×
Space

America's Air Force Seeks Commercial Technologies For 'Space Domain Awareness' (spacenews.com) 27

America's Air Force is seeking proposals for technologies "for operations far beyond geosynchronous Earth orbit, near the moon's orbit," reports SpaceNews: Specific items the Air Force wants: payloads for providing space domain awareness from the lunar surface, lightweight sensors for space-based space domain awareness, and methodologies for orbit determination and catalog maintenance in cislunar space. The Air Force also is interested in concepts for providing position, navigation and timing solutions for cislunar space operations; visualization of cislunar orbits; and terrestrial-based concepts for achieving space domain awareness of cislunar space.

The inclusion of cislunar space capabilities in the Small Business Innovation Research program was unexpected, said Shawn Usman, an astrophysicist and founder of the space consulting firm Rhea Space Activity. The industry sees this as a sign that the Air Force, and the future Space Force, are responding to advances made by China, Usman told SpaceNews. "This is definitely a pretty big turning point for the U.S. Air Force, the U.S. 'new space' industry, our near-peer competitors, and for the upcoming Space Force."

Space

America Considers Declassifying Military Information on US, Chinese, and Russian Space Programs (defensenews.com) 55

Long-time Slashdot reader SonicSpike quotes Defense News: The U.S. Air Force's top civilian and a key member of Congress agreed Saturday on the need to declassify a large amount of information about America's military space programs to both intimidate foes and encourage support among the public. "Declassifying some of what is currently held in secure vaults would be a good idea," Air Force Secretary Barbara Barrett said during a panel at the Reagan National Defense Forum. "You would have to be careful about what we declassify, but there is much more classified than what needs to be."

Fellow panelist Rep. Mike Rogers, R-Ala., said he met with the secretary earlier in the week to discuss that very issue, calling the information on space programs "overwhelmingly classified." For Rogers, that overclassification is one of the reasons it's been so difficult for him and others to build support both in the public and with other members of Congress for a Space Force, a sixth branch of the military under the Air Force uniquely focused on space as a war-fighting domain.... "I don't think that can happen until we see significant declassification of what we're doing in space and what China and Russia are doing, and how space is in their day-to-day lives."

Barrett also argued that America's way of life "is more dependent on space than any other nation's. And our capability in space was predominantly built at a time when we thought space was a benign environment."
The Military

Turkey is Getting Military Drones Armed With Machine Guns (newscientist.com) 93

A drone with a machine gun attached can hit targets with high precision, according to its makers. Turkey is set to become the first country to have the drone, when it gets a delivery this month. From a report: The 25-kilogram drone has eight rotating blades to get it in the air. Its machine gun carries 200 rounds of ammunition and can fire single shots or 15-round bursts. Many countries and groups already use small military drones that can drop grenades or fly into a target to detonate an explosive. The new drone, called Songar and made by Ankara-based electronics firm Asisguard, is the first drone to be equipped with a firearm and be ready for service. Turkey expects the drones to be delivered before the end of the year.

It is hard for a drone to shoot accurately, partly because of the difficulty of judging range and angle, and partly because the recoil from each shot significantly moves the drone, affecting the aim for the next round. Songar has two systems to overcome these challenges. One uses sensors, including cameras and a laser rangefinder, to calculate distance, angle and wind speed, and work out where to aim. The second is a set of robot arms that move the machine gun to compensate for the effects of recoil.

Security

Cyberattack Hits City of Pensacola After Shooting At Naval Air Station (cnn.com) 13

The city of Pensacola, Florida, has been dealing with a cyberattack since late Friday when a Saudi Air Force trainee killed three sailors at Pensacola Naval Air Station. Officials for the city are unsure whether the incidents are related. CNN reports: The city of Pensacola, Florida, said it has experienced a cyber "incident" and has disconnected several city services until the issue can be resolved. Mayor Grover Robinson told CNN affiliate WEAR the city has been dealing with a cyberattack since late Friday. The city said the issue has impacted city emails and phones, 311 customer service and online payments, including Pensacola Energy and Pensacola Sanitation Services. However, 911 and emergency services are not impacted. As for whether the cyberattack is related to the Friday shooting, Kaycee Lagarde, a spokeswoman for the mayor, said: "It's really too early to say one way or another. We are still assessing this. We understand that it's on people's mind but we just don't know at this point."

