Historian Garrett M. Graff describes his upcoming book, The Devil Reached Toward the Sky: An Oral History of the Making and Unleashing of the Atomic Bomb. "I assembled an oral history of the Manhattan Project, the bombings of Hiroshima and Nagasaki and the end of World War II in the Pacific, told through the voices of around 500 participants and witnesses of the events — including luminaries like Albert Einstein and Oppenheimer and political figures like President Harry Truman."
It was 80 years ago this week that physicists and 150 other leaders in the atomic bomb program "gathered in the desert outside Alamogordo, New Mexico, for the world's first test of a nuclear explosion." In an except from his upcoming book, Graff publishes quotes from eyewitness:
Brig. Gen. Leslie Groves: I had become a bit annoyed with Fermi when he suddenly offered to take wagers from his fellow scientists on whether or not the bomb would ignite the atmosphere, and if so, whether it would merely destroy New Mexico or destroy the world. He had also said that after all it wouldn't make any difference whether the bomb went off or not because it would still have been a well worthwhile scientific experiment. For if it did fail to go off, we would have proved that an atomic explosion was not possible. Afterward, I realized that his talk had served to smooth down the frayed nerves and ease the tension of the people at the base camp, and I have always thought that this was his conscious purpose. Certainly, he himself showed no signs of tension that I could see...
As the hour approached, we had to postpone the test — first for an hour and then later for 30 minutes more — so that the explosion was actually three- and one-half hours behind the original schedule... Our preparations were simple. Everyone was told to lie face down on the ground, with his feet toward the blast, to close his eyes and to cover his eyes with his hands as the countdown approached zero. As soon as they became aware of the flash they could turn over and sit or stand up, covering their eyes with the smoked glass with which each had been supplied... The quiet grew more intense. I, myself, was on the ground between Bush and Conant...
Edward Teller: We all were lying on the ground, supposedly with our backs turned to the explosion. But I had decided to disobey that instruction and instead looked straight at the bomb. I was wearing the welder's glasses that we had been given so that the light from the bomb would not damage our eyes. But because I wanted to face the explosion, I had decided to add some extra protection. I put on dark glasses under the welder's glasses, rubbed some ointment on my face to prevent sunburn from the radiation, and pulled on thick gloves to press the welding glasses to my face to prevent light from entering at the sides... We all listened anxiously as the broadcast of the final countdown started; but, for whatever reason, the transmission ended at minus five seconds...
Kenneth T. Bainbridge: My personal nightmare was knowing that if the bomb didn't go off or hang-fired, I, as head of the test, would have to go to the tower first and seek to find out what had gone wrong...
Brig. Gen. Thomas F. Farrell: Dr. Oppenheimer held on to a post to steady himself. For the last few seconds, he stared directly ahead.
A few examples of how they remembered the explosion:
William L. Laurence: There rose from the bowels of the earth a light not of this world, the light of many suns in one.
Kenneth T. Bainbridge: I felt the heat on the back of my neck, disturbingly warm.
George B. Kistiakowsky: I am sure that at the end of the world — in the last millisecond of the earth's existence — the last man will see what we have just seen.
Brig. Gen. Thomas F. Farrell: Oppenheimer's face relaxed into an expression of tremendous relief.
J. Robert Oppenheimer: We knew the world would not be the same. A few people laughed, a few people cried.
Norris Bradbury, physicist, Los Alamos Lab: Some people claim to have wondered at the time about the future of mankind. I didn't. We were at war, and the damned thing worked.
Read more of this story at Slashdot.
ABC News reports:
Dialogue heard on a cockpit voice recording indicates that the captain of the Air India flight that crashed in June, killing 260 people, may have turned off the fuel just after takeoff, prompting the first officer to panic, according to The Wall Street Journal, which cited sources familiar with U.S. official's early assessment... The president of the Federation of Indian Pilots condemned the Wall Street Journal report, saying, "The preliminary report nowhere states that the pilots have moved the fuel control switches, and this has been corroborated by the CVR [cockpit voice recorder] recording."
But meanwhile "India on Monday ordered its airlines to examine fuel switches on several Boeing aircraft models," reports Reuters, "while South Korea ordered a similar measure on Tuesday, as scrutiny intensified of fuel switch locks at the centre of an investigation into a deadly Air India crash."
