As Atmospheric Rivers Persist, Washington’s Infrastructure Faces Collapse.

Numerous levees have collapsed, over a dozen highways have been shut down, and one fatality has been reported in Washington state as an atmospheric river storm continues to hammer the area, putting its infrastructure to the test.

Although the state’s dams and levees managed to withstand the initial wave of last week’s storms, the ongoing rainfall is beginning to overwhelm some levees.

Additionally, various low-lying areas in Western Washington remain inundated with slowly subsiding floodwaters.

During a news conference on Tuesday, Governor Bob Ferguson reported that there have been over 1,200 rescues across 10 counties since December 8. Thirteen state highways remain closed, and Highway 2, a key route across the Cascades, may remain shut for months. Interstate 90, the largest highway in the state, is also blocked due to a significant landslide.

“Our infrastructure is under significant strain,” Ferguson stated. “It has been compromised.”

Flooding occurred on Francis Road in Skagit County, Washington on Friday.
Evan Bush/NBC News

A 33-year-old man lost his life early Tuesday in Snohomish County, north of Seattle, when his car veered off into a ditch on a submerged rural farm road.

“We believe this marks the first fatality linked to this storm,” Ferguson commented, noting it was somewhat miraculous that there haven’t been additional casualties.

Courtney O’Keefe, public information director for the Snohomish County Sheriff’s Office, stated that the man was driving a Chevrolet Tahoe that drove through a traffic stop as his car began to flood. He called a friend, prompting them to contact 911 for help.

“There’s a ditch right next to the road. During flooding, it’s challenging to determine where the road ends and the ditch starts,” O’Keefe noted, mentioning that the tragic accident is still being investigated.

In the last two days, two levees have failed in the suburbs of Seattle.

The latest incident occurred Tuesday morning in the town of Pacific, close to the White River.

“A leak as wide as a fire hose was detected last night around 12:30,” informed Sheri Badger, a spokeswoman for the King County Emergency Management Agency. “It has since increased to approximately 120 feet in length.”

The semi-permanent embankment was built with HESCO Barrier, a mesh and fabric structure filled with sand, earth, and gravel. Badger explained that barriers were stacked atop one another, with water seeping through the gaps.

An evacuation advisory has been issued for 1,300 residents in the area. Crews are actively adding sandbags and “super sacks” to reinforce the breach.

On Monday, a six-foot section of another levee gave way in Tukwila, a locality on the Green River south of Seattle. King County ordered an evacuation for around 1,100 individuals, but crews managed to promptly repair the breach, limiting the damage.

The embankment had been previously damaged by flooding about four years ago and remained partially unrehabilitated.

At least two dams are currently being monitored for cracks or potential failures, according to the state Department of Ecology. One such dam is Lake Sylvia Dam, which is classified as “poor condition” with “significant” risks as per the National Inventory of Dams, with the last inspection conducted in November 2024. It was built in 1918.

Spokesman Andrew Weinke indicated that several roads could be at risk in the event of a dam failure, but there would be no immediate repercussions for homes or residents.

Much of western Washington is traversed by rivers that flow steeply from the Cascade Mountains. These rivers, which drain into Puget Sound, historically meandered across wide floodplains, forming a complex network. However, over a century ago, much of it was dammed and straightened for potable water, flood control, and hydroelectric energy generation. As a result, streams evolved into channelized rivers, akin to superhighways for water flow.

Since that time, levee systems have been reinforced to contain the water, with homes and industrial buildings often constructed near the floodplain’s edges.

Certain areas that have experienced severe flooding previously are likely to be inundated again.

On Monday, a house was surrounded by floodwaters in Sumas.
Brandon Bell/Getty Images

Atmospheric rivers, such as the recent storm systems, appear like fire hoses on weather radar.

These storms are often referred to as the “Pineapple Express” as they can carry humidity and warmth from Pacific waters near Hawaii and other tropical regions.

The Pacific Northwest typically handles one or two of these storms without significant impact; however, three heavy rain events have occurred since December 8. Some parts of the North and Central Cascades received up to 16 inches of rain within three days, making them the steepest and most rugged mountains in the continental United States.

“The atmospheric river phenomenon was considerable, but not unprecedented,” stated state climatologist Guillaume Mauger. “What stands out is the consecutive nature of these storms.”

