Professional Documents
Culture Documents
me/whatsnws
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ok
Sc
gk
an
to n
disc Ba
over
Sponsor Content
Darktrace R&D:
Academics
Meet Agents
HOW MACHINE LEARNING EXPERTS ARE PREPARING TO FIGHT BACK
AGAINST AI-POWERED CYBER AT TACKS
POWERFUL ANALYTICS.
REAL RESULTS.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
→ 78
0 0 3
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
IWC PILOT’S.
ENGINEERED FOR
NEW HORIZONS.
Big Pilot’s Watch Edition “Le Petit Prince”. impresses with classic elegance that sets off the mid-
Ref. 5010: The little prince tells the pilot he will give him night blue dial to perfect advantage. Technical perfection,
a friendly laugh from the countless stars in the night sky. on the other hand, is guaranteed by the IWC-manufac-
The sight of this watch inspires similar sentiments, for tured 52110-calibre movement with its seven-day power
every single detail is a joy to behold. The timepiece is reserve. Time enough to forget time and follow the
not only an imposing 46 millimetres in diameter but also dream-like journey of the little prince.
P.11 P.16
RANTS
AND
RAVES
BY BY
VIRGINIA ZEYNEP
P.8 HEFFERNAN TUFEKCI
P.20
GADGET
LAB:
BY SECURITY
CLIVE
THOMPSON
P.86
STORIES
BY WIRED
READERS ILLUSTRATION
BY FOR WIRED
PETER BY
RUBIN P.96 MIKE PERRY
0 0 5
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
↙
TOTALLY
DIARIES OF
AN UNBRIDLED
DIGITOPIAN
Candidly, I was about four wines deep by high noon. Hold the judgment, “WHILE WORKING
if you please. It was one of those whoopsie-daisy kinds of Saturdays where ON THIS ISSUE,
the sun begs you to sip its splendor in the form of semi-effervescent Cal-
ifornia whites at your favorite neighborhood cantinas. Minimal risk of WHAT GAVE YOU
indecorum on my part—of all the creative names my enemies call me, HOPE?”
Ripley D. Lightweight isn’t one of them. Though, yes, I do suffer that light-
est pinkening of cheeks, a lush’s flush, when I imbibe. Perhaps also a cer- “Even more than his invention for
tain slackening of step and sense. So sue me! revealing a cell’s active genes, Jason
Presently, I had a decision to make. Where to next? I polled the locals, Buenrostro himself. Like many scien-
tists, he’s passionate about his work.
who could agree only on a nonrecommendation: Wherever I went, it must But he’s also humble and empathetic.
not be that winery down the way. “I’ve worked in the area for 10 years,” If Jason represents the next genera-
one said. “I’ve been there exactly once.” The reason was simple: The win- tion of scientific research, I’m all for it.”
—Contributor Jennifer Kahn (page 56)
ery had embraced—picture a crush of snobs scrunching their schnozzes
in sync—technology. Well, I had my destination. “Talking with Hany Farid about his
I skipped to the front door. Overgrown with vines, it sat recessed from work with political leaders to encour-
age the tech industry to protect us
the street, shrinking from view as if in shame. The room I entered was against deepfakes, without creating
very dark. “Have a seat,” said the woman behind the bar, too noncha- mechanisms that could be exploited
lantly. I was (and remained) her only customer. She poured an inky red to suppress online expression.”
—Senior writer Tom Simonite (page 70)
and relayed the backstory. She and her husband were scientists, labora-
tory scientists, the kind in white coats, and they were bringing chemistry “SpinLaunch, a company ditching
to winemaking. More precisely, to wine preserving. The wine before me conventional rockets to dramatically
lower the cost of access to space.
now, in fact, had been opened … three months ago. I squawked. She smiled. If successful, the company will lay
Parents are wrong on this: Wine does not keep. One day for reds, two or the foundation for a truly robust
three for refrigerated whites. Three months? You might as well quaff the space economy that is essential for
turning humans into a multiplanetary
rufous dregs that collect at the bottom of your trash. What this vintnerd species.” —Staff writer Daniel
was promising was insane, even considering the machine to her right, a Oberhaus (page 61)
cabinet-sized temperature-controlled box that was—forgive me, she lost
“Joanna Pearlstein. Working on a story
me early in the explanation. Likely it involved wafting her exposed wines about the world’s most dangerous
with some noble gas or other to prevent the putrefaction that too much hackers, along with a cover package
oxygen reekingly wreaks. The scientist kept smiling. with 25 profiles, you want someone to
be sure you are getting things right.
I sniffed. I sipped. And? For 16 years at wired , that person has
Terrible! Pfeuh! The wine was bad. I found myself smiling too. “Wow,” been Joanna. As a deputy editor, she
was all I said. I wasn’t there to whinge and whine, to critique her soulful oversees the fact-checking depart-
ment; she also reads every story like
efforts. Beaming, I sucked down the rest of her liquid experiment, genu- a seasoned lawyer and engages in the
inely grateful for the attempt. In an industry so resistant to modernity— deep philosophy of what is fact and
in oenophilia, technophilia surely finds its opposite—here was a true what is opinion. She is, in a word, wise.
And she’s leaving us. Joanna has given
progressive, bravely battling the tides of tradition. For too long has the all of us hope for the power of smart
snifter set, comfortable in their ancient rhythms, viewed the application and accurate storytelling. We are con-
of technology always and only as adulteration. Get over it. Let the inno- soled that she’s staying in journalism.
But we will miss her.” —The editors
vators, like a heavy red, breathe. There may yet come a day when you
can open a genetically re-created ’58 cab, enjoy a few glasses, and save “Somebody finally started putting
the last pour for your best friend—when they come to visit next spring. caffeine in seltzer.” —Senior writer
Andy Greenberg (page 50)
RIPLEY D. LIGHT
@ RIPLEYDLIGHT
0 0 6
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
FAN LETTERS
In our July/August issue, Stephen Witt
recounted how Apollo 11 nearly crashed into
the moon because its guidance computer kept
glitching. In our September issue, Nitasha Tiku
chronicled the tumultuous past three years at
Google, and Laurie Penny wrote an exultant GET MORE WIRED
essay on how authors of fan fiction have gradu- If you are a print subscriber, you can
ated into the writers’ rooms of major TV shows. read all wired stories online.
Then in October, Lauren Smiley told the story of To authenticate your subscription, go
a murder whose chief witness was a Fitbit—and to: wired .com/register.
whose chief suspect was a 91-year-old man.
↙
Readers share their wonder, This story pretty much summed up and motivated. —Kaila Hale-Stern, via
anger, and advice: all the reasons I recently left my job at The Mary Sue
Google after six years there.
—Kathy Ray, via wired .com Fanfic writers and lovers—this brilliant,
RE: “MISSION OUT OF beautiful piece by @PennyRed is for
CONTROL” RE: “WE CAN BE HEROES” you. —Michael Sheen (@michaelsheen),
via Twitter
I want to call WIRED on its bro- Sometimes a piece of writing is
centric recounting of Apollo 11’s his- so good and so powerful and so No, I’m not crying on the train. You’re
tory. The only mention of women truth-telling that you just have to get crying on the train. (:sob:)
was in reference to them as weav- out of its way. I saw my own expe- —Janina Woods (@Kaori_Ino), via Twitter
ers of the copper wire that con- rience and trajectory—from being a
verted “code to machine-readable nerdy kid alone with their modem, RE: “THE TELLTALE
binary.” However, Margaret Hamil- writing stories set in other worlds HEART”
ton was a major contributor to the and forging communities that way—
development of the software dis- described exactly by Penny. I sent The main subject of this story,
cussed in the article, and was con- the story to many similarly minded Tony Aiello, 91, died shortly after
spicuously missing. friends. Some wrote back that they the magazine went to press. New
—Candace Egan, via wired .com were crying to see themselves rec- details about his criminal case were
ognized and celebrated. Everyone, also made public. The story has
RE: “THREE YEARS OF without fail, said the essay made been updated on WIRED .com.
them feel empowered, powerful, —The editors
MISERY INSIDE
SILICON VALLEY’S
HAPPIEST COMPANY”
0 0 8
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
AUTOMATICALLY ADJUSTABLE COMFORT CONTOURS TO YOU SHOWS HOW WELL 25-YEAR 100-NIGHT
RESPONDS TO YOU ON EACH SIDE FOR MORE PROPER YOU’RE SLEEPING LIMITED WARRANTY† TRIAL ‡
SPINAL ALIGNMENT *
DO YOU LIKE
SAVING MONEY?
Get GEICO.
Some discounts, coverages, payment plans and features are not available in all states, in all GEICO companies, or in all situations. Boat and PWC coverages are underwritten by GEICO Marine Insurance Company. Motorcycle and ATV coverages are underwritten by GEICO Indemnity Company. Homeowners, renters and condo
coverages are written through non-affiliated insurance companies and are secured through the GEICO Insurance Agency. GEICO is a registered service mark of Government Employees Insurance Company, Washington, D.C. 20076; a Berkshire Hathaway Inc. subsidiary. GEICO Gecko image © 1999-2019. © 2019 GEICO
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
M I N D G R E N A D E S
WHEN
MARKETING
LOSES ITS
COOL
Keep calm and consider supply and demand.
BY VIRGINIA HEFFERNAN
The year 2015 was a heady time to do marketing for tech startups. The venture
baronry that controlled the fates of founders had decided that markets, rather
than engineering or personnel, made or broke new companies. If you were a
strategist or a creative, swagger came with the job, along with corporate Uber and
free lunches of glistening sushi. You’d enter a pitch meeting in your sharp blow-
out and bravura nail art—every time; it was all about the rose gold accent nail
that year—extremely confident that a solid creed preceded you. The only thing
startups need is markets. Q Marketing was on fleek, just as “on fleek” was on fleek.
Those were the days. I was the editorial director of a tech marketing shop based
in San Francisco, and—having come up as a blowout-deprived journalist—I felt
almost high on the luxe marketing-chick lifestyle. Not only did the job often seem
like one long perk, but it was important. I knew, almost by heart, “The Only Thing
That Matters,” the 2007 essay by Marc Andreessen, in which the oracle of Menlo
Park argued that markets are, indeed, “the most important factor in a startup’s
success or failure.” Q But didn’t the product matter? The team? Not really.
M I N D G R E N A D E S
Andreessen was blunt: With a great market, deaths by achieving the desideratum to erally seem more shaken than revitalized.
a company can handle a staff of half-wits end all desiderata: product/market fit. Four years ago, when companies had pro-
or jerks because “the team is remarkably PMF. Products were seen as placeholders found problems with their models, leader-
easy to upgrade on the fly.” What’s more, that were to be broken, iterated on, pivoted ship, or products, marketing came to be
he wrote, “the product doesn’t need to be from. By contrast, a nice loamy market, seen as not just a way to lipstick pigs but as
great; it just has to basically work.” primed, was a joy forever. The everything. a way to block and tackle regulation, to keep
VCs had also soundly discredited pricing In the right market, anything—vanilla- secrets, to shut out anyone who wanted to
as the key to success. (When a sector is indif- honey vape, ancient grains meal-delivery so much as see the product.
ferent to the laws of supply and demand, service—can find purchase. Though not all So marketing went from the only solution
that is some serious irrational exuberance.) startups believed marketing was the sil- to the smoke that suggested fire that sug-
“Innovation,” too, was yesterday’s news. Dis- ver bullet for success, the ones that came gested indictments. To be fair, at the advent
appointingly, for those of us who cottoned to us seemed to think: If you build it, they of the social networks, VCs could be for-
to the folktale of a new economy driven by will come, and if they come, you will find given for thinking that marketing was the
brilliant little Edisons and Teslas in Everlane, a way—even if far, far down the road—to whole game. Facebook, Twitter, Snapchat,
technological breakthroughs were, by 2015, sell them mugs. Or memberships. Or ads, Pinterest, and Instagram were acquiring
believed to be too easily copied. Instead, or some freemium bunk. users to make a network and attract more
success lay in branding flourishes—Snapchat The problem was the usual. We were users: The market (users) is the product (the
ghosts, Instagram influencers, the massive bullish for too long. As we watched the big network). So by acquiring users with mar-
glass lantern that is Istanbul’s Apple store. agencies, we saw that even the best mar- keting you were simultaneously building
We in marketing also held tight to keting couldn’t quite compensate for a cer- your product. VCs used to love the idea of a
Rachleff’s Law of Startup Success, named tain miniature blood test that didn’t work. young big shot who saw a vast market that
for Andy Rachleff, another VC god who Nor, at another agency, could Instagram the old didn’t: the diary writers who would
cofounded the firm Benchmark that made a influencers turn disaster-relief tents into contribute to Tumblr. The lonely hearts that
mint betting on eBay, OpenTable, Snapchat, a sexy island bacchanal worthy of Kendall became Facebook. Investors also swooned
Twitter, and Uber. Rachleff’s Law: The num- Jenner. From our firm’s gleaming digs, we at the idea of using relatively cheap market-
ber one company killer is lack of market. shuddered as we watched the first cracks in ing magic to get millions of users hooked on
And so, flush off earlyish rounds of ven- the facade of Theranos. Later, other offer- something and then cashing in.
ture capital, startups paid us to identify, ings with marvelous marketing—Jawbone, The investors cashed in. But social media
reach, and soften up prospective consum- Hampton Creek (Just Mayo), and Airware— companies had to turn into galactic data
ers, using an alchemy of surveys, intuition, burned through millions of dollars trying Hoovers to become profitable, and the naive
design, blue-sky ideation, typography, to get the optics right on products, services, hope that one day startups could trade on
ethnographies, direct email, advertising, or business models that were, yeah, janky. the users, accounts, or subscriptions they’d
events, comms, logos, PR, stunts, and (in Moreover, when it came right down to acquired meant that the early years of a
theory) art, literature, and film. And of it, staffing did matter, especially because company were expected to be devoted to
course my specialty: decks. These are the teams underperformed when mismanaged UA. It’s not that that logic didn’t hold up; it’s
sententious keynote presentations, used to by bumptious founders like Uber’s Travis that users used to come cheap to divey, bare-
dazzle investors or recruit employees, that Kalanick and WeWork’s Adam Neumann. bones joints like Twitter, and they’d stick by
try to get a startup to seem like a holy mis- Teams willing to work with volatile, arro- glitches and unpopular updates because
sion. In my decks, I liked to associate things gant management weren’t so “remarkably they had made them their own and had
like payment software and organic-snack easy to upgrade on the fly,” as Andreessen nowhere else to go. Now users cost much
subscription boxes with such universally had once led investors to believe; word gets more to court—have you seen the freebies
admired ideas as Apple, love, or Banksy. around about people like Kalanick and Neu- offered at companies like the home-products
We marketing teams came to believe we mann. And then, after shake-ups like the club Grove Collaborative?!—and with too
alone could save startups from untimely ones at Uber and WeWork, startups gen- many apps already on their phone, they enter
0 1 2
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
M I N D G R E N A D E S
0 1 4
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ONLY NEW ACCOUNTS FOR CONSUMERS. RATE COMPARISON BASED ON FDIC NATIONAL RATE FOR SAVINGS BALANCES < $100,000. OFFERED BY CAPITAL ONE, N.A. MEMBER FDIC. © 2019 CAPITAL ONE.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
M I N D G R E N A D E S
MOVE,
COUNTERMOVE
Yes, authoritarians have co-opted digital technology.
