×
Communications

Trump Posted Classified Satellite Imagery On Twitter As President (npr.org) 342

According to documents recently declassified by the National Geospatial-Intelligence Agency (NGA), former President Donald Trump posted a classified satellite image of a failed rocket launch in Iran on Twitter in 2019. NPR reports: Now, three years after Trump's tweet, the National Geospatial-Intelligence Agency (NGA) has formally declassified the original image. The declassification, which came as the result of a Freedom of Information Act request by NPR, followed a grueling Pentagon-wide review to determine whether the briefing slide it came from could be shared with the public. Many details on the original image remain redacted -- a clear sign that Trump was sharing some of the U.S. government's most prized intelligence on social media, says Steven Aftergood, specialist in secrecy and classification at the Federation of American Scientists. "He was getting literally a bird's eye view of some of the most sensitive US intelligence on Iran," he says. "And the first thing he seemed to want to do was to blurt it out over Twitter." "[A]erospace experts determined the photo was taken by a classified spacecraft called USA 224, believed to be a multibillion-dollar KH-11 reconnaissance aircraft," adds Gizmodo. "The spacecraft is similar to the Hubble Telescope, but instead of getting a closer look at the stars, it views the Earth's surface."
Sci-Fi

FBI, Air Force Agents Mysteriously Raid House of Guy Who Runs Area 51 Blog (gizmodo.com) 107

Earlier this month, agents from both the FBI and the U.S. Air Force raided multiple homes belonging to a man who runs a little-known blog about Area 51. Gizmodo reports: That man, Joerg Arnu, said the swarm of federal agents in riot gear busted into his primary residence, handcuffed him, then marched him outside to wait in the freezing cold while they rifled through his apartment and took pretty much every piece of electronic equipment that he owned. So far, the government has been pretty tight-lipped about the whole thing, but officials did verify that it happened. In a statement provided to the Las Vegas Review-Journal, Lt. Col. Bryon McGarry confirmed the raid. He did not elaborate on its purpose, saying only: "This is an open and ongoing law enforcement investigation between the Las Vegas FBI and Air Force OSI."

What did cops want? It's not exactly clear. Since 1999, Arnu has run Dreamland Resort, a website that covers activities in and around Area 51, the notoriously secretive government facility located in Groom Lake, Nevada. Long the subject of speculation and curiosity, the highly classified facility is the site of myriad UFO sightings. Coincidentally (or not), it is also the location where the Air Force reportedly tests and develops some of its most sensitive and experimental new projects and aircraft (see: the U-2 spy plane in the 1950s, for instance). Among other things, Arnu's site features pictures and writing about the Air Force's so-called "black projects" -- opaque, classified operations carried out behind a veil of government secrecy.
Arnu claims that the agents confiscated his "laptops, phones, backup drives, camera gear, and my drone were seized." He describes the situation in detail in a blog post on his website.
United States

The Surprising Afterlife of Unwanted Atom Bombs (nytimes.com) 122

What happens when old atomic bombs are retired? Last month, the Biden administration announced its intention to withdraw the nation's most powerful weapon from the U.S. nuclear arsenal. From a report: The bomb is called the B83. It is a hydrogen bomb that debuted in 1983 -- a time when President Reagan was denouncing Russia as "an evil empire." The government made 660 of the deadly weapons, which were to be delivered by fast bombers. The B83 was 12 feet long, had fins and packed an explosive force roughly 80 times greater than that of the Hiroshima bomb. Its job was to obliterate hardened military sites and command bunkers, including Moscow's.

What now for the B83? How many still exist is a federal secret, but not the weapon's likely fate, which may surprise anyone who assumes that getting rid of a nuclear weapon means that it vanishes from the face of the earth. Typically, nuclear arms retired from the U.S. arsenal are not melted down, pulverized, crushed, buried or otherwise destroyed. Instead, they are painstakingly disassembled, and their parts, including their deadly plutonium cores, are kept in a maze of bunkers and warehouses across the United States. Any individual facility within this gargantuan complex can act as a kind of used-parts superstore from which new weapons can -- and do -- emerge.

