memoment editorial

GettyImages 2178457506 1152x648 1

Reintroduced carnivores’ impacts on ecosystems are still coming into focus

He said he was surprised by how few studies show evidence of wolves, bears, and cougars having an effect on elk, moose, and deer populations. Instead, the biggest driver of changing elk population numbers across the West is humanity.
“In most mainland systems, it’s only when you combine wolves with grizzly bears and you take away human hunting as a substantial component that you see them suppressing prey numbers,” Wilmers said. “Outside of that, they’re mostly background noise against how humans are managing their prey populations.”
In some studies, ungulate populations actually increased slightly in the presence of wolves and grizzlies, Wilmers said, likely because human wildlife managers overestimated the effects of predators as they reduced hunting quotas.
“This is a much-needed review, as it is well executed, and highlights areas where more research is needed,” said Rae Wynn-Grant, a wildlife ecologist and cohost of the television show Mutual of Omaha’s Wild Kingdom Protecting the Wild, in an email to Inside Climate News. Wynn-Grant was not involved in the paper, and her work was not part of its survey.
In her view, the paper showed that an increase in predators on the landscape doesn’t automatically balance plant communities. “Our world would be much simpler if it did,” she said, “but the evidence suggests that so many variables factor into if and how ecosystems respond to increases in carnivore population in North America.”
Yellowstone, with its expansive valleys, relatively easy access, and status as an iconic, protected landscape, has become a hotspot for scientists trying to answer an existential question: Is it possible for an ecosystem that’s lost keystone large carnivores to be restored to a pre-extinction state upon their reintroduction?
Wilmers doesn’t think scientists have answered that question yet, except to show that it can take decades to untangle the web of factors driving ecological shifts in a place like Yellowstone. Any changes that do occur when a predator is driven to extinction may be impossible to reverse quickly, he said.
Yellowstone’s alternative stable state was a point echoed by researchers in both camps of the trophic cascade debate, and it is one Wilmers believes is vital to understand when evaluating the tradeoffs of large-carnivore reintroduction.
“You’d be better off avoiding the loss of beavers and wolves in the first place than you would be accepting that loss and trying to restore them later,” he said.
This story originally appeared on Inside Climate News. 

Reintroduced carnivores’ impacts on ecosystems are still coming into focus Read More »

