Search This Blog

Friday, August 4, 2023

Exploration of Mars

From Wikipedia, the free encyclopedia
Self-portrait of Perseverance rover and Ingenuity helicopter (to the left) located at Wright Brothers Field, the Ingenuity helicopter drop site (7 April 2021)
Active Mars missions, 1997 to presentα
Year Number of missions
1997
2
1998
1
1999
1
2000
1
2001
2
2002
2
2003
3
2004
5
2005
5
2006
6
2007
5
2008
6
2009
5
2010
5
2011
4
2012
5
2013
5
2014
7
2015
7
2016
8
2017
8
2018
9
2019
8
2020
8
2021
11

The planet Mars has been explored remotely by spacecraft. Probes sent from Earth, beginning in the late 20th century, have yielded a large increase in knowledge about the Martian system, focused primarily on understanding its geology and habitability potential. Engineering interplanetary journeys is complicated and the exploration of Mars has experienced a high failure rate, especially the early attempts. Roughly sixty percent of all spacecraft destined for Mars failed before completing their missions and some failed before their observations could begin. Some missions have been met with unexpected success, such as the twin Mars Exploration Rovers, Spirit and Opportunity, which operated for years beyond their specification.

Current status

A 19th-century hand-drawn map by Giovanni Schiaparelli, and a more modern photographic image, with a blended one in the middle

As of December 2022, there are three operational rovers on the surface of Mars, the Curiosity and Perseverance rovers, both operated by the American space agency NASA, as well as the Zhurong rover, part of the Tianwen-1 mission by the China National Space Administration (CNSA). There are seven orbiters surveying the planet: Mars Odyssey, Mars Express, Mars Reconnaissance Orbiter, MAVEN, the Trace Gas Orbiter, the Hope Mars Mission, and the Tianwen-1 orbiter, which have contributed massive amounts of information about Mars. Various Mars sample return missions are being planned like NASA-ESA Mars Sample Return that will pick up the samples currently being collected by the Perseverance rover. In all, there are 11 probes currently surveying Mars including the Ingenuity helicopter, which is scouting sites for Perseverance to study.

The next missions expected to arrive at Mars are:

Martian system

Mars has long been the subject of human interest. Early telescopic observations revealed color changes on the surface that were attributed to seasonal vegetation and apparent linear features were ascribed to intelligent design. Further telescopic observations found two moons, Phobos and Deimos, polar ice caps and the feature now known as Olympus Mons, the Solar System's tallest mountain. The discoveries piqued further interest in the study and exploration of the red planet. Mars is a rocky planet, like Earth, that formed around the same time, yet with only half the diameter of Earth, and a far thinner atmosphere; it has a cold and desert-like surface.

One way the surface of Mars has been categorized, is by thirty "quadrangles", with each quadrangle named for a prominent physiographic feature within that quadrangle.

The image above contains clickable linksClickable image of the 30 cartographic quadrangles of Mars, defined by the USGS. Quadrangle numbers (beginning with MC for "Mars Chart") and names link to the corresponding articles. North is at the top; 0°N 180°W is at the far left on the equator. The map images were taken by the Mars Global Surveyor.

Launch windows

Spacecraft launches and Mars distance from Earth in millions of kilometers

The minimum-energy launch windows for a Martian expedition occur at intervals of approximately two years and two months (specifically 780 days, the planet's synodic period with respect to Earth). In addition, the lowest available transfer energy varies on a roughly 16-year cycle. For example, a minimum occurred in the 1969 and 1971 launch windows, rising to a peak in the late 1970s, and hitting another low in 1986 and 1988.

Launch opportunities
Year Window Spacecraft (launched or planned)
2013 Nov MAVEN, Mars Orbiter Mission
2016 Mar ExoMars TGO
2018 May InSight
2020 Jul–Sep (1) Mars Hope orbiter,
(2) Tianwen-1 orbiter, deployable and remote camera, lander and Zhurong rover
(3) Mars 2020 Perseverance rover and Ingenuity helicopter
2022 Aug–Nov none
2024–25
(1) Mars Orbiter Mission 2 (MOM-2)
(2) Escape and Plasma Acceleration and Dynamics Explorer mission (EscaPADE)

Past and current missions

Launches to Mars
Decade
1960s
13
1970s
11
1980s
2
1990s
8
2000s
8
2010s
6
2020s
3

Starting in 1960, the Soviets launched a series of probes to Mars including the first intended flybys and hard (impact) landing (Mars 1962B). The first successful flyby of Mars was on 14–15 July 1965, by NASA's Mariner 4. On November 14, 1971, Mariner 9 became the first space probe to orbit another planet when it entered into orbit around Mars. The amount of data returned by probes increased dramatically as technology improved.

The first to contact the surface were two Soviet probes: Mars 2 lander on November 27 and Mars 3 lander on December 2, 1971—Mars 2 failed during descent and Mars 3 about twenty seconds after the first Martian soft landing. Mars 6 failed during descent but did return some corrupted atmospheric data in 1974. The 1975 NASA launches of the Viking program consisted of two orbiters, each with a lander that successfully soft landed in 1976. Viking 1 remained operational for six years, Viking 2 for three. The Viking landers relayed the first color panoramas of Mars.

The Soviet probes Phobos 1 and 2 were sent to Mars in 1988 to study Mars and its two moons, with a focus on Phobos. Phobos 1 lost contact on the way to Mars. Phobos 2, while successfully photographing Mars and Phobos, failed before it was set to release two landers to the surface of Phobos.

Mars has a reputation as a difficult space exploration target; just 25 of 55 missions through 2019, or 45.5%, have been fully successful, with a further three partially successful and partially failures. However, of the sixteen missions since 2001, twelve have been successful and eight of these are still operational.

Missions that ended prematurely after Phobos 1 and 2 (1988) include (see Probing difficulties section for more details):

Following the 1993 failure of the Mars Observer orbiter, the NASA Mars Global Surveyor achieved Mars orbit in 1997. This mission was a complete success, having finished its primary mapping mission in early 2001. Contact was lost with the probe in November 2006 during its third extended program, spending exactly 10 operational years in space. The NASA Mars Pathfinder, carrying a robotic exploration vehicle Sojourner, landed in the Ares Vallis on Mars in the summer of 1997, returning many images.

Map of Mars
Interactive image map of the global topography of Mars, overlaid with the position of Martian rovers and landers. Coloring of the base map indicates relative elevations of Martian surface.
Clickable image: Clicking on the labels will open a new article.
Legend:   Active (white lined, ※)  Inactive  Planned (dash lined, ⁂)

Bradbury Landing
Deep Space 2
Mars Polar Lander
Perseverance
Schiaparelli EDM
Spirit
Viking 1
Mars landing sites (16 December 2020)

NASA's Mars Odyssey orbiter entered Mars orbit in 2001. Odyssey's Gamma Ray Spectrometer detected significant amounts of hydrogen in the upper metre or so of regolith on Mars. This hydrogen is thought to be contained in large deposits of water ice.

The Mars Express mission of the European Space Agency (ESA) reached Mars in 2003. It carried the Beagle 2 lander, which was not heard from after being released and was declared lost in February 2004. Beagle 2 was located in January 2015 by HiRise camera on NASA's Mars Reconnaissance Orbiter (MRO) having landed safely but failed to fully deploy its solar panels and antenna. In early 2004, the Mars Express Planetary Fourier Spectrometer team announced the orbiter had detected methane in the Martian atmosphere, a potential biosignature. ESA announced in June 2006 the discovery of aurorae on Mars by the Mars Express.

Martian sunset, Spirit rover, 2005
 
North polar view, Phoenix lander, 2008

In January 2004, the NASA twin Mars Exploration Rovers named Spirit (MER-A) and Opportunity (MER-B) landed on the surface of Mars. Both have met and exceeded all their science objectives. Among the most significant scientific returns has been conclusive evidence that liquid water existed at some time in the past at both landing sites. Martian dust devils and windstorms have occasionally cleaned both rovers' solar panels, and thus increased their lifespan. Spirit rover (MER-A) was active until 2010, when it stopped sending data because it got stuck in a sand dune and was unable to reorient itself to recharge its batteries.

On 10 March 2006, NASA's Mars Reconnaissance Orbiter (MRO) probe arrived in orbit to conduct a two-year science survey. The orbiter began mapping the Martian terrain and weather to find suitable landing sites for upcoming lander missions. The MRO captured the first image of a series of active avalanches near the planet's north pole in 2008.

Rosetta came within 250 km of Mars during its 2007 flyby. Dawn flew by Mars in February 2009 for a gravity assist on its way to investigate Vesta and Ceres.