The Military

After 908 Days in Orbit, US Military's X-37B Space Plane Finally Lands (space.com) 25

After 908 days in orbit, the U.S. military's X-37B space plane finally touched down today in Florida, reports Space.com.

And "the Boeing-built space plane also carried a service module on the newly completed mission, a first for the U.S. Space Force's X-37B program." "With the service module added, this was the most we've ever carried to orbit on the X-37B, and we're proud to have been able to prove out this new and flexible capability for the government and its industry partners," Jim Chilton, senior vice president at Boeing Space and Launch, said in a statement today.

The X-37B resembles NASA's now-retired space shuttle but is much smaller, measuring just 29 feet (8.8 meters) from nose to tail. The space shuttle was 122 feet (37 m) long and was piloted — another key difference, as the X-37B is autonomous.

The U.S. Space Force is thought to own two X-37B vehicles, both of which were provided by Boeing. To date, the duo has flown six orbital missions, each of which is known by the signifier OTV ("Orbital Test Vehicle"):

OTV-1: Launched on April 22, 2010 and landed on Dec. 3, 2010 (duration 224 days).
OTV-2: March 5, 2011 to June 16, 2012 (468 days).
OTV-3: Dec. 11, 2012 to Oct. 17, 2014 (674 days).
OTV-4: May 20, 2015 to May 7, 2015 (718 days).
OTV-5: Sept. 7, 2017 to Oct. 27, 2019 (780 days).
OTV-6: May 17, 2020 to Nov. 12, 2022 (908 days).

Technology

Engineers Explore Radical New Designs for Commercial Planes To Cut Energy Consumption and Emission (wsj.com) 83

Modern airliner designs date from the 1950s: a metal tube and swept-back wings with jet engines slung underneath. They get you where you're going and back. But after decades of research, something very different could be flying you on vacation by the late 2030s. From a report: Unconventional designs such as "blended-wing" shapes now used for some military jets, which combine the cabin and wings in one piece, have been floated for years as possibilities for passenger aircraft. Now the rise of climate-change concerns and emergence of new manufacturing materials have brought a rethink a step closer to reality, scientists at the National Aeronautics and Space Administration say. Just about every fuel-saving aerodynamic efficiency has been wrung out of existing aircraft. The next generation will need bolder designs to meet new environmental standards and airline economics, and that's forcing plane makers back to the drawing board.

The designs now exist mainly as artists' renderings, models and small-scale prototypes. That could be set to finally change. NASA in June launched a competition for U.S. companies to design and build a full-scale demonstrator. The rules require entrants to target planes around the size of a Boeing Co. 737 that can carry 150 passengers. The agency wants a prototype that could fly as early as 2027 and be ready for mass production in the next decade. The agency won't comment on the proposals submitted by the September deadline, but points to the recent history of alternative designs by researchers and aircraft makers. These include plane bodies that look like flying wings with passengers seated 10 or more across, compared with rows of six on a Boeing 737. Others have long, thin wings that would have to fold to fit into airport gates. In some designs, jets under the wing are replaced by rear-facing propellers mounted on the back of the plane.

NASA held a similar competition 10 years ago that focused more on the efficiency of the designs than the ability to make them commercially feasible. Now, it is focused on aircraft that are more efficient and can enter the fleet to make a difference to aviation industry emissions. "We've been working on advanced configurations for 20 years, but last time I went to the airport I didn't see any of them flying around," says Brent Cobleigh, NASA's flight demonstrations and capabilities project manager. Aircraft designers have coalesced around three main designs, which people involved in the latest contest said are expected to feature prominently in the entries. They carry exotic names -- such as transonic truss-braced wings, blended-wing bodies and double bubbles -- that reflect how far removed they are from most of the conventional planes that now carry commercial passengers worldwide. NASA earmarked only around $1 billion of its $26 billion fiscal 2023 budget request for aircraft-related activities, in line with past years, but officials say its work has influenced every part of planes now flying.

Privacy

Mysterious Company With Government Ties Plays Key Internet Role (washingtonpost.com) 67

whoever57 writes: Would you trust your communications to a company that has links to a spyware company and claims that its address is a UPS store in Toronto? You probably already do. Washington Post reports: An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly.

