USAF Conducts First-AI Flight With Stealth Drone

The Air Force Research Laboratory (AFRL) completed the first-ever flight of an AFRL-developed stealth drone powered by artificial intelligence software.

On July 25, the machine-learning-trained, artificial intelligence-powered XQ-58A Valkyrie flew a three-hour sortie at Florida’s Eglin Air Force Base.

“The mission proved out a multi-layer safety framework on an AI/ML-flown uncrewed aircraft and demonstrated an AI/ML agent solving a tactically relevant “challenge problem” during airborne operations,” said Col. Tucker Hamilton, chief, of AI Test and Operations, for the Department of the USAF.

Hamilton continued, “This sortie officially enables the ability to develop AI/ML agents that will execute modern air-to-air and air-to-surface skills that are immediately transferrable to other autonomy programs.”

Eglin has become the testing ground for advanced autonomous systems within the USAF. Last November, the service received two Valkyrie stealth drones assigned to the 40th Flight Test Squadron.

In past press releases, AFRL describes the Valkyrie as a “high-speed, long-range, low-cost unmanned platform designed to offer maximum utility at minimum cost.”

Keep reading

Deepfake Fraud Surges More Than 1000%, Insiders Say It’s Just The Beginning

As the line between fact and fiction gets harder to distinguish, online criminals need just two hours to create a realistic, computer-generated “deepfake” product that can ruin someone’s life.

The surge in popularity of hyper-realistic photos, audio, and videos developed with artificial intelligence (AI)—commonly known as deepfakes—has become an internet sensation.

It’s also giving cyber villains an edge in the crime world.

Between 2022 and the first quarter of this year, deepfake use in fraud catapulted 1,200 percent in the United States alone.

Though it’s not just an American problem.

In the same analysis, deepfakes used for scam purposes exploded in Canada, Germany, and the United Kingdom. In the study, the United States accounted for 4.3 percent of global deepfake fraud cases.

Meanwhile, AI experts and cybercrime investigators say we’re just at the tip of the iceberg. The rabbit hole of deepfake fraud potential just keeps going.

“I believe the No. 1 incentive for cyber criminals to commit cybercrime is law enforcement and their inability to keep up,” Michael Roberts told The Epoch Times.

Mr. Roberts is a professional investigator and the founder of the pioneer company Rexxfield, which helps victims of web-based attacks.

He also started PICDO, a cyber crime disruption organization, and has run counter-hacking education for branches of the U.S. and Australian militaries as well as NATO.

Mr. Roberts said legal systems in the Western world are “hopelessly overwhelmed” by online fraud cases, many of which include deepfake attacks. Moreover, the cases that get investigated without hiring a private firm are cherry-picked.

And even then, it [the case] doesn’t get resolved,” he said.

The market for deepfake detection was valued at $3.86 billion dollars in 2020 and is expected to grow 42 percent annually through 2026, according to an HSRC report.

Keep reading

Researchers claim US-registered cloud host facilitated state-backed cyberattacks

A little-known cloud company provided web hosting and internet services to more than two dozen different state-sponsored hacking groups and commercial spyware operators, according to researchers at cybersecurity company Halcyon.

In a report released on Tuesday, Halcyon said it had identified that the U.S.-registered company Cloudzy was “knowingly or unwittingly” acting as a command-and-control provider (C2P) to well-known state-sponsored hacking groups. C2Ps are internet providers that allow hackers to host virtual private servers and other anonymized services used by ransomware affiliates to carry out cyberattacks and extortion.

Halcyon said that the two-dozen groups that rely on Cloudzy include the China-backed espionage group APT10; North Korea-backed hackers Kimsuky; and Kremlin-backed groups Turla, Nobelium and FIN12.

FIN12 was the subject of a joint FBI-CISA advisory in October 2020 after carrying out a spate of ransomware attacks targeting the U.S. healthcare industry. In its report, Halcyon said that Cloudzy — then doing business as Router Hosting — hosted at least 40 command and control servers used by FIN12 during its cyberattacks.

The list of groups facilitated by Cloudzy also includes hacking groups from Iran, Pakistan and Vietnam, along with Tel Aviv-based malware maker Candiru, which sells its phone-snooping spyware to government customers. Candiru was sanctioned by the U.S. government in 2021 for engaging in activities contrary to U.S. national security.

Halcyon says that about half of the total servers hosted by Cloudzy appear to be directly supporting malicious activity.

