×
Government

Russian Government Sites Facing 'Unprecedented' Cyberattacks from Thousands in Pro-Ukranian 'IT Army' (msn.com) 116

Though the Russian government has tried geofencing access to crucial web sites, the Jerusalem Post reports that two Russian government web site still went offline Saturday — the Kremlin and the Ministry of Defense. "Gosuslugi, Russia's web portal of state services, went offline on Saturday night as well, with the Russian Ministry of Digital Development, Communications and Mass Media telling TASS that the site is facing cyberattacks on an 'unprecedented scale.'"

Meanwhile, the Washington Post interviews 22-year-old Alex Horlan, a Ukrainian cybersecurity expert in Spain "helping take down some of Russia's most powerful websites — including state media and even the official page of the Kremlin." The attacks he and others are helping to carry out on Russian websites are part of a wide information war in the background of the much larger conflict here, as Ukrainians target Russian websites to rewrite the narrative Moscow is presenting to Russians back home. "We are creating an IT army," Ukrainian Vice Prime Minister Mykhailo Fedorov tweeted on Saturday. Horlan is a cybersecurity expert who recently launched an app called disBalancer that helps take down scam websites by overwhelming them with online traffic. He has redirected his team's efforts in recent days to instead target Russian websites he says are spreading dangerous disinformation about the Russian invasion of Ukraine....

Thousands of people are joining Horlan and others' efforts to target the Russian sites, with around 2,000 logging into his app at any given time, he said. The main challenge is that many are losing WiFi when air raid sirens force them to retreat to underground bunkers....

Volunteers are gathering information on attacks and casualties to fact check and challenge Russia's version of events, posting messages on Telegram and other Russian social media platforms [according to Liuba Tsbulska, a Ukrainian analyst and activist who has tracked Russian disinformation for eight year]. Others work to educate international audiences or produce patriotic content. Some also target Russian military and intelligence officers, flooding their emails and other platforms with messages. Volunteers are reaching out to the mothers of Russian soldiers to convince them to call for Russian President Vladimir Putin to bring their boys back home.

In Kharkiv, after reports that Russian troops and armored vehicles entered Ukraine's second largest city early Sunday, one local Telegram channel with more than 400,000 subscribers urged people to continue to document the adversary's movements as a way to aid Ukraine's forces in the area. In one message, the Truha Kharkiv channel asked citizens to "carefully film and send information about the movement of Russian troops to our channel. This is vital to the defense of our city."

Another message instructed citizens on how to make molotov cocktails.

Power

How Vulnerable is the US Power Grid? (cbsnews.com) 127

America's power grid consists of 3,000 public and private sector power companies, with 55,000 substations scattered across the country. On the CBS News show 60 Minutes, reporter Bill Whitaker notes that each grid hold grid-powering transformers — then tells the story of "the most serious attack on our power grid in history" on the night of April 16, 2013: For 20 minutes, gunmen methodically fired at high voltage transformers at the Metcalf Power substation. Security cameras captured bullets hitting the chain link fence.

Jon Wellinghoff: They knew what they were doing. They had a specific objective. They wanted to knock out the substation.

At the time, Jon Wellinghoff was chairman of FERC, the Federal Energy Regulatory Commission, a small government agency with jurisdiction over the U.S. high voltage transmission system.... [T]he attackers had reconnoitered the site and marked firing positions with piles of rocks. That night they broke into two underground vaults and cut off communications coming from the substation.

Jon Wellinghoff: Then they went from these vaults, across this road, over into a pasture area here. There were at least four or five different firing positions.

Bill Whitaker: No real security?

Jon Wellinghoff: There was no security at all, really.

They aimed at the narrow cooling fins, causing 17 of 21 large transformers to overheat and stop working.

Jon Wellinghoff: They hit them 90 times, so they were very accurate. And they were doing this at night, with muzzle flash in their face.

Someone outside the plant heard gunfire and called 911. The gunmen disappeared without a trace about a minute before a patrol car arrived. The substation was down for weeks, but fortunately PG&E had enough time to reroute power and avoid disaster.

Bill Whitaker: If they had succeeded, what would've happened?

Jon Wellinghoff: Could've brought down all of Silicon Valley.

Bill Whitaker: We're talking Google, Apple; all these guys--

Jon Wellinghoff: Yes, yes. That's correct.

Bill Whitaker: Who do you think this could have been?

Jon Wellinghoff: I don't know. We don't know if they were a nation state. We don't know if they were domestic actors. But it was somebody who did have competent people who could in fact plan out this kind of a very sophisticated attack....