The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which public contracting records and company documents show has sold communication interception services to U.S. government agencies for more than a decade. One of those TrustCor partners has the same name as a holding company managed by Raymond Saulino, who was quoted in a 2010 Wired article as a spokesman for Packet Forensics. Saulino also surfaced in 2021 as a contact for another company, Global Resource Systems, that caused speculation in the tech world when it briefly activated and ran more than 100 million previously dormant IP addresses assigned decades earlier to the Pentagon. The Pentagon reclaimed the digital territory months later, and it remains unclear what the brief transfer was about, but researchers said the activation of those IP addresses could have given the military access to a huge amount of internet traffic without revealing that the government was receiving it.
whoever57 has also shared a unpaywalled link to the story.
Social Networks

Russia Reactivates Its Trolls and Bots Ahead of Tuesday's Midterms (nytimes.com) 289

An anonymous reader quotes a report from the New York Times: The user on Gab who identifies as Nora Berka resurfaced in August after a yearlong silence on the social media platform, reposting a handful of messages with sharply conservative political themes before writing a stream of original vitriol. The posts mostly denigrated President Biden and other prominent Democrats, sometimes obscenely. They also lamented the use of taxpayer dollars to supportUkraine in its war against invading Russian forces, depicting Ukraine's president as a caricature straight out of Russian propaganda. The fusion of political concerns was no coincidence. The account was previously linked to the same secretive Russian agency that interfered in the 2016 presidential election and again in 2020, the Internet Research Agency in St. Petersburg, according to the cybersecurity group Recorded Future. It is part of what the group and other researchers have identified as a new, though more narrowly targeted, Russian effort ahead ofTuesday's midterm elections. The goal, as before, is to stoke anger among conservative voters and to undermine trust in the American electoral system. This time, it also appears intended to undermine the Biden administration's extensive military assistance to Ukraine.

"It's clear they are trying to get them to cut off aid and money to Ukraine," said Alex Plitsas, a former Army soldier and Pentagon information operations official now with Providence Consulting Group, a business technology company. The campaign -- using accounts that pose as enraged Americans like Nora Berka -- have added fuel to the most divisive political and cultural issues in the country today. It has specifically targeted Democratic candidates in the most contested races, including the Senate seats up for grabs in Ohio, Arizona and Pennsylvania, calculating that a Republican majority in the Senate and the House of Representatives could help the Russian war effort. The campaigns show not only how vulnerable the American political system remains to foreign manipulation but also how purveyors of disinformation have evolved and adapted to efforts by the major social media platforms to remove or play down false or deceptive content. The agencies urged people not to like, discuss or share posts online from unknown or distrustful sources. They did not identify specific efforts, but social media platforms and researchers who track disinformation have recently uncovered a variety of campaigns by Russia, China and Iran.

These are much smaller campaigns than those in the 2016 election, where inauthentic accounts reached millions of voters across the political spectrum on Facebook and other major platforms. The efforts are no less pernicious, though, in reaching impressionable users who can help accomplish Russian objectives, researchers said. "The audiences are much, much smaller than on your other traditional social media networks," said Brian Liston, a senior intelligence analyst with Recorded Future who identified the Nora Berka account. "But you can engage the audiences in much more targeted influence ops because those who are on these platforms are generally U.S. conservatives who are maybe more accepting of conspiratorial claims."
Some characteristics of an inauthentic user to look out for include: no profile picture, no identifying biographical details, and posts exclusively on political issues that often include false or misleading posts and little engagement. They may also link to obscure websites like electiontruth.net, which Recorded Future said was almost certainly linked to the Russian campaign.
United States

Latest US Defense-Intelligence Report on UFOs To Be Made Public Soon (reuters.com) 58

A declassified version of the latest U.S. defense-intelligence report on UFOs -- rebranded in official government parlance as "unidentified aerial phenomena" -- is expected to be made public in the coming days. From a report: But UFO enthusiasts hoping for the government to judge any of the hundreds of U.S. military sightings under scrutiny as visits by extraterrestrial spacecraft are likely to be disappointed. The most recent incidents under review are attributed to a mix of foreign surveillance, including relatively ordinary drone flights, and airborne clutter such as weather balloons, The New York Times reported last week, citing U.S. officials familiar with a classified analysis that was due for delivery to Congress on Monday, Oct. 31.

