×
Government

Open-Source Intelligence: How Bellingcat Uses Data Gathered by Authoritarian Governments (cnn.com) 52

CNN profiles Bellingcat, a Netherlands-based investigative group specializing in "open-source intelligence". And investigator Christo Grozev tells CNN that authoritarian governments make their work easier, because "they love to gather data, comprehensive data, on ... what they consider to be their subjects, and therefore there's a lot of centralized data."

"And second, there's a lot of petty corruption ... within the law enforcement system, and this data market thrives on that." Billions have been spent on creating sophisticated encrypted communications for the military in Russia. But most of that money has been stolen in corrupt kickbacks, and the result is they didn't have that functioning system... It is shocking how incompetent they are. But it was to be expected, because it's a reflection of 23 years of corrupt government.
Interestingly there's apparently less corruption in China — though more whistleblowers. But Bellingcat's first investigation involved the 2014 downing of a Boeing 777 over eastern Ukraine that killed 283 passengers. (The Dutch Safety Board later concluded it was downed by a surface-to-air missile launched from pro-Russian separatist-controlled territory in Ukraine.) "At that time, a lot of public data was available on Russian soldiers, Russian spies, and so on and so forth — because they still hadn't caught up with the times, so they kept a lot of digital traces, social media, posting selfies in front of weapons that shoot down airliners. That's where we kind of perfected the art of reconstructing a crime based on digital breadcrumbs..."

"By 2016, it was no longer possible to find soldiers leaving status selfies on the internet because a new law had been passed in Russia, for example, banning the use of mobile phones by secret services and by soldiers. So we had to develop a new way to get data on government crime. We found our way into this gray market of data in Russia, which is comprised of many, many gigabytes of leaked databases, car registration databases, passport databases. Most of these are available for free, completely freely downloadable from torrent sites or from forums and the internet." And for some of them, they're more current. You actually can buy the data through a broker, so we decided that in cases when we have a strong enough hypothesis that a government has committed the crime, we should probably drop our ethical boundaries from using such data — as long as it is verifiable, as long as it is not coming from one source only but corroborated by at least two or three other sources of data. That's how we develop it. And the first big use case for this approach was the ... poisoning of Sergei and Yulia Skripal in 2018 (in the United Kingdom), when we used this combination of open source and data bought from the gray market in Russia to piece together who exactly the two poisoners were. And that worked tremendously....

It has been what I best describe as a multilevel computer game.... [W]hen we first learned that we can get private data, passport files and residence files on Russian spies who go around killing people, they closed the files on those people. So every spy suddenly had a missing passport file in the central password database. But that opened up a completely new way for us to identify spies, because we were just able to compare older versions of the database to newer versions. So that allowed us to find a bad group of spies that we didn't even know existed before.

The Russian government did realize that that's maybe a bad idea to hide them from us, so they reopened those files but just started poisoning data. They started changing the photographs of some of these people to similar looking, like lookalikes of the people, so that they confused us or embarrass us if we publish a finding but it's for the wrong guy. And then we'll learn how to beat that.

When asked about having dropped some ethical boundaries about data use, Grozev replies "everything changes. Therefore, the rules of journalism should change with the changing times." "And it's not common that journalism was investigating governments conducting government-sanctioned crimes, but now it's happening." With a country's ruler proclaiming perpetual supreme power, "This is not a model that traditional journalism can investigate properly. It's not even a model that traditional law enforcement can investigate properly." I'll give an example. When the British police asked, by international agreement, for cooperation from the Russian government to provide evidence on who exactly these guys were who were hanging around the Skripals' house in 2018, they got completely fraudulent, fake data from the Russian government....

So the only way to counter that as a journalist is to get the data that the Russian government is refusing to hand over. And if this is the only way to get it, and if you can be sure that you can prove that this is valid data and authentic data — I think it is incumbent on journalists to find the truth. And especially when law enforcement refuses to find the truth because of honoring the sovereign system of respecting other governments.

It was Bellingcat that identified the spies who's poisoned Russian opposition leader Alexey Navalny. CNN suggests that for more details on their investigation, and "to understand Vladimir Putin's stranglehold on power in Russia, watch the new film Navalny which premieres Sunday at 9 p.m. ET on CNN."

