********** ENTERTAINMENT **********
return to top
Elliot Page on Juno, Hollywood’s dark side and coming out twice
Sat, 10 Jun 2023 06:00:14 GMT
When the feelgood movie made him an Oscar-nominated star, the strain of hiding who he was almost forced him to quit acting. He explains how opening up about being gay, then trans, saved his life
Elliot Page’s memoir is called Pageboy. At its heart is the story of his transitioning from an Oscar-nominated actress, best known for the wonderful coming-of-age comedy drama Juno, to one of the world’s most high profile trans men. He writes, rather beautifully, about gender dysphoria, top surgery and finally finding himself. But the book is so much more than a tale of transition.
Pageboy is a modern-day Hollywood Babylon, written by a sensitive soul rather than a scandalmonger. Page depicts a film industry even more rancid than we may have suspected. This is a world where it’s not only the Harvey Weinsteins at the top of the pyramid who get to abuse the young and powerless – just about everybody seems to have a go. It’s a world where most people appear to be closeted in one way or another, a world where more acting is done off set than on.Continue reading...
No one wants to see the cast naked any more, so this TV follow-up shuns stripping for comic capers and cost-of-living tragedy. Even better, it actually gives plotlines to the female characters
Television shows that remake films tend to be exercises in pointless nostalgia. Do you remember the movies Fatal Attraction, Dangerous Liaisons and American Gigolo? Yes. Would you like to watch a weird cosplay version of them that goes on for 10 hours and confusingly reshuffles the plot? Um, not really. The Full Monty (from 14 June, Disney+) is the latest entrant in an already tired genre, but it has one up on most of the competition: all the core cast are in that sweet spot where they’re successful enough to be worth rehiring but not so famous they’ve turned the reboot down. That means there’s no need to rejig the story of redundant Sheffield steelworkers who, in 1997, found solace in hard times by forming a Chippendales-style male striptease troupe. We simply return to Sheffield 26 years later, to find the same characters, played by the same actors, living the same lives.
The film had it easy, plot-wise, in that it built towards that heartwarming climactic moment when a sextet of men showed the local community their penises. Those six appendages were the pegs on which were hung serious subtexts about the misery of life in a Thatcher-ravaged, deindustrialised northern England. A quarter of a century on, however, the prospect of the old boys windmilling their hosepipes in housewives’ faces would horrify everyone. So the new Full Monty is fully clothes-on.Continue reading...
Animation has come a long way since 1900, when J. Stuart Blackton created The Enchanted Drawing, the earliest known animated film. The 90-second movie was created using stop-motion techniques, as flat characters, props, and backgrounds were drawn on an easel or made from paper.
Most modern animators rely on computer graphics and visualization techniques to create popular movies and TV shows like Finding Dory, Toy Story, and Paw Patrol. In the 1960s and ’70s, computer science pioneers David Evans and IEEE Life Member Ivan E. Sutherland led the development of many of the technologies animators now use. Their groundbreaking research, conducted at the University of Utah, in Salt Lake City, and at their company, Evans and Sutherland, helped jump-start the computer graphics industry.
A ceremony was held at the university on 24 March to recognize the computer graphics and visualization techniques with an IEEE Milestone. The IEEE Utah Section sponsored the nomination.
Computer graphics began in the 1950s with interactive games and visualization tools designed by the U.S. military to develop technologies for aviation, radar, and rocketry.
Evans and Sutherland, then computer science professors at the University of Utah, wanted to expand on the use of such tools by finding a way for computers to simulate objects and environments. In 1968 they founded Evans and Sutherland, locating the E&S headquarters in the university’s research park.
Many of today’s computer graphics luminaries—including Pixar cofounder Edwin Catmull, Adobe cofounder John Warnock, and Netscape founder Jim Clark, who also founded Silicon Graphics—got their start in the industry as E&S employees or as doctoral students working on research at the company’s facilities.
IEEE Milestone Dedication: Utah Computer Graphics youtu.be
While at E&S, the employees and students made fundamental contributions to computer graphics processes, says IEEE Fellow Christopher Johnson, a University of Utah computer science professor.
“David Evans, Ivan Sutherland, and their students and colleagues helped change the world,” Johnson says.
“The period from 1968 through 1978 was an extraordinary time for computer graphics,” adds Brian Berg, IEEE Region 6 history chair. “There was a rare confluence of faculty, students, staff, facilities, and resources to support research into computer vision algorithms and hardware that produced remarkable developments in computer graphics and visualization techniques. This research was responsible for the birth of much of continuous-tone computer graphics as we know it today.” Continuous-tone computer graphics have a virtually unlimited range of color and shades of gray.
Evans began his career in 1955 at Bendix—an aviation electronics company in Avon, Ohio—as manager of a project that aimed to develop an early personal computer. He left to join the University of California, Berkeley, as chair of its computer science department. He also headed Berkeley’s research for the Pentagon’s Advanced Research Project Agency (now known as the Defense Advanced Research Projects Agency).
In 1963 Evans became a principal investigator for ARPA’s Project Genie. He helped develop hardware techniques that enabled commercial use of time-shared computer systems.
In 1965 the University of Utah hired him to establish its computer science department after receiving an ARPA grant of US $5 million to investigate how the emerging field of computer graphics could play a role in the country’s technological competitiveness, according to Computer Graphics and Computer Animation.
In 1968 Evans asked Sutherland, a former colleague at Berkeley who was then an associate professor of electrical engineering at Harvard, to join him at the University of Utah, luring him with the promise of starting a company together. Sutherland was already famous in computer graphics circles, having created Sketchpad, the first computer-aided design program, for his Ph.D. thesis in 1963 at MIT.
The two founded E&S almost as soon as Sutherland arrived, and they began working on computer-based simulation systems.
The duo in 1969 developed the line-drawing system displays LDS-1 and LDS-2, the first graphics devices with a processing unit. They then built the E&S Picture System—the next generation of LDS displays.
Those workstations, as they were called, came to be used by most computer-generated-imagery production companies through the 1980s.
E&S also developed computer-based simulation systems for military and commercial training, including the CT5 and CT6 flight simulators.
In addition to hiring employees, E&S welcomed computer science doctoral students from the university to work on their research projects at the company.
“Almost every influential person in the modern computer-graphics community either passed through the University of Utah or came into contact with it in some way,” Robert Rivlin wrote in his book, The Algorithmic Image: Graphic Visions of the Computer Age.
