Cellphones

You Only Need $750 to Pilfer Unencrypted Data From Satellites, Researchers Say (gizmodo.com) 20

"A new study published on Monday found that communications from cellphone carriers, retailers, banks, and even militaries are being broadcast unencrypted through geostationary satellites..." reports Gizmodo. "The team obtained unencrypted internet communications from U.S. military sea vessels and even communications regarding narcotics trafficking from Mexican military and law enforcement." Researchers from the University of California, San Diego (UCSD) and the University of Maryland scanned 39 of these satellites from a rooftop in Southern California over three years. They found that roughly half of the signals they analyzed were transmitting unencrypted data, potentially exposing everything from phone calls and military logistics to a retail chain's inventory. "There is a clear mismatch between how satellite customers expect data to be secured and how it is secured in practice," the researchers wrote in their paper titled "Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites...." "They assumed that no one was ever going to check and scan all these satellites and see what was out there. That was their method of security," Aaron Schulman, a UCSD professor and co-lead of the study, told Wired....

Even more surprisingly, the researchers didn't need any fancy spy gear to collect this data. Their setup used only off-the-shelf hardware, including a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card. Altogether, the system cost roughly $750 and was installed on a university building in La Jolla, San Diego.

With their simple setup, the researchers were able to collect a wide range of communication data, including phone calls, texts, in-flight Wi-Fi data from airline passengers, and signals from electric utilities. They even obtained U.S. and Mexican military and law enforcement communications, as well as ATM transactions and corporate communications... When it came to telecoms, specifically, the team collected phone numbers, calls, and texts from customers of T-Mobile, AT&T Mexico, and Telmex... It only took the team nine hours to collect the phone numbers of over 2,700 T-Mobile users, along with some of their calls and text messages.

T-Mobile told Gizmodo the lack of encryption was "a vendor's technical misconfiguration" affecting "a limited number of cell sites" and was "not network-wide... [W]e implemented nationwide Session Initiation Protocol (SIP) encryption for all customers to further protect signaling traffic as it travels between mobile handsets and the network core, including call set up, numbers dialed and text message content. We appreciate our collaboration with the security research community, whose work helps reinforce our ongoing commitment to protecting customer data and enhances security across the industry."

Indeed, the researchers write that "Each time we discovered sensitive information in our data, we went through considerable effort to determine the responsible party, establish contact, and disclose the vulnerability. In several cases, the responsible party told us that they had deployed a remedy. For the following parties, we re-scanned with their permission and were able to verify a remedy had been deployed: T-Mobile, WalMart, and KPU."

The researchers acknowledge that exposure "was limited to a relatively small number of cell towers in specific remote areas."
Security

Email Bombs Exploit Lax Authentication In Zendesk (krebsonsecurity.com) 11

Cybercriminals are exploiting weak email authentication settings in Zendesk, using the platform's customer support systems to bombard targets with thousands of spam and harassing messages that appear to come from legitimate companies like The Washington Post, Discord, and NordVPN. KrebsOnSecurity reports: Zendesk is an automated help desk service designed to make it simple for people to contact companies for customer support issues. Earlier this week, KrebsOnSecurity started receiving thousands of ticket creation notification messages through Zendesk in rapid succession, each bearing the name of different Zendesk customers, such as CapCom, CompTIA, Discord, GMAC, NordVPN, The Washington Post, and Tinder.

The abusive missives sent via Zendesk's platform can include any subject line chosen by the abusers. In my case, the messages variously warned about a supposed law enforcement investigation involving KrebsOnSecurity.com, or else contained personal insults. Moreover, the automated messages that are sent out from this type of abuse all come from customer domain names -- not from Zendesk. [...]