The movie's tagline? "Poison always leaves a trail."
The Courts

Zoom Agrees To 'Historic' $85 Million Payout For Graphic Zoombombing Claims (theguardian.com) 50

The Covid-19 pandemic brought on a surge of "zoom-bombing" as hackers and pranksters crashed into virtual meetings with abusive messages and imagery. Now, Zoom has agreed to a "historic" payout of $85m as part of a class-action settlement brought by its users, including church groups who said they were left traumatized by the disruptions. From a report: As part of the settlement agreement, Zoom Video Communications, the company behind the teleconference application that grew popular during the pandemic, will pay the $85m to users in cash compensation and also implement reforms to its business practices. On Thursday, federal judge Laurel Beeler of California granted final approval to the agreement which was first filed in July. The agreement was granted preliminary approval in October. The settlement stems from 14 class-action complaints filed against the San Jose-based company by users between March and May of 2020, in which they argued that the company violated their privacy and security.
Social Networks

House Republicans Demand Twitter's Board Preserve All Records About Elon Musk's Bid To Buy the Company (cnbc.com) 288

A group of 18 House Republicans is asking Twitter's board to preserve all records related to Elon Musk's offer to buy the company, setting up a potential congressional probe should the party win back the majority this fall. CNBC: In letters shared exclusively with CNBC, Republicans on the House Judiciary Committee asked Twitter Board Chairman Bret Taylor and other members of the board to preserve any messages from official or personal accounts, including through encryption software, that relate to Twitter's consideration of Musk's offer.

"As Congress continues to examine Big Tech and how to best protect Americans' free speech rights, this letter serves as a formal request that you preserve all records and materials relating to Musk's offer to purchase Twitter, including Twitter's consideration and response to this offer, and Twitter's evaluation of its shareholder interests with respect to Musk's offer," said the letter, led by Ranking Member Jim Jordan, R-Ohio.

"You should construe this preservation notice as an instruction to take all reasonable steps to prevent the destruction or alteration, whether intentionally or negligently, of all documents, communications, and other information, including electronic information and metadata, that is or may be potentially responsive to this congressional inquiry," the letter continued. The request signals that should Republicans take back the majority in the House in the 2022 midterm elections, they may launch an investigation into Twitter, especially if the company declines to take the offer from Musk.

Communications

California Net Neutrality Law To Remain Intact After Appeals Court Says It Won't Reconsider Earlier Decision (theverge.com) 36

A federal appeals court has denied a request for a rehearing on its January decision that upholds California's net neutrality law. From a report: The 2018 law, widely considered the strongest in the US, was signed into law a year after the Federal Communications Commission (FCC) repealed the Open Internet Order. That order had established stringent net neutrality rules that prohibited internet service providers from throttling or blocking legal websites and apps, and banned ISPs from prioritizing paid content. California's law, which finally took effect last year, also prohibits throttling and speed lanes. Wireless trade associations including the NCTA, the CTIA, and ISPs including Comcast, Verizon, and AT&T sued to block California's law from taking effect, saying the FCC decision should preempt the state law. But that challenge was rejected by a district court judge.

The Ninth Circuit voted 3-0 in January to uphold the lower court ruling, saying the FCC "no longer has the authority" to regulate broadband internet services because the agency reclassified them as "information services, instead of telecommunications services. The FCC therefore cannot preempt the state action." FCC chairwoman Jessica Rosenworcel praised the decision on Twitter, reiterating her position that she wants to see net neutrality become "the law on the land" again. The FCC can't currently reinstate net neutrality at the federal level however since the panel lacks a majority and the two Democrats and two Republicans remain deadlocked on the issue. President Biden's FCC nominee Gigi Sohn is still awaiting a confirmation vote in the Senate.

Communications

Delta Confirms It Worked With SpaceX To Trial Starlink's Satellite Internet (engadget.com) 25

Delta Chief Executive Ed Bastian has revealed in an interview that the airline held talks with SpaceX and conducted "exploratory tests" of Starlink's internet technology for its planes. Engadget: According to The Wall Street Journal, Bastian declined to divulge specifics about the test, but SpaceX exec Jonathan Hofeller talked about the company's discussion with several airlines back in mid-2021. Hofeller said back then that the company was developing a product for aviation and that it's already done some demonstrations for interested parties. SpaceX chief Elon Musk tweeted in the same period last year that Starlink antennae for planes would have to be certified for each aircraft type first. He added that the company is focusing on dishes for 737 and A320 planes, because they serve the most number of people. Hofeller reiterated SpaceX's quest to put Starlink on planes at the Satellite 2022 conference last month, saying that the company believes "[c]onnectivity on airplanes is something [that's] ripe for an overhaul." He said SpaceX is developing a service that would allow every single passenger on a plane to stream content like they're able to do in their homes.
Businesses

