Firefox

Mozilla Is Recruiting Beta Testers For a Free, Baked-In Firefox VPN (theregister.com) 36

Mozilla is testing a free, built-in VPN for Firefox that routes traffic through Mozilla-managed servers directly in the browser. The Register reports: According to a staff post on Mozilla Connect, the company's idea-sharing platform, Firefox VPN is still an experimental feature in the early stages of development, but users will be selected at random to test it "over the next few months." Moz describes the feature as one that will sit beside the search bar on Firefox, routing web traffic through a Mozilla-managed VPN server, concealing the user's real IP address while adding a layer of encryption to their communications. Firefox VPN is a different project entirely from Mozilla VPN, a separate, paid-for product. The Firefox version will be free to use and confined to the browser itself, while Mozilla VPN can be used by up to five devices at a time.

The Moz staffer on the product team who announced the feature said of the upcoming beta test: "We'll start simple, then gradually add new capabilities while learning how it impacts browsing, usage, and overall satisfaction. "Our long-term vision is ambitious: to build the best VPN-integrated browser on the market." In response to feedback, the staffer noted that while it will be a desktop browser feature first, "mobile is definitely a natural next step."

Communications

Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data (wired.com) 21

Researchers at UC San Diego and the University of Maryland have found that roughly half of geostationary satellite signals transmit sensitive data without encryption. The team spent three years using an $800 satellite receiver on a university rooftop in San Diego to intercept communications from satellites visible from their location. They collected phone calls and text messages from more than 2,700 T-Mobile users in just nine hours of recording.

The researchers also obtained data from airline passengers using in-flight Wi-Fi, communications from electric utilities and offshore oil and gas platforms, and US and Mexican military communications that revealed personnel locations and equipment details. The exposed data resulted from telecommunications companies using satellites to relay signals from remote cell towers to their core networks.

The researchers examined only about 15% of global satellite transponder communications and presented their findings at an Association for Computing Machinery conference in Taiwan this week. Most companies warned by the researchers have encrypted their satellite transmissions, but some US critical infrastructure owners have not yet added encryption.
The Internet

Major US Online Retailers Remove Listings For Millions of Prohibited Chinese Electronics 70

The FCC has forced major U.S. online retailers to remove millions of listings for prohibited Chinese-made electronics, including products from Huawei, ZTE, Hikvision, and Dahua, citing national security risks. Reuters reports: FCC Chair Brendan Carr said in an interview [on Friday] that the items removed are either on a U.S. list of barred equipment or were not authorized by the agency, including items like home security cameras and smart watches from companies including Huawei, Hangzhou Hikvision, ZTE, and Dahua Technology Company. Carr said companies are putting new processes in place to prevent future prohibited items as a result of FCC oversight. "We're going to keep our efforts up," Carr said. The FCC issued a new national security notice reminding companies of prohibited items including video surveillance equipment. Carr said the items could allow China to "surveil Americans, disrupt communications networks and otherwise threaten U.S. national security."
Television

California Law Forces Netflix, Hulu To Turn Down Ad Volumes (politico.com) 38

Gov. Gavin Newsom has signed a law banning excessively loud advertisements on streaming platforms like Netflix, Hulu and Amazon Prime that could become a de facto national standard. From a report: The new California law is aimed at addressing what the Federal Communications Commission has called a "troubling jump" in TV ad noise complaints, fueled by streamers airing commercials louder than the shows and movies they accompany.

It's modeled off a federal law passed in 2010 that caps ad volumes on cable and broadcast TV, but doesn't apply to streaming services. Given the Golden State's massive sway in the entertainment industry, the new law may strong-arm streamers into shushing commercials nationwide. "We heard Californians loud and clear, and what's clear is that they don't want commercials at a volume any louder than the level at which they were previously enjoying a program," Newsom said in a statement. "California is dialing down this inconvenience across streaming platforms."