Members of a Sumas household were working on Monday to repair their homes, which were flooded during last week’s heavy rains.
Brandon Bell/Getty Images

He noted that more intense river flooding is anticipated in the future as rising temperatures will lead to increased rainfall rather than snowfall. As the climate warms, rainfall also tends to become more intense.

One study predicts flooding along the Skagit River by the end of this century, with potential volumes increasing by nearly 50% every 100 years by the 2080s. Given that the river already has dams, existing flood control measures are deemed “mostly ineffective,” the study found.

Mauger suggested that the best approach to mitigate future risks is to provide rivers with more space.

As more storms are on the horizon, dam operators are compelled to redirect water to upstream reservoirs to avert potential flooding.

John Taylor, Director of King County Natural Resources and Parks, mentioned that officials are closely monitoring several levees of concern and reinforcing those known to be weak.

“We’ve noticed that levees, which typically perform well during floods, are starting to fail due to saturation and significant pressure,” he explained.

The Skagit and Snoqualmie rivers are expected to reach or surpass major flood stage by Thursday morning.

Source: www.nbcnews.com

India’s Identity Card System Sparks Mixed Reactions: ‘Life Infrastructure Will Be Monitored at Every Step’

It’s hard for many in India to envision life before Aadhaar. Digital biometric IDs, which claim to be accessible to all Indians, were rolled out just 15 years ago, yet they have become an integral part of daily life.

An Aadhaar number is now essential for purchasing a home, securing employment, opening a bank account, paying taxes, receiving benefits, buying a vehicle, obtaining a SIM card, booking priority train tickets, and enrolling children. Infants receive their Aadhaar number immediately after birth. Although it is not obligatory, lacking an Aadhaar effectively renders one invisible to the state, according to digital rights advocates.

For Umesh Patel, 47, a textile businessman in Ahmedabad, Aadhaar has been a welcome change. He reminisces about the days of hauling stacks of paperwork to government offices just to verify his identity, often with little success. Now, with a quick glimpse of his Aadhaar, “everything flows smoothly,” he said, viewing it as “a testament to how our nation utilizes technology for its citizens’ benefit.”

“It’s a solid system that has simplified our operations,” Patel asserts. “Moreover, it enhances our country’s security by minimizing the risk of forged documents.”

“Aadhaar has become an integral part of Indian identity.”

The initiative has been deemed so effective that it caught the attention of the UK government, which considered the introduction of mandatory ID cards for its citizens. However, digital rights groups, activists, and humanitarian organizations highlight a less favorable perspective of Aadhaar and its effects on Indian society.

For some of India’s most underprivileged and least educated individuals (those unable to engage with the Aadhaar system due to issues like illiteracy, lack of education, or missing documentation), the system can be exclusionary and punitive, denying essential access to welfare and employment. With increasing moves to link Aadhaar to voting rights and citizenship, concerns arise that it may further disenfranchise and stigmatize the impoverished.

Apal Gupta, founder and director of the Internet Freedom Foundation in Delhi, stated that Aadhaar has become a digital obligation for many people in India, as Aadhaar-based verification is required to access government services, enter public venues, or carry on with their daily activities.

Mr. Gupta asserted that Aadhaar has “metastasized” since its inception, morphing into an extensive bureaucratic network of unique IDs required for business operations. “The essence of your existence is scrutinized at every juncture,” he remarked.

Critics contend that the current draft of India’s data protection and privacy law is inadequate for safeguarding privacy or preventing potential misuse of the invaluable Aadhaar database, which includes biometric data such as photos, facial and iris scans, and fingerprints of over a billion Indians.

Indian media has uncovered multiple instances of Aadhaar data breaches over the years, including a 2018 incident where data pertaining to 1.1 billion individuals was found to be sold online for a mere 500 rupees (£5).

Keir Starmer met Narendra Modi in Mumbai last week. During his visit, Mr. Starmer described the Aadhaar system as a “huge success”. Photo: Stéphane Rousseau/AFP/Getty Images

“According to this yet-to-be-notified law, there is no mechanism to ascertain if a data breach has been documented, and there is a lack of oversight on how Aadhaar data is consolidated with other databases, risking broader public surveillance and tracking,” Mr. Gupta noted. “Transparency is entirely absent.”

