South Korea Elevates Cyber Threat Levels Following Data Center Incident that Triggered Hacking Nightmare

South Korea’s intelligence agency has elevated the national cyber threat level due to fears that hackers may exploit the chaos caused by recent fires in government data centers, which have disrupted crucial digital infrastructure nationwide.

The National Cybersecurity Centre, managed by the Intelligence Reporting Agency, has raised its alert from “Warning” to “Warning” as of Monday, highlighting fears that hackers could take advantage of the vulnerabilities during recovery efforts.

The incident occurred on Friday evening at the National Information Resources Service in Great Jeon, approximately 140 kilometers (87 miles) south of Seoul. This facility is one of three operational government data centers that handle critical digital infrastructure across the nation.

Workers had relocated a Lithium-ion battery from the server room on the fifth floor to the basement when the fire started. It spread to other nearby batteries and servers, resulting in one worker sustaining first-degree burns, while firefighters managed to extinguish the blaze after 22 hours.


By Saturday morning, officials had shut down 647 government systems to prevent further damage. Government email and intranet systems were offline, along with mobile identification services, postal banks, complaint portals, and major government websites.

Schools lost access to student records, and tax deadlines passed without being processed. Real estate transactions faced delays due to the inability to verify digital documents. The national crematorium reservation system was impacted, and many hospitals and transport terminals initially left citizens without physical identification cards.

As of 1 PM on Tuesday, 89 out of the 647 affected systems had been restored, including significant government portals, postal services, and identity verification systems.

Officials estimate that 96 of the affected systems have suffered complete failure, necessitating a recovery period of about four weeks as they are moved to a large backup facility. This disruption is expected to persist through Chuseok, the major public holiday in early October.

President Lee Jae Myung issued an apology on Sunday. During a crisis meeting, he expressed dismay at the lack of a backup operating system, stating, “It was a foreseeable incident, but there were no countermeasures. It’s not that the measures didn’t work; they simply didn’t exist.”

When questioned about the backup procedures, an official remarked that they were “driving without a map.”

The upcoming Asia-Pacific Economic Cooperation (APEC) Summit, set to be hosted in the southeastern city of Kyoto at the end of October, has raised security concerns as officials from the US, China, and other regions plan to attend.

In October 2022, a fire involving a lithium-ion battery at Kakao, the company behind the popular messaging app KakaoTalk, resulted in millions losing access to messaging, taxis, and digital payments, leading to national chaos.

Following the Kakao incident, parliament passed legislation mandating redundant systems and intervals between batteries and other equipment for internet service providers and data center operators.

The left-leaning Hankyoreh newspaper questioned what last week’s failures indicated about “a nation that prides itself on being an information technology powerhouse.”

In a similar vein, the conservative Dong-a Ilbo remarked that referring to South Korea as a digital leader has become “embarrassing.”

Lawmakers from both the ruling party and the opposition have traded blame regarding the responsibility for the crisis. President’s Chief of Staff Kang Hoon-Sik directed authorities on Monday to focus on resolving the issue rather than criticizing the previous administration.

Source: www.theguardian.com

Item Seller Profits from Kirk’s Shooting Incident

Shortly after the confirmation of Charlie Kirk’s death, a flood of advertisements for memorial products emerged on Facebook and Instagram.

A viral post boasting over 8,000 shares and several hundred thousand likes has gained traction for promoting the “Echo of Freedom” shirt, featuring Jesus’ American flag and Kirk’s signature. This design portrays him as a representation of “faith, freedom, America.” The very shirt that Kirk wore at the time of his assassination has become a popular item among his conservative backers. Another brand, Liberty Faith Gear, has adopted a more aggressive marketing approach with its Patriot version, declaring, “It rises when freedom is attacked. I won’t hide it. I won’t bow.”

Neither brand is officially linked to Kirk’s Turning Point USA and both are based in the United States. In fact, they are operated by Guangzhou Xiue Network Technology, an e-commerce business located in Panyu, China’s southern Guangdong Province, known as the country’s first fashion capital.

After Kirk’s assassination, a number of foreign apparel and commodity firms quickly capitalized on the event. The Guardian identified at least seven companies, including Harbin Huanjia Trading Limited and Jinhua Hongrun e-Commerce, which are profiting from Kirk’s products. Like Guangzhou Shiwei, these companies have a history of selling highly partisan and culture war-themed merchandise and have inundated Facebook and Instagram with numerous commemorative advertisements. They encourage prospective buyers to commemorate Kirk’s legacy by purchasing shirts, often claiming that profits will benefit his organization and family.


According to records from the Chinese company, Guangzhou Shiwei was established in 2021 and specializes in “multi-channel cross-border e-commerce operations.” The company manages a network of numerous social media accounts and e-commerce websites, being among the first to run ads exploiting Kirk’s death. Each account caters to various themes—some focused on faith and religion, others on patriotism and freedom, while some engage different US communities to promote interaction and sales.