In all of the cases above, the messaging abuse would not have been possible if Zendesk customers validated support request email addresses prior to sending responses. Failing to do so may make it easier for Zendesk clients to handle customer support requests, but it also allows ne'er-do-wells to sully the sender's brand in service of disruptive and malicious email floods.
"We recognize that our systems were leveraged against you in a distributed, many-against-one manner," said Carolyn Camoens, communications director at Zendesk. "We are actively investigating additional preventive measures. We are also advising customers experiencing this type of activity to follow our general security best practices and configure an authenticated ticket creation workflow."
Censorship

Big Tech Sues Texas, Says Age-Verification Law Is 'Broad Censorship Regime' (arstechnica.com) 49

An anonymous reader quotes a report from Ars Technica: Texas is being sued by a Big Tech lobby group over the state's new law that will require app stores to verify users' ages and impose restrictions on users under 18. "The Texas App Store Accountability Act imposes a broad censorship regime on the entire universe of mobile apps," the Computer & Communications Industry Association (CCIA) said yesterday in a lawsuit (PDF). "In a misguided attempt to protect minors, Texas has decided to require proof of age before anyone with a smartphone or tablet can download an app. Anyone under 18 must obtain parental consent for every app and in-app purchase they try to download -- from ebooks to email to entertainment."

The CCIA said in a press release that the law violates the First Amendment by imposing "a sweeping age-verification, parental consent, and compelled speech regime on both app stores and app developers." When app stores determine that a user is under 18, "the law prohibits them from downloading virtually all apps and software programs and from making any in-app purchases unless their parent consents and is given control over the minor's account," the CCIA said. "Minors who are unable to link their accounts with a parent's or guardian's, or who do not receive permission, would be prohibited from accessing app store content."

The law requires app developers "to 'age-rate' their content into several subcategories and explain their decision in detail," and "notify app stores in writing every time they improve or modify the functions, features, or user experience of their apps," the group said. The lawsuit says the age-rating system relies on a "vague and unworkable set of age categories." "Our Constitution forbids this," the lawsuit said. "None of our laws require businesses to 'card' people before they can enter bookstores and shopping malls. The First Amendment prohibits such oppressive laws as much in cyberspace as it does in the physical world." The lawsuit was filed in US District Court for the Western District of Texas. CCIA members include Apple and Google, which have both said the law would reduce privacy for app users. The companies recently described their plans to comply, saying they would take steps to minimize the privacy risks.

Games

Video Game Union Workers Rally Against $55 Billion Saudi-Backed Private Acquisition of EA (eurogamer.net) 36

EA employees and the Communications Workers of America union have condemned the company's proposed $55 billion private acquisition -- backed by Saudi Arabia's Public Investment Fund and Jared Kushner's Affinity Partners, "claiming they were not represented in the negotiations and any jobs lost as a result would 'be a choice, not a necessity, made to pad investors' pockets," reports Eurogamer. From the report: Following the announcement, there's been plenty of speculation around the future of EA and its multiple owned studios, split between EA Sports and EA Entertainment. Now, members of the United Videogame Workers union and the CWA have issued a formal response alongside a petition for regulators to scrutinize the deal. "EA is not a struggling company," the statement reads. "With annual revenues reaching $7.5 billion and $1 billion in profit each year, EA is one of the largest video game developers and publishers in the world."

This success has been driven by company workers, the union stated. "Yet we, the very people who will be jeopardized as a result of this deal, were not represented at all when this buyout was negotiated or discussed." Citing the number of layoffs across the industry since 2022, workers fear for "the future of our studios that are arbitrarily deemed 'less profitable' but whose contributions to the video game industry define EA's reputation." "If jobs are lost or studios are closed due to this deal, that would be a choice, not a necessity, made to pad investors' pockets - not to strengthen the company," the statement reads.

"Every time private equity or billionaire investors take a studio private, workers lose visibility, transparency, and power," it continues. "Decisions that shape our jobs, our art, and our futures are made behind closed doors by executives who have never written a line of code, built worlds, or supported live services. We are calling on regulators and elected officials to scrutinize this deal and ensure that any path forward protects jobs, preserves creative freedom, and keeps decision-making accountable to the workers who make EA successful." As such, workers have launched a petition in a "fight to make video games better for workers and players -- not billionaires". The statement concludes: "The value of video games is in their workers. As a unified voice, we, the members of the industry-wide video game workers' union UVW-CWA, are standing together and refusing to let corporate greed decide the future of our industry."