Phoenix landed on the north polar region of Mars on May 25, 2008. Its robotic arm dug into the Martian soil and the presence of water ice was confirmed on June 20, 2008. The mission concluded on November 10, 2008, after contact was lost. In 2008, the price of transporting material from the surface of Earth to the surface of Mars was approximately US$309,000 per kilogram.

The Mars Science Laboratory mission was launched on November 26, 2011, and it delivered the Curiosity rover on the surface of Mars on August 6, 2012 UTC. It is larger and more advanced than the Mars Exploration Rovers, with a velocity of up to 90 meters per hour (295 feet per hour).[38] Experiments include a laser chemical sampler that can deduce the composition of rocks at a distance of 7 meters.

A diagram of the Curiosity rover, which landed on Mars in 2012

MAVEN orbiter was launched on 18 November 2013, and on 22 September 2014, it was injected into an areocentric elliptic orbit 6,200 km (3,900 mi) by 150 km (93 mi) above the planet's surface to study its atmosphere. Mission goals include determining how the planet's atmosphere and water, presumed to have once been substantial, were lost over time.

The Indian Space Research Organisation (ISRO) launched their Mars Orbiter Mission (MOM) on November 5, 2013, and it was inserted into Mars orbit on September 24, 2014. India's ISRO is the fourth space agency to reach Mars, after the Soviet space program, NASA and ESA. India successfully placed a spacecraft into Mars orbit, and became the first country to do so in its maiden attempt.

The ExoMars Trace Gas Orbiter arrived at Mars in 2016 and deployed the Schiaparelli EDM lander, a test lander. Schiaparelli crashed on surface, but it transmitted key data during its parachute descent, so the test was declared a partial success.

Overview of missions

The following entails a brief overview of Mars exploration, oriented towards orbiters and flybys; see also Mars landing and Mars rover.

Early Soviet missions

1960s
Mars 1M spacecraft

Between 1960 and 1969, the Soviet Union launched nine probes intended to reach Mars. They all failed: three at launch; three failed to reach near-Earth orbit; one during the burn to put the spacecraft into trans-Mars trajectory; and two during the interplanetary orbit.

The Mars 1M programs (sometimes dubbed Marsnik in Western media) was the first Soviet uncrewed spacecraft interplanetary exploration program, which consisted of two flyby probes launched towards Mars in October 1960, Mars 1960A and Mars 1960B (also known as Korabl 4 and Korabl 5 respectively). After launch, the third stage pumps on both launchers were unable to develop enough pressure to commence ignition, so Earth parking orbit was not achieved. The spacecraft reached an altitude of 120 km before reentry.

Mars 1962A was a Mars flyby mission, launched on October 24, 1962, and Mars 1962B an intended first Mars lander mission, launched in late December of the same year (1962). Both failed from either breaking up as they were going into Earth orbit or having the upper stage explode in orbit during the burn to put the spacecraft into trans-Mars trajectory.

The first success
Selected Soviet Mars probes
Spacecraft Orbiter or flyby outcome Lander outcome
Mars 1 Failure Failure
Mars 2 Success Failure
Mars 3 Partial success Partial success
Mars 4 Failure
Mars 5 Partial success
Mars 6 Success Failure
Mars 7 Success Failure
Phobos 1 Failure Not deployed
Phobos 2 Partial success Not deployed

Mars 1 (1962 Beta Nu 1), an automatic interplanetary spacecraft launched to Mars on November 1, 1962, was the first probe of the Soviet Mars probe program to achieve interplanetary orbit. Mars 1 was intended to fly by the planet at a distance of about 11,000 km and take images of the surface as well as send back data on cosmic radiation, micrometeoroid impacts and Mars' magnetic field, radiation environment, atmospheric structure, and possible organic compounds. Sixty-one radio transmissions were held, initially at 2-day intervals and later at 5-day intervals, from which a large amount of interplanetary data was collected. On 21 March 1963, when the spacecraft was at a distance of 106,760,000 km from Earth, on its way to Mars, communications ceased due to failure of its antenna orientation system.

In 1964, both Soviet probe launches, of Zond 1964A on June 4, and Zond 2 on November 30, (part of the Zond program), resulted in failures. Zond 1964A had a failure at launch, while communication was lost with Zond 2 en route to Mars after a mid-course maneuver, in early May 1965.

In 1969, and as part of the Mars probe program, the Soviet Union prepared two identical 5-ton orbiters called M-69, dubbed by NASA as Mars 1969A and Mars 1969B. Both probes were lost in launch-related complications with the newly developed Proton rocket.

1970s

The USSR intended to have the first artificial satellite of Mars beating the planned American Mariner 8 and Mariner 9 Mars orbiters. In May 1971, one day after Mariner 8 malfunctioned at launch and failed to reach orbit, Cosmos 419 (Mars 1971C), a heavy probe of the Soviet Mars program M-71, also failed to launch. This spacecraft was designed as an orbiter only, while the next two probes of project M-71, Mars 2 and Mars 3, were multipurpose combinations of an orbiter and a lander with small skis-walking rovers that would be the first planet rovers outside the Moon. They were successfully launched in mid-May 1971 and reached Mars about seven months later. On November 27, 1971, the lander of Mars 2 crash-landed due to an on-board computer malfunction and became the first man-made object to reach the surface of Mars. On 2 December 1971, the Mars 3 lander became the first spacecraft to achieve a soft landing, but its transmission was interrupted after 14.5 seconds.

The Mars 2 and 3 orbiters sent back a relatively large volume of data covering the period from December 1971 to March 1972, although transmissions continued through to August. By 22 August 1972, after sending back data and a total of 60 pictures, Mars 2 and 3 concluded their missions. The images and data enabled creation of surface relief maps, and gave information on the Martian gravity and magnetic fields.

In 1973, the Soviet Union sent four more probes to Mars: the Mars 4 and Mars 5 orbiters and the Mars 6 and Mars 7 flyby/lander combinations. All missions except Mars 7 sent back data, with Mars 5 being most successful. Mars 5 transmitted just 60 images before a loss of pressurization in the transmitter housing ended the mission. Mars 6 lander transmitted data during descent, but failed upon impact. Mars 4 flew by the planet at a range of 2200 km returning one swath of pictures and radio occultation data, which constituted the first detection of the nightside ionosphere on Mars. Mars 7 probe separated prematurely from the carrying vehicle due to a problem in the operation of one of the onboard systems (attitude control or retro-rockets) and missed the planet by 1,300 kilometres (8.7×10−6 au).

Mariner program

The first close-up images taken of Mars in 1965 from Mariner 4 show an area about 330 km across by 1200 km from limb to bottom of frame.

In 1964, NASA's Jet Propulsion Laboratory made two attempts at reaching Mars. Mariner 3 and Mariner 4 were identical spacecraft designed to carry out the first flybys of Mars. Mariner 3 was launched on November 5, 1964, but the shroud encasing the spacecraft atop its rocket failed to open properly, dooming the mission. Three weeks later, on November 28, 1964, Mariner 4 was launched successfully on a 712-month voyage to Mars.

Mariner 4 flew past Mars on July 14, 1965, providing the first close-up photographs of another planet. The pictures, gradually played back to Earth from a small tape recorder on the probe, showed impact craters. It provided radically more accurate data about the planet; a surface atmospheric pressure of about 1% of Earth's and daytime temperatures of −100 °C (−148 °F) were estimated. No magnetic field or Martian radiation belts were detected. The new data meant redesigns for then planned Martian landers, and showed life would have a more difficult time surviving there than previously anticipated.

Mariner Crater, as seen by Mariner 4. The location is Phaethontis quadrangle.

NASA continued the Mariner program with another pair of Mars flyby probes, Mariner 6 and 7. They were sent at the next launch window, and reached the planet in 1969. During the following launch window the Mariner program again suffered the loss of one of a pair of probes. Mariner 9 successfully entered orbit about Mars, the first spacecraft ever to do so, after the launch time failure of its sister ship, Mariner 8. When Mariner 9 reached Mars in 1971, it and two Soviet orbiters (Mars 2 and Mars 3) found that a planet-wide dust storm was in progress. The mission controllers used the time spent waiting for the storm to clear to have the probe rendezvous with, and photograph, Phobos. When the storm cleared sufficiently for Mars' surface to be photographed by Mariner 9, the pictures returned represented a substantial advance over previous missions. These pictures were the first to offer more detailed evidence that liquid water might at one time have flowed on the planetary surface. They also finally discerned the true nature of many Martian albedo features. For example, Nix Olympica was one of only a few features that could be seen during the planetary duststorm, revealing it to be the highest mountain (volcano, to be exact) on any planet in the entire Solar System, and leading to its reclassification as Olympus Mons.

Viking program

The Viking program launched Viking 1 and Viking 2 spacecraft to Mars in 1975; The program consisted of two orbiters and two landers – these were the second and third spacecraft to successfully land on Mars.

