China to push AI-enabled economic, social development

China will build a batch of regional highlands and technological platforms for artificial intelligence (AI), in a bid to deepen enterprise-led integration of industry, research and application, and promote AI-enabled economic and social development, Wang Zhigang, Chinese minister of science and technology, said at a major AI event on Thursday.

Officials and industry practitioners also said at the event that the new generation of AI will become a new engine for the development of the economy and society.

"The application scenarios of AI continue to expand, making the AI-empowered industrial mode change from small manual workshops into the era of large-scale industrialization, which will have a significant and far-reaching impact on economic development, social progress, global governance and many other aspects," Wang said on Thursday, while addressing the opening ceremony of the 7th World Intelligence Congress (WIC), which runs until Sunday in Tianjin Municipality.

The accelerated evolution of brain-like intelligence, quantum intelligence, big data and other technological areas has led to a mass breakthrough in frontier fields, which is expected to achieve major technological changes, Wang noted.

Relying on the advantages of China's super-large market, AI will attract global innovation resources to deeply integrate with China's real economy, and constantly create a new trend of industrial development while becoming a new engine of economic and social development, Wan Gang, president of the China Association for Science and Technology, said at the WIC.

"The new generation of AI should focus on expansion in application markets and industrial ecological cultivation," said Wan.

With the rapid development of AI, China has achieved remarkable economic and social empowerment. By 2022, China ranked first in the world in the number of AI patent applications.

According to official statistics, China has a leading edge in computer vision, natural language processing and voice recognition, and its core industry scale exceeds 500 billion yuan ($71.2 billion), with more than 4,200 representative enterprises, accounting for about 16 percent of the world's total.

China ranked 11th in the Global Innovation Index, according to a report released by the World Intellectual Property Organization. In terms of scientific and technological innovation, including the field of AI, China is not only an important player in international frontier innovation, but also an important contributor to jointly solving global problems.

Under its blueprint of AI development, China has established a total of 18 national pilot zones, including Beijing and Tianjin, for the development of next-generation AI innovation and 32 open innovation platforms, according to official statistics.

While attaching great importance to the development of AI, the Chinese government is fully aware that technologies including AI have two sides, Wang noted.

At the same time, China also sees that the development of AI is still faced with technical challenges, such as the deviation of underlying algorithms, lack of high-quality data, model efficiency to be improved, and social challenges to personal privacy, public safety, education and employment. China urges cooperation with countries around the world to jointly promote the sustainable and healthy development of AI.

"We have actively responded to the risks and challenges that may be brought by AI, and promoted the ethical governance of AI. China [in November 2022] published a position paper on strengthening the ethical governance of AI, demonstrating to the world a clear position on the responsible development of AI," said Wang.

ChatGPT and brain computer interface (BCI) were key issues for discussion at the 2023 WIC. 

On Thursday, a BCI system was launched at the high-tech event, which has set the current world record for the fastest non-invasive BCI system. With a small device on your head, a computer can type out what you think.

The WIC attracted participation of 117 of the world's top 500 companies, 369 of China's top 500 companies, and more than 1,000 well-known unicorn technology companies, universities and institutions, according to the organizers.

The event uses cutting-edge technologies such as AI and metauniverse to comprehensively showcase the latest technologies and products in intelligent industries, smart cities, smart manufacturing and smart living.

These cutting-edge technologies have dazzled many participants.

Andrew Starforth, general manager of the China division of Silverstream Technologies, was one of them.

"All the technologies are in place. And various local companies, not ones that are recognized globally compared to big players, are developing technology that is better than what you can see elsewhere," Starforth told the Global Times on Thursday on the sidelines of the 2023 WIC.

Starforth went to work in China in 1999 and stayed for five years. He moved back in 2018. "The changes in China in the past six years have been phenomenal."

Describing China in 1999 and 2023 as worlds apart, Starforth said that China has advanced quickly.

Exclusive: China identifies the culprits behind cyberattack on Wuhan Earthquake Monitoring Center; a secretive US global reconnaissance system to be exposed

New progress has been made on an investigation into a cyberattack incident targeting the Wuhan Earthquake Monitoring Center affiliated to the city's Emergency Management Bureau, after a joint investigation team formed by the National Computer Virus Emergency Response Center (CVERC) and Chinese cybersecurity company 360 discovered malicious backdoor software that exhibits characteristics of US intelligence agencies, the Global Times learned on Monday. Chinese authorities will publicly disclose a highly secretive global reconnaissance system of the US government, which poses a serious security threat to China's national security and world peace.