In addition to Facebook accounts like See Insin, Liberty Faith Gear, and USA Freedom T, Guangzhou Shiwei operates USA Veterans. This page prominently features Kirk’s image and the Turning Point USA logo to create a recognizable presence, asserting their support for “TPUSA chapters nationwide.” They often use familiar language and addresses that sound legitimate to many Americans, yet a quick Google search reveals that many of these listed addresses correspond to gas stations.

A representative from Turning Point USA informed the Guardian that the Wear Freedom Brand is not affiliated with their organization.

Some of these ads from Guangzhou Shiwei’s network have even claimed that “100% of the profits from this shirt will go directly to Turning Point USA,” a statement that violates US law regarding political donations.

Attempts by the Guardian to reach out to the company for comments were unsuccessful.

Following Kirk’s death, national media and state actors from Russia, Iran, and China quickly entered the discourse, fueling a debate about the assailant and freedom of speech. They exploited the controversy to sow division. “Astroturfing“—the practice of using fake identities to generate a false sense of popularity—was recognized by many Americans during the 2016 elections. However, profit-driven companies have long used similar tactics for political influence.

Darren Linville, a professor at Clemson University specializing in media disinformation, pointed out that exploiting political moments for marketing purposes is nothing new, particularly within American markets.

“These networks exist for a reason. They are incredibly advantageous,” Linville remarked. “If we could eliminate cryptocurrency and t-shirt sales, we’d eliminate half of our social media trolls.”

Skip past newsletter promotions

This isn’t the first instance of Guangzhou employing these misleading tactics. Prior to the last presidential election, accounts managed by the same company were found to have similarly used deceptive strategies, pledging illegal political contributions to support the Trump campaign while simultaneously promoting merchandise linked to the Harris Campaign and other PACs through products like “Childless Cat Lady” T-shirts and “can prevent communism” baseball caps.

At that time, 404 Media, the technology news outlet that first reported on this network of accounts, indicated that Meta, Facebook’s parent company, had removed hundreds of these ads following their intervention. Nevertheless, Guangzhou Shiwei persists in operating many of the same accounts and has used them recently to promote Kirk-themed products.

In a statement, Meta stated: “Regrettably, we utilize current events to attract highly engaged individuals online.” They mentioned having removed ads identified by the Guardian and the associated accounts deemed in violation of their policies, affirming their commitment to legally pursue those responsible for rule-breaking content.

Despite the firm’s efforts, several of its Astroturfing accounts continue to function on Meta’s platform, buying advertisements and promoting hundreds of red t-shirts, urging Americans to wear them on October 14th, coinciding with what would have been Kirk’s birthday.

Source: www.theguardian.com

Two Senior NOAA Officials Taking Leave Related to “Sharpiegate” Incident

This week, two officials from the National Oceanic and Atmospheric Administration (NOAA) involved in the infamous “Sharpiegate” investigation were placed on administrative leave.

NOAA’s assistant administrator, Stephen Volz, and Jeff Dillen, assistant hearing advisor, were confirmed to be on leave Thursday morning, as stated by Volz to NBC News.

Volz and Dillen became prominent figures during President Trump’s first term due to the “Sharpiegate” incident, where forecasters faced backlash for contradicting the president over alterations to a hurricane map.

NOAA confirmed on Friday that both individuals were on administrative leave.

“Dillen was placed on leave by a senior career lawyer in the department following recent performance reviews,” said NOAA Communications Director Kim Dester in an email. “Separately, Dr. Volz was put on leave for unrelated reasons.”

When reached by phone, Dillen opted not to comment.

This decision comes at a challenging time for NOAA, as recent staffing cuts and voluntary departures initiated by the Trump administration have affected hundreds of employees. The staffing and performance of the National Weather Service, a part of NOAA, have been under close scrutiny following severe weather events, including the devastating floods in central Texas.

Currently, NOAA lacks a permanent leader, as President Trump’s candidate, Neil Jacobs, awaits Senate confirmation. Furthermore, NOAA’s budget has faced intense examination, with the Trump administration proposing considerable cuts that Congress appears unwilling to enact.

Reports of Volz and Dillen’s administrative leave were first brought to light by CNN. The reasons behind their leave remain unclear.

In an interview, Volz mentioned he received a letter from NOAA administrator Laura Grimm on Thursday morning informing him of his leave.

“The letter provided no details on the cause, only stating I am on administrative leave due to an investigation into public conduct,” Volz quoted, adding that he is unaware of what the investigation entails.

He noted that part of his role includes public speaking and attending events, including a recent press conference for a satellite launch in Japan. With 36 years in public service, Volz stated he has not altered his media engagement strategy since the new administration took over.

“I have consistently made public comments and maintained transparency about the work we do,” he affirmed. “I’m vocal about our operations and how we handle challenging scenarios, likely more so than many others in similar roles at NOAA.”

