Wireless Networking

Linux Foundation Announces Collaboration for 'Open Radio Access Network' Prototypes (linuxfoundation.org) 20

This week the Linux Foundation and the National Spectrum Consortium "announced formal collaboration" on developing software prototypes and demonstrations for Open RAN (open radio access network):

The two organizations have signed a Memorandum of Understanding to solidify their working relationship and commitment to minimizing barriers to further R&D necessary for OpenRAN acceleration within the United States.

More open and flexible wireless networks ultimately increase vendor diversity and competition, prevent vendor lock-in, increase innovation in wireless networking technology, lower deployment and operational costs, and even increase security and energy efficiency. "We are eager to work with the NSC in creating a stable, open, secure reference stack for Open RAN," said Arpit Joshipura, general manager, Networking, Edge & IoT, the Linux Foundation. "By combining resources, we'll accelerate access to Open RAN and wireless technology across the United States across verticals and into government, academia, and small business."

The collaborations goals include:
  • Establish an open source reference software architecture for Open RAN that will kickstart academic and commercial R&D by lowering the cost and complexity of entry
  • Rally support from industry with guidance and funds to leap forward in a true open and secure RAN

AI

Congress To Consider Two New Bills On AI (reuters.com) 13

An anonymous reader quotes a report from Reuters: U.S. senators on Thursday introduced two separate bipartisan artificial intelligence bills on Thursday amid growing interest in addressing issues surrounding the technology. One would require the U.S. government to be transparent when using AI to interact with people and another would establish an office to determine if the United States is remaining competitive in the latest technologies. Senators Gary Peters, a Democrat who chairs the Homeland Security committee, introduced a bill along with Senators Mike Braun and James Lankford, both Republicans, which would require U.S. government agencies to tell people when the agency is using AI to interact with them. The bill also requires agencies to create a way for people to appeal any decisions made by AI.

"The federal government needs to be proactive and transparent with AI utilization and ensure that decisions aren't being made without humans in the driver's seat," said Braun in a statement. Senators Michael Bennet and Mark Warner, both Democrats, introduced a measure along with Republican Senator Todd Young that would establish an Office of Global Competition Analysis that would seek to ensure that the United States stayed in the front of the pack in developing artificial intelligence. "We cannot afford to lose our competitive edge in strategic technologies like semiconductors, quantum computing, and artificial intelligence to competitors like China," Bennet said.

Earlier this week, Senate Majority Leader Chuck Schumer said he had scheduled three briefings for senators on artificial intelligence, including the first classified briefing on the topic so lawmakers can be educated on the issue. The briefings include a general overview on AI, examining how to achieve American leadership on AI and a classified session on defense and intelligence issues and implications.
Further reading: Ask Slashdot: What Are Some Good AI Regulations?
Microsoft

Microsoft To Pay $20 Million Settlement For Illegally Collecting Children's Personal Data (techcrunch.com) 15

Microsoft has agreed to pay $20 million to settle charges by the Federal Trade Commission (FTC) that it illegally collected personal information from children without parental consent and retained it for extended periods. TechCrunch reports: The federal consumer watchdog said Microsoft violated the Children's Online Privacy Protection Act (COPPA), the federal law that governs the online privacy protections for children under the age of 13, which requires companies notify parents about the data they collect, obtain parental consent and delete the data when it's no longer necessary. The FTC said children signing up to Microsoft's Xbox gaming service were asked to provide their personal information -- including their name, email address, phone number and date of birth -- which until 2019 included a pre-filled check box allowing Microsoft to share user information with advertisers. The FTC said Microsoft collected this data before asking for the parent to complete the account setup, but held onto children's data even if the parent abandoned the sign-up process.

"Only after gathering that raft of personal data from children did Microsoft get parents involved in the process," said FTC's Lesley Fair in a corresponding blog post. As a result, the FTC will require Microsoft to notify parents and obtain consent for accounts created before May 2021. Microsoft will also have to establish new systems to delete children's personal information if it hasn't obtained parental consent, and to ensure the data is deleted when it's no longer needed.

Science

LHC Experiments See First Evidence of a Rare Higgs Boson Decay (web.cern.ch) 24

CERN: The discovery of the Higgs boson at CERN's Large Hadron Collider (LHC) in 2012 marked a significant milestone in particle physics. Since then, the ATLAS and CMS collaborations have been diligently investigating the properties of this unique particle and searching to establish the different ways in which it is produced and decays into other particles. At the Large Hadron Collider Physics (LHCP) conference last week, ATLAS and CMS report how they teamed up to find the first evidence of the rare process in which the Higgs boson decays into a Z boson, the electrically neutral carrier of the weak force, and a photon, the carrier of the electromagnetic force. This Higgs boson decay could provide indirect evidence of the existence of particles beyond those predicted by the Standard Model of particle physics.

