Transportation

Waymo Chooses the Hyundai Ioniq 5 For New Robotaxi (carscoops.com) 36

Waymo has entered a "multi-year, strategic partnership" with Hyundai to integrate the company's autonomous driving system into the American-made Hyundai Ioniq 5. It's expected to join the Waymo One fleet after road tests starting in late 2025. Carscoops reports: Waymo and Geely joined forces in 2021 to introduce a mobility-focused Zeekr EV. The model was slated to be added to Waymo's fleet of autonomous vehicles and effectively replace their aging Jaguar I-Paces. While that was a solid plan a few years ago, the political climate has changed and China has emerged as America's boogeyman. Just last week, the Biden Administration proposed a new rule that could effectively ban all Chinese cars including models from Buick and Lincoln. [...]

Besides giving Waymo a 'safe' alternative to Zeekr, it sounds like the Ioniq 5 will eventually make up a bulk of the fleet. While that remains unconfirmed, the companies aim to produce the autonomous EVs in a "significant volume over multiple years." The firms also revealed the cars will be delivered with "autonomous-ready modifications like redundant hardware and power doors."

Government

White House Agonizes Over UN Cybercrime Treaty (politico.com) 43

The United Nations is set to vote on a treaty later this year intended to create norms for fighting cybercrime -- and the Biden administration is fretting over whether to sign on. Politico: The uncertainty over the treaty stems from fears that countries including Russia, Iran and China could use the text as a guise for U.N. approval of their widespread surveillance measures and suppression of the digital rights of their citizens. If the United States chooses not to vote in favor of the treaty, it could become easier for these adversarial nations -- named by the Cybersecurity and Infrastructure Security Agency as the biggest state sponsors of cybercrime -- to take the lead on cyber issues in the future. And if the U.S. walks away from the negotiating table now, it could upset other nations that spent several years trying to nail down the global treaty with competing interests in mind.

While the treaty is not set for a vote during the U.N. General Assembly this week, it's a key topic of debate on the sidelines, following meetings in New York City last week, and committee meetings set for next month once the world's leaders depart. The treaty was troubled from its inception. A cybercrime convention was originally proposed by Russia, and the U.N. voted in late 2019 to start the process to draft it -- overruling objections by the U.S. and other Western nations. Those countries were worried Russia would use the agreement as an alternative to the Budapest Convention -- an existing accord on cybercrime administered by the Council of Europe, which Russia, China and Iran have not joined.

Businesses

Dozens of Fortune 100 Companies Have Unwittingly Hired North Korean IT Workers (therecord.media) 29

"Dozens of Fortune 100 organizations" have unknowingly hired North Korean IT workers using fake identities, generating revenue for the North Korean government while potentially compromising tech firms, according to Google's Mandiant unit. "In a report published Monday [...], researchers describe a common scheme orchestrated by the group it tracks as UNC5267, which has been active since 2018," reports The Record. "In most cases, the IT workers 'consist of individuals sent by the North Korean government to live primarily in China and Russia, with smaller numbers in Africa and Southeast Asia.'" From the report: The remote workers "often gain elevated access to modify code and administer network systems," Mandiant found, warning of the downstream effects of allowing malicious actors into a company's inner sanctum. [...] Using stolen identities or fictitious ones, the actors are generally hired as remote contractors. Mandiant has seen the workers hired in a variety of complex roles across several sectors. Some workers are employed at multiple companies, bringing in several salaries each month. The tactic is facilitated by someone based in the U.S. who runs a laptop farm where workers' laptops are sent. Remote technology is installed on the laptops, allowing the North Koreans to log in and conduct their work from China or Russia.

Workers typically asked for their work laptops to be sent to different addresses than those listed on their resumes, raising the suspicions of companies. Mandiant said it found evidence that the laptops at these farms are connected to a "keyboard video mouse" device or multiple remote management tools including LogMeIn, GoToMeeting, Chrome Remote Desktop, AnyDesk, TeamViewer and others. "Feedback from team members and managers who spoke with Mandiant during investigations consistently highlighted behavior patterns, such as reluctance to engage in video communication and below-average work quality exhibited by the DPRK IT worker remotely operating the laptops," Mandiant reported.

