Education

'Security Concerns' Caused Three-Day Internet Outage at the University of Michigan Last Week (cbsnews.com) 19

On August 30th the University of Michigan announced it had finally restored its internet connectivity and Wi-Fi network, according to the Ann Arbor News, "after several days of outages caused by a 'significant security concern,' officials said." The outage coincided with the first days of the new school year, although "classes continued through the outage." The internet was shut down on 1:45 p.m. on Sunday, Aug. 27, after the Information Assurance team at the university identified a security concern, according to previous reporting. The Information Assurance team fights cybersecurity threats and malicious actors... The investigation into the security issue is ongoing and no other information will be released, said Santa Ono, president of University of Michigan.
But a local CBS station heard some theories from cybersecurity experts: "The fact that they took their systems down, like proactively took their systems down, is the indication that it is a cybersecurity incident," said co-founder and CTO of SensCy Dave Kelly. "The reason why you do that is that you don't want it to spread further."

"They probably didn't know to what extent they'd been compromised," senior penetration tester and ethical hacker at NetWorks Group Chris Neuwirth said. "They probably didn't know how many accounts were compromised or the initial entry point that the threat actor used to gain access into the network." Sources close to the investigation told CBS News Detroit that U-M detected malware on its Wi-Fi network and decided to shut it down in response.

So, did the school avoid a disaster? Neuwirth thinks it very well could have. "They likely had very robust backups and data recover, plans, procedures in place that helped them make the decision very confidently and rapidly," he said. "Four days in that they're already bringing up their systems tells me that it's likely that a lot of what they had been preparing for worked."

Kelly said these types of incidents are on the rise. "There's been a large increase in cybersecurity incidents," he said. It's been trending up, quite frankly, for the last several years. It used to be that these threat actors were targeting the government and Fortune 500 companies, but they've started to, more and more over the years, look at universities."

Thanks to long-time Slashdot reader regoli for sharing the news.
Crime

Cheating in Tennis: How Cellphone Records Revealed a Massive Match-Fixing Ring (msn.com) 37

"On the morning of his arrest, Grigor Sargsyan was still fixing matches. Four cellphones buzzed on his nightstand with calls and messages from around the world.... The information on his devices would provide a remarkable window into what has become the world's most manipulated sport, according to betting regulators. Thousands of texts, gambling receipts and bank transfers laid out Sargsyan's ascent in remarkable detail..."

That's part one of a two-part story in which more than 181 tennis players are involved, and from more than 30 countries, fixing more than 375 professional tennis matches. The Washington Post reveals the years-long investigation that began when Belgium's gambling commission tipped off their federal prosecutor's office to "irregular wagers on obscure tennis matches played around the world."

The breakthrough came with geolocation data on a cellphone, cross-referenced against the the names of people who'd recently flown to that country... The bets were made in small towns in the Flemish countryside. The gamblers appeared to be acting on inside information; they consistently won even when they bet against steep odds... [Nicolas Borremans, a 45-year-old police investigator based in the Flanders region of Belgium] knew little about sports. He had never watched an entire tennis match. But even a cursory description of the case was enough for him to see how a gambling operation might be used to launder money...

Within a few months, he had traced the accounts of four men who had placed suspicious bets in Belgium, all Armenian immigrants. Their wagers were mostly small — a few hundred euros each — ostensibly to avoid scrutiny. Almost all of the bets were on low-level professional tennis tournaments, where players earned barely enough to pay for their travel. Borremans secured wiretaps on the gamblers' phones, and a team of Armenian interpreters listened in. It became clear that the gamblers were working for someone. They received detailed instructions about which matches to bet on. They weren't gambling just on the outcomes, but on specific scores for sets and games... Borremans added more gamblers to his diagram. "Money mules," he called them. Eventually, he would uncover 1,671 accounts at gambling establishments across Europe. Many were registered by working-class Armenians: mechanics, a pizza deliveryman, a taxi driver.

While the tennis tour "has in recent months issued a raft of bans and suspensions," the article points out that the scale of the gambler/tennis player network "has remained a secret until now, in part because the tour is still working on active investigations related to the operation." (The professional tennis tour has its own investigation unit "formed in part because of pervasive allegations of match-fixing in the sport," which assisted the Belgian police.)

The operation's "maestro" had tried to evade investigators. (One French player received his payment in 21 separate transfers from Armenia.) The maestro also gave the tennis players anonymously-registered SIM cards for communication. But unfortunately, the article points out, every professional tennis player "signs a contract agreeing to hand their phones over to tennis investigators at any time if required." Soon investigators were reading the mastermind's text messages — and even wiretapping his phone calls to his mother.

