×
Social Networks

Leaked Documents Show Russians Boasted Just 1% of Fake Social Profiles are Detected (msn.com) 69

"The Russian government has become far more successful at manipulating social media and search engine rankings than previously known," reports the Washington Post, "boosting lies about Ukraine's military and the side effects of vaccines with hundreds of thousands of fake online accounts, according to documents recently leaked on the chat app Discord.

"The Russian operators of those accounts boast that they are detected by social networks only about 1 percent of the time, one document says." That claim, described here for the first time, drew alarm from former government officials and experts inside and outside social media companies contacted for this article. "Google and Meta and others are trying to stop this, and Russia is trying to get better. The figure that you are citing suggests that Russia is winning," said Thomas Rid, a disinformation scholar and professor at Johns Hopkins University's School of Advanced International Studies. He added that the 1 percent claim was likely exaggerated or misleading.

The undated analysis of Russia's effectiveness at boosting propaganda on Twitter, YouTube, TikTok, Telegram and other social media platforms cites activity in late 2022 and was apparently presented to U.S. military leaders in recent months. It is part of a trove of documents circulated in a Discord chatroom and obtained by The Washington Post. Air National Guard technician Jack Teixeira was charged Friday with taking and transmitting the classified papers, charges for which he faces 15 years in prison...

Many of the 10 current and former intelligence and tech safety specialists interviewed for this article cautioned that the Russian agency whose claims helped form the basis for the leaked document may have exaggerated its success rate.

The leaked document was apparently prepared by the Joint Chiefs of Staff, U.S. Cyber Command and Europe Command, which directs American military activities in Europe. "It refers to signals intelligence, which includes eavesdropping, but does not cite sources for its conclusions," the Post reports, describing the document as offering "a rare candid assessment by U.S. intelligence of Russian disinformation operations."

The assessment concludes that foreign bots "view, 'like,' subscribe and repost content and manipulate view counts to move content up in search results and recommendation lists." And the document says a Russian center's disinformation network — working directly for Russia's presidential administration — was still working on improvements as recently as late 2022 and expected to improve its ability to "promote pro-Russian narratives abroad." After Russia's 2016 efforts to interfere in the U.S. presidential election, social media companies stepped up their attempts to verify users, including through phone numbers. Russia responded, in at least one case, by buying SIM cards in bulk, which worked until companies spotted the pattern, employees said. The Russians have now turned to front companies that can acquire less detectable phone numbers, the document says.

A separate top-secret document from the same Discord trove summarized six specific influence campaigns that were operational or planned for later this year by a new Russian organization, the Center for Special Operations in Cyberspace. The new group is mainly targeting Ukraine's regional allies, that document said. Those campaigns included one designed to spread the idea that U.S. officials were hiding vaccine side effects, intended to stoke divisions in the West.

China

New Leaked Documents on Discord Reveal More Chinese Spy Balloons (msn.com) 43

The Washington Post found a new tranche of "top-secret intelligence documents" on Discord, and based on them reported Friday that U.S. intelligence agencies were aware of at least two additional Chinese spy balloons.

Based on the classified documents, the Post also reports that "questions lingered about the true capabilities of the one that flew over the continental United States in January and February." The Chinese spy balloon that flew over the United States this year, called Killeen-23 by U.S. intelligence agencies, carried a raft of sensors and antennas the U.S. government still had not identified more than a week after shooting it down, according to a document allegedly leaked to a Discord chatroom by Jack Teixeira, a member of the Massachusetts Air National Guard.

Another balloon flew over a U.S. carrier strike group in a previously unreported incident, and a third crashed in the South China Sea, a second top-secret document stated, though it did not provide specific information for launch dates.... [Chinese spy balloon] Bulger-21 carried sophisticated surveillance equipment and circumnavigated the globe from December 2021 until May 2022, the NGA document states. Accardo-21 carried similar equipment as well as a "foil-lined gimbaled" sensor, it says....

Annotating what appear to be detailed photos of the balloon that flew over the United States, presumably taken from a U-2 spy plane, intelligence analysts assessed that it could generate enough power to operate "any" surveillance and reconnaissance technology, including a type of radar that can see at night and through clouds and thin materials [including tarps].... China's military has operated a vast surveillance balloon project for several years, partly out of Hainan province off China's south coast, U.S. officials have previously told The Post.

But the NGA document is notable as much for what it doesn't say, reflecting the government's possible lack of insight, at least in mid-February, into the balloons' capabilities... The lack of detailed conclusions about the balloon's surveillance capabilities raises questions about the decision to let it fly over the United States before shooting it down, an action the Defense Department justified at the time as an opportunity to collect additional intelligence.