But the story is far from over.
BY ZEYNEP TUFEKCI
TAX SEASON
IS 365 DAYS
A YEAR
While other firms may only use tax-loss harvesting at year-end,
Fidelity uses multiple personalized strategies across your
managed portfolio throughout the entire year. We offer:
M I N D G R E N A D E S
land China for prosecution. Hong Kong is At the same time, this stream of young ing one eye, in honor of a medic who had
a “special administrative region” of China, people carrying umbrellas and traveling been shot in the eye just a few days earlier.
with an independent judiciary and much on foot were anything but Luddites (at At precisely 9 pm, I watched them all close
wider freedoms than those found on the least as people usually use the term). They one eye, perfectly coordinated.
mainland. Fearing that the extradition law were quite attached to their tech. Like other Move, countermove. The next day,
would lead to the further erosion of those decentralized movements before them—the authorities shut down the subway. And all
freedoms, large numbers of protesters took protesters who amassed in the Arab Spring, throughout my time in Hong Kong, it was
to the streets starting in early June. under the banner of Occupy, in Istanbul’s painfully clear how ubiquitous the surveil-
Now, nearly three months later, the bill Gezi Park, and under the name Indignados lance was. Telegram includes a feature that
had been suspended but not yet with- in Spain—the demonstrators in Hong Kong allows you to see if a contact is a member of
drawn. (That would come, but later.) And were forever on their phones. They pulled a group; that feature may well have exposed
everyone’s phone number to the authori-
ties. (Telegram says it’s fixing this.) Phones
constantly pinged nearby cell phone towers,
revealing locations. At one point, LIHKG was
The Hong Kong protesters managed down due to a denial of service attack. It’s
unknown whether Beijing was behind the
to form a human barricade 30 miles long, attack, but China’s state-sponsored hack-
ers certainly have the motive and the means
surprising even themselves. (and then some) for such an exploit.
This techno-evolutionary arms race
between authorities and protesters isn’t
the protesters were feeling their strength, them out to learn where the movement was new—and it’s not just playing out in authori-
demanding an independent inquiry into making its next stand; they pulled them out tarian countries. Those smart lampposts are
police misconduct and universal suffrage. to learn where to retreat after being tear- already sprouting up in many democracies
But on that Saturday, as we all ended up gassed; then they pulled them out to learn or are being planned as part of smart-city
walking in the blazing sun, the protesters where everyone was regrouping for the next initiatives. Those governments, too, prom-
had a new target in their sights: “smart” advance. They scrolled through Telegram, ise they will be put to benign use. But once
lampposts equipped with sensors, cam- beaming with myriad protest groups—big a surveillance infrastructure exists, govern-
eras, and internet connections. Fifty had ones conveying information about the ments and corporations will certainly be
been installed in the city, a first batch of whole movement and small ones that orga- tempted to run with it.
an expected 400, and the protesters were nized one neighborhood or another. They Facial recognition is being deployed all
determined to take one down. voted on LIHKG (a homegrown Reddit) to over the world. Biometric databases are
The government had said the smart decide their next steps. expanding. Personal, financial, health,
lampposts would be used only for benign I watched it all happen: The protesters social, and other data is being collected by
purposes—that they’d take air quality mea- would amass and the police would meet entities ranging from social media giants
surements and assist with traffic control, them in force. Then, in a blink, the demon- and apps to websites and retailers—anyone
and would not collect facial or other per- strators would move somewhere else, using and everyone, it appears. And this data is
sonal data. The protesters feared other- the subway—when they could—to outrun being churned through to identify and tar-
wise. When I spoke to them, many brought the authorities. They would decide where get people individually—to sell things, yes,
up what was happening to the Uyghurs to go next through online discussions and but also to spread misinformation.
in the Xinjiang region of China. Trapped polls. It felt like magic. Later that Saturday, the protesters used a
in a massive surveillance net that hacks One day, inspired by a single post on couple of basic technologies, a handheld
their phones and collects biometric data LIHKG, the protesters decided to form a saw and a rope, to set upon a smart lamp-
(including DNA samples from practically human chain. They would do it on the anni- post. As the post fell, cheers rose from the
the whole population), the Uyghurs live versary of the historic 1989 chain across crowd. A jubilant moment isn’t decisive,
under constant scrutiny and worse—Big the three Baltic states that demanded free- though. There will be more smart lampposts
Data along with traditional surveillance dom from the Soviet Union. The Hong Kong and more abuse. But the pessimism that
techniques have sent as many as a million protesters ran with the idea and managed abounds these days—as authoritarians have
people off to internment camps. to form a human barricade 30 miles long, turned new technologies to their advan-
Citizens of Hong Kong feared simi- surprising even themselves. They used apps tage—is likewise not decisive. It’s still early.
lar technologies would be used against to coordinate in real time, getting people We can’t predict who will win and how. That
them. Many wore face masks. They carried to move from overly populated sections of story is still to be written, by us.
umbrellas, not just to shelter from the sun the chain to ones that were more sparse.
but also to block the view of CCTV cameras They held hands and sang in unison. In the ZEYNEP TUFEKCI (@zeynep) is a wired
or the helicopters that flew overhead—or to middle of the event, someone had the idea contributor and a professor at the Univer-
huddle under as they assembled barricades. that they should end with everyone clos- sity of North Carolina at Chapel Hill.
0 1 8
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
INSIDER
RAISE ONE TO
THOSE WHO NEVER
LET YOU DOWN.
They helped you move into your new
house. They helped you paint your
apartment. They listened to you vent
about your horrible boss. Good friends
will always go the extra mile for you.
Now it’s time to share something
extra-aged with them.
M I N D G R E N A D E S
OLD SCHOOL
Who are the most successful entrepreneurs? The middle-aged.
BY CLIVE THOMPSON
Back in 2007, a 22-year-old Mark Zuckerberg gave some advice at Y Combinator’s Startup School: Do a
startup before you’re old. In technology, he said, twentysomethings rule. The olds are useless. Q “I want to
stress the importance of being young and technical,” he said. “Young people are just smarter.” Q That com-
ment has not aged well. As we watch tsunamis of disinfo rage through social networks, we’re now suspect-
ing it wasn’t so great for cocky young techies to so rapidly reupholster the public sphere. Those dudes may
have been technically adept, but they were, as one early Twitter employee told me, “naive as fuck.” With little
experience of the real world, the dewy pioneers were woefully unprepared for the hate speech, dog-piling,
and sock-puppeted algorithm-juking that ran riot in the 2010s. Now we’re living in the wreckage. Q Sure,
innocence is great. But what if experience is even greater? Maybe we’d get better innovation if we left it to
Zuckerberg’s elders. When it comes to building tools that help solve the world’s truly wicked problems, it’s
the older visionaries who’ll get it done. Q Consider the recent findings of a group of academics from
SMALL BUSINESS
ISN’T SMALL
TO US
As Dell Small Business Technology
Advisors, we are committed to helping
you navigate your tech needs with the
right solutions, advice and dedicated
one-on-one partnership.
*Offers subject to change, not combinable with all other offers. Taxes, shipping, and other fees apply. Free shipping offer valid only in Continental (except Alaska) U.S. Offer not valid for Resellers. Dell reserves the right to cancel orders
arising from pricing or other errors. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. Copyright © 2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell EMC
and other trademarks are trademarks of Dell Inc. or its subsidiaries. 310656
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
M I N D G R E N A D E S
MIT, Northwestern University, the National But I think the biggest value of older
Bureau of Economic Research, and the US entrepreneurs isn’t merely that they suc-
Census Bureau who examined the success ceed more often than younger ones. It’s that
rates of startups. When they homed in on they’re better positioned to take on what’s
elite “high-growth” tech firms, they dis- sometimes called “tough tech”—the hard ANGRY NERD
covered the average age of the founders challenges of our age, like clean energy, BY SARA HARRISON
was 45. What’s more, their chance of suc- curing disease, and climate adaptation.
cess didn’t decrease with age. It increased. Sure, young people are great at crank-
0 2 2 ILLUSTRATION / STORYTK
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
GOLDEN
EYE
NASA’s massive, $10 billion telescope
prepares to launch in 2021.
BY LAURA MALLONEE
0 2 4
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
M I N D G R E N A D E S
Supermicro
Systems Help
Capture the First
Ever Images of a
Black Hole
Data Processing and Storage for Black Hole Event Horizon Imaging
The first imaging of the event horizon aided by the expanded computing power of
for a black hole involved an international today’s IT infrastructure. Processing of the 4
partnership of eight radio telescopes with petabytes (PB) of data generated in the project
major data processing at leading research in 2017 for the original imaging utilized
institutes in the US and Germany. The servers and storage systems, with many
contribution of the brilliant scientists was of these servers coming from Supermicro.
FETISH
$499
HELM SERVER
There’s ever more reason to worry about entrusting our data to big tech com-
panies, but the convenience and ubiquity of web services like Gmail and iCloud
make it hard to consider anything else. Helm’s server aims to create a seamless
and equally convenient alternative, letting you host your own email, contacts,
and calendar, as well as store files and photos yourself—no snoopy tech giant
pulling the strings. Set up your Helm with its mobile app, then access its con-
tents from anywhere. Your data stays safe in your home, where it’s protected
by multifactor authentication, including a physical security key. The 4.3-inch-
tall Helm comes with an expandable 120 GB of storage, and it regularly
uploads a fully encrypted backup to the cloud so you won’t lose everything in a
fire. There are always some challenges to striking out on your own—like having
important emails caught in friends’ spam folders after you switch—but if you
want to get scrappy with your privacy, this handsome machine will help you do
it in style. ($99 annual subscription after the first year)
HEAD TO
HEAD
Hide
and
Seek
Small children (and sometimes
bigger ones) can be as slippery
as salmon. Keep an eye on them
JIOBIT with a kid-friendly GPS tracker.
Best for: Preschool-age Prefontaines —Adrienne So
The keychain-sized Jiobit is the easiest tracker to clip to a wriggly
kid’s belt loop, shoelace, or backpack. It uses a combination of Blue-
tooth, Wi-Fi, cellular data, and GPS to turn the companion app into
a real-life Marauder’s Map. When I toggled on Live Mode at a park,
I could watch onscreen as my preschooler sprinted out of sight,
turned around at an intersection, and walked back. In the app, you
can share your child’s location with trusted adults, create geofences,
get alerted when your kid goes out of bounds, and swipe between
multiple children—or dogs. ($9 monthly subscription required)
$129
$50
Open
Sesame APP PACK
1PASSWORD
0 3 2
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Balanced Beams
These multitalented routers ensure that your home Wi-Fi isn’t
just stable and fast but also secure. —Michael Calore
EERO PRO
$199
$319
TP-LINK ARCHER AX6000
0 3 4
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Private Eyes
Research conducted in the US and UK
shows that the presence of surveillance
cameras in urban settings caused a sig-
nificant decrease in property crimes on
Surveillance works best when the bad guys can see they’re the streets and in subway stations, and
being watched. So why design smart-home security cameras a decrease of 50 percent in parking lots.
to blend in so beautifully? —Jonathon Keats But for that deterrence to work, criminals
need to recognize the device, and the device
needs to convey authority. As a research
At the end of the ’60s, in the embryonic surveillance cameras. In 2018, some 50 mil- report by Arizona State University’s Center
days of cable television, an enterprising lion of them were sold; research firm Strategy for Problem-Oriented Policing states, only
executive had an idea. He persuaded the Analytics estimates that four years from now, an obviously visible security camera has the
leadership of Olean, in upstate New York, customers will buy 120 million. desired demotivating effect: “For this crime-
to hook up closed-circuit TV cameras, via The thing is, these companies have been prevention process to succeed, the offender
the newly laid cables, along the town’s pushing the cameras as stylish additions to must be aware of the cameras’ presence.”
main street. With 20,000 residents, Olean a home. But the attempt to reconcile deter- So the more attractive and inconspicuous
was hardly crime-blighted Manhattan. But rence with a chic image is bound to have dys- security cameras are, the less likely they are
when the first-of-its-kind surveillance sys- topian consequences. to impress intruders.
tem was installed in 1968, law enforcement Public surveillance cameras come in two In the short term, discretion may be a
officials from as far away as Israel and Thai- forms. One, shaped like a cylindrical bul- shrewd move. In Olean, the camera system
land came to marvel at the eight robotic let, is pretty easy to see and is pointed at a was removed when a new mayor was
cameras attached to utility poles. Miscreants subject—say a person standing at a bank elected. In 1969, The New York Times
were also impressed: Not a single crime was teller’s window—like a shotgun. If the cam- reported that the mayor objected that it
attempted during the 18-month run of the era is robotic, it can single out and follow a “smacked of an invasion of privacy.” Para-
experimental network. subject or suspect. The second kind, a dome doxically, the near future feels like a privacy
After that, there was no stopping video- camera typically enclosed in a tinted plastic invasion much worse than anything Olean’s
based crime deterrence. More than 50 mil- bubble, is more sinister. People are aware of mayor could have imagined, in which dis-
lion CCTV cameras now watch over the it but never know who, or what, it is filming. creetly sleek cameras are absolutely every-
residents of the United States, and four times The home surveillance market, however, where, making us all paranoid prisoners of
as many keep Chinese citizens in check. No is more about friendly design; a security our own society.
surprise, then, that in the past five or so years camera that resembles a Nest thermostat
companies like Nest and Ring have been or an Amazon Echo is in keeping with the JONATHON KEATS wrote about sound
pushing peace of mind in the form of home modern, tech-enabled lifestyle. Compa- design in issue 27.06.
0 3 6
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
21–23
ANGELES Unforgettable parties.
Wallis Invaluable connections.
Annenberg
Center
for the
2019 Performing
Arts
Confirmed speakers
To learn more about the summit schedule, other speakers, and to request an invitation, visit
VFSUMMIT.COM
PRESENTING SPONSOR
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Available now at
CB2 stores and cb2.com/gq
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
T HE P OIN T I S N ’ T T O S T OP P RO GR E S S B U T T O E N A BL E I T.”
REBUILD
THE
BRIDGE
—AGAI N
MAKING PROGRESS IN 1904, a group of Canadian workers began the hard slog
of constructing the world’s longest bridge, across the Saint
ME A N S M A K ING Lawrence River just south of the city of Quebec. It was a wildly
ambitious project. And it wasn’t just for the Quebecois: Rail-
DE VA S TAT ING) from New Brunswick in the east to Winnipeg in the west.