His phone's search history would later offer a glimpse into his life and concerns. Sargsyan scoured the internet for references to himself and his players ("maestro tennis," "match fixing tennis hossam"); he did some broader research into his world ("tennis corruption," "armenian mafia"); he searched for ways to spend his new fortune ("escort geneve," "villa rent close port mallorca") But, mostly, he searched for new bookmakers ("croatia betting shop," "usa betting," "mybet Australia").
Caught in the investigation were Sebastian Rivera, the Chilean coach based in the United States, and Slovakian tennis player Dagmara Baskova (who says she was paid 10,000 euros for each thrown match). Another French player told investigators "Since 2015, I estimate that I have accepted to deliberately lose or manipulate the outcome of 20 to 30 matches for Maestro, both in singles and doubles." Some tennis players infuriated the maestro by tipping off other gamblers about their plans to throw matches.

Leaving the courtroom for his own trial, the maestro gave this response to the Post reporter asking how he felt about the courtroom proceedings. "If the prosecutor knew what I know, there would be many more people on trial." Later the maestro was sentenced to five years in prison for fraud, money laundering, and leading a criminal organization.
Your Rights Online

NYPD Spent Millions To Contract With Firm Banned by Meta for Fake Profiles (theguardian.com) 27

New York law enforcement agencies have spent millions of dollars to expand their capabilities to track and analyze social media posts, new documents show, including by contracting with a surveillance firm accused of improperly scraping social media platforms for data. From a report: Documents obtained by the Surveillance Technology Oversight Project (Stop), a privacy advocacy non-profit and shared with the Guardian, reveal the New York police department in 2018 entered a nearly $9m contract with Voyager Labs, a surveillance company that has been sued by Meta for allegedly using nearly 40,000 fake Facebook accounts to collect data on an estimated 600,000 users. NYPD purchased Voyager Labs products that the company claims can use artificial intelligence to analyze online human behavior and detect and predict fraud and crimes, the documents show.

A separate document reveals a contract between the Queens district attorney and Israeli firm Cobwebs Technologies, which also offers social network mapping products, as well as tools to track location information through phones. It's unclear how much that contract is worth. Law enforcement across the United States have worked with social media analytics companies for years, hoping to more effectively and efficiently collect and make sense of the hordes of personal information available on the internet. But experts have argued the practice can cross ethical and legal lines, particularly when used to access private information, make inferences or predict future criminality based on the content posted on social media, or otherwise help law enforcement skip obtaining subpoenas and warrants before gathering information on someone.

Businesses

Sam Altman-Backed Mentra Aims To Match Neurodivergent Jobseekers With Ideal Jobs (techcrunch.com) 23

Due to confidence issues and difficulties interviewing, neurodivergent individuals often face higher unemployment rates than their non-neurodivergent counterparts. However, they may possess specialized skills that can enhance team productivity by up to 30% in suitable work settings. A startup backed by OpenAI's Sam Altman aims to help these job seekers find suitable employment opportunities, leveraging technology and assessments to match individuals with roles that best align with their abilities and skills. An anonymous reader shares an excerpt from TechCrunch: Enter Mentra. The Charlotte, N.C.-based startup, whose three co-founders are all autistic is building what it describes as an AI-powered "neuroinclusive employment network." Specifically, its tech platform leverages artificial intelligence to help large enterprises hire employees with cognitive differences such as autism, attention-deficit/hyperactivity disorder (ADHD), dyslexia, obsessive-compulsive disorder (OCD), traumatic brain injury (TBI) and post-traumatic stress disorder (PTSD). The startup's unique premise caught the early attention of OpenAI co-founder and CEO Sam Altman, who first invested in the company with a $1 million pre-seed investment in February 2022 through his venture firm, Hydrazine Capital. Mentra also won an AI for accessibility grant from Microsoft. Shine Capital led its $3.5 million seed round this year, which also included participation from Altman's fund, Verissimo, Full Circle, Charlotte Fund, as well as angel investors including David Apple and Dawn Dobras.

What sets Mentra apart is its approach to job fit, maintains Mentra co-founder and CEO Jhillika Kumar. The startup goes beyond keywords in resumes to match employers with talent, she said, considering factors around a person's neurotype, aptitude, environmental sensitivities. To date, its one-year retention rate has remained at an impressive 97.5%. [...] One way Mentra uses AI is to parse through job descriptions to make sure they are cognitively accessible and broken down in a consistent format that is not exclusionary. "Then we are able to use an algorithm to go through the jobseekers on our platform to identify who's the best fit based on mostly neuro type," Kumar told TechCrunch. "One person might be extremely good at hyper focusing, very detail-oriented, very process-oriented or very strategic, and you have specific skills that map to their strengths in the role." Over 70% of the data Mentra collects is not collected by an Indeed or a traditional job-finding platform. It uses that holistic data to make the match between the job and the individual.

