Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

What do you do with your old hardware (computer, tablet, phone, etc.)?

  • Upgrade it
  • Give it to a family member
  • ...after loading it with spyware/malware
  • Donate/Sell it
  • Repurpose it
  • Cannibalize it for parts
  • All of the above
  • Other - specify

[ Results | Polls ]
Comments:14 | Votes:58

posted by hubie on Tuesday November 26, @07:42PM   Printer-friendly
from the taking-ai-robot-lasers-down-in-the-dirt dept.

The agricultural world is witnessing a remarkable transformation, driven by groundbreaking technology. Among the most fascinating innovations is a farming robot equipped with lasers that can destroy hundreds of thousands of weeds in mere hours. This high-tech solution is not just a marvel of engineering but a timely response to persistent challenges in farming, from labor shortages to the environmental impact of chemical herbicides:

By combining artificial intelligence with precision laser technology, companies like Carbon Robotics are reshaping the way farmers tackle one of agriculture's most labor-intensive tasks. These futuristic machines offer a glimpse into the potential of sustainable farming, where innovation meets efficiency, paving the way for a healthier and more productive future for agriculture.

[...] In the face of persistent agricultural challenges, technology has emerged as a transformative force, with farming robots leading the way. Carbon Robotics' Autonomous Weeder is a standout example of how innovation can revolutionize agriculture. This remarkable machine is designed to address the dual problems of labor shortages and environmental damage caused by conventional weed management practices. By combining artificial intelligence with advanced laser technology, the Autonomous Weeder delivers an unprecedented level of precision and efficiency.

The robot operates with minimal human intervention, scanning rows of crops using 12 high-resolution cameras that detect weeds in real time. Its onboard AI system processes this information, distinguishing weeds from crops with incredible accuracy. Once a weed is identified, carbon dioxide lasers target and destroy it instantly, leaving the surrounding soil undisturbed. This approach eliminates the need for chemical herbicides, reducing environmental harm while preserving soil health. It also alleviates the physical burden of manual weeding, offering farmers a more efficient alternative.

[...] The LaserWeeder is equipped with three times the lasers of the original model, enabling it to kill up to 200,000 weeds per hour. This incredible efficiency makes it one of the most effective weed management tools available. In just one hour, the LaserWeeder can cover two acres of farmland, a feat that would take human laborers days to achieve. [...] This targeted approach not only boosts productivity but also supports healthier, more sustainable farming practices.


Original Submission

posted by hubie on Tuesday November 26, @02:56PM   Printer-friendly
from the caught-in-the-government's-web dept.

U.S. prosecutors have filed charges against five individuals allegedly linked to Scattered Spider, a hacking group known for stealing confidential data and cryptocurrency from major companies:

The suspects, all in their twenties, are accused of running phishing schemes, sending fake warnings to employees' phones, tricking them into revealing login credentials, reported the New York Post.

The hackers targeted at least 12 companies across gaming, telecommunications, outsourcing, and cryptocurrency sectors, impacting hundreds of thousands of individuals. Authorities say the group's activities resulted in significant financial losses, including millions in stolen cryptocurrency.

The defendants, identified as Tyler Buchanan, Ahmed Elbadawy, Joel Evans, Evans Osiebo, and Noah Urban, face charges including conspiracy, identity theft, and fraud. Buchanan is additionally accused of wire fraud. Investigators traced the group's activities back to 2021 using domain registration records tied to Buchanan.

Known for their aggressive tactics, Scattered Spider has been blamed for notable attacks, including a 2023 breach of casino giants Caesars Entertainment and MGM Resorts, where they locked up networks and demanded ransoms. However, whether these five were involved in the casino attacks remains unclear.

Also at Ars Technica, Krebs on Security and Bloomberg.

Previously: A Phone Call to Helpdesk was Likely all it Took to Hack MGM


Original Submission

posted by hubie on Tuesday November 26, @10:11AM   Printer-friendly

US senator Elizabeth Warren and congressman Jerry Nadler have demanded the government investigate whether VeriSign, steward of the .com domain, is ripping off customers and violating antitrust laws:

US senator Elizabeth Warren of Massachusetts and congressman Jerry Nadler of New York have called on government bodies to investigate what they allege is the "predatory pricing" of .com web addresses, the internet's prime real estate.