Viking 1 lander site (1st color, July 21, 1976)
 
Viking 2 lander site (1st color, September 5, 1976)
 
Viking 2 lander site (September 25, 1977)
 
(False color image) Frost at Viking 2 site (May 18, 1979)
 
Martian sunset over Chryse Planitia at Viking 1 site (August 20, 1976)

The primary scientific objectives of the lander mission were to search for biosignatures and observe meteorologic, seismic and magnetic properties of Mars. The results of the biological experiments on board the Viking landers remain inconclusive, with a reanalysis of the Viking data published in 2012 suggesting signs of microbial life on Mars.

Flood erosion at Dromore crater
 
Tear-drop shaped islands at Oxia Palus
 
Streamlined islands in Lunae Palus
 
Scour patterns located in Lunae Palus

The Viking orbiters revealed that large floods of water carved deep valleys, eroded grooves into bedrock, and traveled thousands of kilometers. Areas of branched streams, in the southern hemisphere, suggest that rain once fell.

Mars Pathfinder, Sojourner rover

Sojourner takes Alpha Proton X-ray Spectrometer measurements of the Yogi Rock.

Mars Pathfinder was a U.S. spacecraft that landed a base station with a roving probe on Mars on July 4, 1997. It consisted of a lander and a small 10.6-kilogram (23 lb) wheeled robotic rover named Sojourner, which was the first rover to operate on the surface of Mars. In addition to scientific objectives, the Mars Pathfinder mission was also a "proof-of-concept" for various technologies, such as an airbag landing system and automated obstacle avoidance, both later exploited by the Mars Exploration Rovers.

Mars Global Surveyor

This image from Mars Global Surveyor spans a region about 1500 meters across. Gullies, similar to those formed on Earth, are visible from Newton Basin in Sirenum Terra.
Gullies, similar to those formed on Earth, are visible on this image from Mars Global Surveyor.

After the 1992 failure of NASA's Mars Observer orbiter, NASA retooled and launched Mars Global Surveyor (MGS). Mars Global Surveyor launched on November 7, 1996, and entered orbit on September 12, 1997. After a year and a half trimming its orbit from a looping ellipse to a circular track around the planet, the spacecraft began its primary mapping mission in March 1999. It observed the planet from a low-altitude, nearly polar orbit over the course of one complete Martian year, the equivalent of nearly two Earth years. Mars Global Surveyor completed its primary mission on January 31, 2001, and completed several extended mission phases until communication was lost in 2007.

The mission studied the entire Martian surface, atmosphere, and interior, and returned more data about the red planet than all previous Mars missions combined. The data has been archived and remains available publicly.

This color-coded elevation map was produced from data collected by Mars Global Surveyor. It shows an area around Northern Kasei Valles, showing relationships among Kasei Valles, Bahram Vallis, Vedra Vallis, Maumee Vallis, and Maja Valles. Map location is in Lunae Palus quadrangle and includes parts of Lunae Planum and Chryse Planitia.
A color-coded elevation map produced from data collected by Mars Global Surveyor indicating the result of floods on Mars

Among key scientific findings, Global Surveyor took pictures of gullies and debris flow features that suggest there may be current sources of liquid water, similar to an aquifer, at or near the surface of the planet. Similar channels on Earth are formed by flowing water, but on Mars the temperature is normally too cold and the atmosphere too thin to sustain liquid water. Nevertheless, many scientists hypothesize that liquid groundwater can sometimes surface on Mars, erode gullies and channels, and pool at the bottom before freezing and evaporating.

Magnetometer readings showed that the planet's magnetic field is not globally generated in the planet's core, but is localized in particular areas of the crust. New temperature data and closeup images of the Martian moon Phobos showed that its surface is composed of powdery material at least 1 metre (3 feet) thick, caused by millions of years of meteoroid impacts. Data from the spacecraft's laser altimeter gave scientists their first 3-D views of Mars' north polar ice cap in January 1999.

Faulty software uploaded to the vehicle in June 2006 caused the spacecraft to orient its solar panels incorrectly several months later, resulting in battery overheating and subsequent failure. On November 5, 2006, MGS lost contact with Earth. NASA ended efforts to restore communication on January 28, 2007.

Mars Odyssey and Mars Express

Animation of 2001 Mars Odyssey's trajectory around Mars from 24 October 2001 to 24 October 2002
   2001 Mars Odyssey ·   Mars
Animation of Mars Express's trajectory around Mars from 25 December 2003 to 1 January 2010
   Mars Express ·   Mars

In 2001, NASA's Mars Odyssey orbiter arrived at Mars. Its mission is to use spectrometers and imagers to hunt for evidence of past or present water and volcanic activity on Mars. In 2002, it was announced that the probe's gamma-ray spectrometer and neutron spectrometer had detected large amounts of hydrogen, indicating that there are vast deposits of water ice in the upper three meters of Mars' soil within 60° latitude of the south pole.

On June 2, 2003, the European Space Agency's Mars Express set off from Baikonur Cosmodrome to Mars. The Mars Express craft consists of the Mars Express Orbiter and the stationary lander Beagle 2. The lander carried a digging device and the smallest mass spectrometer created to date, as well as a range of other devices, on a robotic arm in order to accurately analyze soil beneath the dusty surface to look for biosignatures and biomolecules.

The orbiter entered Mars orbit on December 25, 2003, and Beagle 2 entered Mars' atmosphere the same day. However, attempts to contact the lander failed. Communications attempts continued throughout January, but Beagle 2 was declared lost in mid-February, and a joint inquiry was launched by the UK and ESA. The Mars Express Orbiter confirmed the presence of water ice and carbon dioxide ice at the planet's south pole, while NASA had previously confirmed their presence at the north pole of Mars.

The lander's fate remained a mystery until it was located intact on the surface of Mars in a series of images from the Mars Reconnaissance Orbiter. The images suggest that two of the spacecraft's four solar panels failed to deploy, blocking the spacecraft's communications antenna. Beagle 2 is the first British and first European probe to achieve a soft landing on Mars.

MER, Opportunity rover, Spirit rover, Phoenix lander

Polar surface as seen by the Phoenix lander

NASA's Mars Exploration Rover Mission (MER), started in 2003, was a robotic space mission involving two rovers, Spirit (MER-A) and Opportunity, (MER-B) that explored the Martian surface geology. The mission's scientific objective was to search for and characterize a wide range of rocks and soils that hold clues to past water activity on Mars. The mission was part of NASA's Mars Exploration Program, which includes three previous successful landers: the two Viking program landers in 1976; and Mars Pathfinder probe in 1997.

Mars Reconnaissance Orbiter

Slope streaks as seen by HiRISE

The Mars Reconnaissance Orbiter (MRO) is a multipurpose spacecraft designed to conduct reconnaissance and exploration of Mars from orbit. The US$720 million spacecraft was built by Lockheed Martin under the supervision of the Jet Propulsion Laboratory, launched August 12, 2005, and entered Mars orbit on March 10, 2006.

The MRO contains a host of scientific instruments such as the HiRISE camera, CTX camera, CRISM, and SHARAD. The HiRISE camera is used to analyze Martian landforms, whereas CRISM and SHARAD can detect water, ice, and minerals on and below the surface. Additionally, MRO is paving the way for upcoming generations of spacecraft through daily monitoring of Martian weather and surface conditions, searching for future landing sites, and testing a new telecommunications system that enable it to send and receive information at an unprecedented bitrate, compared to previous Mars spacecraft. Data transfer to and from the spacecraft occurs faster than all previous interplanetary missions combined and allows it to serve as an important relay satellite for other missions.

Rosetta and Dawn swingbys

The ESA Rosetta space probe mission to the comet 67P/Churyumov-Gerasimenko flew within 250 km of Mars on February 25, 2007, in a gravitational slingshot designed to slow and redirect the spacecraft.

The NASA Dawn spacecraft used the gravity of Mars in 2009 to change direction and velocity on its way to Vesta, and tested out Dawn's cameras and other instruments on Mars.

Fobos-Grunt

On November 8, 2011, Russia's Roscosmos launched an ambitious mission called Fobos-Grunt. It consisted of a lander aimed to retrieve a sample back to Earth from Mars' moon Phobos, and place the Chinese Yinghuo-1 probe in Mars' orbit. The Fobos-Grunt mission suffered a complete control and communications failure shortly after launch and was left stranded in low Earth orbit, later falling back to Earth. The Yinghuo-1 satellite and Fobos-Grunt underwent destructive re-entry on January 15, 2012, finally disintegrating over the Pacific Ocean.

Curiosity rover

Curiosity's view of Aeolis Mons ("Mount Sharp") foothills on August 9, 2012, EDT (white balanced image)

The NASA Mars Science Laboratory mission with its rover named Curiosity, was launched on November 26, 2011, and landed on Mars on August 6, 2012, on Aeolis Palus in Gale Crater. The rover carries instruments designed to look for past or present conditions relevant to the past or present habitability of Mars.