Space

Removing 50 Objects from Orbit Would Cut Danger From Space Junk in Half (arstechnica.com) 26

If we could remove the 50 most concerning pieces of space debris in low-Earth orbit, there'd be a 50% reduction in the overall debris-generating potential, reports Ars Technica. That's according to Darren McKnight, lead author of a paper presented Friday at the International Astronautical Congress in Sydney, which calculated the objects most likely to collide with other fragments and create more debris. (Russia and the Soviet Union lead with 34 objects, followed by China with 10, the U.S. with three, Europe with two, and Japan with one.) Even just the top 10 were removed, the debris-generating potential drops by 30%.

"The things left before 2000 are still the majority of the problem," he points out, and "76% of the objects in the top 50 were deposited last century." 88% of the objects are post-mission rocket bodies left behind to hurtle through space. "The bad news is, since January 1, 2024, we've had 26 rocket bodies abandoned in low-Earth orbit that will stay in orbit for more than 25 years," McKnight told Ars... China launched 21 of the 26 hazardous new rocket bodies over the last 21 months, each averaging more than 4 metric tons (8,800 pounds). Two more came from US launchers, one from Russia, one from India, and one from Iran. This trend is likely to continue as China steps up deployment of two megaconstellations — Guowang and Thousand Sails — with thousands of communications satellites in low-Earth orbit.

Launches of these constellations began last year. The Guowang and Thousand Sails satellites are relatively small and likely capable of maneuvering out of the way of space debris, although China has not disclosed their exact capabilities. However, most of the rockets used for Guowang and Thousand Sails launches have left their upper stages in orbit. McKnight said nine upper stages China has abandoned after launching Guowang and Thousand Sails satellites will stay in orbit for more than 25 years, violating the international guidelines.

It will take hundreds of rockets to fully populate China's two major megaconstellations. The prospect of so much new space debris is worrisome, McKnight said. "In the next few years, if they continue the same trend, they're going to leave well over 100 rocket bodies over the 25-year rule if they continue to deploy these constellations," he said. "So, the trend is not good...." Since 2000, China has accumulated more dead rocket mass in long-lived orbits than the rest of the world combined, according to McKnight. "But now we're at a point where it's actually kind of accelerating in the last two years as these constellations are getting deployed."

A deputy head of China's national space agency recently said China is "currently researching" how to remove space debris from orbit, according to the article. ("One of the missions China claims is testing space debris mitigation techniques has docked with multiple spacecraft in orbit, but U.S. officials see it as a military threat. The same basic technologies needed for space debris cleanup — rendezvous and docking systems, robotic arms, and onboard automation — could be used to latch on to an adversary's satellite.")
Government

Indonesia Suspends TikTok Registration With Over 100 Million Accounts At Risk (reuters.com) 16

An anonymous reader quotes a report from Reuters: Indonesia has suspended TikTok's registration to provide electronic systems after it failed to hand over all data relating to the use of its live stream feature, a government official said on Friday. The suspension could in theory prevent access to TikTok, which has more than 100 million accounts based in Indonesia.

Alexander Sabar, an official at Indonesia's communications and digital ministry, said in a statement some accounts with ties to online gambling activities used TikTok's live stream feature during national protests. [...] Sabar said the government had asked the company for its traffic, streaming and monetization data. The company, owned by China's ByteDance, did not provide complete data, citing its internal procedures, Sabar said without giving further detail.

Cellphones

Thwarted Plot To Cripple Cell Service In NY Was Bigger Than First Thought (go.com) 47

Last month, federal investigators said they dismantled a China-linked plot that aimed to cripple New York City's telecommunications system by overloading cell towers, jamming 911 calls, and disrupting communications. According to law enforcement sources, the plot was even bigger than first thought. "Agents from Homeland Security Investigations found an additional 200,000 SIM cards at a location in New Jersey," according to ABC News. "That's double the 100,000 SIM cards, along with hundreds of servers, that were recently seized at five other vacant offices and apartments in and around the city." From the report: Investigators secured each of those locations, seized the electronics, and are now trying to track down who rented the spaces and filled them with shelves full of gear capable of sending 30 million anonymous text messages every minute, overloading communications and blacking out cellular service in a city that relies on it for emergency response and counterterrorism.