The river was 190 feet deep at the center, and ice piled
MIS TA K E S . high above the water’s surface in the winter. Nothing about
the bridge’s construction would be easy. The engineers chose
AND THEN LEARNING a complex cantilever design, a cutting-edge approach but a
cost-efficient one too. Ambition creates risks, and warning
FROM THEM. signs started to appear. The steel trusses weighed more than
expected. Some of the lower chords of the bridge seemed mis-
aligned or bent. Workers raised concerns. But the project’s
leaders pressed ahead.
Exactly 100 years later, in February 2004, a young entre-
preneur named Mark Zuckerberg founded The Facebook. His
ambition was nothing less than to remake the internet around
personal relationships and then to remake the world around
BY NICHOLAS THOMPSON Facebook. When the company filed to go public in 2012, he
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
THE °C DIFFERENCE.
THE DELICACY OF PERFECT CRAFTSMANSHIP.
Hundreds of horsepower generated by a well-crafted car stable and activated underneath a uniquely engineered glass-top bonnet.
The LG SIGNATURE refrigerator keeps the fresh chill of cold air formed by the industrial vigor of a compressor under a refined,
touch-enabled transparent glass to prevent any temperature fluctuation.
T H E A RT O F E S S E N C E
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
three years after the second comes from software: the music we hear,
collapse, the Prince of Wales the movies we watch, the stories we tell.
presided over its opening. The We live longer, eat better, and keep in our
bridge held. Soon, cars and trains pockets computers more powerful than the
were crossing the same river in supercomputers that guided the first people
which so many people had died. in space. We can record police abuses
For a century, it has stood as the with our smartphones and hold power to
longest cantilever bridge in the account. Gene editing could help us feed
world. Quebec and Canada have the planet; we may send people to Mars;
prospered for it. certified and regulated; the latter can learn technological acumen is redefining global
More important, the collapses their craft from scratch in their basement. politics. A thousand inefficient businesses
became an ethical touchstone. And there’s good reason for civil engineers have been pulled up from the roots, as bet-
A professor named H. E. T. Haul- to demand more rigor than their software ter ideas have sprung from the soil.
tain decided that he wanted to engineer brethren. If you make a mistake in And that’s what this issue is about: the
commemorate the story, and a line of code, you can fix it from your chair. builders who understand the consequences
he called on the poet and author Repairing a steel beam submerged in an icy of their choices. It’s about people who recog-
Rudyard Kipling, who had pre- river is a different matter. Software com- nize the awesome responsibility of the tech-
viously written an ode to engi- panies grow, too, according to the logic of nological powers bequeathed to us by our
neers, for help. Haultain worked network effects and increasing returns to predecessors. There’s Kate Darling, whose
with Kipling and the leaders of scale. They have to move fast if they want research is redefining the way we think about
Canada’s main engineering to thrive. Such rules and logic rarely, if ever, our moral responsibilities to robots. There’s
universities to develop what’s apply in the physical world. Patrick Collison, who, along with his brother,
called “The Ritual of the Call- So, yes, the cultures have to be different. created a company, Stripe, that makes it
ing of an Engineer.” And for And the problems differ too. The bridge col- vastly easier for people all over the world
nearly a century, graduates lapsed twice because of failure in execution; to start businesses and process payments
have gone through a ceremony Facebook’s problem was more a failure of without tearing down the entire financial
in which they recite their obli- imagination and the inability to see how the system. There’s Laura Boykin, using pocket-
gations to their craft: “I will not platform could be used for harm. DNA sequencing to save Africa’s cassava
henceforward suffer or pass, or That said, Silicon Valley, and software crop. There’s Eva Galperin, protecting her
be privy to the passing of, Bad engineers everywhere, could still learn fellow hackers from stalkerware and author-
Workmanship or Faulty Material something from the culture that asks its itarians. There’s Moriba Jah, working to map
in aught that concerns my works adherents to wear those iron rings. Tech the garbage orbiting our planet.
before mankind as an Engineer, companies operate in digital worlds, but These are people who build things fast
or in my dealings with my own their actions have consequences in the phys- but who are also fixing things. They’re
Soul before my Maker.” ical one. And when you build things, you are using technology to take us to new places.
At the end of the ceremony, responsible to the people who use them. You They’re thinking deeply—but not to the
they are given iron rings to wear have to think through what could go wrong point of paralysis—about the problems
as a reminder of these obliga- instead of assuming everything will go right. society faces and the ways that technol-
tions: Move slow and get things You have to build as if you have a ring forged ogy can help. They’re people who realized
right. According to myth, the from a shattered bridge on your pinky. that the bridge they were building may have
first of these rings were forged Sometimes systems crack, and then they collapsed, but rather than abandon it, they
from pieces of the collapsed shatter. But sometimes the crack leads to built it anew with forethought. Or, as the
bridge. The rings are worn on the remedy. And that’s what we need now: ceremony of the Iron Ring requires one
the pinky finger of the dominant a coming together of many tribes to fix the to pledge, “My Time I will not refuse; my
hand, so that they click on the mess we’re in, and to learn from the mis- Thought I will not grudge; my Care I will
table when the engineer signs takes the industry has made. We need action not deny towards the honour, use, stabil-
or stamps a blueprint. from governments, builders, users, people ity and perfection of any works to which I
The culture of civil engineers inside Silicon Valley, and people every- may be called to set my hand.”
has always been different from where else writing code.
the culture of software engi- The point isn’t to stop progress but to NICHOLAS THOMPSON (@nxthompson) is
neers. The former are formally enable it. Much of the magic in our lives w i r e d ’s editor in chief.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
PORTRAITS BY
NOÉMIE TSHINANGA
ILLUSTRATIONS BY
GISELA GOPPEL
CONCEPTUAL
PHOTOGRAPHS BY
THE VOORHES
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
MEDICINE
Wendell Lim
S Y N T H E T I C B I OL O G I S T / UC San Francisco
WHEN WENDELL LIM booted up his bio- hard to make T cells that kill only cancer,
physical chemistry lab at UC San Francisco in with no collateral damage. Hearing this, Lim
1996, he had no ambition to hack the human realized the tools he’d been tinkering with
immune system. He was focused on more could make CAR-T safer and more reliable.
basic questions, like decoding the underly- Since 2015, Lim’s lab has been making
ing logic of biology. Lim, who nearly majored more finely tuned T cells. One requires a
in art at Harvard, sought answers through drug to trigger its kill mode. Others use mul-
genetic engineering. For years he tinkered tiple molecular markers to identify cancer,
with yeast, inserting code into its DNA to like two-factor authentication. First-gen
make it do things never seen in nature. CAR-T therapies rely on a single lock-and-
Then, in 2010, he met a University of Penn- key switch, Lim notes, but a tumor is a com-
sylvania oncologist named Carl June who plex, mutating environment. That’s why he’s
was developing a cancer treatment called designing cells to read patterns of molecules,
CAR-T. It involves genetically engineering T a bit like how facial recognition algorithms
cells—the assassins of the immune system— analyze faces. He’s also creating T cells that
to create a clone army trained to find and attack only when there’s a critical mass of
destroy a patient’s unique cancer. In 2011, tumor-specific molecules present, and a ver-
June published CAR-T’s first breakthrough sion that intercepts signals between tumor
success, which set off a tsunami of clinical cells to stage assaults on the whole network.
trials, leading to (so far) two FDA-approved Lim expects some of his early T cell designs
treatments. But June and others were wor- to be tested in humans within two years.
ried. A clone army can also be deadly—it’s But he’s already looking beyond cancer, to
hacking the whole immune system: Healing
wounds, halting degeneration, preventing
autoimmunity—all of it could be guided by
designer cells. “The culture now is that CAR-T
is just a big toxin attached to an antibody,”
Lim says. “The idea that immune cells are
programmable computational devices that
can do many things is pretty far away, but I’m
hopeful we change that.” —MEGAN MOLTENI
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ARTIFICIAL INTELLIGENCE
Joy
Buolamwini
FOUNDER /
Algorithmic Justice League
IN 2015, MIT Media Lab master's student Joy Buolam- biases in facial-analysis algorithms from Amazon, IBM,
wini gazed, puzzled, into her webcam. She was work- and Microsoft. She showed that the services frequently
ing on an art piece to project digital masks on faces, but saw women with dark skin as men but made few errors
her own was invisible to the off-the-shelf face-tracking on men with light skin. (All three companies say their
software she was using. She scrawled a face on her tech is now more accurate.)
hand in marker. Face detected. Hmm. She covered her Buolamwini believes that people developing AI tech
dark skin with a white mask left over from Halloween. should check their inventions for bias and other harms
Face detected. Oh. before launch, not rely on Good Samaritans like her to
Buolamwini had come to MIT to explore how people audit them later. She spearheaded the Safe Face Pledge
could use technology for social change. The algorithm with Georgetown Law—a call for companies to agree
that couldn’t see her face set her on a new path: explor- to take steps aimed at mitigating the harms of facial
ing how tech could be misused and abused. When she analysis. She’s also pushing for a moratorium on police
learned how facial recognition is used in law enforce- and government use of facial recognition to allow time
ment, where error-prone algorithms could have grave for debate and possibly the creation of regulations. “We
consequences, she says, “that’s when it became urgent.” need public deliberation,” Buolamwini says. Her own
Buolamwini, now working on a PhD at MIT, is among deliberation takes place in scientific papers, congressio-
those pressing companies and governments to be more nal testimony, and spoken word poetry. “It’s our stories
cautious in their embrace of AI. Her work has revealed that lead to change,” she says. —TOM SIMONITE
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
FILTER BUBBLES
Guillaume I USED TO WORK at Google, but I had a more positive impact on it after I left.
Chaslot When I started at the company in 2010, I had recently completed a PhD in artificial
intelligence, and I joined a team working on new algorithms to recommend YouTube vid-
FOUNDER / AlgoTransparency eos. Our work centered on increasing a single number—the amount of time people spent
watching videos. That was seen as the way to compete with Facebook and gain audience
Pushing Big Tech to from TV. In my experience, every other idea or creative thought was dismissed.
clean up its algorithms. Our team had a handful of people, but I’d say our recommendations increased watch
time by millions of hours. They were designed to suggest videos that a person was likely to
watch, based largely on their past activity on the service. But we had no idea what people
were watching. We assumed that because watch time was moving in a positive direction,
the impact on the audience was also positive.
Still, I began to worry that the system we built could trap people inside filter bubbles,
pushing them to experience the same type of content over and over. I helped prototype
new ways to offer recommendations that would diversify what people saw, but those sys-
tems were never implemented. I was eventually fired for performance issues.
After leaving Google I joined a startup, then did some consulting before going to a non-
profit. But I kept worrying about the power of YouTube’s recommendations. I decided
to test them with a robot—a piece of software that watches lots of videos and follows
recommendations.
The 2016 presidential election was approaching, so I directed the robot to watch videos
about Donald Trump and Hillary Clinton. What I discovered was frightening. My analysis
showed YouTube’s recommendation system was helping videos promoting political con-
spiracy theories—like those from right-wing radio host Alex Jones—to get millions of views.
I was shocked, and launched a website called AlgoTransparency that shows live data
on what my robot discovers about YouTube recommendations. Journalists started writ-
ing about what I found, and YouTube finally acted. The company began adding Wikipedia
links below conspiracy theory videos to help people recognize them. This January, the
company changed its recommendation algorithms to limit the spread of conspiracy the-
ories. My data suggests this could reduce the number of times the site recommends con-
spiracy videos each year by the billions. Recommendations are responsible for more than
70 percent of time spent on YouTube, so the effect could be dramatic.
My experience shows that we can hold giant technology companies to account if we
have the right tools. I’m now upgrading AlgoTransparency to display richer data, and I’m
building a browser extension that will warn you about the algorithms trying to manipulate
you as you browse the web. Its advice will be a bit like health ratings on food—some of the
things you enjoy you shouldn’t eat every day. For YouTube’s recommendations, it might say,
“This algorithm is made to make you binge-watch, not to recommend things that are true.”
Longer term, I hope work like mine can allow new technology companies to emerge
that make ethics their first priority. Facebook and Google claim to have reformed, but
large companies won’t change their business models and values. Users don’t realize how
much power they would have if they were paying for a service. Signal, a free messaging
app, enables you to communicate with anybody, similar to Facebook’s WhatsApp, but
doesn’t rely on ad revenue. A complex service like Facebook could be run in its users’
interest, without ads, if people paid a small amount, say a dollar a month. If consumers
can be helped to see the problems with existing, ad-driven services, they may support
companies that operate differently. —AS TOLD TO TOM SIMONITE
(YouTube questions the accuracy of the AlgoTransparency tool and says its service now optimizes for user
satisfaction and information quality in addition to watch time.)
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Eva there are the corporations, government agencies, and billionaires that can afford to pay
expensive cybersecurity consultants, staff 24/7 security operations centers, and hire inci-
Galperin
HEAD OF THREAT LAB /
dent responders after a breach. Then there’s everyone else—an underclass of victims who
enjoy virtually none of those pricey protections. But now they do, at least, have Eva Galperin.