In several incident response engagements, Mandiant found the workers used the same resumes that had links to fabricated software engineer profiles hosted on Netlify, a platform often used for quickly creating and deploying websites. Many of the resumes and profiles included poor English and other clues indicating the actor was not based in the U.S. One characteristic repeatedly seen was the use of U.S-based addresses accompanied by education credentials from universities outside of North America, frequently in countries such as Singapore, Japan or Hong Kong. Companies, according to Mandiant, typically don't verify credentials from universities overseas.
Further reading: How Not To Hire a North Korean IT Spy
Government

OpenAI Pitched White House On Unprecedented Data Center Buildout (yahoo.com) 38

An anonymous reader quotes a report from Bloomberg: OpenAI has pitched the Biden administration on the need for massive data centers that could each use as much power as entire cities, framing the unprecedented expansion as necessary to develop more advanced artificial intelligence models and compete with China. Following a recent meeting at the White House, which was attended by OpenAI Chief Executive Officer Sam Altman and other tech leaders, the startup shared a document with government officials outlining the economic and national security benefits of building 5-gigawatt data centers in various US states, based on an analysis the company engaged with outside experts on. To put that in context, 5 gigawatts is roughly the equivalent of five nuclear reactors, or enough to power almost 3 million homes. OpenAI said investing in these facilities would result in tens of thousands of new jobs, boost the gross domestic product and ensure the US can maintain its lead in AI development, according to the document, which was viewed by Bloomberg News. To achieve that, however, the US needs policies that support greater data center capacity, the document said. "Whatever we're talking about is not only something that's never been done, but I don't believe it's feasible as an engineer, as somebody who grew up in this," said Joe Dominguez, CEO of Constellation Energy Corp. "It's certainly not possible under a timeframe that's going to address national security and timing."
China

China-Linked Hackers Breach US Internet Providers in New 'Salt Typhoon' Cyberattack (msn.com) 16

Hackers linked to the Chinese government have broken into a handful of U.S. internet-service providers in recent months in pursuit of sensitive information, WSJ reported Wednesday, citing people familiar with the matter. From the report: The hacking campaign, called Salt Typhoon by investigators, hasn't previously been publicly disclosed and is the latest in a series of incursions that U.S. investigators have linked to China in recent years. The intrusion is a sign of the stealthy success Beijing's massive digital army of cyberspies has had breaking into valuable computer networks in the U.S. and around the globe.

In Salt Typhoon, the actors linked to China burrowed into America's broadband networks. In this type of intrusion, bad actors aim to establish a foothold within the infrastructure of cable and broadband providers that would allow them to access data stored by telecommunications companies or launch a damaging cyberattack. Last week, U.S. officials said they had disrupted a network of more than 200,000 routers, cameras and other internet-connected consumer devices that served as an entry point into U.S. networks for a China-based hacking group called Flax Typhoon. And in January, federal officials disrupted Volt Typhoon, yet another China-linked campaign that has sought to quietly infiltrate a swath of U.S. critical infrastructure.

"The cyber threat posed by the Chinese government is massive," said Christopher Wray, the Federal Bureau of Investigation's director, speaking earlier this year at a security conference in Germany. "China's hacking program is larger than that of every other major nation, combined." U.S. security officials allege that Beijing has tried and at times succeeded in burrowing deep into U.S. critical infrastructure networks ranging from water-treatment systems to airports and oil and gas pipelines. Top Biden administration officials have issued public warnings over the past year that China's actions could threaten American lives and are intended to cause societal panic. The hackers could also disrupt the U.S.'s ability to mobilize support for Taiwan in the event that Chinese leader Xi Jinping orders his military to invade the island.

Space

Deep Blue Aerospace Hop Test Suffers Anomaly Moments Before Landing (spacenews.com) 50

schwit1 shares a report SpaceNews with the caption: "Failures aren't failures if you learn from them." From the report: Chinese commercial rocket firm Deep Blue Aerospace conducted a first-stage rocket hop test Sunday, experiencing a partial failure during the final moments of landing. Deep Blue Aerospace carried out the test at 1:40 a.m. Eastern (0540 UTC) Sept. 22 at the firm's Ejin Banner Spaceport in Inner Mongolia using a Nebula-1 rocket first stage. Footage of the vertical liftoff, vertical landing test shows the rocket ascending to a predetermined altitude before shutting off two of the three engines used for the 179-second flight. Landing legs deployed as planned, and the stage hovered above its planned landing spot. However an anomaly during the final engine shutdown phase led to a higher-than-expected landing altitude, leading to partial damage. You can watch the landing attempt and explosion here.
Bitcoin

