Trump EPA sidelined its own scientists when rewriting fuel economy rules

EPA tossed its pollution models, allowing another agency to hack its instead.

A man in a suit adjusts his spectacles.

Enlarge / Former EPA Administrator Scott Pruitt. (credit: Aaron P. Bernstein / Getty Images)

The Trump administration effectively muffled scientific staffers at the Environmental Protection Agency when it rewrote automobile pollution rules, the agency’s watchdog said.

When drafting fuel economy and greenhouse gas pollution rules for cars and light trucks, former EPA Administrator Scott Pruitt decided to cede various EPA duties to the National Highway Transportation Safety Administration in what is typically a collaborative process, the independent inspector general said in a report released yesterday. Though Pruitt signed the final report for the EPA, he allowed NHTSA staff to write a significant portion of the rule and to complete all modeling and analysis for both agencies.

The NHTSA’s modeling efforts did not use the EPA’s established tools that had been created to evaluate greenhouse gas emissions standards. Instead, the NHTSA hacked its own Corporate Average Fuel Economy models and sent EPA experts the results late in the process. “Technical personnel were unable to fully collaborate on rule development,” the report said.

Read 10 remaining paragraphs | Comments

Trump EPA sidelined its own scientists when rewriting fuel economy rules

EPA tossed its pollution models, allowing another agency to hack its instead.

A man in a suit adjusts his spectacles.

Enlarge / Former EPA Administrator Scott Pruitt. (credit: Aaron P. Bernstein / Getty Images)

The Trump administration effectively muffled scientific staffers at the Environmental Protection Agency when it rewrote automobile pollution rules, the agency’s watchdog said.

When drafting fuel economy and greenhouse gas pollution rules for cars and light trucks, former EPA Administrator Scott Pruitt decided to cede various EPA duties to the National Highway Transportation Safety Administration in what is typically a collaborative process, the independent inspector general said in a report released yesterday. Though Pruitt signed the final report for the EPA, he allowed NHTSA staff to write a significant portion of the rule and to complete all modeling and analysis for both agencies.

The NHTSA’s modeling efforts did not use the EPA’s established tools that had been created to evaluate greenhouse gas emissions standards. Instead, the NHTSA hacked its own Corporate Average Fuel Economy models and sent EPA experts the results late in the process. “Technical personnel were unable to fully collaborate on rule development,” the report said.

Read 10 remaining paragraphs | Comments

In new deal, Wisconsin slashes controversial Foxconn subsidies 30-fold

New deal requires Foxconn to create 1,454 jobs—down from 13,000 in the original.

A man in a open-collar suit speaks into a microphone.

Enlarge / Foxconn chairman Young Liu speaks in Taipei on March 16, 2021. (credit: -Hwa Cheng/Bloomberg via Getty Images)

The state of Wisconsin has negotiated a dramatically scaled-back deal with Taiwanese contract manufacturer Foxconn. The move, announced Tuesday by Democratic Gov. Tony Evers, is a repudiation of a deal negotiated four years earlier by Evers' Republican predecessor Scott Walker.

The original deal envisioned Foxconn spending as much as $10 billion to manufacture a state-of-the-art factory for manufacturing large liquid-crystal display panels. The deal was announced in 2017, and then-President Donald Trump traveled to Wisconsin for the 2018 groundbreaking, describing the new factory as "the eighth wonder of the world." Foxconn was supposed to get $2.85 billion in state and local incentives under that original deal.

The deal may have been savvy politics for Foxconn in 2017. The company uses factories in other countries to assemble consumer electronics products for Apple and other American companies—products that are often then sent back to the United States for sale. So Trump's protectionist inclinations seemed like a serious threat. Announcing plans to create of thousands of jobs in a key battleground state gave Trump something to boast about, and that may have helped Foxconn curry favor with the new administration.

Read 5 remaining paragraphs | Comments

In epic hack, Signal developer turns the tables on forensics firm Cellebrite

Widely used forensic software can be exploited to infect investigators’ computers.

In epic hack, Signal developer turns the tables on forensics firm Cellebrite

Enlarge (credit: Moxie Marlinspike/Signal)

For years, Israeli digital forensics firm Cellebrite has helped governments and police around the world break into confiscated mobile phones, mostly by exploiting vulnerabilities that went overlooked by device manufacturers. Now, Moxie Marlinspike—the brainchild behind the Signal messaging app—has turned the tables.

On Wednesday, Marlinspike published a post that reported vulnerabilities in Cellebrite software that allowed him to execute malicious code on the Windows computer used to analyze a device. The researcher and software engineer exploited the vulnerabilities by loading specially formatted files that can be embedded into any app installed on the device.

Virtually no limits

“There are virtually no limits on the code that can be executed,” Marlinspike wrote.

Read 10 remaining paragraphs | Comments

A new Amazon Fire tablet hits the FCC (probably)

Amazon could be preparing to launch a new Fire tablet soon. An unannounced device that showed up at the FCC website today has all the hallmarks of an Amazon Fire tablet. There’s no word on the screen size, display resolution, or processor. But A…

Amazon could be preparing to launch a new Fire tablet soon. An unannounced device that showed up at the FCC website today has all the hallmarks of an Amazon Fire tablet. There’s no word on the screen size, display resolution, or processor. But Amazon’s strategy for the past few years has been to provide budget […]

The post A new Amazon Fire tablet hits the FCC (probably) appeared first on Liliputing.

New data is evidence of process that powers exploding stars

We’re still trying to understand the mechanics that allow a star to self-destruct.

image of a multicolored blob.