The precautionary moves by the two countries and airlines in several others came despite the planemaker and the U.S. Federal Aviation Administration assuring airlines and regulators in recent days that the fuel switch locks on Boeing jets are safe... [The preliminary report] noted a 2018 advisory from the FAA, which recommended, but did not mandate, operators of several Boeing models, including the 787, to inspect the locking feature of fuel cutoff switches to ensure they could not be moved accidentally... Some airlines around the world told Reuters they had been checking relevant switches since 2018 in accordance with the FAA advisory, including Australia's Qantas Airways. Others said they had made additional or new checks since the release of the preliminary report into the Air India crash.
The web site of India's Financial Express newspaper spoke to Mary Schiavo, who was Inspector General of America's Transportation Department from 1990 to 1996 (and is also a long-time critic of the FAA). The site notes Schiavo "rejected the claims of human error that a pilot downed the Ahmedabad to London flight by cutting off the fuel supply."
Schiavo exclusively told FinancialExpress.com that this is not the first time fuel switch transitioned from "Run" to "Cutoff" on its own. It happened five years ago, too. "There was an All Nippon Airways (ANA) flight in 2019 in which the 787 aircraft did this itself, while the flight was on final approach. No pilot input cutting off the fuel whatsoever," Schiavo told FinancialExpress.com... "The investigation revealed the plane software made the 787 think it was on the ground and the Thrust Control Malfunction Accommodation System cut the fuel to the engines," she told FinancialExpress.com, before adding, "The pilots never touched the fuel cutoff..." Both engines flamed out immediately after the pilot deployed the thrust reversers for landing. The aircraft, which was also a Boeing 787 Dreamliner, was towed away from the runway by the authorities, and no injuries were reported.
UK Civil Aviation Authority, four weeks before the crash, had warned about similar fuel system issues on Boeing aircraft [on May 15, 2025]. "The FAA has issued an Airworthiness Directive addressing a potential unsafe condition affecting fuel shutoff valves installed on Boeing aircraft," the UK regulator's notice read, listing the B737, B757, B767, B777 and B787...
Thrust Control Malfunction Accommodation informs FADEC [a digital computer] about whether the aircraft is on the ground or in the air, and if it believes the aircraft is on the ground, it may automatically throttle back the engines, without the pilot's input.
Reuters notes that the Air India crash preliminary report "said maintenance records showed that the throttle control module, which includes the fuel switches, was replaced in 2019 and 2023 on the plane involved in the crash."
Thanks to long-time Slashdot reader wired_parrot for sharing the news.
Read more of this story at Slashdot.
"The U.S. is absolutely facing the most serious Chinese hacking ever." That's what the Washington Post was told by a China-focused consultant at security company SentinelOne:
Undeterred by recent indictments alleging widespread cyberespionage against American agencies, journalists and infrastructure targets, Chinese hackers are hitting a wider range of targets and battling harder to stay inside once detected, seven current and former U.S. officials said in interviews. Hacks from suspected Chinese government actors detected by the security firm CrowdStrike more than doubled from 2023 to more than 330 last year and continued to climb as the new administration took over, the company said... Although the various Chinese hacking campaigns seem to be led by different government agencies and have different goals, all benefit from new techniques and from Beijing's introduction of a less constrained system for cyber offense, the officials and outside researchers told The Washington Post... Chinese intelligence, military and security agencies previously selected targets and tasked their own employees with breaking in, they said. But the Chinese government decided to take a more aggressive approach by allowing private industry to conduct cyberattacks and hacking campaigns on their own, U.S. officials said.
The companies are recruiting top hackers who discover previously unknown, or "zero-day," flaws in software widely used in the United States. Then the companies search for where the vulnerable programs are installed, hack a great many of them at once, and then sell access to multiple Chinese government customers and other security companies. That hacking-for-hire approach creates hundreds of U.S. victims instead of a few, making it hard to block attacks and to decide which were China's key targets and which were unintentionally caught in the hacks, an FBI official said, speaking on the condition of anonymity to follow agency practices... "The result of that incentive structure is that there is significantly more hacking...."