The Courts

Sony Tells SCOTUS That People Accused of Piracy Aren't 'Innocent Grandmothers' (arstechnica.com) 46

An anonymous reader quotes a report from Ars Technica: Record labels Sony, Warner, and Universal yesterday asked the Supreme Court to help it boot pirates off the Internet. Sony and the other labels filed their brief (PDF) in Cox Communications v. Sony Music Entertainment, a case involving the cable Internet service provider that rebuffed labels' demands for mass terminations of broadband subscribers accused of repeat copyright infringement. The Supreme Court's eventual decision in the case may determine whether Internet service providers must terminate the accounts of alleged pirates in order to avoid massive financial liability.

Cox has argued (PDF) that copyright-infringement notices -- which are generated by bots and flag users based on their IP addresses -- sent by record labels are unreliable. Cox said ISPs can't verify whether the notices are accurate and that terminating an account would punish every user in a household where only one person may have illegally downloaded copyrighted files. Record labels urged the Supreme Court to reject this argument.

"While Cox waxes poetic about the centrality of Internet access to modern life, it neglects to mention that it had no qualms about terminating 619,711 subscribers for nonpayment over the same period that it terminated just 32 for serial copyright abuse," the labels' brief said. "And while Cox stokes fears of innocent grandmothers and hospitals being tossed off the Internet for someone else's infringement, Cox put on zero evidence that any subscriber here fit that bill. By its own admission, the subscribers here were 'habitual offenders' Cox chose to retain because, unlike the vast multitude cut off for late payment, they contributed to Cox's bottom line." Record labels were referring to a portion of Cox's brief that said, "Grandma will be thrown off the Internet because Junior illegally downloaded a few songs on a visit."

Firefox

Mozilla Is Recruiting Beta Testers For a Free, Baked-In Firefox VPN (theregister.com) 36

Mozilla is testing a free, built-in VPN for Firefox that routes traffic through Mozilla-managed servers directly in the browser. The Register reports: According to a staff post on Mozilla Connect, the company's idea-sharing platform, Firefox VPN is still an experimental feature in the early stages of development, but users will be selected at random to test it "over the next few months." Moz describes the feature as one that will sit beside the search bar on Firefox, routing web traffic through a Mozilla-managed VPN server, concealing the user's real IP address while adding a layer of encryption to their communications. Firefox VPN is a different project entirely from Mozilla VPN, a separate, paid-for product. The Firefox version will be free to use and confined to the browser itself, while Mozilla VPN can be used by up to five devices at a time.

The Moz staffer on the product team who announced the feature said of the upcoming beta test: "We'll start simple, then gradually add new capabilities while learning how it impacts browsing, usage, and overall satisfaction. "Our long-term vision is ambitious: to build the best VPN-integrated browser on the market." In response to feedback, the staffer noted that while it will be a desktop browser feature first, "mobile is definitely a natural next step."

Communications

Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data (wired.com) 21

Researchers at UC San Diego and the University of Maryland have found that roughly half of geostationary satellite signals transmit sensitive data without encryption. The team spent three years using an $800 satellite receiver on a university rooftop in San Diego to intercept communications from satellites visible from their location. They collected phone calls and text messages from more than 2,700 T-Mobile users in just nine hours of recording.

The researchers also obtained data from airline passengers using in-flight Wi-Fi, communications from electric utilities and offshore oil and gas platforms, and US and Mexican military communications that revealed personnel locations and equipment details. The exposed data resulted from telecommunications companies using satellites to relay signals from remote cell towers to their core networks.