Lagarde said the incident was reported to the FBI and Homeland Security as a precaution.
Crime

'Why Are Cops Around the World Using This Outlandish Mind-Reading Tool?' (propublica.org) 93

ProPublica has determined that dozens of state and local agencies have purchased "SCAN" training from a company called LSI for reviewing a suspect's written statements -- even though there's no scientific evidence that it works. Local, state and federal agencies from the Louisville Metro Police Department to the Michigan State Police to the U.S. State Department have paid for SCAN training. The LSI website lists 417 agencies nationwide, from small-town police departments to the military, that have been trained in SCAN -- and that list isn't comprehensive, because additional ones show up in procurement databases and in public records obtained by ProPublica. Other training recipients include law enforcement agencies in Australia, Belgium, Canada, Israel, Mexico, the Netherlands, Singapore, South Africa and the United Kingdom, among others...

For Avinoam Sapir, the creator of SCAN, sifting truth from deception is as simple as one, two, three.

1. Give the subject a pen and paper.
2. Ask the subject to write down his/her version of what happened.
3. Analyze the statement and solve the case.

Those steps appear on the website for Sapir's company, based in Phoenix. "SCAN Unlocks the Mystery!" the homepage says, alongside a logo of a question mark stamped on someone's brain. The site includes dozens of testimonials with no names attached. "Since January when I first attended your course, everybody I meet just walks up to me and confesses!" one says. [Another testimonial says "The Army finally got its money's worth..."] SCAN saves time, the site says. It saves money. Police can fax a questionnaire to a hundred people at once, the site says. Those hundred people can fax it back "and then, in less than an hour, the investigator will be able to review the questionnaires and solve the case."

In 2009 the U.S. government created a special interagency task force to review scientific studies and independently investigate which interrogation techniques worked, assessed by the FBI, CIA and the U.S. Department of Defense. "When all 12 SCAN criteria were used in a laboratory study, SCAN did not distinguish truth-tellers from liars above the level of chance," the review said, also challenging two of the method's 12 criteria. "Both gaps in memory and spontaneous corrections have been shown to be indicators of truth, contrary to what is claimed by SCAN."
In a footnote, the review identified three specific agencies that use SCAN: the FBI, CIA and U.S. Army military intelligence, which falls under the Department of Defense...

In 2016, the same year the federal task force released its review of interrogation techniques, four scholars published a study on SCAN in the journal Frontiers in Psychology. The authors -- three from the Netherlands, one from England -- noted that there had been only four prior studies in peer-reviewed journals on SCAN's effectiveness. Each of those studies (in 1996, 2012, 2014 and 2015) concluded that SCAN failed to help discriminate between truthful and fabricated statements. The 2016 study found the same. Raters trained in SCAN evaluated 234 statements -- 117 true, 117 false. Their results in trying to separate fact from fiction were about the same as chance....

Steven Drizin, a Northwestern University law professor who specializes in wrongful convictions, said SCAN and assorted other lie-detection tools suffer from "over-claim syndrome" -- big claims made without scientific grounding. Asked why police would trust such tools, Drizin said: "A lot has to do with hubris -- a belief on the part of police officers that they can tell when someone is lying to them with a high degree of accuracy. These tools play in to that belief and confirm that belief."

SCAN's creator "declined to be interviewed for this story," but they spoke to some users of the technique. Travis Marsh, the head of an Indiana sheriff's department, has been using the tool for nearly two decades, while acknowledging that he can't explain how it works. "It really is, for lack of a better term, a faith-based system because you can't see behind the curtain."

