China

China Activates World's Most Advanced Hypergravity Facility (interestingengineering.com) 23

China has activated the world's most advanced hypergravity machine to advance studies in geological processes, material behavior, and deep-sea energy exploration. Located in Hangzhou, The Centrifugal Hypergravity and Interdisciplinary Experiment Facility (CHIEF) will be able to produce forces thousands of times stronger than Earth's gravity. Interesting Engineering reports: The facility will house three primary hypergravity centrifuges and 18 onboard units. These centrifuges, machines designed to spin containers rapidly, force heavier materials to the edges or bottom by creating hypergravity conditions, as reported by the South China Morning Post (SCMP). The first centrifuge's main engine, resembling two massive arms holding experimental baskets, has been installed. According to the Hangzhou government, the fabrication of the remaining two centrifuges and 10 onboard units is underway.

[...] CHIEF will surpass the capabilities of the US Army Corps of Engineers' hypergravity facility, which has a capacity of 1,200 g-t (gravity acceleration x ton). Once completed, CHIEF will feature a capacity of 1,900 g-t, making it the most advanced facility of its kind, reports SCMP. The project includes six hypergravity experiment chambers, each dedicated to a specific area, such as slope and dam engineering, seismic geotechnics, deep-sea exploration, deep-earth studies, geological processes, and materials processing.

China

China Population Set for 51 Million Drop as Pro-Birth Moves Fail (bloomberg.com) 259

An anonymous reader shares a report: China's population is expected to shrink by 51 million -- more than the size of California -- over the next decade as policymakers struggle to reverse the country's falling birth rate, according to Bloomberg Intelligence. By 2035, the population is expected to drop to 1.36 billion, levels not seen since 2012, down from a peak of 1.41 billion in 2021, BI senior industry analyst Ada Li estimates.

There could be a temporary spike in births in 2024 as the Year of the Dragon is considered an auspicious time to have children. But past single-year surges in birth rates have been short-lived, and this year may be no exception, especially with marriage rates at an all-time low, Li said. China faces a looming population crisis, with the United Nations projecting it could shrink to half its current size by 2100.

Space

China Unveils 'Haolong' Space Shuttle (space.com) 60

A reusable uncrewed spaceplane was unveiled this week for delivering and returning cargo from the Chinese Tiangong space station. It was built by the Chengdu Aircraft Design and Research Institute (part of the state-owned Aviation Industry Corporation of China). (See YouTube footage here...)

Long-time Slashdot reader Geoffrey.landis writes: Like the Sierra Space "Dream Chaser" [still under development], the vehicle is to be launched as a payload on a separate launch vehicle, and land horizontally on Earth on a runway. The design is aerodynamically a hybrid, incorporating features of both winged and lifting-body designs. A model of the Haolong will make its debut at the 15th "Airshow China", November 12 to 17 in Zhuhai.
"The China Manned Space Agency shortlisted the spacecraft as one of two proposed affordable cargo spacecraft designs," reports Aviation Week.
Earth

Carbon Emissions Continued Increasing Last Year, Especially in China and India - But Not the US (apnews.com) 222

An anonymous reader shared this report from the Associated Press: Even as Earth sets new heat records, humanity this year is pumping 330 million tons (300 million metric tons) more carbon dioxide into the air by burning fossil fuels than it did last year. This year the world is on track to put 41.2 billion tons (37.4 billion metric tons) of the main heat-trapping gas into the atmosphere. It's a 0.8% increase from 2023, according to Global Carbon Project, a group of scientists who track emissions... This year's pollution increase isn't quite as large as last year's 1.4% jump, scientists said while presenting the data at the United Nations climate talks in Azerbaijan...

The continued rise in carbon emissions is mostly from the developing world and China. Many analysts had been hoping that China — by far the world's biggest annual carbon polluting nation with 32% of the emissions — would have peaked its carbon dioxide emissions by now. Instead China's emissions rose 0.2% from 2023, with coal pollution up 0.3%, Global Carbon Project calculated... [Although its growth rate now is "basically flat," O'Sullivan said.] That's nothing close to the increase in India, which at 8% of the globe's carbon pollution is third-largest carbon emitter. India's carbon pollution jumped 4.6% in 2024, the scientists said.