Earlier this year, Galperin, the head of cybersecurity at the Electronic Frontier Founda-
Electronic Frontier Foundation
tion, formed a new and unusual team within the venerable digital rights group. For nearly
three decades, the EFF has acted as a kind of geeky nonprofit law firm, fighting to protect
Protecting the rest of us online privacy and free expression in court, defending security researchers, and launching
from hackers and spies. lawsuits against everyone from patent trolls to warrantless-wiretap enablers. But Galp-
erin’s new initiative, called the Threat Lab, is more like a small, nonprofit cybersecurity
consulting firm—a sort of CrowdStrike or FireEye for the little guy.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Galperin and her team focus on protect- try, which has long neglected stalkerware,
ing the activists, dissidents, lawyers, journal- to take it far more seriously. Several com-
ists, and civilians who find themselves in an panies have since pledged to catalog and
increasingly lopsided conflict with entities eradicate the apps just as thoroughly as they
that hack, surveil, and sabotage them—or do traditional malware. “Stalkerware is con-
better yet, equipping them to protect them- sidered beneath the interest of most secu-
selves. “I think that empowering people to rity researchers,” Galperin says. “Changing
confront power is good,” she says. “That’s norms takes time. But it starts with someone
how change happens.” standing up and saying ‘This is not OK, this
In part, Galperin aims to create tools that is not acceptable—this is spying.’”
level the playing field for surveillance vic- Galperin, who has silvery-violet hair and
tims. In its first months, for instance, the a cyberpunk aesthetic, got her start as a sys-
Threat Lab’s tiny team of three full-time tems administrator, attending security con-
staffers has been building a device to detect ferences and being treated, she says, like
a common form of police surveillance: fake “some hacker’s girlfriend who looks after
LTE cell towers that trick phones into con- Solaris boxes.” In 2007 she joined the EFF,
necting to them, enabling police to pinpoint where her first job was to answer the 50-plus
the location and track the identities of pro- calls and emails that came in every day from
testers and other surveillance targets. people seeking help. The organization had
The Threat Lab also does detective work recently filed a lawsuit against AT&T for aid-
to expose perpetrators of state-sponsored ing warrantless NSA spying, and Galperin
surveillance. For years, even before the was flooded with messages from people who
team’s creation, Galperin and fellow EFF had been targeted for surveillance. Her desk
researcher Cooper Quintin investigated a became a kind of security crisis hotline.
hacking operation that planted spyware on According to Danny O’Brien, Galperin’s
the computers of journalists and opposi- former boss at the EFF, the experience gave
tion figures in Kazakhstan. Working with her a strong sense of the victim’s perspec-
the mobile security firm Lookout, Galp- tive—something that’s often overlooked
erin’s team found that some of the same by the cybersecurity research community,
tools—perhaps made by the same for- which tends to focus more on sexy new
hire hackers—were being used in a mas- hacking techniques than on the people who
sive campaign to spy on civilian targets in suffer from their use. “Eva isn’t afraid to plot
Lebanon. At one point during that investi- out the consequences of hackers’ actions,”
gation, the EFF had a researcher walk the O’Brien says, “to stare those consequences
streets of Beirut with a smartphone to find down until the problem is solved.”
the Wi-Fi network they’d linked with the She’s also good at plotting out, and max-
hackers. The researcher discovered it was imizing, the consequences of her own
emanating from inside the headquarters of actions. Galperin says she has no illusions
the Lebanese General Security Directorate. that she or her small team alone can tip the
Galperin’s own obsession is the scourge balance of security for vulnerable people
known as spouseware, or stalkerware: worldwide. But in line with the EFF’s long-
hidden apps installed on a smartphone time tactic of choosing cases that can set
by someone with physical access to the legal precedents, she says she chooses proj-
device—often a domestic abuser—that let ects that promise to have cascading effects,
them spy on the phone’s owner. Since early that will force the industry to change its pri-
2018, Galperin has offered her services as orities or inspire other researchers. “You
a kind of first responder, security consul- figure out the place where you need to
tant, and therapist for stalkerware victims. push,” she says, “not just to help the people
But Galperin wasn’t satisfied with the scale you help every day, the individuals, but to
of that hands-on approach. So she began change the game. To change the system.”
shaming and pressuring the antivirus indus- —ANDY GREENBERG
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
SUSTAINABILITY
Lisa
Jackson
V P O F E N V I R O N M E N T, P O L I C Y,
A N D S O C I A L I N I T I AT I V E S /
Apple
RARE EARTHS
The Taptic
engine—Apple’s
key component
for producing
haptic feedback—
in the iPhone 11
models uses 100
percent recycled
rare-earth metals.
COBALT TIN
A disassembly At least 15 Apple
robot called products use 100
Daisy extracts percent recycled
cobalt from recy- tin in the solder
cled iPhones. for their main
The company is logic boards and
now producing some power
batteries with adapters.
the reclaimed
material.
ALUMINUM
In 2018, Apple devel-
oped a process for
smelting recycled
aluminum that pro-
duces a much higher
quality finish. The
company is also
investing in greener
smelters, intended
to eliminate carbon
dioxide emissions.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ACTIVISM
IN 1996, THE UN'S Intergovernmental Panel on first wild huckleberries, peered into her first
20
11
7 8 9 10 12 13
from 8 to 19, she joined as a plaintiff. Citing “At stake are the lives and safety of these
harms such as worsening respiratory ill- young people,” says Julia Olson, the lead 1 4
2 3 5 6
nesses, forced relocation due to water scar- attorney in the case. “This is really their
city, and the threat of losing their homes last stand.”
to rising seas, Juliana and her coplaintiffs Juliana, who is now 23, agrees. “I want to
argue that elected officials have failed to be a parent and have a family,” she says. “I
protect their constitutional rights. Their don’t know if I’d be able to do that unless KEY
case, which has survived a number of legal I felt like our leaders did everything they
1 Nathan Baring 2 Avery M. 3 Miko Vergun
challenges from both the fossil-fuel industry possibly could to ensure a livable future.” To
4 Kiran Oommen 5 Hazel V. 6 Levi D. 7 Nick
and the Obama and Trump administrations, lose this case, she adds, “would be a huge Venner 8 Isaac V. 9 Tia Hatton 10 Jacob Lebel
11 Vic Barrett 12 Sahara V. 13 Xiuhtezcatl
demands nothing less than a sweeping court blow to myself and to my peers who are
Martinez 14 Alex Loznak 15 Zealand B.
order on the scale of Brown v. Board of Edu- still holding on to this belief in democracy 16 Journey Zephier 17 Kelsey Juliana 18 Sophie
Kivlehan 19 Jaime Butler 20 Aji Piper 21 Jayden F.
cation—one that will affirm the fundamen- and justice.” Five of her coplaintiffs weigh
tal right to a stable climate system for all. in above. —SARASWATI RATHOD
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
wound regions of DNA (inside a nucleus) to a more effective or narrowly targeted drug
glimpse active, open genes. Even the best or gene therapy.
technology could get a signal only from But Buenrostro’s invention also sparked
comparatively large samples—millions of more sweeping and fundamental changes,
cells, not all the same kind—and find the especially in cellular taxonomy. Cells had
average activity. But that’s a bit like aver- long been classified based on their loca-
aging the behaviors of a cat, a dog, a giraffe, tion in the body, along with a handful of
and a shark: How can you tell what’s doing identifying markers—a bit like fingerprints.
what? “You were literally taking chunks of But, like fingerprints, it was only possible to
skin or chunks of brain or chunks of heart match prints already on file, not new ones.
WHEN JASON BUENROSTRO started grad-
and then asking, ‘What’s the heart’s genetic Single-cell ATAC-seq made it possible to
uate school at Stanford, he became capti-
activity profile? What’s the brain’s profile?’” sort cells according to their genetic activity
vated by a problem that had long frustrated
Buenrostro recalls. Because the chunks instead, upending old categories. Not long
researchers. At the time, Buenrostro was
contained so many different cell types, in ago researchers estimated that the body
already something of a prodigy: A child of
other words, it “was pretty meaningless.” As contained roughly 200 cell types; now it’s
immigrants without high school diplomas,
a result, researchers were effectively blind clear there are far more—probably thou-
he had attended a small liberal arts college
not only to the fundamental genetics that sands. (One group recently identified 75 cell
and then worked in a lab where he helped
made cells different but also to the ways types in a tiny piece of tissue in the neocor-
invent a new tool for diagnosing cancer and
cells can malfunction to cause diseases like tex alone.) And even seemingly identical
other diseases.
leukemia, cystic fibrosis, or diabetes. cells are turning out to have subtle differ-
Within weeks of his arrival, though,
Buenrostro changed that. In his first ences. Buenrostro noted that one cell might
Buenrostro was singularly focused. The
year of grad school, he and two mentors be more likely to respond to an infection
human body is made of trillions of cells,
adapted a standard technique for sequenc- than another, while others seem to pop into
nearly all carrying the same DNA. What
ing genes so that it would mark only a cell’s existence only under certain circumstances,
makes a kidney cell different from a brain
open genes, rather than the entire genome. like when you have the flu.
cell lies in which set of genes—out of the
It was like turning on a light in a pitch-black Those insights could eventually help refine
roughly 25,000 in the human genome—are
room. Within months, the tool, called ATAC- our understanding of what happens when
active, meaning turned on and doing stuff
seq, had taken off. the body gets out of balance. Pott is currently
(undergoing methylation, interfacing with
“It really opened the door,” says Univer- studying patients with inflammatory bowel
RNA, and so on). If you think of each indi-
sity of Chicago geneticist Sebastian Pott, who diseases such as ulcerative colitis, looking
vidual gene as a single book in the library of
has since developed a sequencing method at how the proportion of different cell types
our DNA, active genes are the books that are
similar to Buenrostro’s invention. Because changes with illness. Buenrostro, who is now
open and being read—and those determine
Buenrostro’s tool was both easy to use and an assistant professor at Harvard, has started
not only what a cell becomes (part of your ear
quick—an experiment could be done in half using single-cell ATAC-seq to see how differ-
or part of your heart) but what it does (e.g.,
a day—questions that had long been impossi- ent cells contribute to certain cancers, and
make a certain set of proteins that prevent
ble to study suddenly became accessible. One also to study how changes in a cell’s genetic
cholesterol from sticking to an artery wall).
of the most pressing was how different kinds activity could affect its ability to self-repair
The problem, Buenrostro discovered, was
of cells were affected by a specific mutation. or regenerate as a body ages.
that scientists had no way to see into tightly
“For years, we’ve had a lot of informa- Last year, he also partnered with the
tion about how genetic variants are asso- life-science company Bio-Rad to cre-
ciated with certain diseases,” Pott noted. ate a radically upgraded version of sin-
The problem was that it was hard to know gle-cell ATAC-seq, which researchers can
which variants were associated with which buy as an off-the-shelf kit. “Growing up as
cells—and with what result. a first-generation student, and as an under-
Just recently, for instance, a group of represented minority in particular, you don’t
researchers discovered that in the lung, the really think of yourself as having the chops
genetic mutation responsible for cystic fibro- to be an inventor,” Buenrostro tells me. “But I
sis may affect just a single kind of lung cell: a always wanted to work on a technology that
rare structure known as a pulmonary iono- could change health care.” He shrugs, wryly.
cyte. Simply knowing that could help create “You know, big dreams.” — J E N N I F E R K A H N
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
BIOTECH
Emily
Leproust
CEO / Twist Bioscience
ANTITRUST
Lina Khan
MAJORITY COUNSEL /
The US House Subcommittee
on Antitrust, Commercial, and
Administrative Law
AT A C N N T O W N H A L L meeting this April, Elizabeth move Pet Pillows from the front page.” (Amazon dis-
Warren fielded a question from an audience member. putes this characterization of its business practices.) In
The questioner, named Meghan, extolled the conve- the name of fair competition, Warren concluded, Ama-
nience of Amazon and then asked Warren—who had zon’s two businesses had to be split up.
recently proposed a plan to cut online platforms down “Elizabeth Warren’s Really Simple Case for Breaking
to size—“How is breaking up Big Tech good for me?” Up Big Tech,” ran the headline of a story that night on
The candidate launched in. “A lot of these giant tech Vox. The article gave Warren props for being “crystal
companies, they actually run two businesses,” she said: clear on a topic that often feels abstract.” But if Warren
They run a platform that connects buyers and sellers, has become particularly lucid on the issue of antitrust
and they compete on that platform as vendors them- enforcement, she owes much of that clarity to a millen-
selves—while collecting near-omniscient data on their nial from Mamaroneck, New York, named Lina Khan.
rivals. Warren then described how Amazon might use In 2017, when she was a 27-year-old law student, Khan
this intel to quash a hypothetical brand called Pet Pillows wrote a paper for the Yale Law Journal called “Amazon’s
after it starts to take off: “I know what we’ll do,” Warren Antitrust Paradox.” The 24,000-word article offered a
said, imagining the behemoth’s thoughts. “Let’s jump careful anatomy of Amazon’s market power and called
in front of Pet Pillows and do ‘Amazon Pet Pillows’ and for a wholesale reassessment of antitrust jurisprudence.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
PRIVACY
Dawn Song
COFOUNDER & CEO /
Oasis Labs
FARM AID
Laura Boykin
COMPUTATIONAL BIOLOGIST /
Cassava Virus Action Project
ECONOMICS
Mariana Mazzucato
F O U N D E R & D I R E C T O R, I N S T I T U T E F O R I N N O VAT I O N A N D
P U B L I C P U R P O S E / University College London
A few years ago, when governments across the globe were responding to the financial crisis by
embracing fiscal austerity, Mariana Mazzucato assigned herself an odd accounting task: She
began tallying all the public investments that had given rise to the iPhone. The internet, GPS, touch-
screens, Siri: All that tech had originally been commissioned by either the Pentagon, the National
Science Foundation, or the CIA. So why were today’s leaders excoriating government spending?
In 2013, Mazzucato published her findings in The Entrepreneurial State, a book that describes
how governments have been a primary investor in innovation. Since then, she’s become one of the
world’s most influential economists, advising leaders at the UN, in the EU, and in the US on how to
renew the tradition of the government moon shot—just barely in time for the climate emergency.
—John Gravois
WIRED: You’re part of a group of economists create markets, then it’s very hard for start- As the former cybersecu-
that’s reviving an interest in industrial pol- ups to scale up. In the IT revolution, ven- rity chief for both Yahoo
icy—strategic, state-driven economic devel- ture capitalists followed the wave of patient, and Facebook, Alex Sta-
mos knows something about
opment. What’s the right way to do that? long-term finance provided by the govern- the power—and pitfalls—of
ment. Currently, there’s a risk that the big sheer size. Which is why his
MARIAN A MAZZUCATO: To think in terms of wave that VCs surfed in the IT revolution next act doesn’t involve pro-
tecting any single compa-
missions. This year was the 50th anniver- is not happening in the green revolution. ny’s users. It aims instead
sary of the Apollo 11 mission: That required You just have a lot of surfers and no wave. to shield even larger online
dozens of different sectors and hundreds populations. How? By giv-
ing researchers around the
of homework problems—and who knows You argue that, because the government world what they need to
how many attempts to solve those prob- takes big risks when it invests in early inno- study the scourge of disinfor-
lems failed? There was a willingness to vation, it should also expect to see big mation, security breaches,
and propaganda, particularly
take risks and use government instruments upsides from those investments. What would on social media. Launched
to drive bottom-up experimentation. Right those returns look like? earlier this year and funded
now, the climate emergency is a challenge. with $5 million from Craig
Newmark’s foundation, the
It’s important to turn it into missions, like There are lots of ways you can give the Stanford Internet Observa-
building 100 carbon-neutral cities across public—literally meaning people—a return tory, which Stamos leads,
the US. But as an economist I’m not the one for public investment: In the health sec- hopes to act as a clearing-
house for data about all
to decide what the mission is; the more tor, where you have $39 billion a year being those abuses—both real-
we can get different voices at the table, spent by the NIH, it’s ridiculous that you have time and historical—from
the more resilient these missions will be. drug prices set by the pharmaceutical indus- across the web. Rather than
spend months wrangling
try. The prices could be made to reflect that data themselves, social sci-
You helped advise Alexandria Ocasio- public investment, and the patent system entists could instead put
Cortez in formulating the Green New Deal. should be better governed to prevent pure in a call to Stamos and his
team. Plenty of work remains
Is that “mission-driven” policy? rent-seeking. Also, you can set conditions before the project is hum-
that require companies to reinvest profits ming, starting with attract-
The idea behind the Green New Deal is you back into the economy instead of spend- ing the full cooperation of
giants like Google, Twitter,
need an economy-wide transformation. ing trillions to buy back shares of their own and his former employers.