The cybersecurity firm concluded that although the cloud host is registered in the U.S., Halcyon says it has “high confidence” that the cloud host is a cutout for AbrNOC, a cloud host that operates out of the Iranian capital of Tehran, which could put American customers in conflict with U.S. government sanctions.

Cloudzy, which claims to operate out of New York City, is registered in Wyoming, while a support phone number listed by the company is linked to a different address in Las Vegas. AbrNOC shares the same logo as Cloudzy, albeit in a different color, and also shares the same fictitiously named employees, according to Halcyon researchers. A man named Hannan Nozari is listed as abrNOC’s CEO and identifies himself as the founder of both web hosts companies in his Twitter bio, as well as a “Noob on the Internet.”

Nozari did not respond to messages sent by TechCrunch via LinkedIn and email, and TechCrunch was unable to reach anyone at Cloudzy via the number listed on the company’s website.

Keep reading

The LK-99 superconductor could be world changing or a total hoax. Here’s why you should care either way

Outside of Sheldon Cooper and The Big Bang Theory, physics generally isn’t part of the day-to-day conversation for most people. But a recent claim from scientists has everyone paying attention. A trio of physicists claims to have created a superconductor, dubbed LK-99, that works at room temperature and ambient pressure. 

In basic terms, that means they might have discovered a material that can conduct electricity with no notable resistance, meaning it loses zero energy. And, if that’s true, it could be world altering.

Keep reading

AI search of Neanderthal proteins resurrects ‘extinct’ antibiotics

Bioengineers have used artificial intelligence (AI) to bring molecules back from the dead1.

To perform this molecular ‘de-extinction’, the researchers applied computational methods to data about proteins from both modern humans (Homo sapiens) and our long-extinct relatives, Neanderthals (Homo neanderthalensis) and Denisovans. This allowed the authors to identify molecules that can kill disease-causing bacteria — and that could inspire new drugs to treat human infections.

“We’re motivated by the notion of bringing back molecules from the past to address problems that we have today,” says Cesar de la Fuente, a co-author of the study and a bioengineer at the University of Pennsylvania in Philadelphia. The study was published on 28 July in Cell Host & Microbe1.

Keep reading

This Disinformation Is Just for You

IT’S NOW WELL understood that generative AI will increase the spread of disinformation on the internet. From deepfakes to fake news articles to bots, AI will generate not only more disinformation, but more convincing disinformation. But what people are only starting to understand is how disinformation will become more targeted and better able to engage with people and sway their opinions.

When Russia tried to influence the 2016 US presidential election via the now disbanded Internet Research Agency, the operation was run by humans who often had little cultural fluency or even fluency in the English language and so were not always able to relate to the groups they were targeting. With generative AI tools, those waging disinformation campaigns will be able to finely tune their approach by profiling individuals and groups. These operatives can produce content that seems legitimate and relatable to the people on the other end and even target individuals with personalized disinformation based on data they’ve collected. Generative AI will also make it much easier to produce disinformation and will thus increase the amount of disinformation that’s freely flowing on the internet, experts say.

“Generative AI lowers the financial barrier for creating content that’s tailored to certain audiences,” says Kate Starbird, an associate professor in the Department of Human Centered Design & Engineering at the University of Washington. “You can tailor it to audiences and make sure the narrative hits on the values and beliefs of those audiences, as well as the strategic part of the narrative.”

Rather than producing just a handful of articles a day,  Starbird adds, “You can actually write one article and tailor it to 12 different audiences. It takes five minutes for each one of them.”

Considering how much content people post to social media and other platforms, it’s very easy to collect data to build a disinformation campaign. Once operatives are able to profile different groups of people throughout a country, they can teach the generative AI system they’re using to create content that manipulates those targets in highly sophisticated ways.

“You’re going to see that capacity to fine-tune. You’re going to see that precision increase. You’re going to see the relevancy increase,” says Renee Diresta, the technical research manager at Stanford Internet Observatory.

Keep reading

Have 46,000 Year Ago Nematodes in Suspended Animation Really Been Resuscitated?

For more than two decades scientists have been collecting frozen microbes from deep layers of the Siberian permafrost, to see if they can be thawed and brought back to life. In the most recent revival experiments, a team of genetic researchers from Russia and Germany first reawakened and then identified a previously undiscovered nematode species, which they claim is 46,000 years old. Assuming this is true, this is the most ancient type of microscopic lifeform to have even been recovered from the freeze-dried Siberian soil.