Many of an older set of unexplained aerial phenomena, or UAPs, are still officially categorized as unexplained, with too little data analysis to draw conclusions, the Times said. "There is no single explanation that addresses the majority of UAP reports," U.S. Defense Department spokesperson Sue Gough said in a statement this week. "We are collecting as much data as we can, following the data where it leads, and will share our findings whenever possible."

Security

Red Cross Seeks 'Digital Emblem' To Protect Against Hacking (apnews.com) 50

An anonymous reader quotes a report from the Associated Press: The International Committee of the Red Cross said Thursday it is seeking support to create a "digital red cross/red crescent emblem" that would make clear to military and other hackers that they have entered the computer systems of medical facilities or Red Cross offices. The Geneva-based humanitarian organization said it was calling on governments, Red Cross and Red Crescent societies, and IT experts to join forces in developing "concrete ways to protect medical and humanitarian services from digital harm during armed conflict."

For over 150 years, symbols such as the red cross have been used to make clear that "in times of armed conflict, those who wear the red cross or facilities and objects marked with them must be protected from harm," the ICRC said. That same obligation should apply online, the organization said, noting that hacking operations in conflicts were likely to increase as more militaries develop cyber capabilities. The organization said that for the proposed "digital emblem" to become reality, nations worldwide would have to agree on its use and make it part of international humanitarian law alongside existing humanitarian insignia. It hopes the emblem would identify the computer systems of protected facilities much as a red cross or crescent on a hospital roof does in the real world.
"The International Committee of the Red Cross said that it has identified three technical possibilities: a DNS-based emblem that would use a special label to link it to a domain name; an IP-based emblem; and an ADEM, or authenticated digital emblem, system that would use certificate chains to signal protection," adds the report.
Power

China's Submarines May Soon Be Powered By Lithium Batteries (interestingengineering.com) 93

The Chinese Navy could finally use lithium technology to replace the lead-acid batteries that are now used in its fleet of conventional submarines. Interesting Engineering reports: Since lithium batteries had a higher risk of catching fire or exploding, the navy was hesitant to replace the submarine fleet's current batteries with them. But, "after solving these problems, the replacement of lead-acid batteries with lithium batteries in conventional submarines is just around the corner," said Wang Feng, study lead and a submarine designer. The study claims that technical answers have been discovered through significant testing and development in China's electric car sector, and lithium batteries have been demonstrated to operate safely under difficult circumstances. The modifications could considerably improve a submarine's capacity for survival and battle, according to research that was released on October 15 in the peer-reviewed Chinese journal Marine Electric and Electronic Engineering.

For more than a decade, the Chinese military has planned to replace the lead-acid batteries in its fleet of conventional submarines with lithium technology. The lead-acid batteries on these submarines, which have not seen significant development since World War II, have proved problematic due to their poor energy storage capacity, delayed charging, limited power output, short lifespan, and harmful gas leaks, according to the paper. Nickel and cobalt, which are added to batteries to increase performance, were a contributing factor to mishaps; however, some Chinese battery manufacturers have begun using iron and phosphate in their place recently.

AI

Can Technology Help Us Talk to Animals? (vox.com) 50

"Today, tools like drones, digital recorders, and artificial intelligence are helping us listen to the sounds of nature in unprecedented ways," writes Vox, citing Karen Bakker, author of the new book Sounds of Life: How Digital Technology Is Bringing Us Closer to the Worlds of Animals and Plants.

But how far will this lead? Automated listening posts have been set up in ecosystems around the planet, from rainforests to the depths of the ocean, and miniaturization has allowed scientists to stick microphones onto animals as small as honeybees. "Combined, these digital devices function like a planetary-scale hearing aid: enabling humans to observe and study nature's sounds beyond the limits of our sensory capabilities," Bakker writes.