Pro Publica also reports that "Years ago his wife left a note saying she and the kids were off doing one thing, whereas Marsh, analyzing her writing, could tell they had actually gone shopping. His wife has not left him another note in at least 15 years..."
China

The U.S. Considers Ban on Exporting Surveillance Technology To China (usnews.com) 73

The South China Morning Post reports that the U.S. may be taking a stand against China. This week the U.S. House of Representatives passed a new bill that would "tighten export controls on China-bound U.S. technology that could be used to 'suppress individual privacy, freedom of movement and other basic human rights' [and] ordering the U.S. president, within four months of the legislation's enactment, to submit to Congress a list of Chinese officials deemed responsible for, or complicit in, human rights abuses in Xinjiang...

"The UIGHUR Act also demands that, on the same day, those individuals are subject to sanctions under the Global Magnitsky Act, seizing their U.S.-based assets and barring them from entry onto U.S. soil."

Reuters notes that American government officials "have sounded the alarm on China's detention of at least a million Uighur Muslims, by U.N. estimates, in the northwestern region of Xinjiang as a grave abuse of human rights and religious freedom..." U.S. congressional sources and China experts say Beijing appears especially sensitive to provisions in the Uighur Act passed by the House of Representatives this week banning exports to China of items that can be used for surveillance of individuals, including facial and voice-recognition technology...

A U.S. congressional source also said a Washington-based figure close to the Chinese government told him recently it disliked the Uighur bill more than the Hong Kong bill for "dollars and cents reasons," because the former measure contained serious export controls on money-spinning security technology, while also threatening asset freezes and visa bans on individual officials. Victor Shih, an associate professor of China and Pacific Relations at the University of California, San Diego, said mass surveillance was big business in China and a number of tech companies there could be hurt by the law if it passes.

China spent roughly 1.24 trillion yuan ($176 billion) on domestic security in 2017 -- 6.1% of total government spending and more than was spent on the military. Budgets for internal security, of which surveillance technology is a part, have doubled in regions including Xinjiang and Beijing.

The Military

Why Is Russia's Suspected Internet Cable Spy Ship In the Mid-Atlantic? (forbes.com) 107

"Russia's controversial intelligence ship Yantar has been operating in the Caribbean, or mid-Atlantic, since October," writes defense analyst H I Sutton this week in Forbes.

He adds that the ship "is suspected by Western navies of being involved in operations on undersea communications cables." Significantly, she appears to be avoiding broadcasting her position via AIS (Automated Identification System). I suspect that going dark on AIS is a deliberate measure to frustrate efforts to analyse her mission. She has briefly used AIS while making port calls, where it would be expected by local authorities, for example while calling at Trinidad on November 8 and again on November 28. However in both cases she disappeared from AIS tracking sites almost as soon as she left port...

Yantar has been observed conducting search patterns in the vicinity of internet cables, and there is circumstantial evidence that she has been responsible for internet outages, for example off the Syrian coast in 2016.

Yantar is "allegedly an 'oceanographic research vessel'," notes Popular Mechanics, in a mid-November article headlined "Why is Russia's spy ship near American waters?"

A study by British think tank Policy Exchange mentioned that the ship carried two submersibles capable of tapping undersea cables for information -- or outright cutting them, the Forbes article points out. "Whether Yantar's presence involves undersea cables, or some other target of interest to the Russians, it will be of particular interest to U.S. forces."
The Military

The US Is Suspected of Killing a Terrorist In Syria Using Missile With Knife Warhead (businessinsider.com) 227

pgmrdlm shares a report from Business Insider: A suspected terrorist in Syria was reportedly killed with a rare U.S. missile packed with swords, according to multiple reports. The weapon that shredded the car did not explode. While the driver's side was torn apart, the vehicle was actually mostly intact. The deadly precision weapon was, according to a report from the Wall Street Journal in May, designed by the U.S. to reduce civilian casualties. The Journal noted that the R9X has been used covertly, albeit rarely, against targets in Syria, Yemen and elsewhere since 2017.
Robotics

Ask Slashdot: When Robots Are Ultra-Lifelike Will It Be Murder To Switch One Off? (newscientist.com) 226