Carbon emissions fell 0.6% in the U.S. mostly from reduced coal, oil and cement use. The U.S. was responsible for 13% of the globe's carbon dioxide in 2024. Historically, it's responsible for 21% of the world's emissions since 1950... Twenty-two nations have shown steady decreases in emissions, O'Sullivan said, singling out the United States as one of those. The biggest emission drops from 2014 to 2023 were in the United States, Japan, Germany, the United Kingdom and Ukraine. Europe, which accounts for 7% of the world's carbon pollution, saw its carbon dioxide output drop 3.8% from last year — driven by a big cut in coal emissions.

Some interesting statistics from the article:
  • Burning coal, oil, and natural gas is currently emitting 2.6 million pounds (1.2 million kilograms) of carbon dioxide every second..."
  • In the last 10 years, emissions have gone up about 6%.
  • Global carbon emissions are more than double what they were 50 years ago, and 50% more than they were in 1999.

"If the world continues burning fossil fuels at today's level, it has six years before passing 1.5 degrees Celsius (2.7 Fahrenheit) above pre-industrial levels, the limit agreed to at the 2015 climate talks in Paris, said study co-author Stephen Sitch. The Earth is already at 1.3 degrees Celsius (2.3 Fahrenheit), according to the United Nations."

Yet "Total carbon emissions — which include fossil fuel pollution and land use changes such as deforestation — are basically flat because land emissions are declining, the scientists said."


Moon

Samples Obtained By Chinese Spacecraft Show Moon's Ancient Volcanism (yahoo.com) 31

China's Chang'e-6 mission made history by retrieving the first surface samples from the moon's far side, revealing evidence of volcanic activity spanning 1.4 billion years. Reuters reports: Researchers said on Friday the soil brought back from the Chang'e-6 landing site contained fragments of volcanic rock - basalt - dating to 4.2 billion years ago and to 2.8 billion years ago. This points to a long period of volcanic activity - at least 1.4 billion years - on the far side during the first half of the moon's history, when it was a more dynamic world than it is today. The moon, like Earth, formed about 4.5 billion years ago. Volcanism on the moon, Earth and other planetary bodies involves the eruption of molten rock from the mantle - the layer just under the outer crust - onto the surface. The landing site in the South Pole-Aitken Basin, an impact crater, is an area with the thinnest crust on the moon, helpful for finding evidence of volcanism.

The samples contained various volcanic rock fragments, and the researchers used a method called radioisotope dating to determine their age. Lunar basalt samples previously were obtained from the moon's near side, which perpetually faces Earth, during U.S. Apollo, Soviet Luna and Chinese Chang'e-5 missions. These showed that volcanism on the near side had occurred as long ago as 4.0 billion years ago and continued for at least two billion years, Li said. "The exact timing and duration of lunar volcanism is elusive and maybe varied across different regions. Some small-scale volcanism may have also occurred on the near side as late as about 120 million years ago as recorded by volcanic glass beads from Chang'e-5 samples" collected in 2020, Li said.

The new study also found that the basalt dating to 4.2 billion years ago differed in composition from the basalt dating to 2.8 billion years ago, meaning they originated from different sources of molten rock - magma - in the mantle, Li said. The Chang'e-6 samples, Li said, also differ in composition compared with previously collected lunar samples from the near side.

Privacy

T-Mobile Hacked In Massive Chinese Breach of Telecom Networks 25

Chinese hackers, reportedly linked to a Chinese intelligence agency, breached T-Mobile as part of a broader cyber-espionage campaign targeting telecom companies to spy on high-value intelligence targets. "T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information," a company spokesperson told the Wall Street Journal. Reuters reports: It was unclear what information, if any, was taken about T-Mobile customers' calls and communications records, according to the report. On Wednesday, The Federal Bureau of Investigation (FBI) and the U.S. cyber watchdog agency CISA said China-linked hackers have intercepted surveillance data intended for American law enforcement agencies after breaking into an unspecified number of telecom companies. Further reading: U.S. Wiretap Systems Targeted in China-Linked Hack
China