Although Aadhaar was initiated before Prime Minister Narendra Modi assumed office in 2014, his governing Bharatiya Janata Party (BJP) has significantly promoted and expanded the digital ID initiative. As India prepares to host the G20 summit in 2023, Prime Minister Modi referenced Aadhaar as one of the flagship achievements of ‘Digital India’, which he describes as an incubator for innovation. He asserts that India has saved over $22 billion by combating corruption in the welfare system.

The government highlights the extensive uptake of Aadhaar as an indicator of its success and inclusivity. As of last month, more than 1.42 billion Aadhaar numbers had been generated, corresponding to roughly the entire population of India, making it the largest digital identity program globally. Before this initiative, over 400 million Indians lacked any official identification and were unable to access banking services.

Yet the reality, particularly in rural and tribal regions, diverges sharply from the image portrayed by the government, as noted by Chakradhar Buddha, a senior researcher at Livetech India, an organization aimed at assisting those marginalized by India’s transition to digitalization.

Skip past newsletter promotions

“The deprivation of Aadhaar is pervasive among tribal communities, people in mountainous regions, and those in remote areas, and this reality is largely overlooked,” Buddha stated.

“This situation arises partly from a lack of proper documentation or incomplete documentation capture. Moreover, technological advancements create further obstacles that disproportionately affect the most vulnerable populations. Ultimately, this system undermines access to crucial social security and welfare for those most in need.”

Mr. Buddha challenged the government’s assertion that Aadhaar represents an infallible form of identification, recounting numerous instances where incorrect names and details led to significant issues for communities. For instance, in one village, tribal individuals lacked birth certificates and were assigned January 1 as their birthdate, while tribal names are often misspelled on Aadhaar cards due to unfamiliarity among officials.

Highlighting the recent example of millions of impoverished workers being erroneously removed from government support systems after the implementation of Aadhaar certification, Buddha cautioned that using Aadhaar as the universal standard for voting rights could result in “mass purges of the poorest from electoral registers.”

“These individuals have already been stripped of social equality. Now, Aadhaar is being utilized to deny them their right to political equality and universal suffrage,” Buddha stated.

Among those recently at risk of lacking an Aadhaar card was Ahram Sheikh, 34, an uneducated worker, who had important identification documents, including his Aadhaar card, stolen while on a train.

The aftermath was a nightmarish experience. He couldn’t recall his Aadhaar number from a decade earlier, rendering him unable to obtain a replacement card. Without it, he had to discontinue his construction job, losing crucial income for his family, and as a result, his son ultimately dropped out of school.

Months later, after traveling thousands of miles back to his village, Sheikh remained unable to resolve the issue and secure a new card. He now lives in constant fear of being declared an illegal alien without it.

“This Aadhaar system has turned into a nightmare for us. Why can’t the government establish proper institutions?” Sheikh lamented. “Everything in this country works against the poor, and this Aadhaar card is no exception.”

Aakash Hassan contributed reporting

Source: www.theguardian.com

Chip tariffs bolster US AI infrastructure as Nvidia looms larger.

Nvidia, a chip designer, has announced plans to invest up to $500 million (£37.8 billion) in artificial intelligence infrastructure in the United States over the next four years. This move comes in response to President Trump’s tariffs, with signs of manufacturers shifting their investments to American businesses.

The decision follows Trump’s recent tariffs on semiconductors, which are primarily produced by Nvidia in Taiwan. The company’s CEO, Jensen Huang, visited the president at Mar-a-Lago earlier this month, prompting repeated threats from Trump. Nvidia aims to establish fully operational “supercomputer” facilities in the US and collaborate with manufacturing partners to construct factories.

Production of the Blackwell graphics processing unit has already commenced at the TSCM’C factory in Phoenix, Arizona. Additionally, new plants are being developed at Foxconn in Houston and Wistron in Dallas, with expectations of increased mass production within the next 12-15 months.

Huang emphasized that enhancing American manufacturing capabilities is crucial for meeting the growing demand for AI chips and supercomputers, thereby strengthening the company’s supply chain and resilience.

The White House hailed Nvidia’s commitment as a result of the “Trump effect.” Nvidia’s stock market value has surged over the years, driven by the demand for AI chips, but faced challenges due to tariff uncertainties resulting in a drop in stock prices.

Global markets reacted cautiously, hoping for some relief from Trump’s new taxes. While markets in Japan and South Korea rose, Hong Kong and China experienced declines. In Europe, markets showed gradual recovery, with the UK’s FTSE 100 index rising, along with Germany’s DAX and France’s CAC.