In a letter delivered today to the Department of Justice and the National Telecommunications and Information Administration, a branch of the Department of Commerce that advises the president, the two Democrats accuse VeriSign, the company that administers the .com top-level domain, of abusing its market dominance to overcharge customers.

In 2018, under the Donald Trump administration, the NTIA modified the terms on how much VeriSign could charge for .com domains. The company has since hiked prices by 30 percent, the letter claims, though its service remains identical and could allegedly be provided far more cheaply by others.

"VeriSign is exploiting its monopoly power to charge millions of users excessive prices for registering a .com top-level domain," the letter claims. "VeriSign hasn't changed or improved its services; it has simply raised prices because it holds a government-ensured monopoly."

VeriSign did not immediately respond to a request for comment. But in an August blog post entitled "Setting the Record Straight," the company claimed that discourse around its management of .com had been "distorted by factual inaccuracies, a misunderstanding of core technical concepts, and misinterpretations regarding pricing, competition, and market dynamics in the domain name industry."

In the same blog post, the company argues that it is not operating a monopoly because there are 1,200 generic top-level domains operated by other entities, including .org, .shop, .ai, and .uk.

[...] The letter claims that separate agreements with the NTIA and Internet Corporation for Assigned Names and Numbers (ICANN), a nonprofit established by the Commerce Department to oversee the web's domain name system, have allowed VeriSign to establish monopoly power. The former sets how much the company can charge its customers for registering .com addresses, while the latter assigns VeriSign as the "sole operator" of the .com domain. The letter also alleges that VeriSign might be in violation of the Sherman Act.


Original Submission

posted by hubie on Tuesday November 26, @05:26AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

David Bessis was drawn to mathematics for the same reason that many people are driven away: He didn’t understand how it worked. Unlike other creative processes, like making music, which can be heard, or painting pictures, which can be seen, math is for the most part an internal process, hidden from view. “It sounded a bit magical. I was intrigued,” he said.

His curiosity eventually led him to pursue a doctoral degree in math at Paris Diderot University in the late 1990s. He spent the next decade studying geometric group theory before leaving research mathematics and founding a machine learning startup in 2010.

Through it all, he never stopped questioning what it actually means to do math. Bessis wasn’t content to simply solve problems. He wanted to further interrogate — and help other people understand — how mathematicians think about and practice their craft.

In 2022, he published his answer — a book titled Mathematica: A Secret World of Intuition and Curiosity, which he hopes will “explain what’s going on inside the brain of someone who’s doing math,” he said. But more than that, he added, “this is a book about the inner experience of humans.” It was translated from the original French into English earlier this year.

In Mathematica, Bessis makes the provocative claim that whether you realize it or not, you’re constantly doing math — and that you’re capable of expanding your mathematical abilities far beyond what you think possible. Eminent mathematicians like Bill Thurston and Alexander Grothendieck didn’t owe their mathematical prowess to intrinsic genius, Bessis argues. Rather, they became such powerful mathematicians because they were willing to constantly question and refine their intuitions. They developed new ideas and then used logic and language to test and improve them.

According to Bessis, however, the way math is taught in school emphasizes the logic-based part of this process, when the more important element is intuition. Math should be thought of as a dialogue between the two: between reason and instinct, between language and abstraction. It’s also a physical practice of sorts, like yoga or martial arts — something that can be improved through training. It requires tapping into a childlike state and embracing one’s imagination, including the mistakes that come with it.

“The mathematician’s message is for everyone: Look at what you can do if you don’t give up on your intuition,” Bessis said.

Everyone, Bessis says, has some experience with this process, meaning that everyone has practice thinking like a mathematician. Moreover, everyone can, and should, try to improve their mathematical thinking — not necessarily to solve math problems, but as a general self-help technique.

[...] At its core, Bessis says, mathematics is a game of back-and-forth between intuition and logic, instinct and reason.