Apple Store Workers in Atlanta Are the First To Formally Seek a Union (nytimes.com) 124

Employees at an Apple store in Atlanta filed a petition on Wednesday to hold a union election. If successful, the workers could form the first union at an Apple retail store in the United States. From a report: The move continues a recent trend of service-sector unionization in which unions have won elections at Starbucks, Amazon and REI locations. The workers are hoping to join the Communications Workers of America, which represents workers at companies like AT&T Mobility and Verizon, and has made a concerted push into the tech sector in recent years. The union says that about 100 workers at the store -- at Cumberland Mall, in northwest Atlanta -- are eligible to vote, including salespeople and repair technicians, and that over 70 percent of them have signed authorization cards indicating their support. In a statement, the union said Apple, like other tech employers, had effectively created a tiered work force that denied retail workers the pay, benefits and respect that workers earned at its corporate offices.
Space

Potential For Shallow Liquid Water On Jupiter's Moon Europa, Study Suggests (independent.co.uk) 36

Shallow liquid water may be present on Jupiter's moon Europa, data based on the Greenland ice sheet suggests. The Independent reports: Europa is a prime candidate for life in the Solar System, and its deep saltwater ocean has captivated scientists for decades. The giant planet's moon has been visited by the Voyager and Galileo spacecrafts, and data collected on these missions, together with modeling, indicates the potential presence of a liquid water ocean beneath a 20-30km thick ice shell. While the thickness of the icy shell makes sampling it a daunting prospect, increasing evidence reveals the ice shell may be less of a barrier and more of a dynamic system -- and potentially good enough to support life in its own right.

Observations that captured the formation of a double ridge feature in Greenland suggest the ice shell of Europa may have an abundance of water pockets beneath similar features that are common on the surface. Study senior author Dustin Schroeder, an associate professor of geophysics at Stanford University's School of Earth, Energy & Environmental Sciences (Stanford Earth), said: "Because it's closer to the surface, where you get interesting chemicals from space, other moons and the volcanoes of Io, there's a possibility that life has a shot if there are pockets of water in the shell. If the mechanism we see in Greenland is how these things happen on Europa, it suggests there's water everywhere."

Double ridges on Europa appear as dramatic gashes across the moon's icy surface, with crests reaching nearly 1,000 feet. Study author Riley Culberg, a PhD student in electrical engineering at Stanford, said: "In Greenland, this double ridge formed in a place where water from surface lakes and streams frequently drains into the near-surface and refreezes. One way that similar shallow water pockets could form on Europa might be through water from the subsurface ocean being forced up into the ice shell through fractures -- and that would suggest there could be a reasonable amount of exchange happening inside of the ice shell."
The researchers describe their findings in the journal Nature Communications.
Businesses

Former EBay Security Director To Plead Guilty To Cyberstalking (bloomberg.com) 16

Former eBay security director Jim Baugh will plead guilty to running a bizarre 2019 cyberstalking campaign against a couple who ran a website critical of the company, Bloomberg reported Tuesday, citing a person familiar with the matter. From a report: Baugh had been scheduled to face trial in late May. In a court filing on Tuesday, his defense attorney, William Fick, asked a federal judge in Boston to allow Baugh to change his plea via videoconference. Five other former eBay employees have already admitted to roles in a cross-country campaign designed to intimidate Ina and David Steiner of Natick, Mass. Several were expected to testify against Baugh. Another eBay employee, former global resiliency director David Harville is scheduled to face trial in May. Ina Steiner's reporting about eBay on the couple's site eCommerce Bytes upset the company's then-Chief Executive Officer Devin Wenig, whose compensation package she revealed. "Take her down," Wenig texted his then-communications chief Steve Wymer, according to prosecutors.
Encryption

Researchers Break World Record For Quantum-Encrypted Communications (engadget.com) 53

Researchers in Beijing have set a new quantum secure direct communication (QSDC) world record of 102.2 km (64 miles), smashing the previous mark of 18 km (11 miles), The Eurasian Times reported. Engadget reports: Transmission speeds were extremely slow at 0.54 bits per second, but still good enough for text message and phone call encryption over a distance of 30 km (19 miles), wrote research lead Long Guilu in Nature. The work could eventually lead to hack-proof communication, as any eavesdropping attempt on a quantum line can be instantly detected. QSDC uses the principal of entanglement to secure networks. Quantum physics dictates that entangled particles are linked, so that if you change the property of one by measuring it, the other will instantly change, too -- effectively making hacking impossible. In theory, the particles stay linked even if they're light-years apart, so such systems should work over great distances.