On July 26, the Wuhan Earthquake Monitoring Center reported that some front-end station collection points of the earthquake reporting data had been implanted with backdoor programs, attracting widespread attention. The CVERC and the company 360 immediately formed a joint investigation team to go to Wuhan for investigation and evidence collection.

Du Zhenhua, a senior engineer from the CVERC, told the Global Times that the team has found very complex backdoor malware in the victim's network, fitting the characteristics of US intelligence agencies, highly concealed, and aiming to steal earthquake monitoring-related data, with a clear military reconnaissance purpose.
Why target earthquake monitoring system?

Du explained that China is a country seriously affected by earthquake disasters, with multiple occurrences causing severe loss of life and property. "Therefore, China attaches great importance to earthquake monitoring and early warning. In order to improve the monitoring and early warning capability of geological disasters, earthquake monitoring data includes not only basic information like magnitude and epicenter but also rich geographical and geological data such as surface deformation and hydrological monitoring," Du said.

These data also hold high value as military intelligence. Hence, the cyberattack on the earthquake monitoring center by US intelligence agencies was a planned and premeditated cyber military reconnaissance action, the expert noted.

Xiao Xinguang, a member of the National Committee of the Chinese People's Political Consultative Conference (CPPCC) and also the chief software architect of leading anti-virus company Antiy Labs, further explained to the Global Times that although the location, magnitude, and depth are publicly released information, they are based on the calculations from multiple sensors.

"The comprehensive vibration and sound wave data collected by these sensors, especially infrasound data, have significant intelligence value for judging geological terrain, analyzing weapons system tests, and nuclear tests," Xiao said.

Furthermore, this is just one of the reasons the US targets earthquake monitoring and other systems with cyberattacks. Xiao also analyzed that the current information gathering is only one type of behaviors that have been exposed.

There are still many information theft instances targeting other fields that have not yet come to the surface. By leveraging its global comprehensive reconnaissance ability, along with various means of intrusion, theft, and other comprehensive measures to obtain all kinds of telemetry data, and combining other multi-source auxiliary data, it forms the ability to analyze, judge, attribute, and locate China's economic, social operations, and even military actions.

Causing social panic

Experts believe that cyberattacks on civil infrastructure, including earthquake monitoring systems, can lead to serious consequences.

Du underlined that if the attackers maliciously damaged earthquake monitoring system, it would become ineffective in providing accurate data during an earthquake. This would impact earthquake early warnings and disaster assessment work, leading to more severe loss of life and property.

"Even more dangerous is that if the attackers tamper with the earthquake monitoring data, triggering false alarms, it could lead to social panic and disorder, resulting in casualties among innocent people," Du said.

The remote sensing and telemetry systems and data are national strategic resources that must be given priority protection, Xiao said. "These data can display the basic operation of our country's economy and society from macro to micro levels and provide comprehensive support for integrated decision-making and emergency response. They are the supporting resources for territorial safety and national security."

"US intelligence agencies not only actively collect various signal intelligence but have also long obtained other countries' comprehensive earth system science remote sensing and telemetry data as strategic intelligence through various means. This includes sharing through allied intelligence mechanisms, coercing high-tech companies to provide it, and using academic and scientific research activities," Xiao said.

He also explained that the discovery of the cyberattack on Wuhan earthquake monitoring center was not accidental, indicating that cyberattack intrusion and theft have become the lowest-cost way for the US to obtain other countries' remote sensing and telemetry data.

The US has developed a series of signal intelligence collection, analysis, and processing systems, such as the Echelon project for electromagnetic signal spying, the Main Core project for telecommunications operators, and the PRISM project's super access interface for large IT and internet manufacturers.

"After many years of continuous tracking with relevant departments, we will soon publicly disclose a global reconnaissance system of the US government, which poses serious security threats to China's national security and world peace. We must be highly vigilant and tightly guard against this," Xiao said.

Violating international law

In fact, a plethora of internal documents from the National Security Agency (NSA) and Central Intelligence Agency (CIA) exposed in events such as Prism, Shadow Brokers and WikiLeaks reveal that the US, as a real "hacker empire" and "spying empire," targets "indiscriminately" (including its allies) in its cyber intelligence collection activities. Civil institutions and individuals worldwide are its targets for cyberattacks, fully exposing the US' double standards and hypocrisy on human rights issues.