[...] It would be dishonest to deny that there are people who are incredibly good at math. There are 5-year-olds who are already genius mathematicians. You can see it: It looks like they’re communicating with aliens from outer space.

But I do not think this is innate, even though it often manifests in early childhood. Genius is not an essence. It’s a state. It’s a state that you build by doing a certain job.

Math is a journey. It’s about plasticity. I am not saying that math is easy. Math is hard. But life, whatever you do, is extremely hard.

[...] Whenever you spot a disconnect between what your gut is telling you and what is supposed to be rational, it’s an important opportunity to understand something new. And then you can start this game of back-and-forth. Can you articulate your gut instinct and place it within a rational discussion? If there’s still a disconnect, can you visualize why? As you play that game, your imagination will gradually reconfigure. And in the end, if you’re persistent, your instinct and your reason will align, and you will be smarter. This is mathematical thinking.

Children do this all the time. That’s why they learn so fast. They have to. Otherwise, I mean, nothing makes sense. I think this is also why babies are super happy — because they have epiphanies all day long. It’s wonderful.

“When you do math, you’re exposed to the human thought process in a way that is really pure,” Bessis said. “It’s not just about understanding things, but about understanding things in a very childish, deep, naïve, super clear, obvious way.”

For adults, this way of thinking can be very slow. But if you don’t give up, what you can do with your intuition is way beyond your wildest expectations. And this is universal. My book is a life lesson for all creative people, not just those who want to learn mathematical concepts. The mathematician’s message is for everyone: Look at what you can do if you don’t give up on your intuition.


Original Submission

posted by hubie on Tuesday November 26, @12:44AM   Printer-friendly
from the big-red-star dept.

Beyond the Milky Way

A picture have been taken, or however they do it -- it's quite blurry, of a red supergiant star 2000x larger then our own sun. Designated as WOH G64 it is about 160 000 light-years from earth. It is located inside the Large Megallanic cloud, a small galaxy just outside the milky way.

https://abcnews.go.com/Technology/close-picture-star-milky/story?id=116129095

"We have found that the star has been experiencing a significant change in the last 10 years, providing us with a rare opportunity to witness a star's life in real time," said Gerd Weigelt, an astronomy professor at the Max Planck Institute for Radio Astronomy and co-author of the study.

[...] "This star is one of the most extreme of its kind, and any drastic change may bring it closer to an explosive end," said Jacco van Loon, a co-author in the study and Keele Observatory director at Keele University, who has been observing WOH G64 since the 1990s.

https://www.eso.org/public/news/eso2417/

"For the first time, we have succeeded in taking a zoomed-in image of a dying star in a galaxy outside our own Milky Way," says Keiichi Ohnaka, an astrophysicist from Universidad Andrés Bello in Chile. Located a staggering 160 000 light-years from us, the star WOH G64 was imaged thanks to the impressive sharpness offered by the European Southern Observatory's Very Large Telescope Interferometer (ESO's VLTI). The new observations reveal a star puffing out gas and dust, in the last stages before it becomes a supernova.

"We discovered an egg-shaped cocoon closely surrounding the star," says Ohnaka, the lead author of a study reporting the observations published today in Astronomy & Astrophysics. "We are excited because this may be related to the drastic ejection of material from the dying star before a supernova explosion."

[...] The team thinks that these shed materials may also be responsible for the dimming and for the unexpected shape of the dust cocoon around the star. The new image shows that the cocoon is stretched-out, which surprised scientists, who expected a different shape based on previous observations and computer models. The team believes that the cocoon's egg-like shape could be explained by either the star's shedding or by the influence of a yet-undiscovered companion star.

As the star becomes fainter, taking other close-up pictures of it is becoming increasingly difficult, even for the VLTI. Nonetheless, planned updates to the telescope's instrumentation, such as the future GRAVITY+, promise to change this soon. "Similar follow-up observations with ESO instruments will be important for understanding what is going on in the star," concludes Ohnaka.

https://www.eso.org/public/archives/releases/sciencepapers/eso2417/eso2417a.pdf


Original Submission

posted by janrinok on Monday November 25, @07:57PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Leaked documents reveal the secrets behind Graykey, the covert forensic tool used to unlock modern smartphones, exposing its struggles with Apple's latest iOS updates.