One of the doctoral students was Henri Gouraud, who in 1971 developed an algorithm to simulate the differing effects of light and color across the surface of an object. The Gouraud shading method is still used by creators of video games and cartoons.
In 1974 Edwin Catmull, then also a doctoral student at the university, developed the principle of texture mapping, a method for adding complexity to a computer-generated surface. Catmull went on to help found Pixar in 1986 with computer scientist Alvy Ray Smith, an IEEE member. For his work in the industry, Catmull received the 2006 IEEE John von Neumann Medal.
Doctoral student Bui Tuong Phong in 1973 devised Phong shading, a modeling method that reflects light so computer-generated graphics can look shiny and plasticlike.
“As a group, the University of Utah contributed more to the field of knowledge in computer graphics than any of its contemporaries,” Berg wrote in the Milestone proposal. “That fact is made most apparent both in the widespread use of the techniques developed and in the body of awards the innovations garnered.” The awards include several scientific and technical Oscars, an Emmy, and many IEEE medals.
Administered by the IEEE History Center and supported by donors, the Milestone program recognizes outstanding technical developments around the world.
The Milestone plaque displayed on a granite obelisk outside of the University of Utah’s Merrill engineering building reads:
In 1965 the University of Utah established a Center of Excellence for computer graphics research with Advanced Research Projects Agency (ARPA) funding. In 1968 two professors founded the pioneering graphics hardware company Evans & Sutherland; by 1978, fundamental rendering and visualization techniques disclosed in doctoral dissertations included the Warnock algorithm, Gouraud shading, the Catmull-Rom spline, and the Blinn-Phong reflection model. Alumni-founded companies include Atari, Silicon Graphics, Adobe, Pixar, and Netscape.
A group of researchers from NASA, MIT, and other institutions have achieved the fastest space-to-ground laser-communication link yet, doubling the record they set last year. With data rates of 200 gigabits per second, a satellite could transmit more than 2 terabytes of data—roughly as much as 1,000 high-definition movies—in a single 5-minute pass over a ground station.
“The implications are far-reaching because, put simply, more data means more discoveries,” says Jason Mitchell, an aerospace engineer at NASA’s Space Communications and Navigation program.
The new communications link was made possible with the TeraByte InfraRed Delivery (TBIRD) system orbiting about 530 kilometers above Earth’s surface. Launched into space last May, TBIRD achieved downlink rates of up to 100 Gb/s with a ground-based receiver in California by last June. This was 100 times as fast as the quickest Internet speeds in most cities, and more than 1,000 times as fast as radio links traditionally used for communications with satellites.
The fastest data networks on Earth typically rely on laser communications over fiber optics. However, a high-speed laser-based Internet does not exist yet for satellites. Instead, space agencies and commercial satellite operators most commonly use radio to communicate with objects in space. The infrared light that laser communications can employ has a much higher frequency than radio waves, enabling much higher data rates.
“There are satellites currently in orbit limited by the amount of data they are able to downlink, and this trend will only increase as more capable satellites are launched,” says Kat Riesing, an aerospace engineer and a staff member at MIT Lincoln Laboratory on the TBIRD team. “Even a hyperspectral imager—HISUI on the International Space Station—has to send data back to Earth via storage drives on cargo ships due to limitations on downlink rates. TBIRD is a big enabler for missions that collect important data on Earth’s climate and resources, as well as astrophysics applications such as black hole imaging.”
MIT Lincoln Laboratory conceived TBIRD in 2014 as a low-cost, high-speed way to access data on spacecraft. A key way it reduced expenses was by using commercial, off-the-shelf components originally developed for terrestrial use. These include high-rate optical modems developed for fiber telecommunications and high-speed large-volume storage to hold data, Riesing says.
Located onboard NASA’s Pathfinder Technology Demonstrator 3 (PTD-3) satellite, TBIRD was carried into orbit on SpaceX’s Transporter-5 rideshare mission from Cape Canaveral Space Force Station in Florida on 25 May 2022. The PTD-3 satellite is a roughly 12-kilogram CubeSat about the size of two stacked cereal boxes, and its TBIRD payload is no larger than the average tissue box. “Industry’s drive to small, low-power, high-data-rate optical transceivers enabled us to achieve a compact form factor suitable even for small satellites,” Mitchell says.
“There are satellites currently in orbit limited by the amount of data they are able to downlink, and this trend will only increase as more-capable satellites are launched.” —Kat Riesing, aerospace engineer, MIT Lincoln Laboratory
The development of TBIRD faced a number of challenges. To start with, terrestrial components are not designed to survive the rigors of launching to and operating in space. For example, during a thermal test simulating the extreme temperatures the devices might face in space, the fibers in the optical signal amplifier melted.
The problem was that, when used as originally intended, the atmosphere could help cool the amplifier through convection. When tested in a vacuum, simulating space, the heat that the amplifier generated was trapped. To solve the issue, the researchers worked with the amplifier’s vendor to modify it so that it released heat through conduction instead.
In addition, laser beams from space to Earth can experience distortion from atmospheric effects and weather conditions. This can cause power loss, and in turn data loss, for the beams.
To compensate, the scientists developed their own version of automatic repeat request (ARQ), a protocol for controlling errors in data transmission over a communications link. In this arrangement, the ground terminal uses a low-rate uplink signal to let the satellite know that it has to retransmit any block of data, or frame, that has been lost or damaged. The new protocol lets the ground station tell the satellite which frames it received correctly, so the satellite knows which ones to retransmit and not waste time sending data it doesn’t have to.
Another challenge the scientists faced stemmed from how lasers form in much narrower beams than radio transmissions. For successful data transmission, these beams must be aimed precisely at their receivers. This is often accomplished by mounting the laser on a gimbal. Due to TBIRD’s small size, however, it instead maneuvers the CubeSat carrying it to point it at the ground, using any error signals it receives to correct the satellite’s orientation. This gimbal-less strategy also helped further shrink TBIRD, making it cheaper to launch.
TBIRD’s architecture can support multiple channels through wavelength separation to enable higher data rates, Riesing says. This is how TBIRD accomplished a 200-Gb/s downlink on 28 April—by using two 100-Gb/s channels, she explains. “This can scale further on a future mission if the link is designed to support it,” Riesing notes.