A few months before the assault on Metcalf, Jon Wellinghoff of FERC commissioned a study to see if a physical attack on critical transformers could trigger cascading blackouts... The report was leaked to the Wall Street Journal. It found the U.S. could suffer a coast-to-coast blackout if saboteurs knocked out just nine substations....

In 2016, an eco terrorist in Utah shot up a large transformer, triggering a blackout. He said he'd planned to hit five substations in one day to shut down the West Coast. In 2020, the FBI uncovered a white supremacist plot called "lights out" to simultaneously attack substations around the country.

While the threats can also come from the internet, America's deputy national security advisor for cyber (formerly at the NSA) tells the reporter "We've taken any information we have about malicious software or tactics that the Russian government has used, shared that with the private sector with very practical advice of how to protect against it."

The reporter later spoke to the president's homeland security advisor, who points out there's no specific national regulation for the power plants, arguing that one of the system's strengths is "the resources for energy are different in different regions."

But they also acknowledged the federal government is now setting standards "in a variety of arenas."
The Media

Australia's Standoff Against Google and Facebook Worked - Sort Of (arstechnica.com) 48

Remember when Google threatened to leave Australia if the country implemented a "news media bargaining code" forcing social media platforms to pay news publishers? Wired reports: Google and Facebook did not leave; they paid up, striking deals with news organizations to pay for the content they display on their sites for the first time. The code was formally approved on March 2, 2021... One year after the media code was introduced, Google has 19 content deals with news organizations and Facebook has 11, according to [Australia's communications minister Paul] Fletcher. Now countries around the world are looking at Australia's code as a blueprint of how to subsidize the news and stop the spread of "news deserts" — communities that no longer have a local newspaper.

Canada is expected to propose its own version in March. Media associations in both the U.S. and New Zealand are calling for similar policies. Reports suggest the UK culture secretary, Nadine Dorries, is also planning to require platforms to strike cash-for-content deals.

The international interest has prompted fierce debate about how well Australia's code works.

"We know it works, we can see the evidence," says Fletcher. He points to how the deals are funding journalism in rural areas. Broadcaster The ABC said its deals with Facebook and Google enabled it to hire 50 regional journalists. Google, however, disagrees. It has accused the media code of stifling media diversity by giving media giants a better deal than smaller publishers. "The primary benefactors of such a code would be a small number of incumbent media providers," Google said in a submission to the U.S. Copyright Office, which is currently reviewing its own media laws....

The criticism of Australia's system focuses on its lack of transparency, which means that media companies cannot compare notes on the deals they are offered and there is a lack of clarity on which outlets are entitled to negotiate.... Concerns about the code's flaws are leaking into Canada, where Justin Trudeau's Liberal Party is drafting its own Australia-style legislation. "We're locking down the incumbent publishers, and we're locking down Google and Facebook's dominance as opposed to countering the dominance that exists on both sides," says Dwayne Winseck, journalism professor at Canada's Carleton University.... Yet Canada's news industry is willing to overlook these limitations because it considers the cash as a lifeline, according to Paul Deegan, president and chief executive of News Media Canada.... They are running out of time to save some of the media landscape, he explains — 40 newspapers have closed permanently since the start of the pandemic. "We've got a number of titles and even chains of titles that are quite literally teetering on the brink."

Deegan agrees the code isn't perfect. This is not a magic bullet, he says, "this is a badly needed Band-Aid."

Government

Elon Musk Says SpaceX's Starlink Service is Now Active Over Ukraine (yahoo.com) 105

"Elon Musk says SpaceX's Starlink satellites are now active over Ukraine after a request from the embattled country's leadership to replace internet services destroyed by the Russian attack," reports the Independent, in a story shared by Slashdot readers schwit1 and SubMitt: Vladimir Putin's unprovoked invasion has left parts of the country without internet, while SpaceX has launched thousands of communications satellites to bring broadband to hard to reach areas of the world.

"Starlink service is now active in Ukraine. More terminals en route," the entrepreneur tweeted on Saturday.

The move came after Ukraine's vice prime minister urged Mr Musk to help them out, as the SpaceX system does not require any fiber-optic cables.

Newsweek reports that on Friday Ukraine's Vice Prime Minister also asked Apple's Tim Cook to stop providing products and services to Russians — including the Apple Store.
Social Networks

UK Social Media Users Could Get Power To Block Anonymous Accounts (theguardian.com) 43

Social media users could be cut off from other accounts on platforms such as Twitter if they do not sign up for ID verification, under government proposals to tackle anonymous trolls. From a report: Popular services including Twitter, Facebook and Instagram will be required to give users the option to opt in or opt out from receiving messages, replies and content from unverified or anonymous accounts. Verified users could also block unverified or anonymous accounts from seeing their content under the opt in/opt out proposals. This means people or organisations without verified accounts -- symbolised by a blue tick on Twitter and Instagram -- would be blocked from communicating with, or being seen by, accounts that have opted out from interactions with unverified sources.