According to sources, the investigation began after several high-level people, including at least one with direct access to President Donald Trump, were targeted not only by swatters but also with actual threats received on their private phones.
"The potential threat these data centers pose to the public could include shutting down critical resources that the public needs, like the 911 system, or potentially impacting the public's ability to communicate everything, including business transactions," said Don Mihalek, an ABC News contributor who was formerly with the Secret Service.
Security

Red Hat Investigating Breach Impacting as Many as 28,000 Customers, Including the Navy and Congress (404media.co) 16

A hacking group claims to have pulled data from a GitLab instance connected to Red Hat's consulting business, scooping up 570 GB of compressed data from 28,000 customers. From a report: The hack was first reported by BleepingComputer and has been confirmed by Red Hat itself. "Red Hat is aware of reports regarding a security incident related to our consulting business and we have initiated necessary remediation steps," Stephanie Wonderlick, Red Hat's VP of communications told 404 Media.

A file released by the hackers and viewed by 404 Media suggested that the hacking group may have acquired some data related to about 800 clients, including Vodafone, T-Mobile, the US Navy's Naval Surface Warfare Center, the Federal Aviation Administration, Bank of America, AT&T, the U.S. House of Representatives, and Walmart.

Science

Scientists Make Embryos From Human Skin DNA For First Time (bbc.com) 52

An anonymous reader quotes a report from the BBC: US scientists have, for the first time, made early-stage human embryos by manipulating DNA taken from people's skin cells and then fertilizing it with sperm. The technique could overcome infertility due to old age or disease, by using almost any cell in the body as the starting point for life. It could even allow same-sex couples to have a genetically related child. [...]

The Oregon Health and Science University research team's technique takes the nucleus -- which houses a copy of the entire genetic code needed to build the body -- out of a skin cell. This is then placed inside a donor egg that has been stripped of its genetic instructions. So far, the technique is like the one used to create Dolly the Sheep -- the world's first cloned mammal -- born back in 1996. However, this egg is not ready to be fertilized by sperm as it already contains a full suite of chromosomes.

You inherit 23 of these bundles of DNA from each of your parents for a total of 46, which the egg already has. So the next stage is to persuade the egg to discard half of its chromosomes in a process the researchers have termed "mitomeiosis" (the word is a fusion of mitosis and meiosis, the two ways cells divide). The study, published in the journal Nature Communications, showed 82 functional eggs were made. These were fertilized with sperm and some progressed onto the early stages of embryos development. None were developed beyond the six-day-stage.

The technique is far from polished as the egg randomly chooses which chromosomes to discard. It needs to end up with one of each of the 23 types to prevent disease, but ends up with two of some and none of others. There is also a poor success rate (around 9%) and the chromosomes miss an important process where they rearrange their DNA, called crossing over. Prof Mitalipov, a world-renowned pioneer in the field, told me: "We have to perfect it. "Eventually, I think that's where the future will go because there are more and more patients that cannot have children."

Television

FCC To Consider Ending Merger Ban Among US Broadcast Networks (reuters.com) 78

An anonymous reader quotes a report from Reuters: The U.S. Federal Communications Commission voted on Tuesday to consider whether to lift the long-standing prohibition on a merger between any of the largest four broadcast networks and to consider relaxing other media ownership rules. The FCC said it would consider public comments before deciding whether to reverse the rule that bars a merger among the "Big Four" networks: NBC, owned by Comcast, Walt Disney Co's ABC, Paramount Skydance's CBS or Fox. The FCC also said it was seeking public comment on whether to eliminate or revise a rule that limits a single entity from owning more than two of the four largest television stations in the same local market and a rule that limits the total number of local radio stations that may be owned in a single market.

Previously, the FCC noted that a version of the rule barring dual ownership of networks has existed since the 1940s. A 2018 media ownership review concluded the bar should be upheld "because it advances the agency's core policy objectives of competition and localism. "We intend to take a fresh approach to competition by examining the broader media marketplace, rather than treating broadcast radio and television as isolated markets," FCC Chair Brendan Carr said. "If we determine that any rule no longer serves the public interest, we will fulfill our statutory duty to modify or eliminate those rules."