Enlarge / A multi-wavelength image of the Cassiopeia A supernova remnant. (credit: Courtesy NASA/JPL-Caltech)

Supernovae happen. We've witnessed enough of them that we're pretty sure of that. Why they happen has been another issue entirely. As we've worked on understanding the physics that drives these immense explosions, we've occasionally gone through awkward periods when the stars in our models stop exploding. Adding in more realistic physics has generally gotten the models booming again, and right now we're in a period where the latest models appear to be happily self-destructing.

The challenge is trying to find evidence that the physics we're using in our successful models accurately reflects what's going on in a dying star—not an easy task with an event that instantly destroys much of the evidence.

Now, data from the Chandra X-ray Observatory provides a hint that a mechanism used in recent supernova models is probably right. The results are published in this week's issue of Nature.

Read 12 remaining paragraphs | Comments

Russia Wants Instagram to Stop Blocking Its Anthem over Copyright Issues

Russia’s telecoms watchdog ‘Roskomnadzor’ has sent a letter to Instagram demanding that the company removes its copyright restrictions on posts that feature the national anthem. The Government organization hints at systematic and purposeful blocking by…

Russia's telecoms watchdog 'Roskomnadzor' has sent a letter to Instagram demanding that the company removes its copyright restrictions on posts that feature the national anthem. The Government organization hints at systematic and purposeful blocking by Western social networks, which was widely picked up by local media. Reality appears to be less nefarious, however.

From: TF, for the latest news on copyright battles, piracy and more.

Microsoft brings desktop Linux apps to Windows 10 Insiders, GUI and all

Microsoft’s Windows Subsystem for Linux (WSL) has allowed users to install a Linux distribution and run command line applications since Windows 10 first launched in 2015. Initially aimed at developers who wanted to be able to use Linux tools wit…

Microsoft’s Windows Subsystem for Linux (WSL) has allowed users to install a Linux distribution and run command line applications since Windows 10 first launched in 2015. Initially aimed at developers who wanted to be able to use Linux tools without rebooting or loading a virtual machine, WSL has picked up a number of improvements and […]

The post Microsoft brings desktop Linux apps to Windows 10 Insiders, GUI and all appeared first on Liliputing.

More than one scribe wrote the text of a Dead Sea Scroll, handwriting shows

Using pattern recognition and AI techniques “opens new window” to ancient world.

Photographic reproduction of the Great Isaiah Scroll, the best preserved of the biblical scrolls found at Qumran. It contains the entire Book of Isaiah in Hebrew, apart from some small damaged parts.

Enlarge / Photographic reproduction of the Great Isaiah Scroll, the best preserved of the biblical scrolls found at Qumran. It contains the entire Book of Isaiah in Hebrew, apart from some small damaged parts. (credit: Public domain)

Most of the scribes who copied the text contained in the Dead Sea Scrolls were anonymous, as they neglected to sign their work. That has made it challenging for scholars to determine whether a given manuscript should be attributed to a single scribe or more than one, based on unique elements in their writing styles (a study called paleography). Now, a new handwriting analysis of the Great Isaiah Scroll, applying the tools of artificial intelligence, has revealed that the text was likely written by two scribes, mirroring one another's writing style, according to a new paper published in the journal PLOS ONE.

As we've reported previously, these ancient Hebrew texts—roughly 900 full and partial scrolls in all, stored in clay jars—were first discovered scattered in various caves near what was once the settlement of Qumran, just north of the Dead Sea, by Bedouin shepherds in 1946-1947. (Apparently, a shepherd threw a rock while searching for a lost member of his flock and accidentally shattered one of the clay jars, leading to the discovery.) Qumran was destroyed by the Romans, circa 73 CE, and historians believe the scrolls were hidden in the caves by a sect called the Essenes to protect them from being destroyed. The natural limestone and conditions within the caves helped preserve the scrolls for millennia; they date back to between the third century BCE and the first century CE.

Several of the parchments have been carbon dated, and synchrotron radiation—among other techniques—has been used to shed light on the properties of the ink used for the text. Most recently, in 2018, an Israeli scientist named Oren Ableman used an infrared microscope attached to a computer to identify and decipher Dead Sea Scroll fragments stored in a cigar box since the 1950s.

Read 13 remaining paragraphs | Comments

They hacked McDonald’s ice cream machines—and started a cold war

How one couple built a device to fix McDonald’s notoriously broken soft-serve machines.

The lure of frozen deliciousness that led to uncovering insane techno craziness.

Enlarge / The lure of frozen deliciousness that led to uncovering insane techno craziness. (credit: NurPhoto | Getty Images)

Of all the mysteries and injustices of the McDonald’s ice cream machine, the one that Jeremy O’Sullivan insists you understand first is its secret passcode.

Press the cone icon on the screen of the Taylor C602 digital ice cream machine, he explains, then tap the buttons that show a snowflake and a milkshake to set the digits on the screen to 5, then 2, then 3, then 1. After that precise series of no fewer than 16 button presses, a menu magically unlocks. Only with this cheat code can you access the machine’s vital signs: everything from the viscosity setting for its milk and sugar ingredients to the temperature of the glycol flowing through its heating element to the meanings of its many sphinxlike error messages.

“No one at McDonald’s or Taylor will explain why there’s a secret, undisclosed menu," O’Sullivan wrote in one of the first, cryptic text messages I received from him earlier this year.

Read 81 remaining paragraphs | Comments