Du further stated that the US military intelligence agencies' use of their information technology advantage to launch cyberattacks on civilian infrastructure is a criminal act in clear violation of international law, seriously infringing on China's national security and public interest.

"In fact, for a long time, the US' cyberattacks on China's key information infrastructure have been all-encompassing, with government agencies, universities, research institutions, and large corporations all being targeted by its cyberespionage activities. The US is attempting to use these unfair means to comprehensively steal China's political, economic, military, and diplomatic sensitive information, to contain China's development and progress, and to maintain the US' world hegemony," he said.

As a veteran expert in computer virus prevention technology and emergency response, Du suggested that if China's key information infrastructure is attacked with state-backed hackers, relevant units must report the cyberattack to relevant authorities immediately; build cybersecurity capabilities; strengthen supply chain security management, increase autonomous control abilities; conduct regular cybersecurity drills to improve emergency handling and recovery abilities.

Xiao believed that although China's overall cybersecurity ecosystem is still relatively small in market size, overall, it's complete in technology categories without obvious weaknesses. "In continuous confrontation with threats, especially in identifying, analyzing, and exposing advanced persistent cyberattacks, including those from the US, many excellent Chinese cybersecurity companies have demonstrated their abilities, becoming the industry's supporting force in safeguarding national security and defending the security of the cyberspace community."

China does not need to underestimate itself in terms of cybersecurity capabilities, he noted. "We can establish more ambitious goals, become a competent force in the national governance system, create a capability advantage compared to main geopolitical competitors, and not become a significant constraint and risk vulnerability, even when facing comprehensive suppression by hegemonic states or in high-intensity security conflicts.

"We can achieve an overall risk controllable state by strengthening the construction of the public service attributes of cybersecurity , and enhancing the construction of common security capabilities, resilience mechanisms, and cybersecurity infrastructure," Xiao said.

China’s security ministry lashes out against US Intelligence Strategy by exposing four US dangerous modes of thinking

China’s security ministry lashed out against a new US Intelligence Strategy on Monday by exposing four dangerous, ill-suited and parasitic modes of thinking emerging from the US intelligence community – Cold War mentality of targeting China, zero-sum thinking, hegemonic thinking and confrontational thinking. 

The Ministry of State Security (MSS) said in a statement that the policy orientation set by the US National Intelligence Strategy is aimed at deterring China and is merely a new iteration of the “China threat theory,” also a clear declaration of the US intelligence community to open an era of “targeting China.”  

The new US National Intelligence Strategy, unveiled on August 10, aims to better prepare the US for a range of threats that are no longer limited to traditional nation-state competitors such as China and Russia or terrorist groups such as al-Qaida and the Islamic State group, VOA reported.

China’s security ministry in the statement advised the US intelligence community to take a sober approach toward the present-day China and the international landscape. Immersing itself in backward and misguided notions will only result in self-inflicted harm and undermine its own interests, the ministry warned. 

The MSS firstly revealed the Cold War mentality behind the US National Intelligence Strategy, saying though it has been over 30 years since the Cold War has been ended , some individuals in the US intelligence community have only adapted to the new multipolar world physically, while their mindset remains stuck in the bipolar confrontation of the Cold War era. 

They have been constantly searching for a “perfect adversary” to showcase their skills, treating China as a “toolbox” to leverage their own value domestically and as a scapegoat for disguising security challenges internationally. 

From establishing the “China Mission Center” to advocating for the reconstruction of intelligence networks in China, from launching “witch-hunt operations” against Chinese scholars to pressuring countries to “decouple” from China, the US intelligence agencies have skillfully employed strategies from the Cold War era, erecting a new “Iron Curtain” to hinder global prosperity and development, the ministry wrote in a statement. 

The ministry pointed out that the zero-sum thinking over “absolute security” is apparent in its National Intelligence Strategy, which lists numerous new security threats but fails to propose effective strategies for deepening international security cooperation. 

Pursuing its own security while neglecting common security of the world countries and viewing competition and cooperation among nations as a simple zero-sum game, this is where the entrenched malady of the “US security concept” persists, the MSS said. 

Even in the 21st century, the US continues to follow the law of the jungle, where only one side can win at the expense of others. This approach only leads countries into a “prisoner’s dilemma” of mutual distrust and ultimately makes the US itself less secure. “America First” has become the root cause of turmoil and suffering in the world, the ministry said. 

