Government

Is the Tech World Now 'Central' to Foreign Policy? (wired.com) 41

Wired interviews America's foreign policy chief, Secretary of State Antony Blinken, about U.S. digital polices, starting with a new "cybersecurity bureau" created in 2022 (which Wired previously reported includes "a crash course in cybersecurity, telecommunications, privacy, surveillance, and other digital issues.") Look, what I've seen since coming back to the State Department three and a half years ago is that everything happening in the technological world and in cyberspace is increasingly central to our foreign policy. There's almost a perfect storm that's come together over the last few years, several major developments that have really brought this to the forefront of what we're doing and what we need to do. First, we have a new generation of foundational technologies that are literally changing the world all at the same time — whether it's AI, quantum, microelectronics, biotech, telecommunications. They're having a profound impact, and increasingly they're converging and feeding off of each other.

Second, we're seeing that the line between the digital and physical worlds is evaporating, erasing. We have cars, ports, hospitals that are, in effect, huge data centers. They're big vulnerabilities. At the same time, we have increasingly rare materials that are critical to technology and fragile supply chains. In each of these areas, the State Department is taking action. We have to look at everything in terms of "stacks" — the hardware, the software, the talent, and the norms, the rules, the standards by which this technology is used.

Besides setting up an entire new Bureau of Cyberspace and Digital Policy — and the bureaus are really the building blocks in our department — we've now trained more than 200 cybersecurity and digital officers, people who are genuinely expert. Every one of our embassies around the world will have at least one person who is truly fluent in tech and digital policy. My goal is to make sure that across the entire department we have basic literacy — ideally fluency — and even, eventually, mastery. All of this to make sure that, as I said, this department is fit for purpose across the entire information and digital space.

Wired notes it was Blinken's Department that discovered China's 2023 breach of Microsoft systems. And on the emerging issue of AI, Blinken cites "incredible work done by the White House to develop basic principles with the foundational companies." The voluntary commitments that they made, the State Department has worked to internationalize those commitments. We have a G7 code of conduct — the leading democratic economies in the world — all agreeing to basic principles with a focus on safety. We managed to get the very first resolution ever on artificial intelligence through the United Nations General Assembly — 192 countries also signing up to basic principles on safety and a focus on using AI to advance sustainable development goals on things like health, education, climate. We also have more than 50 countries that have signed on to basic principles on the responsible military use of AI. The goal here is not to have a world that is bifurcated in any way. It's to try to bring everyone together.
Privacy

Signal is More Than Encrypted Messaging. It Wants to Prove Surveillance Capitalism Is Wrong (wired.com) 70

Slashdot reader echo123 shared a new article from Wired titled "Signal Is More Than Encrypted Messaging. Under Meredith Whittaker, It's Out to Prove Surveillance Capitalism Wrong." ("On its 10th anniversary, Signal's president wants to remind you that the world's most secure communications platform is a nonprofit. It's free. It doesn't track you or serve you ads. It pays its engineers very well. And it's a go-to app for hundreds of millions of people.") Ten years ago, WIRED published a news story about how two little-known, slightly ramshackle encryption apps called RedPhone and TextSecure were merging to form something called Signal. Since that July in 2014, Signal has transformed from a cypherpunk curiosity — created by an anarchist coder, run by a scrappy team working in a single room in San Francisco, spread word-of-mouth by hackers competing for paranoia points — into a full-blown, mainstream, encrypted communications phenomenon... Billions more use Signal's encryption protocols integrated into platforms like WhatsApp...

But Signal is, in many ways, the exact opposite of the Silicon Valley model. It's a nonprofit funded by donations. It has never taken investment, makes its product available for free, has no advertisements, and collects virtually no information on its users — while competing with tech giants and winning... Signal stands as a counterfactual: evidence that venture capitalism and surveillance capitalism — hell, capitalism, period — are not the only paths forward for the future of technology.

Over its past decade, no leader of Signal has embodied that iconoclasm as visibly as Meredith Whittaker. Signal's president since 2022 is one of the world's most prominent tech critics: When she worked at Google, she led walkouts to protest its discriminatory practices and spoke out against its military contracts. She cofounded the AI Now Institute to address ethical implications of artificial intelligence and has become a leading voice for the notion that AI and surveillance are inherently intertwined. Since she took on the presidency at the Signal Foundation, she has come to see her central task as working to find a long-term taproot of funding to keep Signal alive for decades to come — with zero compromises or corporate entanglements — so it can serve as a model for an entirely new kind of tech ecosystem...

Meredith Whittaker: "The Signal model is going to keep growing, and thriving and providing, if we're successful. We're already seeing Proton [a startup that offers end-to-end encrypted email, calendars, note-taking apps, and the like] becoming a nonprofit. It's the paradigm shift that's going to involve a lot of different forces pointing in a similar direction."

