
Airbus replaces Russian space agency in search for life on Mars
A UK space firm has replaced a Russian corporation in a European project to search for signs of life on Mars.Airbus in Stevenage, Hertfordshire, will work on the ExoMars lander which will place the Rosalind Franklin rover on the surface of the planet.Russian state space agency Roscosmos had worked on a landing platform called Kazachok, but the mission was postponed after the country's full-scale invasion of Ukraine.The landing platform developed by Airbus will land on the Mars surface using a parachute assisted breaking system, before deploying the rover.
The ExoMars programme was expected to launch in 2020 as a joint endeavour between The European Space Agency (ESA) and Roscosmo.The Russians had replaced American space agency Nasa who quit the project in 2012 due to changing priorities.In addition to the landing platform, ESA planned to use a Russian rocket to get into space but sanctions made the joint project impossible and it was delayed.Now Nasa will launch the rover in 2028 and it expected to land in 2030.Rosalind Franklin will be the first Martian rover to analyse samples from two metres below the surface in its search for past or present life.
Thales Alenia Space, a joint venture between French aerospace company Thales and Italian firm Leonardo, have worked with ESA on the project.Airbus teams will design the landers mechanical, thermal and propulsion systems.This includes two ramps on opposite sides for the rover to be driven onto the surface with minimum risk.The UK firm was previously involved with the project when Rosalind Franklin was designed and built in a bio-burden clean-room in Stevenage. The rover is named after a British DNA pioneer.
Kata Escott, managing director for Airbus Defence and Space UK said: "Getting the Rosalind Franklin rover onto the surface of Mars is a huge international challenge and the culmination of more than 20 years' work. "The mission will supercharge our space know-how in the UK, and will advance our collective understanding of our solar system."Peter Kyle, the Secretary of State for Science, Innovation and Technology, said: "Airbus will not only help Britain make history and lead the European space race but also bring hundreds of highly skilled jobs and investment as we secure Britain's future through our Plan for Change."
Follow Beds, Herts and Bucks news on BBC Sounds, Facebook, Instagram and X.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Herald Scotland
4 hours ago
- The Herald Scotland
Private Japanese lunar lander heads towards touchdown in the Moon's far north
The encore comes two years after the company's first moonshot ended in a crash landing, giving rise to the name Resilience for its successor lander. Resilience holds a rover with a shovel to gather lunar dirt as well as a Swedish artist's toy-size red house that will be lowered onto the Moon's dusty surface. Long the province of governments, the Moon became a target of private outfits in 2019, with more flops than wins along the way. Launched in January from Florida on a long, roundabout journey, Resilience entered lunar orbit last month. Deployment of @Firefly_Space's Blue Ghost lunar lander confirmed — SpaceX (@SpaceX) January 15, 2025 It shared a SpaceX ride with Firefly Aerospace's Blue Ghost, which reached the Moon faster and became the first private entity to successfully land there in March. Another US company, Intuitive Machines, arrived at the Moon a few days after Firefly. But the tall, spindly lander face-planted in a crater near the Moon's south pole and was declared dead within hours. Resilience is targeting the top of the Moon, a less forbidding place than the shadowy bottom. The ispace team chose a flat area with few boulders in Mare Frigoris or Sea of Cold, a long and narrow region full of craters and ancient lava flows that stretches across the near side's northern tier. Once settled with power and communication flowing, the 7.5-foot Resilience will beam back pictures, expected several hours or more after touchdown. It will be at least the weekend, according to ispace, before the lander lowers the piggybacking rover onto the lunar surface. Made of carbon fibre-reinforced plastic with four wheels, ispace's European-built rover — named Tenacious — sports a high-definition camera to scout out the area and a shovel to scoop up some lunar dirt for Nasa. The rover, weighing just five kilograms, will stick close to the lander, going in circles at a speed of less than one inch per second. It is capable of venturing up to two-thirds of a mile from the lander and should be operational throughout the two-week mission, the period of daylight. Besides science and tech experiments, there is an artistic touch. The rover holds a tiny, Swedish-style red cottage with white trim and a green door, dubbed the Moonhouse by creator Mikael Genberg, for placement on the lunar surface. Takeshi Hakamada, CEO and founder of ispace, considers the latest moonshot 'merely a stepping stone', with its next, much bigger lander launching by 2027 with Nasa involvement, and even more to follow. 'We're not trying to corner the market. We're trying to build the market,' Jeremy Fix, chief engineer for ispace's US subsidiary, said at a conference last month. 'It's a huge market, a huge potential.' Mr Fix noted that ispace, like other businesses, does not have 'infinite funds' and cannot afford repeated failures. While not divulging the cost of the current mission, company officials said it is less than the first one which exceeded 100 million dollars.