Graykey is a forensic tool designed to unlock mobile devices and extract data, primarily used by law enforcement agencies and digital forensics experts. Developed by the secretive company Grayshift — now owned by Magnet Forensics — Graykey has earned a reputation for its ability to bypass smartphone security measures.

The tool helps law enforcement and forensic professionals in accessing locked mobile devices during criminal investigations. It breaks device encryption and security features to retrieve personal data like messages, photos, app data, and metadata.

Graykey supports Apple and Android devices, though its effectiveness varies depending on the specific hardware and software involved. Graykey's capabilities and limitations, however, are rarely disclosed.

However, a leak of some Grayshift's internal documents was recently reported on by 404 Media. According to the data, Graykey can only perform "partial" data retrieval from iPhones running iOS 18 and iOS 18.0.1.

These versions were released in September and early October, respectively. A partial extraction likely includes unencrypted files and metadata, such as folder structures and file sizes, according to past reports.

Notably, Graykey struggles with beta versions of iOS 18.1. Under the latest update, the tool fails to extract any data, as per the documents.

Meanwhile, Graykey's performance with Android phones varies, largely due to the diversity of devices and manufacturers. On Google's Pixel lineup, Graykey can only partially access data from the latest Pixel 9 when in an "After First Unlock" (AFU) state — where the phone has been unlocked at least once since being powered on.

Andrew Garrett, CEO of Garrett Discovery, confirmed that the leaked documents align with Graykey's known capabilities. Meanwhile, Magnet Forensics and Apple declined to comment on the leak.

The leaked documents shed light on the ongoing battle between tech companies like Apple and forensic firms. Apple's frequent security updates and features, including USB Restricted Mode and iPhone rebooting after inactivity, have made unauthorized access increasingly difficult.

In response, companies like Grayshift and Cellebrite continue to develop new exploits to bypass these safeguards. While tools like Graykey may lag behind new OS releases, historical trends suggest they often catch up eventually.

Forensic experts expect the cycle of vulnerabilities and patches to persist as Apple and Google continue fortifying their systems against unauthorized access.


Original Submission

posted by janrinok on Monday November 25, @02:13PM   Printer-friendly
from the how-many-people-would-spot-this? dept.

Python Crypto Library Updated to Steal Private Keys:

Yesterday, Phylum's automated risk detection platform discovered that the PyPI package aiocpa was updated to include malicious code that steals private keys by exfiltrating them through Telegram when users initialize the crypto library. While the attacker published this malicious update to PyPI, they deliberately kept the package's GitHub repository clean of the malicious code to evade detection.

[...] Interesting! The attacker overwrites the __init__ method of the CryptoPay class. Actually, it's acting more like a wrapper around the originality functionality of the method. They're saving the original method via init = CryptoPay.__init__ and then calling it as per usual with init(*args, **kwargs) and then sending a Telegram message to, presumably, the attacker's Telegram bot call with args[1:] as the message.

[...] Just to recap, we're seeing a crypto library that dynamically alters the class's constructor upon module import to exfiltrate the victim's private keys when calling the class's constructor!

Another interesting aspect we discovered in our investigation is that its PyPI homepage points to a GitHub repo.

However, if you look at the same file in the GitHub repo, you'll notice that the obfuscated payload is missing! This means the attacker updated a local copy of the repo with the malicious payload and then published that package to PyPI, leaving the GitHub repo with the same version numbers malware-free — a clear attempt at evasion.

This library's popularity - with 17 GitHub stars and (according to pypistats.org before the package was removed) nearly 4K downloads in the last month–makes this incident particularly concerning. The attack highlights two critical security lessons: First, it demonstrates the importance of scanning the actual code sent to open source ecosystems, that is the code that actually runs when you pip install or node -i a package, rather than just reviewing source repositories alone. As evidenced here, attackers can deliberately maintain clean source repos while distributing malicious packages to the ecosystems. Second, it serves as a reminder that a package's previous safety record doesn't guarantee its continued security.