The startup's current revenue model is free for neurodivergent jobseekers, and it charges an annual subscription for enterprise companies to access the platform. It is also building out a neuroinclusion marketplace for service providers such as consultancies and training firms to provide hands-on services to companies that accompany Mentra's core platform. "In the future, we plan to have a similar marketplace available for neurodivergents to access tailored services as well throughout the life of their career such as bootcamps and job coaches," Kumar added.

Technology

FAA Clears UPS Delivery Drones To Fly Beyond Visual Line of Sight 32

In a press release today, the Federal Aviation Administration said UPS delivery drones are now allowed to fly longer distance flights beyond the sight of ground operators. "This is the kind of move that opens the door for drone delivery companies like Wing, FedEx, and Zip to deliver packages across a wider area and service more customers," reports The Verge. From the report: UPS Flight Forward, a UPS subsidiary focused on drone delivery, can now deliver small packages beyond the visual line of sight (BVLOS) without spotters on the ground monitoring the route and skies for other aircraft, using SwissDrones SVO 50 V2 drones. The FAA also announced authorizations for two other companies to fly beyond sight for commercial purposes. That includes uAvionix Corp. and, last week, infrastructure inspection company Phoenix Air Unmanned.

UPS first received government approval to operate its drone service in 2019, the same year the FAA authorized Alphabet's Wing service to operate commercially. The company first focused on building a drone delivery network for US hospital campuses.
AI

Pentagon Plans Vast AI Fleet To Counter China Threat (wsj.com) 60

The Pentagon is considering the development of a vast network of AI-powered technology, drones and autonomous systems within the next two years to counter threats from China and other adversaries. WSJ: Kathleen Hicks, the deputy secretary of defense, will provide new details in a speech later Wednesday about the department's plans to spend hundreds of millions of dollars to develop an array of thousands of air-, land- and sea-based artificial-intelligence systems that are intended to be "small, smart, cheap."

The U.S. is seeking to keep pace with China's rapidly expanding military amid concerns that the Pentagon bureaucracy takes too long to develop and deploy cutting-edge systems. [...] One approach could be to build on the capabilities demonstrated by Task Force 59, the U.S. Navy's network of drones and sensors designed to monitor Iran's military activities in the Middle East.

Sony

Sony Sends Copyright Notices To TV Museum About Shows 40 To 60 Years Old (torrentfreak.com) 61

An anonymous reader quotes a report from TorrentFreak: Rick Klein and his team have been preserving TV adverts, forgotten tapes, and decades-old TV programming for years. Now operating as a 501(c)(3) non-profit, the Museum of Classic Chicago Television has called YouTube home since 2007. However, copyright notices sent on behalf of Sony, protecting TV shows between 40 and 60 years old, could shut down the project in 48 hours. "Our YouTube channel with 150k subscribers is in danger of being terminated by September 6th if I don't find a way to resolve these copyright claims that Markscan made," Klein told TorrentFreak on Friday. "At this point, I don't even care if they were issued under authorization by Sony or not -- I just need to reach a live human being to try to resolve this without copyright strikes. I am willing to remove the material manually to get the strikes reversed."

Over the weekend Klein shared details of the copyright complaints filed with YouTube. Two of the claims can be seen in the image below and on first view, appear straightforward enough. Two episodes of the TV series Bewitched dated 1964 aired on ABC Network and almost sixty years later, archive copies of those transmissions were removed from YouTube for violating Sony copyrights, with MCCTv receiving a strike. A claim targeting an upload titled Bewitched -- 'Twitch or Treat' -- WPWR Channel 60 (Complete Broadcast, 8/6/1984) follows the same pattern, but what isn't shown are the details added by MCCTv to place the episode (and the included commercials) in historical context. Another takedown target -- Bewitched -- 'Sam in the Moon' (Complete 16mm Network Print, 1/5/1967) is accompanied by even more detail, including references in the episode to then-current events.