Government of Bhutan Holds Over $825 Million, or Nearly a Third of Its GDP, in Bitcoin, Arkham Data Shows 25

The government of Bhutan is currently holding over $828 million in bitcoin, according to onchain data by Arkham Intelligence. From a report: "Unlike most governments, Bhutan's BTC does not come from law enforcement asset seizures, but from bitcoin mining operations, which have ramped up dramatically since early 2023," the crypto intelligence firm explained. Crypto intelligence firm Arkham highlighted the Kingdom of Bhutan's bitcoin holdings on social media platform X last week. Bhutan is a small, landlocked kingdom located in the eastern Himalayas, bordered by China to the north and India to the south. The country currently has a population of less than 800,000 people. We learned last year that Bhutan had been secretly mining bitcoin using its abundant hydroelectric resources since around 2019. The operation, which began when bitcoin was priced at approximately $5,000, aims to harness the country's vast renewable energy reserves to power mining rigs.

Hydroelectricity already accounts for 30% of Bhutan's GDP and powers nearly all of its 800,000 residents. The government claimed last year that mining profits are used to subsidize power and hardware costs. This revelation makes Bhutan one of the few countries globally to run a state-owned bitcoin mine, alongside El Salvador.

At over $800 million in Bitcoin holdings, the reserve accounts for nearly a third of Bhutan's 2022-calculated GDP.
China

US Proposes Ban on Smart Cars With Chinese and Russian Tech (cnn.com) 94

The US Commerce Department on Monday will propose a ban on the sale or import of smart vehicles that use specific Chinese or Russian technology because of national security concerns, according to US officials. From a report: A US government investigation that began in February found a range of national security risks from embedded software and hardware from China and Russia in US vehicles, including the possibility of remote sabotage by hacking and the collection of personal data on drivers, Secretary of Commerce Gina Raimondo told reporters Sunday in a conference call.

"In extreme situations, a foreign adversary could shut down or take control of all their vehicles operating in the United States, all at the same time, causing crashes (or) blocking roads," she said. The rule would not apply to cars already on the road in the US that already have Chinese software installed, a senior administration official told CNN. The software ban would take effect for vehicles for "model year" 2027 and the hardware ban for "model year" 2030, according to the Commerce Department. The proposed regulatory action is part of a much broader struggle between the United States and China, the world's two biggest economies, to secure the supply chains of the key computing technology of the future, from semiconductors to AI software. China, in particular, has invested heavily in the connected car market, and inroads made by Chinese manufacturers in Europe have worried US officials.

Science

Scientists Again Link Covid Pandemic Origin to Wuhan Market Animals (msn.com) 131

The Washington Post reports: An international team of scientists published a peer-reviewed paper Thursday saying genetic evidence indicates the coronavirus pandemic most likely originated with a natural spillover from an animal or animals sold in a market in Wuhan, China, where many of the first human cases of covid-19 were identified. The paper, which appears in the journal Cell, does not claim to prove conclusively that the pandemic began in the Huanan Seafood Wholesale Market, and it is unlikely to end the acrimonious and politicized debate over the coronavirus's origin... "The results we see are consistent with infected animals, but we cannot prove that they were," said Florence Débarre, an evolutionary biologist at the French National Center for Scientific Research and a co-author of the new paper...

Many of the 23 authors of the paper are known to have long supported a market origin for the virus. In an informal report in March 2023, they presented a central feature of the genetic data — the confirmation that animals potentially capable of triggering a pandemic were in the market... The new paper in Cell is longer, more comprehensive, probes a broader range of questions, and includes more data from the market and early-patient cases than the international team's informal 2023 report, Débarre said. Both the earlier and the new reports document that traces of the virus were found clustered in a section of the Huanan Seafood Wholesale Market where genetic traces of animals were also found. Several of those species — raccoon dogs, rabbits and dogs — are known to be susceptible to infection with SARS-CoV-2, the virus that causes covid. Raccoon dogs have also been shown experimentally to be capable of transmitting the virus. A significant element of the new paper is an analysis of when the pandemic began. Scientists can study mutations of the coronavirus, which evolves at a relatively steady rate, to estimate when the millions of genomes deposited in databases had the most recent common ancestor. That genetic evidence points to mid-November 2019 as the most likely time the virus spilled into humans and began spreading, and there could have been two or more spillover events, the researchers said.