“Put simply, more data means more discoveries.” —Jason Mitchell, aerospace engineer, NASA
The research team’s next step is to explore where to apply this technology in upcoming missions. “This technology is particularly useful for science missions where collecting a lot of data can provide significant benefits,” Riesing says. “One mission concept that is enabled by this is the Event Horizon Explorer mission, which will extend the exciting work of the Event Horizon Telescope in imaging black holes with even higher resolution.”
The scientists also want to explore how to extend this technology to different scenarios, such as geostationary orbit, Riesing says. Moreover, Mitchell says, they are looking at ways to push TBIRD’s capabilities as far away as the moon, in order to support future missions there. The rates under consideration are in the 1- to 5-Gb/s range, which “may not seem like much of an improvement, but remember the moon is roughly 400,000 km away from Earth, which is quite a long distance to cover,” Mitchell says.
The new technology may also find use in high-speed atmospheric data links on the ground. “For example, from building to building, or across inhospitable terrain, such as from mountaintop to mountaintop, where the cost of laying fiber systems could be exorbitant,” Riesing says.
On a gin-clear December day, I’m sitting under the plexiglass bubble of a radically new kind of aircraft. It’s a little past noon at the Byron Airport in northern California; in the distance, a jagged line of wind turbines atop rolling hills marks the Altamont Pass, blades spinning lazily. Above me, a cloudless blue sky beckons.
The aircraft, called BlackFly, is unlike anything else on the planet. Built by a Palo Alto, Calif., startup called Opener, it’s an electric vertical take-off and landing (eVTOL) aircraft with stubby wings fore and aft of the pilot, each with four motors and propellers. Visually, it’s as though an aerial speedster from a 1930s pulp sci-fi story has sprung from the page.
There are a couple of hundred startups designing or flying eVTOLs. But only a dozen or so are making tiny, technologically sophisticated machines whose primary purpose is to provide exhilarating but safe flying experiences to people after relatively minimal training. And in that group, Opener has jumped out to an early lead, having built dozens of aircraft at its facilities in Palo Alto and trained more than a score of people to fly them.
My own route to the cockpit of a BlackFly was relatively straightforward. I contacted the company’s CEO, Ken Karklin, in September 2022, pitched him on the idea of a story and video, and three months later I was flying one of his aircraft.
Well, sort of flying it. My brief flight was so highly automated that I was more passenger than pilot. Nevertheless, I spent about a day and a half before the flight being trained to fly the machine manually, so that I could take control if anything went wrong. For this training, I wore a virtual-reality headset and sat in a chair that tilted and gyrated to simulate flying maneuvers. To “fly” this simulation I manipulated a joystick that was identical to the one in the cockpit of a BlackFly. Opener’s chief operating officer, Kristina L. Menton, and engineer Wyatt Warner took turns patiently explaining the operations of the vehicle and giving me challenging tasks to complete, such as hovering and performing virtual landings in a vicious crosswind.
The BlackFly is entirely controlled by that joystick, which is equipped with a trigger and also topped by a thumb switch. To take off, I squeeze the trigger while simultaneously pushing forward on the switch. The machine leaps into the air with the sound of a million bees, and with a surge of giddy elation I am climbing skyward.
Much more so than an airplane or helicopter, the BlackFly taps into archetypal human yearnings for flight, the kind represented by magic carpets, the flying cars in “The Jetsons,” and even those Mountain Banshees in the movie “Avatar.” I’ve had several unusual experiences in aircraft, including flying on NASA’s zero-gravity-simulating “Vomit Comet,” and being whisked around in a BlackFly was definitely the most absorbing and delightful. Gazing out over the Altamont Pass from an altitude of about 60 meters, I had a feeling of joyous release—from Earth’s gravity and from earthly troubles.
For technical details about the BlackFly and to learn more about its origin, go here.
The BlackFly is also a likely harbinger of things to come. Most of the startups developing eVTOLs are building vehicles meant to carry several passengers on commercial runs of less than 50 kilometers. Although the plan is for these to be flown by pilots initially, most of the companies anticipate a day when the flights will be completely automated. So specialized aircraft such as the BlackFly—designed to be registered and operated as “ultralight” aircraft under aviation regulations—could provide mountains of invaluable data on highly and fully automated flying and perhaps even help familiarize people with the idea of flying without a pilot. Indeed, during my flight, dozens of sensors gathered gigabytes of data, to add to the large reservoir Opener has already collected during many hundreds of test flights so far.
As of late February 2023, Opener hadn’t yet announced a retail price or an official commercial release date for the aircraft, which has been under development and testing for more than a decade. I’ll be keeping an eye out for further news of the company. Long after my flight was over I was still savoring the experience, and hoping for another one.
Special thanks to IEEE.tv for collaborating on production of this video.
Non-fungible tokens (NFTs) are the most popular digital assets today, capturing the attention of cryptocurrency investors, whales and people from around the world. People find it amazing that some users spend thousands or millions of dollars on a single NFT-based image of a monkey or other token, but you can simply take a screenshot for free. So here we share some freuently asked question about NFTs.
NFT stands for non-fungible token, which is a cryptographic token on a blockchain with unique identification codes that distinguish it from other tokens. NFTs are unique and not interchangeable, which means no two NFTs are the same. NFTs can be a unique artwork, GIF, Images, videos, Audio album. in-game items, collectibles etc.
A blockchain is a distributed digital ledger that allows for the secure storage of data. By recording any kind of information—such as bank account transactions, the ownership of Non-Fungible Tokens (NFTs), or Decentralized Finance (DeFi) smart contracts—in one place, and distributing it to many different computers, blockchains ensure that data can’t be manipulated without everyone in the system being aware.
The value of an NFT comes from its ability to be traded freely and securely on the blockchain, which is not possible with other current digital ownership solutionsThe NFT points to its location on the blockchain, but doesn’t necessarily contain the digital property. For example, if you replace one bitcoin with another, you will still have the same thing. If you buy a non-fungible item, such as a movie ticket, it is impossible to replace it with any other movie ticket because each ticket is unique to a specific time and place.
One of the unique characteristics of non-fungible tokens (NFTs) is that they can be tokenised to create a digital certificate of ownership that can be bought, sold and traded on the blockchain.
As with crypto-currency, records of who owns what are stored on a ledger that is maintained by thousands of computers around the world. These records can’t be forged because the whole system operates on an open-source network.