Given that copyright law locks content down for decades, Klein understands that can sometimes cause issues, although 16 years on YouTube suggests that the overwhelming majority of rightsholders don't consider his channel a threat. If they did, the option to monetize the recordings can be an option. [...] Klein says MCCTv certainly doesn't set out to hurt copyright holders. However, there's always a balance between preserving "rare pieces of video ephemera" and the likelihood that nobody needs to enforce any rights, versus unusual circumstances like these where unexpected complaints need to be resolved with impossible-to-reach parties. Klein says the team is happy to comply with Sony's wishes and they hope that given a little leeway, the project won't be consigned to history. Perhaps Sony will recall the importance of time-shifting while understanding that time itself is running out for The Museum of Classic Chicago Television.

Businesses

Telecom Companies in India Want Tech Firms To Pay For Network Usage (techcrunch.com) 77

Telecom operators in India, the second largest wireless market, would like internet companies to compensate for using their networks, a recommendation they've made to the local regulatory body, echoing a viewpoint that is gaining some momentum in other parts of the world but also stoking fears about violation of net neutrality. From a report: Jio, India's largest telecom operator with more than 450 million subscribers, recommended to the local regulator that internet companies should be made to "contribute" towards telecom network costs based on the traffic they consume, their turnover and number of users.

"We suggest that TRAI [India's telecom regulator] should recommend for OTT providers contributing in the network development and building a backbone for the country. In this effort, the Other OTT service providers should also be required to pay their fair share," said the unit of Reliance, which is run by Asia's richest man Mukesh Ambani. Reliance, which carries 55% share of India's total data traffic, contends that requiring internet companies to compensate for network usage will ensure a level playing field. Jio said there is a "near consensus" among telecom operators across the globe on this subject.

Google

Are We Seeing the End of the Googleverse? (theverge.com) 133

The Verge argues we're seeing "the end of the Googleverse. For two decades, Google Search was the invisible force that determined the ebb and flow of online content.

"Now, for the first time, its cultural relevance is in question... all around us are signs that the era of 'peak Google' is ending or, possibly, already over." There is a growing chorus of complaints that Google is not as accurate, as competent, as dedicated to search as it once was. The rise of massive closed algorithmic social networks like Meta's Facebook and Instagram began eating the web in the 2010s. More recently, there's been a shift to entertainment-based video feeds like TikTok — which is now being used as a primary search engine by a new generation of internet users...

Google Reader shut down in 2013, taking with it the last vestiges of the blogosphere. Search inside of Google Groups has repeatedly broken over the years. Blogger still works, but without Google Reader as a hub for aggregating it, most publishers started making native content on platforms like Facebook and Instagram and, more recently, TikTok. Discoverability of the open web has suffered. Pinterest has been accused of eating Google Image Search results. And the recent protests over third-party API access at Reddit revealed how popular Google has become as a search engine not for Google's results but for Reddit content. Google's place in the hierarchy of Big Tech is slipping enough that some are even admitting that Apple Maps is worth giving another chance, something unthinkable even a few years ago. On top of it all, OpenAI's massively successful ChatGPT has dragged Google into a race against Microsoft to build a completely different kind of search, one that uses a chatbot interface supported by generative AI.

Their article quotes the founder of the long-ago Google-watching blog, "Google Blogoscoped," who remembers that when Google first came along, "they were ad-free with actually relevant results in a minimalistic kind of design. If we fast-forward to now, it's kind of inverted now. The results are kind of spammy and keyword-built and SEO stuff. And so it might be hard to understand for people looking at Google now how useful it was back then."

The question, of course, is when did it all go wrong? How did a site that captured the imagination of the internet and fundamentally changed the way we communicate turn into a burned-out Walmart at the edge of town? Well, if you ask Anil Dash, it was all the way back in 2003 — when the company turned on its AdSense program. "Prior to 2003-2004, you could have an open comment box on the internet. And nobody would pretty much type in it unless they wanted to leave a comment. No authentication. Nothing. And the reason why was because who the fuck cares what you comment on there. And then instantly, overnight, what happened?" Dash said. "Every single comment thread on the internet was instantly spammed. And it happened overnight...."

As he sees it, Google's advertising tools gave links a monetary value, killing anything organic on the platform. From that moment forward, Google cared more about the health of its own network than the health of the wider internet. "At that point it was really clear where the next 20 years were going to go," he said.

Security

LogicMonitor Customers Hit By Hackers, Because of Default Passwords (techcrunch.com) 25

Some customers of the network security company LogicMonitor have been hacked due to the use of default passwords, TechCrunch reports. From the report: A LogicMonitor spokesperson confirmed to TechCrunch that there's "a security incident" affecting some of the company's customers. "We are currently addressing a security incident that has affected a small number of our customers. We are in direct communication and working closely with those customers to take appropriate measures to mitigate impact," LogicMonitor's spokesperson Jesica Church said in a statement.