The decay of the Higgs boson into a Z boson and a photon is similar to that of a decay into two photons. In these processes, the Higgs boson does not decay directly into these pairs of particles. Instead, the decays proceed via an intermediate "loop" of "virtual" particles that pop in and out of existence and cannot be directly detected. These virtual particles could include new, as yet undiscovered particles that interact with the Higgs boson. The Standard Model predicts that, if the Higgs boson has a mass of around 125 billion electronvolts, approximately 0.15% of Higgs bosons will decay into a Z boson and a photon. But some theories that extend the Standard Model predict a different decay rate. Measuring the decay rate therefore provides valuable insights into both physics beyond the Standard Model and the nature of the Higgs boson.

Medicine

A Paralyzed Man Can Walk Naturally Again With Brain and Spine Implants 41

An anonymous reader quotes a report from the New York Times: Gert-Jan Oskam was living in China in 2011 when he was in a motorcycle accident that left him paralyzed from the hips down. Now, with a combination of devices, scientists have given him control over his lower body again. "For 12 years I've been trying to get back my feet," Mr. Oskam said in a press briefing on Tuesday. "Now I have learned how to walk normal, natural." In a study published on Wednesday in the journal Nature, researchers in Switzerland described implants that provided a "digital bridge" between Mr. Oskam's brain and his spinal cord, bypassing injured sections. The discovery allowed Mr. Oskam, 40, to stand, walk and ascend a steep ramp with only the assistance of a walker. More than a year after the implant was inserted, he has retained these abilities and has actually showed signs of neurological recovery, walking with crutches even when the implant was switched off. "We've captured the thoughts of Gert-Jan, and translated these thoughts into a stimulation of the spinal cord to re-establish voluntary movement," Gregoire Courtine, a spinal cord specialist at the Swiss Federal Institute of Technology, Lausanne, who helped lead the research, said at the press briefing.

In the new study, the brain-spine interface, as the researchers called it, took advantage of an artificial intelligence thought decoder to read Mr. Oskam's intentions -- detectable as electrical signals in his brain -- and match them to muscle movements. The etiology of natural movement, from thought to intention to action, was preserved. The only addition, as Dr. Courtine described it, was the digital bridge spanning the injured parts of the spine. [...] To achieve this result, the researchers first implanted electrodes in Mr. Oskam's skull and spine. The team then used a machine-learning program to observe which parts of the brain lit up as he tried to move different parts of his body. This thought decoder was able to match the activity of certain electrodes with particular intentions: One configuration lit up whenever Mr. Oskam tried to move his ankles, another when he tried to move his hips.

Then the researchers used another algorithm to connect the brain implant to the spinal implant, which was set to send electrical signals to different parts of his body, sparking movement. The algorithm was able to account for slight variations in the direction and speed of each muscle contraction and relaxation. And, because the signals between the brain and spine were sent every 300 milliseconds, Mr. Oskam could quickly adjust his strategy based on what was working and what wasn't. Within the first treatment session he could twist his hip muscles. Over the next few months, the researchers fine-tuned the brain-spine interface to better fit basic actions like walking and standing. Mr. Oskam gained a somewhat healthy-looking gait and was able to traverse steps and ramps with relative ease, even after months without treatment. Moreover, after a year in treatment, he began noticing clear improvements in his movement without the aid of the brain-spine interface. The researchers documented these improvements in weight-bearing, balancing and walking tests. Now, Mr. Oskam can walk in a limited way around his house, get in and out of a car and stand at a bar for a drink. For the first time, he said, he feels like he is the one in control.
Facebook

Facebook Parent In Talks With Magic Leap Over Augmented Reality Deal (ft.com) 13

Facebook's parent company Meta is reportedly in discussions with augmented reality start-up Magic Leap to establish a multiyear agreement for intellectual property licensing and contract manufacturing in North America. While the partnership is not expected to result in a joint headset, Magic Leap's technology could play a crucial role in Meta's ambitious metaverse project as it seeks to compete with Apple's upcoming mixed reality device. The Financial Times reports: Magic Leap produces custom components, including high-tech lenses and associated software, which are key technologies that may be required to build a metaverse. Two former employees said Magic Leap's "biggest asset" is the sophistication of its "waveguides" -- technology that allows thin glass in front of the user's eyes to conjure up realistic images at different depths.