MAVEN

NASA's MAVEN is an orbiter mission to study the upper atmosphere of Mars. It will also serve as a communications relay satellite for robotic landers and rovers on the surface of Mars. MAVEN was launched 18 November 2013 and reached Mars on 22 September 2014.

Mars Orbiter Mission

The Mars Orbiter Mission, also called Mangalyaan, was launched on 5 November 2013 by the Indian Space Research Organisation (ISRO). It was successfully inserted into Martian orbit on 24 September 2014. The mission is a technology demonstrator, and as secondary objective, it will also study the Martian atmosphere. This is India's first mission to Mars, and with it, ISRO became the fourth space agency to successfully reach Mars after the Soviet Union, NASA (USA) and ESA (Europe). It was completed in a record low budget of $71 million, making it the least-expensive Mars mission to date. The mission concluded on September 27, 2022, after contact was lost.

Trace Gas Orbiter and EDM

The ExoMars Trace Gas Orbiter is an atmospheric research orbiter built in collaboration between ESA and Roscosmos. It was injected into Mars orbit on 19 October 2016 to gain a better understanding of methane (CH
4
) and other trace gases present in the Martian atmosphere that could be evidence for possible biological or geological activity. The Schiaparelli EDM lander was destroyed when trying to land on the surface of Mars.

InSight and MarCO

NASA missions to Mars (28 September 2021)
(Perseverance rover; Ingenuity Mars helicopter; InSight lander; Odyssey orbiter; MAVEN orbiter; Curiosity rover; Mars Reconnaissance Orbiter)

In August 2012, NASA selected InSight, a $425 million lander mission with a heat flow probe and seismometer, to determine the deep interior structure of Mars. InSight landed successfully on Mars on 26 November 2018. Valuable data on the atmosphere, surface and the planet's interior were gathered by Insight. Insight's mission was declared as ended on 21 December 2022.

Two flyby CubeSats called MarCO were launched with InSight on 5 May 2018 to provide real-time telemetry during the entry and landing of InSight. The CubeSats separated from the Atlas V booster 1.5 hours after launch and traveled their own trajectories to Mars.

Hope

The United Arab Emirates launched the Hope Mars Mission, in July 2020 on the Japanese H-IIA booster. It was successfully placed into orbit on 9 February 2021. It is studying the Martian atmosphere and weather.

Tianwen-1 and Zhurong rover

Tianwen-1 was a Chinese mission launched on 23 July 2020 which included an orbiter, a lander, and a 240-kilogram (530 lb) rover along with a package of deployable and remote cameras. Tianwen-1 entered orbit on 10 February 2021 and the Zhurong rover successfully landed on 14 May 2021 and deployed on 22 May 2021. As of May 2022, Zhurong had been in operation for 347 Martian days and had traveled 1,921 meters across Mars.

Mars 2020, Perseverance rover, Ingenuity helicopter

Mapping Perseverance's samples collected to date

The Mars 2020 mission by NASA was launched on 30 July 2020 on a United Launch Alliance Atlas V rocket from Cape Canaveral. It is based on the Mars Science Laboratory design. The scientific payload is focused on astrobiology. It includes the Perseverance rover and the Ingenuity helicopter. Unlike older rovers that relied on solar power, Perseverance is nuclear powered, to survive longer than its predecessors in this harsh, dusty environment. The car-size rover weighs about 1 ton, with a robotic arm that reaches about 7 feet (2.1 m), zoom cameras, a chemical analyzer and a rock drill.

After traveling 293 million miles (471 million km) to reach Mars over the course of more than six months, Perseverance successfully landed on February 18, 2021. Its initial mission is set for at least one Martian year, or 687 Earth days. It will search for signs of ancient life and explore the red planet's surface.

As of October 19, 2021, Perseverance had captured the first sounds from Mars. Recordings consisted of five hours of Martian wind gusts, rover wheels crunching over gravel, and motors whirring as the spacecraft moves its arm. The sounds give researchers clues about the atmosphere, such as how far sound travels on the planet.

Future missions

Proposals

  • The Finnish-Russian Mars MetNet concept would use multiple small meteorological stations on Mars to establish a widespread observation network to investigate the planet's atmospheric structure, physics and meteorology. The MetNet precursor or demonstrator was considered for a piggyback launch on Fobos-Grunt, and on the two proposed to fly on the 2016 and 2020 ExoMars spacecraft.
  • Tianwen-3 is a Chinese mission to return samples of Martian soil to Earth. The mission would launch in late 2028, with a lander and ascent vehicle and an orbiter and return module launched separately on two rockets. The samples would be returned to Earth by July 2031.
  • NASA-ESA Mars Sample Return is a three-launch architecture concept for a sample return mission, which uses a rover to cache small samples, a Mars ascent stage to send it into orbit, and an orbiter to rendezvous with it above Mars and take it to Earth. Solar-electric propulsion could allow a one launch sample return instead of three.
  • The Mars-Grunt is a Russian mission concept to bring a sample of Martian soil to Earth.
  • The Mars Scout Program's SCIM would involve a probe grazing the upper atmosphere of Mars to collect dust and air for return to Earth.
  • JAXA is working on a mission concept called MELOS rover that would look for biosignatures of extant life on Mars.
  • Indian Space Research Organisation has proposed a Mangalyaan-3 mission that will include a lander and rover on Mars.

Other future mission concepts include polar probes, Martian aircraft and a network of small meteorological stations. Longterm areas of study may include Martian lava tubes, resource utilization, and electronic charge carriers in rocks. Micromissions are another possibility, such as piggybacking a small spacecraft on an Ariane 5 rocket and using a lunar gravity assist to get to Mars.

Human mission proposals

Concept for NASA Design Reference Mission Architecture 5.0 (2009)

The human exploration of Mars has been an aspiration since the earliest days of modern rocketry; Robert H. Goddard credits the idea of reaching Mars as his own inspiration to study the physics and engineering of space flight. Proposals for human exploration of Mars have been made throughout the history of space exploration; currently there are multiple active plans and programs to put humans on Mars within the next ten to thirty years, both governmental and private, some of which are listed below.

NASA

Artistic simulated photo looking out a portal spacecraft coming for a Mars landing

Human exploration by the United States was identified as a long-term goal in the Vision for Space Exploration announced in 2004 by then US President George W. Bush. The planned Orion spacecraft would be used to send a human expedition to Earth's moon by 2020 as a stepping stone to a Mars expedition. On September 28, 2007, NASA administrator Michael D. Griffin stated that NASA aims to put a person on Mars by 2037.

On December 2, 2014, NASA's Advanced Human Exploration Systems and Operations Mission Director Jason Crusan and Deputy Associate Administrator for Programs James Reuthner announced tentative support for the Boeing "Affordable Mars Mission Design" including radiation shielding, centrifugal artificial gravity, in-transit consumable resupply, and a lander which can return. Reuthner suggested that if adequate funding was forthcoming, the proposed mission would be expected in the early 2030s.

On October 8, 2015, NASA published its official plan for human exploration and colonization of Mars. They called it "Journey to Mars". The plan operates through three distinct phases leading up to fully sustained colonization.

  • The first stage, already underway, is the "Earth Reliant" phase. This phase continues utilizing the International Space Station until 2024; validating deep space technologies and studying the effects of long-duration space missions on the human body.
  • The second stage, "Proving Ground," moves away from Earth reliance and ventures into cislunar space for most of its tasks. This is when NASA plans to capture an asteroid, test deep space habitation facilities, and validate the capabilities required for human exploration of Mars. Finally, phase three is the transition to independence from Earth resources.
  • The last stage, the "Earth Independent" phase, includes long-term missions on the lunar surface which leverage surface habitats that only require routine maintenance, and the harvesting of Martian resources for fuel, water, and building materials. NASA is still aiming for human missions to Mars in the 2030s, though Earth independence could take decades longer.
Journey to Mars – Science, Exploration, Technology

On August 28, 2015, NASA funded a year-long simulation to study the effects of a year-long Mars mission on six scientists. The scientists lived in a biodome on a Mauna Loa mountain in Hawaii with limited connection to the outside world and were only allowed outside if they were wearing spacesuits.

NASA's human Mars exploration plans have evolved through the NASA Mars Design Reference Missions, a series of design studies for human exploration of Mars.

In 2017, the focus of NASA shifted to a return to the Moon by 2024 with the Artemis program, a flight to Mars could follow after this project.

