Connect with us

Tech

NASA’s Perseverance rover is about to start searching for life on Mars

Published

on

NASA’s Perseverance rover is about to start searching for life on Mars


Briony Horgan, a planetary scientist at Purdue University who’s part of the Mastcam-Z team, says scientists are most interested in finding organic matter that’s either heavily concentrated or could only be the result of biological activity, such as stromatolites (fossilized remains created by layers of bacteria). “If we find particular patterns, it could qualify as a biosignature that’s evidence of life,” she says. “Even if it’s not concentrated, if we see it in the right context, it could be a really powerful sign of a real biosignature.”

After Perseverance lands, engineers will spend several weeks testing and calibrating all instruments and functions before the science investigation begins in earnest. Once that’s over, Perseverance will spend a couple more months driving out to the first exploration sites at Jezero crater. We could find evidence of life on Mars as soon as this summer—if it was ever there. 

New world, new tech

Like any new NASA mission, Perseverance is also a platform for demonstrating some of the most state-of-the-art technology in the solar system. 

One is MOXIE, a small device that seeks to turn the carbon-dioxide-heavy Martian atmosphere into usable oxygen through electrolysis (using an electric current to separate elements). This has been done before on Earth, but it’s important to prove that it works on Mars if we hope humans can live there one day. Oxygen production could not only provide a Martian colony with breathable air; it could also be used to generate liquid oxygen for rocket fuel. MOXIE should have about 10 opportunities to make oxygen during Perseverance’s first two years, during different seasons and times of the day. It will run for about an hour each time, producing 6 to 10 grams of oxygen per session. 

There’s also Ingenuity, a 1.8-kilogram helicopter that could take the first powered controlled flight ever made on another planet. Deploying Ingenuity (which is stowed underneath the rover) will take about 10 days. Its first flight will be about three meters into the air, where it will hover for about 20 seconds. If it successfully flies in Mars’s ultra-thin atmosphere (1% as dense as Earth’s), Ingenuity will have many more chances to fly elsewhere. Two cameras on the helicopter will help us see exactly what it sees. On its own, Ingenuity won’t be critical for exploring Mars, but its success could pave the way for engineers to think about new ways to explore other planets when a rover or lander will not suffice.

Neither of those demonstrations will be the marquee moment for Perseverance. The highlight of the mission, which may take 10 years to realize, will be the return of Martian soil samples to Earth. Perseverance will drill into the ground and collect more than 40 samples, most of which will be returned to Earth as part of a joint NASA-ESA mission. NASA officials suggest that this mission could come in either 2026 or 2028, which means the earliest they may be returned to Earth is 2031. 

Collecting such samples is no small feat. Robotics company Maxar built the sample handling arm (SHA) that controls the drilling mechanism to collect cores of Martian soil from the ground. The company had to build something that worked autonomously, with hardware and electronics that could withstand temperature swings from -73 °C (100 °F) at night to more than 20 °C (70 °F) during the day. And most important, it had to build something that could contend with the Martian dust. 

“When you’re talking about a moving mechanism that has to apply force and go exactly where you need it to go, you can’t have a tiny little dust particle stopping the whole show,” says Lucy Condakchian, the general manager of robotics at Maxar. SHA, located underneath the rover itself, is exposed to a ton of dust kicked up by the rover’s wheels or by drilling. Various innovations should help it withstand this problem, including new lubricants and a metallic accordion design for its lateral (front-to-back) movement.

Before any of those things are proved to work, however, the rover needs to make it to Mars in one piece. 

“It never gets old,” says Condakchian. “I’m just as nervous as I’ve been on the previous missions. But it’s a good nervous—an excitement to be doing this again.”

Tech

How to poison the data that Big Tech uses to surveil you

Published

on

How to poison the data that Big Tech uses to surveil you


In a new paper being presented at the Association for Computing Machinery’s Fairness, Accountability, and Transparency conference next week, researchers including PhD students Nicholas Vincent and Hanlin Li propose three ways the public can exploit this to their advantage:

  • Data strikes, inspired by the idea of labor strikes, which involve withholding or deleting your data so a tech firm cannot use it—leaving a platform or installing privacy tools, for instance.
  • Data poisoning, which involves contributing meaningless or harmful data. AdNauseam, for example, is a browser extension that clicks on every single ad served to you, thus confusing Google’s ad-targeting algorithms.
  • Conscious data contribution, which involves giving meaningful data to the competitor of a platform you want to protest, such as by uploading your Facebook photos to Tumblr instead.

People already use many of these tactics to protect their own privacy. If you’ve ever used an ad blocker or another browser extension that modifies your search results to exclude certain websites, you’ve engaged in data striking and reclaimed some agency over the use of your data. But as Hill found, sporadic individual actions like these don’t do much to get tech giants to change their behaviors.

What if millions of people were to coordinate to poison a tech giant’s data well, though? That might just give them some leverage to assert their demands.

There may have already been a few examples of this. In January, millions of users deleted their WhatsApp accounts and moved to competitors like Signal and Telegram after Facebook announced that it would begin sharing WhatsApp data with the rest of the company. The exodus caused Facebook to delay its policy changes.

Just this week, Google also announced that it would stop tracking individuals across the web and targeting ads at them. While it’s unclear whether this is a real change or just a rebranding, says Vincent, it’s possible that the increased use of tools like AdNauseam contributed to that decision by degrading the effectiveness of the company’s algorithms. (Of course, it’s ultimately hard to tell. “The only person who really knows how effectively a data leverage movement impacted a system is the tech company,” he says.)