The researchers examined only about 15% of global satellite transponder communications and presented their findings at an Association for Computing Machinery conference in Taiwan this week. Most companies warned by the researchers have encrypted their satellite transmissions, but some US critical infrastructure owners have not yet added encryption.
The Internet

Major US Online Retailers Remove Listings For Millions of Prohibited Chinese Electronics 70

The FCC has forced major U.S. online retailers to remove millions of listings for prohibited Chinese-made electronics, including products from Huawei, ZTE, Hikvision, and Dahua, citing national security risks. Reuters reports: FCC Chair Brendan Carr said in an interview [on Friday] that the items removed are either on a U.S. list of barred equipment or were not authorized by the agency, including items like home security cameras and smart watches from companies including Huawei, Hangzhou Hikvision, ZTE, and Dahua Technology Company. Carr said companies are putting new processes in place to prevent future prohibited items as a result of FCC oversight. "We're going to keep our efforts up," Carr said. The FCC issued a new national security notice reminding companies of prohibited items including video surveillance equipment. Carr said the items could allow China to "surveil Americans, disrupt communications networks and otherwise threaten U.S. national security."
Television

California Law Forces Netflix, Hulu To Turn Down Ad Volumes (politico.com) 38

Gov. Gavin Newsom has signed a law banning excessively loud advertisements on streaming platforms like Netflix, Hulu and Amazon Prime that could become a de facto national standard. From a report: The new California law is aimed at addressing what the Federal Communications Commission has called a "troubling jump" in TV ad noise complaints, fueled by streamers airing commercials louder than the shows and movies they accompany.

It's modeled off a federal law passed in 2010 that caps ad volumes on cable and broadcast TV, but doesn't apply to streaming services. Given the Golden State's massive sway in the entertainment industry, the new law may strong-arm streamers into shushing commercials nationwide. "We heard Californians loud and clear, and what's clear is that they don't want commercials at a volume any louder than the level at which they were previously enjoying a program," Newsom said in a statement. "California is dialing down this inconvenience across streaming platforms."

Space

Removing 50 Objects from Orbit Would Cut Danger From Space Junk in Half (arstechnica.com) 26

If we could remove the 50 most concerning pieces of space debris in low-Earth orbit, there'd be a 50% reduction in the overall debris-generating potential, reports Ars Technica. That's according to Darren McKnight, lead author of a paper presented Friday at the International Astronautical Congress in Sydney, which calculated the objects most likely to collide with other fragments and create more debris. (Russia and the Soviet Union lead with 34 objects, followed by China with 10, the U.S. with three, Europe with two, and Japan with one.) Even just the top 10 were removed, the debris-generating potential drops by 30%.

"The things left before 2000 are still the majority of the problem," he points out, and "76% of the objects in the top 50 were deposited last century." 88% of the objects are post-mission rocket bodies left behind to hurtle through space. "The bad news is, since January 1, 2024, we've had 26 rocket bodies abandoned in low-Earth orbit that will stay in orbit for more than 25 years," McKnight told Ars... China launched 21 of the 26 hazardous new rocket bodies over the last 21 months, each averaging more than 4 metric tons (8,800 pounds). Two more came from US launchers, one from Russia, one from India, and one from Iran. This trend is likely to continue as China steps up deployment of two megaconstellations — Guowang and Thousand Sails — with thousands of communications satellites in low-Earth orbit.

Launches of these constellations began last year. The Guowang and Thousand Sails satellites are relatively small and likely capable of maneuvering out of the way of space debris, although China has not disclosed their exact capabilities. However, most of the rockets used for Guowang and Thousand Sails launches have left their upper stages in orbit. McKnight said nine upper stages China has abandoned after launching Guowang and Thousand Sails satellites will stay in orbit for more than 25 years, violating the international guidelines.

It will take hundreds of rockets to fully populate China's two major megaconstellations. The prospect of so much new space debris is worrisome, McKnight said. "In the next few years, if they continue the same trend, they're going to leave well over 100 rocket bodies over the 25-year rule if they continue to deploy these constellations," he said. "So, the trend is not good...." Since 2000, China has accumulated more dead rocket mass in long-lived orbits than the rest of the world combined, according to McKnight. "But now we're at a point where it's actually kind of accelerating in the last two years as these constellations are getting deployed."