China has mastered the ability to move undetected through networks of compromised U.S. devices, so that the final connection to a target appears to be an ordinary domestic connection. That makes it easy to get around technology that blocks overseas links and puts it outside the purview of the National Security Agency, which by law must avoid scrutinizing most domestic transmissions. Beijing is increasingly focused on hacking software and security vendors that provide access to many customers at once, the FBI official said. Once access is obtained, the hackers typically add new email and collaboration accounts that look legitimate... Beyond the increased government collaboration with China's private security sector is occasional collaborating with criminal groups, said Ken Dunham, an analyst at the security firm Qualys.
The article notes that China's penetration of U.S. telecom carriers "is still not fully contained, according to the current and former officials." But in addition, the group behind that attack "has more recently shown up inside core communications infrastructure in Europe, according to John Carlin, a former top national security official in the Justice Department who represents some U.S. victims of the group." And documents leaked last year from a security contractor that works with the Chinese military and other government groups "described contracts and targets in 20 countries, with booty including Indian immigration data, logs of calls in South Korea, and detailed information on roads in Taiwan.
"It also detailed prices for some services, such as $25,000 for promised remote access to an iPhone, payment disputes with government customers and employee gripes about long hours..."
Read more of this story at Slashdot.
"Commodore has returned from a parallel timeline where tech stayed optimistic, inviting, and human," explains the official web site for "the first real Commodore computer in over 30 years..." You can check out an ad for it here. "Not an emulator. Not a PC... Powered by a FPGA recreation of the original motherboard, wrapped in glowing game-reactive LEDs (or classic beige of course)."
Fast Company calls it "a $299 device that its makers claim is compatible with over 10,000 retro games, cartridges, and peripherals." In a YouTube video posted last month, "Peri Fractic" said he'd purchased the company for "a low seven-figure sum," and said he'd recruited several former Commodore employees to help relaunch the brand.
The new C64s are expected to begin shipping as early as October, though that date could slip... There are three models to choose from, all with the same internal components. If you were expecting a vastly outdated machine, however, you're in for a surprise. The Commodore 64 Ultimate will include 128 megabytes of RAM and 16 megabytes of flash memory. It connects to modern monitors via HDMI in high-definition 1080p resolution and features three USB-A ports and one USB-C port. Beyond the computer itself, the power source, and HDMI cable, your $299 also gets you a spiral-bound user guide, a 64-gigabyte USB drive featuring over 50 licensed games, a quick-start guide, and stickers.
Aesthetically, the Commodore 64 Ultimate is available in the original beige or in premium variants: the Starlight Edition, with a clear case and LED lights ($249), or the Founder's Edition, which includes 24-karat gold-plated badges, satin gold keys, and a translucent amber case ($499). Just 6,400 units of the Founder's Edition will be produced, according to the company. The preorder setup resembles a Kickstarter campaign, though it doesn't use that platform. Commodore says all preorders come with a money-back guarantee, but it chose to skip the service's fees. Buyers should be aware that accounts are charged at the time of preorder...
The product will come with a one-year limited warranty, and Commodore says most parts are already in production, including the updated motherboard, the case, and the keycaps that recreate the blocky keys that early users remember.
Read more of this story at Slashdot.
An anonymous reader quotes a report from Live Science: In a world first, scientists have demonstrated an enigmatic phenomenon in quantum computing that could pave the way for fault-tolerant machines that are far more powerful than any supercomputer. The process, called "magic state distillation," was first proposed 20 years ago, but its use in logical qubits has eluded scientists ever since. It has long been considered crucial for producing the high-quality resources, known as "magic states," needed to fulfill the full potential of quantum computers. [...] Now, however, scientists with QuEra say they have demonstrated magic state distillation in practice for the first time on logical qubits. They outlined their findings in a new study published July 14 in the journal Nature.
In the study, using the Gemini neutral-atom quantum computer, the scientists distilled five imperfect magic states into a single, cleaner magic state. They performed this separately on a Distance-3 and a Distance-5 logical qubit, demonstrating that it scales with the quality of the logical qubit. "A greater distance means better logical qubits. A Distance-2, for instance, means that you can detect an error but not correct it. Distance-3 means that you can detect and correct a single error. Distance-5 would mean that you can detect and correct up to two errors, and so on, and so on," [explained Yuval Boger, chief commercial officer at QuEra who was not personally involved in the research]. "So the greater the distance, the higher fidelity of the qubit is -- and we liken it to distilling crude oil into a jet fuel."