All those devices create a ton of data, which would be impossible to go through manually. So researchers in the fields of bioacoustics (which studies sounds made by living organisms) and ecoacoustics (which studies the sounds made by entire ecosystems) are turning to artificial intelligence to sift through the piles of recordings, finding patterns that might help us understand what animals are saying to each other. There are now databases of whale songs and honeybee dances, among others, that Bakker writes could one day turn into "a zoological version of Google Translate."

In an interview with Vox, the author points out that already "We can use artificial intelligence-enabled robots to speak animal languages and essentially breach the barrier of interspecies communication. Researchers are doing this in a very rudimentary way with honeybees and dolphins and to some extent with elephants.

"Now, this raises a very serious ethical question..." I'll give you one example. A research team in Germany encoded honeybee signals into a robot that they sent into a hive. That robot is able to use the honeybees' waggle dance communication to tell the honeybees to stop moving, and it's able to tell those honeybees where to fly to for a specific nectar source. The next stage in this research is to implant these robots into honeybee hives so the hives accept these robots as members of their community from birth. And then we would have an unprecedented degree of control over the hive; we'll have essentially domesticated that hive in a way we've never done so before. This creates the possibility of exploitive use of animals. And there's a long history of the military use of animals, so that's one path that I think raises a lot of alarm bells.
United States

Many Military UFO Reports Are Just Foreign Spying or Airborne Trash (nytimes.com) 52

Government officials believe that surveillance operations by foreign powers and weather balloons or other airborne clutter explain most recent incidents of unidentified aerial phenomenon -- government-speak for U.F.O.s -- as well as many episodes in past years. From a report: The sightings have puzzled the Pentagon and intelligence agencies for years, fueling theories about visiting space aliens and spying by a hostile nation using advanced technology. But government officials say many of the incidents have far more ordinary explanations. Intelligence agencies are set to deliver a classified document to Congress by Monday updating a report made public last year that said nearly all of the incidents remain unexplained. The original document looked at 144 incidents between 2004 and 2021 that were reported by U.S. government sources, mostly American military personnel.

This article is based on interviews with American officials familiar with the findings of the Pentagon and intelligence agencies' examination of the incidents. The officials spoke on the condition of anonymity to discuss the classified work. Some of the incidents have been formally attributed to Chinese surveillance -- with relatively ordinary drone technology -- and others are also thought to be connected to Beijing. China, which has stolen plans for advanced fighter planes, wants to learn more about how the United States trains its military pilots, according to American officials.

Sci-Fi

NASA Kicks Off Independent UFO Study (cnn.com) 68

NASA's independent study to delve into the mysteries surrounding unidentified aerial phenomena kicked off today. CNN reports: The group will include experts across numerous disciplines -- including astrobiology, data science, oceanography, genetics, policy and planetary science -- as well as retired NASA astronaut Scott Kelly, a former fighter pilot and test pilot and retired US Navy captain. The space agency, which first announced it was forming the group in June, previously revealed that the team would be led by astrophysicist David Spergel, who is president of the Simons Foundation in New York City.

The new group won't necessarily seek to determine exactly what the UAPs, which have been seen moving through restricted military airspace over the past several decades, are. Rather, the team will look to hash out exactly how it's best for NASA to approach further study of the phenomenon. The space agency has already noted that the limited number of observations of UAPs has made it difficult to draw scientific conclusions about the nature of such events. "Without access to an extensive set of data, it is nearly impossible to verify or explain any observation, thus the focus of the study is to inform NASA what possible data could be collected in the future to scientifically discern the nature of UAP," according to a NASA news release.

This study, expected to last about nine months, will also be entirely unclassified and within the public domain. "Exploring the unknown in space and the atmosphere is at the heart of who we are at NASA," Zurbuchen said in a Friday statement. "Understanding the data we have surrounding unidentified aerial phenomena is critical to helping us draw scientific conclusions about what is happening in our skies. Data is the language of scientists and makes the unexplainable, explainable." Specifically, the team will look for data on "events in the sky that cannot be identified as aircraft or known natural phenomena -- from a scientific perspective," the agency said. Unidentified aerial phenomena are of interest, NASA said, from a security and safety perspective. There was no evidence UAPs are extraterrestrial in origin, NASA emphasized during the initial announcement in June.