But it’ll be hard for that to happen without stock. To retain its monopoly status, AT&T But if anyone can map the uni-
some concrete green missions. My point to was forced to reinvest its profits—and that’s verse of digital woes, it’s the
guy who has spent his entire
her was that you have to reframe your view where Bell Labs came from! career fighting them up close.
of government as not just a regulator and —Brian Barrett
market fixer but as an active investor with People have called you the world’s scariest
a portfolio, having to make bets across dif- economist. Why? You seem very nice.
ferent sectors. And you have to learn from
history. When women economists have something
Procurement policy, for example, was to say, they become scary. Having said that,
pretty much what allowed Moore’s law to my other answer is: The situation is scary,
happen: Semiconductor chips were bought but we can’t confront it with being scared.
en masse by the government. If the govern- We have to turn global warming into an
ment doesn’t use its purchasing power to opportunity to reimagine our economies.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ELECTION SECURITY
Dana
DeBeauvoir
COUNTY CLERK /
Travis County, Texas
THIS COUNTRY'S SYSTEM for running elections is about says. So a motley squad of cryptographers and engineers
as decentralized as its system of local public libraries. descended on Austin to design an impregnable voting
When Americans go to cast their ballots in November system from scratch. They left with a dense white paper
2020, they’ll file into polling places administered by a and a name: STAR-Vote. Their designs call for encrypting
sprawling archipelago of more than 10,000 county, town, the vote using an application of pure math called homo-
and precinct authorities. Or, as Dana DeBeauvoir puts it, morphic cryptography. There’s also a built-in paper trail
it’ll be “Aunt Sally and Uncle Bob” against the Russians. and a system of automatic audits designed to ensure
DeBeauvoir happens to be one of those local officials an election’s accuracy with unprecedented certainty.
herself. For more than 30 years, she’s been the Travis The trouble was that DeBeauvoir couldn’t find any-
County Clerk in Austin, Texas. And for much of that time, one to build it. But then this year, Darpa and Microsoft
she’s been caught in a bind: forced to purchase clunky, separately revived aspects of the concept under new
expensive voting machines from the three big vendors names, each aiming to develop a prototype within the
in the cartel-like election industry, while simultane- next few years. The designs will be open source, open-
ously catching hell from concerned computer scien- ing the way for future companies (or tinkerers) to manu-
tists in Texas for buying woefully insecure technology. facture cheap, secure systems that liberate officials like
In 2011, DeBeauvoir curtly responded to her critics: DeBeauvoir from the tyranny of high-priced, hidebound,
Why not come to Austin and help her design a better hackable technology. Soon, thanks to her initiative, any-
voting machine? “Anyone can tear down a barn,” she one may be able to build a barn. —BENJAMIN WOFFORD
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
and requires vendors to do lots of paper- is reading on his personal website.) Cowen
work. For young companies that want to had come with a stack of books. Collison
accept payments—especially tech startups, went through the volumes, lingering over
which are Stripe’s core clientele—that can one about the British East India Company.
be a costly time suck. By using Stripe’s soft- “I would love to read this. I find it super
ware, they essentially outsource the has- interesting, the East India Company,” Colli-
sle. Stripe acts like an E-ZPass, allowing its son said, “because they’re an organization
clients to skip the tollbooths and charging that really had to operate through values.”
a flat fee, usually around 3 percent of every “And they were doing everything for the
transaction. first time,” Cowen said. For artists, singers, writers, and
Collison describes the financial system “And though none of them acquitted other creative types who are
that his company navigates as a clunky themselves well,” Collison said, “the East nice to have around if you enjoy a
flourishing civilization, the inter-
piece of legacy infrastructure that needs to India Company was not primarily predi- net has been a mixed bag. Yes,
be modernized. But he doesn’t rail against cated on slavery, unlike the others.” it provides a bottomless well of
it or advocate starting from scratch, as Many of the titles on Collison’s reading collaborators and ideas, along
with the power to reach a nearly
cryptocurrency enthusiasts do. Stripe list focus on the mystery of progress. He unlimited audience. But pesky
employs hundreds of workers to comply and Cowen would soon cowrite an essay thing, the internet also keeps
with complex rules in many jurisdictions for The Atlantic, calling for the creation finding new ways to destroy the
economic basis for these folks
and to monitor for fraud and money laun- of an academic discipline called Prog- to make a living, replacing it
dering. “Just to state the obvious, regulating ress Studies to search fields like busi- with flimsy ad-revenue-sharing
finance is a good idea,” Collison says. “It’s ness, art, and medicine, with the aim of deals. “A creative person can
be reaching millions of people
people’s money.” He wants to renovate, not improving the productivity of society as a through this free distribution
demolish. “We’ve always been very incre- whole. Collison’s obsession with the idea architecture and getting paid a
mental in our strategy,” he says. “We’re even shapes his recreational time. He has few hundred bucks,” says Jack
Conte, a YouTube musician
really not believers in radical disruption helped to organize an invitation-only turned tech CEO. “It sucks.” (See
or epochal transformation.” Strange words conference for scientists and technolo- “The Alchemist,” issue 27.10.)
in Silicon Valley. gists called Borlaug Camp, named for the Conte’s company, Patreon,
aims to rescue the creative
He does believe, however, that incre- agronomist responsible for the Green Rev- class from economic oblivion.
mental change can have epochal conse- olution. Over the Thanksgiving holiday “What we want to do is rebuild
quences. Collison lives in San Francisco last year, he jetted across four countries the infrastructure of the web so
there’s a better financial mech-
now, but he’s from Ireland, and he wants in Africa so he could “see places where the anism to—I guess to be crass
Stripe to facilitate global trade. A service Western notion that progress is inevitable about it—convert art into dol-
called Stripe Atlas allows a company any- is up for grabs,” said Cowen, who drew up lars.” His proposition: Turn your
most passionate fans into sub-
where in the world to incorporate in Del- the itinerary for the trip. scribers, or members of a club,
aware, so it can more easily access the US Stripe Press (motto: “Ideas for Prog- and let Patreon facilitate that
market and banking system. In Collison’s ress”) emerged two years ago. It publishes relationship. Since its found-
ing in 2013, the company has
view, these small interventions should add books that appeal to Collison’s imagina- sent nearly $1 billion from fans
up to fulfill Stripe’s mission: “to increase tion, like The Dream Machine, a formerly to creators, which suggests, if
the GDP of the internet.” out-of-print biography of internet pio- not a wholesale new model for
supporting all artists, at least
Last spring I met Collison for lunch at an neer J. C. R. Licklider. In his immodest a very substantial lifeboat.
Indian restaurant in Washington, DC. He moments, Collison suggests that Stripe —John Gravois
is skinny and fair, with strawberry blond aims to complete the work begun by such
hair, and he speaks in a gymnastic patter, early visionaries, by allowing people to
leaping rapidly across fields of knowledge. transmit money as easily as ideas. Stripe’s
Collison had also invited Tyler Cowen, a edition of The Dream Machine is a beau-
George Mason University economist who tiful, hardbound artifact, and there is
wrote the book The Great Stagnation. He something nostalgic, too, in his venera-
and Cowen share an incrementalist way of tion of an old view of progress, in which
looking at the world, often trading read- globalization and technology will inevi-
ing recommendations. (Since 2011, Colli- tably result in betterment for the world.
son has been posting lists of the books he —A NDR EW R ICE
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
ROBOTICS
Kate
Darling
RESEARCH SPECIALIST /
MIT Media Lab
CONNECTIVITY
Unicef Ventures
Bringing broadband internet to underserved parts of the globe.
IT IS A TRUTH universally acknowledged— ing. Before a telco can be talked into turn-
by the Allbirds-wearing set, at least—that a ing the red dots green, it needs a guarantee.
technological problem must be in want of a “ ‘Do good’ doesn’t usually fly,” says Sunita
technological fix. So when a tech CEO hears Grote, the manager of Unicef’s Innovation
that nearly 3.7 billion people around the Fund. A group of countries in, say, Central
world lack access to the internet, he gets to Asia will put together a joint bid, bankrolled
solutioneering. If the problem is that some with some combination of public funds, low-
regions are just too remote or too impover- interest loans, debt and equity financing, and
ished for telecom operators to cover profit- a sliver of cryptocurrency. Fabian acknowl-
ably, he asks, then why not launch satellites edges that crypto talk invariably “makes you
to beam broadband to the masses from on sound really nutty,” but the advantage is that O U T E R S PA C E M AYbe infinite,
high? All it’ll take to close the digital divide blockchain transactions are trackable and but these days it’s starting to feel
is billions of dollars in R&D. auditable. If a service provider fails to hold a little crowded. An estimated
That’s the tack SpaceX, Amazon, OneWeb, up its end of the bargain, everyone knows it. 500,000 human-made objects
and other companies are taking. But Chris- Once the school is connected, the rest of are hurtling around our planet
topher Fabian and his colleagues at Unicef the community can piggyback off of it, buy- right now. Some of them beam
Ventures, a kind of tech incubator within the ing a share of the available bandwidth. (In GPS signals to our phones or
United Nations, have a more earthbound especially far-flung areas, Fabian says, the premium programming to our
approach. Their solution to universal con- bandwidth may come from those tech com- TVs; others fill scientists’ hard
nectivity is a program called GIGA, whose panies in orbit, whose signals can go where drives with up-to-the-minute
initials currently don’t stand for anything. utility trucks can’t.) climate readings and glamour
(“Isn’t that nice?” Fabian says.) This being The next phase of the project really shots of the cosmos. More than
Unicef, the mission starts with kids: bring excites Fabian. With funding from the 99 percent of what’s up there,
internet access first to schools and then, if all government of Norway, his team is build- however, is just plain junk—
goes well, to the surrounding communities. ing a kind of nonprofit App Store stocked spent rocket boosters, exploded
GIGA grew out of Project Connect, a with free pedagogical software and “nerdy satellites, runaway flecks of
machine-learning tool that combs through little open source projects.” As connectiv- paint. NASA and the Depart-
satellite imagery, identifies schools, and ity expands, the customer base for these ment of Defense don’t know
displays them on a map. (Schools every- “digital public goods” will swell. An educa- what, or where, much of it is.
where have certain tells—soccer fields, tion minister in the Caribbean, for instance, That makes getting to space a
early-morning lines of stu- might go to the GIGA store for bit like merging onto the high-
dents.) The schools with con- a VR training tool, because it’s way without using your mir-
sistent internet access get a too expensive to fly students rors. Also, all the other cars are
green dot, while those with- to a neighboring island for going more than 6,700 mph.
out it show up as red. engineering classes. “I predict really bad things
That’s where the tech fixes GIGA’s goal of universal happening if that does not
end and the diplomatic ones connectivity is years away, change,” says Moriba Jah, the
begin. First, Unicef Ventures but Fabian and his colleagues 48-year-old director of Astria,
will approach a head of state, remain energized. Some of the Advanced Sciences and
or perhaps several from the the staff in New York—26 Technology Research in Astro-
same region, and offer to C H RIS T O P HE R FA BIA N people holding 20 different nautics program at the Univer-
map all of their schools for passports, he boasts—joined sity of Texas at Austin. Even
free. This is a more tempting the team from Facebook, those flecks of paint, moving
proposition than you might Google, and other corporate at orbital speeds, are enough
think: In Colombia, the tool juggernauts. “We have a pur- to seriously damage a space-
spotted some 6,700 schools pose for being here, and that’s craft. Jah, a beachcomber for
that weren’t on official maps. really nice,” he says. A project the space age, uses big-data
The team’s goal is to reach 130 like GIGA is a bottom-up anti- analysis to locate and iden-
countries by the end of 2021, dote to Silicon Valley’s busi- tify larger debris. Last year, he
at a cost of about $30 million. ness model. “This,” he adds, and his colleagues launched a
They’ve mapped 15 so far. “is rewriting the internet.” demo version of AstriaGraph,
Next comes the financ- S U N I TA G R O T E —ANTHONY LYDGATE a kind of open source traf-
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
fic monitor for the heavens that takes the key to ensuring the sustainability of space
AN ESTIMATED often conflicting data from satellites and exploration. After all, it’s not just national
500,000 HUMAN-MADE OBJECTS ground-based sensors and combines them space agencies contributing to the con-
into a 3D display. gestion anymore. Private companies plan
was frustrated.
I N 2 0 0 1, H A N Y FA R I D
He just couldn’t beat his long-standing
tennis buddy. To make light of his hope-
lessness, Farid, then a computer science
professor at Dartmouth, made a fake. He
used Photoshop to paste his friend’s head
onto the shoulders of a professional tennis
player. (He thinks it was Andre Agassi.) As he
stretched the face to make it fit its new phy-
sique, he realized that the algorithm Photo-
shop used to perform the operation would
leave a characteristic signature on that part
of the image. Farid had previously special-
ized in computer vision, getting comput-
ers to understand pictures more as humans
do. But now he set about establishing a new
field of image science, developing meth-
ods to detect when digital photos had been
manipulated. Today, he’s one of the leading
authorities on detecting fake photos.
Farid sensed all those years ago that as demics, and entrepreneurs have made
digital cameras became more common, AI fakery much more convincing, and
photos would become less trustworthy. deepfakes have become a tool of online
Computer files, so easily modified, were harassment. With the 2020 presidential
more corruptible than film negatives. A election approaching, Farid and others
succession of techniques he invented to are concerned that these manipulations,
spot fakery were quickly pressed into use. spread on social media, could enable mass
Farid worked with prosecutors to convict deception—potentially skewing elections
child abusers and helped fishing contests by showing a candidate saying or doing
spot when anglers had faked the true size something they did not. “This used to be a
of their catch. boutique little field, but now we’re defend-
In 2017, Farid’s satisfying but niche spe- ing democracy,” Farid says. “What happens
cialty took on new significance. A Reddit when more than half the content you see
account called deepfakes posted por- and hear online is fake?”
nographic clips with the faces of actresses One of Farid’s favorite clips in his per-
like Gal Gadot pasted on other bodies. The sonal library of deepfakes underlines
videos were made using a tool—which the that troubling question. It shows Hillary
account soon released online—based on Clinton standing at a podium and making
machine learning. campaign pledges she never made. As she
Deepfakes quickly became a catchall utters lines like “Vote for me and I promise
term for any image, video, or audio fab- I will be a stone-cold B,” winking archly,
ricated or altered by machine learning. not-Clinton’s face appears indistinguish-
In the past two years, hobbyists, aca- able from the real thing.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
F L E S HE D OU T
The modern livestock industry
is one of the most resource-
intensive and ethically fraught
sectors of the global econ-
omy. The extraordinary land
use and methane gases pro-
duced by the beef industry in
particular will rise to unsus-
tainable levels, as more people
in the developing world add
meat to their diets. That’s why
Pat Brown and Uma Valeti are
each blazing their own path to
eliminating the livestock busi-
ness as we know it. Whether
it’s Brown’s plant-based meat
alternatives or Valeti growing
meat in tanks, we’re rooting
for both of them.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
THE
MOST
DECEPTIVE
HACK IN
HISTORY
BY
ANDY
GREENBERG
...
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
.
Inside the
hunt for
THE
HACKERS
who nearly
took down
the Olympics.
And why
the next big
cyberattack
will be even
harder
to crack.
ILLUSTRATIONS
BY
JOAN WONG
...
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
J
pany was still working out its bugs?