Western Telegraph
4 hours ago
- Western Telegraph
Private Japanese lunar lander heads towards touchdown in the Moon's far north
The Moon landing attempt by Tokyo-based company ispace on Friday Japan time is the latest entry in the rapidly expanding commercial lunar rush. The encore comes two years after the company's first moonshot ended in a crash landing, giving rise to the name Resilience for its successor lander. Resilience holds a rover with a shovel to gather lunar dirt as well as a Swedish artist's toy-size red house that will be lowered onto the Moon's dusty surface. Long the province of governments, the Moon became a target of private outfits in 2019, with more flops than wins along the way. Launched in January from Florida on a long, roundabout journey, Resilience entered lunar orbit last month. Deployment of @Firefly_Space's Blue Ghost lunar lander confirmed — SpaceX (@SpaceX) January 15, 2025 It shared a SpaceX ride with Firefly Aerospace's Blue Ghost, which reached the Moon faster and became the first private entity to successfully land there in March. Another US company, Intuitive Machines, arrived at the Moon a few days after Firefly. But the tall, spindly lander face-planted in a crater near the Moon's south pole and was declared dead within hours. Resilience is targeting the top of the Moon, a less forbidding place than the shadowy bottom. The ispace team chose a flat area with few boulders in Mare Frigoris or Sea of Cold, a long and narrow region full of craters and ancient lava flows that stretches across the near side's northern tier. Once settled with power and communication flowing, the 7.5-foot Resilience will beam back pictures, expected several hours or more after touchdown. It will be at least the weekend, according to ispace, before the lander lowers the piggybacking rover onto the lunar surface. Made of carbon fibre-reinforced plastic with four wheels, ispace's European-built rover — named Tenacious — sports a high-definition camera to scout out the area and a shovel to scoop up some lunar dirt for Nasa. The rover, weighing just five kilograms, will stick close to the lander, going in circles at a speed of less than one inch per second. It is capable of venturing up to two-thirds of a mile from the lander and should be operational throughout the two-week mission, the period of daylight. Besides science and tech experiments, there is an artistic touch. The rover holds a tiny, Swedish-style red cottage with white trim and a green door, dubbed the Moonhouse by creator Mikael Genberg, for placement on the lunar surface. Takeshi Hakamada, CEO and founder of ispace, considers the latest moonshot 'merely a stepping stone', with its next, much bigger lander launching by 2027 with Nasa involvement, and even more to follow. 'We're not trying to corner the market. We're trying to build the market,' Jeremy Fix, chief engineer for ispace's US subsidiary, said at a conference last month. 'It's a huge market, a huge potential.' Mr Fix noted that ispace, like other businesses, does not have 'infinite funds' and cannot afford repeated failures. While not divulging the cost of the current mission, company officials said it is less than the first one which exceeded 100 million dollars.


NBC News
4 hours ago
- NBC News
High-profile Americans' iPhones may have been targeted in hacking campaign, says cybersecurity firm for Harris-Walz
One of the few companies to specialize in iPhone cybersecurity said in a report Thursday that it has uncovered evidence in a handful of mobile phones of a potentially groundbreaking hacking campaign targeting five high-profile Americans in media, artificial intelligence and politics, including former members of Kamala Harris' presidential campaign. The preliminary research, conducted by the cybersecurity firm iVerify, includes a significant amount of circumstantial evidence,' iVerify CEO Rocky Cole said. Apple, the maker of the iPhone, refuted the findings. But Cole stood by the report's significance for research purposes. Apple's reputation is sterling among security professionals, and if a hack occurred, it would be a significant development in the cybersecurity industry. IVerify has not identified who may be behind the potential hacking operation, but believes the targets and technical sophistication suggest a capable spy agency may have been involved. Two people familiar with the investigation told NBC News that former members of the Harris-Walz campaign were some of the people iVerify believes were targeted. It's not clear what initially set off the investigation. IVerify said that in addition to the Americans who were targeted, a European government official's iPhone had indications of remote tampering. It appears that last year, a hacker remotely and secretly installed a type of invasive, malicious program known as spyware to snoop on those users without their knowledge, iVerify said. Out of nearly 50,000 phones that iVerify analyzed, it found only six — all belonging to high-profile people who would be potential targets for an espionage campaign — that showed evidence of exploitation. Apple disputed iVerify's conclusion that its evidence is a strong indication that iPhones were hacked. 'We've thoroughly analyzed the information provided by iVerify, and strongly disagree with the claims of a targeted attack against our users. Based on field data from our devices, this report points to a conventional software bug that we identified and fixed in iOS 18.3,' Ivan Krstić, the head of Apple Security Engineering and Architecture, said in an emailed statement. Apple is 'not currently aware of any credible indication that the bug points to an exploitation attempt or active attack,' Krstić said. IVerify CEO Rocky Cole responded in a statement: 'In light of the recent public conversation around mobile security, there is ample evidence in the report worth sharing with the research community. We've never claimed there is a smoking gun here, only a significant amount of circumstantial evidence.' iVerify's report makes it clear it did not directly catch malicious software that took over phones. Instead, its researchers found evidence that it had been installed, then deleted. The phones suspected of being hacked displayed suspicious activity in crash logs, the records a computer or a smartphone automatically writes when the operating system encounters an error or a program fails. That indicates tampering, the company said. 