The Military

AI-Assisted Guns Deployed By Israel To Track Targets In the West Bank (euronews.com) 167

Israel has deployed a new kind of robotic weapon over a Palestinian refugee camp in the West Bank, reports Euronews. "The twin gun turrets can fire tear gas, stun grenades, and sponge-tipped bullets."

"Operated by trained soldiers, they track their targets using AI."

Slashdot reader DevNull127 writes: A Euronews video features footage of Sharone Aloni, Research and Development VP of Sharp Shooter, demonstrating one of the company's devices with an automatic Fire Control System. "Inside here, you have the computer running all the artificial intelligence, computer vision algorithms, which makes this what we call a true fire control system," Aloni says. "It's not only just relying on static information. It actually considers the human, the soldier, which is not stable. He's under pressure. He's tired. Sometimes he didn't get enough training. And also, the target is usually dynamic, and it's moving all the time."

The company's web site promises the systems "significantly increase weapon accuracy." And according to Euronews, Israel's army "says the tech protects soldiers, who can fire more accurately at a distance." But Omar Shakir, Human Rights Watch's director for Israel and Palestine, counters that when he hears claims of a reduction in risks, "that's often a one-sided kind of risk. It might minimize the risk for the occupying force or the army deploying it, but often it invariably increases the risk to affected communities." Sophisticated weapons systems "will lack elements of human control and agency that are often the difference between life and death." Euronews adds that "Palestinians and human rights experts say the weapons are dehumanizing, dangerous and unaccountable."

Sharp Shooter has a response to that, according to Eurnoews: the robotic guns are not fully automated, so a soldier must always pull the trigger, with the system only firing "after algorithms assess factors like wind speed, distance and velocity." And Michal Mor, Sharp Shooter's CEO and founder, also describes its utility in fighting a terrorist. "Usually the terrorist will be inside a civilian environment with many people that we do not want to hurt.

"We're enabling the soldier to look through his fire control system, to make sure that the target that he wants to hit is the legitimate target. Once he locks on the target, the system will make sure that the round will be released when he presses the trigger, only on the legitimate target, and none of the bystanders can be hit by the weapon."

The Israeli army stressed to Euronews that their deployment isn't using live rounds, and can only fire tear gas, stun grenades, and sponge-tipped bullets.

A resident of the refugee camp tells Euronews that the gun "is very fast, even faster than the soldiers."
Communications

Dallas Air Traffic Rerouted As FAA Probes Faulty GPS Signals (bloomberg.com) 54

An anonymous reader quotes a report from Bloomberg: Flights into the Dallas area are being forced to take older, cumbersome routes and a runway at Dallas-Fort Worth International Airport was temporarily closed after aviation authorities said GPS signals there aren't reliable. The Federal Aviation Administration said in an emailed statement Tuesday it's investigating the possible jamming of the global-positioning system that aircraft increasingly use to guide them on more efficient routes and to runways. So far, the agency has found "no evidence of intentional interference," it said. American Airlines, the primary carrier at DFW, said the GPS issue is not affecting its operations. Southwest Airlines, which flies from nearby Love Field, said it also isn't experiencing any disruptions. The FAA reopened the closed runway earlier on Tuesday.

The GPS problem -- despite the lack of impact -- highlights the risk of widespread reliance on the weak GPS radio signals from space used for everything from timing stock trades to guiding jetliners. The FAA occasionally warns pilots in advance of military testing that may degrade the GPS signals and pilots sometimes report short-lived problems, but the interference in Dallas is atypical, said Dan Streufert, founder of the flight-tracking website ADSBexchange.com. "In the US, it's very unusual to see this without a prior notice," Streufert said in an interview. ADSBExchange.com monitors aircraft data streams that indicate the accuracy of the GPS signals they are receiving and the website began seeing problems around Dallas on Monday, he said. The military has told the FAA it isn't conducting any operations that would interfere with GPS in that area, said a person familiar with the situation who wasn't authorized to speak publicly about it. The primary way FAA's air-traffic system tracks planes is based on GPS, but older radars and radio-direction beacons have remained in place as backups.