"The timing of the origin of the market outbreak is genetically indistinguishable from the timing of the origin of the pandemic as a whole," the report states. There are many independent lines of evidence pointing to the market as the epicenter of the pandemic, said Kristian Andersen, an infectious-disease researcher at Scripps Research in La Jolla, Calif., and a co-author of the report in Cell. No previous virus spillover has been so well-documented, he said. "Of any previous outbreak, pandemic, you name it, we don't have this level of granularity," he said. "We can narrow it down to a single market, and narrow it down to a section in that market, and maybe even narrow it down to a single stall in that market. That is mind-boggling...." The genetic evidence, the new report contends, supports the hypothesis that SARS-CoV-2 emerged in the same way that SARS-CoV-1 — which sickened people in 2002-2003 but was extinguished before it could cause a full-blown pandemic — is widely believed to have started, from animals sold in a market.

The authors contend the world needs to take more aggressive action to shut down the illegal trade in wildlife to lower the risk of another catastrophic pandemic... There is no evidence that the virus, or its progenitor, was inside a laboratory before the outbreak.... "To the question — Did it come from a lab or come from a market? — I think we already knew the answer to that," Andersen said. "Yep, it's the market. It's natural, as we've previously seen happen."

One co-author posted a summary on X.com "If you don't want to read the papers."
  • "Early cases centered around the market (not a lab)"
  • "Environmental swabs that tested positive for SARS-CoV-2 clustered in the corner of the market where animals were sold."
  • "There were 2 lineages of SARS2 that spilled over separately at Huanan."

Privacy

Chinese Spies Spent Months Inside Aerospace Engineering Firm's Network Via Legacy IT (theregister.com) 16

The Register's Jessica Lyons reports: Chinese state-sponsored spies have been spotted inside a global engineering firm's network, having gained initial entry using an admin portal's default credentials on an IBM AIX server. In an exclusive interview with The Register, Binary Defense's Director of Security Research John Dwyer said the cyber snoops first compromised one of the victim's three unmanaged AIX servers in March, and remained inside the US-headquartered manufacturer's IT environment for four months while poking around for more boxes to commandeer. It's a tale that should be a warning to those with long- or almost-forgotten machines connected to their networks; those with shadow IT deployments; and those with unmanaged equipment. While the rest of your environment is protected by whatever threat detection you have in place, these legacy services are perfect starting points for miscreants.

This particular company, which Dwyer declined to name, makes components for public and private aerospace organizations and other critical sectors, including oil and gas. The intrusion has been attributed to an unnamed People's Republic of China team, whose motivation appears to be espionage and blueprint theft. It's worth noting the Feds have issued multiple security alerts this year about Beijing's spy crews including APT40 and Volt Typhoon, which has been accused of burrowing into American networks in preparation for destructive cyberattacks.

After discovering China's agents within its network in August, the manufacturer alerted local and federal law enforcement agencies and worked with government cybersecurity officials on attribution and mitigation, we're told. Binary Defense was also called in to investigate. Before being caught and subsequently booted off the network, the Chinese intruders uploaded a web shell and established persistent access, thus giving them full, remote access to the IT network -- putting the spies in a prime position for potential intellectual property theft and supply-chain manipulation. If a compromised component makes it out of the supply chain and into machinery in production, whoever is using that equipment or vehicle will end up feeling the brunt when that component fails, goes rogue, or goes awry.

"The scary side of it is: With our supply chain, we have an assumed risk chain, where whoever is consuming the final product -- whether it is the government, the US Department of the Defense, school systems â" assumes all of the risks of all the interconnected pieces of the supply chain," Dwyer told The Register. Plus, he added, adversarial nations are well aware of this, "and the attacks continually seem to be shifting left." That is to say, attempts to meddle with products are happening earlier and earlier in the supply-chain pipeline, thus affecting more and more victims and being more deep-rooted in systems. Breaking into a classified network to steal designs or cause trouble is not super easy. "But can I get into a piece of the supply chain at a manufacturing center that isn't beholden to the same standards and accomplish my goals and objectives?" Dwyer asked. The answer, of course, is yes. [...]

