Communications

Ford Decides It Won't Kill AM Radio After All (theverge.com) 152

Ford is reversing course on AM radio. From a report: In a tweet today, CEO Jim Farley announced the company was backing off its decision to release new vehicles without AM radio broadcast capabilities. Instead, all 2024 Ford and Lincoln models will be able to tune in to AM radio. And for the two electric vehicles released without AM radio capabilities, a software update would be pushed to restore it. The announcement came after Farley said he spoke with policy leaders on the "importance of AM broadcast radio as a part of the emergency alert system." A bipartisan group of lawmakers introduced legislation in Washington last week that would require automakers to keep AM radio in all their vehicles. The bill was proposed in response to an increasing number of vehicles coming out without the first-generation radio broadcast technology.
United States

FBI Abused Spy Law 280,000 Times In a Year (theregister.com) 151

The FBI misused surveillance powers granted by Section 702 of the Foreign Intelligence Surveillance Act (FISA) over 278,000 times between 2020 and early 2021 to conduct warrantless searches on George Floyd protesters, January 6 Capitol rioters, and donors to a congressional campaign, according to a newly unclassified court opinion. The Register reports: On Friday, the US Foreign Intelligence Surveillance Court made public a heavily redacted April 2022 opinion [PDF] that details hundreds of thousands of violations of Section 702 of the Foreign Intelligence Surveillance Act (FISA) -- the legislative instrument that allows warrantless snooping. The Feds were found to have abused the spy law in a "persistent and widespread" manner, according to the court, repeatedly failing to adequately justify the need to go through US citizens' communications using a law aimed at foreigners.

The court opinion details FBI queries run on thousands of individuals between 2020 and early 2021. This includes 133 people arrested during the George Floyd protests and more than 19,000 donors to a congressional campaign. In the latter, "the analyst who ran the query advised that the campaign was a target of foreign influence, but NSD determined that only eight identifiers used in the query had sufficient ties to foreign influence activities to comply with the querying standard," the opinion says, referring to the Justice Department's National Security Division (NSD). In other words, there wasn't a strong enough foreign link to fully justify the communications search.

For the Black Lives Matter protests, the division determined that the FBI queries "were not reasonably likely to retrieve foreign intelligence information or evidence of a crime." Again, an overreach of foreign surveillance powers. Additional "significant violations of the querying standard" occurred in searched related to the January 6, 2021 breach of the US Capitol, domestic drug and gang investigations, and domestic terrorism probes, according to the court. It's said that more than 23,000 queries were run on people suspected of storming the Capitol.

Encryption

Leaked Government Document Shows Spain Wants To Ban End-to-End Encryption (wired.com) 76

An anonymous reader quotes a report from Wired: Spain has advocated banning encryption for hundreds of millions of people within the European Union, according to a leaked document obtained by WIRED that reveals strong support among EU member states for proposals to scan private messages for illegal content. The document, a European Council survey of member countries' views on encryption regulation, offered officials' behind-the-scenes opinions on how to craft a highly controversial law to stop the spread of child sexual abuse material (CSAM) in Europe. The proposed law would require tech companies to scan their platforms, including users' private messages, to find illegal material. However, the proposal from Ylva Johansson, the EU commissioner in charge of home affairs, has drawn ire from cryptographers, technologists, and privacy advocates for its potential impact on end-to-end encryption.

For years, EU states have debated whether end-to-end encrypted communication platforms, such as WhatsApp and Signal, should be protected as a way for Europeans to exercise a fundamental right to privacy -- or weakened to keep criminals from being able to communicate outside the reach of law enforcement. Experts who reviewed the document at WIRED's request say it provides important insight into which EU countries plan to support a proposal that threatens to reshape encryption and the future of online privacy. Of the 20 EU countries represented in the document leaked to WIRED, the majority said they are in favor of some form of scanning of encrypted messages, with Spain's position emerging as the most extreme. "Ideally, in our view, it would be desirable to legislatively prevent EU-based service providers from implementing end-to-end encryption," Spanish representatives said in the document. The source of the document declined to comment and requested anonymity because they were not authorized to share it.