Trump’s plans to impose tariffs on semiconductor and drug imports have raised concerns. The US Department of Commerce has launched an investigation into the impact on national security. Amidst these decisions, companies like Novartis are investing in the US drug sector to mitigate tariff threats.

Source: www.theguardian.com

Is Ireland’s Extended Neutrality Putting It at Risk for Infrastructure Attacks? |Ireland

The internet’s foundation is crucial for various services, from entertainment platforms like TikTok to essential functions like emergency services, banking systems, and political and military communications.

However, the network of undersea cables around the coasts of Great Britain and Ireland has been targeted by military, terrorist, or criminal actors, leading to incidents where internet cables were cut, disrupting communication in the Baltics. As 75% of transatlantic cables pass through or are near Ireland, the strategic importance of these cables is significant for the UK and Europe.

Recent incidents, such as cable cuts between Finland and Estonia, have raised concerns about the security of Ireland’s exclusive economic zone (EEZ) that extends beyond its coast.

Ireland’s neutrality and limited defense capabilities have left the country vulnerable to potential threats. Calls have been made for a reassessment of Irish defense policies and the need to secure vital infrastructure.

There is growing recognition that Ireland’s neutrality may not shield it from modern threats, and steps must be taken to protect against potential attacks on critical infrastructure.

submarine cable map

Current discussions are focusing on Ireland’s vulnerability, the need for increased defense resources, and potential collaborations with other countries facing similar security challenges.

Efforts are being made to address gaps in surveillance capabilities and response mechanisms to safeguard critical undersea infrastructure from unexpected threats.

The Russian ship Yantar will be observed by a Royal Navy ship when it enters British waters in January. It was discovered in the Irish Sea in November. Photo: Royal Navy/PA

Ensuring the security of undersea cables in Europe is essential for safeguarding communication networks and vital services across the continent.

Collaboration and investment in defense capabilities are key to protecting critical infrastructure and responding effectively to emerging threats in the undersea domain.

It is imperative for countries to prioritize the security of undersea cables and strengthen their defense forces to address potential vulnerabilities in the global communication network.

By enhancing surveillance, response capabilities, and international cooperation, nations can mitigate risks and ensure the resilience of undersea infrastructure.

Source: www.theguardian.com

Is Africa’s esports industry growing rapidly, but is the infrastructure able to keep pace?

On a recent Sunday afternoon in Nairobi’s upscale neighborhood, Daniel Badu had his headphones wrapped around his head, his elbow resting on a pillow, and he was rapidly tapping on the screen of his cell phone.

Badu and his four teammates from the Ora 233 team, all wearing black and yellow kits, represented Ghana and Kenya’s Delta e in the final of the 1st Carry 1st Africa Cup, a continental tournament for first-person shooter videos. They were competing in the popular game “Call of Duty: Mobile”.

Esports events are on the rise in Kenya and other parts of Africa, due in part to increased access to the internet and devices such as smartphones, PCs, and gaming consoles. Popular titles include EA Sports FC, Call of Duty, and Tekken.

Daniel Badu aka Ruin of Ghana’s Aura 233 team at Carry1st Africa Cup Final. Photo: Edwin Ndeke/Guardian

To cater to the growing interest, professional teams, university leagues, national federations, and competitions such as the Carry1st Africa Cup have been established.

The trend is part of a growing interest in video games in general in Africa, which has one of the continent’s youngest populations. 2021 Report It said the number of video game consumers on the continent increased from 77 million to 186 million from 2015 to 2021.

Some of them have now moved on to professional gaming. Badu, known by the game’s alias Ruin, started playing Call of Duty: Mobile in 2019 after years of playing console games.

“I’ve been playing video games for as long as I can remember,” the 19-year-old said. Badu began his professional journey by joining various lower-tier teams to gain experience, showcase his skills, and make a name for himself. Last year, he was scouted by Ace Gamers Esports, a professional esports organization based in Accra, and signed a contract after a trial.

Ace Gamers also recruits, trains, and manages players for EA Sports FC, Apex Legends, Mortal Kombat, and other games. Badu said the contract gives him the opportunity to improve his game by playing with like-minded people and also gives him access to tournaments. “I have made it this far by playing the game and continuing to hone my game, so I can compete with the best players in Africa,” he said.