Both Volz and Dillen were pivotal in the aftermath of the 2019 “Sharpiegate” incident, where Trump mistakenly asserted that Hurricane Dorian could strike Alabama. Local forecasters quickly refuted the claim, leading to Trump showcasing a hurricane map altered with a black Sharpie. Top NOAA officials then publicly criticized local forecasters, allegedly under political pressure.

Following the incident, NOAA enlisted the National Academy of Public Administration to conduct an independent evaluation of claims related to scientific misconduct during that time. The findings indicated that Jacobs violated NOAA’s ethical policies.

Volz authored the final decision regarding NOAA’s assessment aligning with the NAPA results, stating that Dillen also contributed to the document. Volz mentioned they both received notice of their leave on the same day but couldn’t confirm if it coincided with the “Sharpiegate” report.

“Jeff served as legal counsel while I was a senior employee reviewing the NAPA report, identifying negligence involving two staff members within NOAA,” Volz explained. “We both received administrative leave simultaneously, and Neil Jacobs is currently undergoing a hearing while awaiting Senate action.”

NOAA has not directly addressed whether the “Sharpiegate” investigation influenced their decision.

Volz mentioned he found himself locked out of his email and federal facilities.

He expressed uncertainty about his next steps.

“I am passionate about my work at NOAA,” Volz stated. “I’m not prepared to quietly step back from my duties. That is certainly the case.”

Source: www.nbcnews.com

Qantas Incident Highlights That One Phone Can Exploit the Weakest Link in Cybersecurity: Humans

a
A phone call may be coming your way. This week’s revelations show that cybercriminals stole personal data from as many as 6 million customers after breaching offshore IT call centers and accessing third-party systems.

This incident adds to a troubling trend of cyberattacks affecting major Australian corporations, including the personal information of millions linked to the recent breaches involving Optus, Medibank, and more recently, the $4 trillion superannuation sector in Australia.

The attack on Qantas follows recent targeting by a group known as “spiders,” focusing on various airline sectors. They employ social engineering techniques to manipulate employees and contractors into granting access, often bypassing multifactor authentication.



New technology brings old methods

Although companies can implement the latest software updates and safeguard their systems, hackers continue to exploit social engineering tactics, often targeting the weakest link: human behavior.

Social engineering is not a new concept; it revolves around tricking individuals into revealing sensitive information, predating the internet.

Phishing is the most common manifestation of social engineering, crafted to appear legitimate to lure unsuspecting users into divulging credentials.

The telephone variation, known as vishing, presents a greater challenge for attackers as they must employ persuasive tactics over the phone to manipulate employees into providing sensitive information.

The emergence of user-friendly artificial intelligence tools, including voice cloning, has made such attacks even simpler for cybercriminals.

The latest report from Australia’s intelligence commissioner covering the latter half of 2024 indicated a significant rise in complaints about social engineering attacks, particularly within government agencies, finance, and health sectors.

Qantas’ breach involved compromised details such as names, email addresses, phone numbers, birth dates, frequent flyer numbers, etc. While these breaches might not directly lead to financial theft, the growing number of incidents in Australia enables hackers to aggregate stolen data to target new vulnerable entities.

Data breaches lead to more data breaches

In April, the national pension fund acknowledged the risks associated with hackers collecting credentials from previous breaches to gain access to superannuation accounts, a tactic termed “eligibility smashing.”

Fortunately, only a small number of customers incurred losses totaling around $500,000. However, this could represent a significant number of fund holders who are yet to reach retirement age.



The Albanese government has been cautioned that this attack signals potential risks within the financial sector. In a recent advisory provided to the incoming government, released under the Freedom of Information Act, Australia’s Prudential Regulation Authority (APRA) warned that superannuation assets are susceptible to cyber threats.

“The prevalence and frequency of cyberattacks on large pension funds reinforce the necessity for enhancing our capabilities in managing both cyber and operational risks,” stated APRA.

“Despite only a small number of accounts reporting fraudulent withdrawals, it highlights the need for the sector to mature its cybersecurity and operational resilience.”

“As the sector expands and more members retire, continuity and increasing interconnectedness with the banking sector are crucial.”


Skip past newsletter promotions

APRA cautioned the industry in 2023 about the critical nature of multifactor authentication, yet some funds were unable to implement it before the April breach.

Regulators noted that there is an ongoing wave of cyberattacks targeting banking and insurance sectors, necessitating continuous testing of their defenses against emerging threats.

Who is at the most risk?

According to Craig Searle, global leader in cyber advisory at Trustwave, healthcare, finance, technology, and critical infrastructure sectors such as telecommunications are particularly vulnerable to cyber threats.

“The technology sector is especially at risk due to its pivotal role in digital infrastructure and interconnected supply chains,” he explained. “Recent high-profile supply chain attacks demonstrate how breaches of a single tech provider can ripple through to hundreds or thousands of downstream clients.”

“Overall, the sectors facing the highest risks are those that manage valuable data, maintain complex supply chains, and deliver critical services.”