In its response, Spain said it is "imperative that we have access to the data" and suggests that it should be possible for encrypted communications to be decrypted. Spain's interior minister, Fernando Grande-Marlaska, has been outspoken about what he considers the threat posted by encryption. When reached for comment about the leaked document, Daniel Campos de Diego, a spokesperson for Spain's Ministry of Interior, says the country's position on this matter is widely known and has been publicly disseminated on several occasions. Edging close to Spain, Poland advocated in the leaked document for mechanisms through which encryption could be lifted by court order and for parents to have the power to decrypt children's communications.
Several other countries say they would give law enforcement access to people's encrypted messages and communications. "Cyprus, Hungary, and Spain very clearly see this law as their opportunity to get inside encryption to undermine encrypted communications, and that to me is huge," says Ella Jakubowska, a senior policy advisor at European Digital Rights (EDRI) who reviewed the document. "They are seeing this law is going far beyond what DG home is claiming that it's there for."
Communications

Biden Names FCC Picks, Pushes for Democratic Majority at Deadlocked Agency (bloomberg.com) 40

President Joe Biden moved to lock in his first Democratic majority at the Federal Communications Commission, naming veteran government lawyer Anna Gomez to an open seat and proposing to extend the service of two current commissioners. From a report: The appointments poise the FCC, after more than two years of partisan deadlock under a Democratic chairwoman, to act on the party's priorities, including restoring net neutrality regulations. Such rules bar broadband providers from interfering with web traffic and were gutted by Republicans during the administration of President Donald Trump.

All three nominees, announced by the White House on Monday, need Senate confirmation. In addition to Gomez, Biden proposed a second five-year term for Democrat Geoffrey Starks, who otherwise would need to leave the agency at the end of the year. Biden also proposed another term for Republican Brendan Carr, who has been on the commission since 2017. Gomez's arrival would bring the agency to its full strength of five commissioners for the first time since January 2021, when Trump's Republican chairman departed, leaving the 2-to-2 split. An earlier Biden nominee withdrew amid opposition from Senate Republicans. FCC commissioners serve staggered five-year terms, and no more than three can be members of the president's party.

Communications

FCC Rejects Dish 5G Plan That Could Have Made Starlink Broadband 'Unusable' (arstechnica.com) 29

An anonymous reader quotes a report from Ars Technica: The Federal Communications Commission sided with Starlink in a battle against Dish Network today, rejecting a Dish proposal that could have degraded Internet service for Starlink satellite users. In a 4-0 vote, the FCC decided not to authorize high-powered terrestrial mobile service in the 12.2-12.7 GHz band that is already used by Starlink customer terminals for downloads. The vote "ensure[s] the present and future of satellite services in the 12.2-12.7 GHz band. We recognize that millions of people rely on services in this band -- and we want to see that continue," FCC Chair Jessica Rosenworcel said at today's meeting. The band is also used for satellite TV.

In its announcement of the vote, the FCC said it "declin[ed] to authorize two-way, high-powered terrestrial mobile use due to a significant risk of harmful interference to existing and emergent services, particularly in the growing satellite broadband market." Dish already uses spectrum from the 12.2-12.7 GHz band for satellite TV and wants to use the band for cellular service as well. While the FCC rejected the mobile proposal, it said it would investigate the potential to expand terrestrial fixed use or permit unlicensed use in that spectrum. Specifically, the FCC will seek comment on allowing point-to-point fixed links in 12.2-12.7 GHz at higher power levels than the current rules allow and on "adding indoor-only underlay and unlicensed use." The agency also teed up a plan that could eventually allow mobile broadband in the adjacent 12.7-13.25 GHz band.
"Thank you to the 100K+ Starlink customers who spoke up, the FCC voted to protect high-speed satellite Internet users from harmful interference," Starlink wrote on Twitter today.
United States

Biden Intends To Pick Lawyer Anna Gomez for FCC To End Agency Deadlock (bloomberg.com) 37

President Joe Biden intends to select veteran government lawyer Anna Gomez to serve on the Federal Communications Commission and give the agency its first Democratic majority of his presidency, Bloomberg reported Thursday, citing a person briefed on the matter. From the report: Gomez's arrival would poise the FCC, after more than two years of partisan deadlock, to act on matters including restoring net neutrality rules that bar broadband providers from interfering with web traffic. Gomez's selection may be announced soon, said the person briefed on the matter, who declined to be identified because the matter hasn't been made public. The FCC has been split 2-to-2 along party lines since Biden's inauguration in 2021. An earlier nominee withdrew amid opposition from Senate Republicans. Gomez, with a long resume of Washington jobs including private law practice and work at two agencies, needs to win confirmation from the Senate where Democrats wield a narrow majority. Democrats including FCC Chairwoman Jessica Rosenworcel have said they support restoring net neutrality rules that bar broadband providers from unfairly manipulating web traffic. The FCC under Republican leadership in 2017 gutted rules adopted earlier by the agency.
Security

Malware Turns Home Routers Into Proxies For Chinese State-Sponsored Hackers (arstechnica.com) 28

An anonymous reader quotes a report from Ars Technica: Researchers on Tuesday unveiled a major discovery -- malicious firmware that can wrangle a wide range of residential and small office routers into a network that stealthily relays traffic to command-and-control servers maintained by Chinese state-sponsored hackers. A firmware implant, revealed in a write-up from Check Point Research, contains a full-featured backdoor that allows attackers to establish communications and file transfers with infected devices, remotely issue commands, and upload, download, and delete files. The implant came in the form of firmware images for TP-Link routers. The well-written C++ code, however, took pains to implement its functionality in a "firmware-agnostic" manner, meaning it would be trivial to modify it to run on other router models.