Original Submission

posted by janrinok on Monday November 25, @09:23AM   Printer-friendly
from the er,-the-dept,-is,-er,-what-is-it,-err,-I-forget-... dept.

Arthur T Knackerbracket has processed the following story:

The effects of being in space can worsen an astronaut's working memory, processing speed and attention - which could be a problem for future missions

Astronauts aboard the International Space Station (ISS) had slower memory, attention and processing speed after six months, raising concerns about the impact of cognitive impairment on future space missions to Mars.

The extreme environment of space, with reduced gravity, harsh radiation and the lack of regular sunrises and sunsets, can have dramatic effects on astronaut health, from muscle loss to an increased risk of heart disease. However, the cognitive effects of long-term space travel are less well documented.

Now, Sheena Dev at NASA’s Johnson Space Center in Houston, Texas, and her colleagues have looked at the cognitive performance of 25 astronauts during their time on the ISS.

The team ran the astronauts through 10 tests, some of which were done on Earth, once before and twice after the mission, while others were done on the ISS, both early and later in the mission. These tests measured certain cognitive capacities, such as finding patterns on a grid to test abstract reasoning or choosing when to stop an inflating balloon before it pops to test risk-taking.

The researchers found that the astronauts took longer to complete tests measuring processing speed, working memory and attention on the ISS than on Earth, but they were just as accurate. While there was no overall cognitive impairment or lasting effect on the astronauts’ abilities, some of the measures, like processing speed, took longer to return to normal after they came back to Earth.

Having clear data on the cognitive effects of space travel will be crucial for future human spaceflight, says Elisa Raffaella Ferrè at Birkbeck, University of London, but it will be important to collect more data, both on Earth and in space, before we know the full picture.

“A mission to Mars is not only longer in terms of time, but also in terms of autonomy,” says Ferrè. “People there will have a completely different interaction with ground control because of distance and delays in communication, so they will need to be fully autonomous in taking decisions, so human performance is going to be key. You definitely don’t want to have astronauts on Mars with slow reaction time, in terms of attention-related tasks or memory or processing speed.”


Original Submission

posted by janrinok on Monday November 25, @04:39AM   Printer-friendly
from the level-critical-needs-recharge dept.

The company was negatively affected by slow EV adoption, suffering net losses of $1.2 billion last year:

Swedish electric vehicle (EV) battery manufacturer Northvolt filed for bankruptcy after the company's dreadful liquidity position left the business with only one week's worth of cash to fund its operations.

The Chapter 11 petition was filed at the U.S. Bankruptcy Court for the Southern District of Texas on Thursday. The company listed assets and liabilities in a range of $1 billion to $10 billion, with creditors estimated to be between 1,000 and 5,000. Established in 2016 in Stockholm, Northvolt is an energy-storage company that manufactures lithium-ion batteries.

A leading manufacturer in the European Union, Northvolt competes with China's BYD and CAT to supply batteries to carmakers in the region. As such, the bankruptcy of Northvolt presents a challenge to Europe's ambitions to counter Chinese EV dominance.

[...] Asian manufacturers continued to ramp up production while bringing down battery prices, which put "further stress on newer battery manufacturers like Northvolt." Facing such challenges, the company suffered a net loss of $1.2 billion in 2023.

Previously: South Korean EV Battery Makers Reporting Big Losses as EV Demand Slows


Original Submission

posted by janrinok on Sunday November 24, @11:53PM   Printer-friendly

https://techxplore.com/news/2024-11-medium-eavesdropping-technology-overturns-assumptions.html

Researchers from Princeton and MIT have found a way to intercept underwater messages from the air, overturning long held assumptions about the security of underwater transmissions.

The team created a device that uses radar to eavesdrop on underwater acoustic signals, or sonar, by decoding the tiny vibrations those signals create on the water's surface. In principle, the technique could also roughly identify the location of an underwater transmitter, the researchers said.

In a paper presented at ACM MobiCom on November 20, the researchers detailed the new eavesdropping technology and offered ways to guard against the attacks it enables. They demonstrated the capability on Lake Carnegie, a small artificial lake in Princeton. Applying the technology in the open ocean would be significantly more challenging, but the researchers said they believed it would be possible with significant engineering improvements.