A deputy head of China's national space agency recently said China is "currently researching" how to remove space debris from orbit, according to the article. ("One of the missions China claims is testing space debris mitigation techniques has docked with multiple spacecraft in orbit, but U.S. officials see it as a military threat. The same basic technologies needed for space debris cleanup — rendezvous and docking systems, robotic arms, and onboard automation — could be used to latch on to an adversary's satellite.")
Government

Indonesia Suspends TikTok Registration With Over 100 Million Accounts At Risk (reuters.com) 16

An anonymous reader quotes a report from Reuters: Indonesia has suspended TikTok's registration to provide electronic systems after it failed to hand over all data relating to the use of its live stream feature, a government official said on Friday. The suspension could in theory prevent access to TikTok, which has more than 100 million accounts based in Indonesia.

Alexander Sabar, an official at Indonesia's communications and digital ministry, said in a statement some accounts with ties to online gambling activities used TikTok's live stream feature during national protests. [...] Sabar said the government had asked the company for its traffic, streaming and monetization data. The company, owned by China's ByteDance, did not provide complete data, citing its internal procedures, Sabar said without giving further detail.

Cellphones

Thwarted Plot To Cripple Cell Service In NY Was Bigger Than First Thought (go.com) 47

Last month, federal investigators said they dismantled a China-linked plot that aimed to cripple New York City's telecommunications system by overloading cell towers, jamming 911 calls, and disrupting communications. According to law enforcement sources, the plot was even bigger than first thought. "Agents from Homeland Security Investigations found an additional 200,000 SIM cards at a location in New Jersey," according to ABC News. "That's double the 100,000 SIM cards, along with hundreds of servers, that were recently seized at five other vacant offices and apartments in and around the city." From the report: Investigators secured each of those locations, seized the electronics, and are now trying to track down who rented the spaces and filled them with shelves full of gear capable of sending 30 million anonymous text messages every minute, overloading communications and blacking out cellular service in a city that relies on it for emergency response and counterterrorism.

According to sources, the investigation began after several high-level people, including at least one with direct access to President Donald Trump, were targeted not only by swatters but also with actual threats received on their private phones.
"The potential threat these data centers pose to the public could include shutting down critical resources that the public needs, like the 911 system, or potentially impacting the public's ability to communicate everything, including business transactions," said Don Mihalek, an ABC News contributor who was formerly with the Secret Service.
Security

Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress (404media.co) 16

A hacking group claims to have pulled data from a GitLab instance connected to Red Hat's consulting business, scooping up 570 GB of compressed data from 28,000 customers. From a report: The hack was first reported by BleepingComputer and has been confirmed by Red Hat itself. "Red Hat is aware of reports regarding a security incident related to our consulting business and we have initiated necessary remediation steps," Stephanie Wonderlick, Red Hat's VP of communications told 404 Media.

A file released by the hackers and viewed by 404 Media suggested that the hacking group may have acquired some data related to about 800 clients, including Vodafone, T-Mobile, the US Navy's Naval Surface Warfare Center, the Federal Aviation Administration, Bank of America, AT&T, the U.S. House of Representatives, and Walmart.

Science

Scientists Make Embryos From Human Skin DNA For First Time (bbc.com) 52

An anonymous reader quotes a report from the BBC: US scientists have, for the first time, made early-stage human embryos by manipulating DNA taken from people's skin cells and then fertilizing it with sperm. The technique could overcome infertility due to old age or disease, by using almost any cell in the body as the starting point for life. It could even allow same-sex couples to have a genetically related child. [...]

The Oregon Health and Science University research team's technique takes the nucleus -- which houses a copy of the entire genetic code needed to build the body -- out of a skin cell. This is then placed inside a donor egg that has been stripped of its genetic instructions. So far, the technique is like the one used to create Dolly the Sheep -- the world's first cloned mammal -- born back in 1996. However, this egg is not ready to be fertilized by sperm as it already contains a full suite of chromosomes.

You inherit 23 of these bundles of DNA from each of your parents for a total of 46, which the egg already has. So the next stage is to persuade the egg to discard half of its chromosomes in a process the researchers have termed "mitomeiosis" (the word is a fusion of mitosis and meiosis, the two ways cells divide). The study, published in the journal Nature Communications, showed 82 functional eggs were made. These were fertilized with sperm and some progressed onto the early stages of embryos development. None were developed beyond the six-day-stage.