Key quotes from the interview:
  • "Given that governments in the U.S. and elsewhere have not always been uncritical of encryption, a future where we have jurisdictional flexibility is something we're looking at."
  • "It's not by accident that WhatsApp and Apple are spending billions of dollars defining themselves as private. Because privacy is incredibly valuable. And who's the gold standard for privacy? It's Signal."
  • "AI is a product of the mass surveillance business model in its current form. It is not a separate technological phenomenon."
  • "...alternative models have not received the capital they need, the support they need. And they've been swimming upstream against a business model that opposes their success. It's not for lack of ideas or possibilities. It's that we actually have to start taking seriously the shifts that are going to be required to do this thing — to build tech that rejects surveillance and centralized control — whose necessity is now obvious to everyone."

The Military

Navy Chiefs Conspired To Get Themselves Illegal Warship Wi-Fi (navytimes.com) 194

During a 2023 deployment, senior enlisted leaders aboard the Navy ship USS Manchester secretly installed a Starlink Wi-Fi network, allowing them exclusive internet access in violation of Navy regulations. "Unauthorized Wi-Fi systems like the one [then-Command Senior Chief Grisel Marrero] set up are a massive no-no for a deployed Navy ship, and Marrero's crime occurred as the ship was deploying to the West Pacific, where such security concerns become even more paramount among heightened tensions with the Chinese," reports Navy Times. From the report: As the ship prepared for a West Pacific deployment in April 2023, the enlisted leader onboard conspired with the ship's chiefs to install the secret, unauthorized network aboard the ship, for use exclusively by them. So while rank-and-file sailors lived without the level of internet connectivity they enjoyed ashore, the chiefs installed a Starlink satellite internet dish on the top of the ship and used a Wi-Fi network they dubbed "STINKY" to check sports scores, text home and stream movies. The enjoyment of those wireless creature comforts by enlisted leaders aboard the ship carried serious repercussions for the security of the ship and its crew. "The danger such systems pose to the crew, the ship and the Navy cannot be understated," the investigation notes.

Led by the senior enlisted leader of the ship's gold crew, then-Command Senior Chief Grisel Marrero, the effort roped in the entire chiefs mess by the time it was uncovered a few months later. Marrero was relieved in late 2023 after repeatedly misleading and lying to her ship's command about the Wi-Fi network, and she was convicted at court-martial this spring in connection to the scheme. She was sentenced to a reduction in rank to E-7 after the trial and did not respond to requests for comment for this report. The Navy has yet to release the entirety of the Manchester investigation file to Navy Times, including supplemental enclosures. Such records generally include statements or interview transcripts with the accused.

But records released so far show the probe, which wrapped in November, found that the entire chiefs mess knew about the secret system, and those who didn't buy into it were nonetheless culpable for not reporting the misconduct. Those chiefs and senior chiefs who used, paid for, helped hide or knew about the system were given administrative nonjudicial punishment at commodore's mast, according to the investigation. All told, more than 15 Manchester chiefs were in cahoots with Marrero to purchase, install and use the Starlink system aboard the ship. "This agreement was a criminal conspiracy, supported by the overt act of bringing the purchased Starlink onboard USS MANCHESTER," the investigation said. "Any new member of the CPO Mess which then paid into the services joined that conspiracy following the system's operational status."

Records obtained by Navy Times via a Freedom of Information Act request reveal a months-long effort by Marrero to obtain, install and then conceal the chiefs Wi-Fi network from superiors, including the covert installation of a Starlink satellite dish on the outside of the Manchester. When superiors became suspicious about the existence of the network and confronted her about it, Marrero failed to come clean on multiple occasions and provided falsified documents to further mislead Manchester's commanding officer, the investigation states. "The installation and usage of Starlink, without the approval of higher headquarters, poses a serious risk to mission, operational security, and information security," the investigation states.

China

Space Command Chief Says Dialogue With China Too Often a One-Way Street (arstechnica.com) 57

U.S. Space Command chief Gen. Stephen Whiting called for greater transparency from China regarding space debris this week, citing concerns over the recent breakup of a Long March 6A rocket's upper stage. The incident, which occurred after an August 6 satellite launch, scattered over 300 pieces of debris in low-Earth orbit.

While acknowledging some improvement in U.S.-China military dialogue, Whiting stressed on the need for proactive communication about space junk, ArsTechnica reports. "I hope the next time there's a rocket like that, that leaves a lot of debris, that it's not our sensors that are the first to detect that, but we're getting communications to help us understand that," he said.
Encryption

Feds Bust Alaska Man With 10,000+ CSAM Images Despite His Many Encrypted Apps (arstechnica.com) 209

A recent indictment (PDF) of an Alaska man stands out due to the sophisticated use of multiple encrypted communication tools, privacy-focused apps, and dark web technology. "I've never seen anyone who, when arrested, had three Samsung Galaxy phones filled with 'tens of thousands of videos and images' depicting CSAM, all of it hidden behind a secrecy-focused, password-protected app called 'Calculator Photo Vault,'" writes Ars Technica's Nate Anderson. "Nor have I seen anyone arrested for CSAM having used all of the following: [Potato Chat, Enigma, nandbox, Telegram, TOR, Mega NZ, and web-based generative AI tools/chatbots]." An anonymous reader shares the report: According to the government, Seth Herrera not only used all of these tools to store and download CSAM, but he also created his own -- and in two disturbing varieties. First, he allegedly recorded nude minor children himself and later "zoomed in on and enhanced those images using AI-powered technology." Secondly, he took this imagery he had created and then "turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see." In other words, he created fake AI CSAM -- but using imagery of real kids.