SpaceX

The long-term goal of the private corporation SpaceX is the establishment of routine flights to Mars to enable colonization. To this end, the company is developing Starship, a spacecraft capable of crew transportation to Mars and other celestial bodies, along with its booster Super Heavy. In 2017 SpaceX announced plans to send two uncrewed Starships to Mars by 2022, followed by two more uncrewed flights and two crewed flights in 2024. Starship is planned to have a payload of at least 100 tonnes. Starship is designed to use a combination of aerobraking and propulsive descent, utilizing fuel produced from a Mars (in situ resource utilization) facility. As of mid 2021, the Starship development program has seen successful testing of several Starship prototypes.

Zubrin

Mars Direct, a low-cost human mission proposed by Robert Zubrin, founder of the Mars Society, would use heavy-lift Saturn V class rockets, such as the Ares V, to skip orbital construction, LEO rendezvous, and lunar fuel depots. A modified proposal, called "Mars to Stay", involves not returning the first immigrant explorers immediately, if ever (see Colonization of Mars).

Probing difficulties

Deep Space 2 technology
Mars Spacecraft 1988–1999
Spacecraft Outcome
Phobos 1 Failure
Phobos 2 Partial success
Mars Observer Failure
Mars 96 Failure
Mars Pathfinder Success
Mars Global Surveyor Success
Mars Climate Orbiter Failure
Mars Polar Lander Failure
Deep Space 2 Failure
Nozomi Failure

The challenge, complexity and length of Mars missions have led to many mission failures. The high failure rate of missions attempting to explore Mars is informally called the "Mars Curse" or "Martian Curse". The phrase "Galactic Ghoul" or "Great Galactic Ghoul" refers to a fictitious space monster that subsists on a diet of Mars probes, and is sometimes facetiously used to "explain" the recurring difficulties.

Two Soviet probes were sent to Mars in 1988 as part of the Phobos program. Phobos 1 operated normally until an expected communications session on 2 September 1988 failed to occur. The problem was traced to a software error, which deactivated Phobos 1's attitude thrusters, causing the spacecraft's solar arrays to no longer point at the Sun, depleting Phobos 1's batteries. Phobos 2 operated normally throughout its cruise and Mars orbital insertion phases on January 29, 1989, gathering data on the Sun, interplanetary medium, Mars, and Phobos. Shortly before the final phase of the mission – during which the spacecraft was to approach within 50 m of Phobos' surface and release two landers, one a mobile 'hopper', the other a stationary platform – contact with Phobos 2 was lost. The mission ended when the spacecraft signal failed to be successfully reacquired on March 27, 1989. The cause of the failure was determined to be a malfunction of the on-board computer.

Just a few years later in 1992 Mars Observer, launched by NASA, failed as it approached Mars. Mars 96, an orbiter launched on November 16, 1996, by Russia failed, when the planned second burn of the Block D-2 fourth stage did not occur.

Following the success of Global Surveyor and Pathfinder, another spate of failures occurred in 1998 and 1999, with the Japanese Nozomi orbiter and NASA's Mars Climate Orbiter, Mars Polar Lander, and Deep Space 2 penetrators all suffering various fatal errors. The Mars Climate Orbiter was noted for mixing up U.S. customary units with metric units, causing the orbiter to burn up while entering Mars' atmosphere.

The European Space Agency has also attempted to land two probes on the Martian surface; Beagle 2, a British-built lander that failed to deploy its solar arrays properly after touchdown in December 2003, and Schiaparelli, which was flown along the ExoMars Trace Gas Orbiter. Contact with the Schiaparelli EDM lander was lost 50 seconds before touchdown. It was later confirmed that the lander struck the surface at a high velocity, possibly exploding.

Thursday, August 3, 2023

Fraud

From Wikipedia, the free encyclopedia
A fake automated teller slot used to commit bank fraud upon bank patrons.

In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements.

Internal fraud, also known as "insider fraud", is fraud committed or attempted by someone within an organisation such as an employee.

A hoax is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim.

As a civil wrong

In common law jurisdictions, as a civil wrong, fraud is a tort. While the precise definitions and requirements of proof vary among jurisdictions, the requisite elements of fraud as a tort generally are the intentional misrepresentation or concealment of an important fact upon which the victim is meant to rely, and in fact does rely, to the harm of the victim. Proving fraud in a court of law is often said to be difficult as the intention to defraud is the key element in question. As such, proving fraud comes with a "greater evidentiary burden than other civil claims". This difficulty is exacerbated by the fact that some jurisdictions require the victim to prove fraud by clear and convincing evidence.

The remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained agreement or transaction, the recovery of a monetary award to compensate for the harm caused, punitive damages to punish or deter the misconduct, and possibly others.

In cases of a fraudulently induced contract, fraud may serve as a defense in a civil action for breach of contract or specific performance of contract. Similarly, fraud may serve as a basis for a court to invoke its equitable jurisdiction.

As a criminal offense

In common law jurisdictions, as a criminal offense, fraud takes many different forms, some general (e.g., theft by false pretense) and some specific to particular categories of victims or misconduct (e.g., bank fraud, insurance fraud, forgery). The elements of fraud as a crime similarly vary. The requisite elements of perhaps the most general form of criminal fraud, theft by false pretense, are the intentional deception of a victim by false representation or pretense with the intent of persuading the victim to part with property and with the victim parting with property in reliance on the representation or pretense and with the perpetrator intending to keep the property from the victim.

By region

North America

Canada

Section 380(1) of the Criminal Code provides the general definition for fraud in Canada:

380. (1) Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence within the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service,

(a) is guilty of an indictable offence and liable to a term of imprisonment not exceeding fourteen years, where the subject-matter of the offence is a testamentary instrument or the value of the subject-matter of the offence exceeds five thousand dollars; or
(b) is guilty
(i) of an indictable offence and is liable to imprisonment for a term not exceeding two years, or
(ii) of an offence punishable on summary conviction, where the value of the subject-matter of the offence does not exceed five thousand dollars.

In addition to the penalties outlined above, the court can also issue a prohibition order under s. 380.2 (preventing a person from "seeking, obtaining or continuing any employment, or becoming or being a volunteer in any capacity, that involves having authority over the real property, money or valuable security of another person"). It can also make a restitution order under s. 380.3.

The Canadian courts have held that the offence consists of two distinct elements:

  • A prohibited act of deceit, falsehood or other fraudulent means. In the absence of deceit or falsehood, the courts will look objectively for a "dishonest act"; and
  • The deprivation must be caused by the prohibited act, and deprivation must relate to property, money, valuable security, or any service.

The Supreme Court of Canada has held that deprivation is satisfied on proof of detriment, prejudice or risk of prejudice; it is not essential that there be actual loss. Deprivation of confidential information, in the nature of a trade secret or copyrighted material that has commercial value, has also been held to fall within the scope of the offence.

United States

Criminal fraud

The proof requirements for criminal fraud charges in the United States are essentially the same as the requirements for other crimes: guilt must be proved beyond a reasonable doubt. Throughout the United States fraud charges can be misdemeanours or felonies depending on the amount of loss involved. High value fraud can also trigger additional penalties. For example, in California, losses of $500,000 or more will result in an extra two, three, or five years in prison in addition to the regular penalty for the fraud.

The U.S. government's 2006 fraud review concluded that fraud is a significantly under-reported crime, and while various agencies and organizations were attempting to tackle the issue, greater co-operation was needed to achieve a real impact in the public sector. The scale of the problem pointed to the need for a small but high-powered body to bring together the numerous counter-fraud initiatives that existed.

Civil fraud

Although elements may vary by jurisdiction and the specific allegations made by a plaintiff who files a lawsuit that alleged fraud, typical elements of a fraud case in the United States are that:

  1. Somebody misrepresents a material fact in order to obtain action or forbearance by another person;
  2. The other person relies upon the misrepresentation; and
  3. The other person suffers injury as a result of the act or forbearance taken in reliance upon the misrepresentation.

To establish a civil claim of fraud, most jurisdictions in the United States require that each element of a fraud claim be pleaded with particularity and be proved by a preponderance of the evidence, meaning that it is more likely than not that the fraud occurred. Some jurisdictions impose a higher evidentiary standard, such as Washington State's requirement that the elements of fraud be proved with clear, cogent, and convincing evidence (very probable evidence), or Pennsylvania's requirement that common law fraud be proved by clear and convincing evidence.

The measure of damages in fraud cases is normally computed using one of two rules:

  1. The "benefit of bargain" rule, which allows for recovery of damages in the amount of the difference between the value of the property had it been as represented and its actual value;
  2. Out-of-pocket loss, which allows for the recovery of damages in the amount of the difference between the value of what was given and the value of what was received.

Special damages may be allowed if shown to have been proximately caused by defendant's fraud and the damage amounts are proved with specificity.

Many jurisdictions permit a plaintiff in a fraud case to seek punitive or exemplary damages.