The technique is far from polished as the egg randomly chooses which chromosomes to discard. It needs to end up with one of each of the 23 types to prevent disease, but ends up with two of some and none of others. There is also a poor success rate (around 9%) and the chromosomes miss an important process where they rearrange their DNA, called crossing over. Prof Mitalipov, a world-renowned pioneer in the field, told me: "We have to perfect it. "Eventually, I think that's where the future will go because there are more and more patients that cannot have children."

Television

FCC To Consider Ending Merger Ban Among US Broadcast Networks (reuters.com) 78

An anonymous reader quotes a report from Reuters: The U.S. Federal Communications Commission voted on Tuesday to consider whether to lift the long-standing prohibition on a merger between any of the largest four broadcast networks and to consider relaxing other media ownership rules. The FCC said it would consider public comments before deciding whether to reverse the rule that bars a merger among the "Big Four" networks: NBC, owned by Comcast, Walt Disney Co's ABC, Paramount Skydance's CBS or Fox. The FCC also said it was seeking public comment on whether to eliminate or revise a rule that limits a single entity from owning more than two of the four largest television stations in the same local market and a rule that limits the total number of local radio stations that may be owned in a single market.

Previously, the FCC noted that a version of the rule barring dual ownership of networks has existed since the 1940s. A 2018 media ownership review concluded the bar should be upheld "because it advances the agency's core policy objectives of competition and localism. "We intend to take a fresh approach to competition by examining the broader media marketplace, rather than treating broadcast radio and television as isolated markets," FCC Chair Brendan Carr said. "If we determine that any rule no longer serves the public interest, we will fulfill our statutory duty to modify or eliminate those rules."

China

China Hackers Breached Foreign Ministers' Emails, Palo Alto Says (insurancejournal.com) 10

Chinese hackers breached email servers of foreign ministers as part of a years-long effort targeting the communications of diplomats around the world, according to researchers at the cybersecurity firm Palo Alto Networks. From a report: Attackers accessed Microsoft Exchange email servers, gaining the ability to search for information at some foreign ministries, said the team at Unit 42, the threat intelligence division of Palo Alto Networks, which has been tracking the group for nearly three years.

Hackers specifically searched in the email servers for key terms related to a China-Arab summit in Riyadh, Saudi Arabia, in 2022, said Lior Rochberger, senior researcher at the company. They also searched for names such as including Chinese President Xi Jinping and his wife, Peng Liyuan, in the context of that summit, the researchers said. The researchers declined to specifically identify which countries had their systems breached in the hacking campaign, but wrote in the report that the group's targeting patterns "align consistently with the People's Republic of China (PRC) economic and geopolitical interests."

NASA

NASA's New Mission Will Try to Map the Heliosphere After Voyager's Exit (cnn.com) 8

The heliosphere "plays a major role in why life is possible on our planet," reports CNN, "and how it perhaps once existed on others such as Mars." (Basically solar winds create "a constant flow of charged particles" that form "an enormous bubble that protects the planets in our solar system from cosmic radiation permeating the Milky Way".)

NASA says the heliosphere's boundary is three times the distance between Earth and Pluto. (After leaving the heliosphere NASA's Voyager probes collected key data about the heliosphere.) But now there's a new mission to investigate "how that solar wind interacts with interstellar space at the boundary of the heliosphere," CNN reports — called the Interstellar Mapping and Acceleration Probe (or IMAP): The spacecraft's 10 instruments will also fill gaps in the existing map of the heliosphere, pieced together from data collected by previous missions, and help further explain how the heliosphere largely shields our solar system from damaging cosmic rays, the most highly energetic particles in the universe. Along with two other space weather missions that lifted off aboard the same rocket on Wednesday, IMAP will help scientists better predict when solar storms unleashed by the sun could affect our planet. When aimed at Earth, harsh radiation from the storms, also known as space weather, can pose risks to astronauts on the International Space Station as well as interfere with communications, the electric power grid, navigation, and radio and satellite operations.