Picture1 1

How background AI builds operational resilience & visible ROI

If you asked most enterprise leaders which AI tools are delivering ROI, many would point to front-end chatbots or customer support automation. That’s the wrong door. The most value-generating AI systems today aren’t loud, customer-facing marvels. They’re tucked away in backend operations. They work silently, flagging irregularities in real-time, automating risk reviews, mapping data lineage, or helping compliance teams detect anomalies before regulators do. The tools don’t ask for credit, but are saving millions.Operational resilience no longer comes from having the loudest AI tool. It comes from having the smartest one, placed where it quietly does the work of five teams before lunch.The machines that spot what humans don’tTake the case of a global logistics company that integrated a background AI system for monitoring procurement contracts. The tool scanned thousands of PDFs, email chains, and invoice patterns per hour. No flashy dashboard. No alerts that interrupt workflow. Just continuous monitoring. In the first six months, it flagged multiple vendor inconsistencies that, if left unchecked, would have resulted in regulatory audits.The system didn’t just detect anomalies. It interpreted patterns. It noticed a vendor whose delivery timelines were always one day off compared to logged timestamps. Humans had seen those reports for months. But the AI noticed that the error always occurred near quarter-end. The conclusion? Inventory padding. That insight led to a contract renegotiation that saved millions.This isn’t hypothetical. One similar real-world use case reported a seven-figure operational loss prevented through a near-identical approach. That’s the kind of ROI that doesn’t need a flashy pitch deck.Why advanced education still matters in the age of AIIt’s easy to fall into the trap of thinking AI tools are replacing human expertise. But smart organisations aren’t replacing but reinforcing. People with advanced academic backgrounds are helping enterprises integrate AI with strategic precision.Specifically, those with a doctorate of business administration in business intelligence bring an irreplaceable level of systems thinking and contextual insight. The professionals understand the complexity behind data ecosystems, from governance models to algorithmic biases, and can assess which tools serve long-term resilience versus short-term automation hype.When AI models are trained on historical data, it takes educated leadership to spot where historical bias may become a future liability. And when AI starts making high-stakes decisions, you need someone who can ask better questions about risk exposure, model explainability, and ethics in decision-making. This is where doctorates aren’t just nice to have – they’re essential.Invisible doesn’t mean simpleToo often, companies install AI as if it were antivirus software. Set it, forget it, hope it works. That’s how you get black-box risk. Invisible tools must still be transparent internally. It’s not enough to say, “AI flagged it.” The teams relying on these tools – risk officers, auditors, operations leads – must understand the decision-making logic or at least the signals that drive the alert. The requires not just technical documentation, but collaboration between engineers and business units.Enterprises that win with background AI systems build what could be called “decision-ready infrastructure.” The are workflows where data ingestion, validation, risk detection, and notification are all stitched together. Not in silos. Not in parallel systems. But in one loop that feeds actionable insight straight to the team responsible. That’s resilience.Where operational AI works bestHere’s where invisible AI is already proving its worth in industries:Compliance Monitoring: Automatically detecting early signs of non-compliance in internal logs, transactional data, and communication channels without triggering false positives.Data Integrity: Identifying stale, duplicate, or inconsistent data in business units to prevent decision errors and reporting flaws.Fraud Detection: Recognising pattern shifts in transactions before losses occur. Not reactive alerts after the fact.Supply Chain Optimisation: Mapping supplier dependencies and predicting bottlenecks based on third-party risk signals or external disruptions.In all these cases, the key isn’t automation for automation’s sake. It’s precision. AI models that are well-calibrated, integrated with domain knowledge, and fine-tuned by experts – not simply deployed off the shelf.What makes the systems resilient?Operational resilience isn’t built in a sprint. It’s the result of smart layering. One layer catches data inconsistencies. Another tracks compliance drift. Another layer analyses behavioural signals in departments. And yet another feeds all of that into a risk model trained on historical issues.The resilience depends on:Human supervision with domain expertise, especially from those trained in business intelligence.Cross-functional transparency, so that audit, tech, and business teams are aligned.The ability to adapt models over time as the business evolves, not just retrain when performance dips.Systems that get this wrong often create alert fatigue or over-correct with rigid rule-based models. That’s not AI. That’s bureaucracy in disguise.Real ROI doesn’t screamMost ROI-focused teams chase visibility. Dashboards, reports, charts. But the most valuable AI tools don’t scream. They tap a shoulder. They point out a loose thread. They suggest a second look. That’s where the money is. Quiet detection. Small interventions. Avoided disasters.The companies that treat AI as a quiet partner – not a front-row magician – are already ahead. They’re using it to build internal resilience, not just customer-facing shine. They’re integrating it with human intelligence, not replacing it. And most of all, they’re measuring ROI not by how cool the tech looks, but by how quietly it works.That’s the future. Invisible AI agents and assistants. Visible outcomes. Real, measurable resilience.

How background AI builds operational resilience & visible ROI Read More »

Earth from Space Eye of the Sahara pillars

Earth from Space: Eye of the Sahara

The Copernicus Sentinel-2 mission captures a spectacular geological wonder in the Sahara Desert of Mauritania: the Richat Structure.This giant feature looks out from a sea of golden sand in the Adrar Region of northern Mauritania. Once thought to be the site of a meteor impact, the Richat Structure is now believed to have been caused by a process of uplift of a large dome of molten rock that, once at the surface, was shaped by wind, sand and water erosion. Geologists agree that the structure is at least 100 million years old. The layered formation consists of a series of concentric rings and resembles a bull’s eye from space, so is also known as the eye of the Sahara or the eye of Africa.The Richat Structure, 50 km in diameter, is easier to observe from space than from the ground, and has been a familiar landmark for astronauts since the earliest manned missions.In this comparison, we can see two views captured in September 2025: the image on the left is in natural colour, while the image on the right is a false-colour combination which highlights specific features.This remarkable formation exposes layers of sedimentary rock in different places, depending on the rates of erosion on the varying rock types. This can be better appreciated in the false-colour image. The more erosion-resistant quartzite sandstones appear in shades of red and pink and form the outer rings and high ridges internally, with valleys of less-resistant rock between them visible as darker areas. The central rings of the eye are about 80 m tall, with rocks older than those forming the outer rings.In the image on the left, the dark area surrounding the eye is part of the Adrar plateau of sedimentary rock standing some 200 m above the surrounding desert sands, which in turn are part of the Erg Ouarane, an immense sand expanse stretching hundreds of kilometres to Mali.Sand is also clearly visible encroaching into the structure’s southern side. Here, individual trees and bushes can be spotted as tiny dots, which are visible in purple in the false-colour image, following a dry riverbed structure.