Searle noted that attackers intentionally target third-party systems and outsourced IT support, which presents significant risks for large corporations, as exemplified by the breaches at Qantas.

“The interconnected dynamics of the digital supply chain can lead to vulnerabilities among partners or contractors, creating a ripple effect that compromises sensitive data far beyond the initial breach,” he remarked.

Christian Beek, senior director of threat analysis at Rapid7, highlighted that third-party systems are now integral to the operations of many organizations and thus become prime targets for cybercriminals.

“Organizations must apply adequate levels of due diligence when evaluating the security protocols of these third-party systems to mitigate the risk of data being compromised.”

Searle emphasized the necessity for organizations to adopt a proactive cybersecurity posture, swiftly applying software patches and establishing robust access controls, such as multifactor authentication.

Beek echoed that organizations need to be proactive, insisting that executive leadership must take responsibility for cybersecurity and board oversight.

“The new tactics utilized by modern cybercrime groups extend beyond standard security management protocols,” he warned. “These unconventional approaches compel us to rethink the typical defensive strategies, especially regarding social engineering tactics and how we counter them.”

Source: www.theguardian.com

Could Israeli Airstrikes Trigger a Nuclear Incident in Iran?

Iran’s Arak Heavy Water Nuclear Facility was damaged by Israeli bombing

ShutterStockEdit

Israel’s assault regarding Iran’s nuclear activities has raised concerns about potential radioactive incidents, according to experts, including the director of the International Atomic Energy Agency (IAEA). New Scientist While there have been reports of radiological and chemical contamination at one nuclear enrichment facility, the overall risk remains low.

Peter Bryant from the University of Liverpool notes that the terms “nuclear” and “radiation” understandably provoke fear, but despite extensive bombings, there have been no reported external leaks as of now.

Iran’s nuclear ambitions trace back to the 1950s, including attempts to develop nuclear weapons. The country pledged to allow IAEA inspections to verify that its energy facilities are not being utilized for weapon production; however, the agency recently issued a report criticizing Iran for failing to comply with non-proliferation obligations. Evidence of uranium traces at certain plants suggests that a covert nuclear weapons program might still be in progress.

Following reports regarding Iranian facilities responsible for uranium enrichment, Israel launched its strikes. Naturally occurring uranium exists in a mixture of three isotopes, but the enriched variant has a greater proportion of uranium-235, which can be used for both electrical generation in reactors and for nuclear arms. Given this dual-purpose potential, Iran has committed to restricting enrichment under the Treaty on the Non-Proliferation of Nuclear Weapons.

Philip Bleak from the Middlebury International Institute in California points out that the IAEA reports indicate Iran has already accumulated over 400 kilograms of uranium concentrated to 60%. This quantity is adequate for multiple rudimentary nuclear weapons, and Israeli intelligence suggests that the actual figures may be underreported to the IAEA. Even uranium at 60% purity significantly exceeds the requirements for fueling a power plant, implying that Iran harbors intentions to develop nuclear capabilities.

Iran maintains two primary enrichment sites: the Fordow Fuel Enrichment Plant (FFEP) and the Natanz Nuclear Facility. Israel’s strikes on Natanz resulted in internal radiation leaks; however, according to the IAEA, there have been no signs of external contamination.

In contrast, the Fordow facility remains operational due to its underground location, making it susceptible to destruction only by powerful US munitions. Only a powerful US bomb could destroy it. Former President Donald Trump has indicated he might assess support for Israel in this matter.

The Arak Heavy Water Reactor has also been targeted in bombings; however, it was never commissioned and housed no radioactive substances. If operational, it could have enabled the conversion of uranium into plutonium, a material viable for nuclear weaponry. Additionally, the Isfahan Nuclear Technology Center and certain missile sites designed for nuclear weapons launch were also bombed.

Bleak asserts that fresh uranium poses “very modest” health risks irrespective of enrichment levels. “A significant amount must enter your body to have a meaningful impact, similar to what uranium miners experienced,” he explains.

This is why the enrichment facilities targeted in strikes represent minimal risk outside their immediate vicinity, according to Bryant. Moreover, since these plants are built deep underground for resistance against attacks, any radioactive emissions would be further contained. “Uranium fuel can be handled without issue,” states Bryant. “You would need to physically ingest it to face health problems.”

Nonetheless, should a working reactor be targeted and operational for months prior to an attack, it may accumulate “dangerous fission byproducts,” which represent a more significant radiological threat. Bleak warns that if such materials escape, scenarios akin to Chernobyl or Fukushima could arise.

Bryant expresses confidence that such leaks are exceedingly unlikely, attributing this to advancements in reactor design that can withstand heavy bombardments. Furthermore, civilian power plants are not core to Iran’s nuclear weapons program and are unlikely to be prioritized targets for Israel, he says. Bushehr, Iran’s only functioning nuclear power facility, has not been targeted thus far.

Despite assurances from scientific experts, New Scientist reports that IAEA Director Rafael Grossi cautioned earlier this week about the real risks of harm.

