google employees, and five Google staffers became employed at the State Department.
Friends in high places
Former Google employees occupy several key slots in the federal government. These include:
- Megan Smith, vice president new business development at Google 2003-12, vice president of Google 2012-14, chief technology officer at the Office of Science and Technology Policy 2014-present.
- Alexander Macgillivray, deputy general counsel at Google 2003-09, general counsel at Twitter 2009-13, deputy chief technology officer at OSTP 2014-present.
- Nicole Wong, vice president and deputy general counsel at Google from 2004-11 and deputy chief technology officer at OSTP 2013-14.
- Jannine Versi, product marketing manager in Middle East and North Africa for Google 2010-2012, White House National Economic Council 2013-14, chief of staff International Trade Administration at U.S. Department of Commerce 2014-present.
- Michelle Lee, deputy general counsel at Google 2003-12, under secretary of commerce for intellectual property and director of the U.S. Patent and Trademark Office 2012-present.
- Mikey Dickerson, site reliability manager at Google 2006-13, administrator U.S. Digital Service 2014-present. Dickerson also assisted with election day monitoring and modeling with Obama’s 2012 re-election campaign and helped repair the broken HealthCare.gov website.
At least 18 former Google employees work or have worked for the U.S. Digital Serviceand its General Services Administration sidekick, 18F. USDS operates under the Executive Office of the President, consulting on big federal information technology projects.
The door revolves
Scott Amey, general counsel for the Project on Government Oversight, a nonpartisan group that exposes abuses of power in government, said it’s hard to know for sure how more than 250 people moving between Google and the federal government since 2009 compares to other corporations, but “it sounds like it’s a very significant number.”
“It’s very hard to get information about the quantity of people who go in and out of government service,” Amey told Watchdog.org.
Google didn’t return an email seeking comment for this story.
Analysts at Google Transparency Project compiled the revolving-door data by using public information that includes lobby disclosure records, news stories, LinkedIn profiles and reports from Open Secrets. Campaign for Accountability notes the analysis is “an evolving representation of the scale of the revolving-door relationship between Google and government” rather than a comprehensive tally.
In other words, the total could be higher.
SCHMIDT: The Google chief executive
SCHMIDT: The Google executive chairman’s company Civis Analytics was a key ally of Obama during his re-election campaign.
The project’s analysis included affiliates of Google, such as YouTube, as well as key law firms and lobbyists.
It also includes Civis Analytics, whose sole investor is Eric Schmidt, executive chairman of Google parent company Alphabet Inc.
At least 27 people who worked on Obama’s 2012 presidential re-election campaign went to work for Civis Analytics after the election. Google Transparency Project said “those employees are then deployed by the White House to work on President Obama’s top policy priorities.”
Those policies include federal technology acquisition reform, national security matters and health care reform – Civis Analytics employees worked with Google engineers to fix the broken HealthCare.gov website in 2013, Campaign for Accountability reports. Read the rest of this entry »
The rocket is carried to the firing area and raised to a vertical position. Reel 2, final checks are made and the rocket is fired. Its course is followed by radar. Parts are recovered after the rocket has crashed.
PYONGYANG, North Korea (AP) — North Korean space officials are hard at work on a five-year plan to put more advanced satellites into orbit by 2020, and don’t intend to stop there: They’re also aiming for the moon, and beyond.
“Even though the U.S. and its allies try to block our space development, our aerospace scientists will conquer space and definitely plant the flag of the DPRK on the moon.”
— Hyon Kwang Il, director of the scientific research department of North Korea’s National Aerospace Development Administration
In an interview with The Associated Press, a senior official at North Korea’s version of NASA said international sanctions won’t stop the country from launching more satellites by 2020, and that he hopes to see the North Korean flag on the moon within the next 10 years.
“Even though the U.S. and its allies try to block our space development, our aerospace scientists will conquer space and definitely plant the flag of the DPRK on the moon,” said Hyon Kwang Il, director of the scientific research department of North Korea’s National Aerospace Development Administration.
North Korea’s official name is the Democratic People’s Republic of Korea.
An unmanned, no-frills North Korean moon mission in the not-too-distant future isn’t as far-fetched as it might seem. Outside experts say it’s ambitious, but conceivable. While the U.S. is the only country to have conducted manned lunar missions, other nations have sent unmanned spacecraft there and have in that sense planted their flags.
“It would be a significant increase in technology, not one that is beyond them, but you have to debug each bit,” Jonathan McDowell, an astrophysicist at the Harvard-Smithsonian Center for Astrophysics who maintains an exhaustive blog on international satellites and satellite launches, said in an email to the AP. Read the rest of this entry »
A TV documentary set to premier today (July 20) will tell the incredible story of the first moon landing, which took place 47 years ago today.
The documentary, called “Go: The Great Race,” will air four times today on the Decades TV Network, as a special episode of the show “Through the Decades.” A trailer for the documentary leads off with footage from President John F. Kennedy delivering his famous 1961 speech that called for the U.S. to put a man on the moon and return him safely by the end of the decade.
“He had no reason to believe that we could even come close to doing something like that,” says one of the documentary’s interviewees (supposedly someone who worked on the Apollo, referring to Kennedy’s challenge. Read the rest of this entry »