Earth from Space: Eye of the Sahara Read More »

iss073e0698446 th

Rings of Rock in the Sahara 

In northeastern Africa, within the driest part of the Sahara, dark rocky outcrops rise above pale desert sands. Several of these formations, including Jabal Arakanū, display striking ring-shaped structures.  

Jabal Arkanū (also spelled Arkenu) lies in southeastern Libya, near the border with Egypt. Several other massifs are clustered nearby, including Jabal Al Awaynat (or Uweinat), located about 20 kilometers (12 miles) to the southeast. Roughly 90 kilometers to the west are the similarly named Arkenu structures. These circular features were once thought to have formed by meteorite impacts, but later fieldwork suggested they resulted from terrestrial geological processes.   

Arkanū’s ring-shaped structures also have an earthly origin. They are thought to have formed as magma rose toward the surface and intruded into the surrounding rock. Repeated intrusion events produced a series of overlapping rings, their centers roughly aligned toward the southwest. The resulting ring complex—composed of igneous basalt and granite—is bordered to the north by a hat-shaped formation made of sandstone, limestone, and quartz layers. 

This photograph, taken by an astronaut aboard the International Space Station on September 13, 2025, shows the massif casting long shadows across the desert. The ridges stand nearly 1,400 meters above sea level, or about 800 meters above the surrounding sandy plains. Notice several outwash fans of boulders, gravel, and sand spreading from the mountain’s base toward the bordering longitudinal dunes.   

Two wadis, or typically dry riverbeds, wind through the structure. However, water is scarce in this part of the Sahara. Past research using data from NASA and JAXA’s now-completed Tropical Rainfall Measuring Mission (TRMM) indicated that southeastern Libya, along with adjacent regions of Egypt and northern Sudan, receives only about 1 to 5 millimeters of rain per year. Slightly higher accumulations, around 5 to 10 millimeters per year, occur near Jabal Arkanū and neighboring massifs, suggesting a modest orographic effect from the mountains.  

Astronaut photograph ISS073-E-698446 was acquired on September 13, 2025, with a Nikon Z9 digital camera using a focal length of 800 millimeters. It is provided by the ISS Crew Earth Observations Facility and the Earth Science and Remote Sensing Unit, Johnson Space Center. The image was taken by a member of the Expedition 73 crew. The image has been cropped and enhanced to improve contrast, and lens artifacts have been removed. The International Space Station Program supports the laboratory as part of the ISS National Lab to help astronauts take pictures of Earth that will be of the greatest value to scientists and the public, and to make those images freely available on the Internet. Additional images taken by astronauts and cosmonauts can be viewed at the NASA/JSC Gateway to Astronaut Photography of Earth. Story by Kathryn Hansen.  

Afkareen, M. M., et al. (2022) Lineament Mapping of Jabal Arkenu in Southern Libya. The Scientific Journal of University of Benghazi, 35(1). 

Alghariani, M. (2020) Applications of Remote Sensing for Exploration of Mineral Deposits and Gold in Jabal Arkenu. Fourth International Conference on Geospatial Technologies Libya GeoTec4 in Tripoli – Libya. 

Cigolini, C., et al. (2012)

Rings of Rock in the Sahara  Read More »