The main purpose of the malware appears to relay traffic between an infected target and the attackers' command and control servers in a way that obscures the origins and destinations of the communication. With further analysis, Check Point Research eventually discovered that the control infrastructure was operated by hackers tied to Mustang Panda, an advanced persistent threat actor that both the Avast and ESET security firms say works on behalf of the Chinese government.

The researchers discovered the implant while investigating a series of targeted attacks against European foreign affairs entities. The chief component is a backdoor with the internal name Horse Shell. The three main functions of Horse Shell are: a remote shell for executing commands on the infected device; file transfer for uploading and downloading files to and from the infected device; and the exchange of data between two devices using SOCKS5, a protocol for proxying TCP connections to an arbitrary IP address and providing a means for UDP packets to be forwarded. The SOCKS5 functionality seems to be the ultimate purpose of the implant. By creating a chain of infected devices that establish encrypted connections with only the closest two nodes (one in each direction), it's difficult for anyone who stumbles upon one of them to learn the origin or ultimate destination or the true purpose of the infection. As Check Point researchers wrote:
"Learning from history, router implants are often installed on arbitrary devices with no particular interest, with the aim to create a chain of nodes between the main infections and real command and control," Check Point researchers wrote in a shorter write-up. "In other words, infecting a home router does not mean that the homeowner was specifically targeted, but rather that they are only a means to a goal."
Cellphones

Re-Victimization From Police-Auctioned Cell Phones (krebsonsecurity.com) 31

An anonymous reader quotes a report from KrebsOnSecurity: Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first having the data on them erased, a practice that can lead to crime victims being re-victimized, a new study found (PDF). In response, the largest online marketplace for items seized in U.S. law enforcement investigations says it now ensures that all phones sold through its platform will be data-wiped prior to auction.

Researchers at the University of Maryland last year purchased 228 smartphones sold "as-is" from PropertyRoom.com, which bills itself as the largest auction house for police departments in the United States. Of phones they won at auction (at an average of $18 per phone), the researchers found 49 had no PIN or passcode; they were able to guess an additional 11 of the PINs by using the top-40 most popular PIN or swipe patterns. Phones may end up in police custody for any number of reasons -- such as its owner was involved in identity theft -- and in these cases the phone itself was used as a tool to commit the crime. "We initially expected that police would never auction these phones, as they would enable the buyer to recommit the same crimes as the previous owner," the researchers explained in a paper released this month. "Unfortunately, that expectation has proven false in practice."

Beyond what you would expect from unwiped second hand phones -- every text message, picture, email, browser history, location history, etc. -- the 61 phones they were able to access also contained significant amounts of data pertaining to crime -- including victims' data -- the researchers found. [...] Also, the researchers found that many of the phones clearly had personal information on them regarding previous or intended targets of crime: A dozen of the phones had photographs of government-issued IDs. Three of those were on phones that apparently belonged to sex workers; their phones contained communications with clients.
"We informed [PropertyRoom] of our research in October 2022, and they responded that they would review our findings internally," said Dave Levin, an assistant professor of computer science at University of Maryland. "They stopped selling them for a while, but then it slowly came back, and then we made sure we won every auction. And all of the ones we got from that were indeed wiped, except there were four devices that had external SD [storage] cards in them that weren't wiped."
Cellphones

As Wireless Carriers 'Rip and Replace' Chinese-Made Telecom Equipment, Who Pays? (sanjuandailystar.com) 82

"Deep in a pine forest in Wilcox County, Alabama, three workers dangled from the top of a 350-foot cellular tower," reports the New York Times. "They were there to rip out and replace Chinese equipment from the local wireless network..." As the United States and China battle for geopolitical and technological primacy, the fallout has reached rural Alabama and small wireless carriers in dozens of states. They are on the receiving end of the Biden administration's sweeping policies to suppress China's rise, which include trade restrictions, a $52 billion package to bolster domestic semiconductor manufacturing against China and the divestiture of the video app TikTok from its Chinese owner. What the wireless carriers must do, under a program known as "rip and replace," has become the starkest physical manifestation of the tech Cold War between the two superpowers. The program, which took effect in 2020, mandates that American companies tear out telecom equipment made by the Chinese companies Huawei and ZTE. U.S. officials have warned that gear from those companies could be used by Beijing for espionage and to steal commercial secrets.