NFTs also contain smart contracts—small computer programs that run on the blockchain—that give the artist, for example, a cut of any future sale of the token.
Non-fungible tokens (NFTs) aren't cryptocurrencies, but they do use blockchain technology. Many NFTs are based on Ethereum, where the blockchain serves as a ledger for all the transactions related to said NFT and the properties it represents.5) How to make an NFT?
Anyone can create an NFT. All you need is a digital wallet, some ethereum tokens and a connection to an NFT marketplace where you’ll be able to upload and sell your creations
When you purchase a stock in NFT, that purchase is recorded on the blockchain—the bitcoin ledger of transactions—and that entry acts as your proof of ownership.
The value of an NFT varies a lot based on the digital asset up for grabs. People use NFTs to trade and sell digital art, so when creating an NFT, you should consider the popularity of your digital artwork along with historical statistics.
In the year 2021, a digital artist called Pak created an artwork called The Merge. It was sold on the Nifty Gateway NFT market for $91.8 million.
Non-fungible tokens can be used in investment opportunities. One can purchase an NFT and resell it at a profit. Certain NFT marketplaces let sellers of NFTs keep a percentage of the profits from sales of the assets they create.
Many people want to buy NFTs because it lets them support the arts and own something cool from their favorite musicians, brands, and celebrities. NFTs also give artists an opportunity to program in continual royalties if someone buys their work. Galleries see this as a way to reach new buyers interested in art.
There are many places to buy digital assets, like opensea and their policies vary. On top shot, for instance, you sign up for a waitlist that can be thousands of people long. When a digital asset goes on sale, you are occasionally chosen to purchase it.
To mint an NFT token, you must pay some amount of gas fee to process the transaction on the Etherum blockchain, but you can mint your NFT on a different blockchain called Polygon to avoid paying gas fees. This option is available on OpenSea and this simply denotes that your NFT will only be able to trade using Polygon's blockchain and not Etherum's blockchain. Mintable allows you to mint NFTs for free without paying any gas fees.
The answer is no. Non-Fungible Tokens are minted on the blockchain using cryptocurrencies such as Etherum, Solana, Polygon, and so on. Once a Non-Fungible Token is minted, the transaction is recorded on the blockchain and the contract or license is awarded to whoever has that Non-Fungible Token in their wallet.
You can sell your work and creations by attaching a license to it on the blockchain, where its ownership can be transferred. This lets you get exposure without losing full ownership of your work. Some of the most successful projects include Cryptopunks, Bored Ape Yatch Club NFTs, SandBox, World of Women and so on. These NFT projects have gained popularity globally and are owned by celebrities and other successful entrepreneurs. Owning one of these NFTs gives you an automatic ticket to exclusive business meetings and life-changing connections.
That’s a wrap. Hope you guys found this article enlightening. I just answer some question with my limited knowledge about NFTs. If you have any questions or suggestions, feel free to drop them in the comment section below. Also I have a question for you, Is bitcoin an NFTs? let me know in The comment section below
Donald Trump’s latest charges are just the beginning of his legal woes, but Republicans are standing by their man.
The post How Many Indictments Does It Take to Bring Down a Cult Leader? appeared first on The Intercept.
Indictment accuses former president of risking national security, foreign relations, safety of US military and intelligence gathering
The US senate judiciary committee chairman, Dick Durbin, has said the investigation led by special counsel Jack Smith should be allowed to continue “without interference”.
In a statement on Friday, Durbin added that Donald Trump “should be afforded the due process protections that he is guaranteed by our constitution, just like any other American”.
I think before the sun sets today, the attorney general of the United States should be standing in front of the American people, should unseal this indictment, should provide the American people with all the facts and information here.
And the American people be able to judge for themselves whether this is just the latest incident of weaponization and politicization at the justice department or it’s something different.Continue reading...
Shares of 3M Co. MMM dropped 1.2% in afternoon trading Friday, after the maker of Post-it Notes, Scotch Tape and N95 facemasks said the Indiana bankruptcy court dismissed the bankruptcy filing of subsidiary Aearo Technologies, which made the Combat Arms earplugs that allegedly resulted in hear loss and tinnitus. Aearo, which 3M acquired in 2008, had filed for bankruptcy in July 2022 to establish a trust to resolve all claims, which could be in the billions of dollars, but lawyers for the plaintiffs filed to dismiss the bankruptcy, calling it “contrived.” On Friday, 3M and Aearo said they will pursue an appeal of the dismissal ruling, and will continue to defend the product in litigation. Bryan Aylstock, the lead plaintiffs’ counsel, said in an emailed statement to MarketWatch: “Judge Graham’s ruling rightly repudiates 3M’s cowardly attempt to delay justice for the hundreds of thousands of veterans harmed by the company’s dangerously defective earplugs. This gambit by 3M was a gross misuse of the bankruptcy courts, and we are pleased Judge Graham rightly dismissed it.” 3M’s stock has shed 17.0% year to date, to make it the worst performer in the Dow Jones Industrial Average DJIA this year.
Market Pulse Stories are Rapid-fire, short news bursts on stocks and markets as they move. Visit MarketWatch.com for more information on this news.
Trauma experienced by staff at Nairobi Facebook hub recognised in legal ruling that may have global implications
Meta has been ordered to “provide proper medical, psychiatric and psychological care” to a group of moderators in Nairobi following a ruling in a Kenyan employment court that heard harrowing testimony about the distressing nature of their work.
The instruction by judge Byram Ongaya formed part of a broader interim ruling that saw the moderators’ jobs restored after they sued Meta in March for what they termed a “sham” mass redundancy.Continue reading...
Whether to pardon January 6 convicts will be the most revealing question of the Republican primary.
The post Oath Keepers Leader Stewart Rhodes Says He’s a Political Prisoner. Republicans Are Listening. appeared first on The Intercept.
The fight could influence whether Georgia stays blue in 2024’s Senate and presidential races.
The post No One Believes in Cop City. So Why Did Atlanta’s City Council Fund It? appeared first on The Intercept.
In an interview with The Intercept, the ousted Pakistani prime minister, just released from arrest, accuses the country’s military of deepening a political crisis.
The post Imran Khan: U.S. Was Manipulated by Pakistan Military Into Backing Overthrow appeared first on The Intercept.
Opposition leaders have begun to plan for the end of the regime – and some believe it is now inevitable
Is Russia about to experience a period of dramatic political change? If so, can exiled democratic forces unite into a coherent bloc, and is there any way for them to force themselves on to the political scene?