The same research team set the previous fiber record, and devised a "novel design of physical system with a new protocol" to achieve the longer distance. They simplified it by eliminating the "complicated active compensation subsystem" used in the previous model. "This enables an ultra-low quantum bit error rate (QBER) and the long-term stability against environmental noises." As a result, the system can withstand much more so-called channel loss that makes it impossible to decode encrypted messages. That in turn allowed them to extend the fiber from 28.3km to the record 102.2 km distance. "The experiment shows that intercity quantum secure direct communication through the fiber is feasible with present-day technology," the team wrote in Nature.

Spam

Americans Are Drowning In Spam (axios.com) 134

An anonymous reader quotes a report from Axios: The average American received roughly 42 spam texts just in the month of March, according to new data from RoboKiller, an app that blocks spam calls and texts. Spammers like using text messages because of their high open rates -- and are now even mimicking targets' own phone numbers to get them to click malicious links, the New York Times reported. "Just like with robocalls, it's extremely easy to deploy [spam texts] in enormous volume and hide your identity," Will Maxson, assistant director of the FTC's division of marketing practices, told Axios. "There's a large number of actors all over the world trying to squeeze spam into the network from almost an infinite number of entry points all the time."

It's not just texts. Every form of spam is on the rise. There were more spam calls last month than in any of the previous six months, per YouMail's Robocall Index. Spam emails rose by 30% from 2020 to 2021, according to a January report from the Washington Post. There was an unprecedented increase in social media scams last year, according to data from the Federal Trade Commission. Many scams were related to bogus cryptocurrency investments.

Experts attribute the sharp increase in spam to the pandemic. People's increased reliance on digital communications turned them into ready targets. The Federal Communications Commission saw a nearly 146% increase in the number of complaints about unwanted text messages in 2020. Americans reported losing $131 million to fraud schemes initiated by text in 2021, a jump over 50% from the year before, according to data from the FTC.

Social Networks

After Russia's Invasion of Ukraine, US Army Training Includes Countering Social Media Disinformation (apnews.com) 46

"In the dusty California desert, U.S. Army trainers are already using lessons learned from Russia's war against Ukraine as they prepare soldiers for future fights against a major adversary such as Russia or China," reports the Associated Press.

And their training scenarios include more than just a enemy willing to destroy a city with missiles and rockets. "The enemy force that controls the fictional town of Ujen is using a steady stream of social media posts to make false accusations against the American brigade preparing to attack." "I think right now the whole Army is really looking at what's happening in Ukraine and trying to learn lessons," said Army Secretary Christine Wormuth. Those lessons, she said, range from Russia's equipment and logistics troubles to communications and use of the internet. "The Russia-Ukraine experience is a very powerful illustration for our Army of how important the information domain is going to be," said Wormuth, who spent two days at the training center in the Mojave Desert watching an Army brigade wage war against the fictional "Denovian" forces. "We've been talking about that for about five years. But really seeing it and seeing the way Zelenskyy has been incredibly powerful.... This is a world war that the actual world can see and watch in real time.... "

Army Col. Ian Palmer said the exercise is using more drones by the friendly and enemy forces, both for surveillance and attacks. So his forces are trying to use camouflage and tuck into the terrain to stay out of sight. "You know if you can be seen, you can be shot, where ever you are," he said. Down in the makeshift town, the opposition forces are confident they can hold off Palmer's brigade despite the size difference. The Denovians only have about 1,350 forces, but they are throwing everything they have at the brigade, from jamming and other electronic warfare to insurgency attacks and propaganda.

The role-players have their phones ready to film and post quickly to social media.

The Denovian forces want to portray the unit in the worst possible light, said Taylor, and constantly twist the narrative on social media so Palmer's troops realize they are in a battle for the truth. That's a challenge, he said, because "when I've got a bunch of casualties and I'm getting overrun on my left flank and my supply trains aren't where they need to be and I can't find the bulldozers, it's hard to think about something that someone said about me on Twitter."

Security

GitHub Issues Security Alert After Spotting Misuse of Tokens Stolen from OAuth Integrators (github.blog) 16

GitHub issued a security alert Friday.