“I have consistently stated that we should never attack nuclear facilities, irrespective of the circumstances, as they can pose hazards to both humanity and the environment,” he asserted.

topic:

Source: www.newscientist.com

Teenager Tragically Killed in “Dingdong Ditch” TikTok Prank Incident

A Virginia man is facing two counts of murder following the fatal shooting of a teenager who was filming a TikTok prank called “Ding Dong Ditch” with friends around 3 AM on Saturday, as reported by court documents and local officials.

The Spotsylvania Sheriff’s Office responded to a shooting report involving a resident during a robbery, discovering two teenagers with gunshot wounds. According to the Sheriff’s Office, one of the teenagers, Michael Bosworth Jr., 18, later succumbed to his injuries. The second teen was treated for minor injuries, while a third member of the group was unharmed. Both friends accompanying Mr. Bosworth were under 18.

The teenager had been in the area to create a TikTok video, as stated in an affidavit submitted to the Spotsylvania Circuit Court. The “Ding Dong Ditch” prank involves ringing a doorbell or knocking before fleeing, making it a prevalent trend on social media.

According to the affidavit, “The boy explained that this is a common activity for TikTok creators.”

The group was knocking on various doors in the neighborhood, with one teen mentioning they were not familiar with the area. They fled the house when shots were fired, and the affidavit indicates there is at least one video of the prank remaining on a friend’s phone.

Tyler Chase Butler, 27, from Spotsylvania County, was arrested on Tuesday on charges of second-degree murder, aggravated malicious wounding, and using a firearm during a felony, according to the Sheriff’s Office. He is not currently held at Rappahannock Regional Jail.

Mr. Bosworth was a senior at Massaponax High School in Fredericksburg, Virginia. The school is set to hold senior graduations on May 13th, and has announced that counselors will be available to support students during this difficult time.

A representative from the Spotsylvania Sheriff’s Office declined to provide further comments when contacted. Butler’s legal team did not respond to requests for comments immediately. Federal attorney G. Ryan Mehaffey for Spotsylvania County also refrained from comments, noting a preliminary hearing is scheduled for June 18th.

This kind of prank has resulted in severe consequences in the past. In 2020, a California man, after being pranked in a similar way, crashed his vehicle into a group of six teenagers, leading to the tragic deaths of three. He received a life sentence in 2023.

On Tuesday, a group of students gathered on the soccer field of Massaponax High School to honor their classmate. A video published on an Instagram account run by students showcased their reflections about Mr. Bosworth, who they honored by writing messages on balloons and releasing them at sunset.

Jonathan Wolf and Michael Levenson contributed to this report. Susan C. Beach assisted with research.

Source: www.nytimes.com

SpaceX successfully launches spacecraft rocket on test flight following pre-explosion incident

SpaceX is set to launch the Starship Megarocket on its upcoming test flight on Monday, approximately six weeks after the top stage of the vehicle exploded over the Atlantic during its final test.

Following the incident on January 16th, SpaceX lost contact with Starship about eight minutes after the flight, leading to subsequent explosions that scattered debris and small fragments near Turks and Caicos. Local authorities confirmed no injuries occurred.

The US Federal Aviation Administration initiated an investigation after the accident and grounded the rocket during the probe. On Friday, the agency announced clearance for the spaceship to resume flights, although the investigation remains ongoing.

SpaceX’s own investigation identified the “attic” section as the source of the leak that caused propellant to escape, triggering a fire and shutting down most of the spacecraft’s engines in a controlled sequence.

Strips of the recent SpaceX launch dotted the sky on January 16th.
Courtesy Todd Martin

Data transmission ceased over eight minutes into the test flight, resulting in the vehicle disintegrating three minutes later.

Subsequent to the incident, SpaceX implemented several hardware and operational modifications to Starship’s upper stage, without disclosing specific details of the upgrades.

The eighth test flight for Starship, originally planned for Friday, encountered brief delays without explanation.

The FAA green-lit the flight, amidst broader fiscal and personnel reductions targeting various federal agencies during the Trump administration’s tenure. Reuters reported that the Government Efficiency Bureau, spearheaded by SpaceX’s Elon Musk, engaged with the FAA, with SpaceX engineers assisting as specialized government personnel.

The existence of Doge personnel within the FAA’s commercial spaceflight division overseeing private companies like SpaceX remains undocumented, prompting some lawmakers and critics, including Senator Ed Markey, to voice reservations regarding potential conflicts of interest.

The planned Monday launch aims to deploy four mock Starlink satellites mid-flight, marking the first payload release by the vehicle.

Upon separation from the second stage, Starship’s first Hull King stage is slated to return to the launch pad, where SpaceX intends to “catch” it using extensive mechanical equipment at the rocket’s launch tower. This stage was successfully retrieved during the January flight, signaling partial testing success for the company.

The catch maneuver is pivotal in SpaceX’s ambition to establish Starship as a fully reusable rocket system.