cybercrime hacker photo 2

New Android malware can empty your bank account in seconds

NEWYou can now listen to Fox News articles!
Android users have been dealing with a steady rise in financial malware for years. Threats like Hydra, Anatsa and Octo have shown how attackers can take over a phone, read everything on the screen and drain accounts before you even notice anything wrong. Security updates have helped slow some of these strains, but malware authors keep adapting with new tricks. The latest variant spotted in circulation is one of the most capable yet. It can silence your phone, take screenshots of banking apps, read clipboard entries, and even automate crypto wallet transactions. This threat is now known as Android BankBot YNRK, and it is far more advanced than typical mobile malware.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletterHow the malware infiltrates devicesHOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH Android banking malware is getting harder to spot as attackers use new tricks to take over phones and drain accounts. (Thomas Trutschel/Photothek via Getty Images)BankBot YNRK hides inside fake Android apps that appear legitimate when installed. In the samples analyzed by researchers at Cyfirma, the attackers used apps that impersonated official digital ID tools. Once installed, the malware begins profiling the device by collecting details such as brand, model and installed apps. It checks whether the device is an emulator to avoid automated security analysis. It also maps known models to screen resolutions, which helps it tailor its behavior to specific phones.To blend in, the malware can disguise itself as Google News. It does this by changing its app name and icon, then loading the real news.google.com site inside a WebView. While the victim believes the app is genuine, the malware quietly runs its background services.One of its first actions is to mute audio and notification alerts. This prevents victims from hearing incoming messages, alarms or calls that could signal unusual account activity. It then requests access to Accessibility Services. If granted, this allows the malware to interact with the device interface just like a user. From that point onward, it can press buttons, scroll through screens and read everything displayed on the device.BankBot YNRK also adds itself as a Device Administrator app. This makes it harder to remove and helps it restart itself after a reboot. To maintain long-term access, it schedules recurring background jobs that relaunch the malware every few seconds as long as the phone is connected to the internet.What does the malware stealOnce the malware receives commands from its remote server, it gains near-complete control of the phone. It sends device information and installed app lists to the attackers, then receives a list of financial apps it should target. This list includes major banking apps used in Vietnam, Malaysia, Indonesia and India, along with several global cryptocurrency wallets.With Accessibility permissions enabled, the malware can read everything shown on the screen. It captures UI metadata such as text, view IDs and button positions. This helps it reconstruct a simplified version of any app’s interface. Using this data, it can enter login details, swipe through menus or confirm transfers. It can also set text inside fields, install or remove apps, take photos, send SMS, turn call forwarding on and open banking apps in the background while the screen appears inactive.In cryptocurrency wallets, the malware acts like an automated bot. It can open apps such as Exodus or MetaMask, read balances and seed phrases, dismiss biometric prompts, and carry out transactions. Because all actions happen through Accessibility, the attacker never needs your passwords or PINs. Anything visible on the screen is enough.The malware also monitors the clipboard, so if users copy OTPs, account numbers or crypto keys, the data is immediately sent to the attackers. With call forwarding enabled, incoming bank verification calls can be silently redirected. All of these actions happen within seconds of the malware activating. BankBot YNRK hides inside fake apps that look legitimate, then disguises itself as Google News while it runs in the background. (AP Photo/Don Ryan, File)7 steps you can take to stay safe from banking malwareBanking trojans are getting harder to spot, but a few simple habits can reduce the chances of your phone getting compromised. Here are 7 practical steps that help you stay protected. FBI WARNS OVER 1 MILLION ANDROID DEVICES HIJACKED BY MALWARE1) Install strong antivirus softwareStrong antivirus software helps catch trouble early by spotting suspicious behavior before it harms your Android device or exposes your data. It checks apps as you install them, alerts you to risky permissions and blocks known malware threats. Many top antivirus options also scan links and messages for danger, which adds an important layer of protection when scams move fast.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com2) Use a data-removal service to shrink your digital footprintData brokers quietly collect and sell your personal details, which helps scammers target you with more convincing attacks. A reputable data-removal service can find and delete your information from dozens of sites so that criminals have less to work with. This reduces spam, phishing attempts and the chances of ending up on a malware attack list.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com3) Install apps only from trusted sourcesAvoid downloading APKs from random websites, forwarded messages or social media posts. Most banking malware spreads through sideloaded apps that look official but contain hidden code. The Play Store is not perfect, but it offers scanning, app verification and regular take-downs that greatly reduce the risk of installing infected apps.4) Keep your device and apps updatedSystem updates often patch security issues that attackers exploit to bypass protections. Updating your apps is just as important, since outdated versions may contain weaknesses. Turn on automatic updates so that your device stays protected without you having to check manually.5) Use a strong password managerA password manager helps you create long, unique passwords for every account. It also saves you from typing passwords directly into apps, which reduces the chance of malware capturing them from your clipboard or keystrokes. If one password gets exposed, the rest of your accounts remain safe.Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.  Once active, the malware can read your screen, steal financial data, automate crypto transfers and intercept OTPs within seconds. (Kurt “CyberGuy” Knutsson)Check out the best expert-reviewed password managers of 2025 at Cyberguy.com6) Enable two-factor authentication wherever possible2FA adds a confirmation step through an OTP, authenticator app or hardware key. Even if attackers steal your login details, they still need this second step to get in. It cannot stop malware that takes over your device, but it significantly limits how far an attacker can go with stolen credentials.GOOGLE ISSUES WARNING ON FAKE VPN APPS7) Review app permissions and installed apps regularlyMalware often abuses permissions such as Accessibility or Device Admin because they allow deep control over your phone. Check your settings to see which apps have these permissions and remove anything that looks unfamiliar. Also, look through your installed apps and uninstall any tool or service you do not remember adding. Regular reviews help you spot threats early before they can steal data.Kurt’s key takeawayBankBot YNRK is one of the most capable Android banking threats discovered recently. It combines device profiling, strong persistence, UI automation and data theft to gain full control over a victim’s financial apps. Because much of its activity relies on Accessibility permissions, a single tap from the user can give attackers complete access. Staying safe means avoiding unofficial APKs, reviewing installed apps regularly and being cautious of any sudden request to enable special permissions.Do you think Android phone makers like Samsung or Google are doing enough to protect you from malware? Let us know by writing to us at Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com.  All rights reserved.