An anonymous reader writes: "HELLO, I'm Scout. Want to play?" My daughter has a toy dog that yaps and comes out with a few stock phrases. When it gets too annoying, I don't hesitate to turn it off. I sometimes think about "losing" Scout, or even "accidentally" breaking it, acts that would be cruel to my daughter but not to the dog. But for how much longer will this be true? Technology is getting better all the time. What will it mean if we can create a robot that is considered alive? If I find myself annoyed by such a robot, would it be wrong to turn it off? Would that be the same as killing it? The answer isn't obvious. Many people already regard robots more sensitively than I do. At Kofukuji temple near Tokyo, Japan, Buddhist priests conduct services for "dead" Aibo robot dogs. In Japan, inanimate objects are considered to have a spirit or soul, so it makes sense for Aibos to be commemorated in this way. Such sentiments aren't confined to Japan, however. Julie Carpenter, a roboticist in San Francisco has written about bomb disposal soldiers who form strong attachments to their robots, naming them and even sleeping curled up next to them in their Humvees. "I know soldiers have written to military robot manufacturers requesting they fix and return the same robot because it's part of their team," she says.
Government

Defecting Chinese Spy Offers Information Trove To Australian Government (theage.com.au) 82

schwit1 shares a report from The Age, a daily newspaper published in Australia: A Chinese spy has risked his life to defect to Australia and is now offering a trove of unprecedented inside intelligence on how China conducts its interference operations abroad. Wang "William" Liqiang is the first Chinese operative to ever blow his cover. He has revealed the identities of China's senior military intelligence officers in Hong Kong, as well as providing details of how they fund and conduct political interference operations in Hong Kong, Taiwan and Australia.

In interviews with The Age, The Sydney Morning Herald and 60 Minutes, he has revealed in granular detail how Beijing covertly controls listed companies to fund intelligence operations, including the surveillance and profiling of dissidents and the co-opting of media organizations. [...] Mr Wang said he was part of an intelligence operation hidden within a Hong Kong-listed company, China Innovation Investment Limited (CIIL), which infiltrated Hong Kong's universities and media with pro-Chinese Communist Party operatives who could be activated to counter the democracy movement. He says he had personal involvement in an October 2015 operation to kidnap and abduct to the Chinese mainland a Hong Kong bookseller, Lee Bo, and played a role in a clandestine organization that also directed bashings or cyber attacks on Hong Kong dissidents. His handlers in China issued him a fake South Korean passport to gain entry to Taiwan and help China's efforts to systematically infiltrate its political system, including directing a "cyber army" and Taiwanese operatives to meddle in the 2018 municipal elections. Plans are underway to influence the 2020 presidential election - plans that partly motivated him to defect to Australia.
Mr Wang is currently at an undisclosed location in Sydney pending formal protections from the Australian government. More information is expected to be revealed on Monday.
The Military

DOD Joins Fight Against 5G Spectrum Proposal, Citing Risks To GPS (arstechnica.com) 33

An anonymous reader quotes a report from Ars Technica: The Department of Defense has weighed in against a proposal before the Federal Communications Commission to open the 1 to 2 Gigahertz frequency range -- the L band -- for use in 5G cellular networks. The reason: segments of that range of radio spectrum are already used by Global Positioning System signals and other military systems. In a letter to FCC Chairman Ajit Pai, Secretary of Defense Mark Esper pressed for the rejection of the proposal by Ligado Networks (formerly known as Lightspeed), saying, "There are too many unknowns and the risks are far too great to federal operations to allow Ligado's proposed system to proceed... This could have a significant negative impact on military operations, both in peacetime and war."

The FCC has already largely brushed aside similar opposition from NASA, the US Navy, and the National Oceanographic and Atmospheric Administration, among others, over another spectrum block in the 24GHz range -- which is used by weather satellites for remote monitoring of water vapor. But comments are still being collected on the Ligado plan for sharing the 1675 to 1680MHz block of the L Band. Pai has been supportive of the plan because that range is adjacent to the existing 1670 to 1675MHz block already in use for wireless services. GPS signals use several blocks of the L band, including a primary channel centered on 1575.42MHz. GPS uses L band signals because of their ability to penetrate cloud cover, rain, and vegetation. The L band is also used by the DOD for a number of other purposes, including tactical air navigation, landing assistance telemetry, Identify Friend or Foe (IFF) signals, and missile range and aircraft telemetry -- though the DOD has already had to move some of these applications further up the spectrum range to make room for previous "commercial reallocation."