If the launch proceeds as planned, the upper stage will soar for about an hour on Monday before splashing down in the Indian Ocean off Western Australia.

Standing at 400 feet tall, the spacecraft constitutes the most potent rocket ever developed, comprising a super-heavy first-stage booster and an upper-stage spaceship.

Envisioned to play a crucial role in NASA’s moon missions, SpaceX has been selected by the agency to ferry astronauts during the Artemis III mission scheduled for 2027. Musk hinted at potential application for future Mars missions utilizing the spacecraft.

Source: www.nbcnews.com

Former Microsoft worker claims company crumbled due to the stress of Gaza vigil incident

Two Microsoft employees, recently terminated for organizing a vigil in memory of slain Palestinians in Gaza, allege that their dismissal was a form of retaliation by the company for their pro-Palestinian stance.

Abd Mohamed, a researcher and data scientist, along with Hossam Nasr, a software engineer, orchestrated the vigil outside Microsoft’s Redmond, Washington headquarters on October 24th, only to be fired later that evening.

Nasr voiced, “Microsoft caved to internal and external pressures to retaliate by terminating my employment and shutting down events. It wasn’t due to policy infractions, but simply because we dared to humanize Palestinians and challenge Microsoft’s association with a military accused of genocide.” Nasr’s show of support for Palestine has garnered attention on social media and employee communication platforms within Microsoft.

Both individuals were part of No Azure for Apartheid, a group within Microsoft advocating against the sale of the company’s cloud computing technology to Israel.

The group is urging Microsoft to terminate all Azure contracts and partnerships with Israel, demand a cease-fire in the Gaza conflict, and uphold the freedom of speech for employees.

Microsoft refuted claims that the dismissals were related to activism. A company spokesperson emphasized the importance of maintaining a professional work environment while ensuring compliance with policy and behavioral expectations.

Mohamed and Nasr contest the notion that the vigil was disruptive or violated Microsoft’s policies. They assert that the event was conducted to raise funds for humanitarian efforts in Gaza and followed standard procedures for employee charity events.

More than 200 employees participated in the vigil, either in person or virtually, as reported by There is no azure in apartheid.

Nasr and Mohamed maintain that they had engaged with Microsoft beforehand to address any concerns about the vigil, which was an act of remembrance for Palestinian lives lost in the conflict and to spotlight Microsoft’s ties with Israel.

At the time, Nasr received a call from Microsoft at 9 p.m. on October 24, although groups had announced his termination on social media earlier.

The No Azure for Apartheid group views the terminations as retaliatory and accuses Microsoft of intimidating Palestinian voices. They seek reinstatement and clarification on the premature disclosure of the dismissals.

Source: www.theguardian.com

BBC Presenter Deceived into Using AI-Generated Voice for Advertisement: A Portrait of the Incident

Her voice seemed off, not quite right, and it meandered in unexpected ways.

Viewers familiar with science presenter Liz Bonnin’s Irish accent were puzzled when they received an audio message seemingly from her endorsing a product from a distant location.

It turned out the message was a fake, created by artificial intelligence to mimic Bonnin’s voice. After spotting her image in an online advertisement, Bonnin’s team investigated and found out it was a scam.

Bonin, known for her work on TV shows like Bang Goes The Theory, expressed her discomfort with the imitated voice, which she described as shifting from Irish to Australian to British.

The person behind the failed campaign, Incognito CEO Howard Carter, claimed he had received convincing audio messages from someone posing as Bonin, leading him to believe it was the real presenter.

The fake Bonin provided contact details and even posed as a representative from the Wildlife Trust charity, negotiating a deal for the advertisement campaign. Carter eventually realized he had been scammed after transferring money and receiving the image for the campaign.

AI experts confirmed that the voice memos were likely artificially generated due to inconsistencies in accent and recitation speed. Bonin warned about the dangers of AI misuse and stressed the importance of caution.

Incognito reported the incident to authorities and issued a statement cautioning others about sophisticated scams involving AI. They apologized to Bonin for any unintended harm caused by the deception.

Neither the BBC nor the Wildlife Trust responded to requests for comments on the incident.

Source: www.theguardian.com

Twitter War Erupts as Bot Armies Clash over China’s Balloon Incident

Chinese reconnaissance balloon flies over Canada and the United States just before being shot down over South Carolina in 2023

Joe Granita/ZUMA Presswire/Shutterstock

When Chinese reconnaissance balloons flew over the United States and Canada last year, tens of thousands of bots competed to shape the discussion on Twitter, according to an analysis of social media posts.

Kathleen Curley and Lynette Hui Xiang Ng A research team from Carnegie Mellon University in Pennsylvania tracked approximately 1.2 million tweets posted by more than 120,000 users on Twitter (later renamed to X) between January 31, 2023 and February 22, 2023. did. All tweets included the hashtags #chineseballoon and #weatherballoon and discussed the controversial airborne. The US claimed that China used it for espionage.

