Providing an Internet that would cater to the entire population is undeniably a very ambitious goal. It’s not a simple feat to conquer and it certainly wouldn’t be easy. However, we’re not the ones to tell Elon Musk otherwise.
The renowned tech genius, Elon Musk, who’s famous for breaking technological limitations starting with electric and autonomously driving vehicles, and who has also ventured into space exploration and human access is starting to introduce the idea of global Internet service. How is he planning to do just that? From space, of course.
If you’re not aware, Musk founded a company called Space X whose main purpose was to explore the possibilities of making space exploration more accessible and a probable commercial venture by discovering ways of making travel back and forth the Earth’s atmosphere cheaper and a lot safer. As part of that mission, Space X has been traveling back and forth delivering goods for NASA to the ISS. Recently, it accomplished its first test flight intended for human travel at a success. All the while having the technology that allowed it to reuse engines for back and forth travel, a feat new to the entire idea of space travel.
With everything Space X has managed to conquer, Musk is certainly encouraged that his idea of providing Internet from space could be the most effective way to provide it globally.
Saturday, Musk wrote to Twitter with 2 photos indicating that Space X is getting ready to send its first 60 Internet-beaming satellites called Starlink satellites to space aboard one of its Falcon aircraft.
However, don’t get your hopes up just yet. The idea of Space X’s Starlink project is still very new and is frankly at the very beginning of its one of a kind technology.
Musk intends to launch a total of 11,940 Starlink satellites in low Earth orbit between now and the mid-2020s as part of Space X’s demonstration of the technology. To put it into perspective, SpaceX will need “6 more launches of 60” satellites per launch to get “minor coverage” for the internet network, and a dozen launches, or 720 satellites, are needed “for moderate” coverage.”
The satellites will, in fact, work and will provide Internet access to all regions of the Earth where there is little to none. In February 2018, Space X first tested the technology by launching two Starlink satellites in low Earth orbit named TinTin A and TinTin B. According to Musk, both performed well even though they were launched much lower into orbit, lower than the ISS, than what was originally planned. As a result, Space X successfully petitioned the Federal Communications Commission to allow the company to launch more satellites for further testing.
The FCC granted SpaceX permission to launch two groups of satellites for the Starlink project: one constellation of 4,409 satellites, followed by a second constellation of 7,518 that will operate at a slightly lower altitude than the first.
However last week during a satellite conference, SpaceX president and COO Gwynne Shotwell noted that these satellites still lack some design features needed for the final constellation, according to a report in Space News. Basically, the goal of the first batch of Starlink satellites is to test its production design and its performance in actual orbit.
In a letter to the FCC, SpaceX said the satellites are now designed to be “completely demisable” when they return and burn up in Earth’s atmosphere. SpaceX said this means there is “zero” risk any pieces of Starlink will hurt anyone on the ground after the satellites are done being used as CNB reports.
Musk even said in a Tweet that “much will likely go wrong” in the first mission.
From a more further perspective, Space X is only one of half a dozen other companies who are looking into the possibility of a satellite system in low Earth orbit to provide global Internet and the competition to being the first and best provider of which only continues to heat up. Space X is currently in the lead against companies like OneWeb, Telesat, LeoSat, and newcomer, Amazon who are also all working on developing their own satellite constellations. OneWeb, who also launched its first six satellites in February of this year currently follows Space X.
‘Critical’ VLC Zero-Day Warning Raised
Cybersecurity researchers have warned users of the popular multimedia player, VLC, of a “critical” vulnerability that could expose them to potential risks once exploited by threat actors.
The German cybersecurity firm, CERT-Bund, detailed in a cybersecurity warning that their researchers have flagged a vulnerability in VLC’s system, which can be used by hackers and other malicious entities to compromise a device where the media player is installed.
The researchers from CERT-Bund said that users could be hijacked into running malicious codes in their VLC-installed computers because a flaw enables remote code execution (RCE), unauthorized modification and disclosure of data/files, and overall disruption of service. This means that the user will unknowingly run the malicious codes in their device that could expose them to multilayered risks.