The Military

One Reason the US Military Can't Fix Its Own Equipment 85

Manufacturers can prevent the Department of Defense from repairing certain equipment, which puts members of the military at risk. Elle Ekman, a logistics officer in the United States Marine Corps, writes: In the United States, conversations about right-to-repair issues are increasing, especially at federal agencies and within certain industries. In July, the Federal Trade Commission hosted a workshop to address "the issues that arise when a manufacturer restricts or makes it impossible for a consumer or an independent repair shop to make product repairs." It has long been considered a problem with the automotive industry, electronics and farming equipment. Senators Elizabeth Warren and Bernie Sanders have even brought it up during their presidential campaigns, siding with farmers who want to repair their own equipment; while the senators are advocating national laws, at least 20 states have considered their own right-to-repair legislation this year.

I first heard about the term from a fellow Marine interested in problems with monopoly power and technology. A few past experiences then snapped into focus. Besides the broken generator in South Korea, I remembered working at a maintenance unit in Okinawa, Japan, watching as engines were packed up and shipped back to contractors in the United States for repairs because "that's what the contract says." The process took months. With every engine sent back, Marines lost the opportunity to practice the skills they might need one day on the battlefield, where contractor support is inordinately expensive, unreliable or nonexistent. I also recalled how Marines have the ability to manufacture parts using water-jets, lathes and milling machines (as well as newer 3-D printers), but that these tools often sit idle in maintenance bays alongside broken-down military equipment. Although parts from the manufacturer aren't available to repair the equipment, we aren't allowed to make the parts ourselves "due to specifications."
Power

Lessons From the Cyberattack On India's Largest Nuclear Power Plant (thebulletin.org) 113

Dan Drollette shares an article by two staffers at the Center for Global Security Research at Lawrence Livermore National Laboratory from The Bulletin of Atomic Scientists.

"Indian officials acknowledged on October 30th that a cyberattack occurred at the country's Kudankulam nuclear power plant," they write, adding that "According to last Monday's Washington Post, Kudankulam is India's biggest nuclear power plant, 'equipped with two Russian-designed and supplied VVER pressurized water reactors with a capacity of 1,000 megawatts each.'"

So what did we learn? While reactor operations at Kudankulam were reportedly unaffected, this incident should serve as yet another wake-up call that the nuclear power industry needs to take cybersecurity more seriously. There are worrying indications that it currently does not: A 2015 report by the British think tank Chatham House found pervasive shortcomings in the nuclear power industry's approach to cybersecurity, from regulation to training to user behavior. In general, nuclear power plant operators have failed to broaden their cultures of safety and security to include an awareness of cyberthreats. (And by cultures of safety and security, those in the field -- such as the Fissile Materials Working Group -- refer to a broad, all-embracing approach towards nuclear security, that takes into account the human factor and encompasses programs on personnel reliability and training, illicit trafficking interception, customs and border security, export control, and IT security, to name just a few items. The Hague Communique of 2014 listed nuclear security culture as the first of its three pillars of nuclear security, the other two being physical protection and materials accounting.)

This laxness might be understandable if last week's incident were the first of its kind. Instead, there have been over 20 known cyber incidents at nuclear facilities since 1990. This number includes relatively minor items such as accidents from software bugs and inadequately tested updates along with deliberate intrusions, but it demonstrates that the nuclear sector is not somehow immune to cyber-related threats. Furthermore, as the digitalization of nuclear reactor instrumentation and control systems increases, so does the potential for malicious and accidental cyber incidents alike to cause harm.