Asia

China

Zhang Yingyu's story collection The Book of Swindles (available here; ca. 1617) testifies to rampant commercial fraud, especially involving itinerant businessmen, in late Ming China. The Economist, CNN, and other media outlets regularly report on incidents of fraud or bad faith in Chinese business and trade practices. Forbes cites cybercrime as a persistent and growing threat to Chinese consumers.

India

In India the criminal laws are enshrined in the Indian Penal Code. It is supplemented by the Criminal Procedure Code and Indian Evidence Act.

Europe

United Kingdom

In 2016 the estimated value lost through fraud in the UK was £193 billion a year.

In January 2018 the Financial Times reported that the value of UK fraud hit a 15-year high of £2.11bn in 2017, according to a study. The article said that the accountancy firm BDO examined reported fraud cases worth more than £50,000 and found that the total number rose to 577 in 2017, compared with 212 in 2003. The study found that the average amount stolen in each incident rose to £3.66m, up from £1.5m in 2003.

As at November 2017, fraud is the most common criminal offence in the UK according to a study by Crowe Clark Whitehill, Experian and the Centre for Counter Fraud Studies. The study suggests the UK loses over £190 billion per year to fraud. £190 billion is more than 9% of the UK's projected GDP for 2017 ($2,496 (£2,080) billion according to Statistics Times.) The estimate for fraud in the UK figure is more than the entire GDP of countries such as Romania, Qatar and Hungary.

According to another review by the UK anti-fraud charity Fraud Advisory Panel (FAP), business fraud accounted for £144bn, while fraud against individuals was estimated at £9.7bn. The FAP has been particularly critical of the support available from the police to victims of fraud in the UK outside of London. Although victims of fraud are generally referred to the UK's national fraud and cyber crime reporting centre, Action Fraud, the FAP found that there was "little chance" that these crime reports would be followed up with any kind of substantive law enforcement action by UK authorities, according to the report.

In July 2016, it was reported that fraudulent activity levels in the UK increased in the 10 years leading up to 2016 from £52 billion to £193 bn. This figure would be a conservative estimate, since as the former commissioner of the City of London Police, Adrian Leppard, has said, only 1 in 12 such crimes are actually reported. Donald Toon, director of the NCA's economic crime command, stated in July 2016: "The annual losses to the UK from fraud are estimated to be more than £190bn". Figures released in October 2015 from the Crime Survey of England and Wales found that there had been 5.1 million incidents of fraud in England and Wales in the previous year, affecting an estimated one in 12 adults and making it the most common form of crime.

Also in July 2016, the Office for National Statistics (ONS) stated "Almost six million fraud and cyber crimes were committed last year in England and Wales and estimated there were two million computer misuse offences and 3.8 million fraud offences in the 12 months to the end of March 2016." Fraud affects one in ten people in the UK. According to the ONS, most fraud relates to bank account fraud. These figures are separate from the headline estimate that another 6.3 million crimes (distinct from fraud) were perpetrated in the UK against adults in the year to March 2016.

Fraud was not included in a "Crime Harm Index" published by the Office for National Statistics in 2016. Michael Levi, professor of criminology at Cardiff University, remarked in August 2016 that it was "deeply regrettable" that fraud was being left out of the first index despite being the most common crime reported to police in the UK. Levi said "If you've got some categories that are excluded, they are automatically left out of the police's priorities." The Chief of the National Audit Office (NAO), Sir Anyas Morse has also said "For too long, as a low-value but high-volume crime, online fraud has been overlooked by government, law enforcement and industry. It is now the most commonly experienced crime in England and Wales and demands an urgent response."

HM Treasury issued guidance to central government departments in January 2011 concerned with "Tackling Internal Fraud", concerned that economic pressures and potential staff redundancies at the time might lead those staff who "might be tempted" to commit fraud to make more of any opportunity which might arise, noting a possible shift in the balance between "the reward from fraud" and the risk of detection. An aspect of the guidance was to equip staff to look out for "fraud indicators": clues or hints that an individual member of staff, team or area of activity might need "a closer look".

In 2022, the television program Scam Interceptors revealed that the majority of fraud in the United Kingdom was perpetrated from industrial-scale scamming call centres in Asia.

England, Wales, and Northern Ireland

Since 2007, fraud in England and Wales and Northern Ireland has been covered by the Fraud Act 2006. The Act was given Royal Assent on 8 November 2006, and came into effect on 15 January 2007.

The Act gives a statutory definition of the criminal offence of fraud, defining it in three classes—fraud by false representation, fraud by failing to disclose information, and fraud by abuse of position. It provides that a person found guilty of fraud is liable to a fine or imprisonment for up to twelve months on summary conviction (six months in Northern Ireland), or a fine or imprisonment for up to ten years on conviction on indictment. This Act largely replaces the laws relating to obtaining property by deception, obtaining a pecuniary advantage and other offences that were created under the Theft Act 1978.

Scotland

In Scots law, fraud is covered under the common law and a number of statutory offences. The main fraud offences are common law fraud, uttering, embezzlement, and statutory fraud. The Fraud Act 2006 does not apply in Scotland.

Governmental Organizations

The Serious Fraud Office is an arm of the Government of the United Kingdom, accountable to the Attorney-General.

The National Fraud Authority (NFA) was, until 2014, a government agency coordinating the counter-fraud response in the UK.

Cifas is a British fraud prevention service, a not-for-profit membership organization for all sectors that enables organizations to share and access fraud data using their databases. Cifas is dedicated to the prevention of fraud, including internal fraud by staff, and the identification of financial and related crime.

Cost

Participants of a 2010 survey by the Association of Certified Fraud Examiners estimated that the typical organization loses five percent of its annual revenue to fraud, with a median loss of $160,000. Fraud committed by owners and executives were more than nine times as costly as employee fraud. The industries most commonly affected are banking, manufacturing, and government.

Types of fraudulent acts

The highly decorated fake uniform worn by a man impersonating a "Marine" caught by two gunnery sergeants at Times Square in New York City, New York
An advertisement for possibly fraudulent "work-at-home scheme"

The falsification of documents, known as forgery, and counterfeiting are types of fraud involved in physical duplication or fabrication. The "theft" of one's personal information or identity, like one finding out another's social security number and then using it as identification, is a type of fraud. Fraud can be committed through and across many media including mail, wire, phone, and the Internet (computer crime and Internet fraud).

Given the international nature of the web and ease with which users can hide their location, obstacles to checking identity and legitimacy online, and the variety of hacker techniques available to gain access to PII have all contributed to the very rapid growth of Internet fraud. In some countries, tax fraud is also prosecuted under false billing or tax forgery. There have also been fraudulent "discoveries", e.g., science, where the appetite is for prestige rather than immediate monetary gain.

Commodities fraud

The illegal act of obtaining (or the attempt of obtaining) a certain amount of currency in accordance with a contract that promises the later exchange of equated assets, which ultimately never arrive, is a type of fraud, known as commodities fraud. Alternatively, the term can relate to: the failure of registering in an exchange; the act of deliberately providing falsified information to clients; the action of executing transactions with the sole purpose of making a profit for the payee; the theft of client funds.                                                                                                                                            

Detection

A fraudulent manufacturer's suggested retail price on a speaker

The detection of fraudulent activities on a large scale is possible with the harvesting of massive amounts of financial data paired with predictive analytics or forensic analytics, the use of electronic data to reconstruct or detect financial fraud.

Using computer-based analytic methods in particular allows for surfacing of errors, anomalies, inefficiencies, irregularities, and biases which often refer to fraudsters gravitating to certain dollar amounts to get past internal control thresholds. These high-level tests include tests related to Benford's Law and possibly also those statistics known as descriptive statistics. High-level tests are always followed by more focused tests to look for small samples of highly irregular transactions. The familiar methods of correlation and time-series analysis can also be used to detect fraud and other irregularities.

Anti-fraud provisioning

Beyond laws that aim at prevention of fraud, there are also governmental and non-governmental organizations that aim to fight fraud. Between 1911 and 1933, 47 states adopted the so-called Blue Sky Laws status. These laws were enacted and enforced at the state level and regulated the offering and sale of securities to protect the public from fraud. Though the specific provisions of these laws varied among states, they all required the registration of all securities offerings and sales, as well as of every U.S. stockbroker and brokerage firm. However, these Blue Sky laws were generally found to be ineffective. To increase public trust in the capital markets the President of the United States, Franklin D. Roosevelt, established the U.S. Securities and Exchange Commission (SEC). The main reason for the creation of the SEC was to regulate the stock market and prevent corporate abuses relating to the offering and sale of securities and corporate reporting. The SEC was given the power to license and regulate stock exchanges, the companies whose securities traded on them, and the brokers and dealers who conducted the trading.

Wiretapping

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Wiretapping

Wiretapping also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on an analog telephone or telegraph line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.