Nearly 300 exiled Russian opposition politicians and activists gathered to discuss these questions in the European parliament earlier this week, the congress coming as news broke of the Nova Kakhovka dam destruction, the latest grim episode in Vladimir Putin’s war on Ukraine.Continue reading...
Agatha Christie explains why Donald Trump is the first president to be indicted.
The post Trump’s Mistake Was Committing Small Crimes by Himself appeared first on The Intercept.
| submitted by /u/Global_Informant |
Britain’s health is a national scandal, not just because of the state of the NHS, but because the government refuses to take action on our diets
In April 1994, the CEOs of the US’s seven biggest tobacco companies swore on oath before a Senate committee that nicotine was “not addictive”. At the time it was estimated that 3,000 American children were being induced by said companies to start smoking every day.
Last Monday, the BBC’s Panorama programme came close to repeating that scene with Britain’s food manufacturers. The products at issue are ultra-processed foods (UPF). Their makers’ denial of the harm these products may cause is as adamant as those tobacco execs’ once was, and the consequences could be equally lethal.
Simon Jenkins is a Guardian columnistContinue reading...
A prominent set of progressive leaders are coming to the defense of Colombia’s Gustavo Petro, whose administration is facing a cascading series of struggles.
The post Group of Global Leftist Leaders Warns “Soft Coup” Is Underway in Colombia appeared first on The Intercept.
A growing number of countries are preparing to shift from using the U.S. dollar in trade, which could undermine the greenback’s global supremacy.
The post Monetary Blowback: How U.S. Wars, Sanctions, and Hegemony Are Threatening the Dollar’s Reserve Currency Dominance appeared first on The Intercept.
In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. But I had a more personal involvement as well.
I wrote the essay below in September 2013. The New Yorker agreed to publish it, but the Guardian asked me not to. It was scared of UK law enforcement, and worried that this essay would reflect badly on it. And given that the UK police would raid its offices in July 2014, it had legitimate cause to be worried.
Now, ten years later, I offer this as a time capsule of what those early months of Snowden were like...
The definition conflates criticism of Israel with antisemitism. A new report details how it’s been used to justify punitive action against Palestine advocates in Europe.
The post Biden Embraces Antisemitism Definition That Has Upended Free Speech in Europe appeared first on The Intercept.
Democrats and Republicans have previously joined hands to support the invasion of Iraq, huge corporate tax cuts, and more.
The post The Debt Limit Bill: Yet Another Triumph for Bipartisanship appeared first on The Intercept.
A raft of states are looking to restrict property purchases by citizens of U.S. adversaries like China and Iran. Democrats in Washington are pushing back.
The post U.S. Lawmakers Seek to Preempt State-Level Bans on Foreigners Buying Property appeared first on The Intercept.
Political messaging expert Anat Shenker-Osorio breaks down the art of reframing the debate for progressives to win.
The post A Dmitri Rebuttal by Messaging Expert Anat Shenker-Osorio appeared first on The Intercept.
First-year college students are understandably frustrated when they can’t get into popular upper-level electives. But they usually just gripe. Paras Jha was an exception. Enraged that upper-class students were given priority to enroll in a computer-science elective at Rutgers, the State University of New Jersey, Paras decided to crash the registration website so that no one could enroll.
On Wednesday night, 19 November 2014, at 10:00 p.m. EST—as the registration period for first-year students in spring courses had just opened—Paras launched his first distributed denial-of-service (DDoS) attack. He had assembled an army of some 40,000 bots, primarily in Eastern Europe and China, and unleashed them on the Rutgers central authentication server. The botnet sent thousands of fraudulent requests to authenticate, overloading the server. Paras’s classmates could not get through to register.
The next semester Paras tried again. On 4 March 2015, he sent an email to the campus newspaper, The Daily Targum: “A while back you had an article that talked about the DDoS attacks on Rutgers. I’m the one who attacked the network.… I will be attacking the network once again at 8:15 pm EST.” Paras followed through on his threat, knocking the Rutgers network offline at precisely 8:15 p.m.
On 27 March, Paras unleashed another assault on Rutgers. This attack lasted four days and brought campus life to a standstill. Fifty thousand students, faculty, and staff had no computer access from campus.
On 29 April, Paras posted a message on Pastebin, a website popular with hackers for sending anonymous messages. “The Rutgers IT department is a joke,” he taunted. “This is the third time I have launched DDoS attacks against Rutgers, and every single time, the Rutgers infrastructure crumpled like a tin can under the heel of my boot.”
Paras was furious that Rutgers chose Incapsula, a small cybersecurity firm based in Massachusetts, as its DDoS-mitigation provider. He claimed that Rutgers chose the cheapest company. “Just to show you the poor quality of Incapsula’s network, I have gone ahead and decimated the Rutgers network (and parts of Incapsula), in the hopes that you will pick another provider that knows what they are doing.”
Paras’s fourth attack on the Rutgers network, taking place during finals, caused chaos and panic on campus. Paras reveled in his ability to shut down a major state university, but his ultimate objective was to force it to abandon Incapsula. Paras had started his own DDoS-mitigation service, ProTraf Solutions, and wanted Rutgers to pick ProTraf over Incapsula. And he wasn’t going to stop attacking his school until it switched.
Paras Jha was born and raised in Fanwood, a leafy suburb in central New Jersey. When Paras was in the third grade, a teacher recommended that he be evaluated for attention deficit hyperactivity disorder, but his parents didn’t follow through.
As Paras progressed through elementary school, his struggles increased. Because he was so obviously intelligent, his teachers and parents attributed his lackluster performance to laziness and apathy. His perplexed parents pushed him even harder.
Paras sought refuge in computers. He taught himself how to code when he was 12 and was hooked. His parents happily indulged this passion, buying him a computer and providing him with unrestricted Internet access. But their indulgence led Paras to isolate himself further, as he spent all his time coding, gaming, and hanging out with his online friends.
Paras was particularly drawn to the online game Minecraft. In ninth grade, he graduated from playing Minecraft to hosting servers. It was in hosting game servers that he first encountered DDoS attacks.
Minecraft server administrators often hire DDoS services to knock rivals offline. As Paras learned more sophisticated DDoS attacks, he also studied DDoS defense. As he became proficient in mitigating attacks on Minecraft servers, he decided to create ProTraf Solutions.