As a result of the distillation process, the fidelity of the final magic state exceeded that of any input. This proved that fault-tolerant magic state distillation worked in practice, the scientists said. This means that a quantum computer that uses both logical qubits and high-quality magic states to run non-Clifford gates is now possible. "We're seeing sort of a shift from a few years ago," Boger said. "The challenge was: can quantum computers be built at all? Then it was: can errors be detected and corrected? Us and Google and others have shown that, yes, that can be done. Now it's about: can we make these computers truly useful? And to make one computer truly useful, other than making them larger, you want them to be able to run programs that cannot be simulated on classical computers."
Read more of this story at Slashdot.
Security updates have been issued by AlmaLinux (cloud-init, glib2, glibc, kernel, and tomcat), Debian (chromium), Fedora (luajit, minidlna, nginx-mod-modsecurity, python-asteval, rust-sequoia-octopus-librnp, and vim), Oracle (cloud-init, glib2, glibc, java-17-openjdk, kernel, python311-olamkit, tomcat, and tomcat9), SUSE (apache-commons-lang3, bind, coreutils, ffmpeg, gnutls, gstreamer-plugins-good, kubernetes1.25, kubernetes1.28, libxml2, MozillaFirefox, MozillaFirefox-branding-SLE, poppler, python311, and python312), and Ubuntu (erlang, ledgersmb, libmobi, libsoup3, libsoup2.4, linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra, linux-nvidia-tegra-5.15, linux-nvidia-tegra-igx, linux-oracle, linux-oracle-5.15, linux, linux-aws, linux-oem-6.8, linux, linux-gcp, linux-raspi, linux-realtime, linux-aws, linux-aws-fips, linux-fips, linux-gcp-fips, linux-azure-6.8, linux-azure-nvidia, linux-hwe-6.8, linux-ibm, linux-ibm-6.8, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-intel-iot-realtime, linux-realtime, linux-intel-iotg-5.15, linux-oem-6.14, linux-raspi, linux-realtime, php7.0, php7.2, php8.1, php8.3, php8.4, python-aiohttp, and rails).
Ukrainian hacker group BO Team, with help from the Ukrainian Cyber Alliance and possibly Ukraine's military, claims to have wiped out one of Russia's largest military drone manufacturers, destroying 47TB of production data and even disabling the doors in the facility. "Or, as described by the hacking collective (per Google translate), they 'deeply penetrated' the drone manufacturer 'to the very tonsils of demilitarization and denazification,'" reports The Register. From the report: BO Team (also known as Black Owl) announced the breach on its Telegram channel, and claimed to have carried out the operation alongside fellow hackers the Ukrainian Cyber Alliance "and one very well-known organization, the mention of which makes Vanya's bottle receivers explode," according to a Google translation of the Russian text. While the "very well-known organization" isn't named, BO Team included a link to Ukraine's Ministry of Defence.
The military intelligence agency, working alongside the attackers, "carried out large-scale work to capture the entire network and server infrastructure of Gaskar Group, collect valuable information about the UAVs being produced and prospective, and then destroy the information and disable this infrastructure," the Telegram post continued. This reportedly included 47TB of technical information about the production of Russian drones, and BO Team claims to have destroyed all of the information on Gaskar's servers, including 10TB of backup files. "By the way, from the information we received, China is providing assistance in the production and training of specialists of Gaskar Group," the hackers added via Telegram. BO Team also posted what they claim to be confidential employee questionnaires [PDF].
On their own Telegram channel, the Ukrainian Cyber Alliance said they also stole "all the source code" before destroying everything. "The network went down so thoroughly that the doors in the building were blocked," the pro-Ukraine crew wrote, per Google translate. "To open them, the administration had to turn on the fire alarm. Most likely, the defense order is on the verge of failure, and thousands of drones will not get to the front in the near future."
Read more of this story at Slashdot.