The Department for Culture, Media and Sport said platforms had a number of options for verifying users, including using government-issued ID such as a passport to open an account or using two-factor authentication, where a platform sends a prompt to a user's mobile phone. The new system will be introduced under the online safety bill, which requires tech firms to protect users from harmful content or face the threat of substantial fines imposed by Ofcom, the communications regulator. The culture secretary, Nadine Dorries, said: "Tech firms have a responsibility to stop anonymous trolls polluting their platforms." She added: "People will now have more control over who can contact them and be able to stop the tidal wave of hate served up to them by rogue algorithms."

Businesses

ACM, Ethics, and Corporate Behavior 34

theodp writes: In the just-published March 2022 issue Communications of the ACM, former CACM Editor-in-Chief Moshe Y. Vardi takes tech companies -- and their officers and technical leaders -- to task over the societal risk posed by surveillance capitalism in "ACM, Ethics, and Corporate Behavior." Vardi writes: "Surveillance capitalism is perfectly legal, and enormously profitable, but it is unethical, many people believe, including me. After all, the ACM Code of Professional Ethics starts with 'Computing professionals' actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good.' It would be extremely difficult to argue that surveillance capitalism supports the public good."

"The biggest problem that computing faces today is not that AI technology is unethical -- though machine bias is a serious issue -- but that AI technology is used by large and powerful corporations to support a business model that is, arguably, unethical. Yet, with the exception of FAccT, I have seen practically no serious discussion in the ACM community of its relationship with surveillance-capitalism corporations. For example, the ACM Turing Award, ACM's highest award, is now accompanied by a prize of $1 million, supported by Google."

"Furthermore, the issue is not just ACM's relationship with tech companies. We must also consider how we view officers and technical leaders in these companies. Seriously holding members of our community accountable for the decisions of the institutions they lead raises important questions. How do we apply the standard of 'have not committed any action that violates the ACM Code of Ethics and ACM's Core Values' to such people? It is time for us to have difficult and nuanced conversations on responsible computing, ethics, corporate behavior, and professional responsibility."
Government

Missouri Governor's Office Responsible For Teacher Data Leak (krebsonsecurity.com) 30

An anonymous reader quotes a report from Krebs on Security: Missouri Governor Mike Parson made headlines last year when he vowed to criminally prosecute a journalist for reporting a security flaw in a state website that exposed personal information of more than 100,000 teachers. But Missouri prosecutors now say they will not pursue charges following revelations that the data had been exposed since 2011 -- two years after responsibility for securing the state's IT systems was centralized within Parson's own Office of Administration. [...]

On Monday, Feb. 21, The Post-Dispatch published the 158-page report (PDF), which concluded after 175 hours of investigation that [St. Louis Post-Dispatch reporter Josh Renaud] did nothing wrong and only accessed information that was publicly available. Emails later obtained by the Post-Dispatch showed that the FBI told state cybersecurity officials that there was "not an actual network intrusion" and the state database was "misconfigured." The emails also revealed the proposed message when education department leaders initially prepared to respond in October: "We are grateful to the member of the media who brought this to the state's attention," was the proposed quote attributed to the state's education commissioner before Parson began shooting the messenger.

The Missouri Highway Patrol report includes an interview with Mallory McGowin, the chief communications officer for the state's Department of Elementary and Secondary Education (DESE). McGowin told police the website weakness actually exposed 576,000 teacher Social Security numbers, and the data would have been publicly exposed for a decade. McGowin also said the DESE's website was developed and maintained by the Office of Administration's Information Technology Services Division (ITSD) -- which the governor's office controls directly. "I asked Mrs. McGowin if I was correct in saying the website was for DESE but it was maintained by ITSD, and she indicated that was correct," the Highway Patrol investigator wrote. "I asked her if the ITSD was within the Office of Administration, or if DESE had their on-information technology section, and she indicated it was within the Office of Administration. She stated in 2009, policy was changed to move all information technology services to the Office of Administration." The report was a vindication for Renaud and for University of Missouri-St. Louis professor Shaji Khan, who helped the Post-Dispatch verify that the security flaw existed. Khan was also a target of Parson's vow to prosecute "the hackers."
Khan's attorney Elad Gross told the publication his client was not being charged, and that "state officials committed all of the wrongdoing here."