"This next set of missions is the ultimate cosmic carpool," said Dr. Joe Westlake, director of NASA's Heliophysics Division, during a news conference on Sunday. "They will provide unprecedented insight into space weather. Every human on Earth, as well as nearly every system involved in space exploration and human needs, is affected by space weather...." The IBEX, or Interstellar Boundary Explorer, satellite has been mapping the heliosphere since launching in 2008. But IMAP can explore and map the boundaries of the heliosphere like never before because it has instruments with faster imaging that are capable of 30 times higher resolution. Once it reaches an orbit about 1 million miles (1.6 million kilometers) from Earth in about three months, IMAP will also capture observations of the solar wind in real time and measure particles that travel from the sun, study the heliosphere's boundary between 6 billion and 9 billion miles (9.7 billion to 14.5 billion kilometers) away, and even collect data from interstellar space.

Also launching was the SWFO-L1 mission, which CNN says is "intended to act as a solar storm detector, providing early warnings to protect astronauts in low-Earth orbit and satellites that provide critical communications on Earth. It's a tool that will be even more necessary as astronauts venture farther into deep space."

NASA streamed the launch live on YouTube.
Communications

ULA Launches Third Batch of Amazon's Project Kuiper Satellites (spaceflightnow.com) 31

United Launch Alliance's Atlas 5 rocket launched 27 more Project Kuiper satellites for Amazon from Cape Canaveral, bringing the constellation's total to 129 in orbit. By the end of the year, Amazon expects over 200 satellites will be deployed, with commercial service starting in several countries by early 2026. Spaceflight Now reports: This is the third batch of production satellites launched by ULA and the fifth overall for the growing low Earth orbit constellation. [...] The 27 Project Kuiper satellites will be deployed at an altitude of 280 miles (450 kilometers) above Earth. Control will shift over to the Project Kuiper team at their 24/7 mission operations center in Redmond, Washington. The separation sequence began about 20 minutes after liftoff, concluding about 15 minutes later. From there, they will confirm satellite health, and eventually raise the satellites to their assigned orbit of 392 miles (630 km) above Earth.
United States

US Secret Service 'Dismantles Telecommunications Threat' (bbc.co.uk) 74

mrspoonsi writes: The US Secret Service says it has dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York area that were capable of crippling telecom systems.

The devices were "concentrated within 35 miles of the global meeting of the UN General Assembly now under way in New York City" and an investigation has been launched, it adds in a press statement.

The Secret Service says the dangers posed included "disabling cell phone towers, enabling denial of services attacks, and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises."

Education

Why One Computer Science Professor is 'Feeling Cranky About AI' in Education (acm.org) 64

Long-time Slashdot reader theodp writes: Over at the Communications of the ACM, Bard College CS Prof Valerie Barr explains why she's Feeling Cranky About AI and CS Education. Having seen CS education go through a number of we-have-to-teach-this moments over the decades — introductory programming languages, the Web, Data Science, etc. — Barr turns her attention to the next hand-wringing "what will we do" CS education moment with AI.

"We're jumping through hoops without stopping first to question the run-away train," Barr writes...

Barr calls for stepping back from "the industry assertion that the ship has sailed, every student needs to use AI early and often, and there is no future application that isn't going to use AI in some way" and instead thoughtfully "articulate what sort of future problem solvers and software developers we want to graduate from our programs, and determine ways in which the incorporation of AI can help us get there."

From the article: In much discussion about CS education:

a.) There's little interest in interrogating the downsides of generative AI, such as the environmental impact, the data theft impact, the treatment and exploitation of data workers.

b.) There's little interest in considering the extent to which, by incorporating generative AI into our teaching, we end up supporting a handful of companies that are burning billions in a vain attempt to each achieve performance that is a scintilla better than everyone else's.

c.) There's little interest in thinking about what's going to happen when the LLM companies decide that they have plateaued, that there's no more money to burn/spend, and a bunch of them fold—but we've perturbed education to such an extent that our students can no longer function without their AI helpers.

Slashdot Top Deals