China

China Hackers Breached Foreign Ministers' Emails, Palo Alto Says (insurancejournal.com) 10

Chinese hackers breached email servers of foreign ministers as part of a years-long effort targeting the communications of diplomats around the world, according to researchers at the cybersecurity firm Palo Alto Networks. From a report: Attackers accessed Microsoft Exchange email servers, gaining the ability to search for information at some foreign ministries, said the team at Unit 42, the threat intelligence division of Palo Alto Networks, which has been tracking the group for nearly three years.

Hackers specifically searched in the email servers for key terms related to a China-Arab summit in Riyadh, Saudi Arabia, in 2022, said Lior Rochberger, senior researcher at the company. They also searched for names such as including Chinese President Xi Jinping and his wife, Peng Liyuan, in the context of that summit, the researchers said. The researchers declined to specifically identify which countries had their systems breached in the hacking campaign, but wrote in the report that the group's targeting patterns "align consistently with the People's Republic of China (PRC) economic and geopolitical interests."

NASA

NASA's New Mission Will Try to Map the Heliosphere After Voyager's Exit (cnn.com) 8

The heliosphere "plays a major role in why life is possible on our planet," reports CNN, "and how it perhaps once existed on others such as Mars." (Basically solar winds create "a constant flow of charged particles" that form "an enormous bubble that protects the planets in our solar system from cosmic radiation permeating the Milky Way".)

NASA says the heliosphere's boundary is three times the distance between Earth and Pluto. (After leaving the heliosphere NASA's Voyager probes collected key data about the heliosphere.) But now there's a new mission to investigate "how that solar wind interacts with interstellar space at the boundary of the heliosphere," CNN reports — called the Interstellar Mapping and Acceleration Probe (or IMAP): The spacecraft's 10 instruments will also fill gaps in the existing map of the heliosphere, pieced together from data collected by previous missions, and help further explain how the heliosphere largely shields our solar system from damaging cosmic rays, the most highly energetic particles in the universe. Along with two other space weather missions that lifted off aboard the same rocket on Wednesday, IMAP will help scientists better predict when solar storms unleashed by the sun could affect our planet. When aimed at Earth, harsh radiation from the storms, also known as space weather, can pose risks to astronauts on the International Space Station as well as interfere with communications, the electric power grid, navigation, and radio and satellite operations.

"This next set of missions is the ultimate cosmic carpool," said Dr. Joe Westlake, director of NASA's Heliophysics Division, during a news conference on Sunday. "They will provide unprecedented insight into space weather. Every human on Earth, as well as nearly every system involved in space exploration and human needs, is affected by space weather...." The IBEX, or Interstellar Boundary Explorer, satellite has been mapping the heliosphere since launching in 2008. But IMAP can explore and map the boundaries of the heliosphere like never before because it has instruments with faster imaging that are capable of 30 times higher resolution. Once it reaches an orbit about 1 million miles (1.6 million kilometers) from Earth in about three months, IMAP will also capture observations of the solar wind in real time and measure particles that travel from the sun, study the heliosphere's boundary between 6 billion and 9 billion miles (9.7 billion to 14.5 billion kilometers) away, and even collect data from interstellar space.

Also launching was the SWFO-L1 mission, which CNN says is "intended to act as a solar storm detector, providing early warnings to protect astronauts in low-Earth orbit and satellites that provide critical communications on Earth. It's a tool that will be even more necessary as astronauts venture farther into deep space."

NASA streamed the launch live on YouTube.
Communications

ULA Launches Third Batch of Amazon's Project Kuiper Satellites (spaceflightnow.com) 31

United Launch Alliance's Atlas 5 rocket launched 27 more Project Kuiper satellites for Amazon from Cape Canaveral, bringing the constellation's total to 129 in orbit. By the end of the year, Amazon expects over 200 satellites will be deployed, with commercial service starting in several countries by early 2026. Spaceflight Now reports: This is the third batch of production satellites launched by ULA and the fifth overall for the growing low Earth orbit constellation. [...] The 27 Project Kuiper satellites will be deployed at an altitude of 280 miles (450 kilometers) above Earth. Control will shift over to the Project Kuiper team at their 24/7 mission operations center in Redmond, Washington. The separation sequence began about 20 minutes after liftoff, concluding about 15 minutes later. From there, they will confirm satellite health, and eventually raise the satellites to their assigned orbit of 392 miles (630 km) above Earth.
United States

US Secret Service 'Dismantles Telecommunications Threat' (bbc.co.uk) 74

mrspoonsi writes: The US Secret Service says it has dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York area that were capable of crippling telecom systems.