The data centers in Seoul, however,
weren’t reporting any such problems, and
Oh’s team believed the issues with the con-
.... tractor were manageable. He didn’t yet
know that they were already preventing
some attendees from printing tickets that
would let them enter the stadium. So he’d
settled into his seat, ready to watch a high-
light of his career unfold.
Ten seconds before 8 pm, numbers
began to form, one by one, in projected
light around the stage, as a choir of chil-
dren’s voices counted down in Korean to
the start of the event:
JUST BEFORE
“Sip! … Gu! … Pal! … Chil!”
In the middle of the countdown, Oh’s
Samsung Galaxy Note8 phone abruptly
8 PM ON
lit up. He looked down to see a message
from a subordinate on KakaoTalk, a pop-
FEBRUARY 9, 2018,
ular Korean messaging app. The message
shared perhaps the worst possible news Oh
could have received at that exact moment:
Something was shutting down every domain
controller in the Seoul data centers, the
servers that formed the backbone of the
Olympics’ IT infrastructure.
As the opening ceremony got underway,
thousands of fireworks exploded around the
stadium on cue, and dozens of massive pup-
pets and Korean dancers entered the stage.
Oh saw none of it. He was texting furiously
with his staff as they watched their entire IT
setup go dark. He quickly realized that what
the partner company had reported wasn’t a
mere glitch. It had been the first sign of an
high in the northeastern mountains of South Korea, Sang-jin Oh was sitting on unfolding attack. He needed to get to his
a plastic chair a few dozen rows up from the floor of Pyeongchang’s vast, pen- technology operations center.
tagonal Olympic Stadium. He wore a gray and red official Olympics jacket that As Oh made his way out of the press sec-
kept him warm despite the near-freezing weather, and his seat, behind the press tion toward the exit, reporters around him
section, had a clear view of the raised, circular stage a few hundred feet in front had already begun complaining that the
of him. The 2018 Winter Olympics opening ceremony was about to start. Wi-Fi seemed to have suddenly stopped
As the lights darkened around the roofless structure, anticipation buzzed working. Thousands of internet-linked TVs
through the 35,000-person crowd, the glow of their phone screens floating showing the ceremony around the stadium
like fireflies around the stadium. Few felt that anticipation more intensely than and in 12 other Olympic facilities had gone
Oh. For more than three years, the 47-year-old civil servant had been direc- black. Every RFID-based security gate lead-
tor of technology for the Pyeongchang Olympics organizing committee. He’d ing into every Olympic building was down.
overseen the setup of an IT infrastructure for the games comprising more than The Olympics’ official app, including its dig-
10,000 PCs, more than 20,000 mobile devices, 6,300 Wi-Fi routers, and 300 ital ticketing function, was broken too; when
servers in two Seoul data centers. it reached out for data from backend serv-
That immense collection of machines seemed to be functioning perfectly— ers, they suddenly had none to offer.
almost. Half an hour earlier, he’d gotten word about a nagging technical The Pyeongchang organizing commit-
issue. The source of that problem was a contractor, an IT firm from which the tee had prepared for this: Its cybersecurity
Olympics were renting another hundred servers. The contractor’s glitches had advisory group had met 20 times since
been a long-term headache. Oh’s response had been annoyance: Even now, 2015. They’d conducted drills as early as
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
the summer of the previous year, simulat- All nine of the Olympic staff’s domain controllers, the powerful machines that
ing disasters like cyberattacks, fires, and governed which employee could access which computers in the network, had
earthquakes. But now that one of those somehow been paralyzed, crippling the entire system. The staff decided on a
nightmare scenarios was playing out in temporary workaround: They set all the surviving servers that powered some
reality, the feeling, for Oh, was both infuri- basic services, such as Wi-Fi and the internet-linked TVs, to bypass the dead
ating and surreal. “It’s actually happened,” gatekeeper machines. By doing
Oh thought, as if to shake himself out of the 0 so, they managed to bring those
sense that it was all a bad dream. bare-minimum systems back
7 7
Once Oh had made his way through online just minutes before the
the crowd, he ran to the stadium’s exit, end of the ceremony.
out into the cold night air, and across the Over the next two hours, as
parking lot, now joined by two other IT they attempted to rebuild the
staffers. They jumped into a Hyundai SUV domain controllers to re-create
and began the 45-minute drive east, down a more long-term, secure net-
through the mountains to the coastal city of work, the engineers would find
Gangneung, where the Olympics’ technol- again and again that the servers
ogy operations center was located. had been crippled. Some mali-
From the car, Oh called staffers at the cious presence in their systems
stadium and told them to start distribut- remained, disrupting the machines faster than they could be rebuilt.
ing Wi-Fi hot spots to reporters and to tell A few minutes before midnight, Oh and his administrators reluctantly decided
security to check badges manually, because on a desperate measure: They would cut off their entire network from the inter-
all RFID systems were down. But that was net in an attempt to isolate it from the saboteurs who they figured must still have
the least of their worries. Oh knew that maintained a presence inside. That meant taking down every service—even the
in just over two hours the opening cere- Olympics’ public website—while they worked to root out whatever malware
mony would end, and tens of thousands infection was tearing apart their machines from within.
of athletes, visiting dignitaries, and spec- For the rest of the night, Oh and his staff worked frantically to rebuild the
tators would find that they had no Wi-Fi Olympics’ digital nervous system. By 5 am, a Korean security contractor, AhnLab,
connections and no access to the Olympics had managed to create an antivirus signature that could help Oh’s staff vaccinate
app, full of schedules, hotel information, the network’s thousands of PCs and servers against the mysterious malware that
and maps. The result would be a humiliat- had infected them, a malicious file that Oh says was named simply winlogon.exe.
ing confusion. If they couldn’t recover the At 6:30 am, the Olympics’ administrators reset staffers’ passwords in hopes of
servers by the next morning, the entire IT locking out whatever means of access the hackers might have stolen. Just before
backend of the organizing committee— 8 that morning, almost exactly 12 hours after the cyberattack on the Olympics
responsible for everything from meals had begun, Oh and his sleepless staffers finished reconstructing their servers
to hotel reservations to event ticketing— from backups and began restarting every service.
would remain offline as the actual games Amazingly, it worked. The day’s skating and ski jumping events went off
got underway. And a kind of technologi- with little more than a few Wi-Fi hiccups. R2-D2-style robots puttered around
cal fiasco that had never before struck Olympic venues, vacuuming floors, delivering water bottles, and projecting
the Olympics would unfold in one of the weather reports. A Boston Globe reporter later called the games “impecca-
world’s most wired countries. bly organized.” One USA Today columnist wrote that “it’s possible no Olympic
.... Games have ever had so many moving pieces all run on time.” Thousands of ath-
letes and millions of spectators remained blissfully unaware that the Olympics’
staff had spent its first night fighting off an invisible enemy that threatened to
OH ARRIVED throw the entire event into chaos.
at the technology operations center in
Gangneung by 9 pm, halfway into the
....
opening ceremony. The center consisted
of a large open room with desks and com- WITHIN HOURS OF
puters for 150 staffers; one wall was cov- the attack, rumors began to trickle out into the cybersecurity community about
ered with screens. When he walked in, the glitches that had marred the Olympics’ website, Wi-Fi, and apps during
many of those staffers were standing, the opening ceremony. Two days after the ceremony, the Pyeongchang orga-
clumped together, anxiously discussing
how to respond to the attack—a problem From the book SANDWORM , by Andy Greenberg, to be published on Novem-
compounded by the fact that they’d been ber 5, 2019, by Doubleday, an imprint of the Knopf Doubleday Group, a divi-
locked out of many of their own basic ser- sion of Penguin Random House LLC. Copyright © 2019 by Andy Greenberg.
vices, like email and messaging. Greenberg is a senior writer for wired .
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
nizing committee confirmed that it had indeed been the target of a cyberat- find in its code not merely a single false flag
tack. But it refused to comment on who might have been behind it. Oh, who but layers of false clues pointing at multiple
led the committee’s response, has declined to discuss any possible source of potential culprits. And some of those clues
the attack with wired . were hidden deeper than any cybersecurity
The incident immediately became an international whodunit: Who would dare analyst had ever seen before.
to hack the Olympics? The Pyeongchang cyberattack would turn out to be per- From the start, the geopolitical motiva-
haps the most deceptive hacking operation in history, using the most sophisti- tions behind the Olympics sabotage were
cated means ever seen to confound the forensic analysts searching for its culprit. far from clear. The usual suspect for any
The difficulty of proving the source of an attack—the so-called attribution cyberattack in South Korea is, of course,
problem—has plagued cybersecurity since practically the dawn of the inter- North Korea. The hermit kingdom has tor-
net. Sophisticated hackers can route their connections through circuitous mented its capitalist neighbors with mili-
proxies and blind alleys, making it almost impossible to follow their tracks. tary provocations and low-grade cyberwar
Forensic analysts have nonetheless learned how to determine hackers’ iden- for years. In the run-up to the Olympics,
tities by other means, tying together clues in code, infrastructure connections, analysts at the cybersecurity firm McAfee
and political motivations. had warned that Korean-speaking hack-
In the past few years, however, state-sponsored cyberspies and saboteurs ers had targeted the Pyeongchang Olympic
have increasingly experimented with organizers with phishing emails and what
another trick: planting false flags. 0 appeared to be espionage malware. At the
Those evolving acts of deception, time, McAfee analysts hinted in a phone call
7 8
designed to throw off both security with me that North Korea was likely behind
analysts and the public, have given rise the spying scheme.
to fraudulent narratives about hack- But there were contradictory signals on
ers’ identities that are difficult to dis- the public stage. As the Olympics began, the
pel, even after governments announce North seemed to be experimenting with a
the official findings of their intelligence friendlier approach to geopolitics. The North
agencies. It doesn’t help that those Korean dictator, Kim Jong-un, had sent his
official findings often arrive weeks or sister as a diplomatic emissary to the games
months later, with the most convincing and had invited South Korea’s president,
evidence redacted to preserve secret Moon Jae-in, to visit the North Korean cap-
investigative techniques and sources. ital of Pyongyang. The two countries had
When North Korean hackers breached Sony Pictures in 2014 to prevent the even taken the surprising step of combining
release of the Kim Jong-un assassination comedy The Interview, for instance, their Olympic women’s hockey teams in a
they invented a hacktivist group called Guardians of Peace and tried to throw show of friendship. Why would North Korea
off investigators with a vague demand for “monetary compensation.” Even launch a disruptive cyberattack in the midst
after the FBI officially named North Korea as the culprit and the White House of that charm offensive?
imposed new sanctions against the Kim regime as punishment, several security Then there was Russia. The Kremlin
firms continued to argue that the attack must have been an inside job, a story had its own motive for an attack on
picked up by numerous news outlets—including wired . Pyeongchang. Investigations into doping
When state-sponsored Russian hackers stole and leaked emails from the by Russian athletes had led to a humiliat-
Democratic National Committee and Hillary Clinton’s campaign in 2016, we ing result in advance of the 2018 Olympics:
now know that the Kremlin likewise created diversions and cover stories. It Russia was banned. Its athletes would be
invented a lone Romanian hacker named Guccifer 2.0 to take credit for the allowed to compete but not to wear Russian
hacks; it also spread the rumors that a murdered DNC staffer named Seth Rich flags or accept medals on behalf of their
had leaked the emails from inside the organization—and it distributed many country. For years in the lead-up to that ver-
of the stolen documents through a fake whistle-blowing site called DCLeaks. dict, a state-sponsored Russian hacker team
Those deceptions became conspiracy theories, fanned by right-wing commen- known as Fancy Bear had been retaliating,
tators and then-presidential candidate Donald Trump. stealing and leaking data from Olympics-
The deceptions generated a self-perpetuating ouroboros of mistrust: Skeptics related targets. Russia’s exile from the games
dismissed even glaring clues of the Kremlin’s guilt, like Russian-language for- was exactly the sort of slight that might
matting errors in the leaked documents, seeing those giveaways as planted inspire the Kremlin to unleash a piece of
evidence. Even a joint statement from US intelligence agencies four months
later naming Russia as the perpetrator couldn’t shake the conviction of disbe-
lievers. They persist even today: In an Economist/YouGov poll earlier this year,
only about half of Americans said they believed Russia interfered in the election.
With the malware that hit the Pyeongchang Olympics, the state of the art in
digital deception took several evolutionary leaps forward. Investigators would
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
disruptive malware against the opening ceremony. If the Russian government toward any single false answer but to a col-
couldn’t enjoy the Olympics, then no one would. lection of them, undermining any partic-
If Russia had been trying to send a message with an attack on the Olympics’ ular conclusion. The mystery became an
servers, however, it was hardly a direct one. Days before the opening ceremony, epistemological crisis that left researchers
it had preemptively denied any Olympics-targeted hacking. “We know that doubting themselves. “It was psychological
Western media are planning pseudo-investigations on the theme of ‘Russian warfare on reverse-engineers,” says Silas
fingerprints’ in hacking attacks on information resources related to the hosting Cutler, a security researcher who worked
of the Winter Olympic Games in the Republic of Korea,” Russia’s Foreign Ministry for CrowdStrike at the time. “It hooked into
had told Reuters. “Of course, no evidence will be presented to the world.” all those things you do as a backup check,
In fact, there would be plenty of evidence vaguely hinting at Russia’s respon- that make you think ‘I know what this is.’
sibility. The problem, it would soon become clear, was that there seemed to be And it poisoned them.”
just as much evidence pointing in a tangle of other directions too. That self-doubt, just as much as the sab-
Korean theory seemed to be confirmed. malware, Soumenkov had found one flag that was provably false. It was now
But one senior Kaspersky researcher clear that someone had tried to make the malware look North Korean and
named Igor Soumenkov decided to go a failed due to a slipup. It was only through Kaspersky’s fastidious triple-check-
step further. Soumenkov, a hacker prod- ing that it came to light.
igy who’d been recruited to Kaspersky’s A few months later, I sat down with Soumenkov in a Kaspersky conference
research team as a teenager years ear- room in Moscow. Over an hour-long briefing, he explained in perfect English
lier, had a uniquely deep knowledge of file and with the clarity of a computer science professor how he’d defeated the
headers, and he decided to double-check attempted deception deep in Olympic Destroyer’s metadata. I summarized
his colleagues’ findings. what he seemed to have laid out for me: The Olympics attack clearly wasn’t
the work of North Korea. “It didn’t look like
them at all,” Soumenkov agreed.
“IT WAS PSYCHOLOGICAL code is very recognizable, and this looks dif-
ferent,” Soumenkov agreed again.
WARFARE ON Finally, I asked the glaring question: If
mundane element of the operation: a fake, malware-laced Word document off the hackers to their tell. But he could see
that had served as the first step in the nearly disastrous opening ceremony sab- that, like teenage punks who all pin just the
otage campaign. right obscure band’s buttons to their jack-
The document, which appeared to contain a list of VIP delegates to the games, ets and style their hair in the same shapes,
had likely been emailed to Olympics staff as an attachment. If anyone opened the attempt to make the encoded files look
that attachment, it would run a malicious macro script that planted a backdoor unique had instead made one set of them
on their PC, offering the Olympics hackers their first foothold on the target net- a distinctly recognizable group. He soon
work. When Matonis pulled the infected document from VirusTotal, the malware deduced that the source of that signal in
repository where it had been uploaded by incident responders, he saw that the the noise was a common tool used to create
bait had likely been sent to Olympics staff in late November 2017, more than two each one of the booby-trapped documents.
months before the games began. The hackers had laid in wait for months before It was an open source program, easily found
triggering their logic bomb. online, called Malicious Macro Generator.