Instead, U.S. carriers have to use equipment from non-Chinese companies. The Federal Communications Commission, which oversees the program, would then reimburse the carriers from a pot of $1.9 billion intended to cover their costs. Similar rip-and-replace efforts are taking place elsewhere. In Europe, where Huawei products have been a key part of telecom networks, carriers in Belgium, Britain, Denmark, the Netherlands and Sweden have also been swapping out the Chinese equipment because of security concerns, according to Strand Consult, a research firm that tracks the telecom industry. "Rip-and-replace was the first front in a bigger story about the U.S. and China's decoupling, and that story will continue into the next decade with a global race for A.I. and other technologies," said Blair Levin, a former F.C.C. chief of staff and a fellow at the Brookings Institution.

But cleansing U.S. networks of Chinese tech has not been easy. The costs have already ballooned above $5 billion, according to the F.C.C., more than double what Congress appropriated for reimbursements. Many carriers also face long supply chain delays for new equipment. The program's burden has fallen disproportionately on smaller carriers, which relied more on the cheaper gear from the Chinese firms than large companies like AT&T and Verizon. Given rip-and-replace's difficulties, some smaller wireless companies now say they may not be able to upgrade their networks and continue serving their communities, where they are often the only internet providers. "For many rural communities, they are faced with the disastrous choice of having to continue to use insecure networks that are ripe for surveillance or having to cut off their services," said Geoffrey Starks, a Democratic commissioner at the F.C.C.

Last month, Senator Deb Fischer, a Republican of Nebraska, introduced a bill to close the gap in rip-and-replace funding for carriers... In January, the F.C.C. said it had received 126 applications seeking funding beyond what it could reimburse. Lawmakers had underestimated the costs of shredding Huawei and ZTE equipment, and new equipment and labor costs have risen. The F.C.C. said it could cover only about 40 percent of the expenses. Some wireless carriers immediately paused their replacement efforts. "Until we have assurance of total project funding, this project will continue to be delayed as we await the necessary funding required to build and pay for the new network equipment," United Wireless of Dodge City, Kansas, wrote in a regulatory filing to the F.C.C. in January.

Open Source

Despite Layoffs, Open Source and Linux Skills are Still in Demand (zdnet.com) 36

ZDNet reports that Jim Zemlin, executive director at the Linux Foundation, recently noted rounds of tech-industry layoffs "in the name of cost-cutting." But then Zemlin added that "open source is countercyclical to these trends. The Linux Foundation itself, for instance, had its best first quarter ever."

As Hilary Carter, SVP of research and communications at the Linux Foundation, said in her keynote speech at Open Source Summit North America in Vancouver, Canada: "In spite of what the headlines are saying, the facts are 57% of organizations are adding workers this year." Carter was quoting figures from the Linux Foundation's latest job survey, which was released at the event.

Other research also points to brighter signs in tech employment trends. CompTIA's recent analysis of the latest Bureau of Labor Statistics (BLS) data suggests the tech unemployment rate climbed by just 2.3% in April. In fact, more organizations plan to increase their technical staff levels rather than decrease.

The demand for skilled tech talent remains strong, particularly in fast-developing areas, such as cloud and containers, cybersecurity, and artificial intelligence and machine learning. So, what do these all areas of technology have in common? The answer is they're all heavily dependent on open source and Linux technologies.

While layoffs are happening at Microsoft, Amazon, Google, IBM, and even Red Hat, "the Linux Foundation found senior technical roles are seeing the biggest cuts," the article points out. "New hiring is focused on developers and IT managers." And companies are also spending more on training for existing technical staff, "driven by the fact that there aren't enough experts in hot technologies, such as Kubernetes and generative AI, to go around." Interestingly, a college degree is no longer seen as such a huge benefit. Businesses responding to the Linux Foundation's research felt upskilling (91%) and certifications (77%) are more important than a university education (58%) when it comes to addressing technology needs.
Government

Three Companies Faked Millions of Comments Supporting 2017 Repeal of 'Net Neutrality' Rules (yahoo.com) 77

Three companies "supplied millions of fake public comments to influence a 2017 proceeding by the Federal Communications Commission (FCC) to repeal net neutrality rules," announced New York's attorney general this week.

Their investigation "found that the fake comments used the identities of millions of consumers, including thousands of New Yorkers, without their knowledge or consent," as well as "widespread fraud and abusive practices" Collectively, the three companies have agreed to pay $615,000 in penalties and disgorgement. This is the second series of agreements secured by Attorney General James with companies that supplied fake comments to the FCC... As detailed in a report by the Office of the Attorney General, the nation's largest broadband companies funded a secret campaign to generate millions of comments to the FCC in 2017. These comments provided "cover" for the FCC to repeal net neutrality rules. To help generate these comments, the broadband industry engaged commercial lead generators that used advertisements and prizes, like gift cards and sweepstakes entries, to encourage consumers to join the campaign.