Legal status

Telephone line control device "Jitka", used in late 1960s by Czechoslovakian StB to signal line occupancy, and connect a recorder

Lawful interception is officially strictly controlled in many countries to safeguard privacy; this is the case in all liberal democracies. In theory, telephone tapping often needs to be authorized by a court, and is again in theory, normally only approved when evidence shows it is not possible to detect criminal or subversive activity in less intrusive ways. Oftentimes, the law and regulations require that the crime investigated must be at least of a certain severity. Illegal or unauthorized telephone tapping is often a criminal offense. In certain jurisdictions, such as Germany and France, courts will accept illegally recorded phone calls without the other party's consent as evidence, but the unauthorized telephone tapping will still be prosecuted.

United States

In the United States, under the Foreign Intelligence Surveillance Act, federal intelligence agencies can get approval for wiretaps from the United States Foreign Intelligence Surveillance Court, a court with secret proceedings, or in certain circumstances from the Attorney General without a court order.

The telephone call recording laws in most U.S. states require only one party to be aware of the recording, while twelve states require both parties to be aware. In Nevada, the state legislature enacted a law making it legal for a party to record a conversation if one party to the conversation consented, but the Nevada Supreme Court issued two judicial opinions changing the law and requiring all parties to consent to the recording of a private conversation for it to be legal. It is considered better practice to announce at the beginning of a call that the conversation is being recorded.

The Fourth Amendment to the United States Constitution protects privacy rights by requiring a warrant to search an individual. However, telephone tapping is the subject of controversy surrounding violations of this right. There are arguments that wiretapping invades an individual's personal privacy and therefore violates their Fourth Amendment rights. On the other hand, there are certain rules and regulations, which permit wiretapping. A notable example of this is the Patriot Act. The Patriot act does, in certain circumstances, give the government permission to wiretap citizens. In addition, wiretapping laws vary per state which makes it even more difficult to determine whether the Fourth Amendment is being violated.

Canada

In Canadian law, police are allowed to wiretap without the authorization from a court when there is the risk for imminent harm, such as kidnapping or a bomb threat. They must believe that the interception is immediately necessary to prevent an unlawful act that could cause serious harm to any person or to property. This was introduced by Rob Nicholson on February 11, 2013, and is also known as Bill C-55. The Supreme Court gave Parliament twelve months to rewrite a new law. Bill C-51 (also known as the Anti-Terrorism Act) was then released in 2015, which transformed the Canadian Security Intelligence Service from an intelligence-gathering agency to an agency actively engaged in countering national security threats.

Legal protection extends to 'private communications' where the participants would not expect unintended persons to learn the content of the communication. A single participant can legally, and covertly record a conversation. Otherwise police normally need a judicial warrant based upon probable grounds to record a conversation they are not a part of. In order to be valid wiretap authorization must state: 1) the offense being investigated by the wiretap, 2) the type of communication, 3) the identity of the people or places targeted, 4) the period of validity (60 days from issue).

India

In India, the lawful interception of communication by authorized law enforcement agencies (LEAs) is carried out in accordance with Section 5(2) of the Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007. Directions for interception of any message or class of messages under sub-section (2) of Section 5 of the Indian Telegraph Act, 1885 shall not be issued except by an order made by the Secretary to the Government of India in the Ministry of Home Affairs in the case of Government of India and by the Secretary to the State Government in-charge of the Home Department in the case of a state government. The government has set up the Centralized Monitoring System (CMS) to automate the process of lawful interception and monitoring of telecommunications technology. The government of India on 2015 December 2 in a reply to parliament question no. 595 on scope, objectives and framework of the CMS has struck a balance between national security, online privacy and free speech informed that to take care of the privacy of citizens, lawful interception and monitoring is governed by the Section 5(2) of Indian Telegraph Act, 1885 read with Rule 419A of Indian Telegraph (Amendment) Rules, 2007 wherein oversight mechanism exists in form of review committee under chairmanship of the Cabinet Secretary at Central Government level and Chief Secretary of the State at the state government level. Section 5(2) also allows the government to intercept messages that are public emergencies or for public safety.

Methods

Official use

The contracts or licenses by which the state controls telephone companies often require that the companies must provide access to tapping lines to law enforcement. In the U.S., telecommunications carriers are required by law to cooperate in the interception of communications for law enforcement purposes under the terms of Communications Assistance for Law Enforcement Act (CALEA).

When telephone exchanges were mechanical, a tap had to be installed by technicians, linking circuits together to route the audio signal from the call. Now that many exchanges have been converted to digital technology, tapping is far simpler and can be ordered remotely by computer. This central office switch wiretapping technology using the Advanced Intelligent Network (AIN) was invented by Wayne Howe and Dale Malik at BellSouth's Advanced Technology R&D group in 1995 and was issued as US Patent #5,590,171. Telephone services provided by cable TV companies also use digital switching technology. If the tap is implemented at a digital switch, the switching computer simply copies the digitized bits that represent the phone conversation to a second line and it is impossible to tell whether a line is being tapped. A well-designed tap installed on a phone wire can be difficult to detect. In some places, some law enforcement may be able to even access a mobile phone's internal microphone even while it isn't actively being used on a phone call (unless the battery is removed or drained). The noises that some people believe to be telephone taps are simply crosstalk created by the coupling of signals from other phone lines.

Data on the calling and called number, time of call and duration, will generally be collected automatically on all calls and stored for later use by the billing department of the phone company. These data can be accessed by security services, often with fewer legal restrictions than for a tap. This information used to be collected using special equipment known as pen registers and trap and trace devices and U.S. law still refers to it under those names. Today, a list of all calls to a specific number can be obtained by sorting billing records. A telephone tap during which only the call information is recorded but not the contents of the phone calls themselves, is called a pen register tap.

For telephone services via digital exchanges, the information collected may additionally include a log of the type of communications media being used (some services treat data and voice communications differently, in order to conserve bandwidth).

Non-official use

A telephone recording adapter (in-line tap). The phone jack connects to the wall socket while the phone being monitored is connected to the adapter's socket. The audio plug connects to the recording device (computer, tape recorder, etc.).

Conversations can be recorded or monitored unofficially, either by tapping by a third party without the knowledge of the parties to the conversation or recorded by one of the parties. This may or may not be illegal, according to the circumstances and the jurisdiction.

There are a number of ways to monitor telephone conversations. One of the parties may record the conversation, either on a tape or solid-state recording device, or they may use a computer running call recording software. The recording, whether overt or covert, may be started manually, automatically when it detects sound on the line (VOX), or automatically whenever the phone is off the hook.

  • using an inductive coil tap (telephone pickup coil) attached to the handset or near the base of the telephone, picking up the stray field of the telephone's hybrid;
  • fitting an in-line tap, as discussed below, with a recording output;
  • using an in-ear microphone while holding the telephone to the ear normally; this picks up both ends of the conversation without too much disparity between the volumes;
  • more crudely and with lower quality, simply using a speakerphone and recording with a normal microphone.

The conversation may be monitored (listened to or recorded) covertly by a third party by using an induction coil or a direct electrical connection to the line using a beige box. An induction coil is usually placed underneath the base of a telephone or on the back of a telephone handset to pick up the signal inductively. An electrical connection can be made anywhere in the telephone system, and need not be in the same premises as the telephone. Some apparatus may require occasional access to replace batteries or tapes. Poorly designed tapping or transmitting equipment can cause interference audible to users of the telephone.

The tapped signal may either be recorded at the site of the tap or transmitted by radio or over the telephone wires. As of 2007 state-of-the-art equipment operates in the 30–300 GHz range to keep up with telephone technology compared to the 772 kHz systems used in the past. The transmitter may be powered from the line to be maintenance-free, and only transmits when a call is in progress. These devices are low-powered as not much power can be drawn from the line, but a state-of-the-art receiver could be located as far away as ten kilometers under ideal conditions, though usually located much closer. Research has shown that a satellite can be used to receive terrestrial transmissions with a power of a few milliwatts. Any sort of radio transmitter whose presence is suspected is detectable with suitable equipment.

Conversation on many early cordless telephones could be picked up with a simple radio scanner or sometimes even a domestic radio. Widespread digital spread spectrum technology and encryption has made eavesdropping increasingly difficult.

A problem with recording a telephone conversation is that the recorded volume of the two speakers may be very different. A simple tap will have this problem. An in-ear microphone, while involving an additional distorting step by converting the electrical signal to sound and back again, in practice gives better-matched volume. Dedicated, and relatively expensive, telephone recording equipment equalizes the sound at both ends from a direct tap much better.

Location data

Mobile phones are, in surveillance terms, a major liability. For mobile phones the major threat is the collection of communications data. This data does not only include information about the time, duration, originator and recipient of the call, but also the identification of the base station where the call was made from, which equals its approximate geographical location. This data is stored with the details of the call and has utmost importance for traffic analysis.