The vulnerability known as CVE-2019-13615 is found in the software’s latest version VLC Media Player version 126.96.36.199. The flaw has been rated 9.8 in NIST’s National Vulnerability Database, which indicates that the flaw is in ‘critical’ level.
While there is still no known exploitation happening in the wild, the researchers are warning users to avoid updating their software or downloading the new version of the media player.
“A remote, anonymous attacker can exploit a vulnerability in VLC to execute arbitrary code, create a denial of service state, disclose information, or manipulate files,” reads the CERT-Bund disclosure.
Interestingly, while the vulnerability is detected in many environments such as Windows, Linux, and UNIX versions, the macOS version of VLC seems to be unaffected by the vulnerability.
The VLC 3.0.7 Vetinari is the seventh version of the software in its Vetinari line which was released earlier last month. VLC Media Player is one of the most popular media players in the market, priding itself with more than 3 billion downloads. The popularity of the media player came from it is free, open-source, and portable.
The VLC Media Player, owned by VideoLAN, a non-profit organization, can run in different environments like Windows, macOS, and Linux, with versions created for Android and iOS. It is also one of the available media players that can read a variety of audio and video files, which makes it one of the most popular third-party media player in the market.
With the combined number of active users of VLC Media player and the total download it gets, an exploit in the discovered vulnerability can cause a massive cyber attack outbreak.
Last month, VLC patched two major vulnerabilities in their system with a similar implication. The vulnerabilities a remote user to create some specially crafted avi or mkv files that, when loaded by the target user, will trigger a heap buffer overflow into a targeted system.
The researchers said that successful execution of the malformed file in the target users’ device could cause, in the best case, VLC to crash, and in the worst, could provide hackers special privileges to exploit the user’s device. They warned that a hacker could simply trick a target or a potential victim into opening a seemingly unsuspicious video in the VLC for the hacker to carry out his plan.
The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites (or disable the VLC browser plugins) until the patch is applied,” they said in a security advisory. This vulnerability was patched when VideoLAN released version 3.0.7, but apparently, a similar flaw would also affect the new version.
Last month, VideoLAN released the biggest single security update for VLC Media Player in the history of the program. The update included fixes for 33 vulnerabilities in total, of which two were marked critical, 21 medium and ten rated low. These fixes include:
- Improvements for HDR support on Windows, including for HLG streams
- Improvements on the Blu-ray support, notably for menus
- Fixes for some 10bit and 12bit rendering on Windows 10
- Fixes for UPnP discovery on MacBooks with a TouchBar
- Numerous security issues: One high-security issue, 21 medium, and 20 low-security issues were fixed, ranging from integer overflow to buffer overflows, with out-of-read violations and stack overflows.
VideoLAN advised users that they have been working on a patch for the new flaw in version 3.0.7 for the past four weeks and they are currently 60 percent through it.
Chinese Fugitive Caught By Police Using Facial Recognition
It’s part of China’s project called “Sharp Eyes.”
With a bunch of reports detailing the ills of facial recognition systems that have dominated the conversation around the unregulated technology, a breath of fresh air comes after a fugitive has been caught by a facial recognition system in China earlier this week.
Chinese police officers arrested an unnamed fugitive at a Cantopop star’s concert in Zhanjiang city at the southwestern end of Guangdong province. The arrest was highly attributed to the facial recognition system used by Chinese law enforcement in concerts and crowded gatherings to spot fugitives and wanted criminals. The said system has already been in used since late 2017.
The Zhanjiang public security bureau has released the video of the arrest in the law enforcement’s official TikTok account.
The suspect was reportedly a die-hard fan of the pop group, and as he was standing in line to get in the concert, his image was caught by the camera in the concert’s ticketing booth and was eventually matched to a fugitive in the database. The police apprehended him in the middle of the show.