The devices were "concentrated within 35 miles of the global meeting of the UN General Assembly now under way in New York City" and an investigation has been launched, it adds in a press statement.

The Secret Service says the dangers posed included "disabling cell phone towers, enabling denial of services attacks, and facilitating anonymous, encrypted communication between potential threat actors and criminal enterprises."

Education

Why One Computer Science Professor is 'Feeling Cranky About AI' in Education (acm.org) 64

Long-time Slashdot reader theodp writes: Over at the Communications of the ACM, Bard College CS Prof Valerie Barr explains why she's Feeling Cranky About AI and CS Education. Having seen CS education go through a number of we-have-to-teach-this moments over the decades — introductory programming languages, the Web, Data Science, etc. — Barr turns her attention to the next hand-wringing "what will we do" CS education moment with AI.

"We're jumping through hoops without stopping first to question the run-away train," Barr writes...

Barr calls for stepping back from "the industry assertion that the ship has sailed, every student needs to use AI early and often, and there is no future application that isn't going to use AI in some way" and instead thoughtfully "articulate what sort of future problem solvers and software developers we want to graduate from our programs, and determine ways in which the incorporation of AI can help us get there."

From the article: In much discussion about CS education:

a.) There's little interest in interrogating the downsides of generative AI, such as the environmental impact, the data theft impact, the treatment and exploitation of data workers.

b.) There's little interest in considering the extent to which, by incorporating generative AI into our teaching, we end up supporting a handful of companies that are burning billions in a vain attempt to each achieve performance that is a scintilla better than everyone else's.

c.) There's little interest in thinking about what's going to happen when the LLM companies decide that they have plateaued, that there's no more money to burn/spend, and a bunch of them fold—but we've perturbed education to such an extent that our students can no longer function without their AI helpers.

United States

America's Space Force is Preparing for a New Kind of War (msn.com) 66

A July combat training exercise involved a satellite dish-style antenna that "could fire enough electromagnetic energy to fry the satellite 22,000 miles away," reports the Washington Post. But "Instead, the salvo would be more covert — millisecond pulses of energy that would subtly disrupt the satellite's signals, which U.S. military forces were using to communicate in the Pacific Ocean." The goal was to disguise the strike as a garbled connection that could be easily remedied by securing a loose cable or a simple reboot, leaving U.S. service members frustrated without raising their suspicions. [And using less power "would make it harder for the Blue Team to track where the interference was coming from."] This is how the next war could start: invisible shots fired in space on the electromagnetic spectrum that could render U.S. fighter jets and aircraft carriers deaf and blind, unable to communicate. In this case, the "aggressors" targeting the U.S. satellite were not from China or Russia, but rather an elite squadron of U.S. Space Force Guardians mimicking how potential adversaries would act in a conflict that begins in orbit... Involving more than 700 service members and spanning 50 million square miles and six time zones, the training exercise, called Resolute Space, was observed firsthand exclusively by The Washington Post.
The article describes leadership at the U.S. Space Force "still honing their mission while jousting with adversaries, such as China, that are moving quickly and conducting combat-like operations in orbit... While the Space Force continues to evolve, many defense analysts and some members of Congress fear the United States has already ceded its dominance in space to China and others." With a budget of just $40 billion, the relatively tiny Space Force makes up just about 4 percent of the Defense Department's budget and less than 1 percent of its personnel. It has more than 15,000 Guardians, which also includes several thousand civilians. By comparison, the Army has nearly 1 million soldiers. The Space Force has been squeezed under the department of the Air Force and struggled to distinguish itself from the other branches...

China, Russia and others have demonstrated that they can take out or interfere with the satellites operated by the Pentagon and intelligence agencies that provide the nation's missile warning and tracking, reconnaissance and communications. China in particular has moved rapidly to build an arsenal of space-based weapons... [R]ecently, several of China's satellites have engaged in what Space Force officials have called "dogfighting," jousting with U.S. satellites at high speeds and close ranges.