GitHub's chief security officer wrote that on Tuesday, "GitHub Security began an investigation that uncovered evidence that an attacker abused stolen OAuth user tokens issued to two third-party OAuth integrators, Heroku and Travis-CI, to download data from dozens of organizations, including npm..."

We do not believe the attacker obtained these tokens via a compromise of GitHub or its systems, because the tokens in question are not stored by GitHub in their original, usable formats. Following immediate investigation, we disclosed our findings to Heroku and Travis-CI on April 13 and 14...

Looking across the entire GitHub platform, we have high confidence that compromised OAuth user tokens from Heroku and Travis-CI-maintained OAuth applications were stolen and abused to download private repositories belonging to dozens of victim organizations that were using these apps. Our analysis of other behavior by the threat actor suggests that the actors may be mining the downloaded private repository contents, to which the stolen OAuth token had access, for secrets that could be used to pivot into other infrastructure.

We are sharing this today as we believe the attacks may be ongoing and action is required for customers to protect themselves.

The initial detection related to this campaign occurred on April 12 when GitHub Security identified unauthorized access to our npm production infrastructure using a compromised AWS API key. Based on subsequent analysis, we believe this API key was obtained by the attacker when they downloaded a set of private npm repositories using a stolen OAuth token from one of the two affected third-party OAuth applications described above. Upon discovering the broader theft of third-party OAuth tokens not stored by GitHub or npm on the evening of April 13, we immediately took action to protect GitHub and npm by revoking tokens associated with GitHub and npm's internal use of these compromised applications.

We believe that the two impacts to npm are unauthorized access to, and downloading of, the private repositories in the npm organization on GitHub.com and potential access to the npm packages as they exist in AWS S3 storage.

At this point, we assess that the attacker did not modify any packages or gain access to any user account data or credentials. We are still working to understand whether the attacker viewed or downloaded private packages.

npm uses completely separate infrastructure from GitHub.com; GitHub was not affected in this original attack. Though investigation continues, we have found no evidence that other GitHub-owned private repos were cloned by the attacker using stolen third-party OAuth tokens.

Once GitHub identified stolen third-party OAuth tokens affecting GitHub users, GitHub took immediate steps to respond and protect users. GitHub contacted Heroku and Travis-CI to request that they initiate their own security investigations, revoke all OAuth user tokens associated with the affected applications, and begin work to notify their own users.... GitHub is currently working to identify and notify all of the known-affected victim users and organizations that we discovered through our analysis across GitHub.com. These customers will receive a notification email from GitHub with additional details and next steps to assist in their own response within the next 72 hours. If you do not receive a notification, you and/or your organization have not been identified as affected.

You should, however, periodically review what OAuth applications you've authorized or are authorized to access your organization and prune anything that's no longer needed. You can also review your organization audit logs and user account security logs for unexpected or anomalous activity....

The security and trustworthiness of GitHub, npm, and the broader developer ecosystem is our highest priority. Our investigation is ongoing, and we will update this blog, and our communications with affected customers, as we learn more.

AI

Social Media Made Us Stupid - and How to Fix It (theatlantic.com) 141

Jonathan Haidt, a social psychologist at the New York University's School of Business, argues in the Atlantic that social-media platforms "trained users to spend more time performing and less time connecting." But that was just the beginning.

He now believes this ultimately fueled a viral dynamic leading to "the continual chipping-away of trust" in a democracy which "depends on widely internalized acceptance of the legitimacy of rules, norms, and institutions." The most recent Edelman Trust Barometer (an international measure of citizens' trust in government, business, media, and nongovernmental organizations) showed stable and competent autocracies (China and the United Arab Emirates) at the top of the list, while contentious democracies such as the United States, the United Kingdom, Spain, and South Korea scored near the bottom (albeit above Russia).... Mark Zuckerberg may not have wished for any of that. But by rewiring everything in a headlong rush for growth — with a naive conception of human psychology, little understanding of the intricacy of institutions, and no concern for external costs imposed on society — Facebook, Twitter, YouTube, and a few other large platforms unwittingly dissolved the mortar of trust, belief in institutions, and shared stories that had held a large and diverse secular democracy together.
In the last 10 years, the article argues, the general public — at least in America — became "uniquely stupid." And he's not just speaking about the political right and left, but within both factions, "as well as within universities, companies, professional associations, museums, and even families." The article quotes former CIA analyst Martin Gurri's comment in 2019 that the digital revolution has highly fragmented the public into hostile shards that are "mostly people yelling at each other and living in bubbles of one sort or another."