However, nearly every lead generator that was hired to enroll consumers in the campaign instead simply fabricated consumers' responses. As a result, more than 8.5 million fake comments that impersonated real people were submitted to the FCC, and more than half a million fake letters were sent to Congress. Two of the companies, LCX and Lead ID, were each engaged to enroll consumers in the campaign. Instead, each independently fabricated responses for 1.5 million consumers. The third company, Ifficient, acted as an intermediary, engaging other lead generators to enroll consumers in the campaign. Ifficient supplied its client with more than 840,000 fake responses it had received from the lead generators it had hired.

The Office of the Attorney General's investigation also revealed that the fraud perpetrated by the various lead generators in the net neutrality campaign infected other government proceedings as well. Several of the lead generation firms involved in the broadband industry's net neutrality comment campaigns had also worked on other, unrelated campaigns to influence regulatory agencies and public officials. In nearly all of these advocacy campaigns, the lead generation firms engaged in fraud. As a result, more than 1 million fake comments were generated for other rulemaking proceedings, and more than 3.5 million fake digital signatures for letters and petitions were generated for federal and state legislators and government officials across the nation.

LCX and Lead ID were responsible for many of these fake comments, letters, and petition signatures. Across four advocacy campaigns in 2017 and 2018, LCX fabricated consumer responses used in approximately 900,000 public comments submitted to the Environmental Protection Agency (EPA) and the Bureau of Ocean Energy Management (BOEM) at the U.S. Department of the Interior. Similarly, in advocacy campaigns between 2017 and 2019, Lead ID fabricated more than half a million consumer responses. These campaigns targeted a variety of government agencies and officials at the federal and state levels...

LCX and its principals will pay $400,000 in penalties and disgorgement to New York and $100,000 to the San Diego District Attorney's Office.

Thanks to Slashdot reader gkelley for sharing the news.
Earth

Societal Cost of 'Forever Chemicals' About $17.5 Trillion Across Global Economy (theguardian.com) 62

An anonymous reader quotes a report from The Guardian: The societal cost of using toxic PFAS or "forever chemicals" across the global economy totals about $17.5 trillion annually, a new analysis of the use of the dangerous compounds has found. Meanwhile, the chemicals yield comparatively paltry profits for the world's largest PFAS manufacturers -- about $4 billion annually. The report, compiled by ChemSec, a Sweden-based NGO that works with industry and policymakers to limit the use of toxic chemicals, partially aims to highlight how the "astronomical" cost of using PFAS is shouldered by governments typically forced to fund the cleanup of pollution and individuals who suffer from health consequences. "If you compare the profits that they make and the cost to society -- it's ridiculous," said Peter Pierrou, ChemSec's communications director.

PFAS are a class of about 15,000 chemicals often used to make products resistant to water, stains and heat. The chemicals are ubiquitous, and linked at low levels of exposure to cancer, thyroid disease, kidney dysfunction, birth defects, autoimmune disease and other serious health problems. They are called "forever chemicals" because they do not naturally degrade. The chemicals are thought to be contaminating drinking water for at least 200 million Americans, while watchdogs have identified thousands of industrial polluters. Similar widespread contamination persists throughout Europe.

ChemSec found 12 companies account for most of the world's PFAS production and pollution. Among them are 3M, Chemours, Solvay, Daiki, Honeywell, BASF, Merk and Bayer, though 3M this year announced it would discontinue making PFAS in part because of regulatory pressure and litigation. [...] The analysis broke down societal costs into four categories. Soil and water remediation are the most expensive, followed by healthcare costs and bio-monitoring of PFAS pollution. While the average market price of PFAS is [about $20.75] for each kilogram, the price spikes to about [$20,456.78] for each kilogram when societal costs are factored in. Beyond profits and pollution, the analysis also provides a closer look at how the chemicals are used across the economy, and whether those uses are "essential" or "non-essential." Banning non-essential uses would probably spell the end of the chemicals in most consumer goods and cut deeply into the industry's profits.

EU

EU Lawyers Say Plan To Scan Private Messages For Child Abuse May Be Unlawful (theguardian.com) 68

An anonymous reader quotes a report from The Guardian: An EU plan under which all WhatsApp, iMessage and Snapchat accounts could be screened for child abuse content has hit a significant obstacle after internal legal advice said it would probably be annulled by the courts for breaching users' rights. Under the proposed "chat controls" regulation, any encrypted service provider could be forced to survey billions of messages, videos and photos for "identifiers" of certain types of content where it was suspected a service was being used to disseminate harmful material. The providers issued with a so-called "detection order" by national bodies would have to alert police if they found evidence of suspected harmful content being shared or the grooming of children.