Meta sells nearly 80 per cent of all VR/AR headsets, thanks to its VR Quest models. But the market itself is small -- fewer than 9mn units sold last year, according to IDC -- a tenuous lead given Apple's expected entry into the market during its developer conference next month.
The company told the Financial Times: "Given the complexities of developing true augmented reality technologies and the intricacies involved with manufacturing these optics, as well as the issues many companies experience with overseas supply chain dependencies, we have entered into several non-exclusive IP licensing and manufacturing partnerships with companies looking to enter the AR market or expand their current position."
Android

Millions of Android Phones and TVs May Come with Preinstalled Malware (arstechnica.com) 19

"Multiple lines of Android devices came with preinstalled malware," reports Ars Technica, "that couldn't be removed without users taking heroic measures."

Their article cites two reports released Thursday — one from Trend Micro and one from TechCrunch: Trend Micro researchers following up on a presentation delivered at the Black Hat security conference in Singapore reported that as many as 8.9 million phones comprising as many as 50 different brands were infected with malware... ["It's highly likely that more devices have been preinfected," the report clarified, "but have not exchanged communication with the Command & Control server, have not been used or activated by the threat actor, or have yet to be distributed to the targeted country or market... The threat actor has spread this malware over the last five years. "]

"Guerrilla" opens a backdoor that causes infected devices to regularly communicate with a remote command-and-control server to check if there are any new malicious updates for them to install. These malicious updates collect data about the users that the threat actor, which Trend Micro calls the Lemon Group, can sell to advertisers. Guerrilla then surreptitiously installs aggressive ad platforms that can deplete battery reserves and degrade the user experience... Guerrilla is a massive platform with nearly a dozen plugins that can hijack users' WhatsApp sessions to send unwanted messages, establish a reverse proxy from an infected phone to use the network resources of the affected mobile device, and inject ads into legitimate apps...

TechCrunch detailed several lines of Android-based TV boxes sold through Amazon that are laced with malware. The TV boxes, reported to be T95 models with an h616, report to a command-and-control server that, just like the Guerrilla servers, can install any application the malware creators want. The default malware preinstalled on the boxes is known as a clickbot. It generates advertising revenue by surreptitiously tapping on ads in the background...

Android devices that come with malware straight out of the factory box are, unfortunately, nothing new. Ars has reported on such incidents at least five times in recent years (here, here, here, here, and here). All the affected models were in the budget tier.

People in the market for an Android phone should steer toward known brands like Samsung, Asus, or OnePlus, which generally have much more reliable quality assurance controls on their inventory. To date, there have never been reports of higher-end Android devices coming with malware preinstalled. There are similarly no such reports for iPhones.

The Courts

Supreme Court Rules Against Reexamining Section 230 (theverge.com) 58

Adi Robertson writes via The Verge: The Supreme Court has declined to consider reinterpreting foundational internet law Section 230, saying it wasn't necessary for deciding the terrorism-related case Gonzalez v. Google. The ruling came alongside a separate but related ruling in Twitter v. Taamneh, where the court concluded that Twitter had not aided and abetted terrorism. In an unsigned opinion (PDF) issued today, the court said the underlying complaints in Gonzalez were weak, regardless of Section 230's applicability. The case involved the family of a woman killed in a terrorist attack suing Google, which the family claimed had violated the law by recommending terrorist content on YouTube. They sought to hold Google liable under anti-terrorism laws.

The court dismissed the complaint largely because of its unanimous ruling (PDF) in Twitter v. Taamneh. Much like in Gonzalez, a family alleged that Twitter knowingly supported terrorists by failing to remove them from the platform before a deadly attack. In a ruling authored by Justice Clarence Thomas, however, the court declared that the claims were "insufficient to establish that these defendants aided and abetted ISIS" for the attack in question. Thomas declared that Twitter's failure to police terrorist content failed the requirement for some "affirmative act" that involved meaningful participation in an illegal act. "If aiding-and-abetting liability were taken too far, then ordinary merchants could become liable for any misuse of their goods and services, no matter how attenuated their relationship with the wrongdoer," writes Thomas. That includes "those who merely deliver mail or transmit emails" becoming liable for the contents of those messages or even people witnessing a robbery becoming liable for the theft. "There are no allegations that defendants treated ISIS any differently from anyone else. Rather, defendants' relationship with ISIS and its supporters appears to have been the same as their relationship with their billion-plus other users: arm's length, passive, and largely indifferent."