Programming

Secure Software Supply Chains, Urges Former Go Lead Russ Cox (acm.org) 19

Writing in Communications of the ACM, former Go tech lead Russ Cox warns we need to keep improving defenses of software supply chains, highlighting "promising approaches that should be more widely used" and "areas where more work is needed." There are important steps we can take today, such as adopting software signatures in some form, making sure to scan for known vulnerabilities regularly, and being ready to update and redeploy software when critical new vulnerabilities are found. More development should be shifted to safer languages that make vulnerabilities and attacks less likely. We also need to find ways to fund open source development to make it less susceptible to takeover by the mere offer of free help. Relatively small investments in OpenSSL and XZ development could have prevented both the Heartbleed vulnerability and the XZ attack.
Some highlights from the 5,000-word article:
  • Make Builds Reproducible. "The Reproducible Builds project aims to raise awareness of reproducible builds generally, as well as building tools to help progress toward complete reproducibility for all Linux software. The Go project recently arranged for Go itself to be completely reproducible given only the source code... A build for a given target produces the same distribution bits whether you build on Linux or Windows or Mac, whether the build host is X86 or ARM, and so on. Strong reproducibility makes it possible for others to easily verify that the binaries posted for download match the source code..."
  • Prevent Vulnerabilities. "The most secure software dependencies are the ones not used in the first place: Every dependency adds risk... Another good way to prevent vulnerabilities is to use safer programming languages that remove error-prone language features or make them needed less often..."
  • Authenticate Software. ("Cryptographic signatures make it impossible to nefariously alter code between signing and verifying. The only problem left is key distribution...") "The Go checksum database is a real-world example of this approach that protects millions of Go developers. The database holds the SHA256 checksum of every version of every public Go module..."
  • Fund Open Source. [Cox first cites the XKCD cartoon "Dependencies," calling it "a disturbingly accurate assessment of the situation..."] "The XZ attack is the clearest possible demonstration that the problem is not fixed. It was enabled as much by underfunding of open source as by any technical detail."

The article also emphasized the importance of finding and fixing vulnerabilities quickly, arguing that software attacks must be made more difficult and expensive.

"We use source code downloaded from strangers on the Internet in our most critical applications; almost no one is checking the code.... We all have more work to do."


Science

Study Links Microplastic Exposure to Alzheimer's Disease in Mice (uri.edu) 17

Micro- and nanoplastic particles "infiltrate all systems of the body, including the brain," notes the University of Rhode Island, "where they can accumulate and trigger Alzheimer's-like conditions, according to a new study by researchers in the University of Rhode Island College of Pharmacy."

ScienceDaily shares the announcement: After a previous study that showed how microplastics can infiltrate all systems of the body — including the blood-brain barrier, which protects the brain from harmful substances as small as viruses and bacteria — University of Rhode Island pharmacy assistant professor Jaime Ross expanded the study to determine the brain health impacts of the plastic toxins. Her findings indicate that the accumulation of micro- and nanoplastics in the brain can lead to cognitive decline and even Alzheimer's disease, especially in those who carry genetic risk factors.

Ross' latest study, published recently in the journal Environmental Research Communications, examined mice that had been genetically modified to include the naturally occurring gene APOE4, a strong indicator of Alzheimer's risk making people 3.5 times more likely to develop the disease than those who carry the APOE3 variant of the gene that is passed from parents to offspring... Ross and her team exposed two groups of mice — one with the APOE4 variant and one with APOE3 — to micro- and nanoplastics in their drinking water over a period of three weeks. The tiny particles from polystyrene — among the most abundant plastics in the world, found in Styrofoam take-out containers, plastic cups and more — infiltrated the mice' organs, including the brain, as expected...

Ross' team then ran the mice through a series of tests to examine their cognitive ability, beginning with an open-field test, in which researchers put a mouse in a chamber and allow it to explore at will for 90 minutes. Ordinarily, a mouse will hug the walls, naturally attempting to hide from potential predators. However, after microplastic exposure, the APOE4 mice — especially the male mice — tended to wander more in the middle of the chamber and spend time in open space, leaving themselves vulnerable to predators...