"They failed to follow basic security procedures for years, failed to protect teachers' Social Security numbers, and failed to take responsibility, instead choosing to instigate a baseless investigation into two Missourians who did the right thing and reported the problem," Gross told The Post-Dispatch. "We thank the Missouri State Highway Patrol and the Cole County Prosecutor's Office for their diligent work on a case that never should have been sent to them."
Twitter

Trump-Backed 'Truth Social' Tops Apple's App Store Charts (cnbc.com) 294

Truth Social, a new social media platform backed by former President Donald Trump, sat at the top of Apple's free apps download charts as of Tuesday morning. CNBC reports: The platform unveiled a soft launch late Sunday, according to Reuters, with many users prompted to join a waitlist. Some who tried to sign up reported glitches when attempting to create an account, though such issues are common in early app releases. Truth Social has been delayed several times. The full launch was first planned for Feb. 21, but that date has been pushed back to March 31.

The app is a product of the Trump Media & Technology Group, led by former Rep. Devin Nunes, R-Calif. The company has planned to go public via merger with the Digital World Acquisition Corp., a special purpose acquisition corporation, or SPAC, with a market cap of more than $3 billion. DWAC disclosed in December that two financial regulators had opened probes into communications with Trump's firm prior to the deal announcement. [...] The platform aims to distinguish itself through its content moderation philosophy, with the website calling it "America's 'Big Tent' social media platform that encourages an open, free, and honest global conversation without discriminating against political ideology." Even so, Nunes previously told Fox Business the company will have content moderation to ensure it remains a "family-friendly" space.

Space

The Sun Has Erupted Non-Stop All Month, and There Are More Giant Flares Coming (sciencealert.com) 68

Over the past few weeks the sun "has undergone a series of giant eruptions that have sent plasma hurtling through space," reports Science Alert: Perhaps the most dramatic was a powerful coronal mass ejection and solar flare that erupted from the far side of the Sun on February 15 just before midnight. Based on the size, it's possible that the eruption was in the most powerful category of which our Sun is capable: an X-class flare.

Because the flare and CME were directed away from Earth, we're unlikely to see any of the effects associated with a geomagnetic storm, which occurs when material from the eruption slams into Earth's atmosphere. These include interruptions to communications, power grid fluctuations, and auroras. But the escalating activity suggests that we may anticipate such storms in the imminent future. "This is only the second farside active region of this size since September 2017," astronomer Junwei Zhao of Stanford University's helioseismology group told SpaceWeather. "If this region remains huge as it rotates to the Earth-facing side of the Sun, it could give us some exciting flares."

According to SpaceWeatherLive, which tracks solar activity, the Sun has erupted every day for the month of February, with some days featuring multiple flares. That includes three of the second-most powerful flare category, M-class flares: an M1.4 on February 12; an M1 on February 14; and an M1.3 on February 15. There were also five M-class flares in January. The mild geomagnetic storm that knocked 40 newly launched Starlink satellites from low-Earth orbit followed an M-class flare that took place on January 29.

The article suggests this is normal activity, since the sun is about halfway towards "solar maximum" (its peak of sunspot and flare activity) expected to arrive in 2025, while the "solar minimum" was in 2019.

Further Reading: SciTechDaily reports that the ESA/NASA Solar Orbiter spacecraft has now "captured the largest solar prominence eruption ever observed in a single image together with the full solar disc."

Thanks to long-time Slashdot reader schwit1 for submitting the story
Facebook

Meta Axes a Head of Global Community Development After He Appears On Video In Underage Sex Sting (techcrunch.com) 60

An anonymous reader quotes a report from TechCrunch: Meta, the parent company of Facebook, has confirmed to TechCrunch that Jeren A. Miles, who had been a manager of global community development, is no longer employed by the company after a video went viral on YouTube, which was then reposted on Reddit and other sites, featuring him in a sting operation conducted by amateurs with the intent of catching paedophiles.

The two-hour video, posted by an amateur group called PCI Predator Catchers Indianapolis on its YouTube page, does not depict Miles caught in any sex act, nor admitting to any specific sex act, nor admitting to intending to carry out any sex act. And it is not clear what the legal ramifications of this will be, if any. But it does feature two people questioning Miles, who in the course of the interrogation admits to having graphic and inappropriate communications with a 13-year-old boy. It's a damning enough exchange that Miles has subsequently deleted his social profiles on sites like Facebook and Twitter, and -- whether he was fired or resigned voluntarily -- Miles has left his role at Facebook over the matter.
"The seriousness of these allegations cannot be overstated. The individual is no longer employed with the company. We are actively investigating this situation and cannot provide further comment at this time," said a statement from a Meta spokesperson.
Security