The article concludes that by now U.S. politics has entered a phase where truth "cannot achieve widespread adherence" and thus "nothing really means anything anymore--at least not in a way that is durable and on which people widely agree." It even contemplates the idea of "highly believable" disinformation generated by AI, possibly by geopolitical adversaries, ultimately evolving into what the research manager at the Stanford Internet Observatory has described as "an Information World War in which state actors, terrorists, and ideological extremists leverage the social infrastructure underpinning everyday life to sow discord and erode shared reality."

But then the article also suggests possible reforms: The Facebook whistleblower Frances Haugen advocates for simple changes to the architecture of the platforms, rather than for massive and ultimately futile efforts to police all content. For example, she has suggested modifying the "Share" function on Facebook so that after any content has been shared twice, the third person in the chain must take the time to copy and paste the content into a new post. Reforms like this...don't stop anyone from saying anything; they just slow the spread of content that is, on average, less likely to be true.

Perhaps the biggest single change that would reduce the toxicity of existing platforms would be user verification as a precondition for gaining the algorithmic amplification that social media offers. Banks and other industries have "know your customer" rules so that they can't do business with anonymous clients laundering money from criminal enterprises. Large social-media platforms should be required to do the same.... This one change would wipe out most of the hundreds of millions of bots and fake accounts that currently pollute the major platforms.... Research shows that antisocial behavior becomes more common online when people feel that their identity is unknown and untraceable.

In any case, the growing evidence that social media is damaging democracy is sufficient to warrant greater oversight by a regulatory body, such as the Federal Communications Commission or the Federal Trade Commission. One of the first orders of business should be compelling the platforms to share their data and their algorithms with academic researchers.

The members of Gen Z--those born in and after 1997--bear none of the blame for the mess we are in, but they are going to inherit it, and the preliminary signs are that older generations have prevented them from learning how to handle it.... Congress should update the Children's Online Privacy Protection Act, which unwisely set the age of so-called internet adulthood (the age at which companies can collect personal information from children without parental consent) at 13 back in 1998, while making little provision for effective enforcement. The age should be raised to at least 16, and companies should be held responsible for enforcing it. More generally, to prepare the members of the next generation for post-Babel democracy, perhaps the most important thing we can do is let them out to play. Stop starving children of the experiences they most need to become good citizens: free play in mixed-age groups of children with minimal adult supervision...

The article closes with its own note of hope — and a call to action: In recent years, Americans have started hundreds of groups and organizations dedicated to building trust and friendship across the political divide, including BridgeUSA, Braver Angels (on whose board I serve), and many others listed at BridgeAlliance.us. We cannot expect Congress and the tech companies to save us. We must change ourselves and our communities.
Space

NASA Will Test SpinLaunch's Ability To Fling Satellites Into Orbit (newatlas.com) 85

NASA has signed up to test SpinLaunch's extraordinary whirl 'n' hurl space launch technology, which accelerates a launch vehicle to hypersonic speeds using an electric centrifuge instead of a rocket, hurling it skyward like a space discus. New Atlas reports: The idea behind SpinLaunch is as staggering as the company's name is appropriate. The idea of winding up and throwing satellites most of the way into orbit just boggles the mind. But in initial testing, this company's kinetic launch system, which looks externally a lot like a turbocharger, has shown promise as an environmentally-friendly, and potentially cost-effective replacement for first-stage rocket launches. [T]he company says it'll be appropriate for smaller launch vehicles weighing up to about 440 lb (200 kg), carrying ultra-ruggedized satellites capable of dealing with the forces involved. The SpinLaunch system will do the first part, flinging them high into the air, where a second-stage rocket can take over and give them the final push into orbit.

And the advantages are pretty compelling. SpinLaunch says that eliminating the first-stage rocket from the launch vehicle will cut out some 70 percent of the fuel and structures needed by a traditional launch vehicle, and that it can get appropriate loads into orbit using a quarter of the fuel, and at a tenth of the price. NASA is one of many parties interested in this possibility, and it's now signed a Space Act agreement with SpinLaunch to develop and integrate a NASA payload for this kinetic launch system, which will be flung skyward from Spaceport America, New Mexico, in a test flight later this year.