China

China Wants Red Flags on All AI-generated Content Posted Online 58

China's internet regulator has proposed a strict regime that will, if adopted, require digital platforms to label content created by AI. From a report: The Cyberspace Administration of China announced its draft plan, which will require platforms and online service providers to label all AI-generated material with a visible logo and with metadata embedded in relevant files. The draft proposes that logos appear in several locations in a text, image, video, or audio file. In audio files, Beijing wants a voice prompt to inform listeners about AI-generated content at the start and end of a file -- and, as appropriate, mid-file too. Software that plays audio files will also need to inform netizens when they tune in to AI content.

Video players can get away with just posting notices about the content at the start, end, and relevant moments during a clip. Netizens who post AI-generated content will be required to label it as such. If they use generation tools provided by a platform, they'll be required to identify themselves -- and a log of their activities will be retained for six months. Some labels denoting AI-made content will be applied dynamically, based on metadata embedded in AI-generated content.
AI

AI Pioneers Call For Protections Against 'Catastrophic Risks' 69

An anonymous reader quotes a report from the New York Times: Scientists who helped pioneer artificial intelligence are warning that countries must create a global system of oversight to check the potentially grave risks posed by the fast-developing technology. The release of ChatGPT and a string of similar services that can create text and images on command have shown how A.I. is advancing in powerful ways. The race to commercialize the technology has quickly brought it from the fringes of science to smartphones, cars and classrooms, and governments from Washington to Beijing have been forced to figure out how to regulate and harness it. In a statement on Monday, a group of influential A.I. scientists raised concerns that the technology they helped build could cause serious harm. They warned that A.I. technology could, within a matter of years, overtake the capabilities of its makers and that "loss of human control or malicious use of these A.I. systems could lead to catastrophic outcomes for all of humanity."

If A.I. systems anywhere in the world were to develop these abilities today, there is no plan for how to rein them in, said Gillian Hadfield, a legal scholar and professor of computer science and government at Johns Hopkins University. "If we had some sort of catastrophe six months from now, if we do detect there are models that are starting to autonomously self-improve, who are you going to call?" Dr. Hadfield said. On Sept. 5-8, Dr. Hadfield joined scientists from around the world in Venice to talk about such a plan. It was the third meeting of the International Dialogues on A.I. Safety, organized by the Safe AI Forum, a project of a nonprofit research group in the United States called Far.AI. Governments need to know what is going on at the research labs and companies working on A.I. systems in their countries, the group said in its statement. And they need a way to communicate about potential risks that does not require companies or researchers to share proprietary information with competitors. The group proposed that countries set up A.I. safety authorities to register the A.I. systems within their borders. Those authorities would then work together to agree on a set of red lines and warning signs, such as if an A.I. system could copy itself or intentionally deceive its creators. This would all be coordinated by an international body.

Among the signatories was Yoshua Bengio, whose work is so often cited that he is called one of the godfathers of the field. There was Andrew Yao, whose course at Tsinghua University in Beijing has minted the founders of many of China's top tech companies. Geoffrey Hinton, a pioneering scientist who spent a decade at Google, participated remotely. All three are winners of the Turing Award, the equivalent of the Nobel Prize for computing. The group also included scientists from several of China's leading A.I. research institutions, some of which are state-funded and advise the government. A few former government officials joined, including Fu Ying, who had been a Chinese foreign ministry official and diplomat, and Mary Robinson, the former president of Ireland. Earlier this year, the group met in Beijing, where they briefed senior Chinese government officials on their discussion.
AI

AI Pioneers Call for Protections Against 'Catastrophic Risks' (nytimes.com) 37

AI pioneers have issued a stark warning about the technology's potential risks, calling for urgent global oversight. At a recent meeting in Venice, scientists from around the world discussed the need for a coordinated international response to AI safety concerns. The group proposed establishing national AI safety authorities to monitor and register AI systems, which would collaborate to define red flags such as self-replication or intentional deception capabilities. The report adds: Scientists from the United States, China, Britain, Singapore, Canada and elsewhere signed the statement. Among the signatories was Yoshua Bengio, whose work is so often cited that he is called one of the godfathers of the field. There was Andrew Yao, whose course at Tsinghua University in Beijing has minted the founders of many of China's top tech companies. Geoffrey Hinton, a pioneering scientist who spent a decade at Google, participated remotely. All three are winners of the Turing Award, the equivalent of the Nobel Prize for computing. The group also included scientists from several of China's leading A.I. research institutions, some of which are state-funded and advise the government. A few former government officials joined, including Fu Ying, who had been a Chinese foreign ministry official and diplomat, and Mary Robinson, the former president of Ireland. Earlier this year, the group met in Beijing, where they briefed senior Chinese government officials on their discussion.
China