In an article about their research just published in  PLOS Genetics , the genetic researchers describe how they confirmed the existence of this new species of roundworm, which was unearthed near  Siberia’s Kolyma River and has now been named  Panagrolaimus kolymaensis  (or P. kolymaensis ). There are many  nematode species that belong to the  Panagrolaimus line, so this ancient species has living relatives.

Interestingly, P. kolymaensis  was not recognized as a new type of nematode when it was  first revived in 2018 . It was incorrectly identified as belonging to another previously identified species, which lived 42,000 years ago.

But in the latest study, anomalies were detected that threw the initial identification of this variety of microscopic roundworm into doubt. Further analysis revealed it was a different species altogether, and one that had lived in an earlier time period.

 “The radiocarbon dating is absolutely precise, and we now know that they really survived 46,000 years,” study co-author Teymuras Kurzchalia, a cell biologist affiliated with the the Max Planck Institute of Molecular Cell Biology and Genetics in Dresden, Germany, told  Scientific American.

Keep reading

Computer chip with built-in human brain tissue gets military funding

Last year, Monash University scientists created the “DishBrain” – a semi-biological computer chip with some 800,000 human and mouse brain cells lab-grown into its electrodes. Demonstrating something like sentience, it learned to play Pong within five minutes.

The micro-electrode array at the heart of the DishBrain was capable both of reading activity in the brain cells, and stimulating them with electrical signals, so the research team set up a version of Pong where the brain cells were fed a moving electrical stimulus to represent which side of the “screen” the ball was on, and how far away from the paddle it was. They allowed the brain cells to act on the paddle, moving it left and right.

Then they set up a very basic-reward system, using the fact that small clusters of brain cells tend to try to minimize unpredictability in their environment. So if the paddle hit the ball, the cells would receive a nice, predictable stimulus. But if it missed, the cells would get four seconds of totally unpredictable stimulation.

It was the first time lab-grown brain cells had been used this way, being given not only a way to sense the world, but to act on it, and the results were impressive.

Impressive enough that the research – undertaken in partnership with Melbourne startup Cortical Labs – has now attracted a US$407,000 grant from Australia’s National Intelligence and Security Discovery Research Grants program.

These programmable chips, fusing biological computing with artificial intelligence, “in future may eventually surpass the performance of existing, purely silicon-based hardware,” says project lead, Associate Professor Adeel Razi.

“The outcomes of such research would have significant implications across multiple fields such as, but not limited to, planning, robotics, advanced automation, brain-machine interfaces, and drug discovery, giving Australia a significant strategic advantage,” he said.

Keep reading

PhD Student Uses Deepfake to Pass Popular Voice Authentication and Spoof Detection System

University of Waterloo (UW) cybersecurity PhD student Andre Kassis published his findings after being granted access to an account protected with biometrics using deepfake AI-generated audio recordings.

A hacker can create a deepfake voice with five minutes of the target’s recorded voice, which can be taken from public posts on social media, the research shows. GitHub’s open source AI software can create deepfake audio that can surpass voice authentication.

He used the deepfake to expose a weakness in the Amazon Connect voice authentication system, a UW release reveals. Four-second attacks on Connect had a 10 percent success rate, and attacks closer to 30 seconds were successful 40 percent of the time.

In response, the company added biometric anti-spoofing software that could find digital markers on a voice recording, revealing if it was made by a machine or human. This worked until Kassis used free software to remove the digital markers from his deepfakes.

His method can bypass less sophisticated voice biometric authentication systems with a 99 percent success rate after six tries, according to the announcement.

Keep reading

TEXAS STATE POLICE PURCHASED ISRAELI PHONE-TRACKING SOFTWARE FOR “BORDER EMERGENCY”

THE TEXAS DEPARTMENT of Public Safety purchased access to powerful software capable of locating and following people through their phones as part of Republican Gov. Greg Abbott’s “border security disaster” efforts, according to documents reviewed by The Intercept.

In 2021, Abbott proclaimed that the “surge of individuals unlawfully crossing the Texas-Mexico border posed an ongoing and imminent threat of disaster” to the state and its residents. Among other effects, the disaster declaration opened a spigot of government money to a variety of private firms ostensibly paid to help patrol and blockade the state’s border with Mexico.

One of the private companies that got in on the cash disbursements was Cobwebs Technologies, a little-known Israeli surveillance contractor. Cobwebs’s marquee product, the surveillance platform Tangles, offers its users a bounty of different tools for tracking people as they navigate both the internet and the real world, synthesizing social media posts, app activity, facial recognition, and phone tracking.

Keep reading