The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have "created his own public Telegram group to store his CSAM." He also joined "multiple CSAM-related Enigma groups" and frequented dark websites with taglines like "The Only Child Porn Site you need!" Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera "was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices."

The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the "I'll hide it behind an encrypted app that looks like a calculator!" technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly "admitted to seeing CSAM online for the past year and a half" in an interview with the feds.

United States

Appliance and Tractor Companies Lobby Against Giving the Military the Right to Repair (404media.co) 142

Device manufacturers across multiple industries are lobbying against proposed legislation that would require military contractors to provide the U.S. military with easier access to repair materials and information, according to a document obtained by 404 Media.

The legislation, Section 828 of the Defense Reauthorization Act, aims to address the military's current inability to repair equipment ranging from fighter jets to Navy battleships without relying on contractors. Sen. Elizabeth Warren highlighted the issue in a May hearing, citing examples of how repair restrictions lead to increased costs and operational delays for the Department of Defense.

The lobbying effort extends beyond military contractors to include organizations representing industries such as irrigation equipment, motorcycles, tractors, plumbing, medical devices, and consumer technology. In a letter to lawmakers, these groups argue that the legislation would impose significant burdens on contractors and undermine existing technical data rights statutes.
The Military

The US Military's Latest Psyop? Advertising on Tinder (techcrunch.com) 54

An anonymous reader shares a report: The U.S. military is using ads to warn people across Lebanon not to attack the United States or its allies amid rising tensions across the Middle East. Some of those ads have turned up in an unlikely place: the dating app Tinder. Freelance reporter Seamus Malekafzali posted on X screenshots of the ads seen in the Tinder app, warning residents of Lebanon to "not take up arms."

The ads, written in Arabic, say that the U.S. will "protect its partners in the face of threats from the Iranian regime and its proxies," which operate across the region, referring to groups like Hezbollah located in Lebanon. The ads, which are not clandestine in nature, display the logo of U.S. Central Command and link to a tweet featuring F-16 and A10 fighter jets. These kinds of military psychological operations (or psyops), aimed at influencing the views of a target audience or population, are not new, even if their placement on a dating app is raising eyebrows in the military community, the Washington Post reported Tuesday.

The Military

Telegram CEO Pavel Durov's Arrest Upends Kremlin Military Communications (politico.eu) 107

Telegram founder and CEO Pavel Durov was arrested Saturday night by French authorities on allegations that his social media platform was being used for child pornography, drug trafficking and organized crime. The move sparked debate over free speech worldwide from prominent anti-censorship figures including Elon Musk, Robert F. Kennedy. Jr. and Edward Snowden. However, "the immediate freakout came from Russia," reports Politico. "That's because Telegram is widely used by the Russian military for battlefield communications thanks to problems with rolling out its own secure comms system. It's also the primary vehicle for pro-war military bloggers and media -- as well as millions of ordinary Russians." From the report: "They practically detained the head of communication of the Russian army," Russian military blogger channel Povernutie na Z Voine said in a Telegram statement. The blog site Dva Mayora said that Russian specialists are working on an alternative to Telegram, but that the Russian army's Main Communications Directorate has "not shown any real interest" in getting such a system to Russian troops. The site said Durov's arrest may actually speed up the development of an independent comms system. Alarmed Russian policymakers are calling for Durov's release.

"[Durov's] arrest may have political grounds and be a tool for gaining access to the personal information of Telegram users," the Deputy Speaker of the Russian Duma Vladislav Davankov said in a Telegram statement. "This cannot be allowed. If the French authorities refuse to release Pavel Durov from custody, I propose making every effort to move him to the UAE or the Russian Federation. With his consent, of course." Their worry is that Durov may hand over encryption keys to the French authorities, allowing access to the platform and any communications that users thought was encrypted.

French President Emmanuel Macron said Monday that the arrest of Durov was "in no way a political decision." The Russian embassy has demanded that it get access to Durov, but the Kremlin has so far not issued a statement on the arrest. "Before saying anything, we should wait for the situation to become clearer," said Kremlin spokesperson Dmitry Peskov. However, officials and law enforcement agencies were instructed to clear all their communication from Telegram, the pro-Kremlin channel Baza reported. "Everyone who is used to using the platform for sensitive conversations/conversations should delete those conversations right now and not do it again," Kremlin propagandist Margarita Simonyan said in a Telegram post. "Durov has been shut down to get the keys. And he's going to give them."

Sci-Fi

Netflix Shares First Six Minutes of New Anime Series 'Terminator Zero' (netflix.com) 66

"It's going to be violent," warns the creator of Terminator Zero, an eight-episode anime series premiering Thursday August 29th on Netflix. "It's going to be dark, it's going to be horrific, and it's going to be arresting."

And the Netflix blog has now shared the first six minutes online: In the world of Terminator, the future is never set, yet some things are guaranteed: The Terminator is still a cyborg that feels no remorse, pity, or fear. The anime series TERMINATOR ZERO, landing on Netflix on Aug. 29 — known to fans as Judgment Day — looks different from any incarnation of the Terminator franchise we've seen before, but you can tell from these opening six minutes that the brutal, sophisticated action will remain.

