United States

US To Test Nuclear-powered Spacecraft by 2027 (reuters.com) 103

The United States plans to test a spacecraft engine powered by nuclear fission by 2027 as part of a long-term NASA effort to demonstrate more efficient methods of propelling astronauts to Mars in the future, the space agency's chief said Tuesday. From a report: NASA will partner with the U.S. military's research and development agency, DARPA, to develop a nuclear thermal propulsion engine and launch it to space "as soon as 2027," NASA administrator Bill Nelson said during a conference in National Harbor, Maryland.
Space

Watch SpaceX's Falcon Heavy Launch - the First of Its Five Missions This Year (youtube.com) 31

Watch a rare launch of SpaceX's massive Falcon Heavy rocket livestreamed on SpaceX's YouTube channel.

"Nearly five years have passed since the massive Falcon Heavy rocket made its successful debut launch in February 2018," writes Ars Technica.

"Since then, however, SpaceX's heavy lift rocket has flown just three additional times." Why? It's partly because there is simply not all that much demand for a heavy lift rocket. Another factor is that SpaceX has increased the performance of its Falcon 9 rocket so much that it can complete a lot of the missions originally manifested on the Falcon Heavy. However the main reason for the low cadence has been due to a lack of readiness of payloads for the new rocket, particularly from the US Department of Defense. But now this trickle of Falcon Heavy launches may turn into a flood. [Sunday's launch is the first of potentially five launches this year]

SpaceX completed a hot fire test of the rocket on Tuesday, and declared that the vehicle was ready for liftoff. The rocket will use a brand new core stage, and side-mounted boosters that have flown into space one time, as side-mounted boosters on the USSF-44 Falcon Heavy mission that launched on November 1 2022.

What's it carrying? Space.com writes: The main payload is a military communications satellite called Continuous Broadcast Augmenting SATCOM 2, which the Falcon Heavy will send to geostationary orbit, about 22,200 miles (35,700 kilometers) above Earth. Also flying Saturday is a rideshare spacecraft called Long Duration Propulsive ESPA (LDPE)-3A, a payload adapter that can hold up to six small satellites, according to EverydayAstronaut.com. LDPE-3A will carry five Space Force payloads on USSF-67. Among them are "two operational prototypes for enhanced situational awareness and an operational prototype crypto/interface encryption payload providing secure space-to-ground communications capability," Space Force officials said in an emailed statement on Friday....

If all goes according to plan, the two side boosters will come back to Earth shortly after liftoff on Sunday, making vertical touchdowns at Cape Canaveral Space Force Station, which is next door to NASA's Kennedy Space Center. The central booster will not return, instead ditching into the Atlantic Ocean....

USSF-67 is part of a busy week for SpaceX. The company also plans to launch 51 of its Starlink internet satellites to low Earth orbit atop a Falcon 9 on Thursday, January 19.

Transportation

Airbus Close To Landing Fully Automated Passenger Jets (theregister.com) 76

UpNext, Airbus's future technology-focused subsidiary, reported on Thursday that it has entered the final three months of testing tech it hopes will automate the process of getting a plane from the air to the gate. The Register reports: The system, called DragonFly, tackles automated operations like diversions, landings, and taxi procedures through a combination of sensors, computer vision algorithms and robust guidance calculations. Airbus pitches the system as an extra layer of safety for emergency operations. "In the unlikely situation where a crew is unable to control the aircraft, DragonFly can redirect the flight to the nearest appropriate airport and facilitate a safe landing," enthused the aerospace corporation. The eventual hope is for the technologies to pave the way for automated landing -- or at least compensate for a less than perfect pilot during an emergency situation. If the captain had the fish, for example.