China Raises Retirement Age For First Time Since 1950s (bbc.com) 157

China will "gradually raise" its retirement age for the first time since the 1950s, as the country confronts an ageing population and a dwindling pension budget. From a report: The top legislative body on Friday approved proposals to raise the statutory retirement age from 50 to 55 for women in blue-collar jobs, and from 55 to 58 for females in white-collar jobs. Men will see an increase from 60 to 63. China's current retirement ages are among the lowest in the world.

According to the plan passed on Friday, the change will set in from 1 January 2025, with the respective retirement ages raised every few months over the next 15 years, said Chinese state media. Retiring before the statutory age will not be allowed, state news agency Xinhua reported, although people can extend their retirement by no more than three years. Starting 2030, employees will also have to make more contributions to the social security system in order to receive pensions. By 2039, they would have to clock 20 years of contributions to access their pensions.

Crime

$50M In Counterfeit Vintage Consoles and Videogames Seized From Italian Crime Ring (bbc.com) 30

Police in Italy "smashed" a videogame trafficking ring, reports the BBC. They seized fake vintage Nintendo, Sega and Atari consoles that didn't meet strict safety standards, as well as counterfeit games — including Mario Bros., Street Fighter and Star Wars — that together were worth almost €50m ($55.5m) Around 12,000 consoles holding over 47 million pirated video games were seized by police, Alessandro Langella, head of the economic crime unit for Turin's financial police, told the AFP news agency... They were "all from China" and were imported to be sold in specialised shops or online, Mr Langella said...

The seized games have been destroyed. Nine Italian nationals have been arrested and charged with trading in counterfeited goods. If found guilty, they face up to eight years in prison.

United States

US Takes Aim At Shein and Temu With New Import Rule Proposal (theverge.com) 63

The Biden administration is proposing new rules to limit the "de minimis" exemption, which some Chinese e-commerce companies like Shein and Temu use to ship low-cost goods under $800 to U.S. customers without tariffs. The changes would subject certain shipments to closer inspection and tariffs, aiming to protect American consumers and businesses by ensuring a level playing field against Chinese platforms that have exploited this loophole. The Verge reports: Under the proposed rules, the US will prevent companies from claiming the de minimis exemption if their goods are covered by Section 301, Section 232, and Section 201 tariffs, which apply to products from China, steel, and aluminum, as well as washing machines and solar panels. In addition to slapping these shipments with tariffs, the rule change would subject them to closer inspection by US Customs and Border Protection.

The Biden administration said the proposal would help "protect consumers from goods that do not meet regulatory health and safety standards." Even though Shein is headquartered in Singapore, it's known for cheap fast fashion that's mainly manufactured in China. The China-based Temu sells clothes, household items, electronics, and a variety of other goods made in the country as well.

China

China's Startup Ecosystem Collapses as New Venture Formations Plunge 98% 63

China's once-booming venture capital industry is experiencing a severe downturn, with the number of new startups plummeting from 51,302 in 2018 to just 1,202 in 2023, according to data provider IT Juzi. This decline is starkly evident in science parks and innovation hubs across the country, where vacant offices and abandoned equipment have become commonplace, according to a stunning FT story.