The researchers said their intention is not only to alert people to the vulnerability of underwater transmissions, but also to detail methods that can be used to prevent interceptions.

[...] In 2018, the MIT group realized that the impact of the sound waves on the water's surface leaves a sort of fingerprint of tiny vibrations that correspond to the underwater signal. The team used a radar mounted on a drone to read the surface vibrations and deployed algorithms to detect the pattern, decode the signal and extract the message.

"Underwater-to-air communications is one of the most difficult long-standing problems in our field," said Fadel Adib, associate professor of media arts and sciences at MIT and co-author on the new paper.

"It was exciting—and surprising—to see our method succeed in decoding underwater messages from the tiny vibrations they caused on the surface."

But for the technique to work, the MIT team's system required knowledge of certain physical parameters, such as the transmission's frequency and modulation type, in advance.

Building on this development, the team at Princeton used a similar method to detect the surface vibrations, but developed new algorithms that capitalize on the differences between radar and sonar to uncover those physical parameters. That allowed the researchers to decode the message without cooperation from the underwater transmitter.

Using an inexpensive commercial drone and radar, the researchers tested their method in a swimming pool. The researchers deployed a speaker under the water and, as swimmers provided interference, flew a drone over the surface. The drone repeatedly sent brief radar chirps toward the water.

When the radar signals bounced off the water's surface, they revealed the pattern of vibrations from the sound waves for the system to detect and decode.

The researchers also used a boom-mounted radar for tests in a real-world environment at Carnegie Lake in Princeton. They found that the system could figure out the unknown parameters and decode messages from the speaker, even with interference from wind and waves. In fact, it could determine the modulation type, one of the most important parameters, with 97.58% accuracy.


Original Submission

posted by janrinok on Sunday November 24, @07:12PM   Printer-friendly
from the missed-it-by-that-much dept.

A promising explanation is a near-miss by an asteroid:

Earth and Mars are the only two rocky planets in the solar system to have moons. Based on lunar rock samples and computer simulations, we are fairly certain that our Moon is the result of an early collision between Earth and a Mars-sized protoplanet called Theia. Since we don't have rock samples from either Martian moon, the origins of Deimos and Phobos are less clear. There are two popular models, but new computer simulations point to a compromise solution.

Observations of Deimos and Phobos show that they resemble small asteroids. This is consistent with the idea that the Martian moons were asteroids captured by Mars in its early history. The problem with this idea is that Mars is a small planet with less gravitational pull than Earth or Venus, which have no captured moons. It would be difficult for Mars to capture even one small asteroid, much less two. And captured moons would tend to have more elliptical orbits, not the circular ones of Deimos and Phobos.

An alternative model argues that the Martian moons are the result of an early collision similar to that of Earth and Theia. In this model, an asteroid or comet with about 3% of the mass of Mars impacted the planet. It would not be large enough to have fragmented Mars, but it would have created a large debris ring out of which the two moons could have formed. This would explain the more circular orbits, but the difficulty is that debris rings would tend to form close to the planet. While Phobos, the larger Martian moon, orbits close to Mars, Deimos does not.

This new model proposes an interesting middle way. Rather than an impact or direct capture, the authors propose a near miss by a large asteroid. If an asteroid passed close enough to Mars, the tidal forces of the planet would rip the asteroid apart to create a string of fragments. Many of those fragments would be captured in elliptical orbits around Mars. As computer simulations show, the orbits would shift over time due to the small gravitational tugs of the Sun and other solar system bodies, eventually causing some of the fragments to collide. This would produce a debris ring similar to that of an impact event, but with a greater distance range, better able to account for both Phobos and Deimos.

While this new model appears to be better than the capture and impact models, the only way to resolve this mystery will be to study samples from the Martian moons themselves. Fortunately, in 2026 the Mars Moons eXploration mission (MMX) will launch. It will explore both moons and gather samples from Phobos. So we should finally understand the origin of these enigmatic companions of the Red Planet.