A marketing video of the Airbus UpNext DragonFly details that a safe landing feature is included in the Automated Emergency Ops application. It works by detecting the most suitable airport for landing and calculates a trajectory to get there, with consideration for weather, military zones and other factors. Airbus assures viewers that Air Traffic Control (ATC) and Operations Control Center (OCC) communication links are in place. The video does not, however, explain how the aircraft communicates with air traffic control for clearance into controlled airspace if the pilot is incapacitated, as that task is completed through human verbal interaction. An automated landing is assisted by sensors that enhance the view of the runway, computer vision algorithms, and guidance computation.

Furthermore, the demonstrator is kitted out with a pilot taxi assistance application to manage its maneuvers on the ground in a heavily trafficked airport. Air traffic control clearance is interpreted and translated into taxi guidance cues. Crew receive audio alerts in reaction to obstacles, assisted speed control and an interactive airport map. The taxi assistance element was tested at Toulouse-Blagnac Airport. The subsidiary reckons one day DragonFly will allow for automatic landing at any airport, regardless of whether the ground equipment is equipped for such landings.

United States

New UFO Report Shows Hundreds More Incidents than Previously Thought (go.com) 62

The U.S. intelligence community says that the number of UFO reports involving U.S. military personnel is increasing, "enabling a greater awareness of the airspace and increased opportunity to resolve" what is actually being reported. From a report: Roughly half of the new incidents reported in the report had terrestrial explanations, the report said. The increase in reporting is being partially attributed to the continuing effort to destigmatize the reporting of such incidents and focusing on the potential safety risks they could pose to U.S. personnel. The report released Thursday by the Office of the Director of National Intelligence said that since its first June 2021 unclassified report on what are now called Unidentified Anomalous Phenomena (UAPs), it is now aware of 510 such reports.

That is significantly more than the 144 incidents reviewed in the initial report, only one of which could be explained. The new report said the Pentagon's new office looking at UAP reports has looked at 366 new reported incidents and initially determined that about half of them have "unremarkable characteristics." Twenty-six are being attributed to drones, 163 characterized as balloon or balloon-like entities, and six are attributed to clutter. The report says these initial assessments do "not mean positively resolved or unidentified" but will aid investigators in trying to determine how to explain "the remaining 171 uncharacterized and unattributed UAP reports" some of which "appear to have demonstrated unusual flight characteristics or performance capabilities, and require further analysis."

United States

NSA Director Urges Congress To Renew Controversial Intelligence Authority (cyberscoop.com) 29

NSA Director and head of U.S. Cyber Command Gen. Paul Nakasone said in remarks on Thursday that intelligence authorities up for renewal later this year have played a key role in protecting the United States against cyberattacks. From a report: Nakasone's remarks at a virtual meeting of the Privacy and Civil Liberties Oversight Board offered a preview of what is expected to be an intense political fight later this year to renew Section 702 of the Foreign Intelligence Surveillance Act -- a law that provides U.S. intelligence agencies wide-ranging authorities to conduct surveillance of foreign persons located abroad and which civil liberties advocates argue is in desperate need of greater transparency.

Section 702 will expire at the end of the year unless Congress acts, and on Thursday Nakasone made the case that "the authority plays an outsized role in protecting our nation." He said, "we have saved lives because of 702," adding that the law has been used to counter ransomware threats, including those against critical infrastructure and a foreign operation trying to steal sensitive U.S. military information. The political fight over reauthorization has yet to heat up, but as the newly elected Republican majority seeks to investigate federal government probes of former President Donald Trump and his associates, the renewal of Section 702 could emerge as a central flashpoint between the GOP and national-security agencies.

Japan

Japan Bets Big on Bringing Semiconductor Manufacturing Home (foreignpolicy.com) 24

To get back some of the high-tech mojo that made it an economic powerhouse, Japan is launching an ambitious program to bring back cutting-edge semiconductor manufacturing, a field it ceded to Taiwan, South Korea, and China nearly 20 years ago. But will this new campaign at state-backed industrial policy succeed, and more importantly, is it even the right goal? From a report: The new initiatives are part of a broader strategy of greater "economic security" under Prime Minister Fumio Kishida's administration, a need driven home by the massive supply chain disruptions that occurred globally under the weight of shifting supply and demand amid COVID-19. It is also part of what is, in effect, a broad-based defense mobilization program to contain an increasingly ambitious China -- one that fits nicely in with the Biden administration's own plans.