US Agencies Say Russian Hackers Compromised Defense Contractors (wired.com) 38

Hackers backed by the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government said on Wednesday. Wired reports: The campaign began no later than January 2020 and has continued through this month, according to a joint advisory by the FBI, the National Security Agency, and the Cybersecurity and Infrastructure Security Agency. The hackers have been targeting and successfully hacking cleared defense contractors, or CDCs, which support contracts for the US Department of Defense and intelligence community. "During this two-year period, these actors have maintained persistent access to multiple CDC networks, in some cases for at least six months," officials wrote in the advisory. "In instances when the actors have successfully obtained access, the FBI, NSA, and CISA have noted regular and recurring exfiltration of emails and data. For example, during a compromise in 2021, threat actors exfiltrated hundreds of documents related to the company's products, relationships with other countries, and internal personnel and legal matters."

The exfiltrated documents included unclassified CDC-proprietary and export-controlled information. This information gives the Russian government "significant insight" into US weapons-platforms development and deployment timelines, plans for communications infrastructure, and specific technologies being used by the US government and military. The documents also include unclassified emails among employees and their government customers discussing proprietary details about technological and scientific research.

The hackers have used a variety of methods to breach their targets. The methods include harvesting network passwords through spear phishing, data breaches, cracking techniques, and exploitation of unpatched software vulnerabilities. After gaining a toehold in a targeted network, the threat actors escalate their system rights by mapping the Active Directory and connecting to domain controllers. From there, they're able to exfiltrate credentials for all other accounts and create new accounts. The hackers make use of virtual private servers to encrypt their communications and hide their identities, the advisory added. They also use "small office and home office (SOHO) devices, as operational nodes to evade detection."

Businesses

Ericsson Shares Crash After CEO Says Firm May Have Paid ISIS (bloomberg.com) 41

An anonymous reader quotes a report from Bloomberg: Ericsson may have made payments to the ISIS terror organization to gain access to certain transport routes in Iraq, in a shock admission following years of regulatory investigations. Shares in the Stockholm-based company were down almost 14.5% around lunchtime on Wednesday, its biggest drop in a day since July 2017. In an interview with newspaper Dagens Industri, chief executive officer Borje Ekholm said that Ericsson had identified "unusual expenses dating back to 2018" but the company hasn't yet determined who the final recipient of the money was. "What we are seeing is that transport routes have been purchased through areas that have been controlled by terrorist organizations, including ISIS," Ekholm added. Ekholm's comments follow a statement by the telecommunications equipment manufacturer late on Tuesday, in which the company said that it continues to "invest significantly" into a probe regarding compliance concerns in its Iraq-based operations.

The news of the internal investigation adds another embarrassment for the company following a long running corruption probe, including a $1 billion settlement in 2019. A unit of Ericsson AB pleaded guilty to a years-long campaign of bribery and corruption in Asia and the Middle East. In October last year, the matter resurfaced, after the U.S. Department of Justice accused the company of breaching the agreement by failing to provide certain documents to the D.O.J. The new suspect payments likely formed part of the same corruption probe, according to analysts at Handelsbanken. The analysts don't expect the revelations to trigger further investigations. Ekholm told the newspaper that Ericsson has spent "considerable resources trying to understand this as best we can. Financing terrorism is completely unacceptable and something we do not allow at all."

The Internet

FCC Bans Deals That Block Competition In Apartments (arstechnica.com) 59

The Federal Communications Commission has voted to ban the exclusive revenue-sharing deals between landlords and Internet service providers that prevent broadband competition in apartment buildings and other multi-tenant environments. The new ban and other rule changes were adopted in a 4-0 vote announced yesterday. Ars Technica reports: Although the FCC "has long banned Internet service providers from entering into sweetheart deals with landlords that guarantee they are the only provider in the building," evidence submitted to the commission "made it clear that our existing rules are not doing enough and that we can do more to pry open the door for providers who want to offer competitive service in apartment buildings," FCC Chairwoman Jessica Rosenworcel said in her statement on the vote. The broadband industry has sidestepped rules that already exist with "a complex web of agreements between incumbent service providers and landlords that keep out competitors and undermine choice," she said.

With the new rules, "we ban exclusive revenue sharing agreements, where the provider agrees with the building that only it and no other provider can give the building owner a cut of the revenue from the building. We also ban graduated revenue sharing agreements, which increase the percentage of revenue that the broadband provider directs to the landlord as the number of tenants served by the provider go up," Rosenworcel said. Rosenworcel had circulated the proposal to commissioners in late January. The new prohibitions on graduated and exclusive revenue-sharing agreements apply retroactively. "The rules we adopt thus prohibit providers from (1) executing new graduated or exclusive revenue sharing agreements and (2) enforcing existing graduated or exclusive revenue sharing agreements on a going forward basis," the FCC said.