Journal Reference: Kegerreis, Jacob A., et al. "Origin of Mars's moons by disruptive partial capture of an asteroid." Icarus 425 (2025): 116337.


Original Submission

posted by janrinok on Sunday November 24, @02:26PM   Printer-friendly
from the federal-eyes-are-watching-you dept.

Officials inside the Secret Service clashed over whether they needed a warrant to use location data harvested from ordinary apps installed on smartphones, with some arguing that citizens have agreed to be tracked with such data by accepting app terms of service, despite those apps often not saying their data may end up with the authorities, according to hundreds of pages of internal Secret Service emails obtained by 404 Media:

The emails provide deeper insight into the agency's use of Locate X, a powerful surveillance capability that allows law enforcement officials to follow a phone, and person's, precise movements over time at the click of a mouse. In 2023, a government oversight body found that the Secret Service, Customs and Border Protection, and Immigration and Customs Enforcement all used their access to such location data illegally. The Secret Service told 404 Media in an email last week it is no longer using the tool.

"If USSS [U.S. Secret Service] is using Locate X, that is most concerning to us," one of the internal emails said. 404 Media obtained them and other documents through a Freedom of Information Act (FOIA) request with the Secret Service.

Locate X is made by a company called Babel Street. In October 404 Media, NOTUS, Haaretz, and Krebs on Security published articles based on videos that showed the Locate X tool in action. In one example, it was possible to follow the visitors to a specific abortion clinic across state lines and to their likely place of residence.

Tools similar to Locate X often use data that has been collected from ordinary smartphone apps. Apps on both iOS and Android devices collect location data and then sell or transfer that to members of the data broker industry. Eventually, that data can end up in tools like Locate X.

Originally spotted on Schneier on Security

Previously: Secret Service Bought Location Data Pulled From Common Apps


Original Submission

posted by hubie on Sunday November 24, @09:44AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

The first ever samples of soil and rock collected from the far side of the moon has revealed more recent lunar volcanic activity than expected, according to studies published in two journals last Friday.

The samples were collected by China’s Chang’e 6, which became the first ever probe to touch down in the region in early June. The probe used its robotic arm to grab around 2 kg of lunar material from the Moon’s largest impact crater, the South Pole-Aitken basin (SPA basin), during its two-day sojourn on Luna’s surface.

By late June, the probe returned to Earth after a 53-day mission.

[...] Scientists in both Science and Nature evaluated the sample material using radiometric dating that analyzed isotope decay in the dark colored rock and believe it is a basalt that formed as lava cooled.

Both papers conclude that the material is around 2.8 billion years old, meaning the area was volcanically active around that time.

That finding updates Apollo-era theories that supposed vulcanism had already ended in the region at the time. The theory was already on shaky (lunar) ground as China’s 2020 Chang’e 5 mission had already found basalt of similar vintage on the Moon’s near side.

The two studies together suggest lava was present on Luna for longer than previously hypothesized.

[...] KREEP is an acronym that stands for Potassium (K), Rare Earth Elements (REE), and Phosphorus (P). It refers to a heat-generating geochemical component found in certain types of lunar rocks, particularly in basalts. It was found in the Apollo-era samples, but not in the haul from Change’6.

In the early stages of the Moon’s history, the presence of KREEP in the mantle contributed to the heat necessary to drive volcanic activity. However, over time, as the KREEP-rich material was depleted or dissipated, the Moon's internal heat diminished, which could cause volcanic activity to slow down or stop – leaving us with the largely dormant rock that orbits our planet.


Original Submission

posted by hubie on Sunday November 24, @04:57AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

In 1968's Star Trek episode, "The Ultimate Computer," Captain Kirk had his ship used to test M5, a new computer. A copilot, if you will, for the Starship Enterprise.

Designed to more efficiently perform the jobs of the human crew, the M5 indeed did those jobs very well yet with such a terrifying lack of understanding it had to be disabled. But not before exacting a terrible price.

Last week, Microsoft 365 Copilot, a copilot, if you will, for the technology enterprise sold as performing human tasks with more efficiency, increased its prices by 5 percent, the first of many finely judged increments in the old style. Unlike the M5, it isn't in the business of physical destruction of the enemy, instead producing commercial victory with the photon torpedo of productivity and the phaser bolts of revitalized workflow.