Tweets were then located using Twitter's location feature and checked with an algorithm called . bot hunterlook for signs that the account is not managed by a human.

“There are many things going on. [identifying a bot] Examples are whether messages are being sent so fast that a human could literally not type them that fast, or if someone is geotagged for one minute in London, but in New Zealand a person can physically type For example, if it is not possible. Please do that,” says Carly.

Researchers found that about 35 percent of geotagged users in the U.S. exhibited bot-like behavior, while 65 percent appeared to be human. In China, the proportions were reversed, with 64 percent bots and 36 percent humans.

Of the accounts claiming to be from neither country, 42 percent were bots and 58 percent were human. Although reliable numbers are difficult to come by, previous research suggests that 10-20% of Twitter users are bots. The bot autonomously performs tasks such as sending her Twitter messages to users on the platform and “liking” other posts.often used to try influence public opinion.

“We're seeing more bot activity in tweets that appear to be coming from Chinese communities than we are seeing coming from American communities,” Curley said. The overall rate of bot accounts was also higher during the Chinese spy balloon debate than at other events, researchers said.

As an example, a bot based in China posted: “#USA #China #February 14th” […] Some may speculate that the US is using the #China spyballoon “excuse” to escalate tensions with #Beijing. Remember, US airspace is highly controlled and we have more accurate satellite technology for spying. ”

Neither Carley nor Ng would speculate on who might be behind the bot. stephen buckley Researchers at City University of London said: “There is likely to be a mix of state and individual actors seeking to sway and manipulate public opinion regarding breaking news.”

As for whether bot activity has made a difference, Curley said: “The fact that bots speak a little differently to humans means what people were reading will look a little different and future conversations will look different.” Buckley says it's important to be “very wary” of content you post and assume it wasn't posted by a human.

topic:

Source: www.newscientist.com

Get Ready to Be Amazed by the AI, Post Office Horizon Incident

For over 16 years, a large corporation relentlessly accused 900 postmasters of theft, false accounting, and fraud, despite the fact that the branch shortages were actually due to an accounting bug. It’s easy to understand the possible consequences of such accusations. The software enforced by the company is now being considered “one of the greatest miscarriages of justice in our nation’s history.”

However, Rishi Sunak lacks imagination. On the other hand, the U.S. Marine Corps has coined an economic term that perfectly describes the Horizon fiasco as a “clusterfuck.” The Cambridge Dictionary primarily defines this as “a very rude word for a complete failure or a very serious problem.” Many mistakes and problems occurring at the same time.

Horizon was a product of the flawed and sometimes ignorant IT procurement system that the British state relied on for decades. The system procured from its ICL offshoot, owned by the Japanese giant Fujitsu, was a sprawling, computer bug-filled monster.

The plan was to replace the post office’s paper-based accounting system, but the hasty rollout for 13,000 busy, non-technical postmasters starting in 1999 was inadequately trained for the scale of the workflow transformation involved. Users quickly discovered bugs and flaws in the system, but the post office administrators showed a blind trust in the technology, leading to the prosecution of the sub-postmasters, ruining their lives and even leading to suicides.

Horizon was an electronic POS system that replaced paper-based cash registers and was networked, theoretically allowing the Post Office to keep an overall record of cash flows across the country. However, it seemed the system was “simply not up to the task it was asked to do,” according to The Guardian’s Alex Hearn.

By 2001, a team led by one of the system’s developers had discovered “hundreds” of bugs. Although a full list has not been compiled, court records revealed several examples, including the “Dalmellington Bug,” which caused the screen to freeze while the operator was trying to confirm receipt of cash. Each time the user pressed the Enter key on a frozen screen, the record was silently updated, making the subpostmaster responsible for the result.

The most peculiar part of the story is how long it took for the truth to emerge in the political system. Journalists have continued to tell the stories of Horizon’s victims, and a class action lawsuit was filed against the post office, with a public investigation beginning in 2020.

It wasn’t until ITV aired “Mr Bates vs. Post Office” that the issue became a hot political topic. The power of drama changed public opinion and revitalized the government. If there’s one major lesson to be learned from this mess, it’s the blind faith in technology that companies purchased at high prices. Now, organizations are increasingly adopting artificial intelligence, which may lead to further injustices in the future.

John Norton is Minderoo Center for Technology and Democracy, Cambridge

Source: www.theguardian.com

Post Office Memo from 25 Years Ago Predicts Scandal: The Post Office Horizon Incident

I
In any major scandal that has the power to monopolize national attention, there are always key moments when events could have been stopped in their tracks. But few early warnings were as prescient as his seven-page memo handed to postal workers 25 years ago.

During an acrimonious meeting at Newcastle Rugby Club in 1999, the memo set out a number of concerns raised by postmasters in the north-east of England who were trialling the now infamous Horizon accounting system. It had been. Problems such as account balances caused stress for some people, forcing them to work late into the night.