Privacy campaigners and the service providers have already warned that the proposed EU regulation and a similar online safety bill in the UK risk end-to-end encryption services such as WhatsApp disappearing from Europe. Now leaked internal EU legal advice, which was presented to diplomats from the bloc's member states on 27 April and has been seen by the Guardian, raises significant doubts about the lawfulness of the regulation unveiled by the European Commission in May last year. The legal service of the council of the EU, the decision-making body led by national ministers, has advised the proposed regulation poses a "particularly serious limitation to the rights to privacy and personal data" and that there is a "serious risk" of it falling foul of a judicial review on multiple grounds.

The EU lawyers write that the draft regulation "would require the general and indiscriminate screening of the data processed by a specific service provider, and apply without distinction to all the persons using that specific service, without those persons being, even indirectly, in a situation liable to give rise to criminal prosecution." The legal service goes on to warn that the European court of justice has previously judged the screening of communications metadata is "proportionate only for the purpose of safeguarding national security" and therefore "it is rather unlikely that similar screening of content of communications for the purpose of combating crime of child sexual abuse would be found proportionate, let alone with regard to the conduct not constituting criminal offenses." The lawyers conclude the proposed regulation is at "serious risk of exceeding the limits of what is appropriate and necessary in order to meet the legitimate objectives pursued, and therefore of failing to comply with the principle of proportionality".
The legal service is also concerned about the introduction of age verification technology and processes to popular encrypted services. "The lawyers write that this would necessarily involve the mass profiling of users, or the biometric analysis of the user's face or voice, or alternatively the use of a digital certification system they note 'would necessarily add another layer of interference with the rights and freedoms of the users,'" reports the Guardian.

"Despite the advice, it is understood that 10 EU member states -- Belgium, Bulgaria, Cyprus, Hungary, Ireland, Italy, Latvia, Lithuania, Romania and Spain -- back continuing with the regulation without amendment."
Communications

Europe's Major Satellite Players Line Up To Build Starlink Competitor (arstechnica.com) 91

Eric Berger writes via Ars Technica: A consortium of nearly every major European satellite company announced Tuesday that it plans to bid for a proposed satellite constellation to provide global communications. Essentially, such a constellation would provide the European Union with connectivity from low-Earth orbit similar to what SpaceX's Starlink offers. The bid, which includes large players such as Airbus Defence and Space, Eutelsat, SES, and Thales Alenia Space, comes in response to a request by the European Union for help in constructing a sovereign constellation to provide secure communications for government services, including military applications.

European Union Commissioner Thierry Breton announced the continent's plans for this constellation -- known as Infrastructure for Resilience, Interconnectivity and Security by Satellite, or IRIS^2 -- last November. The European Union will provide 2.4 billion euro, with additional contributions expected from the European Space Agency and private investments. "IRIS^2 establishes space as a vector of our European autonomy, a vector of connectivity and a vector of resilience," Breton said at the time. "It heightens Europe's role as a true space power. With a clear ambition and sense of direction."

The partnership announced Tuesday, which also includes Deutsche Telekom, Hispasat, OHB, Orange, Hisdesat, and Telespazio, will aim to create a state-of-the-art satellite constellation based on a multi-orbit architecture. Although it is top-heavy with established industry players, the partnership said it will encourage startups in the European space sector to join the coalition. This is in response to a desire by Breton to broaden the European commercial space sector. At present, Europe estimates the cost of this constellation at about 6 billion euro and desires it to be ready to provide global coverage by the year 2027.

Government

El Salvador President Signs Law Eliminating Taxes On Tech Innovations (watcher.guru) 19

Following the announcement of the bill in March, El Salvador President Nayib Bukele signed a law today eliminating income, property, capital gains, and other tariffs on technology innovations. Watcher Guru reports: The announcement reinforces El Salvador's perspective as a haven for technology development. Additionally, Bukele stated that the new act protects "technology innovations, software and app programming, AI, computer, and communications hardware manufacturing."

The Innovations and Technology Manufacturing Incentives Act will likely attract tech developments to the country. Moreover, the elimination of taxes presents an economic benefit to a host of companies. Conversely, El Salvador continues to maintain its commitment to a variety of tech innovations that are being developed.

The Internet

Starlink Nixes Plan To Impose 1TB Data Cap and Per-Gigabyte Overage Fees (arstechnica.com) 45

In a policy reversal, Starlink no longer plans to charge data overage fees to standard residential users who exceed 1TB of monthly usage. Ars Technica reports: When SpaceX's Starlink division first announced the data cap in November 2022, it said that residential customers would get 1TB of "priority access data" each month. After using 1TB, customers could keep accessing the Internet at slower (but unspecified) speeds or pay $0.25 per gigabyte for "additional priority access." This was originally supposed to take effect in December, but Starlink delayed the change to February and then to April.