Chinese police are using facial recognition to arrest suspects in concerts
This is not the first time that a suspect has been apprehended while attending a concert in China. Between December 28 and 30 in 2018, more than 22 wanted men were identified at a concert by Hong Kong Cantopop star Jacky Cheung Hok-Yau in Suzhou, a city west of Shanghai.
In May 2018, a man was also arrested when a facial recognition system identified his photo while he was attending a crowded concert in China. The suspect was identified with the surname Yu and was under investigation since 2015 for allegations of stealing more than $17,000 worth of potatoes.
“A few minutes after he passed through the security checkpoint, our system issued a warning that he was a wanted person,” said Shen Yueguang, an official from the Nanhu District Public Security Bureau referring the May 2018 arrest.
In the same month, another man wanted for “economic crimes” was arrested in Jiangxi province in southeast China after facial recognition cameras detected his presence at a Cheung concert attended by 60,000 people.
The arrests are emblematic of China’s growing eagerness to establish a nationwide surveillance system with plans from the government to integrate an array of camera systems that monitor roads, shopping malls, transportation hubs, and buildings.
The project, known as “Sharp Eyes,” aims to target criminals, arrest fugitives, predict crime and monitor the habits of the country’s 1.4 billion people.
The United States is doing it too
China isn’t the only one with this plan. The United States has long been working in establishing a surveillance network like this. The FBI’s Next Generation Identification system uses face recognition to match crime scene images to a national database of mug shots.
However, the academic sector still insists on the risks that come with using facial recognition in fighting crimes. They raise the concern of how inaccurate these systems are and the unregulated nature of how it is being used.
A study conducted by Clare Garvie from Georgetown Law Center revealed that police departments are feeding celebrity images, artists sketches, and unconventional photos to facial recognition system to generate a match. These images are called “probe photos” and are matched against the police mugshot and drivers’ license database.
“The stakes are too high in criminal investigations to rely on unreliable—or wrong—inputs. It is one thing for a company to build a face recognition system designed to help individuals find their celebrity doppelgänger or painting lookalike for entertainment purposes. It’s quite another to use these techniques to identify criminal suspects, who may be deprived of their liberty and ultimately prosecuted based on the match. Unfortunately, police departments’ reliance on questionable probe photos appears all too common,” Garvie wrote in her study.
“NYPD officers arrested after texting a witness a single face recognition “possible match” photograph with accompanying text: “Is this the guy…?” The witness’ affirmative response to viewing the single photo and accompanying text, with no live lineup or photo array ever conducted, was the only confirmation of the possible match before officers making an arrest,” she added.
Along with the apprehensions on how the police and the government use facial recognition technology, they are also still insisting on focusing on regulating these systems. Garvie said that even if the FBI can potentially improve the accuracy of the algorithms in the systems they use, none of it will matter as long as regulation still lags in making sure that they won’t be abused.
North Carolina Passes Bill To Stop Robocalls And Scammers
The law also applies to text solicitors.
Robocalls have become the target of recent legislation and regulations — both in the federal and state level after the House — and the Senate has both released their versions of a robocall deterrent law that would impose sanctions on illegal call practitioners. This time, tired of the slow progress of federal regulating bodies, the state of North Carolina has drafted their law targeting robocallers and scammers with fines and penalties.
On Monday, North Carolina passed a bill that would require callers to use their real name and number or the information of the business they’re representing. Primarily, the law aims to stop the practice of “call spoofing,” where companies are hiding their identities from their consumers to trick them into answering their robocalls.
In a unanimous 45-0 vote, the new law has been passed in Senate after passage by the House last month. Now, the new law is waiting for the decision of Gov. Roy Cooper on whether the law will be implemented or not — for the state to begin enforcing penalties the law has drawn against violators.
Under the new bill, call spoofers and robocallers who do not disclose their real numbers and the businesses they represent will be fined with a maximum of $5,000. While call-spoofing is already illegal on the federal level, this new bill will give North Carlina’s authorities to go after solicitors and robocallers.