"I realized the first minutes of the show have to declare what it is," creator and executive producer Mattson Tomlin tells Tudum. A joint production between Skydance and the Japanese animation studio Production I.G, TERMINATOR ZERO has the challenge of drawing in both anime fans and fans of the Terminator series. "The way to do that was to have a sequence that had no dialogue, that was really planting a flag in letting everybody know this is going to be violent, it's going to be dark, it's going to be action-driven, it's going to be horrific, and it's going to be arresting," says Tomlin, who previously wrote Project Power for Netflix and is currently writing The Batman Part II. "That's just what it has to be."

The series follows "a new batch of characters who live in Japan in 1997," writes CBR — and in an interview the show's director said "There's a balance" when representing Japan's actual culture while keeping the show futuristic: One of the things that I really took for granted was guns. [Points to self] Dumb American over here had to write a scene where Eiko gets into a parking lot and smashes the window of a car, goes to the glove box, takes out a revolver, and it instantly gets flagged. [Other people working on the series] were like, "No, we don't have guns. What you are describing, that's over there. We're over here in civilization where that can't happen." That triggered a really fruitful and creatively challenging discussion about weapons. The military has guns and the police have guns. That's kind of it. So these characters have to arm themselves. How are they going to do it? What could we do? And that's why the Terminator has a crossbow. Eiko has all of these different weapons that she concocted from a hardware store. It was all born out of that.
Security

'Invasive' Iranian Intelligence Group Believed to Be The Ones Who Breached Trump's Campaign (reuters.com) 98

Reuters reports that the Iranian hacking team which compromised the campaign of U.S. presidential candidate Donald Trump "is known for placing surveillance software on the mobile phones of its victims, enabling them to record calls, steal texts and silently turn on cameras and microphones, according to researchers and experts who follow the group." Known as APT42 or CharmingKitten by the cybersecurity research community, the accused Iranian hackers are widely believed to be associated with an intelligence division inside Iran's military, known as the Intelligence Organization of the Islamic Revolutionary Guard Corps or IRGC-IO. Their appearance in the U.S. election is noteworthy, sources told Reuters, because of their invasive espionage approach against high-value targets in Washington and Israel. "What makes (APT42) incredibly dangerous is this idea that they are an organization that has a history of physically targeting people of interest," said John Hultquist, chief analyst with U.S. cybersecurity firm Mandiant, who referenced past research that found the group surveilling the cell phones of Iranian activists and protesters... Hultquist said the hackers commonly use mobile malware that allows them to "record phone calls, room audio recordings, pilfer SMS (text) inboxes, take images off of a machine," and gather geolocation data...

APT42 also commonly impersonates journalists and Washington think tanks in complex, email-based social engineering operations that aim to lure their targeting into opening booby-trapped messages, which let them takeover systems. The group's "credential phishing campaigns are highly targeted and well-researched; the group typically targets a small number of individuals," said Josh Miller, a threat analyst with email security company Proofpoint. They often target anti-Iran activists, reporters with access to sources inside Iran, Middle Eastern academics and foreign-policy advisers. This has included the hacking of western government officials and American defense contractors. For example, in 2018, the hackers targeted nuclear workers and U.S. Treasury department officials around the time the United States formally withdrew from the Joint Comprehensive Plan of Action (JCPOA), said Allison Wikoff, a senior cyber intelligence analyst with professional services company PricewaterhouseCoopers.

"APT42 is still actively targeting campaign officials and former Trump administration figures critical of Iran, according to a blog post by Google's cybersecurity research team."
Earth

Megatsunami Risk On the Rise As Glacial Melt Drives Landslides (theguardian.com) 50

An anonymous reader quotes a report from The Guardian: Just under a year ago, the east coast of Greenland was hit by a megatsunami. Triggered by a large landslide entering the uninhabited Dickson Fjord, the resulting tsunami was 200 meters high -- equivalent to more than 40 double-decker buses. Luckily no one was hurt, though a military base was obliterated. Now analysis of the seismic data associated with the event has revealed that the tsunami was followed by a standing wave, which continued to slosh back and forth within the narrow fjord for many days.

Angela Carrillo Ponce from the German Research Centre for Geosciences in Potsdam, analyzed the seismic data, recorded at earthquake monitoring stations more than 3,000 miles (5,000km) away, and found signals persisting long after the 16 September 2023 landslide event. Using satellite images and computer modeling, Ponce and her colleagues were able to confirm the presence of a standing wave of about 1 meter in height which lasted for more than a week.

Their findings, published in The Seismic Record, warn that climate change is accelerating the melt of Greenland's glaciers and permafrost, increasing the chance of landslides and subsequent megatsunamis. Smaller events have been observed a number of times in recent years, such as the rock avalanche into western Greenland's Karrat Fjord in 2017, which triggered a tsunami that flooded the village of Nuugaatsiaq, destroying 11 houses and killing four people.