New Android malware can empty your bank account in seconds Read More »

paradromics implant

Fully implantable brain chip aims to restore real speech

NEWYou can now listen to Fox News articles!
A U.S. neurotechnology startup called Paradromics is gaining momentum in the fast-growing field of brain-computer interfaces. The FDA has approved its first human trial built to test whether its fully implantable device can restore speech for people with paralysis. This milestone gives the Austin company a strong position in a competitive space, shaping the future of neural technology.Paradromics received Investigational Device Exemption status for the Connect-One Early Feasibility Study using its Connexus BCI. It is the first approved study to explore speech restoration with a fully implantable system. The research team wants to evaluate safety and see how well the device converts neural activity into text or a synthesized voice.Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.BRAIN IMPLANT TURNS THOUGHTS INTO DIGITAL COMMANDSHow the brain implant works The implant uses hundreds of tiny electrodes to capture detailed signals from the motor cortex where the brain forms sounds and shapes words. (Paradromics)Paradromics developed a fully implantable speech-focused brain device called the Connexus BCI. The company designed it to capture detailed neural signals that support real-time communication for people who cannot speak. This system uses high-resolution electrodes and an implanted wireless setup to record activity from individual neurons involved in forming speech.The Connexus BCI has a titanium body with more than 400 platinum-iridium electrodes placed just below the brain’s surface. Each electrode is thinner than a human hair. These electrodes record neural firing patterns in the motor cortex, where the brain controls the lips, tongue and larynx.Surgeons place the implant under the skin and connect it with a thin cable to a wireless transceiver in the chest. That transceiver sends data through a secure optical link to a second transceiver worn on the body. The external unit powers the system with inductive charging similar to wireless phone chargers.The collected signals then move to a compact computer that runs advanced language models. It analyzes the neural activity and converts it into text or into a synthetic voice based on the user’s past recordings.Inside the Paradromics BCI human trialThe trial begins with two participants. Each person will receive one 7.5-millimeter-wide electrode array placed 1.5 millimeters into the part of the motor cortex that controls the lips, tongue and larynx. During training sessions, the volunteers will imagine speaking sentences while the device learns the neural signatures of each sound.This is the first BCI trial that formally targets real-time synthetic voice generation. The study will also test whether the system can detect imagined hand movements and translate those signals into cursor control.If early results meet expectations, the trial could expand to ten people. Some participants may receive two implants to capture a richer set of signals.HOW A TINY RETINAL IMPLANT IS HELPING PEOPLE REGAIN THEIR SIGHTCyberguy reached out to Paradromics for comment and received the following statement: Researchers are testing whether Paradromics’ fully implantable brain device can turn neural activity into real-time speech for people with paralysis. (Synchron)”Communication is a fundamental human need. For people with severe motor impairment, the inability to express themselves with family and friends or request basic needs makes living difficult. The FDA approved clinical study for the Connexus Brain-Computer Interface is the first step toward a future where commercially available neurotech can restore the ability to naturally speak and seamlessly use a computer.The fully implanted Connexus BCI is designed to record brain signals from individual neurons, capturing the massive amounts of data required for high performance applications like speech restoration and complex mouse and keyboard hand actions. Built from proven medical-grade materials, Connexus BCI is engineered for daily long-term use, backed by more than three years of stable pre-clinical recordings.How Paradromics compares to other BCI companiesParadromics joins Synchron and Neuralink at the front of the implanted BCI race. Synchron uses a stent-like device placed in a blood vessel to record broad neural patterns. Neuralink uses flexible threads with many recording sites to capture high-bandwidth signals from individual neurons.Paradromics sits in the middle of these two approaches by using a fully implantable system that still captures single-neuron detail. Researchers believe this design may offer long-term stability for everyday communication.What this means for youThis breakthrough could make a major difference for people who lost their ability to speak after ALS, stroke or spinal cord injury. A system that converts thought into speech could help them talk in real time and regain independence. It may also allow hands-free computer control, which can improve daily living.If the trial succeeds, the tech could change how assistive communication devices work and speed up patient access to advanced tools. During the trial, volunteers imagine speaking while advanced AI models learn their neural patterns and convert those signals into text or a synthetic voice. (Paradromics)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com BRAIN IMPLANT FOR EPILEPSY TESTED IN 20-MINUTE SURGERYKurt’s key takeawaysParadromics is taking a careful but bold path toward practical BCI communication. The first stage is small but meaningful. It sets the foundation for devices that may restore speech with natural flow and faster response times. As more trials move forward, this field could shift from experimental to everyday use faster than many expect.Would you trust a fully implanted brain device if it meant restoring communication for someone you care about? Let us know by writing to us at Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com.  All rights reserved.