For Gonzalez v. Google, "the allegations underlying their secondary-liability claims are materially identical to those at issue in Twitter," says the court. "Since we hold that the complaint in that case fails to state a claim for aiding and abetting ... it appears to follow that the complaint here likewise fails to state such a claim." Because of that, "we therefore decline to address the application of 230 to a complaint that appears to state little, if any, plausible claim for relief." [...] The Gonzalez ruling is short and declines to deal with many of the specifics of the case. But the Twitter ruling does take on a key question from Gonzalez: whether recommendation algorithms constitute actively encouraging certain types of content. Thomas appears skeptical: "To be sure, plaintiffs assert that defendants' 'recommendation' algorithms go beyond passive aid and constitute active, substantial assistance. We disagree. By plaintiffs' own telling, their claim is based on defendants' 'provision of the infrastructure which provides material support to ISIS.' Viewed properly, defendants' 'recommendation' algorithms are merely part of that infrastructure. All the content on their platforms is filtered through these algorithms, which allegedly sort the content by information and inputs provided by users and found in the content itself. As presented here, the algorithms appear agnostic as to the nature of the content, matching any content (including ISIS' content) with any user who is more likely to view that content. The fact that these algorithms matched some ISIS content with some users thus does not convert defendants' passive assistance into active abetting. Once the platform and sorting-tool algorithms were up and running, defendants at most allegedly stood back and watched; they are not alleged to have taken any further action with respect to ISIS."
"The interpretation may deal a blow to one common argument for adding special liability to social media: the claim that recommendation systems go above and beyond simply hosting content and explicitly encourage that content," adds Robertson. "This ruling's reasoning suggests that simply recommending something on an 'agnostic' basis -- as opposed to, in one hypothetical from Thomas, creating a system that 'consciously and selectively chose to promote content provided by a particular terrorist group' -- isn't an active form of encouragement."
Security

Malware Turns Home Routers Into Proxies For Chinese State-Sponsored Hackers (arstechnica.com) 28

An anonymous reader quotes a report from Ars Technica: Researchers on Tuesday unveiled a major discovery -- malicious firmware that can wrangle a wide range of residential and small office routers into a network that stealthily relays traffic to command-and-control servers maintained by Chinese state-sponsored hackers. A firmware implant, revealed in a write-up from Check Point Research, contains a full-featured backdoor that allows attackers to establish communications and file transfers with infected devices, remotely issue commands, and upload, download, and delete files. The implant came in the form of firmware images for TP-Link routers. The well-written C++ code, however, took pains to implement its functionality in a "firmware-agnostic" manner, meaning it would be trivial to modify it to run on other router models.

The main purpose of the malware appears to relay traffic between an infected target and the attackers' command and control servers in a way that obscures the origins and destinations of the communication. With further analysis, Check Point Research eventually discovered that the control infrastructure was operated by hackers tied to Mustang Panda, an advanced persistent threat actor that both the Avast and ESET security firms say works on behalf of the Chinese government.

The researchers discovered the implant while investigating a series of targeted attacks against European foreign affairs entities. The chief component is a backdoor with the internal name Horse Shell. The three main functions of Horse Shell are: a remote shell for executing commands on the infected device; file transfer for uploading and downloading files to and from the infected device; and the exchange of data between two devices using SOCKS5, a protocol for proxying TCP connections to an arbitrary IP address and providing a means for UDP packets to be forwarded. The SOCKS5 functionality seems to be the ultimate purpose of the implant. By creating a chain of infected devices that establish encrypted connections with only the closest two nodes (one in each direction), it's difficult for anyone who stumbles upon one of them to learn the origin or ultimate destination or the true purpose of the infection. As Check Point researchers wrote:
"Learning from history, router implants are often installed on arbitrary devices with no particular interest, with the aim to create a chain of nodes between the main infections and real command and control," Check Point researchers wrote in a shorter write-up. "In other words, infecting a home router does not mean that the homeowner was specifically targeted, but rather that they are only a means to a goal."
Businesses

SEC Responds To Coinbase Request For Action: 'No' (blockworks.co) 58

The Securities and Exchange Commission has issued a response to Coinbase's complaint requesting that the agency establish regulatory clarity for the industry. From a report: In an April mandamus petition, Coinbase demanded federal courts to instruct the SEC to act and issue clear guidelines for crypto exchanges and companies. In its response, released Monday evening in New York, the SEC alleged Coinbase has no right to mandamus, which orders a government agency to fulfill certain duties.