Shortly after these concerns were raised, the subpostmasters met again to discuss the potential severity of the problem.
“The hardship and trauma that some postmasters are experiencing has raised concerns about their health and mental well-being,” the meeting was informed.

“Some felt that unless something changed soon, tragedy was not far away. The software was of poor quality and was not intended to run such a large network. Ta.”

Warnings of potential tragedy come as the flawed software – later found to have the potential to cause false losses that were blamed on postal workers – is rolled out across the Post Office network. done before.

But from the moment of the fateful decision to press forward with this destiny, a disastrous combination of legal change, geopolitics, a catastrophic lack of political curiosity, and above all outright deception, ultimately led to Thousands of innocent workers were victimized and prosecuted, with devastating effects.

At least four people took their own lives this week, the week in which Westminster finally acknowledged that unprecedented mass exonerations were needed to right more than two decades of injustice. Sadly, it was too late for the dozens of postmasters who were wronged and died, including one who died.




Former Posts Minister Paul Scally announced an independent inquiry into the Horizon scandal in 2020. Photo: Bloomberg/Getty Images

Source: www.theguardian.com

The Webb’s ERO-BluDOG Mix-Up: A Space Incident of Mistaken Identity

Researchers re-evaluated extremely red objects (EROs) in the JWST data and found similarities with BluDOGs previously identified from Subaru Telescope data. This discovery contributes to a broader understanding of quasar evolution and points to the need for further research using advanced telescopes like GREX-PLUS. Credit: SciTechDaily.com

Space researchers have discovered that extremely red objects (EROs) exist in space. james webb space telescope This data is similar to the Subaru Telescope’s BluDOG, challenging previous assumptions and highlighting the complexity of studying quasar evolution.

Not every discovery is actually a new discovery. This is the case for extremely red objects (EROs) found in the James Webb Space Telescope (JWST) data. The analysis showed that it is very similar to a blue-excessive dust-covered galaxy (BluDOG) previously reported using data from the Subaru Telescope.

Quasars, some of the brightest objects in the universe, are powered by supermassive black holes with masses that can reach more than a billion times that of the Sun. Although these objects are the focus of much research, how they form is still poorly understood. A leading theory is that quasars form within galaxies with clouds of gas and dust that obscure the growing quasar until they become powerful enough to blow away the clouds. If this is true, we should be able to catch a short window of time when a quasar breaks out of the cloud.

A galaxy covered in blue excess dust (BluDOG) photographed by the Subaru Telescope.Credit: National Astronomical Observatory of Japan/HSC cooperation

Because the transition period is short, we must observe a large number of prequasar candidates and hope that we are lucky enough to catch a galaxy just as the quasar begins to erupt. Examining the JWST data, a group of extremely red objects (EROs) were identified as possible transitional quasars. But researchers at the Subaru telescope, a Japanese telescope in Hawaii, say that although ERO is called “red,” it is similar to the blue-excess dust-encrusted galaxy (BluDOG) found in big data. I noticed that it also has an important blue component. It was obtained from the Subaru Telescope and described in last year’s report.

Our analysis shows that ERO and BluDOG are likely objects of the same class, but that there are also important differences. One possibility is that ERO is at an earlier stage of evolution than BluDOG. More candidate samples need to be collected to determine the true relationship between ERO, BluDOG, and quasars. Larger samples will be studied by next-generation astronomical instruments, including a planned infrared space telescope project in Japan called GREX-PLUS.

References:

“Similarities between the compact, very red object discovered by JWST at the dawn of the universe and the blue, dust-covered galaxy known at the noon of the universe” Akatoki Noboriguchi, Akio Inoue, Toru Nagao, Yoshiki Toba, Toru Misawa, December 14, 2023 of Astrophysics Journal Letter.
DOI: 10.3847/2041-8213/ad0e00

“The extreme properties of four blue dust-covered galaxies revealed by optical spectroscopy” Akatoki Noboriguchi, Toru Nagao, Yoshiki Toba, Kohei Ichikawa, Masaru Kajisawa, Nanako Kato, Toshihiro Kawaguchi, Hideo Matsubara , Yoshiki Matsuoka, Kyoko Onishi, Masafusa Onoe, Nozomu Tamada, Koki Terao, Yuichi Terashima, Yoshihiro Ueda, Takuji Yamashita, December 23, 2022, of astrophysical journal.
DOI: 10.3847/1538-4357/aca403

“Optical properties of galaxies covered with infrared bright dust seen with Subaru Hyper Supreme Cam” Akatoki Noboriguchi, Toru Nagao, Yoshiki Toba, Mana Niida, Masaru Kajisawa, Masafusa Onoe, Yoshiki Matsuoka, Takuji Yamashita, Yuyan Zhang , Toshihiro Kawaguchi, Yutaka Komiyama, Kodai Nobehara, Yuichi Terashima, Yoshihiro Ueda, May 13, 2019, astrophysical journal.
DOI: 10.3847/1538-4357/ab1754

Source: scitechdaily.com