China Displays New Stealth Fighter in Race To Match US (msn.com) 112

China's air force showcased a suite of new armaments this week, including a new stealth fighter and an attack drone, demonstrating its advancing ability to challenge the U.S. military presence in the Asia Pacific. From a report: The public debut of the J-35A stealth fighter and other weapons systems at China's premier airshow, which started Tuesday, represent the centerpiece in the Chinese air force's celebrations of its 75th anniversary -- a milestone in Chinese leader Xi Jinping's sweeping campaign to modernize the People's Liberation Army.

A single J-35A soared over crowds of spectators in a brief flypast on the opening day of Airshow China in the southern city of Zhuhai, making a steep climb with afterburners before rolling away and streaking out of view, state television footage showed. Other new weapons -- including the "Jiu Tian" reconnaissance and attack drone and the HQ-19 anti-ballistic-missile system -- were also prominent in ground displays at the biennial airshow, as examples of the PLA's growing prowess in aerial warfare and air defense. Much remains unclear about these systems and their capabilities. Even so, Chinese officials and state media say the new armaments reflect the significant advances that Beijing has made in developing its air power and enhancing its ability to defend China's strategic interests.

The Military

Behind the Scenes at a Minuteman ICBM Test Launch (airandspaceforces.com) 61

Tuesday at California's Vandenberg Space Force base, the U.S. launched a Minuteman III missile, "in an important test of the weapon's ability to strike its targets with multiple warheads," according to Air and Space Forces magazine: The Minuteman III missiles that form a critical leg of the U.S. nuclear triad each carry one nuclear-armed reentry vehicle. But the missile that was tested carried three test warheads... The intercontinental ballastic missile (ICBM) test was controlled by an airborne command post in a test of the U.S. ability to launch its nuclear deterrent from a survivable platform.... Gen. Thomas A. Bussiere, the commander of Air Force Global Strike Command, said in a release: "An airborne launch validates the survivability of our ICBMs, which serve as the strategic backstop of our nation's defense and defense of allies and partners...."

The three test reentry vehicles — one high-fidelity Joint Test Assembly, which carries non-nuclear explosives, and two telemetry Joint Test Assembly objects — struck the Reagan Test Site near the Kwajalein Atoll in the Marshall Islands roughly 30 minutes later after launch, a flight of about 4,200 miles. "They make up essentially a mock warhead," Col. Dustin Harmon, the commander of the 377th Test and Evaluation Group, the nation's operational ICBM test unit, said in an interview with Air & Space Forces Magazine. "There's two different types. One is telemetered, so it's got a radio transmitter in it, it's got antennas, gyroscopes, accelerometers — all the things that can sense motion and movement. And we fly those or we can put one in there that's called a high-fidelity. That is assembled much like an actual weapon would be, except we use surrogate materials, and so we want it to fly similarly to an actual weapon. ... It has the explosives in it that a normal warhead would to drive a detonation, but there's nothing to drive...."

The U.S. government formally notified Russia in advance of the launch in accordance with a 1988 bilateral agreement. More than 145 countries were also provided with advance notice of the launch under the Hague Code of Conduct — an international understanding on launch notifications. The U.S. also provided advance notice to China, a DOD spokesperson told Air & Space Forces Magazine. China notified the U.S. of an ICBM launch over the Pacific Ocean in September. There is no formal agreement between Washington and Beijing that requires such notifications, but each side provided them to avoid miscalculations.

Test launches happen three times a year, according to the article, yielding "several gigabytes of data" about reentry vehicles, subsystems, and payloads. "There are 400 Minuteman III missiles currently in service across Colorado, Montana, Nebraska, North Dakota, and Wyoming."