"Perhaps recognizing this, Coinbase instead asserts that this Court should compel the Commission to act on Coinbase's recently filed rulemaking petition," the SEC wrote in its response. "But no statute or regulation requires the Commission to take such action on a specific timeline." The SEC, in its response, suggests that "mere months have passed since Coinbase's petition was filed and even less time has elapsed since Coinbase supplemented the record." The agency continued that "deliberating over the kind of significant changes sought by Coinbase, which could affect both crypto assets and the securities markets more generally, takes time -- including, as here, time to weigh whether or not to initiate a rulemaking proceeding about such topics in the first instance. This is particularly true given the Commission's active regulatory and enforcement agenda in this area..."
Further reading: US Chamber of Commerce Slams SEC, Backs Coinbase in Legal Fight.
Sci-Fi

UFO Hunters Built an Open-Source AI System To Scan the Skies (vice.com) 72

An anonymous reader shares an excerpt from a Motherboard article: Now, frustrated with a lack of transparency and trust around official accounts of UFO phenomena, a team of developers has decided to take matters into their own hands with an open source citizen science project called Sky360, which aims to blanket the earth in affordable monitoring stations to watch the skies 24/7, and even plans to use AI and machine learning to spot anomalous behavior. Unlike earlier 20th century efforts such as inventors proposing "geomagnetic detectors" to discover nearby UFOs, or more recent software like the short-lived UFO ID project, Sky360 hopes that it can establish a network of autonomously operating surveillance units to gather real-time data of our skies. Citizen-led UFO research is not new. Organizations like MUFON, founded in 1969, have long investigated sightings, while amateur groups like the American Flying Saucer Investigating Committee of Columbus even ran statistical analysis on sightings in the 1960s (finding that most of them happened on Wednesdays). However, Sky360 believes that the level of interest and the technology have now both reached an inflection point, where citizen researchers can actually generate large-scale actionable data for analysis all on their own.

The Sky360 stations consist of an AllSkyCam with a wide angle fish-eye lens and a pan-tilt-focus camera, with the fish-eye camera registering all movement. Underlying software performs an initial rough analysis of these events, and decides whether to activate other sensors -- and if so, the pan-tilt-focus camera zooms in on the object, tracks it, and further analyzes it. According to developer Nikola Galiot, the software is currently based on a computer vision "background subtraction" algorithm that detects any motion in the frame compared to previous frames captured; anything that moves is then tracked as long as possible and then automatically classified. The idea is that the more data these monitoring stations acquire, the better the classification will be. There are a combination of AI models under the hood, and the system is built using the open-source TensorFlow machine learning platform so it can be deployed on almost any computer. Next, the all-volunteer team wants to create a single algorithm capable of detection, tracking and classification all in one.

All the hardware components, from the cameras to passive radar and temperature gauges, can be bought cheaply and off-the-shelf worldwide -- with the ultimate goal of finding the most effective combinations for the lowest price. Schematics, blueprints, and suggested equipment are all available on the Sky360 site and interested parties are encouraged to join the project's Discord server. There are currently 20 stations set up across the world, from the USA to Canada to more remote regions like the Azores in the middle of the Atlantic [...] Once enough of the Sky360 stations have been deployed, the next step is to work towards real-time monitoring, drawing all the data together, and analyzing it. By striving to create a huge, open, transparent network, anyone would be free to examine the data themselves.

In June of this year, Sky360, which has a team of 30 volunteer developers working on the software, hopes to release its first developer-oriented open source build. At its heart is a component called 'SimpleTracker', which receives images frame by frame from the cameras, auto-adjusting parameters to get the best picture possible. The component determines whether something in the frame is moving, and if so, another analysis is performed, where a machine learning algorithm trained on the trajectories of normal flying objects like planes, birds, or insects, attempts to classify the object based on its movement. If it seems anomalous, it's flagged for further investigation.

Games

The 2023 Video Game Hall of Fame Inductees (museumofplay.org) 44

Slashdot reader Dave Knott shares the four class of 2023 inductees into the Video Game Hall Of Fame. They were announced today at The Strong National Museum of Play. From the press release: Barbie Fashion Designer : "The 1996 hit Barbie Fashion Designer emerged at a time when many games were marketed to male players. Published by Digital Domain/Mattel Media, it proved that a computer game targeted to girls could succeed, selling more than 500,000 copies in two months. The game helped greatly expanded the market for video games and in the process opened important -- and ongoing -- discussions about gender and stereotypes in gaming. Barbie Fashion Designer was also innovative in bridging the gap between the digital and the physical, allowing players to design clothes for their Barbie dolls and print them on special fabric."

Computer Space : "Nutting Associate's Computer Space appeared in 1971 and was the first commercial video game. Inspired by the early minicomputer and previous World Video Game Hall of Fame inductee -- Spacewar! (1962) -- the coin-operated Computer Space proved that video games could reach an audience outside of computer labs. While not a best-seller, it was a trailblazer in the video game world and inspired its creators to go on to establish Atari Inc., a video game giant in the 1970s and 1980s."