Additionally, the new law will not only target callers but will also penalize those who use text messaging as their platform of soliciting or harassment.
According to State House Speaker Tim Moore, who sponsored the bill back in May, robocallers are priority concerns for his constituents, especially those who are elderly.
“When I went out campaigning this last year … I heard more about people getting scammed phone calls than any single thing else,” he said.
Rep. Chris Humphrey, a Lenoir County Republican also said that the new New Carolina bill would give the state and the authorities new tools to enforce a heavier crackdown against robocallers. “The penalties are civil at this point and will begin to make spammers reconsider when making these annoying calls,” he wrote in an email.
Humphrey said that the new law would not eliminate all spam calls that are plaguing North Carolina residents. Many of these calls originate from outside the country and is hard to trace, let alone to prosecute. However, he is optimistic that the new bill could lighten the load of calls his constituents get from scammers.
In the status quo, consumers can choose to be included in a state’s Do Not Call registry to prevent telemarketers and robocallers from calling them. However, amidst the law that prohibits companies from calling numbers in the DNC registry, North Carolina has received 168,022 “Do Not Call Registry” complaints in 2018 based on the numbers provided by the Federal Trade Commission.
For the past year, both the FTC and the Federal Communication Commission has been in a strengthened crackdown against call spoofers and robocallers. However, amidst their efforts, the nation’s robocalling problem still persists. Numbers reveal that consumers are receiving at least five million robocalls every month, and the problem has even affected basic services like the healthcare industry.
As a response, both the House and the Senate have drafted laws to penalize robocallers and to empower regulating bodies such as the FTC and the FCC in enforcing regulations against violators.
In a bipartisan bill called the Stopping Bad Robocalls Act, the Senate aims to stop bad calling practices and impose penalties on violators. It will also empower the FCC and the FTC to impose more onerous regulations to halt the robocall problem.
Similarly, the House also voted the passage of the TRACED (Telephone Robocall Abuse Criminal Enforcement and Deterrence) Act which would put more onus on major telecom and cell service provider to address the problem and do a better job of authenticating calls.
As part of their efforts to stop robocalls, the Federal Communication Commission has also voted to allow service providers to block robocalls by default. A move which many of the service providers have already followed through by releasing free robocalling features in their services.
Check Out What’s New:
- ‘Now & Then’ Coming To Netflix; Here’s Netflix August Movie And TV Show Lineup
- ‘Critical’ VLC Zero-Day Warning Raised
- Chinese Fugitive Caught By Police Using Facial Recognition
- New Restrictions On SNAP Food Stamps Will Cut Off Millions Of Americans
- North Carolina Passes Bill To Stop Robocalls And Scammers
- Phishing Attack Targets Lancaster University Students And Applicants
- iNSYNQ CEO Asked Clients For Patience Following Ransomware Attack
- MCU Commits To Diversity; Valkyrie Gets A Bisexual Storyline
- DoorDash Is Stealing Their Workers’ Tips To Pay For Their Wages
- Iranian Hackers Are Posing As Cambridge Officials To Target US Government
Arts & Entertainment3 weeks ago
‘Criminal Minds’ Season 15: A Tear-Jerking Finale Is Coming
Technology3 weeks ago
Google Stops Trends Alerts In New Zealand Following Criticisms From NZ Government
Science3 weeks ago
Summer Penis Is Giving Men Big Dick Energy
Business1 week ago
Political Stand-Off: Chinese-Canadian Goods
Science2 months ago
Norway’s Celebrity Beluga Whale ‘Hvaldimir’; A Russian Spy Or Child Therapist?
Technology3 weeks ago
Cloud Service Provider, ‘PCM’ Fell Victim To A Data Breach Aimed To Collect Gift Cards
Technology1 week ago
Bug Bounty Hunter Paid $30k For Discovering Instagram Vulnerability
Technology3 weeks ago
‘Uncall’ Promises To Remove Your Number From Generic Robocall Lists And Dark Web Databases