Exclusive marketing agreements are still allowed, but the FCC is requiring broadband providers to disclose those agreements to tenants. "Such disclosure must be included on all written marketing material directed at tenants or prospective tenants of an MTE [multiple tenant environment] subject to the arrangement and must explain in clear, conspicuous, legible, and visible language that the provider has the right to exclusively market its communications services to tenants in the MTE, that such a right does not suggest that the provider is the only entity that can provide communications services to tenants in the MTE, and that service from an alternative provider may be available," the FCC order said. The FCC vote also closes a loophole that ISPs used to enter into exclusive wiring deals with landlords. "We clarify that sale-and-leaseback arrangements violate our existing rules that regulate cable wiring inside buildings," Rosenworcel said. "Since the 1990s, we have had rules that allow buildings and tenants to exercise choice about how to use the wiring in the building when they are switching cable providers, but some companies have circumvented these rules by selling the wiring to the building and leasing it back on an exclusive basis. We put an end to that practice today."

Security

Ukraine's Military and Banks Hit By Apparent DDoS Cyberattack Campaign (cnet.com) 45

Ukraine's Ministry of Defense website suffered from what appeared to be a distributed denial of service attack Tuesday, according to the government's Facebook account. CNET reports: The military's website remained unavailable as of 12 p.m. PT Tuesday, with the Ukrainian military's Facebook account saying work is currently underway to restore regular functioning to the online portal. The nation's largest commercial bank, PrivatBank, has also been subjected to a "massive DDoS attack" for the past few hours, according to the Ukraine Center for Strategic Communications. There's no threat to customer funds stored at the bank, it said, though the attack is preventing customers from accessing the Privat24 application and viewing their balances. Online banking with Oschadbank is also down, the Center for Strategic Communications said, as reported earlier by Vice. Nobody has yet to be blamed for the attack, but as CNET notes, "it comes after Russia is believed to have mounted multiple cyberattacks on Ukraine as part of efforts that security experts say are designed to destabilize the country's government and economy."

UPDATE (2/16/2022): America's Undersecretary of State said Wednesday that "While we're still investigating and doing forensics along with the Ukrainians, I think what's most important is that these cyberattacks were not very successful," reports CNN, which adds that the official "credited Ukrainian officials for responding quickly and helping the websites recover."
Power

Rare Form of Sulfur Offers a Key To Triple-Capacity EV Batteries (newatlas.com) 60

Engineers at Drexel University have made a breakthrough they say takes [lithium-sulfur batteries] closer to commercial use, by leveraging a rare chemical phase of sulfur to prevent damaging chemical reactions. New Atlas reports: [T]here is one problem that scientists keep running into, which is the formation of chemical compounds called polysulfides. As the battery operates, these make their way into the electrolyte -- the solution that carries the charge back and forth between the anode and cathode -- where they trigger chemical reactions that compromise the battery's capacity and lifespan. Scientists have had some success swapping out the carbonate electrolyte for an ether electrolyte, which doesn't react with the polysulfides. But this poses other problems, as the ether electrolyte itself is highly volatile and contains components with low boiling points, meaning the battery could quickly fail or meltdown if warmed above room temperature.

The chemical engineers at Drexel University have been working on another solution and it starts with the design of a new cathode, which can work with the carbonate electrolytes already in commercial use. This cathode is made from carbon nanofibers and had already been shown to slow the movement of polysulfides in an ether electrolyte. But making it work with a carbonate electrolyte involved some experimentation. The scientists attempted to confine the sulfur in the carbon nanofiber mesh to prevent the dangerous chemical reactions using a technique called vapor disposition. This didn't quite have the desired effect, but as it turned out, actually crystallized the sulfur in an unexpected way and turned it into something called monoclinic gamma-phase sulfur, a slightly altered form of the element. This chemical phase of sulfur had only been produced at high temperatures in the lab or observed in oil wells in nature. Conveniently for the scientists, it is not reactive with the carbonate electrolyte, thereby removing the risk of polysulfide formation.