Thanks to long-time Slashdot reader SonicSpike for sharing the article.
China

TSMC Halts Advanced Chip Shipments To Chinese AI Companies 18

Starting November 11, TSMC plans to stop supplying 7 nm and smaller chips to Chinese companies working on AI processors and GPUs. "The move is reportedly to ensure it remains compliant with US export restrictions," reports The Register. From the report: This will not affect Chinese customers wanting 7 nm chips from TSMC for other applications such as mobile and communications, according to Nikkei, which said the overall impact on the chipmaker's revenue is likely to be minimal. TrendForce further cites another China-based source who claims the move was at the behest of the US Department of Commerce, which informed TSMC that any such shipments should not proceed unless approved and licensed by its BIS (Bureau of Industry and Security). We asked the agency for confirmation.

Any moves by the silicon supremo is likely to be out of caution to pre-empt accusations from Washington that it isn't doing enough to prevent advanced technology from getting into the hands of Chinese entities that have been sanctioned. As TrendForce notes, it "highlights the foundry giant's delicate position in the global semiconductor supply chain amid the heating chip war between the world's two superpowers."
United States

US Agency Warns Employees About Phone Use Amid Ongoing China Hack (msn.com) 8

A federal agency has issued a directive to employees to reduce the use of their phones for work matters due to China's recent hack of U.S. telecommunications infrastructure, WSJ reported on Thursday, citing people familiar with the matter. From the report: In an email to staff sent Thursday, the chief information officer at the Consumer Financial Protection Bureau warned that internal and external work-related meetings and conversations that involve nonpublic data should only be held on platforms like Microsoft Teams and Cisco WebEx and not on work-issued or personal phones.

"Do NOT conduct CFPB work using mobile voice calls or text messages," the email said, while referencing a recent government statement acknowledging the telecommunications infrastructure attack. "While there is no evidence that CFPB has been targeted by this unauthorized access, I ask for your compliance with these directives so we reduce the risk that we will be compromised," said the email, which was sent to all CFPB employees and contractors. It wasn't clear if other federal agencies had taken similar measures or were planning to, but many U.S. officials have already curtailed their phone use due to the hack, according to a former official.

Businesses

Taiwan Must Improve Its Chip Tech to Stay Ahead, TSMC's Hou Says (yahoo.com) 23

Taiwan should pour more resources into advancing chip technology and expanding its supply chain expertise to maintain global leadership, an executive from its most valuable company said hours after Donald Trump was elected to be US president for the second time. From a report: "We should accelerate research and development to ensure our standing as an indispensable member of the global semiconductor supply chain," Taiwan Semiconductor Manufacturing Co. Senior Vice President Cliff Hou said in remarks delivered in his role as chairman of the Taiwan Semiconductor Industry Association on Thursday. "We are also working with the government to see whether we can attract foreign partners to set up design and materials centers in Taiwan."

The self-governing island, home to the world's biggest contract chipmaker, TSMC, lives with the constant threat of invasion by China, which considers it a breakaway territory. The imminent change in US leadership may alter its standing in global affairs. While President Joe Biden has repeatedly voiced unequivocal support for Taiwan, Trump said the island should pay the US for defending it, calling Xi Jinping "a very good friend of mine until Covid" in an interview with Bloomberg.

Hou, a 27-year TSMC veteran who obtained his doctorate in the US, added that Taiwan must also aim to develop more expertise in equipment and materials, areas that are dominated by foreign businesses. Meanwhile, the close relationship Taiwan and the US have forged over the past few decades will not be affected by the election's outcome, the executive told reporters separately on the sidelines of his trade group's event in Hsinchu. [...] In October, Trump told podcast host Joe Rogan that Taiwan took away US semiconductor business and jobs. "These chip companies, they stole 95% of our business. It's in Taiwan right now. They do a great job, but that's only because we have stupid politicians," Trump said as part of a lengthy interview where he also stated he protected Taiwan from China during his first stint as president.

Canada

Canada Bans TikTok Citing National Security Concerns (www.cbc.ca) 86

The federal government of Canada has ordered TikTok to shut down its operations in the country, citing national security concerns. However, Canadians will still be able to access the app and use it to create content. "The decision to use a social media application or platform is a personal choice," said Innovation Minister Francois-Philippe Champagne.