Paras’s obsession with Minecraft attacks and defense, compounded by his untreated ADHD, led to an even greater retreat from family and school. His poor academic performance in high school frustrated and depressed him. His only solace was Japanese anime and the admiration he gained from the online community of Minecraft DDoS experts.
Paras’s struggles deteriorated into paralysis when he enrolled in Rutgers, studying for a B.S. in computer science. Without his mother’s help, he was unable to regulate the normal demands of living on his own. He could not manage his sleep, schedule, or study. Paras was also acutely lonely. So he immersed himself in hacking.
Paras and two hacker friends, Josiah White and Dalton Norman, decided to go after the kings of DDoS—a gang known as VDoS. The gang had been providing these services to the world for four years, which is an eternity in cybercrime. The decision to fight experienced cybercriminals may seem brave, but the trio were actually older than their rivals. The VDoS gang members had been only 14 years old when they started to offer DDoS services from Israel in 2012. These 19-year-old American teenagers would be going to battle against two 18-year-old Israeli teenagers. The war between the two teenage gangs would not only change the nature of malware. Their struggle for dominance in cyberspace would create a doomsday machine.
The Mirai botnet, with all its devastating potential, was not the product of an organized-crime or nation-state hacking group—it was put together by three teenage boys. They rented out their botnet to paying customers to do mischief with and used it to attack chosen targets of their own. But the full extent of the danger became apparent only later, after this team made the source code for their malware public. Then others used it to do greater harm: crashing Germany’s largest Internet service provider; attacking Dyn’s Domain Name System servers, making the Internet unusable for millions; and taking down all of Liberia’s Internet—to name a few examples.
The Mirai botnet exploited vulnerable Internet of Things devices, such as Web-connected video cameras, ones that supported Telnet, an outdated system for logging in remotely. Owners of these devices rarely updated their passwords, so they could be easily guessed using a strategy called a dictionary attack.
The first step in assembling a botnet was to scan random IP addresses looking for vulnerable IoT devices, ones whose passwords could be guessed. Once identified, the addresses of these devices were passed to a “loader,” which would put the malware on the vulnerable device. Infected devices located all over the world could then be used for distributed denial-of-service attacks, orchestrated by a command-and-control (C2) server. When not attacking a target, these bots would be enlisted to scan for more vulnerable devices to infect.
Botnet malware is useful for financially motivated crime because botmasters can tell the bots in their thrall to implant malware on vulnerable machines, send phishing emails, or engage in click fraud, in which botnets profit by directing bots to click pay-per-click ads. Botnets are also great DDoS weapons because they can be trained on a target and barrage it from all directions. One day in February 2000, for example, the hacker MafiaBoy knocked out Fifa.com, Amazon.com, Dell, E-Trade, eBay, CNN, as well as Yahoo, at the time the largest search engine on the Internet.
After taking so many major websites offline, MafiaBoy was deemed a national -security threat. President Clinton ordered a national manhunt to find him. In April 2000, MafiaBoy was arrested and charged, and in January 2001 he pled guilty to 58 charges of denial-of-service attacks. Law enforcement did not reveal MafiaBoy’s real name, as this national-security threat was 15 years old.
Both MafiaBoy and the VDoS crew were adolescent boys who crashed servers. But whereas MafiaBoy did it for the sport, VDoS did it for the money. Indeed, these teenage Israeli kids were pioneering tech entrepreneurs. They helped launch a new form of cybercrime: DDoS as a service. With it, anyone could now hack with the click of a button, no technical knowledge needed.
It might be surprising that DDoS providers could advertise openly on the Web. After all, DDoSing another website is illegal everywhere. To get around this, these “booter services” have long argued they perform a legitimate function: providing those who set up Web pages a means to stress test websites.
In theory, such services do play an important function. But only in theory. As a booter-service provider admitted to University of Cambridge researchers, “We do try to market these services towards a more legitimate user base, but we know where the money comes from.”
Paras dropped out of Rutgers in his sophomore year and, with his father’s encouragement, spent the next year focused on building ProTraf Solutions, his DDoS-mitigation business. And just like a mafia don running a protection racket, he had to make that protection needed. After launching four DDoS attacks his freshman year, he attacked Rutgers yet again in September 2015, still hoping that his former school would give up on Incapsula. Rutgers refused to budge.
ProTraf Solutions was failing, and Paras needed cash. In May 2016, Paras reached out to Josiah White. Like Paras, Josiah frequented Hack Forums. When he was 15, he developed major portions of Qbot, a botnet worm that at its height in 2014 had enslaved half a million computers. Now 18, Josiah switched sides and worked with his friend Paras at ProTraf doing DDoS mitigation.
The hacker’s command-and-control (C2) server orchestrates the actions of many geographically distributed bots (computers under its control). Those computers, which could be IoT devices like IP cameras, can be directed to overwhelm the victim’s servers with unwanted traffic, making them unable to respond to legitimate requests. IEEE Spectrum
But Josiah soon returned to hacking and started working with Paras to take the Qbot malware, improve it, and build a bigger, more powerful DDoS botnet. Paras and Josiah then partnered with 19-year-old Dalton Norman. The trio turned into a well-oiled team: Dalton found the vulnerabilities; Josiah updated the botnet malware to exploit these vulnerabilities; and Paras wrote the C2—software for the command-and-control server—for controlling the botnet.
But the trio had competition. Two other DDoS gangs—Lizard Squad and VDoS—decided to band together to build a giant botnet. The collaboration, known as PoodleCorp, was successful. The amount of traffic that could be unleashed on a target from PoodleCorp’s botnet hit a record value of 400 gigabits per second, almost four times the rate that any previous botnet had achieved. They used their new weapon to attack banks in Brazil, U.S. government sites, and Minecraft servers. They achieved this firepower by hijacking 1,300 Web-connected cameras. Web cameras tend to have powerful processors and good connectivity, and they are rarely patched. So a botnet that harnesses video has enormous cannons at its disposal.
While PoodleCorp was on the rise, Paras, Josiah, and Dalton worked on a new weapon. By the beginning of August 2016, the trio had completed the first version of their botnet malware. Paras called the new code Mirai, after the anime series Mirai Nikki.
When Mirai was released, it spread like wildfire. In its first 20 hours, it infected 65,000 devices, doubling in size every 76 minutes. And Mirai had an unwitting ally in the botnet war then raging.