Microsoft

Microsoft's Army Goggles Left US Soldiers With Nausea, Headaches in Test (bloomberg.com) 68

US soldiers using Microsoft's new goggles in their latest field test suffered "mission-affecting physical impairments" including headaches, eyestrain and nausea, according to a summary of the exercise compiled by the Pentagon's testing office. From a report: More than 80% of those who experienced discomfort had symptoms after less than three hours using the customized version of Microsoft's HoloLens goggles, Nickolas Guertin, director of Operation Test and Evaluation, said in a summary for Army and Defense Department officials. He said the system also is still experiencing too many failures of essential functions. The problems found in the testing in May and June were outlined in a 79-page report this month. The Army marked it "Controlled Unclassified Information" to prevent public distribution, but Bloomberg News obtained a summary. Despite the device's flaws, Guertin doesn't deem it a lost cause. He recommended that the Army "prioritize improvements" before widespread deployment to reduce the "physical discomfort of users." He said improvements are also needed to the goggle's low-light sensors, display clarity, field of vision and poor reliability of some essential functions.
China

China May Prove Arm Wrong About RISC-V's Role In the Datacenter (theregister.com) 49

Arm might not think RISC-V is a threat to its newfound foothold in the datacenter, but growing pressure on Chinese chipmaking could ultimately change that, Forrester Research analyst Glenn O'Donnell tells The Register. From the report: Over the past few years the US has piled on export bans and trade restrictions on Chinese chipmakers in an effort to stall the country's semiconductor industry. This has included barring companies with ties to the Chinese military from purchasing x86 processors and AI kit from the likes of Intel, AMD, and Nvidia. "Because the US-China trade war restricts x86 sales to China, Chinese infrastructure vendors and cloud providers need to adapt to remain in business," O'Donnell said. "They initially pivoted to Arm, but trade restrictions exist there too. Chinese players are showing great interest in RISC-V."

RISC-V provides China with a shortcut around the laborious prospect of developing their own architecture. "Coming up with a whole new architecture is nearly impossible," O'Donnell said. But "a design based on some architecture is very different from the architecture itself." So it should come as no surprise that the majority of RISC-V members are based in China, according to a report published last year. And the country's government-backed Chinese Academy of Sciences is actively developing open source RISC-V performance processors.

Alibaba's T-Head, which is already deploying Arm server processors and smartNICs, is also exploring RISC-V-based platforms. But for now, they're largely limited to edge and IoT appliances. However, O'Donnell emphasizes that there is no technical reason that would prevent someone from developing a server-grade RISC-V chip. "Similar to Arm, many people dismiss RISC-V as underpowered for more demanding applications. They are wrong. Both are architectures, not specific designs. As such, one can design a powerful processor based on either architecture," he said. [...] One of the most attractive things about RISC-V over Softbank-owned Arm is the relatively low cost of building chips based on the tech, especially for highly commoditized use cases like embedded processors, O'Donnell explained. While nowhere as glamorous as something like a server CPU, embedded applications are one of RISC-V's first avenues into the datacenter. [...] These embedded applications are where O'Donnell expects RISC-V will see widespread adoption, including in the datacenter. Whether the open source ISA will rise to the level of Arm or x86 is another matter entirely.

United States

The Biden Administration Issues Sweeping New Rules on Chip-Tech Exports To China (protocol.com) 90

The U.S. unveiled a set of new regulations Friday that aim to choke off China's access to advanced chips, the tools necessary to manufacture years-old designs, and the service and support mechanisms needed to keep chip fabrication systems running smoothly. From a report: On a briefing call with reporters Thursday, administration officials said the goal is to block the People's Liberation Army and China's domestic surveillance apparatus from gaining access to advanced computing capabilities that require the use of advanced semiconductors. The chips, tools, and software are helping China's military, including aiding the development of weapons of mass destruction, according to the officials, who asked to remain anonymous to discuss the administration's policies freely.