Spectators watch the Carry 1st Africa Cup Final at the Nairobi Game Development Center on November 24. Photo: Edwin Ndeke/Guardian

At the event in Nairobi, production staff sat behind large monitors selecting shots for the livestream. One floor below, the audience cheered and screamed as they watched the action unfold on television screens.

After seven months of qualifying events involving over 100 teams in Egypt, Ghana, Kenya, Morocco, Nigeria, and South Africa, six teams advanced to the two-day Carry1st Africa Cup finals, with South Africa’s Noxious Gaming ultimately Winning the championship (NxG).

“Large esports events are a great way to synergistically increase the attention of all gamers and drive interest from new gamers,” says Senior Community Manager at Carry1st, a pan-African games publisher headquartered in the Cape. said Dominion Eromosere, cum event leader. town.

Since its founding in 2018, the organization has hosted more than 400 tournaments, primarily through universities. Its online network, Tribe, attracts hundreds of thousands of gamers from across the continent.

Grassroots, national, and continental tournaments are becoming an important way to discover talent, hone player skills, and increase the popularity of esports. Other events taking place this year include the IESF Africa Esports Championship in Casablanca in August and the women-only Tekken Kongou Esports Championship in Kinshasa in November.

Skip past newsletter promotions
Members of the South African Noxious Gaming (NxG) team that won the inaugural Carry1st Africa Cup. Photo: Edwin Ndeke/Guardian

“The tournament breathes life into the ecosystem,” said Magdaline Mumbi, who finished fourth for Kenya at the Kinshasa Games. Mumbi, whose gaming nickname is Bambina, was a casual PlayStation gamer until six years ago when he competed in a Tekken tournament at a university event and came in second place.

From that point on, she began playing several games competitively while seeking mentorship in the Kenyan esports community. She made the leap by being selected for the national team to participate in the Dota 2 Battle Arena Games, a global Esports game, to be held in Turkey in 2022. “2022 allowed us to see a bigger picture of what esports is all about,” Mumbi said. “You can actually make money doing this.”

Magdaline Mumbi, aka Bambina, participated in the Kongo Esports Championship in Kinshasa in November. Photo: Magdaline Mumbi

For the African scene to further grow and compete in the global multi-billion dollar esports industry, it will need to overcome technological and financial challenges.

Poor internet infrastructure often results in poor connectivity. Also, because most games’ servers are hosted outside of Africa, there is often a delay between the device you play on and the server, an issue known as “high ping,” which can make intercontinental matches and matches between players from different African countries difficult.

“A lot of esports is rooted in online multiplayer gaming, and Africa doesn’t have the best infrastructure. [for this]” Badu said. “[African players] are at a huge disadvantage.”

Carry1st is working to address that issue. For the past two years, the company has partnered with game developers to help launch servers for Call of Duty: Mobile and tactical shooter Valorant in Africa.

Financially, it’s difficult to get player sponsorship, and above all, there are very few tournaments that pay out big bucks. The total prize money for the Nairobi tournament was $15,000. “Limited funding and sponsorship are hitting the field hard,” said Mumbi, who is also a chess instructor.

“If we can prove how entertaining e-sports is and how many people are watching it, people will invest in it,” Eromose said.

Source: www.theguardian.com

Research indicates that the Aurora Borealis may soon jeopardize our power infrastructure

Seeing the Northern Lights is a dream for many, and the recent intense geomagnetic storm in May provided that opportunity for some. However, scientists are becoming increasingly concerned about the threat these natural light displays pose to modern infrastructure.

New research has revealed a connection between the Northern Lights and strong electrical currents known as geomagnetically induced currents (GICs), which can cause damage to critical infrastructure like pipelines and undersea cables.


Researchers have found that the angle at which an interplanetary shock wave hits Earth’s magnetic field plays a crucial role in determining the strength of these currents.

“Auroras and GICs are linked through the same space weather phenomenon,” explained Dr. Denny Oliveira, a researcher at NASA’s Goddard Space Flight Center. He emphasized that the aurora is a visual indication of the potential generation of GICs on the ground.

When solar particles interact with Earth’s magnetic field, geomagnetic storms are created, leading to the formation of the aurora. Interplanetary shock waves, arising from the Sun’s solar wind, also contribute to this process.