Fully implantable brain chip aims to restore real speech Read More »

ESA Council meeting at Ministerial level 2025 press conference pillars

ESA Council meeting at Ministerial level 2025 – press conference

Watch the replay of the press conference held at the conclusion of ESA’s Ministerial Council 2025 (CM25) in Bremen, Germany. ESA Director General Josef Aschbacher, as well as the hosting minister and the CM25 chair, present the outcome of this high-level meeting that took place on 26 and 27 November. Download the press conference slides 

Embed code

ESA Council meeting at Ministerial level 2025 – press conference Read More »

Applause as CM25 concludes in Bremen pillars

ESA Member States commit to largest contributions at Ministerial

Agency

27/11/2025
6100 views
35 likes

The largest contributions in the history of the European Space Agency, €22.1 bn, have been approved at its Council meeting at Ministerial level in Bremen, Germany. 

Ministers and high-level representatives from the 23 Member States, Associate Members and Cooperating States confirmed support for key science, exploration and technology programmes alongside a significant increase in the budget of space applications – Earth observation, navigation and telecommunications. These three elements are also fundamental to the European Resilience from Space initiative, a joint response to critical space needs in security and resilience.

“This is a great success for Europe, and a really important moment for our autonomy and leadership in science and innovation. I’m grateful for the hard work and careful thought that has gone into the delivery of the new subscriptions from the Member States, amounting to a 32% increase, or 17% increase if corrected for inflation, on ESA’s 2022 Ministerial Council,” said ESA Director General Josef Aschbacher.“In the face of a challenging geopolitical situation all the States contributing to the ESA budget, and indeed the European Commission, have put their faith in ESA to keep delivering programmes that will support European leadership in space, and help stretch our capabilities on Earth, in orbit, and into deep space. While we celebrated 50 years of achievements this year, the work is only beginning.”This year’s Ministerial Council was the first stage of the implementation of ESA’s Strategy 2040, setting the course for European space ambitions and defining the objectives that must be met to achieve long-term goals for Europe’s activities in space and in applications on Earth.

Empowering Europe to lead in space science

Ministers and high-level representatives gather for ESA’s Ministerial Council

Appropriately, in its 50th anniversary year, ESA has re-committed to science. The Member States have guaranteed an historic increase of 3.5% per year beyond inflation that will enable some of the most imaginative missions in our history and bolster European scientific leadership. The first step will be to deliver the missions described by the Cosmic Vision long-term plan – including LISA and NewAthena. But the next great leap for science will be enabled by technology development for missions under the Voyage 2050 plan, most notably the ambitious plan to search for life on Enceladus with the large-class mission ‘L4’ to Saturn and its moon, Enceladus. This mission requires immediate technology development to reach the south pole of Enceladus under ideal illumination.

Boosting European security and resilience

The European Resilience from Space initiative has been introduced to help support dual-use capacity for Europe. Initial funding will go towards a system giving access to high- temporal and spatial resolution satellite images – through pooling and sharing of resources and building a network to fill gaps in observations. This will be supported by new navigation services from low Earth orbit and by secure connectivity. The clear mandate for use of space applications for non-aggressive defence purposes signifies an historic change for ESA. It was decided at CM25 that subscriptions will remain open until next year to allow participating states to accommodate the new programme.

ESA technology at the heart of all missions

The technology to support this programme and ESA’s other innovative missions will be developed using a substantially strengthened budget for technology enablers, critical components, digitalisation and emerging technologies. Non-dependence in technology is key to advancing Europe’s ambitions in space, alongside its guaranteed access to space.A range of key activities in the European space ecosystem will be strengthened:

Europe’s launchers Ariane 6 and Vega-C will continue to lead the way to space. ESA will continue to support the evolution of the European launch market, and the development of new transport to orbit including the European Launcher Challenge.