Up in Anchorage, Alaska, the FBI cyber unit was building a case against VDoS. The FBI was unaware of Mirai or its war with VDoS. The agents did not regularly read online boards such as Hack Forums. They did not know that the target of their investigation was being decimated. The FBI also did not realize that Mirai was ready to step into the void.
The head investigator in Anchorage was Special Agent Elliott Peterson. A former U.S. Marine, Peterson is a calm and self-assured agent with a buzz cut of red hair. At the age of 33, Peterson had returned to his native state of Alaska to prosecute cybercrime.
On 8 September 2016, the FBI’s Anchorage and New Haven cyber units teamed up and served a search warrant in Connecticut on the member of PoodleCorp who ran the C2 that controlled all its botnets. On the same day, the Israeli police arrested the VDoS founders in Israel. Suddenly, PoodleCorp was no more.
The Mirai group waited a couple of days to assess the battlefield. As far as they could tell, they were the only botnet left standing. And they were ready to use their new power. Mirai won the war because Israeli and American law enforcement arrested the masterminds behind PoodleCorp. But Mirai would have triumphed anyway, as it was ruthlessly efficient in taking control of Internet of Things devices and excluding competing malware.
A few weeks after the arrests of those behind VDoS, Special Agent Peterson found his next target: the Mirai botnet. In the Mirai case, we do not know the exact steps that Peterson’s team took in their investigation: Court orders in this case are currently “under seal,” meaning that the court deems them secret. But from public reporting, we know that Peterson’s team got its break in the usual way—from a Mirai victim: Brian Krebs, a cybersecurity reporter whose blog was DDoSed by the Mirai botnet on 25 September.
The FBI uncovered the IP address of the C2 and loading servers but did not know who had opened the accounts. Peterson’s team likely subpoenaed the hosting companies to learn the names, emails, cellphones, and payment methods of the account holders. With this information, it would seek court orders and then search warrants to acquire the content of the conspirators’ conversations.
Still, the hunt for the authors of the Mirai malware must have been a difficult one, given how clever these hackers were. For example, to evade detection Josiah didn’t just use a VPN. He hacked the home computer of a teenage boy in France and used his computer as the “exit node.” The orders for the botnet, therefore, came from this computer. Unfortunately for the owner, he was a big fan of Japanese anime and thus fit the profile of the hacker. The FBI and the French police discovered their mistake after they raided the boy’s house.
After wielding its power for two months, Paras dumped nearly the complete source code for Mirai on Hack Forums. “I made my money, there’s lots of eyes looking at IOT now, so it’s time to GTFO [Get The F*** Out],” Paras wrote. With that code dump, Paras had enabled anyone to build their own Mirai. And they did.
Dumping code is reckless, but not unusual. If the police find source code on a hacker’s devices, they can claim that they “downloaded it from the Internet.” Paras’s irresponsible disclosure was part of a false-flag operation meant to throw off the FBI, which had been gathering evidence indicating Paras’s involvement in Mirai and had contacted him to ask questions. Though he gave the agent a fabricated story, getting a text from the FBI probably terrified him.
Mirai had captured the attention of the cybersecurity community and of law enforcement. But not until after Mirai’s source code dropped would it capture the attention of the entire United States. The first attack after the dump was on 21 October, on Dyn, a company based in Manchester, N.H., that provides Domain Name System (DNS) resolution services for much of the East Coast of the United States.
It began at 7:07 a.m. EST with a series of 25-second attacks, thought to be tests of the botnet and Dyn’s infrastructure. Then came the sustained assaults: of one hour, and then five hours. Interestingly, Dyn was not the only target. Sony’s PlayStation video infrastructure was also hit. Because the torrents were so immense, many other websites were affected. Domains such as cnn.com, facebook.com, and nytimes.com wouldn’t work. For the vast majority of these users, the Internet became unusable. At 7:00 p.m., another 10-hour salvo hit Dyn and PlayStation.
Further investigations confirmed the point of the attack. Along with Dyn and PlayStation traffic, the botnet targeted Xbox Live and Nuclear Fallout game-hosting servers. Nation-states were not aiming to hack the upcoming U.S. elections. Someone was trying to boot players off their game servers. Once again—just like MafiaBoy, VDoS, Paras, Dalton, and Josiah—the attacker was a teenage boy, this time a 15-year-old in Northern Ireland named Aaron Sterritt.
Meanwhile, the Mirai trio left the DDoS business, just as Paras said. But Paras and Dalton did not give up on cybercrime. They just took up click fraud.
Click fraud was more lucrative than running a booter service. While Mirai was no longer as big as it had been, the botnet could nevertheless generate significant advertising revenue. Paras and Dalton earned as much money in one month from click fraud as they ever made with DDoS. By January 2017, they had earned over US $180,000, as opposed to a mere $14,000 from DDoSing.
Had Paras and his friends simply shut down their booter service and moved on to click fraud, the world would likely have forgotten about them. But by releasing the Mirai code, Paras created imitators. Dyn was the first major copycat attack, but many others followed. And due to the enormous damage these imitators wrought, law enforcement was intensely interested in the Mirai authors.
After collecting information tying Paras, Josiah, and Dalton to Mirai, the FBI quietly brought each up to Alaska. Peterson’s team showed the suspects its evidence and gave them the chance to cooperate. Given that the evidence was irrefutable, each folded.
Paras Jha was indicted twice, once in New Jersey for his attack on Rutgers, and once in Alaska for Mirai. Both indictments carried the same charge—one violation of the Computer Fraud and Abuse Act. Paras faced up to 10 years in federal prison for his actions. Josiah and Dalton were only indicted in Alaska and so faced 5 years in prison.
The trio pled guilty. At the sentencing hearing held on 18 September 2018, in Anchorage, each of the defendants expressed remorse for his actions. Josiah White’s lawyer conveyed his client’s realization that Mirai was “a tremendous lapse in judgment.”
Unlike Josiah, Paras spoke directly to Judge Timothy Burgess in the courtroom. Paras began by accepting full responsibility for his actions and expressed his deep regret for the trouble he’d caused his family. He also apologized for the harm he’d caused businesses and, in particular, Rutgers, the faculty, and his fellow students.