But now, Starlink's list of support FAQs no longer mentions the residential data cap and the current version of the fair use policy says that standard service plan users have unlimited data. The previous version of the Starlink fair use policy described the 1TB residential cap and optional $0.25-per-gigabyte overage fees. Starlink sent an email to users that said, "Good news! Your Starlink subscription will remain unlimited and will no longer be deprioritized after 1TB of data use." Nathan Owens, a Netflix engineer who frequently tweets about Starlink, posted a screenshot of the email yesterday.

AI

China's AI Industry Barely Slowed By US Chip Export Rules (reuters.com) 24

Export controls imposed by the U.S. on microchips, aiming to hinder China's technological advancements, have had minimal effects on the country's tech sector. While the restrictions have slowed down variants of Nvidia's chips for the Chinese market, it has not halted China's progress in areas like AI, as the reduced performance is still an improvement for Chinese firms, and researchers are finding ways to overcome the limitations. Reuters reports: Nvidia has created variants of its chips for the Chinese market that are slowed down to meet U.S. rules. Industry experts told Reuters the newest one - the Nvidia H800, announced in March - will likely take 10% to 30% longer to carry out some AI tasks and could double some costs compared with Nvidia's fastest U.S. chips. Even the slowed Nvidia chips represent an improvement for Chinese firms. Tencent Holdings, one of China's largest tech companies, in April estimated that systems using Nvidia's H800 will cut the time it takes to train its largest AI system by more than half, from 11 days to four days. "The AI companies that we talk to seem to see the handicap as relatively small and manageable," said Charlie Chai, a Shanghai-based analyst with 86Research.

Part of the U.S. strategy in setting the rules was to avoid such a shock that the Chinese would ditch U.S. chips altogether and redouble their own chip-development efforts. "They had to draw the line somewhere, and wherever they drew it, they were going to run into the challenge of how to not be immediately disruptive, but how to also over time degrade China's capability," said one chip industry executive who requested anonymity to talk about private discussions with regulators. The export restrictions have two parts. The first puts a ceiling on a chip's ability to calculate extremely precise numbers, a measure designed to limit supercomputers that can be used in military research. Chip industry sources said that was an effective action. But calculating extremely precise numbers is less relevant in AI work like large language models where the amount of data the chip can chew through is more important. [...] The second U.S. limit is on chip-to-chip transfer speeds, which does affect AI. The models behind technologies such as ChatGPT are too large to fit onto a single chip. Instead, they must be spread over many chips - often thousands at a time -- which all need to communicate with one another.

Nvidia has not disclosed the China-only H800 chip's performance details, but a specification sheet seen by Reuters shows a chip-to-chip speed of 400 gigabytes per second, less than half the peak speed of 900 gigabytes per second for Nvidia's flagship H100 chip available outside China. Some in the AI industry believe that is still plenty of speed. Naveen Rao, chief executive of a startup called MosaicML that specializes in helping AI models to run better on limited hardware, estimated a 10-30% system slowdown. "There are ways to get around all this algorithmically," he said. "I don't see this being a boundary for a very long time -- like 10 years." Moreover, AI researchers are trying to slim down the massive systems they have built to cut the cost of training products similar to ChatGPT and other processes. Those will require fewer chips, reducing chip-to-chip communications and lessening the impact of the U.S. speed limits.

Hardware

New Biocomputing Method Uses Enzymes As Catalysts For DNA-Based Molecular Computing (phys.org) 8

Researchers at the University of Minnesota report via Phys.Org: Biocomputing is typically done either with live cells or with non-living, enzyme-free molecules. Live cells can feed themselves and can heal, but it can be difficult to redirect cells from their ordinary functions toward computation. Non-living molecules solve some of the problems of live cells, but have weak output signals and are difficult to fine-tune and regulate. In new research published in Nature Communications, a team of researchers at the University of Minnesota has developed a platform for a third method of biocomputing: Trumpet, or Transcriptional RNA Universal Multi-Purpose GatE PlaTform.

Trumpet uses biological enzymes as catalysts for DNA-based molecular computing. Researchers performed logic gate operations, similar to operations done by all computers, in test tubes using DNA molecules. A positive gate connection resulted in a phosphorescent glow. The DNA creates a circuit, and a fluorescent RNA compound lights up when the circuit is completed, just like a lightbulb when a circuit board is tested.

The research team demonstrated that:

- The Trumpet platform has the simplicity of molecular biocomputing with added signal amplification and programmability.
- The platform is reliable for encoding all universal Boolean logic gates (NAND, NOT, NOR, AND, and OR), which are fundamental to programming languages.
- The logic gates can be stacked to build more complex circuits.

The team also developed a web-based tool facilitating the design of sequences for the Trumpet platform.
"Trumpet is a non-living molecular platform, so we don't have most of the problems of live cell engineering," said co-author Kate Adamala, assistant professor in the College of Biological Sciences. "We don't have to overcome evolutionary limitations against forcing cells to do things they don't want to do. This also gives Trumpet more stability and reliability, with our logic gates avoiding the leakage problems of live cell operations."