Matonis began combing VirusTotal and FireEye’s historical collection of mal- Matonis speculated that the hackers had
ware, looking for matches to that code sample. On a first scan, he found none. chosen the program in order to blend in
But Matonis did notice that a few dozen malware-infected documents from the with a crowd of other malware authors, but
archives corresponded to his file’s rough characteristics: They similarly carried it had ultimately had the opposite effect, set-
embedded Word macros and, like the Olympics-targeted file, had been built to ting them apart as a distinct set. Beyond their
launch a certain common set of hacking tools called PowerShell Empire. The shared tools, the malware group was also
malicious Word macro traps, however, looked very different from one another, tied together by the author names Matonis
with their own unique layers of obfuscation. pulled from the files’ metadata: Almost all
Over the next two days, Matonis searched for patterns in that obfuscation that had been written by someone named either
might serve as a clue. When he wasn’t at his laptop, he’d turn the puzzle over in “AV,” “BD,” or “john.” When he looked at the
his mind, in the shower or lying on the floor of his apartment, staring up at the command and control servers that the mal-
ceiling. Finally, he found a telling pattern in the malware specimens’ encoding. ware connected back to—the strings that
Matonis declined to share with me the details of this discovery for fear of tipping would control the puppetry of any successful
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
infections—all but a few of the IP addresses collection Matonis had unearthed seemed to target victims in the Russian busi-
of those machines overlapped too. The fin- ness and real estate world. Had a team of Russian hackers been tasked with spying
gerprints were hardly exact. But over the next on some Russian oligarch on behalf of their intelligence taskmasters? Were they
days, he assembled a loose mesh of clues that engaged in profit-focused cybercrime as a side gig?
added up to a solid net, tying the fake Word Regardless, Matonis felt that he was on his way to finally, definitively cut-
documents together. ting through the Olympics cyberattack’s false flags to reveal its true origin:
Only after he had established those hid- the Kremlin.
den connections did Matonis go back to the
Word documents that had served as the vehi-
....
cles for each malware sample and begin to
Google-translate their contents, some writ- AFTER MATONIS
ten in Cyrillic. Among the files he’d tied to had made those first, thrilling connections between Olympic Destroyer and a
the Olympic Destroyer bait, Matonis found very familiar set of Russian hacking victims, he sensed he had explored beyond
two other bait documents from the collec- the part of Olympic Destroyer that its creators had intended for researchers to
tion that dated back to 2017 and seemed to see—that he was now peering behind its curtain of false flags. He wanted to
target Ukrainian LGBT activist groups, using find out how much further he could go toward uncovering those hackers’ full
infected files that pretended to be a gay identities. So he told his boss that he wouldn’t be coming into the FireEye office
rights organization’s strategy document and for the foreseeable future. For the next three weeks, he barely left his bunker
a map of a Kiev Pride parade. Others targeted apartment. He worked on his laptop from the same folding chair, with his back
Ukrainian companies and government agen- to the only window in his home that allowed in sunlight, poring over every data
cies with a tainted copy of draft legislation. point that might reveal the next cluster of the hackers’ targets.
This, for Matonis, was ominously familiar A pre-internet-era detective might start a rudimentary search for a person
territory: For more than two years, he and by consulting phone books. Matonis started digging into the online equiva-
the rest of the security industry had watched lent, the directory of the web’s global network known as the Domain Name
Russia launch a series of destructive hack- System. DNS servers translate human-readable domains like facebook.com
ing operations against Ukraine, a relentless into the machine-readable IP addresses that describe the location of a net-
cyberwar that accompanied Russia’s inva- worked computer that runs that site or service, like 69.63.176.13.
sion of the country after its pro-Western Matonis began painstakingly check-
2014 revolution. 0 ing every IP address his hackers had used
Even as that physical war had killed as a command and control server in their
13,000 people in Ukraine and displaced 8 3 campaign of malicious Word document
millions more, a Russian hacker group phishing; he wanted to see what domains
known as Sandworm had waged a full- those IP addresses had hosted. Since those
blown cyberwar against Ukraine as well: It domain names can move from machine to
had barraged Ukrainian companies, gov- machine, he also used a reverse-lookup
ernment agencies, railways, and airports tool to flip the search—checking every
with wave after wave of data-destroying name to see what other IP addresses had
intrusions, including two unprecedented hosted it. He created a set of treelike maps
breaches of Ukrainian power utilities in connecting dozens of IP addresses and
2015 and 2016 that had caused blackouts domain names linked to the Olympics
for hundreds of thousands of people. Those attack. And far down the branch of one tree, a string of characters lit up like
attacks culminated in NotPetya, a worm that neon in Matonis’ mind: account-loginserv.com.
had spread rapidly beyond Ukraine’s bor- A photographic memory can come in handy for an intelligence analyst. As
ders and ultimately inflicted $10 billion in soon as Matonis saw the account-loginserv.com domain, he instantly knew he
damage on global networks, the most costly had seen it nearly a year earlier in an FBI “flash”—a short alert sent out to US
cyberattack in history. cybersecurity practitioners and potential victims. This one had offered a new
In Matonis’ mind, all other suspects for the detail about the hackers who, in 2016, had reportedly breached the Arizona and
Olympics attack fell away. Matonis couldn’t Illinois state boards of elections. These had been some of the most aggressive
yet connect the attack to any particular elements of Russia’s meddling in US elections: Election officials had warned in
hacker group, but only one country would 2016 that, beyond stealing and leaking emails from Democratic Party targets,
have been targeting Ukraine, nearly a year Russian hackers had broken into the two states’ voter rolls, accessing comput-
before the Pyeongchang attack, using the ers that held thousands of Americans’ personal data with unknown intentions.
same infrastructure it would later use to hack According to the FBI flash alert Matonis had seen, the same intruders had also
the Olympics organizing committee—and it spoofed emails from a voting technology company, later reported to be the
wasn’t China or North Korea. Tallahassee, Florida-based firm VR Systems, in an attempt to trick more elec-
Strangely, other infected documents in the tion-related victims into giving up their passwords.
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
Matonis drew up a jumbled map of the connections on a piece of paper that hacker persona that had claimed credit for
he slapped onto his refrigerator with an Elvis magnet, and marveled at what the intrusions and given the Democrats’
he’d found. Based on the FBI alert—and Matonis told me he confirmed the stolen emails to WikiLeaks.
connection with another human source he declined to reveal—the fake VR Kovalev, listed as 26 years old, was also
Systems emails were part of a phishing campaign that seemed to have also accused of breaching one state’s board of
used a spoofed login page at the account-loginserv.com domain he’d found elections and stealing the personal infor-
in his Olympic Destroyer map. At the end of his long chain of internet-address mation of some 500,000 voters. Later, he
connections, Matonis had found a fingerprint that linked the Olympics attack- allegedly breached a voting systems com-
ers back to a hacking operation that directly targeted the 2016 US election. Not pany and then impersonated its emails in
only had he solved the whodunit of Olympic Destroyer’s origin, he’d gone fur- an attempt to hack voting officials in Florida
ther, showing that the culprit had been implicated in the most notorious hack- with spoofed messages laced with malware.
ing campaign ever to hit the American political system. An FBI wanted poster for Kovalev showed
Matonis had, since he was a teenager, been a motorcycle fan. When he was a picture of a blue-eyed man with a slight
just barely old enough to ride one legally, he had scraped together enough smile and close-cropped, blond hair.
money to buy a 1975 Honda CB750. Then one day a friend let him try riding his Though the indictment didn’t say it
2001 Harley-Davidson with an 1100 EVO engine. In three seconds, he was fly- explicitly, Kovalev’s charges described
ing along a country road in upstate New York at 65 miles an hour, simultane- exactly the activities outlined in the FBI flash
ously fearing for his life and laughing uncontrollably. alert that Matonis had linked to the Olympic
When Matonis had finally outsmarted the most deceptive malware in history, Destroyer attack. Despite all of the mal-
he says he felt that same feeling, a rush that he could only compare to taking off ware’s unprecedented deceptions and mis-
on that Harley-Davidson in first gear. He sat alone in his DC apartment, staring directions, Matonis could now tie Olympic
at his screen and laughing. Destroyer to a specific GRU unit, working at
_
APPLE IS BETTING ON
2 1
7 1 MARQUEE NAMES AND
LUSH PRODUCTION TO
LAUNCH
OFF THE GROUND.
_Sequence
BY
PETER RUBIN
PHOTOGRAPHS BY
MICHELLE GROSKOPF
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
MORE
THAN
50
buildings and soundstages sprawl across the 44 After the journalists handed their phones
to Apple staffers to be taped up with
acres of the Sony Pictures lot. That’s a lot of window- camera-blocking stickers, the vans shut-
tled the group to Stage 15. (The Sony com-
less oblongs, and even more distance between them. plex is also home to HBO’s Insecure and
If you need to get from, say, the Jimmy Stewart Showtime’s Ray Donovan. Apple may have
a near-trillion-dollar market cap, but it
Building to Stage 15, golf carts and Sprinter vans still leases soundstages like everyone else
are the customary mode—even on sunny days. On in Hollywood.) Dryness maintained, we
walked into the control room of NASA’s
a particular Saturday in February, while an atmo- Manned Spacecraft Center circa 1969.
spheric river settled over Los Angeles, those vehi- Mission Control, as it’s more commonly
known, was painstakingly refurbished by
cles were a necessity. The downpour was bad luck NASA in its original Houston location and
for the dozens of journalists there that day, but it reopened to the public earlier this year. The
Hollywood version in front of us, taking up
was also a touch allegorical. After what felt like almost 8,000 square feet of Stage 15, is its
years of anticipation, Apple was about to take us utter replica, from the soft packs of Kools
strewn on long tiers of desks to the million-
behind the scenes of a show it was making for its buttoned BOOSTER consoles that tracked the
still mysterious, still unnamed subscription stream- Saturn V rockets powering the Apollo space-
craft into orbit. Rotary phones. Horn-rimmed
ing service. We were going to find out if Apple, glasses. Even the ceiling tiles have been
maker of so many devices that have redefined the custom-made to match the ones in Houston.
Such millimeter-perfect verisimilitude is
way we consume content, could finally make con- to be expected. After all, we’re standing in a
tent—good content—of its own. Ronald D. Moore project. A veteran of mul-
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
_
crossroads, its hardware approaching mar-
ket saturation and its updates increasingly
incremental; part of the path forward, by its
own admission, involves being a purveyor
of services. So, after Apple’s two decades of
ASTRONAUT MEETING windfall as a manufacturer and distributor,
ROOM FROM THE SET TV+ is the company’s highly anticipated—
OF FOR ALL MANKIND. and very expensive—attempt to become an
BELOW, ACTOR JOEL entertainment studio, one that competes
KINNAMAN not just with the upstarts that inaugurated
the streaming wars (Netflix, Hulu, Amazon)
but also with the old hands that are now
trying to muscle in (Disney, Warner Bros.,
NBCUniversal). The landscape is crowded,
but there’s room among the stars.
Cupertino, we have liftoff.
T
WENTY YEARS AGO , with three
simple words, Steve Jobs changed
the way the public saw Apple. One
more thing … read the screen at the end of
his Macworld Expo keynote speech in San
Francisco that January. It was actually five
more things—blueberry, grape, tangerine,
lime, and strawberry, the colors of the new
translucent iMacs he announced—but the
construction stuck. For the next 12 years, the
line became Jobs’ catchphrase, the showman’s
wink at Apple’s cycle of secrecy and surprise.
By the time Tim Cook replaced Jobs as
CEO in 2011, Apple had thrust most of its
0 8 9
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
T
Time Warner about acquisition in mid-2016; none too soon. Not only would Apple miss its EN DAYS AFTER Planet of the Apps
some even suspected the company might own revenue target in 2016, in large part due premiered, Apple announced
make a bid for Netflix. Neither happened, to slowing sales of iOS devices, but its share that it had hired two television
but by then what was once called “web tele- of the movie-rental market—which, thanks veterans to head up “video programming
vision” had come into its own, and stream- to iTunes, had been more than 50 percent— worldwide.” Jamie Erlicht and Zack Van
ing content took on a new urgency. Amazon was tumbling, cannibalized by smart cable Amburg had been copresidents of Sony
had won multiple Emmys for its original boxes and Amazon. Apple’s services division Pictures Television for a decade. The two
show Transparent, and Hulu had evolved needed an extra boost if it was going to help were known for rescuing the division from
from a platform that just delivered the pre- the company offset such setbacks. early-2000s dreck like Shasta McNasty
vious day’s cable shows to one with its own Planet of the Apps premiered on June 6, and Madigan Men, replacing it with shows
slate of original programming. 2017. In it, contestants were given 60 sec- that fit the burgeoning age of so-called
Apple seemed ready to jump into the onds to pitch their app idea—while on a prestige TV: Breaking Bad, Community,
pool. Cook began trumpeting the perfor- moving walkway—to a panel of judges that Damages, Masters of Sex. At Apple, report-
mance of the company’s “services” divi- included Jessica Alba, will.i.am, Gwyneth ing to the company’s head of services,
sion, which included iTunes, Apple Music, Paltrow, and tech entrepreneur Gary Eddy Cue, they would try to help one of the
Apple Pay, and the App Store. Services were Vaynerchuk, author of such books as Crush richest companies in the world do televi-
by then second only to the iPhone in gen- It! and Crushing It! The ensuing reviews sion the right way.
erating revenue for Apple, and Cook said also crushed it, the “it” in this case being Though the timing of Apple’s announce-
he saw more growth for that group ahead. any hopes of a second season. “Apple’s first ment seemed comically coincidental, Erlicht
Part of it, it seemed, would come from tele- offering … feels like something that was and Van Amburg had been talking to Apple
vision; Apple quietly began filming Vital developed at a cocktail party, and not given for some time. In its quest to develop con-
Signs, a show based on the life of hip hop much more rigorous thought or attention tent that could hold up to fare from Netflix
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
0 9 1
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
and Hulu, the company had been discussing and wondering why he couldn’t see Neil
possible partnerships with numerous stu- Armstrong up there. As a teen, he planned
dios, including Sony. “Obviously we were on entering the Navy and applying to flight
intrigued,” Erlicht says. At the time, “there test school to be an astronaut himself. “Then
wasn’t an agency, production company, or I started wearing glasses,” he says now, sit-
studio that wasn’t trying to hunt down what ting in his office outside the Mankind writ-
Apple would be doing.” When they were ers’ room. “And poof, it was gone.”
eventually offered the job (and accepted), We’re in an unassuming, dated-looking,
one of their first calls went to Van Amburg’s three-story stone building on an even
old friend: Ronald Moore. less assuming street in that liminal space
If Apple were a person—if it truly took between Los Angeles and Burbank, Moore
mortal form—that form might be Ron sporting the habitual mane of hair and
Moore. Like Apple, Moore has created open-collar shirt that make him look like
epochal works that improve on the halt- he stepped off the cover of a romance novel
ing steps of their predecessors. And like for the bookish. His office accoutrements
Apple, he imagines a future that meshes evince a similar flair: a framed shot of Errol
with how humans actually behave and what Flynn from 1938’s The Adventures of Robin
they expect. Apple might call that Human Hood, an Apple IIe just like the one he wrote
Interface Design; Moore has called it “natu- his first Star Trek spec script on, old maps
ralistic science fiction.” and employee patches from Disneyland.