'We identified exceedingly rare crash logs that appeared exclusively on devices belonging to high-risk individuals including government officials, political campaign staff, journalists, and tech executives,' the report says. 'At least one affected European Union government official received an Apple Threat Notification approximately thirty days after we observed this crash on their device, and forensic examination of another device revealed signs of successful exploitation.' Andrew Hoog, a co-founder of the mobile phone security company NowSecure, told NBC News that he found iVerify's 'analysis and conclusions credible and consistent with what we've observed over nearly a decade of mobile zero-click attacks.' If a spyware campaign has been taking over high-profile Americans' phones, it would be a major escalation in the back-and-forth between cyberspies and the security engineers who try to stop them. The iPhone's cybersecurity is widely revered, and cybersecurity experts largely view iPhones as some of the most secure devices that are commercially available. Apple routinely updates its operating system to fix flaws that hackers use to break in. But it has also designed the iPhone operating system to share very little information with cybersecurity researchers, far less than most other operating systems. iVerify's claim comes in the context of other allegations that cyberspies snooped on the 2024 presidential campaigns, including the United States' accusing China of listening to both parties' presidential campaigns' phone calls and Iran of hacking Trump campaign emails and sending stolen information to Biden campaign officials. The Biden administration's Justice Department charged three Iranians in connection with the operation in September. Researchers have for years tracked governments' use of spyware to spy on journalists and activists in other countries. Politicians in France and Spain have been targeted by spyware, prompting national scandals. IVerify's report is the first major public claim of spyware's successfully breaking into iPhones tied to American phone numbers and high-profile Americans. There is precedent for cyberspies' targeting major political campaigns. Last year, Microsoft, Google and several federal agencies said Chinese intelligence had hacked several major telecommunications companies, including AT&T and Verizon, and used that access to specifically spy on both the Trump and Harris campaigns ' conversations. The White House did not respond to a request for comment. The Trump campaign did not hire iVerify, so it does not have data from it to analyze. Sources who confirmed that members of the Harris-Waltz campaign were among those whom iVerify has investigated as targets of the campaign did not identify those people. iVerify also discovered a potential way hackers could have gotten in: a vulnerability in iMessage, the chat app that comes preloaded in Apple phones, that appears to be a zero-click vulnerability, meaning a hacker could exploit it without the user's even knowing. Apple has since patched the vulnerability. Spyware can give remote hackers remarkable insight into their victims' personal messages and accounts. While confirmed instances are rare, it is the only proven tactic for hackers to reliably bypass the major privacy protections available for commercial phones, like the encrypted messaging app Signal. A hacker who successfully deploys spyware on politicians' phones, for instance, could read all their Signal chats, track their browsing histories, listen to their phone calls and even turn the phones into covert listening devices to spy on conversations while they are in the targets' pockets. By giving a hacker remote access to a phone, spyware goes beyond even the Salt Typhoon espionage campaign, in which the United States accused China last year of hacking AT&T and Verizon to intercept phone calls and text messages as they traveled from one person to another — including targeting the messages of both the Trump-Vance and Harris-Walz campaigns. The most commonly identified spyware in such cases is designed by the Israeli company NSO Group, which is sanctioned by the United States and has long claimed its products cannot be used to hack phones with American numbers. An NSO Group spokesperson told NBC News it was not involved in the incidents iVerify's research identified. American diplomats and embassy workers abroad have also been infected with NSO spyware, according to the Biden White House, but evidence that such technology had targeted a U.S. presidential campaign or other high-profile Americans in the United States has never been previously reported. 'I think it illustrates that mobile compromise is real, not academic or hypothetical, and it's happening here in the United States in a systematic way,' said Cole, iVerify's CEO. He declined to specify the identities of the five people whose phones exhibited signs of having been targeted with spyware, except to say that they are all Americans who work in politics, media and artificial intelligence and that all would be of interest to a foreign intelligence service. The fact that sophisticated phone spyware is becoming the most reliable way to read a person's otherwise secure messages makes it an obvious tactic for spy agencies, despite its technical difficulty, said Patrick Arvidson, a National Security Agency veteran who worked on mobile phone security at the agency, who viewed iVerify's report before it was published. 'I think that you're going to see in the coming year, two years, three years, more and more of these kinds of mass-scale incidents,' he said.