This record should also disprove the old myth, unfortunately repeated in Kudankulam officials' remarks, that so-called air-gapping effectively secures operational networks at plants. Air-gapping refers to separating the plant's internet-connected business networks from the operational networks that control plant processes; doing so is intended to prevent malware from more easily infected business networks from affecting industrial control systems. The intrusion at Kudankulam so far seems limited to the plant's business networks, but air gaps have failed at the Davis-Besse nuclear power plant in Ohio in 2003 and even classified U.S. military systems in 2008. The same report from Chatham House found ample sector-wide evidence of employee behavior that would circumvent air gaps, like charging personal phones via reactor control room USB slots and installing remote access tools for contractors... [R]evealing the culprits and motives associated with the Kudankulam attack matters less for the nuclear power industry than fixing the systemic lapses that enabled it in the first place.

"The good news is that solutions abound..." the article concludes, noting guidance, cybersecurity courses, technical exchanges, and information through various security-minded public-private partnerships. "The challenge now is integrating this knowledge into the workforce and maintaining it over time...

"But last week's example of a well-established nuclear power program responding to a breach with denial, obfuscation, and shopworn talk of so-called 'air-gaps' demonstrates how dangerously little progress the industry has made to date."
The Military

Amazon Appeals Pentagon's Choice of Microsoft For $10 Billion Cloud Contract (npr.org) 78

Amazon is going into battle with the Pentagon over a massive military tech contract awarded to Microsoft. Amazon cited "unmistakable bias" as it prepares to protest the selection in federal court. NPR reports: This begins a new chapter in the protracted and contentious battle over the biggest cloud-computing contract in U.S. history -- called JEDI, for Joint Enterprise Defense Infrastructure -- worth up to $10 billion over 10 years. The Pentagon declared Microsoft the winner of JEDI on Oct. 25, after months of delays, investigations and controversy -- at first, over accusations of a cozy relationship between Amazon and the Department of Defense, and later, over President Trump's public criticism of Amazon.

In a statement on Thursday, Amazon's cloud unit argued that "numerous aspects of the JEDI evaluation process contained clear deficiencies, errors, and unmistakable bias -- and it's important that these matters be examined and rectified." The company is appealing the contract at the U.S. Court of Federal Claims. Amazon Web Services spokesperson said the company was "uniquely experienced and qualified" for the job, adding: "We also believe it's critical for our country that the government and its elected leaders administer procurements objectively and in a manner that is free from political influence." Amazon was stunned by its loss of the JEDI contract. Microsoft's cloud business Azure has been a distant second in size to AWS, which also previously won a cloud contract with the CIA. But a former Pentagon official familiar with the JEDI deal previously told NPR that Microsoft's bid "hit the ball out of the park."

Technology

Pentagon Gets a Fix for F-35 Bug in $400,000 Pilot Helmets (bloomberg.com) 80

The U.S. military may have finally found a way to fix a glitch with the world's most high-tech helmet used by pilots flying the most expensive fighter jet in history. From a report: A bug in the $400,000 helmet display screen used by F-35 aviators caused a green glow when flying in very low-light conditions and is now expected to be overcome by using a different type of semiconductor illumination. The distracting green glow was deemed so critical that restrictions were imposed on some night landings on aircraft carriers, and the fault was classified as a "Priority One" fix by the Pentagon's test office. Jittery lines were also visible to some pilots. Defense giant Lockheed Martin has been contracted by the F-35 Joint Program Office for the redesign, modifying headpieces by installing new organic light-emitting diodes to replace traditional liquid crystal displays. "In partnership with the F-35 Joint Program Office and our U.S. Navy customer, we've been working to transition the helmet technology from a traditional LCD to an Organic LED system," Program Manager Jim Gigliotti said by email. Lockheed Martin did not provide a figure for the number of helmets requiring modification or the upgrade cost.
United States

Six Arrested For Selling Chinese Gear To Military As 'Made In America' (arstechnica.com) 95

An anonymous reader quotes a report from Ars Technica: In August 2018, an Air Force service member noticed something strange about a body camera being used by security personnel at an Air Force base: Chinese characters on the screen. A subsequent investigation found numerous indications that the camera -- and two dozen others in the same shipment -- had been made in China. Investigators found three telling logos in the camera's firmware: an Air Force Logo, the logo of the Chinese company that made the camera, and the logo of China's ministry of public security. Forensic analysis indicated that all three images had been loaded on the camera at the same time by someone in a Chinese time zone. This suggested that not only was the camera made in China, but the Chinese knew that the body camera would be shipped to an Air Force facility.