"We came to the conclusion that these activities that were conducted in Canada by TikTok and their offices would be injurious to national security. I'm not at liberty to go into much detail, but I know Canadians would understand when you're saying the government of Canada is taking measures to protect national security, that's serious." CBC News reports: Champagne urged Canadians to use TikTok "with eyes wide open." Critics have claimed that TikTok users' data could be obtained by the Chinese government. "Obviously, parents and anyone who wants to use social platform should be mindful of the risk," he said. The decision was made in accordance with the Investment Canada Act, which allows for the review of foreign investments that may harm Canada's national security.

Former CSIS director David Vigneault told CBC News it's "very clear" from the app's design that data gleaned from its users "is available to the government of China" and its large-scale data harvesting goals. "Most people can say, 'Why is it a big deal for a teenager now to have their data [on TikTok]?' Well in five years, in 10 years, that teenager will be a young adult, will be engaged in different activities around the world," he said at the time. "As an individual, I would say that I would absolutely not recommend someone have TikTok."

China

China Reveals a New Heavy Lift Rocket That Is a Clone of SpaceX's Starship (arstechnica.com) 64

Ars Technica's Eric Berger reports: When Chinese space officials unveiled the design for the country's first super heavy lift rocket nearly a decade ago, it looked like a fairly conventional booster. The rocket was fully expendable, with three stages and solid motors strapped onto its sides. Since then, the Asian country has been revising the design of this rocket, named Long March 9, in response to the development of reusable rockets by SpaceX. As of two years ago, China had recalibrated the design to have a reusable first stage. Now, based on information released at a major airshow in Zhuhai, China, the design has morphed again. And this time, the plan for the Long March 9 rocket looks almost exactly like a clone of SpaceX's Starship rocket.

Based on its latest specifications, the Long March 9 rocket will have a fully reusable first stage powered by 30 YF-215 engines, which are full-flow staged combustion engines fueled by methane and liquid oxygen, each with a thrust of approximately 200 tons. By way of comparison, Starship's first stage is powered by 33 Raptor engines, also fueled with methane and liquid oxygen, each with a thrust of about 280 tons. The new specifications also include a fully reusable configuration of the rocket, with an upper stage that looks eerily similar to Starship's second stage, complete with flaps in a similar location. According to a presentation at the airshow, China intends to fly this vehicle for the first time in 2033, nearly a decade from now.
Last week, Chinese space startup Cosmoleap announced plans to develop a fully reusable "Leap" rocket with the next few years. "An animated video that accompanied the funding announcement indicated that the company seeks to emulate the tower catch-with-chopsticks methodology that SpaceX successfully employed during Starship's fifth flight test last month," reports Ars.
Programming

Python Overtakes JavaScript on GitHub, Annual Survey Finds (github.blog) 97

GitHub released its annual "State of the Octoverse" report this week. And while "Systems programming languages, like Rust, are also on the rise... Python, JavaScript, TypeScript, and Java remain the most widely used languages on GitHub."

In fact, "In 2024, Python overtook JavaScript as the most popular language on GitHub." They also report usage of Jupyter Notebooks "skyrocketed" with a 92% jump in usage, which along with Python's rise seems to underscore "the surge in data science and machine learning on GitHub..." We're also seeing increased interest in AI agents and smaller models that require less computational power, reflecting a shift across the industry as more people focus on new use cases for AI... While the United States leads in contributions to generative AI projects on GitHub, we see more absolute activity outside the United States. In 2024, there was a 59% surge in the number of contributions to generative AI projects on GitHub and a 98% increase in the number of projects overall — and many of those contributions came from places like India, Germany, Japan, and Singapore...

Notable growth is occurring in India, which is expected to have the world's largest developer population on GitHub by 2028, as well as across Africa and Latin America... [W]e have seen greater growth outside the United States every year since 2013 — and that trend has sped up over the past few years.

Last year they'd projected India would have the most developers on GitHub #1 by 2027, but now believe it will happen a year later. This year's top 10?

1. United States
2. India
3. China
4. Brazil
5. United Kingdom
6. Russia
7. Germany
8. Indonesia
9. Japan
10. Canada

Interestingly, the UK's population ranks #21 among countries of the world, while Germany ranks #19, and Canada ranks #36.)