It is also possible to get greater resolution of a phone's location by combining information from a number of cells surrounding the location, which cells routinely communicate (to agree on the next handoff—for a moving phone) and measuring the timing advance, a correction for the speed of light in the GSM standard. This additional precision must be specifically enabled by the telephone company—it is not part of the network's ordinary operation.

Internet

In 1995, Peter Garza, a Special Agent with the Naval Criminal Investigative Service, conducted the first court-ordered Internet wiretap in the United States while investigating Julio Cesar "Griton" Ardita.

As technologies emerge, including VoIP, new questions are raised about law enforcement access to communications (see VoIP recording). In 2004, the Federal Communications Commission was asked to clarify how the Communications Assistance for Law Enforcement Act (CALEA) related to Internet service providers. The FCC stated that “providers of broadband Internet access and voice over Internet protocol (“VoIP”) services are regulable as “telecommunications carriers” under the Act.” Those affected by the Act will have to provide access to law enforcement officers who need to monitor or intercept communications transmitted through their networks. As of 2009, warrantless surveillance of internet activity has consistently been upheld in FISA court.

The Internet Engineering Task Force has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards.

Typically, illegal Internet wiretapping will be conducted via Wi-Fi connection to someone's internet by cracking the WEP or WPA key, using a tool such as Aircrack-ng or Kismet. Once in, the intruder will rely on a number of potential tactics, for example an ARP spoofing attack which will allow the intruder to view packets in a tool such as Wireshark or Ettercap.

Mobile phone

The second generation mobile phones (c. 1978 through 1990) could be easily monitored by anyone with a 'scanning all-band receiver' because the system used an analog transmission system-like an ordinary radio transmitter. The third generation digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company. It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.

To the mobile phones in its vicinity, a device called an "IMSI-catcher" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a man-in-the-middle attack. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone. There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, secure telephones, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.

Webtapping

Logging the IP addresses of users that access certain websites is commonly called "webtapping".

Webtapping is used to monitor websites that presumably contain dangerous or sensitive materials, and the people that access them. Though it is allowed by the USA PATRIOT Act, it is considered a questionable practice by many citizens.

Telephones recording

In Canada, anyone is legally allowed to record a conversation as long as they are involved in the conversation. The police must apply for a warrant beforehand to legally eavesdrop on the conversation. It must be expected that it will reveal evidence to a crime. State agents are lawfully allowed to record conversations, but to reveal the evidence in court, they must obtain a warrant.

History

Many state legislatures in the United States enacted statutes that prohibited anyone from listening in on telegraph communication. Telephone wiretapping began in the 1890s, following the invention of the telephone recorder, and its constitutionality was established in the Prohibition-Era conviction of bootlegger Roy Olmstead. Wiretapping has also been carried out under most Presidents, sometimes with a lawful warrant since the Supreme Court ruled it constitutional in 1928. On October 19, 1963, U.S. Attorney General Robert F. Kennedy, who served under John F. Kennedy and Lyndon B. Johnson, authorized the FBI to begin wiretapping the communications of Rev. Martin Luther King Jr. The wiretaps remained in place until April 1965 at his home and June 1966 at his office.

The history of voice communication technology began in 1876 with the invention of Alexander Graham Bell’s telephone. In the 1890s, “law enforcement agencies begin tapping wires on early telephone networks”. Remote voice communications “were carried almost exclusively by circuit-switched systems,” where telephone switches would connect wires to form a continuous circuit and disconnect the wires when the call ended). All other telephone services, such as call forwarding and message taking, were handled by human operators. However, the first computerized telephone switch was developed by Bell Labs in 1965. This got rid of standard wiretapping techniques.

In late 1940, the Nazis tried to secure some telephone lines between their forward headquarters in Paris and a variety of Fuhrerbunkers in Germany. They did this by constantly monitoring the voltage on the lines, looking for any sudden drops or increases in voltage indicating that other wiring had been attached. However, the French telephone engineer Robert Keller succeeded in attaching taps without alerting the Nazis. This was done through an isolated rental property just outside of Paris. Keller's group became known to SOE (and later Allied military intelligence generally) as "Source K". They were later betrayed by a mole within the French resistance, and Keller was murdered in Bergen-Belsen in April 1945.

In the 1970s, optical fibers become a medium for telecommunications. These fiber lines, “long, thin strands of glass that carry signals via laser light,” are more secure than radio and have become very cheap. From the 1990s to the present, the majority of communications between fixed locations has been achieved by fiber. Because these fiber communications are wired, they're given greater protection under U.S. law.

The earliest wiretaps were extra wires—physically inserted to the line between the switchboard and the subscriber—that carried the signal to a pair of earphones and a recorder. Later on, wiretaps were installed at the central office on the frames that held the incoming wires.”

Before the attack on Pearl Harbor and the subsequent entry of the United States into World War II, the U.S. House of Representatives held hearings on the legality of wiretapping for national defense. Significant legislation and judicial decisions on the legality and constitutionality of wiretapping had taken place years before World War II. However, it took on new urgency at that time of national crisis. The actions of the government regarding wiretapping for the purpose of national defense in the current war on terror have drawn considerable attention and criticism. In the World War II era, the public was also aware of the controversy over the question of the constitutionality and legality of wiretapping. Furthermore, the public was concerned with the decisions that the legislative and judicial branches of the government were making regarding wiretapping.

CrimethInc. sticker on a telephone warning users of phone tapping by the U.S. government

In 1967 the U.S. Supreme Court ruled that wiretapping (or “intercepting communications”) requires a warrant in Katz v. United States. In 1968 Congress passed a law that provided warrants for wiretapping in criminal investigations. In 1978 the Foreign Intelligence Surveillance Act (FISA) created a "secret federal court" for issuing wiretap warrants in national security cases. This was in response to findings from the Watergate break-in, which allegedly uncovered a history of presidential operations that had used surveillance on domestic and foreign political organizations.

In 1994, Congress approved the Communications Assistance for Law Enforcement Act (CALEA), which “requires telephone companies to be able to install more effective wiretaps. In 2004, the Federal Bureau of Investigation (FBI), United States Department of Justice (DOJ), Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), and Drug Enforcement Administration (DEA) wanted to expand CALEA requirements to VoIP service.”

The Federal Communications Commission (FCC) ruled in August 2005 that “broadband-service providers and interconnected VoIP providers fall within CALEA’s scope. Currently, instant messaging, web boards and site visits are not included in CALEA’s jurisdiction. In 2007 Congress amended FISA to “allow the government to monitor more communications without a warrant”. In 2008 President George W. Bush expanded the surveillance of internet traffic to and from the U.S. government by signing a national security directive.

In the Greek telephone tapping case 2004–2005 more than 100 mobile phone numbers belonging mostly to members of the Greek government, including the Prime Minister of Greece, and top-ranking civil servants were found to have been illegally tapped for a period of at least one year. The Greek government concluded this had been done by a foreign intelligence agency, for security reasons related to the 2004 Olympic Games, by unlawfully activating the lawful interception subsystem of the Vodafone Greece mobile network. An Italian tapping case which surfaced in November 2007 revealed significant manipulation of the news at the national television company RAI.

In 2008, Wired and other media reported a lamplighter disclosed a "Quantico Circuit", a 45-megabit/second DS-3 line linking a carrier's most sensitive network in an affidavit that was the basis for a lawsuit against Verizon Wireless. The circuit provides direct access to all content and all information concerning the origin and termination of telephone calls placed on the Verizon Wireless network as well as the actual content of calls, according to the filing.

The most recent case of U.S. wiretapping was the NSA warrantless surveillance controversy discovered in December 2005. It aroused much controversy after then President George W. Bush admitted to violating a specific federal statute (FISA) and the warrant requirement of the Fourth Amendment to the United States Constitution. The President claimed his authorization was consistent with other federal statutes (AUMF) and other provisions of the Constitution, also stating that it was necessary to keep America safe from terrorism and could lead to the capture of notorious terrorists responsible for the September 11 attacks in 2001.

One difference between foreign wiretapping and domestic wiretapping is that, when operating in other countries, “American intelligence services could not place wiretaps on phone lines as easily as they could in the U.S.” Also, domestically, wiretapping is regarded as an extreme investigative technique, whereas outside of the country, the interception of communications is huge. The National Security Agency (NSA) “spends billions of dollars every year intercepting foreign communications from ground bases, ships, airplanes and satellites”.

FISA distinguishes between U.S. persons and foreigners, between communications inside and outside the U.S., and between wired and wireless communications. Wired communications within the United States are protected, since intercepting them requires a warrant.

Cellular automaton

From Wikipedia, the free encyclopedia https://en.wikipedi...