The Military

Workers at Google DeepMind Push Company to Drop Military Contracts (time.com) 143

Nearly 200 Google DeepMind workers signed a letter urging Google to cease its military contracts, expressing concerns that the AI technology they develop is being used in warfare, which they believe violates Google's own AI ethics principles. "The letter is a sign of a growing dispute within Google between at least some workers in its AI division -- which has pledged to never work on military technology -- and its Cloud business, which has contracts to sell Google services, including AI developed inside DeepMind, to several governments and militaries including those of Israel and the United States," reports TIME Magazine. "The signatures represent some 5% of DeepMind's overall headcount -- a small portion to be sure, but a significant level of worker unease for an industry where top machine learning talent is in high demand." From the report: The DeepMind letter, dated May 16 of this year, begins by stating that workers are "concerned by recent reports of Google's contracts with military organizations." It does not refer to any specific militaries by name -- saying "we emphasize that this letter is not about the geopolitics of any particular conflict." But it links out to an April report in TIME which revealed that Google has a direct contract to supply cloud computing and AI services to the Israeli Military Defense, under a wider contract with Israel called Project Nimbus. The letter also links to other stories alleging that the Israeli military uses AI to carry out mass surveillance and target selection for its bombing campaign in Gaza, and that Israeli weapons firms are required by the government to buy cloud services from Google and Amazon.

"Any involvement with military and weapon manufacturing impacts our position as leaders in ethical and responsible AI, and goes against our mission statement and stated AI Principles," the letter that circulated inside Google DeepMind says. (Those principles state the company will not pursue applications of AI that are likely to cause "overall harm," contribute to weapons or other technologies whose "principal purpose or implementation" is to cause injury, or build technologies "whose purpose contravenes widely accepted principles of international law and human rights.") The letter says its signatories are concerned with "ensuring that Google's AI Principles are upheld," and adds: "We believe [DeepMind's] leadership shares our concerns." [...]

The letter calls on DeepMind's leaders to investigate allegations that militaries and weapons manufacturers are Google Cloud users; terminate access to DeepMind technology for military users; and set up a new governance body responsible for preventing DeepMind technology from being used by military clients in the future. Three months on from the letter's circulation, Google has done none of those things, according to four people with knowledge of the matter. "We have received no meaningful response from leadership," one said, "and we are growing increasingly frustrated."

Games

'Civilization 7 Captures the Chaos of Human History In Manageable Doses' (theguardian.com) 62

An anonymous reader quotes a report from The Guardian, written by Julian Benson: It's been eight years since Civilization 6 -- the most recent in a very long-running strategy game series that sees you take a nation from the prehistoric settlement of their first town through centuries of development until they reach the space age. Since 2016 it has amassed an abundance of expansions, scenario packs, new nations, modes and systems for players to master -- but series producer Dennis Shirk at Firaxis Games feels that enough it enough. "It was getting too big for its britches," he says. "It was time to make something new."

"It's tough to even get through the whole game," designer Ed Beach says, singling out the key problem that Firaxis aims to solve with the forthcoming Civilization 7. While the early turns of a campaign in Civilization 6 can be swift, when you're only deciding the actions for the population of a single town, "the number of systems, units, and entities you must manage explodes after a while," Beach says. From turn one to victory, a single campaign can take more than 20 hours, and if you start falling behind other nations, it can be tempting to restart long before you see the endgame. That's why Civilization 7's campaign has been split into three ages -- Antiquity, Exploration and Modern -- with each ending in a dramatic explosion of global crises. "Breaking the game into chapters lets people get through history in a more digestible fashion," Beach says.

When you start a new campaign, you pick a leader and civilization to govern, and direct your people in establishing their first settlements and encounters with the other peoples populating a largely undeveloped land. You'll choose the technologies they research, the expansions they make to their cities, and whom they try to befriend or conquer. Every turn you complete or scientific, economic, cultural and military milestone you pass adds points to a meter running in the background. Once that meter hits 200, you and all the other surviving civilizations on the map will transition into the next age. When moving from Antiquity to Exploration and later Exploration to Modern, you select a new civilization to lead. You'll retain all the cities you controlled before but have access to different technologies and attributes. This may seem strange, but it's built to reflect history: think of London, which was once run by the Romans before being supplanted by the Anglo-Saxons. No empire lasts for ever, but they don't all collapse, either.

Breaking Civilization 7 into chapters also gives campaigns a new rhythm. As you approach the end of an age, you'll begin to face global crises. In Antiquity, for instance, you can see a proliferation of independent powers similar to the tribes that tore down Rome. "We're not calling them barbarians any more," Beach says. "It's a more nuanced way to present them." These crises multiply and strengthen until you reach the next age. "It's like a sci-fi or fantasy series with a huge, crazy conclusion, and then the next book starts nice and calm," Beach says. "There's a point where getting to the next age is a relief."
Here's a round-up of thoughts on Civilization 7 from some of the most respected gaming outlets and reviewers:

Civilization VII hands-on: This strategy sequel rethinks the long game -- Ars Technica's Samuel Axon
Civilization 7 pairs seismic changes with a lovably familiar formula -- Eurogamer's Chris Tapsell
Civilization 7 hands-on: Huge changes are coming to the classic strategy series - PC Gamer's Tyler Wilde
Civilization 7 lets you mix and match history -- and it's a blast - The Verge's Ash Parrish
Civilization 7 Hands-On Preview: Creating Your Legacy - Game Rant's Joshua Duckworth
Sid Meier's Civilization VII preview -- possibly the freshest sequel yet - GamesHub's Jam Walker
How Civilization 7 Rethinks The Series' Structure - GameSpot's Steve Watts
The Military

To Best China, Pentagon Must Shed 'the Same Old Mindsets' (axios.com) 38

An anonymous reader shares a report: Pentagon officials say the U.S. stands at the precipice of a new golden age of defense innovation driven by upstart contractors, advances in technology and a world brimming with threats. The Defense Department's inability to make unorthodox bets, feed a vibrant industrial base and embrace readily available technologies has rendered it under-supplied, the target of dual-use evangelists and vulnerable to more nimble adversaries.

Deputy Defense Secretary Kathleen Hicks said in a speech last week the department "cannot tolerate the same old mindsets" as it butts heads with Russia and China, while also invoking America's mass production overhaul during World War II. Heidi Shyu, the Pentagon's chief tech officer, separately called the clip of "nontraditional, venture-backed companies" entering the defense industry "unprecedented," adding: "They're nipping at the heels, I tell you. I have traditional defense contractors say, 'Hey, this isn't fair.'"

Defense Innovation Unit director Doug Beck said the department is at a "positive tipping point." "We've been given the tools, and now it's about execution and delivery," Beck said. "I think we're well on our way out of the dark age." Hicks' declaration comes one year after she stuck her neck out for Replicator, meant to arm troops with thousands of drones and prove the Pentagon can be agile. That $1 billion gambit is on track, with more than 1,000 AeroVironment-made Switchblade 600 drones already in the pipeline, according to officials.

Power

Fire Damages Russian-Occupied Nuclear Plant in Ukraine (theguardian.com) 249

The Guardian reports Sunday, Ukraine's president, Volodymyr Zelenskiy, highlighted that Russian forces appeared to have started a fire in one of the cooling towers of the Zaporizhzhia nuclear power plant that it has occupied since the early days of the war. "Radiation levels are within norm," Zelenskiy said before accusing Russia of using its control of the site, whose six reactors are in shutdown mode, "to blackmail Ukraine, all of Europe, and the world". A Ukrainian official in Nikopol, the nearest town across the river Dnipro from the nuclear plant, added that according to "unofficial information", the fire was caused by setting fire to "a large number of automobile tyres" in a cooling tower. Video and pictures showed smoke dramatically billowing from one of the towers, although experts said they are not in use while the reactor is in shutdown mode, prompting some to question whether it was a way of trying raise the stakes over Ukraine's incursion into Russia.
From the CBC: The Russian management of the facility said emergency workers had contained the fire and that there was no threat of it spreading further. "The fire did not affect the operation of the station," it said. The six reactors at the plant located close to the front line of the war in Ukraine are not in operation but the facility relies on external power to keep its nuclear material cool and prevent a catastrophic accident. Moscow and Kyiv have routinely accused each other of endangering safety around it.
Japan

Survivors of the Atomic Bomb Attack on Hiroshima Struggle - and Speak (nytimes.com) 231

"Not many Americans have August 6 circled on their calendars," writes the New York Times, "but it's a day that the Japanese can't forget."

79 years after an atomic bomb attack on Hiroshima, the Times visits a hospital that "continues to treat, on average, 180 survivors — known as hibakusha — of the blasts each day." The bombs killed an estimated 200,000 men, women and children and maimed countless more. In Hiroshima 50,000 of the city's 76,000 buildings were completely destroyed. In Nagasaki nearly all homes within a mile and a half of the blast were wiped out. In both cities the bombs wrecked hospitals and schools. Urban infrastructure collapsed...

[T]he hibakusha and their offspring have formed the backbone of atomic memory. Many see their life's work as informing the wider world about what it's like to carry the trauma, stigma and survivor's guilt caused by the bombs, so that nuclear weapons may never be used again. Their urgency to do so has only increased in recent years. With an average age of 85, the hibakusha are dying by the hundreds each month — just as the world is entering a new nuclear age. Countries like the United States, China and Russia are spending trillions of dollars to modernize their stockpiles. Many of the safeguards that once lowered nuclear risk are unraveling, and the diplomacy needed to restore them is not happening. The threat of another blast can't be relegated to history...

Kunihiko Sakuma [who was 9 months old the day of the attack]: "People died or got sick not just right after the bombing. The reality is, their symptoms are emerging even today, 79 years later. I thought all this was in the past. But as I started talking to survivors, I realized their suffering was ongoing. The atomic bomb is such an inhumane weapon, and the effects of radiation stay with survivors for a very long time. That's why they need our continued support."

The article includes this quote from Keiko Ogura, who was 8 years old at the time of the attack — and still worries she hasn't done enough to abolish the use of nuclear weapons: "As survivors, we cannot do anything but tell our story. 'For we shall not repeat the evil' — this is the pledge of survivors. Until we die, we want to tell our story, because it's difficult to imagine."