How did a Chinese-made digital camera wind up at a US Air Force base? In a criminal complaint unsealed Thursday, federal prosecutors blamed Aventura, a New York-based company that has been fraudulently re-selling Chinese-made gear for more than a decade. On Thursday, six of the company's founders and senior officials were arrested and charged with fraud and other crimes. [...] [S]ince 2006, the feds say, Aventura has been buying Chinese-made cameras, metal detectors, and other products, slapping "Made in America" logos on them, and re-selling them in the United States -- to customers including U.S. government agencies who are legally prohibited from buying such items.

Biotech

Vast Dragnet Targets Theft of Biomedical Secrets For China (nytimes.com) 58

schwit1 shares a report from The New York Times: The N.I.H. and the F.B.I. have begun a vast effort to root out scientists who they say are stealing biomedical research for other countries from institutions across the United States. Almost all of the incidents they uncovered and that are under investigation involve scientists of Chinese descent, including naturalized American citizens, allegedly stealing for China. Seventy-one institutions, including many of the most prestigious medical schools in the United States, are now investigating 180 individual cases involving potential theft of intellectual property. The cases began after the N.I.H., prompted by information provided by the F.B.I., sent 18,000 letters last year urging administrators who oversee government grants to be vigilant. So far, the N.I.H. has referred 24 cases in which there may be evidence of criminal activity to the inspector general's office of the Department of Health and Human Services, which may turn over the cases for criminal prosecution.

The investigations have fanned fears that China is exploiting the relative openness of the American scientific system to engage in wholesale economic espionage. At the same time, the scale of the dragnet has sent a tremor through the ranks of biomedical researchers, some of whom say ethnic Chinese scientists are being unfairly targeted for scrutiny as Washington's geopolitical competition with Beijing intensifies. The alleged theft involves not military secrets, but scientific ideas, designs, devices, data and methods that may lead to profitable new treatments or diagnostic tools. Some researchers under investigation have obtained patents in China on work funded by the United States government and owned by American institutions, the N.I.H. said. Others are suspected of setting up labs in China that secretly duplicated American research, according to government officials and university administrators. [...] [R]oughly a dozen scientists are known to have resigned or been fired from universities and research centers across the United States so far. Some have declined to discuss the allegations against them; others have denied any wrongdoing. In several cases, scientists supported by the N.I.H. or other federal agencies are accused of accepting funding from the Chinese government in violation of N.I.H. rules. Some have said that they did not know the arrangements had to be disclosed or were forbidden.

Movies

James Dean, Who Died In 1955, Will Return To the Big Screen Via CGI (hollywoodreporter.com) 93

Two VFX companies are bringing James Dean back to the big screen to star in the Vietnam era action-drama Finding Jack. Dean passed away in a 1955 car crash at the age of 24. From The Hollywood Reporter: Directed by Anton Ernst and Tati Golykh, the project comes from the filmmakers' own recently launched production house Magic City Films, which obtained the rights to use Dean's image from his family. Canadian VFX banner Imagine Engine will be working alongside South African VFX company MOI Worldwide to re-create what the filmmakers describe as "a realistic version of James Dean." Adapted by Maria Sova from Gareth Crocker's novel, Finding Jack is based on the existence and abandonment of more than 10,000 military dogs at the end of the Vietnam War. Dean will play a character called Rogan, considered a secondary lead role.