Interplanetary shock waves are formed similar to the sonic boom of a jet plane breaking the sound barrier. These shock waves compress Earth’s magnetic field and can generate powerful electrical currents that pose a threat to infrastructure conducting electricity.

Mitigating measures are crucial to protecting vulnerable infrastructure from the impact of interplanetary shock waves, as demonstrated by the severe power outage in Canada in 1989 following a geomagnetic storm. Oliveira emphasized the importance of monitoring and managing electrical circuits to prevent equipment damage.

Further research is needed to safeguard critical infrastructure from the strongest shock waves Earth encounters, Oliveira concluded.

About our experts

Denny Oliveira is an astrophysicist at the NASA Goddard Institute for Astrophysics, PHaSER/UMBC. His research focuses on interplanetary shock waves and their impact on plasma processes in space.


read more:

Source: www.sciencefocus.com

Certi AI celebrates the successful debut of their groundbreaking decentralized AI infrastructure token

Portland, Oregon, March 13, 2024, Chainwire

ceτi AI, a pioneering decentralized artificial intelligence infrastructure provider, is pleased to announce the successful launch of the CETI token. Founded by a visionary team led by Dennis Jarvis (ex-Bitcoin.com and Apple), ceτi AI builds a globally distributed, high-performance, intelligent, and scalable infrastructure network that supports innovative technologies. Our mission is to democratize access to AI. Decentralized AI network. Through these efforts, ceτi AI fosters innovation and developer engagement around the world.

Launched on Uniswap on March 11, 2024, the CETI token contributes to the development of AI infrastructure and introduces a unique way to benefit from the value created by the ceτi AI network. The launch received widespread attention, achieving an initial market capitalization of $33 million and a significant trading volume of $5.6 million in the first 24 hours of trading, demonstrating strong market confidence in ceτi AI's vision. Ta. Early adopters can expect to be the first to realize the benefits of holding CETI tokens.

The token launch not only showed impressive early market performance, but also saw over 1,000 early adopters join the project's Discord and Telegram groups, engage with tens of thousands of users on X.com, and trend #1 It marked an important milestone in the growth of the community, including winning the. It will be added to the DEX tool's hot pair list. ceτi AI's commitment to responsible tokenomics, stable and secure token markets, and revenue-generating AI infrastructure capabilities has received enthusiastic support from both the cryptocurrency and AI communities.

Dennis Jarvis, CEO of ceτi AI, said: “Reflecting on the successful launch of the CETI token, our sights are set on the decentralized AI horizon.” “Soon, advanced machine intelligence will impact every aspect of our lives. This power should not be blindly given to centralized so-called “trust and safety” teams. We must build a decentralized and democratized future for AI. ceτi AI is deploying the infrastructure to make it possible for anyone, anywhere. ceτi AI remains dedicated to ensuring that token holders and community members are integral to our journey, receive continued value, and have a say in the evolution of the ecosystem. I'll go. By fostering an environment of open innovation and collaboration, we are paving the way to a future where the benefits of AI are available to everyone, ensuring that technology serves the greater good and empowers individuals around the world. To do.

Join us on our journey to accelerate progress in decentralized AI. To learn more about ceτi AI and how to get involved, please visit: http://taoceti.ai Follow us on X (https://x.com/ceti_ai),telegram(https://t.me/ceti_ai),discord (https://discord.gg/SvauY42HdT), and DEX tools (https://t.ly/sj5eB). Contact our team. https://calendly.com/ceti_ai/ To arrange a meeting at the NVIDIA GTC Conference on March 18, 2024 in San Jose, California.

contact

CEO
Dennis Jarvis
Chey Eye
press@taoceti.ai

Source: the-blockchain.com

FBI Director Warns of Chinese Hacking Threat to US Infrastructure Following Blockade of Bolt Typhoon Botnet

U.S. officials claim to have stopped an attempt by China to plant malware that could potentially damage civilian infrastructure. If the U.S. and China were to go to war, officials warn that Beijing could disrupt the daily life of U.S. citizens. The FBI director issued this warning, stating that he was in a position to carry out such disruptions.

The operation resulted in the destruction of a botnet comprised of hundreds of small office and home routers located in the U.S. that had been hijacked by Chinese hackers in order to hide their tracks with malware. The operation was successful in accomplishing this.