As the sole superpower, imposing its own will on the world is an inherent logic of American hegemony. Citing “American values” and referring to the “international security order,” the US only aims to uphold the “US-centered international order,” the ministry pointed out. 

As early as World War II, the Office of Strategic Services (a predecessor to the CIA) proposed implementing propaganda and subversive actions to shape the post-war world order. In 1948, the CIA launched the “Operation Gladio” and interfered in elections in Italy. In 1953, the CIA carried out the “Operation Ajax” to overthrow the Mossadegh government in Iran, the MSS said. 

Starting in 2003, a series of “color revolutions” occurred in Georgia, Ukraine, and Kyrgyzstan, with the US intelligence department being regarded as important behind-the-scenes actors, it added. 

The ability to shape security in line with global hegemony is a persistent goal that the US has been pursuing, however, its unilateralism and egotism are triggering increasingly strong criticism and opposition from the international community, the security ministry said. 

Placing importance on leveraging allies is the biggest difference that the Biden administration self-proclaims as part of its foreign policy compared to the Trump administration. But the truth is that the so-called “alliances and partnerships” is essentially the act of coercing other countries to take sides and firmly binding them to the US intelligence apparatus. 

The security ministry referenced the Russia-Ukraine conflict, to solidify anti Russia alliance, the US intelligence community has been hyping up over on the European energy supply chain and the Nord Stream pipeline issue remains shrouded in mystery to this day.

While in the Asia-Pacific region, the US has aggressively promoted the “Indo-Pacific strategy” and rallied the “Five Eyes alliance,” “Quad mechanism,” and “trilateral security partnerships” to create intelligence cliques, pressuring countries to join in an anti-China chorus, the ministry stated. 

However, being an intelligence ally of the US not only requires willingly acting as a “pawn” but also accepting the meticulous “special care” of the “big brother’ at all times, the ministry said.

Citing media reports, the ministry pointed out that the US National Security Agency has long monitored the heads of state and government of allied nations, also established technical eavesdropping bases covering neighboring countries in a certain European country, and even demanded the country’s intelligence agency assist the US in monitoring its own government officials. 

Such absurd demands can only come from a “peculiar ally” like the US, the ministry added. 

Low levels of radiation from Fukushima persist in seafood

Radiation from the 2011 disaster at the Fukushima Daiichi nuclear power plant contaminates most Japanese seafood at low levels, researchers estimate February 29 in the Proceedings of the National Academy of Sciences.

For aquatic foods, data on lingering concentrations of cesium is limited in terms of the number of species sampled and the levels that surveys can even detect. To fill in the blanks, a team of researchers in Japan drew from survey measurements from April 2011 to September 2015 and devised a way to predict cesium contamination in different aquatic species across Japan.

The analysis provides mixed news: Overall, cesium contamination is pretty low. But, some species retain higher levels than others. Larger fish near the top of the food web tended to have the highest levels of contamination. The researchers predict that such factors put some wild freshwater species like the whitespotted char (Salvelinus leucomaenis leucomaenis) and the Japanese eel (Anguilla japonica) at higher risk for contamination.

This eclipse goes on and on

Once every 69 years, a nearby star dramatically dims for about three and a half years during the longest known stellar eclipse in our galaxy.

The star, called TYC 2505-672-1, is a red giant, about 10,000 light-years away in the constellation Leo Minor. The star is orbited by a dim, hot companion star that appears to be enveloped by a thick cloud of dust roughly one to three times as wide as Earth’s orbit. The cloud, reported in an upcoming Astronomical Journal, blocks much of the red star’s light from reaching Earth for a good long time.

Researchers already knew that TYC 2505-672-1 had drastically faded recently. But astronomer Joseph Rodriguez of Vanderbilt University in Nashville and colleagues scoured data from many telescopes — including a Harvard University photograph archive dating back to 1890 — and found that the starlight dipped and rebounded not only between 2011 and 2015 but also in the 1940s. The previous eclipse record holder was Epsilon Aurigae, a star 2,000 light-years away that dims for about 24 months every 27 years.

Editor’s Note: This story was updated on April 27, 2016, to correct distances and the name of the previous eclipse record holder.