The new rules are comprehensive, and cover a range of advanced semiconductor technology, from chips produced by the likes of AMD and Nvidia to the expensive, complex equipment needed to make those chips. Much of highest-quality chip manufacturing equipment is made by three U.S. companies: KLA, Applied Materials, and Lam Research, and cutting off China's access to their tools has the potential to damage the country's ambitions to become a chipmaking powerhouse. The Biden administration's new controls on chip exports represent a significant shift in U.S. policy related to China. For decades, the U.S. has attempted to keep China two generations of tech behind, typically by denying China access to the tools necessary to make advanced chips, or other technology, themselves. Now, the goal looks to be to cripple China's ability to produce chips with technology that is nearly a decade old, several generations behind the state-of-the-art capabilities.

Businesses

Amazon Provides Cloud Technology For a Chinese Military Company (nationalreview.com) 10

New submitter Billi-13 shares a report: Amazon's business relationships with two Chinese surveillance giants, Hikvision and Dahua, may violate a law prohibiting federal contractors from doing business with certain Chinese firms, a joint investigation by National Review and IPVM, a surveillance and security research group, reveals. While lawmakers are calling out these practices, Amazon has defended them and maintains that it is in full compliance with the law. Specifically, the Seattle-based tech giant might be running afoul of a provision in the 2019 National Defense Authorization Act barring contracts with firms that use certain Chinese surveillance hardware or software. One potentially significant issue is that Amazon Web Services simultaneously provides cloud Internet services to the U.S. National Security Agency and Hikvision, which the U.S. government designated as a Chinese military-industrial complex company last year.

"Facing a clear threat to federal networks, Congress drew a line in the sand for its contractors: if you do business with Hikvision or Dahua, you can't do business with the federal government," said Conor Healy, IPVM's director of government research. "Amazon seems determined to do the opposite. It is actively facilitating and incubating the very threat Congress sought to mitigate." Even absent the NDAA ban, enforcement of which is spotty, the record of the two Chinese surveillance firms -- neither of which responded to NR's requests for comment -- should be cause for concern. In 2019, Hikvision and Dahua were both blacklisted by the Commerce Department for their extensive work with the authorities in Xinjiang, as the Chinese Communist Party built out a sophisticated police state to systematically target ethnic minorities in the region. Dahua sells cameras that can identify Uyghur faces, with an alarm that goes off when they are in view. The company characterizes this as a smart-policing feature to detect "real-time Uyghur warnings" and "hidden terrorist inclinations." Hikvision, in addition to providing cameras used in Xinjiang prison camps, sells "tiger chair" torture and interrogation systems, among other things. Hikvision also has a well-documented relationship with the Chinese military, providing the People's Liberation Army air force with drone jammers, and pitching its technology as key to improving missile and tank systems.

Patents

Meta Ordered To Pay $175 Million For Copying Green Beret Veteran's App (militarytimes.com) 36

Meta, the parent company of Facebook and Instagram, was found by a federal jury in Austin, Texas, to have infringed on two patents held by Voxer, a walkie talkie messaging app founded by a former Army Green Beret. The social media giant was ordered to pay nearly $175 million in damages. Military Times reports: Voxer launched the app in 2011, which was named Best Overall App in the First Annual Silicon Valley Business App Awards in 2013. In 2012, Facebook approached Voxer about a potential collaboration that led to Voxer sharing its patents and proprietary information with the company. "When early meetings did not result in an agreement, Facebook identified Voxer as a competitor although Facebook had no live video or voice product at the time," court filings read. "Facebook revoked Voxer's access to key components of the Facebook platform and launched Facebook Live in 2015 followed by Instagram Live in 2016. Both products incorporate Voxer's technologies and infringe its patents."

The Texas jury found that Facebook Live and Instagram Live incorporated two pieces of Voxer's technologies that involve streaming media over networks. Meta countered in court filings that "Facebook has prioritized live video messaging since the launch of Facebook Live and Instagram Live, with one report identifying Facebook Live as Facebook's 'top priority.'"
In a statement to TechCrunch, Meta said the social media company will continue to press the issue through the courts. "We believe the evidence at trial demonstrated that Meta did not infringe Voxer's patents," Meta's spokesperson said in the statement. "We intend to seek further relief, including filing an appeal."

Slashdot Top Deals