GitHub's announcement argues the rise of non-English, high-population regions "is notable given that it is happening at the same time as the proliferation of generative AI tools, which are increasingly enabling developers to engage with code in their natural language." And they offer one more data point: GitHub's For Good First Issue is a curated list of Digital Public Goods that need contributors, connecting those projects with people who want to address a societal challenge and promote sustainable development...

Significantly, 34% of contributors to the top 10 For Good Issue projects... made their first contribution after signing up for GitHub Copilot.

There's now 518 million projects on GitHub — with a year-over-year growth of 25%...
United States

Millions of U.S. Cellphones Could Be Vulnerable to Chinese Government Surveillance (washingtonpost.com) 73

Millions of U.S. cellphone users could be vulnerable to Chinese government surveillance, warns a Washington Post columnist, "on the networks of at least three major U.S. carriers."

They cite six current or former senior U.S. officials, all of whom were briefed about the attack by the U.S. intelligence community. The Chinese hackers, who the United States believes are linked to Beijing's Ministry of State Security, have burrowed inside the private wiretapping and surveillance system that American telecom companies built for the exclusive use of U.S. federal law enforcement agencies — and the U.S. government believes they likely continue to have access to the system.... The U.S. government and the telecom companies that are dealing with the breach have said very little publicly about it since it was first detected in August, leaving the public to rely on details trickling out through leaks...

The so-called lawful-access system breached by the Salt Typhoon hackers was established by telecom carriers after the terrorist attacks of Sept. 11, 2001, to allow federal law enforcement officials to execute legal warrants for records of Americans' phone activity or to wiretap them in real time, depending on the warrant. Many of these cases are authorized under the Foreign Intelligence Surveillance Act (FISA), which is used to investigate foreign spying that involves contact with U.S. citizens. The system is also used for legal wiretaps related to domestic crimes.

It is unknown whether hackers were able to access records about classified wiretapping operations, which could compromise federal criminal investigations and U.S. intelligence operations around the world, multiple officials told me. But they confirmed the previous reporting that hackers were able to both listen in on phone calls and monitor text messages. "Right now, China has the ability to listen to any phone call in the United States, whether you are the president or a regular Joe, it makes no difference," one of the hack victims briefed by the FBI told me. "This has compromised the entire telecommunications infrastructure of this country."

The Wall Street Journal first reported on Oct. 5 that China-based hackers had penetrated the networks of U.S. telecom providers and might have penetrated the system that telecom companies operate to allow lawful access to wiretapping capabilities by federal agencies... [After releasing a short statement], the FBI notified 40 victims of Salt Typhoon, according to multiple officials. The FBI informed one person who had been compromised that the initial group of identified targets included six affiliated with the Trump campaign, this person said, and that the hackers had been monitoring them as recently as last week... "They had live audio from the president, from JD, from Jared," the person told me. "There were no device compromises, these were all real-time interceptions...." [T]he duration of the surveillance is believed to date back to last year.

Several officials told the columnist that the cyberattack also targetted senior U.S. government officials and top business leaders — and that even more compromised targets are being discovered. At this point, "Multiple officials briefed by the investigators told me the U.S. government does not know how many people were targeted, how many were actively surveilled, how long the Chinese hackers have been in the system, or how to get them out."

But the article does include this quote from U.S. Senate Intelligence Committee chairman Mark Warner. "It is much more serious and much worse than even what you all presume at this point."

One U.S. representative suggested Americans rely more on encrypted apps. The U.S. is already investigating — but while researching the article, the columnist writes, "The National Security Council declined to comment, and the FBI did not respond to a request for comment..." They end with this recommendation.

"If millions of Americans are vulnerable to Chinese surveillance, they have a right to know now."
China

How America's Export Controls Failed to Keep Cutting-Edge AI Chips from China's Huawei (stripes.com) 40

An anonymous reader shared this report from the Washington Post: A few weeks ago, analysts at a specialized technological lab put a microchip from China under a powerful microscope. Something didn't look right... The microscopic proof was there that a chunk of the electronic components from Chinese high-tech champion Huawei Technologies had been produced by the world's most advanced chipmaker, Taiwan Semiconductor Manufacturing Company.