Washington has put increasingly tight limits on U.S. companies' involvement in Chinese chip manufacturing, seeking to keep control of the advanced electronics vital to modern warfare -- and the economy as a whole -- within its wider sphere of allies like Taiwan and Japan. Other segments of the Japanese plan range from more advanced weapons systems, an ability to strike an enemy's bases back at home (despite Japan's constitution forsaking warfare), and roughly doubling military spending to 2 percent of GDP by 2027. It is a very full agenda, especially for a government that is now teetering from various scandals that always seem to befall Japanese administrations that are seen as already weak.

China

Dell To Purge Chinese Chips From Products By Next Year (theregister.com) 76

Dell looks set to stop using chips from China in its products by 2024, according to reports. The move appears to be part of a wider effort to shift its supply chains away from the country in response to the ongoing tensions between China and the US. From a report: The PC and tech infrastructure maker has told suppliers to significantly reduce the volume of components sourced from China in its products, including those made in the country by non-Chinese manufacturers, according to a report in Nikkei Asia, which cites anonymous sources "with direct knowledge of the matter." Those sources claim that Dell is aiming to eliminate all chips manufactured inside China from its products by the close of next year. The move could be seen as a direct result of growing concerns in the industry over Washington's policies regarding China and access to advanced computer technology, which it says it wants to keep out of the hands of the Chinese military.
Privacy

For Sale on eBay: A Military Database of Fingerprints and Iris Scans 32

The shoebox-shaped device, designed to capture fingerprints and perform iris scans, was listed on eBay for $149.95. A German security researcher, Matthias Marx, successfully offered $68, and when it arrived at his home in Hamburg in August, the rugged, hand-held machine contained more than what was promised in the listing. The device's memory card held the names, nationalities, photographs, fingerprints and iris scans of 2,632 people. From a report: Most people in the database, which was reviewed by The New York Times, were from Afghanistan and Iraq. Many were known terrorists and wanted individuals, but others appeared to be people who had worked with the U.S. government or simply been stopped at checkpoints. Metadata on the device, called a Secure Electronic Enrollment Kit, or SEEK II, revealed that it had last been used in the summer of 2012 near Kandahar, Afghanistan. The device -- a relic of the vast biometric collection system the Pentagon built in the years after the Sept. 11, 2001, attacks -- is a physical reminder that although the United States has moved on from the wars in Afghanistan and Iraq, the tools built to fight them and the information they held live on in ways unintended by their creators.

Exactly how the device ended up going from the battlefields in Asia to an online auction site is unclear. But the data, which offers detailed descriptions of individuals in addition to their photograph and biometric data, could be enough to target people who were previously unknown to have worked with U.S. military forces should the information fall into the wrong hands. For those reasons, Mr. Marx would not place the information online or share it in an electronic format, but he did allow a Times reporter in Germany to see the data in person alongside him. "Because we have not reviewed the information contained on the devices, the department is not able to confirm the authenticity of the alleged data or otherwise comment on it," Brig. Gen. Patrick S. Ryder, the Defense Department's press secretary, said in a statement. "The department requests that any devices thought to contain personally identifiable information be returned for further analysis." He provided an address for the military's biometrics program manager at Fort Belvoir in Virginia where the devices could be sent. The biometric data on the SEEK II was collected at detainment facilities, on patrols, during screenings of local hires and after the explosion of an improvised bomb. Around the time when the device was last used in Afghanistan, the American war effort there was winding down.
Christmas Cheer

NORAD Answers Questions About Their Annual Santa-Tracking Operation (noradsanta.org) 36

The North American Aerospace Defense Command is a US/Canada organization protecting the air sovereignty of the two nations.