The cathode remained stable across a year of testing and 4,000 charge-discharge cycles, which the scientists say is equivalent to 10 years of regular use. The prototype battery the team made featuring this cathode offered triple the capacity of a standard lithium-ion battery, paving the way for more environmentally friendly batteries that allow electric vehicles to travel much farther on each charge.
The research was published in the journal Communications Chemistry.
Games

Ubisoft's Latest Galaxy-Brain Move Is To Gift Scammy NFTs To Employees (kotaku.com) 46

Ubisoft's ongoing NFT odyssey continues to bewilder and demoralize not just longtime fans but also its own developers. The company recently held another workshop aimed specifically at addressing the concerns of skeptical employees, yet also started giving out special NFTs to some members of the Ghost Recon team to "celebrate" the series' 20th anniversary. From a report: One developer likened it to the staff saying "We hate this crypto stuff," and Ubisoft responding with, "OK, come get some." Last week, VP of Ubisoft's Strategic Innovations Lab, Nicolas Pouard, claimed in an interview that players' overwhelmingly negative reaction to the company's NFT rollout was because "they don't get it." His remark was roundly derided on social media, but also by some within the company, according to posts from Ubisoft's internal communications platform viewed by Kotaku. In addition to disagreeing with Pouard's position, they expressed frustration over the company's continued botched messaging around the controversial tech.

"They don't get it" was also the tone of a recent internal Q&A with the Quartz team aimed at addressing skeptical employees, sources familiar with the event told Kotaku. (Quartz is the name of Ubisoft's recently introduced proprietary crypto platform.) Instead, it bolstered some developers' concerns about security vulnerabilities in the Quartz technology and its lack of interesting design possibilities. Pouard and other blockchain proponents have pitched scenarios in which cosmetic items can follow players between games. That's not something current Quartz NFTs are set up to do, however, and according to sources, Pouard admitted internally that the "interoperability" question remains unanswered. In the meantime, the core use-case for Quartz NFTs remains in-game hats.

Math

Researchers Use Tiny Magnetic Swirls To Generate True Random Numbers (phys.org) 72

A group of Brown University physicists has developed a technique that can potentially generate millions of random digits per second by harnessing the behavior of skyrmions -- tiny magnetic anomalies that arise in certain two-dimensional materials. Phys.Org reports: Their research, published in Nature Communications, reveals previously unexplored dynamics of single skyrmions, the researchers say. Discovered around a half-decade ago, skyrmions have sparked interest in physics as a path toward next-generation computing devices that take advantage of the magnetic properties of particles -- a field known as spintronics. [...] Skyrmions arise from the "spin" of electrons in ultra-thin materials. Spin can be thought of as the tiny magnetic moment of each electron, which points up, down or somewhere in between. Some two-dimensional materials, in their lowest energy states, have a property called perpendicular magnetic anisotropy -- meaning the spins of electrons all point in a direction perpendicular to the film. When these materials are excited with electricity or a magnetic field, some of the electron spins flip as the energy of the system rises. When that happens, the spins of surrounding electrons are perturbed to some extent, forming a magnetic whirlpool surrounding the flipped electron -- a skyrmion.

Skyrmions, which are generally about 1 micrometer (a millionth of a meter) or smaller in diameter, behave a bit like a kind of particle, zipping across the material from side to side. And once they're formed, they're very difficult to get rid of. Because they're so robust, researchers are interested in using their movement to perform computations and to store data. This new study shows that in addition to the global movement of skyrmions across a material, the local behavior of individual skyrmions can also be useful. For the study, which was led by Brown postdoctoral fellow Kang Wang, the researchers fabricated magnetic thin films using a technique that produced subtle defects in the material's atomic lattice. When skyrmions form in the material, these defects, which the researchers call pinning centers, hold the skyrmions firmly in place rather than allowing them to move as they normally would.

The researchers found that when a skyrmion is held in place, they fluctuate randomly in size. With one section of the skyrmion held tightly to one pinning center, the rest of the skyrmion jumps back and forth, wrapping around two nearby pinning centers, one closer and one farther away. The change in skyrmion size is measured through what's known as the anomalous Hall effect, which is a voltage that propagates across the material. This voltage is sensitive to the perpendicular component of electron spins. When the skyrmion size changes, the voltage changes to an extent that is easily measured. Those random voltage changes can be used to produce a string of random digits. The researchers estimate that by optimizing the defect-spacing in their device, they can produce as many as 10 million random digits per second, providing a new and highly efficient method of producing true random numbers.

Piracy

Search Engines In Russia Will Deindex All Domains That Have 100+ Links To Pirated Content (torrentfreak.com) 49

Major rightsholders and internet companies in Russia have signed a new memorandum of cooperation designed to make pirated movies, TV shows and other content harder to find. In addition to automatically removing reported infringing links within hours, search engines have agreed to completely deindex all domains that carry 100 or more links to infringing content. TorrentFreak reports: Signed in 2018, a memorandum of cooperation signed by major rightsholders and internet companies including Yandex changed the way infringing content is handled. Following the creation of a centralized database of pirated content, the Internet companies agreed to query it every few minutes in order to remove corresponding content from their platforms within six hours. Over a period of three years, more than 40 million infringing links have now been removed from search results. Since its introduction, the memorandum has been renewed several times alongside calls for the system to be opened up to a wider range of rightsholders, such as those operating in the publishing sector. While that is yet to happen, a new memorandum has just been signed by the original signatories containing an even more powerful anti-piracy tool.