U.S. officials said that the ultimate targets of the attackers included water treatment plants, power grids, and transportation systems in the United States.

These claims align with assessments made by external cybersecurity companies like Microsoft. In May, Microsoft revealed that state-sponsored Chinese hackers had been targeting critical U.S. infrastructure, laying the technological groundwork for potentially disrupting vital communications between the U.S. and Asia during future crises.

Some of the operation, attributed to a group of hackers known as Bolt Typhoon, was halted after the FBI and Justice Department officials obtained a search and seizure order in a Houston federal court in December. U.S. authorities have not disclosed the impact of the disruption, stating that the disrupted botnet was merely “a form of infrastructure used by Bolt Typhoon to obfuscate its activities.” The hackers concealed their actions within normal web traffic and infiltrated their targets through multiple channels, including cloud and internet providers.

FBI Director Chris Wray expressed concern that not enough public attention is being paid to cyber threats that affect “all Americans.” He made this statement before the House Select Committee on the Chinese Communist Party.

Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency at the Department of Homeland Security, echoed similar sentiments during the hearing, emphasizing that China’s cyber threats endanger the lives of Americans at home through disrupted pipelines, telecommunications, contaminated water facilities, and crippled transportation systems, with the goal of inciting social panic and chaos.

The United States has become more aggressive in recent years in its efforts to disrupt and dismantle both criminal and state-sponsored cyber operations. Wray also warned that Chinese government-backed hackers were aiming to steal trade secrets and personal information and influence foreign countries to ultimately supplant the United States as the world’s biggest superpower.

State-sponsored hackers, particularly those from China and Russia, are adept at adapting and finding new infiltration methods and routes, further complicating the threat.

U.S. authorities have long been worried about such hackers lurking in U.S. infrastructure. The older routers used by the Bolt Typhoon group were no longer receiving security updates from their manufacturers, making them easy targets for cyber attacks. Due to the urgency of the situation, U.S. cyber operators removed the malware from these routers without directly notifying their owners and added code to prevent reinfection.

According to Easterly, Chinese cyber attackers took advantage of a fundamental technological flaw in the U.S. that made it easy for them to carry out their attacks. U.S. officials stated that allies were also affected by the Bolt Typhoon hack of critical infrastructure, but they declined to disclose potential actions they might take in response to the attack.

China has repeatedly dismissed the U.S. government’s hacking allegations as baseless, claiming instead that the U.S. is the biggest perpetrator of cyberattacks. However, outgoing US Cyber ​​Command and National Security Agency head Gen. Paul Nakasone stated that “responsible cyber attackers” were not targeting civilian infrastructure and had no reason to do so.

Source: www.theguardian.com

Biden administration allocates $623 million to enhance electric vehicle charging infrastructure, White House reports

President Joe Biden’s administration has announced $623 million in funding to increase electric vehicle charging points in the U.S. amid concerns that the transition to zero-carbon transportation is not keeping pace with goals to tackle the climate crisis.


The money will be distributed as grants to dozens of programs across 22 states, including EV chargers for multifamily housing in New Jersey, fast chargers in Oregon, and hydrogen fuel chargers for cargo trucks in Texas. In total, funds pulled from the bipartisan infrastructure law are expected to add his 7,500 chargers across the United States.

“We’re building the charging network to win the EV race,” said U.S. Secretary of Transportation Pete Buttigieg.

“The electric vehicle revolution is not coming, it is here. I very personally recognize the importance of the fact that America led the world in the automobile revolution. We’re in the middle of a second automotive revolution, and it’s important that America has one again.”

There are about 170,000 electric vehicle chargers in the U.S., a significant increase from a network that was nearly invisible before Biden took office, and the White House is helping the transition away from gasoline and diesel vehicles. The company has set a goal of selling 500,000 chargers.

Biden’s climate change adviser, Ali Zaidi, said that “America is leading the way globally on electric vehicles” and that the U.S. is on track to “meet and exceed” the administration’s charger goals. He said there was. He added: “This expansion will continue over the coming years and decades until we reach net zero in the transport sector.”

Sales of electric vehicles are growing in the United States, with more than 1 million EVs sold for the first time last year, accounting for 9% of all car sales. But that rate of growth has slowed somewhat, with companies like Ford, General Motors and even Tesla scaling back their EV ambitions in recent months.