But every year on December 24th, they also tell you where Santa is. From NORADSanta.org: The modern tradition of tracking Santa began in 1955 when a young child accidentally dialed the unlisted phone number of the Continental Air Defense Command Operations Center upon seeing an newspaper advertisement telling kids to call Santa. The Director of Operations, Colonel Harry Shoup, answered the phone and instructed his staff to check the radar for indications of Santa making his way south from the North Pole.... Each year since, NORAD has dutifully reported Santa's location on Dec. 24 to millions of children and families across the globe. NORAD receives calls from around the world on Dec. 24 asking for Santa's location. Children, families and fans also keep track of Santa's location on the NORAD Tracks Santa® website and our social media platforms.
The page lists the NORAD technologies involved in tracking Santa — including 47 radar installations and geo-synchronous satellites with infrared heat sensors. ("Rudolph's nose gives off an infrared signature similar to a missile launch...")

And this year NORAD also produced a special video highlighting the various military fleets protecting Santa. ("He may know when you're sleeping, he may know when you're awake... " it tells viewers. "But for 67 years now, when he takes flight, we'll know.")

More from NORADSanta.org: Canadian NORAD fighter pilots, flying the CF-18, take off out of Newfoundland and welcome Santa to North America. Then at numerous locations in Canada other CF-18 fighter pilots escort Santa. While in the United States, American NORAD fighter pilots in either the F-15s, F16s or F-22s get the thrill of flying with Santa and the famous Reindeer...

Q: How can Santa travel the world within 24 hours?

A: NORAD intelligence reports indicate that Santa does not experience time the way we do. His trip seems to take 24 hours to us, but to Santa it might last days, weeks or even months. Santa would not want to rush the important job of delivering presents to children and spreading joy to everyone, so the only logical conclusion is that Santa somehow functions within his own time-space continuum....

How does Santa get down chimneys?

Although NORAD has different hypotheses and theories as to how Santa actually gets down the chimneys, we don't have definitive information to explain the magical phenomenon.

Do your planes ever intercept Santa?

Over the past 65 years, our fighter jets (F-16s, F-15s, F-22s and CF-18s) have intercepted Santa many, many times. When the jets intercept Santa, they tip their wings to say, "Hello Santa! NORAD is tracking you again this year!" Santa always waves. He loves to see the pilots...!

How many people support this effort, and are they active duty military personnel?

More than 1,250 Canadian and American uniformed personnel and DOD civilians volunteer their time on December 24th to answer the thousands of phone calls and emails that flood in from around the world. In addition to the support provided by our corporate contributors to make this program possible, NORAD has two lead project officers who manage the program.

How much money is spent on this project?

The NORAD Tracks Santa program is made possible by volunteers and through the generous support of corporate licensees who bear virtually all of the costs.

Corporate contributors include Microsoft (with separate contributions from Microsoft's search engine Bing and from Microsoft Azure), AWS (and Amazon's Alexa), Verizon, and HP.

NORADSanta.org also boasts extra features like an "arcade" of online games, a jukebox of Christmas tunes, and a library of online books about Santa. And the site even provides some technical data on the weight of Santa's sleigh — although the unit of measurement used is gumdrops.
Security

Kremlin-Backed Hackers Targeted a 'Large' Petroleum Refinery In a NATO Nation (arstechnica.com) 68

An anonymous reader quotes a report from Ars Technica: One of the Kremlin's most active hacking groups targeting Ukraine recently tried to hack a large petroleum refining company located in a NATO country. The attack is a sign that the group is expanding its intelligence gathering as Russia's invasion of its neighboring country continues. The attempted hacking occurred on August 30 and was unsuccessful, researchers with Palo Alto Networks' Unit 42 said on Tuesday. The hacking group -- tracked under various names including Trident Ursa, Gamaredon, UAC-0010, Primitive Bear, and Shuckworm -- has been attributed by Ukraine's Security Service to Russia's Federal Security Service.