The incident is due to the fact that, until recently, LogicMonitor was assigning customers default -- and weak -- passwords such as "Welcome@" plus a short number, according to a source at a company that was impacted by the incident, and who asked to remain anonymous as they were not authorized to speak to the press.

Android

Russia Targets Ukraine With New Android Backdoor, Intel Agencies Say (arstechnica.com) 24

An anonymous reader quotes a report from Ars Technica: Russia's military intelligence unit has been targeting Ukrainian Android devices with "Infamous Chisel," the tracking name for new malware that's designed to backdoor devices and steal critical information, Western intelligence agencies said on Thursday. "Infamous Chisel is a collection of components which enable persistent access to an infected Android device over the Tor network, and which periodically collates and exfiltrates victim information from compromised devices," intelligence officials from the UK, US, Canada, Australia, and New Zealand wrote (PDF). "The information exfiltrated is a combination of system device information, commercial application information and applications specific to the Ukrainian military."

Infamous Chisel gains persistence by replacing the legitimate system component known as netd with a malicious version. Besides allowing Infamous Chisel to run each time a device is restarted, the malicious netd is also the main engine for the malware. It uses shell scripts and commands to collate and collect device information and also searches directories for files that have a predefined set of extensions. Depending on where on the infected device a collected file is located, netd sends it to Russian servers either immediately or once a day. When exfiltrating files of interest, Infamous Chisel uses the TLS protocol and a hard-coded IP and port. Use of the local IP address is likely a mechanism to relay the network traffic over a VPN or other secure channel configured on the infected device. This would allow the exfiltration traffic to blend in with expected encrypted network traffic. In the event a connection to the local IP and port fails, the malware falls back to a hard-coded domain that's resolved using a request to dns.google.

Infamous Chisel also installs a version of the Dropbear SSH client that can be used to remotely access a device. The version installed has authentication mechanisms that have been modified from the original version to change the way users log in to an SSH session. [...] The report didn't say how the malware gets installed. In the advisory Ukraine's security service issued earlier this month (PDF), officials said that Russian personnel had "captured Ukrainian tablets on the battlefield, pursuing the aim to spread malware and abuse available access to penetrate the system." It's unclear if this was the vector.

AI

AI Quadcopter 'Swift' Beats Top Human Drone Racers (gizmodo.com) 19

An autonomous, artificial-intelligence-powered drone called Swift has beaten humanity's best drone racers. "The AI-equipped drone, developed by researchers at the University of Zurich, came out on top in 15 out of 25 races and recorded the single fastest lap time," reports Gizmodo. The findings have been published in the journal Nature. From the report: Swift beat the humans in the niche but growing sport of first-person view drone racing. Human competitors navigate using a headset connected to a camera on their drones to pilot a quadcopter through complex obstacle courses at extreme speeds, with the goal of finishing the race with the fastest time and avoiding taking too much damage in the process. Drones in these races can top 50 miles per hour when they're really buzzing. The [video here] shows Swift battling it out against the human-controlled drones.

Swift emerged victorious in 15 out of the 25 total head-to-head races against the human pilots and clocked the fastest overall lap time at 17.47 seconds. That brisk lap time was nearly half a second better than the best human. The three human competitors, Alex Vanover, Thomas Bitmatta, and Marvin Schaepper, have each won drone racing championships in the past. In this case, the human competitors had a week to learn the new course and train for the race. During that same time, Swift was training as well but in a digitally simulated environment meant to resemble the course. Swift, according to the paper, used deep reinforcement learning while in the simulation along with additional data collected from the outside world.

During the actual race, Swift would take in video collected by its camera and send that to a neural network capable of identifying the gates it had to fly through. A combination of onboard sensors are then used to aid the drone with positioning, speed, and orientation. All of this happened autonomously, at extreme speeds. The researchers noticed some interesting differences in the ways Swift approached the course as opposed to its human competitors. The autonomous system, they noted, was more consistent across laps and appeared to take tighter turns. Those tight turns can add up and give a drone an edge in a race by repeatedly shaving off fractions of a second from lap times.

Communications

NASA Officials Sound Alarm Over Future of the Deep Space Network (arstechnica.com) 49

An anonymous reader quotes a report from Ars Technica: NASA officials sounded an alarm Tuesday about the agency's Deep Space Network, a collection of antennas in California, Spain, and Australia used to maintain contact with missions scattered across the Solar System. Everything from NASA's Artemis missions to the Moon to the Voyager probes in interstellar space rely on the Deep Space Network (DSN) to receive commands and transmit data back to Earth. Suzanne Dodd, who oversees the DSN in her position at NASA's Jet Propulsion Laboratory, likes to highlight the network's importance by showing gorgeous images from missions like the James Webb Space Telescope and the Perseverance rover on Mars. "All these images, and all these great visuals for the public, and all the science for the scientists come down through the Deep Space Network," Dodd said Tuesday in a meeting of the NASA Advisory Council's Science Committee.