This, like all SpinLaunch "regular" test flights to date, will be a slower sub-orbital launch with a speed closer to 1,000 mph (1,600 km/h, Mach 1.3) than 5,000 mph. The payload will be designed to take a range of measurements, which will be analyzed by both groups. All non-proprietary information learned from this test will be published, and SpinLaunch says it's working towards its first orbital launch in 2025.
A render posted late last year by SpinLaunch shows how their system works.
Social Networks

WhatsApp To Launch 'Communities' (techcrunch.com) 5

Meta is throwing billions of dollars into building out the metaverse as the future of social networking but in the near term, the tech giant is looking toward the power of messaging to connect users in a more personal way. From a report: On that front, the company today introduced its plans for a significant update to its WhatsApp messaging app that will allow users to now not only connect privately with friends and family, as before, but also participate in larger discussion groups, called Communities. These groups aim to serve as a more feature-rich replacement for people's larger group chats with added support for tools like file-sharing of up to 2GB, 32-person group calls, emoji reactions, as well as admin tools and moderation controls, among other things.

The feature has been under development for some time as the next big iteration for the WhatsApp platform, meant to capitalize on the app's existing end-to-end encryption as well as users' growing desire to join private communities outside of larger social platforms, like Facebook. In particular, Communities could present a challenge to other messaging apps like Telegram -- which has recently become a prominent player in communications related to the Russia-Ukraine war -- in addition to other private messaging platforms, like iMessage or Signal, as well as apps like GroupMe, Band, Remind and others used to communicate with groups.

Communications

Russia Is Jamming GPS Satellite Signals In Ukraine, US Space Force Says (space.com) 136

An anonymous reader quotes a report from Space.com: Another piece of space infrastructure for Ukraine is under attack, according to an NBC report. Jammers from Russian forces besieging the country are targeting global positioning system (GPS) satellite signals that are used for navigation, mapping and other purposes, the report said, quoting the U.S. Space Force. "Ukraine may not be able to use GPS because there are jammers around that prevent them from receiving any usable signal," Gen. David Thompson, the Space Force's vice chief of space operations, told NBC Nightly News Monday (April 11). "Certainly the Russians understand the value and importance of GPS and try to prevent others from using it," Thompson added. He noted that Russia has not directly attacked any satellites in orbit, but the Space Force is keeping an eye out for such possibilities.

Specifically, Russia is targeting the Navstar system of satellites used by the United States and made available openly to many countries around the world, Thompson said. (Russia has its own independent system, called GLONASS, while the Europeans have one called Galileo and China has one called Beidou.) Navstar uses 24 main satellites that each orbit the Earth every 12 hours. The system works by sending synchronized signals to users on Earth. Because the satellites move in different directions, the user receives their signals at slightly different times. When four satellites are available, GPS receivers can use their signals to calculate the user's position, often to within just a few feet.
In late February shortly after Russia's invasion of Ukraine began, SpaceX's Starlink satellites were activated over the country to help restore internet services destroyed by the Russians. SpaceX CEO Elon Musk later warned that Starlink user terminals in Ukraine could be targeted by Russia and advised users to take precautions.
IT

Inside the Longest Atlassian Outage of All Time (pragmaticengineer.com) 94

Gergely Orosz: We are in the middle of the longest outage Atlassian has had. Close to 400 companies and anywhere from 50,000 to 400,000 users had no access to JIRA, Confluence, OpsGenie, JIRA Status page, and other Atlassian Cloud services. The outage is its 9th day, having started on Monday, 4th of April. Atlassian estimates many impacted customers will be unable to access their services for another two weeks. At the time of writing, 45% of companies have seen their access restored. For most of this outage, Atlassian has gone silent in communications across their main channels such as Twitter or the community forums. It took until Day 9 for executives at the company to acknowledge the outage.

While the company stayed silent, outage news started trending in niche communities. In these forums, people tried to guess causes of the outage, wonder why there is full radio silence, and many took to mocking the company for how it is handling the situation. Atlassian did no better with communicating with customers during this time. Impacted companies received templated emails and no answers to their questions. After I tweeted about this outage, several Atlassian customers turned to me to vent about the situation, and hope I can offer more details. Customers claimed how the company's statements made it seem they received support, which they, in fact, did not. Several customers hoped I could help get the attention of the company which had not given them any details, beyond telling them to wait weeks until their data is restored.