In the past 10 months, Unit 42 has mapped more than 500 new domains and 200 samples and other bread crumbs Trident Ursa has left behind in spear phishing campaigns attempting to infect targets with information-stealing malware. The group mostly uses emails with Ukrainian-language lures. More recently, however, some samples show that the group has also begun using English-language lures. "We assess that these samples indicate that Trident Ursa is attempting to boost their intelligence collection and network access against Ukrainian and NATO allies," company researchers wrote. Among the filenames used in the unsuccessful attack were: MilitaryassistanceofUkraine.htm, Necessary_military_assistance.rar, and List of necessary things for the provision of military humanitarian assistance to Ukraine.lnk. Tuesday's report didn't name the targeted petroleum company or the country where the facility was located. In recent months, Western-aligned officials have issued warnings that the Kremlin has set its sights on energy companies in countries opposing Russia's war on Ukraine.

Trident Ursa's hacking techniques are simple but effective. The group uses multiple ways to conceal the IP addresses and other signatures of its infrastructure, phishing documents with low detection rates among anti-phishing services, and malicious HTML and Word documents. Unit 42 researchers wrote: "Trident Ursa remains an agile and adaptive APT that does not use overly sophisticated or complex techniques in its operations. In most cases, they rely on publicly available tools and scripts -- along with a significant amount of obfuscation -- as well as routine phishing attempts to successfully execute their operations..." Tuesday's report provides a list of cryptographic hashes and other indicators organizations can use to determine if Trident Ursa has targeted them. It also provides suggestions for ways to protect organizations against the group.

Communications

Russian Arms Manufacturer Developing Tech To Hunt Starlink Dishes (pcmag.com) 129

schwit1 shares a report from PC Magazine with the caption, "More Russian vaporware?" From the report: A Russian arms manufacturer claims it can help the country's military detect and bombard Starlink satellite dishes, which have been crucial to the defense effort in Ukraine. Earlier this month, a mysterious company called Sestroretsk Arms Factory published a website that debuted the "Borshchevik" or "hogweed" system, which is designed to locate Starlink dishes at a distance of up to 10 kilometers (6.2 miles). The technology can supposedly pinpoint a Starlink dish within 5 to 60 meters (16 to 196 feet) of its actual location. In addition, it can be fitted on top of a moving vehicle, allowing it to detect Starlink activity across the front lines on a battlefield.

However, it's unclear how the Borshchevik system actually works or if it's even effective. News of the technology was posted on a Telegram channel called "Reverse Side of the Medal," which seems to be closely associated with the Russian military, including the paramilitary Wagner Group. The user behind the Reverse Side of the Medal channel said they plan on testing the Borshchevik system on the frontlines in Russia's ongoing war with Ukraine.

Android

Android is Adding Support for Updatable Root Certificates Amid TrustCor Scare (esper.io) 19

Esper: The world's biggest tech companies have lost confidence in one of the Internet's behind-the-scenes gatekeepers. Microsoft, Mozilla, and Google are dropping TrustCor Systems as a root certificate authority in their products. Starting in Chrome version 111 for desktops, the browser will no longer trust certificates issued by TrustCor Systems. The same change is coming to Android, but unlike Chrome for desktops, Android's root certificate store can't be updated independently of the OS, meaning it'll take some time for the certificate changes to roll out. Thankfully, that may no longer be the case in Android 14, as Google is preparing to implement updatable root certificates in the next release.
Mars

China Maps Out Plans to Put Astronauts on the Moon - and on Mars (nytimes.com) 56

The New York Times cites predictions from American's Defense Department that China could surpass U.S. space capabilities as soon as 2045. "I think it's entirely possible they could catch up and surpass us, absolutely," said the staff director of the United States Space Force. "The progress they've made has been stunning — stunningly fast."