That was a problem because two U.S. administrations in succession had taken actions to assure that didn't happen. The news of the breach of U.S. export controls, first reported in October by the tech news site the Information, has sent a wave of concern through Washington... The chips were routed to Huawei through Sophgo Technologies, the AI venture of a Chinese cryptocurrency billionaire, according to two people familiar with the matter, speaking on the condition of anonymity to discuss a sensitive topic... "It raises some fundamental questions about how well we can actually enforce these rules," said Emily Kilcrease, a senior fellow at the Center for a New American Security in Washington... Taiwan's Ministry of Economic Affairs confirmed that TSMC recently halted shipments to a "certain customer" and notified the United States after suspecting that customer might have directed its products to Huawei...

There's been much intrigue in recent days in the industry over how the crypto billionaire's TSMC-made chips reportedly ended up at Huawei. Critics accuse Sophgo of working to help Huawei evade the export controls, but it is also possible that they were sold through an intermediary, which would align with Sophgo's denial of having any business relationship with Huawei... While export controls are often hard to enforce, semiconductors are especially hard to manage due to the large and open nature of the global chip trade. Since the Biden administration implemented sweeping controls in 2022, there have been reports of widespread chip smuggling and semiconductor black markets allowing Chinese companies to access necessary chips...

Paul Triolo, technology policy lead at Albright Stonebridge Group, said companies were trying to figure out what lengths they had to go to for due diligence: "The guidelines are murky."

Security

Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices (wired.com) 33

British cybersecurity firm Sophos revealed this week that it waged a five-year battle against Chinese hackers who repeatedly targeted its firewall products to breach organizations worldwide, including nuclear facilities, military sites and critical infrastructure. The company told Wired that it traced the attacks to researchers in Chengdu, China, linked to Sichuan Silence Information Technology and the University of Electronic Science and Technology.

Sophos planted surveillance code on its own devices used by the hackers, allowing it to monitor their development of sophisticated intrusion tools, including previously unseen "bootkit" malware designed to hide in the firewalls' boot code. The hackers' campaigns evolved from mass exploitation in 2020 to precise attacks on government agencies and infrastructure across Asia, Europe and the United States. Wired story adds: Sophos' report also warns, however, that in the most recent phase of its long-running conflict with the Chinese hackers, they appear more than ever before to have shifted from finding new vulnerabilities in firewalls to exploiting outdated, years-old installations of its products that are no longer receiving updates. That means, company CEO Joe Levy writes in an accompanying document, that device owners need to get rid of unsupported "end-of-life" devices, and security vendors need to be clear with customers about the end-of-life dates of those machines to avoid letting them become unpatched points of entry onto their network. Sophos says it's seen more than a thousand end-of-life devices targeted in just the past 18 months.

"The only problem now isn't the zero-day vulnerability," says Levy, using the term "zero-day" to mean a newly discovered hackable flaw in software that has no patch. "The problem is the 365-day vulnerability, or the 1,500-day vulnerability, where you've got devices that are on the internet that have lapsed into a state of neglect."

Canada

Chinese Attackers Accessed Canadian Government Networks For Five Years (theregister.com) 11

Canada's Communications Security Establishment (CSE) revealed a sustained cyber campaign by the People's Republic of China, targeting Canadian government and private sector networks over the past five years. The report also flagged India, alongside Russia and Iran, as emerging cyber threats. The Register reports: The biennial National Cyber Threat Assessment described the People's Republic of China's (PRC) cyber operations against Canada as "second to none." Their purpose is to "serve high-level political and commercial objectives, including espionage, intellectual property (IP) theft, malign influence, and transnational repression." Over the past four years, at least 20 networks within Canadian government agencies and departments were compromised by PRC cyber threat actors. The CSE assured citizens that all known federal government compromises have been resolved, but warned that "the actors responsible for these intrusions dedicated significant time and resources to learn about the target networks."