But Dodd doesn't take a starry-eyed view of the challenges operating the Deep Space Network. She said there are currently around 40 missions that rely on the DSN's antennas to stay in communication with controllers and scientists back on Earth. Another 40-plus missions will join the roster over the next decade or so, and many of the 40 missions currently using time on the network will likely still be operating over that time. "We have more missions coming than we currently are flying," Dodd said. "We're nearly doubling the load on the DSN. A lot of those are either lunar exploration or Artemis missions, and a lot of Artemis precursor missions with commercial vendors. So the load is increasing, and it's very stressful to us." "It's oversubscribed, yet it's vital to anything the agency wants to do," she said.

Vint Cerf, an Internet pioneer who is now an executive at Google, sits on the committee Dodd met with Tuesday. After hearing from Dodd and other NASA managers, Cerf said: "The deep space communications system is in deep -- well, let me use a better word, deficit. There's a four-letter word that occurs to me, too." Because astronauts are involved, the Artemis missions will come with unique requirements on the DSN. "We're not going to have bits of data. We're going to have gigabits of data," said Philip Baldwin, acting director of the network services division at JPL. "I don't want 1080p for video resolution. I want 8K video." Each of the three stations on the Deep Space Network has a 70-meter (230-foot) dish antenna, the largest antennas in the world for deep space communications. Each location also has at least three 112-foot (34-meter) antennas. The oldest of the large antennas in California entered service in 1966, then was enlarged to its 70-meter diameter in 1988. "We have reached a really critical point on the DSN's aging infrastructure," said Sandra Cauffman, deputy director of NASA's astrophysics division.

Operating Systems

FreeBSD Can Now Boot in 25 Milliseconds (theregister.com) 77

Replacing a sort algorithm in the FreeBSD kernel has improved its boot speed by a factor of 100 or more... and although it's aimed at a micro-VM, the gains should benefit everyone. From a report: MicroVMs are a hot area of technology R&D in the last half decade or so. The core idea is a re-invention of some of concepts and technology that IBM invented along with the hypervisor in the 1960s: designing OSes specifically to run as guests under another OS. This means building the OS specifically to run inside a VM, and to talk to resources provided by a specific hypervisor rather than to fake hardware.

This means that the guest OS needs next to no support for real hardware, just VirtIO drivers which talk directly to facilities provided by the host hypervisor. In turn, the hypervisor doesn't have to provide an emulated PCI bus, emulated power management, emulated graphics card, emulated network interface cards, and so on. The result is that the hypervisor itself can be much smaller and simpler. The result of ruthlessly chopping down both the hypervisor, and the OS that runs inside it, is that both ends can be much smaller and simpler. That means that VMs can use much fewer resources, and start up much quicker.

The Almighty Buck

Visa, Mastercard Prepare To Raise Credit-Card Fees 225

Visa and Mastercard are planning to increase fees that many merchants pay when they accept customers' credit cards. From a report: The fee increases are scheduled to start in October and April, according to people familiar with the matter and documents viewed by The Wall Street Journal. Many of the increases are for online purchases. The changes could result in merchants paying an additional $502 million annually in fees, according to CMSPI, a consulting company that works with merchants.

Increases in network fees will make up a little more than half of that revenue, CMSPI estimated. The rest will come from increases in interchange fees, also called swipe fees. Merchants pay these fees when shoppers pay via credit card. The economy of interchange fees is largely hidden from shoppers. But the fees are a major source of contention between the card networks and merchants large and small, from giant online retailers to corner coffee shops. U.S. merchants paid an estimated $93 billion in Visa and Mastercard credit-card fees last year, according to the Nilson Report, an industry publication. That was up from about $33 billion in 2012. Merchants pass along at least some of that cost to consumers in the form of higher prices. More small businesses have started offering discounts to shoppers who pay by debit card, cash or check.
Piracy

Sports Leagues Ask US For 'Instantaneous' DMCA Takedowns and Website Blocking (arstechnica.com) 63

An anonymous reader quotes a report from Ars Technica: Sports leagues are urging the US to require "instantaneous" takedowns of pirated livestreams and new requirements for Internet service providers to block pirate websites. The Digital Millennium Copyright Act of 1998 requires websites to "expeditiously" remove infringing material upon being notified of its existence. But pirated livestreams of sports events often aren't taken down while the events are ongoing, said comments submitted last week by Ultimate Fighting Championship, the National Basketball Association, and National Football League.