The Last of Us : "Released by Naughty Dog and Sony Interactive Entertainment in 2013, The Last of Us jumped into an oversaturated field of post-apocalyptic zombie games and quickly stood out among the rest with its in-depth storytelling, intimate exploration of humanity, thrilling game jumps and cutscenes, and its memorable characters. More than 200 publications named it the game of the year in 2013. Its story has since made the jump to Hollywood, inspiring an HBO adaptation in 2023 watched weekly by millions."

Wii Sports : "Wii Sports launched with the Nintendo Wii home video game system in 2006 and introduced motion-based technology to living rooms across the world. With a simple swipe of the controller, players could serve a tennis ball, hurl a bowling bowl, throw a left hook, or drive a golf ball. The simple mechanics made the game accessible to almost anyone -- allowing it to be played by young children and seniors alike -- and helped to redefine the idea of who is a "gamer." Ultimately, the game helped Nintendo to sell more than 100 million Wii consoles worldwide."
These titles managed to beat out several other incredibly popular titles, including Angry Birds, Age of Empires, Call of Duty 4: Modern Warfare, GoldenEye 007, NBA 2K, FIFA International Soccer, Quake, and Wizardry.
The Internet

Colorado Kills Law That Made It Harder For Cities To Offer Internet Service (arstechnica.com) 63

Yesterday, Colorado eliminated a 2005 law that required local governments to hold an election before offering cable television or telecommunications service, "a process that pitted city and town leaders against well-funded broadband industry lobbying campaigns," reports Ars Technica. From the report: Gov. Jared Polis, a Democrat, signed a bill to eliminate that law yesterday. The bill had been approved by the State House in a 48-14 vote and in the Senate by a 31-4 vote. Both chambers have Democratic majorities, but the votes didn't go entirely along party lines; all of the "no" votes came from Republicans, but other Republicans joined Democrats in approving the bill. The bill signed by Polis "gives local governments the authority to provide broadband service, either on their own or by partnering with industry service providers, without holding a local election," the Governor's Office of Information Technology said.

"Each local government is in a unique position or different phase of connecting residents to high-speed Internet, and this bill allows them to establish broadband plans that meet the needs of their communities," Colorado Broadband Office Executive Director Brandy Reitter said. Going forward, cities and towns won't have to hold elections to opt out of the 2005 restriction on municipal broadband. A vote to opt out of the state law didn't guarantee that a city or town would build a network, but the vote was a necessary step and in some cases resulted in a municipal broadband service.

United States

Commerce Dept. Outlines Plans To Fund Cutting-Edge Chip Research (nytimes.com) 11

The Biden administration outlined plans on Tuesday to propel research on the type of cutting-edge microchips needed to power computers, cars and other devices, saying it would establish a new national organization with locations in various parts of the United States. From a report: The Commerce Department, which is in charge of the administration's efforts to revitalize the American chip industry, said its new National Semiconductor Technology Center would bring together companies, universities and others to collaborate on next-generation chip technology. The organization would include a string of research centers, the locations of which have yet to be chosen, and aim to be operational by the end of this year.

The organization would help "regain America's leadership in research and development and technologies of the future and, importantly, make sure we stay there for decades to come," Gina Raimondo, the commerce secretary, said in a briefing Monday. "It's a place where industry and academia and start-ups and investors can come together to solve the biggest, grandest challenges and set priorities," she added. The plans are part of the Biden administration's effort to reinvigorate semiconductor manufacturing and ensure that the United States has a steady supply of chips necessary to feed its factories and support its national defense. The Commerce Department has been charged with doling out $50 billion to revitalize the industry, including $11 billion devoted to research and development.

United States

US Department of Homeland Security is Now Studying How to Make Use of AI (cnbc.com) 59

America's Department of Homeland Security "will establish a new task force to examine how the government can use artificial intelligence technology to protect the country," reports CNBC.

The task force was announcement by department secretary Alejandro Mayorkas Friday during a speech at a Council on Foreign Relations event: "Our department will lead in the responsible use of AI to secure the homeland," Mayorkas said, while also pledging to defend "against the malicious use of this transformational technology." He added, "As we do this, we will ensure that our use of AI is rigorously tested to avoid bias and disparate impact and is clearly explainable to the people we serve...."

Mayorkas gave two examples of how the task force will help determine how AI could be used to fine-tune the agency's work. One is to deploy AI into DHS systems that screen cargo for goods produced by forced labor. The second is to use the technology to better detect fentanyl in shipments to the U.S., as well as identifying and stopping the flow of "precursor chemicals" used to produce the dangerous drug.

Mayorkas asked Homeland Security Advisory Council Co-Chair Jamie Gorelick to study "the intersection of AI and homeland security and deliver findings that will help guide our use of it and defense against it."