U.S. motorists are faced with an ever-expanding selection of EVs, but most are still more expensive than their gasoline equivalents, meaning they are out of reach for many buyers. research has discovered The median household income for EV buyers is $186,000.

Research shows that nearly one-third of potential EV buyers discount their purchase due to lack of charging infrastructure, despite accounting for most of the total vehicle trips in the United States. Masu. 3 miles or less. Even if Biden’s goal of 500,000 chargers is met, this is far fewer than is needed to support a gradual transition away from polluting cars. Estimate It is predicted that more than 28 million chargers will be needed by 2030.

Skip past newsletter promotions

“In the U.S., EV penetration is growing at almost twice the rate of charger installations,” said Brent Gruber, executive director of J.D. Power’s electric vehicle business. said last year. “Construction of new charging stations is not keeping up with demand.”

Earlier this week, the Environmental Protection Agency announced nearly $1 billion in grants to replace diesel-powered school buses with electric and low-emission vehicles. EPA will disburse the funds to 280 school districts serving 7 million children nationwide. Charging infrastructure is also an issue in efforts to phase out diesel buses.

Source: www.theguardian.com

Intrinsic, supported by Y Combinator, is developing essential infrastructure for trust and safety teams

Karine Mellata and Michael Lin met several years ago while working on Apple’s Fraud Engineering and Algorithmic Risk team. Both Mellata and Lin were involved in addressing online fraud issues such as spam, bots, account security, and developer fraud among Apple’s growing customer base.

Despite their efforts to develop new models to respond to evolving patterns of abuse, Melata and Lin feel they are falling behind and stuck in rebuilding core elements of their trust and safety infrastructure. I did.

“As regulation puts increased scrutiny on teams that centralize somewhat ad hoc trust and safety responses, we are helping modernize this industry and build a safer internet for everyone. We saw this as a real opportunity to do that,” Melata told TechCrunch in an email interview. “We dreamed of a system that could magically adapt as quickly as the abuse itself.”

Co-founded by So Mellata and Lin essentialis a startup that aims to give safety teams the tools they need to prevent product fraud. Intrinsic recently raised $3.1 million in a seed round with participation from Urban Innovation Fund, Y Combinator, 645 Ventures, and Okta.

Intrinsic’s platform is designed to moderate both user-generated and AI-generated content, allowing customers (primarily social media companies and e-commerce marketplaces) to detect and take action on content that violates their policies. We provide the infrastructure to do so. Intrinsic focuses on integrating safety products and automatically orchestrates tasks like banning users and flagging content for review.

“Intrinsic is a fully customizable AI content moderation platform,” said Mellata. “For example, Intrinsic can help publishers creating marketing materials avoid giving financial advice that carries legal liability. We can also help marketplaces discover listings such as:

Mellata notes that there are no off-the-shelf classifiers for such sensitive categories, and even for a well-resourced trust and safety team, adding a new auto-discovered category can take weeks of engineering. They claim it can take several months in some cases. -House.

Asked about rival platforms such as Spectrum Labs, Azure, and Cinder (almost direct competitors), Mellata said Intrinsic is superior in terms of (1) explainability and (2) significantly expanded tools. I said I was thinking about it. He explained that Intrinsic allows customers to “ask questions” about mistakes they made in content moderation decisions and provide an explanation as to why. The platform also hosts manual review and labeling tools that allow customers to fine-tune moderation models based on their own data.

“Most traditional trust and safety solutions were inflexible and not built to evolve with exploits,” Melata said. “Now more than ever, resource-constrained trust and safety teams are looking to vendors to help them reduce moderation costs while maintaining high safety standards.”

Without third-party auditing, it is difficult to determine how accurate a particular vendor’s moderation model is or whether it is susceptible to some type of influence. prejudice It plagues content moderation models elsewhere. But either way, Intrinsic appears to be gaining traction thanks to its “large and established” enterprise customers, who are signing deals in the “six-figure” range on average.

Intrinsic’s near-term plans include increasing the size of its three-person team and expanding its moderation technology to cover not just text and images, but also video and audio.

“The widespread slowdown in the technology industry has increased interest in automation for trust and safety, and this puts Intrinsic in a unique position,” Melata said. “COOs are concerned with reducing costs. Chief compliance officers are concerned with mitigating risk. Embedded helps both. , to catch more fraud.”

Source: techcrunch.com