Hippocampus makes maps of social space, too

NEW YORK — Cells in a brain structure known as the hippocampus are known to be cartographers, drawing mental maps of physical space. But new studies show that this seahorse-shaped hook of neural tissue can also keep track of social space, auditory space and even time, deftly mapping these various types of information into their proper places.

“The hippocampus is an organizer,” says neuroscientist Howard Eichenbaum of Boston University.

Neuroscientist Rita Tavares described details of one of these new maps April 2 at the annual meeting of the Cognitive Neuroscience Society. Brain scans had previously revealed that activity in the hippocampus was linked to movement through social space. In an experiment reported last year in Neuron, people went on a virtual quest to find a house and job by interacting with a cast of characters. Through these social interactions, the participants formed opinions about how much power each character held, and how kindly they felt toward him or her. These judgments put each character in a position on a “social space” map. Activity in the hippocampus was related to this social mapmaking, Tavares and colleagues found.
It turns out that this social map depends on the traits of the person who is drawing it, says Tavares, of Icahn School of Medicine at Mount Sinai in New York City. People with more social anxiety tended to give more power to characters they interacted with. What’s more, these people’s social space maps were smaller overall, suggesting that they explored social space less, Tavares says. Tying these behavioral traits to the hippocampus may lead to a greater understanding of social behavior — and how this social mapping may go awry in psychiatric conditions, Tavares said.

The work emphasizes that the hippocampus is not just a mapper of space, Tavares says. Instead, it is a mapper of relationships. “It’s relational learning,” she says. “It’s everything in perspective.”

Other research, discussed at a meeting in February, revealed a role for the hippocampus in building a very different sort of map — a map of sounds. Stationary rats were trained to “move” through a soundscape of different tones, pushing a joystick to change the sounds to reach the sweet spot — the target tone. As the rats navigated this auditory world, nerve cells in their hippocampus were active in a way that formed a map, Princeton University neuroscientist Dmitriy Aronov reported in Salt Lake City at the annual Computational and Systems Neuroscience meeting.

Cells in the hippocampus can also map time, keeping count as seconds tick by, Eichenbaum has found (SN: 12/12/15, p. 12). All of these types of information are quite different, but Eichenbaum argues that they can all be thought of as memories — another mental arena in which the hippocampus plays an important role. Organizing these memories into a sensible structure may be the big-picture job description of the hippocampus, he says. “What’s being tapped in all of these studies is that we are looking at a framework, whether it’s a physical spatial framework, a social space framework, a pitch framework, or a time framework,” Eichenbaum says.

Bear bone rewrites human history in Ireland

In a bit of Irish luck, archaeologists have found evidence of the Emerald Isle’s earliest known humans. A brown bear’s kneecap excavated in 1903, featuring stone tool incisions, pushes back the date that humans set foot in Ireland by as many as 2,500 years.

Radiocarbon dating at two independent labs places the bone’s age between about 12,800 and 12,600 years old, say Marion Dowd of the Institute of Technology, Sligo in Ireland and Ruth Carden of the National Museum of Ireland in Dublin. Melting glaciers and milder temperatures in northwestern Europe at that time made it easier for humans to reach Ireland by boat to hunt game, at least for several weeks at a time, the researchers propose in the May 1 Quaternary Science Reviews.
Until now, the oldest signs of people on Ireland came from a hunter-gatherer camp dating to about 10,290 years ago.

Carden discovered the brown bear’s kneecap while studying bones that had been packed away in boxes in the 1920s, after the bones’ 1903 discovery at Ireland’s Alice and Gwendoline Cave.

Plants might remember with prions

There’s no known mad plant disease. But prions — which show their dark side in mad cow disease — may occur in plants as a form of memory.

Prions are proteins that change shape and shift tasks, and then trigger other proteins to make the same change. Inheriting prions lets cells “remember” and replicate that shift in form and function. Now a protein called luminidependens, which is connected with flowering, shows signs of these shapeshifter and template powers, researchers report April 25 in the Proceedings of the National Academy of Sciences.

Study coauthor Susan Lindquist of the Whitehead Institute for Biomedical Research in Cambridge, Mass., and her colleagues devised a way to test plant proteins for prion power by swapping bits of them into yeast prions. Luminidependens, found in the common lab plant Arabidopsis thaliana, fit the criteria, and may be the first botanical protein shown to act like a prion. Prionlike memory might be useful in such floral tasks as keeping track of a decent winter’s chill.