Many of the stories are horrifying. But I'll note this one by Seiichiro Mise — who on the day of the atomic bomb attack was 10 years old: "I got married in 1964. At the time, people would say that if you married an atomic bomb survivor, any kids you had would be deformed.

"Two years later, I got a call from the hospital saying my baby had been born. But on my way, my heart was troubled. I'm an atomic bomb victim. I experienced that black rain. So I felt anguished. Usually new parents simply ask the doctor, 'Is it a boy or girl?' I didn't even ask that. Instead, I asked, 'Does my baby have 10 fingers and 10 toes?'

"The doctor looked unsettled. But then he smiled and said it was a healthy boy. I was relieved."

The first U.S. president to visit Hiroshima was Barack Obama in 2016. The article notes he did not issue the official apology many Japanese had hoped for. But he did say "we have a shared responsibility to look directly into the eye of history and ask what we must do differently to curb such suffering again...

"Someday the voices of the hibakusha will no longer be with us to bear witness. But the memory of the morning of Aug. 6, 1945, must never fade."
Government

How America's FBI Sabotaged Tech-Stealing Spies from the USSR (politico.com) 27

FBI agent Rick Smith remembered seeing that Austrian-born Silicon Valley entrepreneur one year earlier — walking into San Francisco's Soviet Consulate in the early 1980s. Their chance reunion at a bar "would sow the seeds for a major counterintelligence campaign," writes a national security journalist in Politico, describing the collaboration as "an FBI-led operation that sold the Soviet Bloc millions in secretly sabotaged U.S. hi-tech."

The Austrian was already selling American tech goods to European countries, and "By the early 1980s, the FBI knew the Soviet Union was desperate for cutting-edge American technology, like the U.S.-produced microchips then revolutionizing a vast array of digital devices, including military systems..." Moscow's spies worked assiduously to steal such dual use tech or purchase it covertly. The Soviet Union's ballistic missile programs, air defense systems, electronic spying platforms, and even space shuttles, depended on it.... But such tech-focused sanctions-evasion schemes by America's foes offer opportunities for U.S. intelligence, too — including the opportunity to launch ultra-secret sabotage campaigns to alter sensitive technologies before they reach their final destination... Working under the FBI's direction, the Austrian agreed to pose as a crook, a man willing to sell prohibited technology to the communist Eastern Bloc... [T]he FBI and the Austrian would seed faulty tech to Moscow and its allies; drain the Soviet Bloc's coffers; expose its intelligence officers and secret American conspirators; and reveal to American counterspies exactly what tech the Soviets were after...

[T]he Soviet Bloc would unknowingly purchase millions of dollars' worth of sabotaged U.S. goods. Communist spies, ignorant that they were being played, would be feted with a literal parade in a Warsaw Pact capital for their success in purchasing this forbidden technology from the West... The Austrian's connections now presented a major opportunity. The Bulgarians, and their East German and Russia allies, were going to get that forbidden tech. But not before the FBI tampered with it first...

Some of the tech was subtly altered before the Bulgarians could get their hands on it. Some was rendered completely unusable. Some of it was shipped unadulterated to keep the operation humming — and allay any suspicions from the Eastern Bloc about what might be going on. And some of it never made its way to the Bulgarians at all. In one case, the bureau intercepted a $400,000 order of computer hardware from the San Jose-based firm Proquip and shipped out 6,000 pounds of sandbags instead.... Some suffered what appeared to be "accidental" wear-and-tear during the long journey to the Eastern Bloc, recalled Ed Appel [a former senior FBI official]. Other times, the FBI would tamper with the electronics so they would experience "chance" voltage overloads once Soviet Bloc operatives plugged them in. The sabotage could also be more subtle, designed to degrade machine parts or microchips over time, or to render hi-tech tools that required intense precision slightly, if imperceptibly, inaccurate.

The article concludes that "While the Soviet Union might have imploded over three decades ago... Russia's intelligence services are still scouring the globe for prohibited U.S. tech, particularly since Moscow's February 2022 invasion of Ukraine...

"Russia has reportedly even covertly imported household items like refrigerators and washing machines to rip out the microchips within them for use in military equipment."
Space

China's Long March 6A Rocket Is Making a Mess In Low-Earth Orbit. (arstechnica.com) 34

Longtime Slashdot reader schwit1 shares a report from Ars Technica: The upper stage from a Chinese rocket that launched a batch of Internet satellites Tuesday has broken apart in space, creating a debris field of at least 700 objects in one of the most heavily-trafficked zones in low-Earth orbit. US Space Command, which tracks objects in orbit with a network of radars and optical sensors, confirmed the rocket breakup Thursday. Space Command initially said the event created more than 300 pieces of trackable debris. The military's ground-based radars are capable of tracking objects larger than 10 centimeters (4 inches). Later Thursday, LeoLabs, a commercial space situational awareness company, said its radars detected at least 700 objects attributed to the Chinese rocket. The number of debris fragments could rise to more than 900, LeoLabs said. The culprit is the second stage of China's Long March 6A rocket, which lifted off Tuesday with the first batch of 18 satellites for a planned Chinese megaconstellation that could eventually number thousands of spacecraft. The Long March 6A's second stage apparently disintegrated after placing its payload of 18 satellites into a polar orbit.