But in a new article this week, the newspaper notes that China recenty sent space probes to the moon and to Mars — and invited foreign media to the launch of its space station in November — and looks back over decades of development: Thirty years ago, the Chinese government initiated a secret plan for its space program, including a key goal of building a space station by 2020. At the time, the country was 11 years from sending its first astronaut into space, and its space efforts were going through a rough patch: Chinese rockets failed in 1991, 1992, 1995 and twice in 1996. The worst failure, in 1996, was a rocket that tipped to the side, flew in the wrong direction and exploded 22 seconds after launch, showering a Chinese village with falling wreckage and flaming fuel that killed or injured at least 63 people.

While grand spaceflight plans of some nations have ended up many years behind schedule, China completed the assembly in orbit of its Tiangong space station in late October, only 22 months later than planned. And on Nov. 29, the Shenzhou 15 mission blasted off from China's Jiuquan Satellite Launch Center deep in the Gobi Desert and took three astronauts to the space station to begin permanent occupancy of the outpost.

The article notes that the U.S. Congress "ended up banning American space agencies in 2011 from spending any money to cooperate in space with China, except in limited circumstances."

But today Zhou Jianping, chief designer of China's crewed space program, asserts that "within a few years, we will be able to achieve the reuse of re-entry capsules for our new generation spaceships." Sending a person to Mars is an even bigger prize for China. It has placed an emphasis on shortening the duration of such a trip, perhaps with nuclear propulsion instead of conventional rocket engines. Officials are also determined that any journey will be a round-trip from which all astronauts return alive and in good health.... With nuclear propulsion, the trip could be trimmed to 500 days, Mr. Zhou said, without predicting whether China would adopt that approach.
Sci-Fi

Pentagon Has Received 'Several Hundreds' of New UFO Reports 53

A new Pentagon office set up to track reports of unidentified flying objects has received "several hundreds" of new reports, but no evidence so far of alien life, the agency's leadership told reporters Friday. The Associated Press reports: The All-domain Anomaly Resolution Office (AARO) was set up in July and is responsible for not only tracking unidentified objects in the sky, but also underwater or in space -- or potentially an object that has the ability to move from one domain to the next. The office was established following more than a year of attention on unidentified flying objects that military pilots have observed but have sometimes been reluctant to report due to fear of stigma.

In June 2021 the Office of the Director of National Intelligence reported that between 2004 and 2021, there were 144 such encounters, 80 of which were captured on multiple sensors. Since then, "we've had lots more reporting," said anomaly office director Sean Kirkpatrick. When asked to quantify the amount, Kirkpatrick said "several hundreds." An updated report from the Director of National Intelligence that will provide specific figures on new reports received since 2021 is expected by the end of the year, the officials said.
China

Dutch Chip Equipment Maker ASML's CEO Pushes Back Against US Export Rules On China (reuters.com) 66

Slashdot reader hackingbear writes: Peter Wennink, the chief executive of ASML Holding NV, the Dutch semiconductor equipment maker, on Tuesday questioned whether a U.S. push to get the Netherlands to adopt new rules restricting exports to China make sense. "He said that following U.S. pressure, the Dutch government has already restricted ASML from exporting its most advanced lithography machines to China since 2019, something he said has benefited U.S. companies selling alternative technology," reports Reuters. "He said that while 15% of ASML's sales are in China, at U.S. chip equipment suppliers 'it is 25 or sometimes more than 30%.'"

In response to U.S. claims that advanced chips owned by China pose a threat to national security due to military applications and the rise of artificial intelligence, Wennink said: "What constitutes national security is for Americans to determine. But it is common knowledge that chip technology for purely military applications is usually ten, fifteen years old. The technology used to make such chips can still be sold to China. Artificial intelligence requires the most advanced chips. They are made with EUV and are therefore not produced in China. But those chips are simply sold, also to the Chinese. American chip manufacturers have no problem with China as a customer."