While Finding Jack will be live action, The Hollywood Reporter understands that Dean's performance will be constructed via "full body" CGI using actual footage and photos. Another actor will voice him. Preproduction on Finding Jack starts Nov. 17, with a goal for a worldwide release on Veterans Day 2020. Magic City Films is handling the foreign sales.
"We searched high and low for the perfect character to portray the role of Rogan, which has some extreme complex character arcs, and after months of research, we decided on James Dean," said Ernst, who also produces with Golykh for Magic City Films alongside Donald A. Barton of Artistry Media Group. "We feel very honored that his family supports us and will take every precaution to ensure that his legacy as one of the most epic film stars to date is kept firmly intact. The family views this as his fourth movie, a movie he never got to make. We do not intend to let his fans down."
Privacy

This Is How the US Military's Massive Facial Recognition System Works (medium.com) 51

Over the last 15 years, the United States military has developed a new addition to its arsenal. The weapon is deployed around the world, largely invisible, and grows more powerful by the day. From a report: That weapon is a vast database, packed with millions of images of faces, irises, fingerprints, and DNA data -- a biometric dragnet of anyone who has come in contact with the U.S. military abroad. The 7.4 million identities in the database range from suspected terrorists in active military zones to allied soldiers training with U.S. forces. "Denying our adversaries anonymity allows us to focus our lethality. It's like ripping the camouflage netting off the enemy ammunition dump," wrote Glenn Krizay, director of the Defense Forensics and Biometrics Agency, in notes obtained by OneZero. The Defense Forensics and Biometrics Agency (DFBA) is tasked with overseeing the database, known officially as the Automated Biometric Information System (ABIS).

DFBA and its ABIS database have received little scrutiny or press given the central role they play in U.S. military's intelligence operations. But a newly obtained presentation and notes written by the DFBA's director, Krizay, reveals how the organization functions and how biometric identification has been used to identify non-U.S. citizens on the battlefield thousands of times in the first half of 2019 alone. ABIS also allows military branches to flag individuals of interest, putting them on a so-called "Biometrically Enabled Watch List" (BEWL). Once flagged, these individuals can be identified through surveillance systems on battlefields, near borders around the world, and on military bases. The presentation also sheds light on how military, state, and local law enforcement biometrics systems are linked. According to Krizay's presentation, ABIS is connected to the FBI's biometric database, which is in turn connected to databases used by state and local law enforcement.

EU

Germany's Giant Windmills Are Wildly Unpopular (financialpost.com) 287

"Local politics are a bigger problem for renewable energy growth than competition from fossil fuels," warns a Bloomberg columnist: It's getting harder to get permission to erect the turbine towers. Local regulations are getting stricter. Bavaria decided back in 2014 that the distance between a wind turbine and the nearest housing must be 10 times the height of the mast, which, given the density of dwellings, makes it hard to find a spot anywhere. Wind energy development is practically stalled in the state now. Brandenburg, the state surrounding Berlin, passed a law this year demanding that wind-farm operators pay 10,000 euros ($11,100) per turbine each year to communities within 3 kilometers of the windmills. Wind projects are also often rejected or stalled because they're deemed to interfere with military communications, air traffic control or broadcast radio stations.

Besides, local opponents of the wind farms often go to court to stall new developments or even have existing towers dismantled. According to the wind-industry lobby BWE, 325 turbine installations with a total capacity of more than 1 gigawatt (some 2% of the country's total installed capacity) are tied up in litigation. The irony is that the litigants are often just as "green" as the wind-energy proponents -- one is the large conservation organization NABU, which says it's not against wind energy as such but merely demands that installations are planned with preserving nature in mind. Almost half of the complaints are meant to protect various bird and bat species; others claim the turbines make too much noise or emit too much low-frequency infrasound. Regardless of the validity of such claims, projects get tied up in the courts even after jumping through the many hoops necessary to get a permit.

Another reason for local resistance to the wind farms is a form of Nimbyism: People hate the way the wind towers change landscapes. There's even a German word for it, Verspargelung, roughly translated as pollution with giant asparagus sticks... This nasty political and regulatory climate creates too much uncertainty for investors, just as the German government prepares to phase out wind-energy subsidies...

Without technological breakthroughs -- for example, in energy storage, which would make fewer new turbines necessary -- Germany, and then other countries that try to build up renewable energy generation as it has done, will be hard put to push production to the level required to reach climate goals.

Slashdot Top Deals