Under the current agreement (which is set to expire early September 2022), rightsholders must submit specific URLs to infringing content to the centralized database controlled by the Media Communications Union (ISS). These specific URLs are then delisted by search engines but rightsholders complain that the same content can reappear under a new URL, meaning that the process must be repeated. To deal with this type of 'pirate' countermeasure, the new memorandum requires search companies to take more stringent action. Any domain that has 100 or more 'pirate' links reported to the database will be deindexed entirely by search engines, meaning that they essentially become invisible to anyone using a search engine. This must be carried out quickly too, within 24 hours according to ISS. Given the number of links to infringing content posted to non-pirate sites, safeguards will also be introduced to protect legitimate resources from deindexing. These include media sites, government projects, search engines themselves, social networks, and official content providers.
"Alongside the development of the memorandum a new law is being drafted, with the aim of enshrining its voluntary terms into local law," adds TorrentFreak. "That should allow other rightsholders that aren't current signatories to obtain similar benefits. At the time of writing, however, progress on the legal front is taking its time and might still take a few more months."
China

FCC's 'Rip and Replace' for ZTE and Huawei Balloons To $5.6B (lightreading.com) 68

Today, Chairwoman Jessica Rosenworcel notified Congress that providers have initially requested approximately $5.6 billion from the Secure and Trusted Communications Networks Reimbursement Program to cover the costs of removing, replacing, and disposing of insecure equipment and services in U.S. networks. From a report: "Last year Congress created a first-of-its kind program for the FCC to reimburse service providers for their efforts to increase the security of our nations communications networks," said Chairwoman Rosenworcel. "We've received over 181 applications from carriers who have developed plans to remove and replace equipment in their networks that pose a national security threat. While we have more work to do to review these applications, I look forward to working with Congress to ensure that there is enough funding available for this program to advance Congress's security goals and ensure that the U.S. will continue to lead the way on 5G security."
Security

A Month After Ransomware Attack, Hundreds of Workers Are Still Owed Pay (nbcnews.com) 40

NBC News tells the story of Rich, a Coca-Cola delivery driver who didn't get a paycheck at Christmas because of a ransomware attack on the payroll company serving Coke's largest distributor.

But then "more than a month after hackers crippled Kronos," paychecks to its employees in Indiana, Ohio and West Virginia "have been sporadic, according to union representatives." Rich, who asked not to be identified by his last name for fear of retaliation from his employer, is among hundreds of workers who deliver Coke products in at least three states who say they're still owed wages — fallout from one of the many ransomware attacks that hit U.S. companies practically every day. Rich, a father of three, said he's had to dip into his savings, which have dwindled down in recent weeks. "They went from $1,100, $1,200 a week to $300, $600," he said of his paychecks. "I got one $300 paycheck, and I called and told them exactly what I needed paid, and they sent me a $46 check...."

"We've got 130 people and they've all got problems," said Max Zemla, the president of the Cleveland-area Teamsters Local 293. "Some are telling me they're not as bad off. I have a guy who's off a thousand dollars. Uses his money for his kid's tuition for school, and he's not able to pay it...."

"The timekeeping vendor Kronos that suffered the attack is in the process of coming back online," [said Josh Gelinas, Coca-Cola Consolidated's vice president of communications February 1st] in an emailed statement. "But, until these digital systems are fully restored, we must continue manually recording work hours for thousands of our teammates. This process is taking longer than we would like and may have resulted in some inconsistencies, but our teammates will be paid for every hour they've worked...."

[NBC reports that a spokesperson for Kronos "noted that the company announced on Jan. 22 that it had finally restored all its services."]

Jeff Combs, the secretary treasurer of Teamsters Local 135 in Indianapolis, said the vast majority of the roughly 200 Coca-Cola Consolidated employees he represents are still owed pay. "Some are still owed as high as $4,700," Combs said.

Rich complains to NBC News that "now my savings have dwindled down because a billion-dollar company can't give you an average paycheck." But it shows ransomware's effects ultimately reach farther than we realize. "It's often assumed that ransomware mainly affects governments and major corporations because it's those incidents that make the news," a ransomware analyst at Emsisoft tells NBC News.

"The reality, however, is that more than half of all ransomware victims are small businesses and individuals. And, unfortunately, they are usually not as well prepared to deal with the problem as larger organizations and probably feel more pain as a result."

Slashdot Top Deals