The Department of Justice made the unusual decision not to ask for jail time. In its sentencing memo, the government noted “the divide between [the defendants’] online personas, where they were significant, well-known, and malicious actors in the DDoS criminal milieu and their comparatively mundane ‘real lives’ where they present as socially immature young men living with their parents in relative obscurity.” It recommended five years of probation and 2,500 hours of community service.
The government had one more request —for that community service “to include continued work with the FBI on cybercrime and cybersecurity matters.” Even before sentencing, Paras, Josiah, and Dalton had logged close to 1,000 hours helping the FBI hunt and shut down Mirai copycats. They contributed to more than a dozen law enforcement and research efforts. In one instance, the trio assisted in stopping a nation-state hacking group. They also helped the FBI prevent DDoS attacks aimed at disrupting Christmas-holiday shopping. Judge Burgess accepted the government’s recommendation, and the trio escaped jail time.
The most poignant moments in the hearing were Paras’s and Dalton’s singling out for praise the very person who caught them. “Two years ago, when I first met Special Agent Elliott Peterson,” Paras told the court, “I was an arrogant fool believing that somehow I was untouchable. When I met him in person for the second time, he told me something I will never forget: ‘You’re in a hole right now. It’s time you stop digging.’ ” Paras finished his remarks by thanking “my family, my friends, and Agent Peterson for helping me through this.”
This article appears in the June 2023 print issue as “Patch Me if You Can.”
Three days before astronauts left on Apollo 8, the first-ever flight around the moon, NASA’s safety chief, Jerome Lederer, gave a speech that was at once reassuring and chilling. Yes, he said, the United States’ moon program was safe and well-planned—but even so, “Apollo 8 has 5,600,000 parts and one and one half million systems, subsystems, and assemblies. Even if all functioned with 99.9 percent reliability, we could expect 5,600 defects.”
The mission, in December 1968, was nearly flawless—a prelude to the Apollo 11 landing the next summer. But even today, half a century later, engineers wrestle with the sheer complexity of the machines they build to go to space. NASA’s Artemis I, its Space Launch System rocket mandated by Congress in 2010, endured a host of delays before it finally launched in November 2022. And Elon Musk’s SpaceX may be lauded for its engineering acumen, but it struggled for six years before its first successful flight into orbit.
Relativity envisions 3D-printing facilities someday on the Martian surface, fabricating much of what people from Earth would need to live there.
Is there a better way? An upstart company called Relativity Space is about to try one. Its Terran 1 rocket, the company says, has about a tenth as many parts as comparable launch vehicles do, because it is made through 3D printing. Instead of bending metal and milling and welding, engineers program a robot to deposit layers of metal alloy in place.
Relativity’s first rocket, the company says, is ready to go from launch complex 16 at Cape Canaveral, Fla. When it happens, the company says it will stream the liftoff on YouTube.
Artist’s concept of Relativity’s planned Terran R rocket. The company says it should be able to carry a 20,000-kilogram payload into low Earth orbit.Relativity
“Over 85 percent of the rocket by mass is 3D printed,” said Scott Van Vliet, Relativity’s head of software engineering. “And what’s really cool is not only are we reducing the amount of parts and labor that go into building one of these vehicles over time, but we’re also reducing the complexity, we’re reducing the chance of failure when you reduce the part count, and you streamline the build process.”
Relativity says it can put together a Terran rocket in two months, compared to two years for some conventionally built ones. The speed and cost of making a prototype—say, for wind-tunnel testing—are reduced because you tell the printer to make a scaled-down model. There is less waste because the process is additive. And if something needs to be modified, you reprogram the 3D printer instead of slow, expensive retooling.
Investors have noticed. The company says financial backers have included BlackRock, Y Combinator and the entrepreneur Mark Cuban.
“If you walk into any rocket factory today other than ours,” said Josh Brost, the company’s head of business development, “you still will see hundreds of thousands of parts coming from thousands of vendors, and still being assembled using lots of touch labor and lots of big-fix tools.”
Terran 1 Nose Cone Timelapse Check out this timelapse of our nose cone build for Terran 1. This milestone marks the first time we’ve created this unique shape ...
Terran 1, rated as capable of putting a 1,250-kilogram payload in low Earth orbit, is mainly intended as a test bed. Relativity has signed up a variety of future customers for satellite launches, but the first Terran 1 (“Terran” means “earthling”) will not carry a paying customer’s satellite. The first flight has been given the playful name “Good Luck, Have Fun”—GLHF for short. Eventually, if things are going well, Relativity will build a larger booster, called Terran R, which the company hopes will compete with the SpaceX Falcon 9 for launches of up to 20,000 kg. Relativity says the Terran R should be fully reusable, including the upper stage—something that other commercial launch companies have not accomplished. In current renderings, the rocket is, as the company puts it, “inspired by nature,” shaped to slice through the atmosphere as it ascends and comes back for recovery.
A number of Relativity’s top people came from Musk’s SpaceX or Jeff Bezos’s space company, Blue Origin, and, like Musk, they say their vision is a permanent presence on Mars. Brost calls it “the long-term North Star for us.” They say they can envision 3D-printing facilities someday on the Martian surface, fabricating much of what people from Earth would need to live there. “For that to happen,” says Brost, “you need to have manufacturing capabilities that are autonomous and incredibly flexible.”
Relativity’s fourth-generation Stargate 3D printer.Relativity
Just how Relativity will do all these things is a work in progress. The company says its 3D technology will help it work iteratively—finding mistakes as it goes, then correcting them as it prints the next rocket, and the next, and so on.
“In traditional manufacturing, you have to do a ton of work up front and have a lot of the design features done well ahead of time,” says Van Vliet. “You have to invest in fixed tooling that can often take years to build before you’ve actually developed an article for your launch vehicle. With 3D printing, additive manufacturing, we get to building something very, very quickly.”
The next step is to get the first rocket off the pad. Will it succeed? Brost says a key test will be getting through max q—the point of maximum dynamic pressure on the rocket as it accelerates through the atmosphere before the air around it thins out.
“If you look at history, at new space companies doing large rockets, there’s not a single one that’s done their first rocket on their first try. It would be quite an achievement if we were able to achieve orbit on our inaugural launch,” says Brost.
“I’ve been to many launches in my career,” he says, “and it never gets less exciting or nerve wracking to me.”
RSS Rabbit links users to publicly available RSS entries.
Vet every link before clicking! The creators accept no responsibility for the contents of these entries.
We're not prepared to take user feedback yet. Check back soon!