The article also notes that earlier this week America's defense department hired a former Google AI cloud director to serve as its first advisor on AI, robotics, cloud computing and data analytics.
Communications

China Building Cyberweapons To Hijack Enemy Satellites, Says US Leak (arstechnica.com) 38

An anonymous reader quotes a report from Ars Technica: China is building sophisticated cyber weapons to "seize control" of enemy satellites, rendering them useless for data signals or surveillance during wartime, according to a leaked US intelligence report. The US assesses that China's push to develop capabilities to "deny, exploit or hijack" enemy satellites is a core part of its goal to control information, which Beijing considers to be a key "war-fighting domain." The CIA-marked document, which was issued this year and has been reviewed by the Financial Times, was one of dozens allegedly shared by a 21-year-old US Air Guardsman in the most significant American intelligence disclosures in more than a decade. A cyber capability of this nature would far exceed anything Russia has deployed in Ukraine, where electronic warfare teams have taken a brute-force approach with little effect.

These attacks, first developed in the 1980s, attempt to drown out signals between low-orbit SpaceX satellites and their on-ground terminals by broadcasting on similar frequencies from truck-borne jamming systems such as the Tirada-2. China's more ambitious cyber attacks aim to mimic the signals that enemy satellites receive from their operators, tricking them into either being taken over completely or malfunctioning during crucial moments in combat. The classified US document said this cyber capability would allow China "to seize control of a satellite, rendering it ineffective to support communications, weapons, or intelligence, surveillance, and reconnaissance systems." The US has never disclosed whether it has similar capabilities.

Taiwan, which has taken note of how indispensable satellite communications have been to the Ukrainian military, is seeking to build out communications infrastructure that can survive an attack from China. It is courting investors to establish its own satellite provider, while experimenting with non-geostationary satellite receivers in 700 locations around Taiwan to guarantee bandwidth in the event of war or disasters, the Financial Times reported in January. China's goals, according to the leaked assessment, [...] would seek to knock out the ability of satellites -- which tend to operate in interconnected clusters -- to communicate with each other, to relay signals and orders to weapons systems, or to send back visual and intercepted electronic data, according to experts.
"China understands the superiority that the United States has in the space and cyber domains, so they are very interested in not only improving their own capabilities but in capitalizing on what we refer to as a first-mover advantage in both domains," said Moore, now a visiting professor at Vanderbilt University in Tennessee.

"They are working on all the capabilities that they want to have from a defensive and offensive standpoint, and from an ISR [intelligence, surveillance, and reconnaissance] standpoint. They're firing on all cylinders," he said.
Government

Government Cybersecurity Agencies Unite to Urge Secure Software Design Practices (cisa.gov) 38

Several government cybersecurity agencies united to urge secure-by-design and secure-by-default software. Releasing "joint guidance" for software manufactuers were two U.S. security agencies — the FBI and the NSA — joined with the U.S. Cybersecurity and Infrastructure Security Agency and the cybersecurity authorities of Australia, Canada, the United Kingdom, Germany, Netherlands, and New Zealand. "To create a future where technology and associated products are safe for customers," they wrote in a joint statement, "the authoring agencies urge manufacturers to revamp their design and development programs to permit only secure-by-design and -default products to be shipped to customers."

The Washington Post reports: Software manufacturers should put an end to default passwords, write in safer programming languages and establish vulnerability disclosure programs for reporting flaws, a collection of U.S. and international government agencies said in new guidelines Thursday. [The guidelines also urge rigorous code reviews.]

The "principles and approaches" document, which isn't mandatory but lays out the agencies' views on securing software, is the first major step by the Biden administration as part of its push to make software products secure as part of the design process, and to make their default settings secure as well. It's part of a potentially contentious multiyear effort that aims to shift the way software makers secure their products. It was a key feature of the administration's national cybersecurity strategy, which was released last month and emphasized shifting the burden of security from consumers — who have to manage frequent software updates — to the companies that make often insecure products... The administration has also raised the prospect of legislation on secure-by-design and secure-by-default, but officials have said it could be years away....

The [international affairs think tank] Atlantic Council's Cyber Statecraft Initiative has praised the Biden administration's desire to address economic incentives for insecurity. Right now, the costs of cyberattacks fall on users more than they do tech providers, according to many policymakers. "They're on a righteous mission," Trey Herr, director of the Atlantic Council initiative, told me. If today's guidelines are the beginning of the discussion on secure-by-design and secure-by-default, Herr said, "this is a really strong start, and an important one."

"It really takes aim at security features as a profit center," which for some companies has led to a lot of financial growth, Herr said. "I do think that's going to rub people the wrong way and quick, but that's good. That's a good fight."

In the statement CISA's director says consumers also have a role to play in this transition. "As software now powers the critical systems and services we collectively rely upon every day, consumers must demand that manufacturers prioritize product safety above all else."