"It could make a lot of long-term neural implants possible. The applications could range from strictly medical, like healing damaged nerve connections or controlling prosthetics, to more sci-fi applications like entertainment or learning and augmented memory," added Adamala.
Books

Spotify Tries To Win Indie Authors By Cutting Audiobook Fees (theverge.com) 5

In an effort to appeal to indie authors, Spotify's Findaway audiobook seller "will no longer take a 20 percent cut of royalties for titles sold on its DIY Voices platform -- so long as the sales are made on Spotify," reports The Verge. From the report: In a company blog post published on Monday, Findaway said that it would "pass on cost-saving efficiencies" from its integration with the streaming service. While it's free for authors to upload their audiobooks onto Findaway's Voices platform, the company normally uses an 80/20 pricing structure -- where Findaway takes a 20 percent fee on all royalties earned. But that fee comes after sales platforms take their own 50 percent cut on the list price. So under the old revenue split, an author who sold a $10 audiobook would have to give $5 to Spotify and $1 to Findaway. But moving forward, that same author will no longer have to pay the $1 distribution fee to Findaway when a sale is made through Spotify.

The margins on audiobooks are exceptionally high, much to the chagrin of the authors. For example, Audible takes 75 percent of retail sales (though it'll only take 60 percent with an exclusivity contract). Many authors share royalties with their narrators and have to pay production fees -- meaning they get an even smaller share of royalties. The move by Spotify and Findaway is likely a bid to draw more indie authors from Audible, which is currently its biggest competitor. But Spotify's audiobooks business -- which it launched last fall -- still has a long way to go. Unlike music or podcasts, most audiobooks on Spotify must be purchased individually, and sales are restricted to its web version. Even CEO Daniel Ek admitted that the current process of buying an audiobook through Spotify is "pretty horrible."
"We at Spotify are just at the beginning of our journey supporting independent authors -- we have many plans for how to help authors expand their reach, maximize revenue, and ultimately build a strong audiobooks business," said Audiobook's communications chief, Laura Pezzini.
AI

A Brain Scanner Combined With an AI Language Model Can Provide a Glimpse Into Your Thoughts 23

An anonymous reader quotes a report from Scientific American: Functional magnetic resonance imaging (fMRI) captures coarse, colorful snapshots of the brain in action. While this specialized type of magnetic resonance imaging has transformed cognitive neuroscience, it isn't a mind-reading machine: neuroscientists can't look at a brain scan and tell what someone was seeing, hearing or thinking in the scanner. But gradually scientists are pushing against that fundamental barrier to translate internal experiences into words using brain imaging. This technology could help people who can't speak or otherwise outwardly communicate such as those who have suffered strokes or are living with amyotrophic lateral sclerosis. Current brain-computer interfaces require the implantation of devices in the brain, but neuroscientists hope to use non-invasive techniques such as fMRI to decipher internal speech without the need for surgery.

Now researchers have taken a step forward by combining fMRI's ability to monitor neural activity with the predictive power of artificial intelligence language models. The hybrid technology has resulted in a decoder that can reproduce, with a surprising level of accuracy, the stories that a person listened to or imagined telling in the scanner. The decoder could even guess the story behind a short film that someone watched in the scanner, though with less accuracy. "There's a lot more information in brain data than we initially thought," said Jerry Tang, a computational neuroscientist at the University of Texas at Austin and the study's lead author, during a press briefing. The research, published on Monday in Nature Communications, is what Tang describes as "a proof of concept that language can be decoded from noninvasive recordings of brain activity."

The decoder technology is in its infancy. It must be trained extensively for each person who uses it, and it doesn't construct an exact transcript of the words they heard or imagined. But it is still a notable advance. Researchers now know that the AI language system, an early relative of the model behind ChatGPT, can help make informed guesses about the words that evoked brain activity just by looking at fMRI brain scans. While current technological limitations prevent the decoder from being widely used, for good or ill, the authors emphasize the need to enact proactive policies that protect the privacy of one's internal mental processes. [...] The model misses a lot about the stories it decodes. It struggles with grammatical features such as pronouns. It can't decipher proper nouns such as names and places, and sometimes it just gets things wrong altogether. But it achieves a high level of accuracy, compared with past methods. Between 72 and 82 percent of the time in the stories, the decoder was more accurate at decoding their meaning than would be expected from random chance.
Here's an example of what one study participant heard, as transcribed in the paper: "i got up from the air mattress and pressed my face against the glass of the bedroom window expecting to see eyes staring back at me but instead finding only darkness." The model went on to decode: "i just continued to walk up to the window and open the glass i stood on my toes and peered out i didn't see anything and looked up again i saw nothing."

The research was published in the journal Nature Communications.

Slashdot Top Deals