Industry insiders attribute the crisis to a combination of factors, including China's economic slowdown, heightened US-China tensions, and President Xi Jinping's policies targeting the tech sector. The government's anti-corruption drive and increased scrutiny of successful entrepreneurs have further dampened the private sector's enthusiasm. The funding landscape has shifted dramatically, with state-backed funds now dominating the market. This has led to more conservative investment strategies, favoring lower-risk sectors like advanced manufacturing over traditionally popular areas such as biotech and consumer technology. Founders face increasingly stringent terms, including personal liability for investments and asset checks. Many established VC firms are downsizing operations and exploring overseas opportunities.
Oracle

Oracle Is Designing a Data Center That Would Be Powered By Three Small Nuclear Reactors 96

With electricity demand from AI becoming so "crazy," Oracle's Larry Ellison announced the company is designing a data center that will be powered by three small nuclear reactors capable of providing more than a gigawatt of electricity. "The location and the power place we've located, they've already got building permits for three nuclear reactors," Ellison said. "These are the small modular nuclear reactors to power the data center. This is how crazy it's getting. This is what's going on." CNBC reports: Small modular nuclear reactors are new designs that promise to speed the deployment of reliable, carbon-free energy as power demand rises from data centers, manufacturing and the broader electrification of the economy. Generally, these reactors are 300 megawatts or less, about a third the size of the typical reactor in the current U.S. fleet. They would be prefabricated in several pieces and then assembled on the site, reducing the capital costs that stymie larger plants.

Right now, small modular reactors are a technology of the future, with executives in the nuclear industry generally agreeing that they won't be commercialized in the U.S. until the 2030s. There are currently three operational small modular reactors in the world, according to the Nuclear Energy Agency. Two are in China and Russia, the central geopolitical adversaries of the U.S. A test reactor is also operational in Japan.
Crime

Former Samsung Execs Arrested For Using Stolen Tech To Build Chip Factory In China (tomshardware.com) 18

South Korean police have arrested two former Samsung executives for allegedly leaking $3.2 billion worth of Samsung secrets to China to aid in building 20nm DRAM chips. Tom's Hardware reports: The authorities reported that one of the arrested suspects, 66-year-old Mr. Choi, set up a joint venture building chips in China alongside some local officials and served as its CEO. He was allegedly assisted by a plant designer, Mr. Oh, in this venture, while he also attempted to recruit other South Korean experts to work for him. However, Choi's arrest comes after being suspected of leaking Samsung memory technologies to build 20nm DRAM chips at the Chinese factory, Chengdu Gaozhen.

Samsung is one of the leading memory manufacturers, working with other major companies like Nvidia to produce VRAM while offering its own storage and memory solutions. The police said Choi's move "weakened the nation's competitiveness when the countries are in a global chip war." With the capture of the company's head, the authorities claim that this will stop the operation of the Chinese venture. However, investigators are still looking into the case to determine if other cases of industrial espionage will spring up from this case.

China

China's Huawei Shows the World Its $2,800 'Trifold' Phone 66

An anonymous reader shares a report: Over successive administrations, the U.S. government has used stiff trade restrictions to try to stifle the Chinese telecom giant Huawei. In turn, the company never misses an opportunity to show that it is still standing. Last year, at the tail end of a visit to China by Gina Raimondo, the U.S. commerce secretary, Huawei unveiled a smartphone that was powered by an advanced semiconductor made in China. The chip was exactly the kind of technology that the United States, in an effort led by Ms. Raimondo, had tried to prevent China from developing.

The Huawei phone, called the Mate 60 Pro, was heralded in China as the triumph of a national champion over American constraints. It sold out within minutes on Chinese e-commerce platforms. Many shoppers chose to pair their purchase with a phone case emblazoned with a photo of Ms. Raimondo's face. In the Chinese tech hub of Shenzhen on Tuesday, Huawei again made a bid for the spotlight with the announcement of a new device just hours after Apple introduced its iPhone 16 in California. Huawei's latest phone, the Mate XT, is heavy on novelty: It can be folded, twice [non-paywalled source].

The tablet-size device folds along two vertical seams to become the size of a typical phone. It is the first commercially available trifold smartphone. It comes in two colors, red and black, and will go on sale on Sept. 20. "It's a piece of work that everyone has thought of but never managed to create," said Richard Yu, Huawei's consumer group chairman. "I have always had a dream to put our tablet in my pocket, and we did it." The Mate XT, with a screen that measures 10.2 inches diagonally, is equipped with artificial intelligence-enabled translation, messaging and photo editing features. Mr. Yu also unveiled a thin keyboard that folds in half to the same size as the phone. He showed the audience how he carried both together in the pocket of his suit jacket. Starting at $2,800, the Mate XT is priced like a luxury product.

Slashdot Top Deals