United States

US Blacklists More Chinese Tech Companies (bloomberg.com) 66

The US government is blacklisting Yangtze Memory Technologies, Shanghai Micro Electronics Equipment Group and dozens of other Chinese tech companies, ratcheting up a trade conflict between the world's two largest economies. From a report: The Department of Commerce is placing the companies on the so-called entity list, meaning that anyone seeking to supply them with US technology will require a license from Washington -- something that will likely be difficult to get. Bloomberg News previously reported that the US was preparing to add the companies to the list. The latest restrictions are part of a push to limit China's access to advanced chipmaking and artificial intelligence technology, which the US wants to keep away from the Asian nation's military. In October, the Biden administration unveiled sweeping measures that limit what US companies can sell to the country -- and it's been pushing for allies to go along with the plan.

The idea is to severely restrict China's "ability to leverage artificial intelligence, advanced computing, and other powerful, commercially available technologies for military modernization and human rights abuses," Under Secretary of Commerce for Industry and Security Alan Estevez said in a statement. "This work will continue, as will our efforts to detect and disrupt Russia's efforts to obtain necessary items and technologies for its brutal war against Ukraine, including from Iran." Yangtze Memory and Shanghai Micro were added to the list out of concern that they'll work with Huawei, Hangzhou Hikvision Digital Technology and other companies that the US has decided are either a risk to national security or support oppression by the Chinese government. The two companies are key to China's efforts to build a domestic chipmaking business and wean itself off imports, particularly those from the US. In all, 36 companies are joining the entity list.

Robotics

Robots Set Their Sights On a New Job: Sewing Blue Jeans (reuters.com) 102

"Almost all clothing is made by hand due to robots' inability to handle limp fabrics," writes Slashdot reader jonzornow. "A new approach avoids these issues by temporarily stiffening fabric. A robotic system developed to use this technique is now heading to its first factory for testing." Reuters reports: Work at Siemens grew out of efforts to create software to guide robots that could handle all types of flexible materials, such as thin wire cables, said [Eugen Solowjow, who heads a project at a Siemens lab in San Francisco that has worked on automating apparel manufacturing since 2018.], adding that they soon realized one of the ripest targets was clothing. The global apparel market is estimated to be worth $1.52 trillion, according to independent data platform Statista. Siemens worked with the Advanced Robotics for Manufacturing Institute in Pittsburgh, created in 2017 and funded by the Department of Defense to help old-line manufacturers find ways to use the new technology. They identified a San Francisco startup with a promising approach to the floppy fabric problem. Rather than teach robots how to handle cloth, the startup, Sewbo Inc., stiffens the fabric with chemicals so it can be handled more like a car bumper during production. Once complete, the finished garment is washed to remove the stiffening agent.

"Pretty much every piece of denim is washed after it's made anyway, so this fits into the existing production system," said Zornow, Sewbo's inventor. This research effort eventually grew to include several clothing companies, including Levi's and Bluewater Defense LLC, a small U.S.-based maker of military uniforms. They received $1.5 million in grants from the Pittsburgh robotics institute to experiment with the technique. [...] Sanjeev Bahl, who opened a small jeans factory in downtown Los Angeles two years ago called Saitex, has studied the Sewbo machines and is preparing to install his first experimental machine. Leading the way through his factory in September, he pointed to workers hunched over old-style machines and said many of these tasks are ripe for the new process. "If it works," he said, "I think there's no reason not to have large-scale (jeans) manufacturing here in the U.S. again."

The Military

US Air Force Launches First Operational Hypersonic Missile (space.com) 102

The United States Air Force (USAF) has successfully tested its first prototype hypersonic missile. Space.com reports: The service's new AGM-183A Air-launched Rapid Response Weapon, or ARRW ("Arrow") is expected to be the United States military's first hypersonic weapon to reach operational status. The exact speed of the AGM-183A isn't known, although the Lockheed Martin-designed weapon is said to be based on previous test vehicles built by DARPA that have an alleged maximum speed of Mach 20, or 15,000 mph (24,000 kph). The successful ARRW test was conducted on Friday (Dec. 9) in a training range off the coast of California, according to a USAF statement released Monday (Dec. 12). "This test was the first launch of a full prototype operational missile," officials wrote in the statement. "Following the ARRW's separation from the aircraft, it reached hypersonic speeds greater than five times the speed of sound, completed its flight path and detonated in the terminal area. Indications show that all objectives were met."