The results are concerning enough to warrant further study into the cognitive decline caused by exposure to micro- and nanoplastics, which are among the most prominent environmental toxins to which people are routinely exposed... Ross is continuing to expand her research into the topic and encourages others to do so, in the hope of leading to better regulation of the toxins.

China

A New Report Finds China's Space Program Will Soon Equal That of the US (arstechnica.com) 93

An anonymous reader quotes a report from Ars Technica: As Jonathan Roll neared completion of a master's degree in science and technology policy at Arizona State University three years ago, he did some research into recent developments by China's ascendant space program. He came away impressed by the country's growing ambitions. Now a full-time research analyst at the university, Roll was recently asked to take a deeper dive into Chinese space plans. "I thought I had a pretty good read on this when I was finishing grad school," Roll told Ars. "That almost everything needed to be updated, or had changed three years later, was pretty scary. On all these fronts, they've made pretty significant progress. They are taking all of the cues from our Western system about what's really galvanized innovation, and they are off to the races with it."

Roll is the co-author of a new report, titled "Redshift," on the acceleration of China's commercial and civil space activities and the threat these pose to similar efforts in the United States. Published on Tuesday, the report was sponsored by the US-based Commercial Space Federation, which advocates for the country's commercial space industry. It is a sobering read and comes as China not only projects to land humans on the lunar surface before the US can return, but also is advancing across several spaceflight fronts to challenge America. "The trend line is unmistakable," the report states. "China is not only racing to catch up -- it is setting pace, deregulating, and, at times, redefining what leadership looks like on and above Earth. This new space race will not be won with a single breakthrough or headline achievement, but with sustained commitment, clear-eyed vigilance, and a willingness to adapt over decades."
"The key takeaway here is that there is an acceleration," said Dave Cavossa, president of the Commercial Spaceflight Federation. "The United States is still ahead today in a lot of areas in space. But the Chinese are advancing very quickly and poised to overtake us in the next five to 10 years if we don't do something."

"There's other things along the lines of budget battles," Cavossa said. "We don't want to see the US government scaling back its reliance on commercial satellite communications. We don't want to see them scaling back commercial remote sensing data buys, which is what they've been doing, or at least threatening to do. We want to make sure that there's a seamless transition from the ISS to commercial LEO destinations, and then a transition away from old programs of record to commercial transportation alternatives. That's what the US government can do and Congress can do here in the next couple of years to make sure that we stay ahead."
Businesses

Verizon To Offer $20 Broadband In California To Obtain Merger Approval (arstechnica.com) 17

An anonymous reader quotes a report from Ars Technica: Verizon agreed to offer $20-per-month broadband service to people with low incomes in California in exchange for a merger approval. In a bid to complete its $9.6 billion purchase of Frontier Communications, Verizon committed to offering $20 fiber-to-the-home service with symmetrical speeds of 300Mbps. Verizon also committed to offering a $20 fixed wireless service with download speeds of 100Mbps and upload speeds of 20Mbps. Verizon would be required to offer the plans for at least 10 years, according to a joint motion (PDF) to approve the settlement agreement. After three years, Verizon would need to "make commercially reasonable efforts" to increase the speeds "while retaining the $20 price point."

The joint motion filed by Verizon and the California Public Advocates Office seeks approval from the California Public Utilities Commission (CPUC). The $20 plans would be available to people who meet income eligibility guidelines and can be paired with Lifeline discounts. "My team required those options to be California Lifeline eligible, which effectively makes it free for low-income Californians throughout the state," wrote Ernesto Falcon, a program manager at the Public Advocates Office. California's Lifeline program provides $19 discounts. Falcon also wrote that the settlement would expand fiber deployment beyond what Frontier would have offered on its own. "If the merger is approved, Verizon will deliver 75,000 new fiber-to-the-home connections in California beyond Frontier's entire buildout plan with a priority for low-income households," he wrote. The deal also requires 250 new cell sites for Verizon's 5G network.

Slashdot Top Deals