Vincent and Li think these campaigns can complement strategies such as policy advocacy and worker organizing in the movement to resist Big Tech.

“It’s exciting to see this kind of work,” says Ali Alkhatib, a research fellow at the University of San Francisco’s Center for Applied Data Ethics, who was not involved in the research. “It was really interesting to see them thinking about the collective or holistic view: we can mess with the well and make demands with that threat, because it is our data and it all goes into this well together.”

Continue Reading

Tech

Four new hacking groups have joined an ongoing offensive against Microsoft’s email servers

Published

on

Four new hacking groups have joined an ongoing offensive against Microsoft’s email servers


A Chinese government-linked hacking campaign revealed by Microsoft this week has ramped up rapidly. At least four other distinct hacking groups are now attacking critical flaws in Microsoft’s email software in a cyber campaign the US government describes as “widespread domestic and international exploitation” with the potential to impact hundreds of thousands of victims worldwide.

Beginning in January 2021, Chinese hackers known as Hafnium began exploiting vulnerabilities in Microsoft Exchange servers. But since the company publicly revealed the campaign on Tuesday, four more groups have joined in and the original Chinese hackers have dropped the pretense of stealth and increased the number of attacks they’re carrying out. The growing list of victims includes tens of thousands of US businesses and government offices targeted by the new groups. 

“There are at least five different clusters of activity that appear to be exploiting the vulnerabilities,” says Katie Nickels, who leads an intelligence team at the cybersecurity firm Red Canary that is investigating the hacks. When tracking cyberthreats, intelligence analysts group clusters of hacking activity by the specific techniques, tactics, procedures, machines, people, and other characteristics they observe. It’s a way to track the hacking threats they face. 

Hafnium is a sophisticated Chinese hacking group that has long run cyberespionage campaigns against the United States, according to Microsoft. They are an apex predator—exactly the sort that is always followed closely by opportunistic and smart scavengers.

Activity quickly kicked into higher gear once Microsoft made their  announcement on Tuesday. But exactly who these hacking groups are, what they want, and how they’re accessing these servers remain unclear. It’s possible that the original Hafnium group sold or shared their exploit code or that other hackers reverse engineered the exploits based on the fixes that Microsoft released, Nickels explains.

“The challenge is that this is all so murky and there is so much overlap,” Nickels explains. “What we’ve seen is that from when Microsoft published about Hafnium, it’s expanded beyond just Hafnium. We’ve seen activity that looks different from tactics, techniques, and procedures from what they reported on.” 

Continue Reading

Tech

As the Texas power crisis shows, our infrastructure is vulnerable to extreme weather

Published

on

As the Texas power crisis shows, our infrastructure is vulnerable to extreme weather


On Valentine’s Day, a rare burst of Arctic air spread across the central US and into Texas, dropping temperatures there into the single digits and nearly causing the state’s power grid to collapse. A state known for its abundant energy resources saw widespread failures of natural-gas and electricity systems that left more than four million Texans without power for days.

The proximate cause of Texas’s grid failure is now well understood. Frigid temperatures drove electricity demand to a new winter record that exceeded even the “extreme” demand scenario considered by the state’s power grid operator, the Electric Reliability Council of Texas, or ERCOT. Then dozens of natural-gas power plants and some wind turbines rapidly went offline, plunging the Texas grid into crisis. To prevent the whole grid from going down, ERCOT ordered utilities to initiate emergency blackouts and disconnect millions of customers. 

Scientists are still working to determine whether the fast-warming Arctic is driving more frequent breakdowns of the “polar vortex,” which precipitated the Texas freeze. But we know that climate change is making extreme weather like heat waves, droughts, wildfires, and flooding more frequent and more severe. Any of these events can push our critical infrastructure to the breaking point, as happened in Texas. How can we prepare?

Climate resilience will require investment of up to $100 billion per year globally in our infrastructure and communities. But careful planning can help our scarce resources go further. 

Looking back, Texas’s troubles offer several key lessons for how to make both critical infrastructure and vulnerable communities everywhere more resilient to climate extremes. 

Assessing future risks

First, it’s worth noting that grid failure alone did not lead to the intense suffering and loss of life Texas residents faced.

Natural-gas wells and gathering lines also froze, cutting gas production and supply for the state’s pipelines and power plants in half just as demand soared. Elsewhere, water treatment plants lost power, and frozen pipes caused water distribution networks to lose pressure. Frozen roadways prevented residents from traveling safely.

Building resilient infrastructure means paying close attention to extreme events that can slam large parts of the system all at once.

The connections between these infrastructure systems keep the lights on and taps flowing in good times but can compound failure when things go bad.

Extreme weather also tends to cause multiple parts of critical systems to fail at the same time. These kinds of simultaneous failures are far more probable than one might think. If 10 power plants each have a 10% chance of failure but these probabilities are all independent, the chance that they all fail simultaneously is infinitesimal (0.00000001%).

A 1% chance that 10 power plants all fail at once is far more worrisome. So building resilient infrastructure means paying close attention to extreme events that can slam large parts of the system all at once, whether that’s a winter storm, wildfire, hurricane, or flood.

Lastly, the worst human impacts of any infrastructure failure don’t come from the outage itself. They come from exposure to freezing temperatures, a lack of clean water to drink, dwindling food supplies, and the fear that help may not come soon enough. So the magnitude of suffering is determined not only by the magnitude of the infrastructure failure but also by each community’s ability to weather the storm.

Continue Reading

Copyright © 2020 Diliput News.