The "DMCA does not define 'expeditiously,' and OSPs [online service providers] have exploited this ambiguity in the statutory language to delay removing content in response to takedown requests," the leagues told the US Patent and Trademark Office in response to a request for comments on addressing counterfeiting and piracy. The leagues urged the US "to establish that, in the case of live content, the requirement to 'expeditiously' remove infringing content means that content must be removed 'instantaneously or near-instantaneously' in response to a takedown request." The leagues claimed the change "would be a relatively modest and non-controversial update to the DMCA that could be included in the broader reforms being considered by Congress or could be addressed separately." They also want stricter "verification measures before a user is permitted to livestream."

The UFC separately submitted comments on its own, urging the US to require that ISPs block pirate sites. The UFC said that a "significant and growing" number of websites, typically operated from outside the US, don't respond to takedown requests and thus should be blocked by broadband network operators. The UFC wrote: "Unlike many other jurisdictions around the world, the US lacks a 'site-blocking' regime whereby copyright owners may obtain no-fault injunctions requiring domestic Internet service providers to block websites that are primarily geared at infringing activity. A 'site-blocking' regime, with appropriate safeguards to prevent abuse, would substantially facilitate all copyright owners' ability to address piracy, including UFC's." Website-blocking is bound to be a controversial topic, although the Federal Communications Commission's now-repeated net neutrality rules only prohibited blocking of "lawful Internet traffic." While the UFC said it just wants "websites that are primarily geared at infringing activity" to be blocked, a site-blocking regime could be used more expansively if there aren't strict limits.

Security

FBI Dismantles a Malware System That Took Millions in Ransom (bloomberg.com) 19

The FBI said Tuesday that it has taken down a network of hacked devices responsible for extorting tens of millions of dollars from victims around the world. From a report: US officials described the network known as Qakbot as one of the most notorious "botnets" in the world, referring to computer networks that have been infected with malicious software so that they can be controlled remotely without the owner's knowledge -- often to send phishing emails. These emails can in turn be used to hack into victims' computer systems, which attackers will hold for ransom.

Qakbot was instrumental in enabling cyberattacks against businesses and critical services around the world, according to US officials, including hits on the San Bernardino County Sheriff's Department and hospitals run by Prospect Medical Group. The latter resulted in the closure of emergency rooms and medical facilities across the US. US officials estimated that, since its creation in 2008, Qakbot had infected around 200,000 computers in the US and 700,000 globally.

Google

Google DeepMind Launches Watermarking Tool For AI-Generated Images (technologyreview.com) 16

Google DeepMind has launched a new watermarking tool that labels whether images have been generated with AI. From a report: The tool, called SynthID, will initially be available only to users of Google's AI image generator Imagen, which is hosted on Google Cloud's machine learning platform Vertex. Users will be able to generate images using Imagen and then choose whether to add a watermark or not. The hope is that it could help people tell when AI-generated content is being passed off as real, or help protect copyright. [...] Traditionally images have been watermarked by adding a visible overlay onto them, or adding information into their metadata. But this method is "brittle" and the watermark can be lost when images are cropped, resized, or edited, says Pushmeet Kohli, vice president of research at Google DeepMind.

SynthID is created using two neural networks. One takes the original image and produces another image that looks almost identical to it, but with some pixels subtly modified. This creates an embedded pattern that is invisible to the human eye. The second neural network can spot the pattern and will tell users whether it detects a watermark, suspects the image has a watermark, or finds that it doesn't have a watermark. Kohli said SynthID is designed in a way that means the watermark can still be detected even if the image is screenshotted or edited -- for example, by rotating or resizing it.

AI

Does 'Coning' Self-Driving Cars Protest Tech Industry Impacts? (npr.org) 145

In July "Safe Street Rebels" launched the "Week of Cone" pranks (which went viral on TikTok and Twitter). TechCrunch called it "a bid to raise awareness and invite more pissed-off San Franciscans to submit public comments" to regulatory agencies.

But NPR sees a larger context: Coning driverless cars fits in line with a long history of protests against the impact of the tech industry on San Francisco. Throughout the years, activists have blockaded Google's private commuter buses from picking up employees in the city. And when scooter companies flooded the sidewalks with electric scooters, people threw them into San Francisco Bay. "Then there was the burning of Lime scooters in front of a Google bus," says Manissa Maharawal, an assistant professor at American University who has studied these protests.