According to the U.S. Air Force, the missile is designed to "hold fixed, high-value, time-sensitive targets at risk in contested environments," meaning it will be used to target pre-determined assets on the ground such as fixed missile sites, radar stations, air defense installations, infrastructure facilities or even adversary headquarters buildings -- basically anything important in a battlefield environment that can't be moved and needs to be destroyed quickly. [...] Now that the ARRW has successfully flown, it's likely the service could reevaluate its plans to scrap planned purchases of the AGM-183A. The AGM-183A is what is known as a boost-glide vehicle, which refers to warheads or projectiles that glide toward their targets after being lofted by a rocket booster.

Japan

Japan To Join US Effort to Tighten Chip Exports To China (bloomberg.com) 23

Japan and the Netherlands have agreed in principle to join the US in tightening controls over the export of advanced chipmaking machinery to China, Bloomberg News reported according to people familiar with the matter, a potentially debilitating blow to Beijing's technology ambitions. From the report: The two countries are likely to announce in the coming weeks that they'll adopt at least some of the sweeping measures the US rolled out in October to restrict the sale of advanced semiconductor manufacturing equipment, according to the people, who asked not to be named because they are not authorized to speak publicly on the matter. The Biden administration has said the measures are aimed at preventing Beijing's military from obtaining advanced semiconductors.

The three-country alliance would represent a near-total blockade of China's ability to buy the equipment necessary to make leading-edge chips. The US rules restricted the supply from American gear suppliers Applied Materials, Lam Research and KLA. Japan's Tokyo Electron and Dutch lithography specialist ASML Holding are the two other critical suppliers that the US needed to make the sanctions effective, making their governments' adoption of the export curbs a significant milestone. "There's no way China can build a leading-edge industry on their own. No chance," said Sanford C. Bernstein analyst Stacy Rasgon.

Cloud

Pentagon Splits $9 Billion Cloud Contract Between 4 Firms 49

Google, Oracle, Microsoft and Amazon will share in the Pentagon's $9 billion contract to build its cloud computing network, a year after accusations of politicization over the previously announced contract and a protracted legal battle resulted in the military starting over in its award process. The Associated Press reports: The Joint Warfighter Cloud Capability is envisioned to provide access to unclassified, secret and top-secret data to military personnel all over the globe. It is anticipated to serve as a backbone for the Pentagon's modern war operations, which will rely heavily on unmanned aircraft and space communications satellites, but will still need a way to quickly get the intelligence from those platforms to troops on the ground. The contract will be awarded in parts, with a total estimated completion date of June 2028, the Pentagon said in a statement.

Last July, the Pentagon announced it was cancelling its previous cloud computing award, then named JEDI. At the time, the Pentagon said that due to delays in proceeding with the contract, technology had changed to the extent that the old contract, which was awarded to Microsoft, no longer met DOD's needs. It did not mention the legal challenges behind those delays, which had come from Amazon, the losing bidder. Amazon had questioned whether former President Donald Trump's administration had steered the contract toward Microsoft due to Trump's adversarial relationship with Amazon's chief executive officer at the time, Jeff Bezos. A report by the Pentagon's inspector general did not find evidence of improper influence, but it said it could not determine the extent of administration interactions with Pentagon decision-makers because the White House would not allow unfettered access to witnesses.
"It's the most important cloud deal to come out of the Beltway," said analyst Daniel Ives, who monitors the cloud industry for Wedbush Securities. "It's about the Pentagon as a reference customer. It says significant accolades about what they think about that vendor, and that's the best reference customer you could have in that world."

Slashdot Top Deals