Privacy

DuckDuckGo's Privacy-Centric Browser Arrives on Mac (theverge.com) 38

DuckDuckGo's privacy-focused browsing app is available in beta on Mac, but you'll have to join a private waitlist to gain access. From a report: Just like the mobile browsing app, DuckDuckGo on Mac uses the DuckDuckGo search engine by default, automatically blocks web trackers, and comes with the famous "Fire" button that burns up your browsing history and tabs in a single click. The browsing app also comes with a new feature that's supposed to help block those pesky cookie consent pop-ups that appear when you first open a website. DuckDuckGo says it will clear them on 50 percent of sites, while automatically selecting the option that blocks or minimizes the cookies that track you. Allison Goodman, the senior communications manager at DuckDuckGo, told The Verge that the company plans on increasing this coverage "significantly" as the beta progresses. You'll also gain access to a privacy feed that appears on DuckDuckGo's homepage.
Crime

US Extradites Man Who Allegedly Sold Backdoored Phones For The FBI (vice.com) 27

The United States has extradited a man it accuses of working for Anom, a company that sold encrypted phones to criminals but which was secretly backdoored by the FBI to spy on the communications of organized crime around the globe. Aurangzeb Ayub quietly arrived in the U.S. last month, according to court records reviewed by Motherboard. From the report: Ayub is the first of 17 alleged Anom workers to be extradited since Motherboard reported on the operation, known as Trojan Shield, and the FBI and its law enforcement partners held press conferences on its success in June. While authorities have arrested and prosecuted users of the Anom devices, Ayub's extradition is some judicial movement regarding those who allegedly sold phones for Anom, some of whom the U.S. Department of Justice has also charged. "Ayub is charged with 16 other co-defendants; he is the first defendant to appear on the Indictment and was extradited from the Netherlands to the United States," a court document filed on Tuesday reads. He first appeared in the Southern District of California on March 21, the document adds.

The Department of Justice and Ayub's defense team have already discussed the production of discovery, which includes all of Ayub's communications on the Anom platform, according to court records. That material contains around 3,500 communications and about 14GB of data, the court records add. By last Friday, the government was expected to turn over these messages to Ayub's defense team, the document reads. The court record adds that the Department of Justice anticipates that it will turn over more material in May, which will contain recorded conversations between an FBI confidential human source (CHS) and Ayub, a technical report about the Anom platform, and other reports. [...] Ayub is charged under RICO, a law traditionally used to prosecute mob bosses. Since 2018 when the FBI started shutting down encrypted phone companies initially with Phantom Secure, the Department of Justice has leveled similar charges against the administrators and sellers for such companies.

Wireless Networking

Black Market SIM Cards Turned a Zimbabwean Border Town Into a Remote Work Hub (restofworld.org) 11

Zimbabwe's mobile data is so expensive, people have to rely on a signal from the next country over, Mozambique. Rest of World: Econet and NetOne had a combined 94.5% market share at the end of 2020, according to the national telecomms regulator. Analysts say that the lack of competition, combined with the high cost of running a telecomms business in Zimbabwe -- due to import tariffs on communications equipment, foreign currency risk, and weak infrastructure -- has kept prices high for consumers. "Poor collateral infrastructure, like electricity, dissuades telecomms investment and [means] fewer players, which leads to higher costs," Arthur Gwagwa, a leading Zimbabwe telecomms expert and lawyer, told Rest of World. The cripplingly high cost of internet access has slowed adoption of digital services by individuals and businesses and prevented Zimbabweans from accessing educational materials and health services online, Gwagwa said.

But for people living near the border with Mozambique, there is a workaround. Enterprising traders cross over on foot or on motorbikes, bulk-buy Movitel SIM cards, and return to Chimanimani, where they distribute the SIMs to supermarkets and corner shops, where they are sold with a markup of more than 50%. The availability of affordable internet has made the unfashionable rural district into an attractive destination for people who need to be online for work. The area was hit by a tropical cyclone in 2019, which displaced more than 11,000 people in Chimanimani alone, bringing hundreds of NGO and health workers to the area to work on the relief. Many have stayed, taking advantage of the cheap internet access to work remotely. [...] Nollen Singo, founder of NGO Orphans Dreams, which gives free math lessons to children orphaned by the cyclone, said that he's been able to stay in the region because the cheap internet allows him to connect to free education apps that can be used in the classroom. "It's so helpful being able to access Khan Academy maths app or Buzzmath app online and tutor local orphaned kids," Singo said.

Slashdot Top Deals