The report also alleges that government officials -- particularly those perceived as being critical of the Chinese Communist Party (CCP) -- were attacked. One of those attacks includes an email operation against members of Interparliamentary Alliance on China. The purpose of the cyber attacks is mainly to gain information that would lead to strategic, economic, and diplomatic advantages. The activity appears to have intensified following incidents of bilateral tension between Canada and the PRC, after which Beijing apparently wanted to gather timely intelligence on official reactions and unfolding developments, according to the report. Canada's private sector is also in the firing line, with the CSE suggesting "PRC cyber threat actors have very likely stolen commercially sensitive data from Canadian firms and institutions." Operations that collect information that could support the PRC's economic and military interests are priority targets.

The Military

A Million People Play This Video Wargame. So Does the Pentagon. (msn.com) 40

A commercial military simulation software, originally inspired by Tom Clancy novels, has become an unexpected tool for military training across NATO forces and defense analysts worldwide. Command: Professional Edition, developed by Britain's Slitherine Software, has secured contracts with the U.S. Air Force and British Strategic Command, while Taiwanese analysts use it to war-game potential conflicts with China.

The software's success stems from its vast database of military equipment and capabilities, compiled through contributions from its million-strong user base. Marine Corps University's wargaming director Tim Barrick employs the software to train officers, noting its effectiveness in developing tactical creativity. "These are not simple problems," said Barrick, a retired Marine colonel, told WSJ.

A fascinating excerpt from the report: Command's British publisher, Slitherine Software, stumbled into popularity. The family business got started around 2000 selling retail CD-ROM games like Legion, involving ancient Roman military campaigns. When Defense Department officials in 2016 first contacted Slitherine, which is based in an old house in a leafy London suburb, its father-and-son managers were so stunned they thought the call might be a prank. "Are you taking the piss?" J.D. McNeil, the father, recalled asking near the end of the conversation.
Power

Researchers Develop New Lithium Extraction Method With 'Nearly Double the Performance' (pv-magazine.com) 21

PV Magazine reports: Researchers in Australia and China have developed an innovative technology enabling direct lithium extraction from difficult-to-process sources like saltwater, which they say represents a substantial portion of the world's lithium potential.

Until now, up to 75% of the world's lithium-rich saltwater sources have remained untapped because of technical limitations, but given predictions that global lithium supply could fall short of demand as early as 2025, the researchers believe they have a game-changing solution. Their technology is a type of nanofiltration system that uses ethylenediaminetetraacetic acid, or EDTA, as a chelating agent to selectively separate lithium from other minerals, especially magnesium, which is often present in brines and difficult to remove.

"With some predicting global lithium supply could fall short of demand as early as 2025, the innovative technology sets a new standard in lithium processing," writes SciTechDaily: The work, co-led by Dr Zhikao Li, from the Monash Suzhou Research Institute and the Department of Chemical and Biological Engineering, and Professor Xiwang Zhang from the University of Queensland, promises to meet the surging demand for lithium and paves the way for more sustainable and efficient extraction practices... "Our technology achieves 90 percent lithium recovery, nearly double the performance of traditional methods, while dramatically reducing the time required for extraction from years to mere weeks," Dr. Li said.

The technology also turns leftover magnesium into a valuable, high-quality product that can be sold, reducing waste and its impact on the environment. Beyond its advanced efficiency, the EALNF system brings innovation to address major environmental concerns associated with lithium extraction. Unlike conventional methods that deplete vital water resources in arid regions, the technology produces freshwater as a by-product.

Dr Li said the system was flexible and ready for large-scale use, meaning it can quickly expand from testing to full industrial operations. "This breakthrough is crucial for avoiding a future lithium shortage, making it possible to access lithium from hard-to-reach sources and helping power the shift to clean energy."

"Our scalable process minimizes environmental impact while maximizing resource utilization," according to the researchers' article in Nature Sustainability, "thereby catalysing the shift toward a more sustainable future."

Thanks to long-time Slashdot reader schwit1 for sharing the news.

Slashdot Top Deals