She points out that when tech companies test their products in the city, residents don't have much say in those decisions: "There's been various iterations of this where it's like, 'Oh, yep, let's try that out in San Francisco again,' with very little input from anyone who lives here...." Waymo is already giving rides in Phoenix and is testing with human safety drivers in Los Angeles and Austin. And Cruise is offering rides in Phoenix and Austin and testing in Dallas, Houston, Miami, Nashville and Charlotte.

Meanwhile, in San Francisco, members of Safe Street Rebel continue to go out at night and stalk the vehicles one cone at a time.

They're apparently bicycling activists, judging by their web site, advocating "for car-free spaces, transit equity, and the end of car dominance." ("We regularly protest the city's thoughtless reopening of the Upper Great Highway to cars by slowing traffic to show just how unnecessary of a route this road is.") Their long-term goal is to expand the group "to the point where we can make a city for people to safely walk, bike and take public transit, not a city dominated by cars..." The last half-century has been a failed experiment with car dominance. They bankrupt our cities, ruin our environment, and force working people to sacrifice an unacceptable amount of their income to pay for basic transpiration. It is time to end car dependence and rethink our streets around public transit, walking and bikes.
Their demands include unredacted data from self-driving car companies about safety incidents (and a better reporting system) — plus a mechanism for actually citing robotaxis for traffic violations. But they also raise concerns about surveillance, noting the possibility of "a city-wide, moving network observing and analyzing everything."

Their web page says they also want to see studies on the pollution impact of self-driving cars — and whether or not AVs will increase car usage. They support the concerns of San Francisco's Taxi Workers Alliance about the possibility of lost jobs and increased traffic congestion.

And they raise one more concern: Their cars are not wheelchair accessible and do not pull up to the curb. Profit-driven robotaxi companies see accessibility as an afterthought. Without enforcement, their promises for the future will likely never materialize. Paratransit and transit are accountable to the public, but Cruise and Waymo are only accountable to shareholders.
But their list of concerns is followed by an exhaustive list of 266 robotaxi incidents documented with links to news articles and social media reports. ("The cars have run red lights, rear-ended a bus and blocked crosswalks and bike paths," writes NPR. "In one incident, dozens of confused cars congregated in a residential cul-de-sac, clogging the street. In another, a Waymo ran over and killed a dog.")

NPR's article adds one final note. "Neither Cruise nor Waymo responded to questions about why the cars can be disabled by traffic cones."

Thanks to Slashdot reader Tony Isaac for sharing the news.
AI

California Firefighters Are Training AI To Detect Wildfires (nytimes.com) 13

Firefighters are training a robot to scan the horizon for fires. It turns out a lot of things look like smoke. From a report: For years, firefighters in California have relied on a vast network of more than 1,000 mountaintop cameras to detect wildfires. Operators have stared into computer screens around the clock looking for wisps of smoke. This summer, with wildfire season well underway, California's main firefighting agency is trying a new approach: training an artificial intelligence program to do the work. The idea is to harness one of the state's great strengths -- expertise in A.I. -- and deploy it to prevent small fires from becoming the kinds of conflagrations that have killed scores of residents and destroyed thousands of homes in California over the past decade.

Officials involved in the pilot program say they are happy with early results. Around 40 percent of the time, the artificial intelligence software was able to alert firefighters of the presence of smoke before dispatch centers received 911 calls. "It has absolutely improved response times," said Phillip SeLegue, the staff chief of intelligence for the California Department of Forestry and Fire Protection, the state's main firefighting agency better known as Cal Fire. In about two dozen cases, Mr. SeLegue said, the A.I. identified fires that the agency never received 911 calls for. The fires were extinguished when they were still small and manageable.

After an exceptionally wet winter, California's fire season has not been as destructive -- so far -- as in previous years. Cal Fire counts 4,792 wildfires so far this year, lower than the five-year average of 5,422 for this time of year. Perhaps more important, the number of acres burned this year has been only one-fifth of the five-year average of 812,068 acres. The A.I. pilot program, which began in late June and covered six of Cal Fire's command centers, will be rolled out to all 21 command centers starting in September. But the program's apparent success comes with caveats. The system can detect fires only visible to the cameras. And at this stage, humans are still needed to make sure the A.I. program is properly identifying smoke. Engineers for the company that created the software, DigitalPath, based in Chico, Calif., are monitoring the system day and night, and manually vetting every incident that the A.I. identifies as fire.

Slashdot Top Deals