Th e con cept b egan wit h Mo ore’s “Star Trek, Disneyland, and NASA,” he says,
Battlestar Galactica miniseries. That four- ticking off his obsessions.
hour show ran on the Sci-Fi Channel (now Those obsessions informed Battlestar’s
Syfy) in 2003 and updated the single-season atmosphere, but it was Moore’s prioritiza-
1978 cult classic into an epic for the 21st cen- tion of soul over special effects that helped
_
tury. Like the original, it focused on the last the show entrance both fans and critics over
vestiges of humanity fleeing murderous its four-season run. The crewmembers of the
robots called Cylons; in the Moore mini- Galactica weren’t archetypes—they were
series, the Cylons looked just like those they people (and Cylons) who knew trauma and
stalked across the galaxy, infusing a fusty anxiety, who knew jealousy and pride and
premise with simmering dread. The mini- deceit and redemption. In a decade that NASA’S BACKUP
series ended on the holy-shit cliff-hanger began with The Sopranos and would end with CONTROL ROOM
revelation that a crew member was actu- Mad Men, Battlestar told human stories that FROM THE TV
ally a Cylon. So the network green-lit a full felt, in spite of their cosmic setting, grounded. SHOW’S SET
series, and Moore articulated his vision in
the show’s 49-page bible:
0 9 3
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
E
he said. The Russians had denied it for years, VEN THOUGH For All Mankind seemed, the company was going to give the
but if the development of their rocket had feels like the most Apple of Apple public a taste of what was to come.
gone just a little bit differently, he explained, shows, it was actually the third Not so. Instead, Apple opted to talk.
they might have gotten to the moon before show that Van Amburg and Erlicht green-lit, Celebrity after celebrity—Spielberg, Kumail
Neil Armstrong and Buzz Aldrin. after a reboot of Steven Spielberg’s Amazing Nanjiani, Abrams, Oprah, Big Bird—walked
Moore had his why. For two months, Stories and The Morning Show, a drama out from the wings to the stage, where, to a
he and his writing team plotted the arc of starring Reese Witherspoon and Jennifer one, they described their Apple TV+ project,
For All Mankind. The 10-episode first sea- Aniston. Many more followed in rapid suc- how thrilled they were to be working with
son, spanning from 1969 to 1974, would cession: a fantasy epic starring Jason Momoa the company, and how excited they were
unspool what might have happened had and Alfre Woodard called See; an adapta- for people to get to see it. That was it. Not
the Soviets beaten Apollo 11 to the moon. tion of Isaac Asimov’s Foundation; Servant, a single frame of footage, save a quick-cut
Congressional hearings, for one, which a psychological thriller from M. Night montage that revealed precisely nothing.
young senator Ted Kennedy attends in the Shyamalan. J. J. Abrams and Oprah signed No details about how the service was going
summer of 1969—meaning he doesn’t go to on to executive-produce projects. There to work. Stranger still, no one mentioned
Chappaquiddick, meaning he runs against were documentary series too, like one about For All Mankind, and Moore was nowhere to
Nixon in 1972. For another, the government spectacular houses and their designers. With be seen onstage. It wasn’t until June, when
goes all-in on establishing a foothold on each new acquisition or order throughout Apple released a trailer for his show, that
the moon, meaning that the US pulls out of 2018, Apple’s stockpile looked more robust. anyone who didn’t obsessively read trade
Vietnam in 1970. Maybe not as vast as Netflix’s, but enough publications knew the series even existed.
But that wasn’t all that was in Moore’s to compete. The company originally appeared ready
head. Around Halloween, when he pitched But trouble wasn’t over. Maybe because to launch Apple TV+ late in 2018. The goal-
his story line to a small group of Apple exec- of the same content conservatism that had post then moved to before the March 2019
utives in the company’s Culver City outpost, scuttled Vital Signs, executives report- event. Yet, through the summer of 2019,
Van Amburg was shocked by the way Moore edly asked Shyamalan to remove cruci- uncertainty lingered. All the while, other
launched headlong into the show. “When fixes from his characters’ houses. Some new streaming services were promoting
you’re making television shows, the idea high-profile staff departures also created high-profile acquisitions and too-good-
of something is usually much greater than an air of uncertainty. Amazing Stories to-be-true pricing. For $6.99, the new
the execution,” he says. “But Ron hadn’t and The Morning Show lost their original Disney+ service would offer massive con-
just thought about what the first hour of TV showrunners due to what Variety termed tent libraries from Star Wars, Marvel, Pixar,
was—he had thought about hour 40.” “creative differences.” The actress Kristen and its other IP empires—as well as develop
On the wall, a series of timelines and char- Wiig dropped out of a project because of a numerous original series and movies, many
acter profiles helped illustrate how the show scheduling conflict. of which were unveiled to a rapturous crowd
might progress over the seven seasons that In March 2019, scrutiny accumulating, at Comic-Con International in San Diego.
Moore and his writers had broken down. “The Apple sent out invitations for a “special event” NBCUniversal paid $500 million to regain
level of detail was overwhelming,” Erlicht to be held at the Steve Jobs Theater, an iPod the streaming rights to The Office, famously
says. “Every aspect of the butterfly effect that Nano’s throw from the colossal circular build- the most-watched show on Netflix, for
would happen from the slightest change in ing at the center of the company’s Cupertino its own forthcoming streaming service.
that event.” The executives walked out into campus. “It’s show time,” the invitation said, WarnerMedia shelled out $425 million to
the hallway, grinned at each other, and nego- below a flickering countdown film leader. It do the same with Friends.
tiated which one of them was going to give was the perfect opportunity for a course cor- For two decades, Apple had single-
Moore the good news. rection. After nearly three years of secrecy, it handedly changed how people consumed
entertainment. The iPod made listening
to music a playground of infinite playlists;
iTunes took lethal aim at Blockbuster long
before Netflix finished it off; the iPhone
ignited whole new categories of experi-
AP PL E H AD N ’ T I N V E N TE D M P 3 S ences. The company hadn’t invented MP3s
or smartphones. Rather, it had found a way
OR SM ART P H ON E S . R ATH E R, I T H A D to do them better, to change the landscape
FO UND A WAY T O DO TH E M B E T TE R, around those businesses. But in the time
it took Apple to draw up plans for original
T O CH AN GE TH E L A N D S C A P E content, the landscape had changed around
AROU N D T H O S E B US I N E S S E S . them. Even without Disney+ and other new-
comers, Apple was stepping onto a battle-
field full of experienced fighters: Netflix was
focusing on an ever-expanding global reach,
Amazon offered its programming as yet
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
another perk for Prime members, Hulu had developed live-TV func-
tionality that made it an all-in-one replacement for cable. All of a sud-
den, the well-worn Apple Way—keeping quiet until a world-changing
device or service was ready for consumers—looked like a road to ruin Facts that helped get this
for the company’s newest product. issue out:
A
ND YET. YET! This is Apple. Even as business and entertain- A supernatural ability for searching the FAA da-
tabase is key to breaking news on criminal inves-
ment pundits wondered aloud why the company seemed tigations; the US uses about as much electricity
to be floundering in its attempt to go Hollywood, Ron for air-conditioning as Africa uses for all purpos-
es; Marie’s Crisis Café is the best place in New
Moore kept his head down, working to make For All Mankind into York City; napkin-hoarding pays off eventually;
it’s possible to make a cookie so delicious that if
an unrestrained, uncompromising thought experiment. Not just the everyone on Earth tasted it, it would bring world
Mad Men stuff, either—the accuracy of the ceiling tiles, the exhaus- peace; September is never too early to start
listening to Bach’s Christmas Oratorio; she is
tively researched period clothing. He was consumed by how the an accomplished pianist and singer, has terrible
handwriting, has been to the Academy Awards,
made world might have become better than the one we have today. and will keep you calm and procedural in a crisis;
Battery research pushes solar energy into the mainstream. NASA most books are not fact-checked; Wikipedia is
not a source; be prepared to show your notes;
starts recruiting women astronauts earlier, putting them in space her relationship with cheese is complicated; sea
otters spend about five hours a day on hair care;
and turning them into global icons. The US sets up a lunar base as stone-fruit season is the best time of year; the
early as the 1970s. An alternate history in progress, one rooted in a conversation is over when anyone says the word
lawyer; maybe one particular elite Los Angeles
fundamental optimism. “It’s an aspirational show,” Moore says. “It private school was better when it was two elite
private schools; Joanna Pearlstein has been a
says, ‘Wouldn’t this have made us a better country and a better world champion of wired for the past 16 years!
if we had done all these things?’ Not just more Apollo missions, but
wi r e d is a registered trademark of Advance
the way we treated one another as human beings.” Magazine Publishers Inc. Copyright ©2019
On September 10, Tim Cook once again took the stage at the Steve Condé Nast. All rights reserved. Printed in the
USA. Volume 27, No. 11. wi r e d (ISSN 1059–
Jobs Theater for Apple’s annual iPhone event. Gone was the pag- 1028) is published monthly, except for the com-
bined July/August issue, by Condé Nast, which
eantry, and the secrecy, around TV+, and in its place came a giddy, is a division of Advance Magazine Publishers
you-asked-for-it forthrightness. And this time, gamesmanship: The Inc. Editorial office: 520 Third Street, Ste. 305,
San Francisco, CA 94107-1815. Principal office:
platform would launch November 1 (11 days before Disney); it would Condé Nast, 1 World Trade Center, New York,
NY 10007. Roger Lynch, Chief Executive Officer;
cost $4.99 a month (less than any other major streaming service). If David E. Geithner, Chief Financial Officer, US;
you bought an iOS device, Mac, or Apple TV, you’d get a year of the Pamela Drucker Mann, Chief Revenue & Mar-
keting Officer, US. Periodicals postage paid at
service for free. “All of these incredible shows for the price of a sin- New York, NY, and at additional mailing offices.
Canada Post Publications Mail Agreement
gle. Movie. Rental,” breathed Cook, in the reverential tone of some- No. 40644503. Canadian Goods and Services
one who can’t quite wrap their mind around the enormity of what Tax Registration No. 123242885 RT0001.
they’re saying. “Our mission,” he said, “is to bring you the best origi- POSTMASTER : Send all UAA to CFS (see DMM
707.4.12.5); NONPOSTAL AND MILITARY
nal stories from the most creative minds in television and film. Truly, FACILITIES: Send address corrections to wi r e d ,
stories to believe in. Stories with purpose.” PO Box 37617, Boone, IA 50037-0662. For sub-
scriptions, address changes, adjustments, or
Which may, after all the false starts and wayfinding, be the thing back issue inquiries: Please write to wi r e d ,
PO Box 37617, Boone, IA 50037-0662, call (800)
that turns Apple TV+ from a footnote to a phenomenon—or at least 769 4733, or email subscriptions@ wi r e d .com.
an able, stable entry in the streaming wars. Since Netflix launched Please give both new and old addresses as
printed on most recent label. First copy of new
House of Cards and unshackled television from the scarcity of a subscription will be mailed within eight weeks
after receipt of order. Address all editorial, busi-
prime-time schedule, networks and platforms have rushed to fill ness, and production correspondence to wi r e d
their pipelines, leading to a flood of what Slate critic Willa Paskin Magazine, 1 World Trade Center, New York, NY
10007. For permissions and reprint requests,
calls “fine TV.” The only way to part those waters is to become indis- please call (212) 630 5656 or fax requests to
(212) 630 5883. Visit us online at www.wi r e d .
pensable—not with more, but with better. com. To subscribe to other Condé Nast maga-
“We’re not doing demographic programming,” Van Amburg says. zines on the web, visit www.condenet.com.
Occasionally, we make our subscriber list
“No one here is sitting around saying we need to find the next show available to carefully screened companies that
offer products and services that we believe
for males 18 to 34, or the next show for females older than 32. We’re would interest our readers. If you do not want
defining our programming by quality.” to receive these offers and/or information,
please advise us at PO Box 37617, Boone, IA
So, Sought-After Creators. Writers who imagine a future as knotty 50037-0662, or call (800) 769 4733.
and challenging as life itself, and who offer a road toward that future. wi r e d is not responsible for the return or loss
Who know, even as the rain comes down and the water rises, that of, or for damage or any other injury to, unsolic-
ited manuscripts, unsolicited artwork (includ-
humanity’s vision extends far beyond what it can see. ing, but not limited to, drawings, photographs,
To get there, sometimes it just takes one more thing. and transparencies), or any other unsolici-
ted materials. Those submitting manuscripts,
photographs, artwork, or other materials for
consideration should not send originals, unless
PETER RUBIN (@provenself) is wired’s senior correspondent. specifically requested to do so by wi r e d in
He wrote about the world of crossword puzzle constructors in writing. Manuscripts, photographs, artwork,
and other materials submitted must be accom-
issue 27.09. panied by a self-addressed, stamped envelope.
0 9 5
UPLOADED BY "What's News" vk.com/wsnws TELEGRAM: t.me/whatsnws
HONORABLE MENTIONS: FIVE-YEAR-OLD WINS FORTNITE GOLD. BRENDON HOOPER VIA FACEBOOK // NANOBOTS Each month we publish a six-word story—and
FOUND IN GOLD MEDALIST’S URINE. @ABERNALESTEVEZ VIA INSTAGRAM // TEENAGE GOLD MEDALIST IS ACTUALLY it could be written by you. Submit your story
60. @CHLOEJAYNEASKEW VIA INSTAGRAM // GENETICALLY ENGINEERED OLYMPIANS PROTEST SEGREGATED GAMES. on Facebook, Twitter, or Instagram, along with
@ADMBRADFORD VIA INSTAGRAM // REIGNING SCOOTER CHAMPION ADMITS DNA MOD. @MATTHEW.GILSON VIA #WIREDBACKPAGE. We’ll pick one to illustrate
INSTAGRAM // FIRST ALL-HUMAN WINNER IN AGES! ANWAR MISMAR VIA FACEBOOK // BLACKWATER FIRST, PFIZER here. Your next assignment: In six words,
SECOND, AMERICA LAST. @JAY_HERNANDEZ VIA TWITTER sketch the plot of Star Wars: Episode XXI.
Craig DeMartino
Climber