«Перше практичне заняття відбулося сьогодні, на Міжнародний день рідної мови», заявили в пресслужбі
…
WASHINGTON — A company from Texas is poised to attempt a feat that until now has only been accomplished by a handful of national space agencies but could soon become commonplace for the private sector: landing on the moon.
If all goes to plan, Houston-based Intuitive Machines will guide its spaceship named Odysseus to a gentle touchdown near the lunar south pole on Thursday at 2249 GMT, then run experiments for NASA that will help pave the way for the return of astronauts later this decade.
A previous effort by another U.S. company last month ended in failure, raising the stakes to demonstrate private industry has what it takes to put an American lander on Earth’s cosmic companion for the first time since the Apollo era.
“Accepting risk was a challenge posed by the United States to the commercial business sector,” Intuitive Machines CEO Steve Altemus said ahead of launch. “Our collective aim is to return to the moon for the first time in 52 years.”
The company plans to run a live stream on its website, with flight controllers expected to confirm landing around 15 seconds after the milestone is achieved, because of the time it takes for radio signals to return.
As it approaches the surface, Odysseus will shoot out an external “EagleCam” that captures images of the lander in the final seconds of its descent.
About the size of a big golf cart, Odysseus is hexagon-shaped and stands on six legs.
It launched on Feb. 15 atop a SpaceX Falcon 9 rocket, and boasts a new type of supercooled liquid oxygen, liquid methane propulsion system that allowed it to race through space in quick time, snapping pictures of our planet along the way.
Its destination, Malapert A, is an impact crater 300 kilometers (180 miles) from the lunar south pole.
NASA hopes to eventually build a long-term presence and harvest ice there for both drinking water and rocket fuel under Artemis, its flagship Moon-to-Mars program.
The U.S. space agency paid Intuitive Machines $118 million to ship science hardware to better understand and mitigate environmental risks for astronauts, the first of whom are scheduled to land no sooner than 2026.
Instruments include cameras to investigate how the lunar surface changes as a result of the engine plume from a spaceship, and a device to analyze clouds of charged dust particles that hang over the surface at twilight as a result of solar radiation.
The rest of the cargo was paid for by Intuitive Machines’ private clients and includes 125 stainless steel mini moons by the artist Jeff Koons.
After touchdown, the experiments are expected to run for roughly seven days before lunar night sets in on the south pole, with the lack of solar power rendering Odysseus inoperable.
Dubbed IM-1, the mission is the second under a NASA initiative called Commercial Lunar Payload Services (CLPS), which it created to delegate cargo services to the private sector to achieve savings and stimulate a wider lunar economy.
Four more CLPS launches are expected this year, which would make 2024 among the busiest ever for moon landings.
The first, by Pittsburgh-based Astrobotic, launched in January, but its Peregrine spacecraft sprung a fuel leak and it was eventually brought back to burn up in Earth’s atmosphere.
Spaceships landing on the moon have to navigate treacherous boulders and craters and, absent an atmosphere to support parachutes, must rely on thrusters to control their descent. Roughly half of the more than 50 attempts have failed.
The Soviet Union was the first country to achieve a survivable landing on a celestial body when its Luna 9 spaceship touched down and transmitted pictures back from the moon in February 1966.
Next came the United States, which is still the only country to also put people on the surface.
In America’s long absence, China has landed three times since 2013. India reached the moon in 2023, and Japan was the latest, last month.
…
Health care professionals are increasingly using artificial intelligence to better diagnose and treat serious medical conditions. However, with the use of artificial intelligence in medicine growing, there are concerns among medical ethicists about how emerging technologies should be deployed
…
Kenyan companies, facing economic challenges, are turning to artificial intelligence to reduce production and advertising expenses. That’s causing anxiety among artists and ad agencies, who fear reduced income and job losses if AI can replace the work they’ve always done. Mohammed Yusuf reports from Nairobi.
…
LONDON — Lockbit, a notorious cybercrime gang that holds its victims’ data for ransom, has been disrupted in a rare international law enforcement operation by Britain’s National Crime Agency, the U.S. Federal Bureau of Investigation, Europol and a coalition of international police agencies, according to a post on the gang’s extortion website on Monday.
“This site is now under the control of the National Crime Agency of the UK, working in close cooperation with the FBI and the international law enforcement task force, ‘Operation Cronos,’” the post said.
An NCA spokesperson confirmed that the agency had disrupted the gang and said the operation was “ongoing and developing.”
A representative for Lockbit did not respond to messages from Reuters seeking comment but did post messages on an encrypted messaging app saying it had backup servers not affected by the law enforcement action.
The U.S. Department of Justice and the FBI did not immediately respond to requests for comment.
The post named other international police organizations from France, Japan, Switzerland, Canada, Australia, Sweden, the Netherlands, Finland and Germany.
Lockbit and its affiliates have hacked some of the world’s largest organizations in recent months. The gang makes money by stealing sensitive data and threatening to leak it if victims fail to pay an extortionate ransom. Its affiliates are like-minded criminal groups that are recruited by the group to wage attacks using Lockbit’s digital extortion tools.
Ransomware is malicious software that encrypts data. Lockbit makes money by coercing its targets into paying ransom to decrypt or unlock that data with a digital key.
Lockbit was discovered in 2020 when its eponymous malicious software was found on Russian-language cybercrime forums, leading some security analysts to believe the gang is based in Russia.
The gang has not professed support for any government, however, and no government has formally attributed it to a nation-state. On its now-defunct dark web site, the group said it was “located in the Netherlands, completely apolitical and only interested in money.”
“They are the Walmart of ransomware groups, they run it like a business — that’s what makes them different,” said Jon DiMaggio, chief security strategist at Analyst1, a U.S.-based cybersecurity firm. “They are arguably the biggest ransomware crew today.”
Officials in the United States, where Lockbit has hit more than 1,700 organizations in nearly every industry from financial services and food to schools, transportation and government departments, have described the group as the world’s top ransomware threat.
In November of last year, Lockbit published internal data from Boeing, one of the world’s largest defense and space contractors. In early 2023, Britain’s Royal Mail faced severe disruption after an attack by the group.
According to vx-underground, a cybersecurity research website, Lockbit said in a statement in Russian and shared on Tox, an encrypted messaging app, that the FBI hit its servers that run on the programming language PHP. The statement, which Reuters could not verify independently, added that it has backup servers without PHP that “are not touched.”
On X, formerly known as Twitter, vx-underground shared screenshots showing the control panel used by Lockbit’s affiliates to launch attacks had been replaced with a message from law enforcement: “We have source code, details of the victims you have attacked, the amount of money extorted, the data stolen, chats, and much, much more,” it said.
“We may be in touch with you very soon” it added. “Have a nice day.”
Before it was taken down, Lockbit’s website displayed an ever-growing gallery of victim organizations that was updated nearly daily. Next to their names were digital clocks that showed the number of days left to the deadline given to each organization to provide ransom payment.
On Monday, Lockbit’s site displayed a similar countdown, but from the law enforcement agencies who hacked the hackers: “Return here for more information at: 11:30 GMT on Tuesday 20th Feb.” the post said.
Don Smith, vice president of Secureworks, an arm of Dell Technologies, said Lockbit was the most prolific and dominant ransomware operator in a highly competitive underground market.
“To put today’s takedown into context, based on leak site data, Lockbit had a 25% share of the ransomware market. Their nearest rival was Blackcat at around 8.5%, and after that it really starts to fragment,” Smith said.
“Lockbit dwarfed all other groups and today’s action is highly significant.”
…