Europe’s markets for space hardware and space data will be developed with the continuation of successful commercialisation programmes. ESA will continue to drive private investment, boost innovation and strengthen SMEs and new entrants to the space industry. A budget of €3.6 bn is agreed towards co-funded projects, expected to attract substantial private funding.

Europe’s lead in Earth observation will be maintained with the preparation of the second generation of Copernicus satellites (specifically the Sentinel-2 Next Generation and Sentinel-3 Next Generation Optical missions). Under FutureEO, ESA will develop and operate world-class Earth science missions, prepare future operational Copernicus and meteorological missions, and support the use of data for Earth Action.

Advancing exploration capabilities

ESA Member States have confirmed their commitment to exploration, with robust plans to enhance international partnerships. The Rosalind Franklin mission to land a rover on Mars is funded towards a launch date in 2028, while ESA will prepare missions to the Moon, the most important being the Argonaut lander. ESA will work on de-risking a range of other technologies to support European presence in low Earth orbit and beyond in the coming decades. Meanwhile, ESA and its Member States have agreed to implement short-term actions to guarantee European astronauts’ access to the International Space Station until its planned end of exploitation in 2030. The development of the LEO cargo return service was also confirmed at CM25 including two demonstration missions aiming at docking to the ISS. An interim meeting at Ministerial level is planned before CM28 to adjust to changes anticipated in international cooperation.

Defenders of the Earth

Three important missions account for the majority of funding in space safety and security: Ramses, Rise and Vigil. The Ramses mission, to be built on a tight schedule to intercept the asteroid Apophis on its close encounter with Earth in 2029 is funded, and will help to prepare for future potentially hazardous asteroids. The Vigil space weather mission, originally endorsed by CM22, will continue to implementation with the spacecraft expected to undergo preliminary design review early next year. To reduce waste in space in the future, the testing of on-orbit servicing will be funded through Rise, a partnership with industry.The SAGA spacecraft – a demonstration mission for quantum communication – will move to construction and implementation. The Moonlight programme which envisages lunar communications and navigations services will continue development.

New ESA activities in Member States

ESA has signed letters of intent with a view to preparing new centres to be hosted in two Member States. A letter of intent has been signed with Poland to examine the possibility of hosting a new centre specialising in security and dual-use/multi-use applications. Meanwhile, a letter of intent between Norway and ESA will allow both sides to evaluate the establishment of an ESA Arctic Space Centre in Tromsø.Two Resolutions were approved during the Ministerial: the Resolution on Elevating the Future of Europe through Space; and the Resolution on the Level of Resources for the Agency’s Mandatory Activities for 2026-2030.

Like
Thank you for liking
You have already liked this page, you can only like it once!

ESA Member States commit to largest contributions at Ministerial Read More »

soyuz original

NASA Astronaut Chris Williams, Crewmates Arrive at Space Station

NASA astronaut Chris Williams, accompanied by Roscosmos cosmonauts Sergey Kud-Sverchkov and Sergei Mikaev, safely arrived at the International Space Station on Thursday, expanding the orbiting laboratory’s crew to 10 for the next two weeks.
The trio launched aboard the Soyuz MS-28 spacecraft at 4:27 a.m. EST (2:27 p.m. Baikonur time) from the Baikonur Cosmodrome in Kazakhstan. After a three-hour, two-orbit journey, the spacecraft docked at 7:34 a.m. to the space station’s Rassvet module.
Following hatch opening, expected about 10:10 a.m., the new arrivals will be welcomed by the Expedition 73 crew, including NASA astronauts Mike Fincke, Zena Cardman, and Jonny Kim; JAXA (Japan Aerospace Exploration Agency) astronaut Kimiya Yui; and Roscosmos cosmonauts Sergey Ryzhikov, Alexey Zubritsky, and Oleg Platonov.
NASA’s live coverage of hatch opening begins at 9:50 a.m. on NASA+, Amazon Prime, and YouTube. Learn how to watch NASA content through a variety of platforms, including social media.
During his stay aboard the space station, Williams will conduct scientific research and technology demonstrations aimed at advancing human space exploration and benefiting life on Earth. He will help install and test a new modular workout system for long-duration missions, support experiments to improve cryogenic fuel efficiency and grow semiconductor crystals in space, as well as assist NASA in designing new re-entry safety protocols to protect crews during future missions.
Expedition 74 is scheduled to begin on Monday, Dec. 8, following the departure of Kim, Ryzhikov, and Zubritsky, as they conclude an eight-month science mission aboard the orbital outpost.
Watch the change of command ceremony at 10:25 a.m. on Sunday, Dec. 7, as station leadership transfers from Ryzhikov to Fincke, live on NASA+.
Learn more about International Space Station, crews, research, and operations at:
https://www.nasa.gov/station
-end-
Jimi RussellHeadquarters, Washington202-358-1100james.j.russell@nasa.gov
Sandra Jones / Joseph ZakrzewskiJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov / joseph.a.zakrzewski@nasa.gov