[...] Some time back, this columnist noted the stark disparity between the hype of the metaverse in business and the stark, soulless hyper-corporate experience. Line-of-business virtual reality has two saving graces over corporate AI. It can't just appear on the desktop overnight and poke its fingers into everything involved in the daily IT experience. Thus it can't generate millions in licensing at the tick of a box. VR is losing its backers huge amounts of money that can't be disguised or avoided, but corporate AI is far more insidious.

As is the dystopia it is creating. Look at the key features by which Microsoft 365 Copilot is being sold.

Pop up its sidebar in Loop or Teams, and it can auto-summarize what has been said. It can suggest questions, auto-populate meeting agendas. Or you can give it key points in a prompt and it will auto-generate documents, presentations, and other content. It can create clip art to spruce up those documents, PowerPoints, and content.

How is this sold? That it will make you look more intelligent by asking Copilot to suggest a really good question while doing an online presentation or a Teams meeting. What's also implied but unsaid: If you're the human at the end of this AI-smart question and want to look smart enough to answer it, who are you gonna call? Copilot.

The drive is always to abdicate the dull business of gathering data and thinking about it, and communicating the results. All can be fed as prompts to the machine, and the results presented as your own.

And so begins a science-fiction horror show of a feedback loop. Recipients of AI-generated key points will ask the AI to expand them into a document, which will itself be AI key-pointed and fed back into the human-cyborg machine a team has become. Auto-scheduled meetings will be auto-assigned, and will multiply like brainworms in the cerebellum. The number of reports, meetings, presentations, and emails will grow inexorably as they become less and less human. Is the machine working for us, or we for the machine?

Generative AI output feeding back into itself can go only one way, but Copilot in the enterprise is seemingly designed to amplify that very process. And you have to use it if you want to keep up with the perceived smartness and improved productivity of your fellow workers, and the AI-educated expectations of the corporate structure. 

[...] It is taboo to say how far your heart sinks when you have to create or consume the daily diet offered up in company email, Teams, meeting agendas, and regular reports. You won't be able to say how much further it will sink when all the noise is amplified and the signal suppressed by corporate AI. Fair warning: Buy the bathysphere now.

There is an escape hatch. Refuse. Encourage refusal. When you see it going wrong, say so. A sunken heart is no platform for anything good personally, as a team, or as an organization. Listen to your humanity and use it. Oh, and seek out "The Ultimate Computer" – it's clichéd, kitsch, and cuts to the bone. The perfect antidote for vendor AI hype.


Original Submission

posted by hubie on Sunday November 24, @12:16AM   Printer-friendly

The New York AG just won a lawsuit over a process that 'deliberately' wastes subscribers' time:

A New York judge has determined that SiriusXM's "long and burdensome" cancellation process is illegal. In a ruling on Thursday, Judge Lyle Frank found SiriusXM violates a federal law that requires companies to make it easy to cancel a subscription.

The decision comes nearly one year after New York Attorney General Leticia James sued SiriusXM over claims the company makes subscriptions difficult to cancel. Following an investigation, the Office of the Attorney General found that the company attempts to delay cancellations by having customers call an agent, who then keeps them on the phone for several minutes while "pitching the subscriber as many as five retention offers."

As outlined in the ruling, Judge Frank found that SiriusXM broke the Restore Online Shoppers Confidence Act (ROSCA), which requires companies to implement "simple mechanisms" to cancel a subscription. "Their cancellation procedure is clearly not as easy to use as the initiation method," Judge Frank writes, citing the "inevitable wait times" that come along with talking to a live agent and the subscription offers they promote.

The Federal Trade Commission has started cracking down on hard-to-cancel subscriptions as well, with a new "click to cancel" rule going into effect next year. Under the law, companies must make canceling a subscription as easy as it is to sign up. "This decision found SiriusXM illegally created a complicated cancellation process for its New York customers, forcing them to spend significant amounts of time speaking with agents who refused to take 'no' for an answer," Attorney General James said in a statement.


Original Submission