Among other things, the new guidelines say that manufacturers "are encouraged make hard tradeoffs and investments, including those that will be 'invisible' to the customers, such as migrating to programming languages that eliminate widespread vulnerabilities."
Earth

How Did Earth Get Its Water? 40

Earth's water could have originated from interactions between the hydrogen-rich atmospheres and magma oceans of the planetary embryos that comprised Earth's formative years, according to new work from Carnegie Science's Anat Shahar and UCLA's Edward Young and Hilke Schlichting. Their findings, which could explain the origins of Earth's signature features, are published in Nature. Phys.Org reports: "Exoplanet discoveries have given us a much greater appreciation of how common it is for just-formed planets to be surrounded by atmospheres that are rich in molecular hydrogen, H2, during their first several million years of growth," Shahar explained. "Eventually these hydrogen envelopes dissipate, but they leave their fingerprints on the young planet's composition." Using this information, the researchers developed new models for Earth's formation and evolution to see if our home planet's distinct chemical traits could be replicated.

Using a newly developed model, the Carnegie and UCLA researchers were able to demonstrate that early in Earth's existence, interactions between the magma ocean and a molecular hydrogen proto-atmosphere could have given rise to some of Earth's signature features, such as its abundance of water and its overall oxidized state. The researchers used mathematical modeling to explore the exchange of materials between molecular hydrogen atmospheres and magma oceans by looking at 25 different compounds and 18 different types of reactions -- complex enough to yield valuable data about Earth's possible formative history, but simple enough to interpret fully.

Interactions between the magma ocean and the atmosphere in their simulated baby Earth resulted in the movement of large masses of hydrogen into the metallic core, the oxidation of the mantle, and the production of large quantities of water. Even if all of the rocky material that collided to form the growing planet was completely dry, these interactions between the molecular hydrogen atmosphere and the magma ocean would generate copious amounts of water, the researchers revealed. Other water sources are possible, they say, but not necessary to explain Earth's current state.
"This is just one possible explanation for our planet's evolution, but one that would establish an important link between Earth's formation history and the most common exoplanets that have been discovered orbiting distant stars, which are called Super-Earths and sub-Neptunes," Shahar concluded.
China

China Plans To Ban Exports of Rare Earth Magnet Tech (yomiuri.co.jp) 133

China is considering banning the export of technologies used to produce high-performance rare earth magnets deployed in electric vehicles, wind turbine motors and other products, citing "national security" as a reason, it has been learned. From a report: With the global trend toward decarbonization driving a shift toward the use of electric motors, China is believed to be seeking to seize control of the magnet supply chain and establish dominance in the burgeoning environment sector.

Beijing is currently in the process of revising its Catalogue of Technologies Prohibited and Restricted from Export -- a list of manufacturing and other industrial technologies subject to export controls -- and released a draft of the revised catalog for public comment in December. In the draft, manufacturing technologies for high-performance magnets using such rare earth elements as neodymium and samarium cobalt were added to the export ban. The solicitation of comments ceased late January and the revisions are expected to be adopted as early as this year.

Facebook

Meta To Debut Ad-Creating Generative AI this Year, CTO Says (nikkei.com) 29

Facebook owner Meta intends to commercialize its proprietary generative artificial intelligence by December, joining Google in finding practical applications for the tech. From a report: The company, which began full-scale AI research in 2013, stands out along with Google in the number of studies published. "We've been investing in artificial intelligence for over a decade, and have one of the leading research institutes in the world," Andrew Bosworth, Meta's chief technology officer, told Nikkei in an exclusive interview on Wednesday in Tokyo. "We certainly have a large research organization, hundreds of people." Meta announced in February that it would establish a new organization to develop generative AI, but this is the first time it has indicated a timeline for commercialization. The technology, which can instantly create sentences and graphics, has already been commercialized by ChatGPT creator OpenAI of the U.S. But Bosworth insists Meta remains on the technology's cutting edge.

"We feel very confident that ... we are at the very forefront," he said. "Quite a few of the techniques that are in large language model development were pioneered [by] our teams. "[I] expect we'll start seeing some of them [commercialization of the tech] this year. We just created a new team, the generative AI team, a couple of months ago; they are very busy. It's probably the area that I'm spending the most time [in], as well as Mark Zuckerberg and [Chief Product Officer] Chris Cox." Bosworth believes Meta's artificial intelligence can improve an ad's effectiveness partly by telling the advertiser what tools to use in making it. He said that instead of a company using a single image in an advertising campaign, it can "ask the AI, 'Make images for my company that work for different audiences.' And it can save a lot of time and money."

Slashdot Top Deals