NASA Astronaut Chris Williams, Crewmates Arrive at Space Station Read More »

GettyImages 1303511343

This year’s UN climate talks avoided fossil fuels, again

If we didn’t have pictures and videos, I almost wouldn’t believe the imagery that came out of this year’s UN climate talks. Over the past few weeks in Belem, Brazil, attendees dealt with oppressive heat and flooding, and at one point a literal fire broke out, delaying negotiations. The symbolism was almost too much to bear. While many, including the president of Brazil, framed this year’s conference as one of action, the talks ended with a watered-down agreement. The final draft doesn’t even include the phrase “fossil fuels.” As emissions and global temperatures reach record highs again this year, I’m left wondering: Why is it so hard to formally acknowledge what’s causing the problem?
This is the 30th time that leaders have gathered for the Conference of the Parties, or COP, an annual UN conference focused on climate change. COP30 also marks 10 years since the gathering that produced the Paris Agreement, in which world powers committed to limiting global warming to “well below” 2.0 °C above preindustrial levels, with a goal of staying below the 1.5 °C mark. (That’s 3.6 °F and 2.7 °F, respectively, for my fellow Americans.) Before the conference kicked off this year, host country Brazil’s president, Luiz Inácio Lula da Silva, cast this as the “implementation COP” and called for negotiators to focus on action, and specifically to deliver a road map for a global transition away from fossil fuels.
The science is clear—burning fossil fuels emits greenhouse gases and drives climate change. Reports have shown that meeting the goal of limiting warming to 1.5 °C would require stopping new fossil-fuel exploration and development. The problem is, “fossil fuels” might as well be a curse word at global climate negotiations. Two years ago, fights over how to address fossil fuels brought talks at COP28 to a standstill. (It’s worth noting that the conference was hosted in Dubai in the UAE, and the leader was literally the head of the country’s national oil company.) The agreement in Dubai ended up including a line that called on countries to transition away from fossil fuels in energy systems. It was short of what many advocates wanted, which was a more explicit call to phase out fossil fuels entirely. But it was still hailed as a win. As I wrote at the time: “The bar is truly on the floor.” And yet this year, it seems we’ve dug into the basement. At one point about 80 countries, a little under half of those present, demanded a concrete plan to move away from fossil fuels. But oil producers like Saudi Arabia were insistent that fossil fuels not be singled out. Other countries, including some in Africa and Asia, also made a very fair point: Western nations like the US have burned the most fossil fuels and benefited from it economically. This contingent maintains that legacy polluters have a unique responsibility to finance the transition for less wealthy and developing nations rather than simply barring them from taking the same development route.  The US, by the way, didn’t send a formal delegation to the talks, for the first time in 30 years. But the absence spoke volumes. In a statement to the New York Times that sidestepped the COP talks, White House spokesperson Taylor Rogers said that president Trump had “set a strong example for the rest of the world” by pursuing new fossil-fuel development. To sum up: Some countries are economically dependent on fossil fuels, some don’t want to stop depending on fossil fuels without incentives from other countries, and the current US administration would rather keep using fossil fuels than switch to other energy sources. 

All those factors combined help explain why, in its final form, COP30’s agreement doesn’t name fossil fuels at all. Instead, there’s a vague line that leaders should take into account the decisions made in Dubai, and an acknowledgement that the “global transition towards low greenhouse-gas emissions and climate-resilient development is irreversible and the trend of the future.” Hopefully, that’s true. But it’s concerning that even on the world’s biggest stage, naming what we’re supposed to be transitioning away from and putting together any sort of plan to actually do it seems to be impossible. This article is from The Spark, MIT Technology Review’s weekly climate newsletter. To receive it in your inbox every Wednesday, sign up here.

This year’s UN climate talks avoided fossil fuels, again Read More »