Space Command said in a statement it has "observed no immediate threats" and "continues to conduct routine conjunction assessments to support the safety and sustainability of the space domain." According to LeoLabs, radar data indicated the rocket broke apart at an altitude of 503 miles (810 kilometers) at approximately 4:10 pm EDT (20:10 UTC) on Tuesday, around 13-and-a-half hours after it lifted off from northern China. At this altitude, it will take decades or centuries for the wispy effect of aerodynamic drag to pull the debris back into the atmosphere. As the objects drift lower, their orbits will cross paths with SpaceX's Starlink Internet satellites, the International Space Station and other crew spacecraft, and thousands more pieces of orbital debris, putting commercial and government satellites at risk of collision.

Power

DARPA Wants To Bypass the Thermal Middleman In Nuclear Power Systems (ans.org) 45

The Defense Advanced Research Projects Agency (DARPA) is exploring the possibility of directly converting radiation from nuclear reactors into electricity using radiovoltaics, a technology that could potentially revolutionize nuclear power generation by moving beyond traditional steam turbine methods. The agency is requesting information and suggestions on this topic in an RFI released on August 1st. Nuclear News reports: There's got to be a better way": Methods to convert the energy of nuclear fission reactions and the decay of radioisotopes into electricity have not evolved since the invention of radioisotope power systems and fission reactors over 70 years ago and remain unoptimized," the RFI says. They rely on thermal heat transfer, and "in each step of this indirect conversion method neutrons, heat, and energy are lost to the shielding material, working fluid, and other system materials." Advanced reactor designs that use alternative coolants, including helium, sodium, and salts, would still use what DARPA calls "heritage nuclear power conversion technology" with water and steam as the working fluids, as would the fusion power plants being planned today.

Why now? Tabitha Dodson, the program manager for DARPA DSO, which is launching the RFI, told Nuclear News that "two big things" are driving the interest. "One is the extreme surge of investment in small and advanced nuclear technologies, such as in fusion and space reactors, which do not have a concurrent pairing of advanced power generation methods that doesn't involve liquid-based heat transfer," she said. "Next, there has been an order of magnitude improvement in radiation tolerance and efficiency for voltaics in recent years with encouraging performance that indicates radiovoltaics could scale up as an array usable in nuclear reactors." [...]

What is the ask?: The RFI asks: "Is it possible to achieve [a] direct energy conversion nuclear power system, ranging in power from 10s of watts electric (We) to 100s of kWe?" DARPA wants information "on the potential to improve specific power greater than 1 We/kg conversion from watts-thermal per radiation emission product," and information on the potential to improve damage tolerance of the voltaic to nuclear radiation to reach an operating lifetime comparable to the life of its nuclear source, on the scale of decades. "We will learn what our boundary conditions are when respondents tell us what technologies in the field of voltaics are possible, and we'll use that to see if there is sufficient scientific rationale make a case to present for further DARPA investment," Dodson said. "I also hope people are going to start thinking about nuclear systems that use electromagnetic versus thermal-kinetic methods to harvest nuclear energetic reactions."

Security

USPS Text Scammers Duped His Wife, So He Hacked Their Operation (wired.com) 61

Security researcher Grant Smith uncovered a large-scale smishing scam where scammers posing as the USPS tricked victims into providing their credit card details through fake websites. Smith hacked into the scammers' systems, gathered evidence, and collaborated with the USPS and a US bank to protect over 438,000 unique credit cards from fraudulent activity. Wired reports: The flood of text messages started arriving early this year. They carried a similar thrust: The United States Postal Service is trying to deliver a parcel but needs more details, including your credit card number. All the messages pointed to websites where the information could be entered. Like thousands of others, security researcher Grant Smith got a USPS package message. Many of his friends had received similar texts. A couple of days earlier, he says, his wife called him and said she'd inadvertently entered her credit card details. With little going on after the holidays, Smith began a mission: Hunt down the scammers. Over the course of a few weeks, Smith tracked down the Chinese-language group behind the mass-smishing campaign, hacked into their systems, collected evidence of their activities, and started a months-long process of gathering victim data and handing it to USPS investigators and a US bank, allowing people's cards to be protected from fraudulent activity.

In total, people entered 438,669 unique credit cards into 1,133 domains used by the scammers, says Smith, a red team engineer and the founder of offensive cybersecurity firm Phantom Security. Many people entered multiple cards each, he says. More than 50,000 email addresses were logged, including hundreds of university email addresses and 20 military or government email domains. The victims were spread across the United States -- California, the state with the most, had 141,000 entries -- with more than 1.2 million pieces of information being entered in total. "This shows the mass scale of the problem," says Smith, who is presenting his findings at the Defcon security conference this weekend and previously published some details of the work. But the scale of the scamming is likely to be much larger, Smith says, as he didn't manage to track down all of the fraudulent USPS websites, and the group behind the efforts have been linked to similar scams in at least half a dozen other countries.

Slashdot Top Deals