The Post also reports that another leaked document (relying on intercepted communications) assessed that within the Chinese military the balloon surveillance program lacked "strong leadership" oversight.
Sci-Fi

Pentagon Official Floats a Theory For Unexplained Sightings: Alien Motherships (politico.com) 118

The official in charge of a secretive Pentagon effort to investigate unexplained aerial incursions has co-authored an academic paper that presents an out-of-this-world theory: Recent objects could actually be alien probes from a mothership sent to study Earth. Politico reports: In a draft paper dated March 7 (PDF), Sean Kirkpatrick, head of the Pentagon's All-domain Anomaly Resolution Office, and Harvard professor Avi Loeb teamed up to write that the objects, which appear to defy all physics, could be "probes" from an extraterrestrial "parent craft." It's unusual for government officials, especially those involved in the nascent effort to collect intelligence on recent sightings, to discuss the possibility of extraterrestrial life, although top agency officials don't rule it out when asked. After Loeb posted it online, the paper gained notoriety from a post on Military Times and has also circulated among science-focused news outlets.

More than half of the five-page paper is devoted to discussing the possibility that the unexplained objects DoD is studying could be the "probes" in the mothership scenario, including most of the page-long introduction. One section is titled: "The Extraterrestrial Possibility" and another "Propulsion Methods." Kirkpatrick's involvement in the academic paper demonstrates that the Pentagon is open to scientific debate of the origins of UFOs, an important signal to send to the academic world, experts said. But they add that his decision to attach his name to a theory considered in most academic circles to be highly unsubstantiated also raises questions about AARO's credibility.

The paper explains that interstellar objects such as the cigar-shaped "Oumuamua" that scientists spotted flying through the galaxy in 2017 "could potentially be a parent craft that releases many small probes during its close passage to Earth." The paper goes on to compare the probes to "dandelion seeds" that could be separated from the parent craft by the sun's gravitational force. It examines the physics of how the smaller craft could move through the Earth's atmosphere to reach the surface, where they could be spotted by humans. The paper notes that the "probes" could use starlight to "charge their batteries" and the Earth's water as fuel. It also speculates on the motive for aliens to send exploratory probes to Earth. "What would be the overarching purpose of the journey? In analogy with actual dandelion seeds, the probes could propagate the blueprint of their senders," the authors write. "As with biological seeds, the raw materials on the planet's surface could also be used by them as nutrients for self-replication or simply scientific exploration."

The Military

Leader of Online Group Where Secret Documents Leaked Is Air National Guardsman (nytimes.com) 182

An anonymous reader quotes a report from the New York Times: The leader of a small online gaming chat group where a trove of classified U.S. intelligence documents leaked over the last few months is a 21-year-old member of the intelligence wing of the Massachusetts Air National Guard, according to interviews and documents reviewed by The New York Times. The National Guardsman, whose name is Jack Teixeira, oversaw a private online group called Thug Shaker Central, where about 20 to 30 people, mostly young men and teenagers, came together over a shared love of guns, racist online memes and video games. On Thursday afternoon, about a half-dozen F.B.I. agents pushed into a residence in North Dighton, Mass. Attorney General Merrick B. Garland later said in a short statement that Airman Teixeira had been arrested "without incident." Federal investigators had been searching for days for the person who leaked the top secret documents online.

Starting months ago, one of the users uploaded hundreds of pages of intelligence briefings into the small chat group, lecturing its members, who had bonded during the isolation of the pandemic, on the importance of staying abreast of world events. [...] The Times spoke with four members of Thug Shaker Central, one of whom said he had known the person who leaked for at least three years, had met him in person and referred to him as the O.G. The friends described him as older than most of the group members, who were in their teens, and the undisputed leader. One of the friends said the O.G. had access to intelligence documents through his job. While the gaming friends would not identify the group's leader by name, a trail of digital evidence compiled by The Times leads to Airman Teixeira. The Times has been able to link Airman Teixeira to other members of Thug Shaker Central through his online gaming profile and other records. Details of the interior of Airman Teixeira's childhood home -- posted on social media in family photographs -- also match details on the margins of some of the photographs of the leaked secret documents.

Members of Thug Shaker Central who spoke to The Times said that the documents they discussed online were meant to be purely informative. While many pertained to the war in Ukraine, the members said they took no side in the conflict. The documents, they said, started to get wider attention only when one of the teenage members of the group took a few dozen of them and posted them to a public online forum. From there they were picked up by Russian-language Telegram channels and then The Times, which first reported on them. The person who leaked, they said, was no whistle-blower, and the secret documents were never meant to leave their small corner of the internet. "This guy was a Christian, antiwar, just wanted to inform some of his friends about what's going on," said one of the person's friends from the community, a 17-year-old recent high school graduate. "We have some people in our group who are in Ukraine. We like fighting games; we like war games."

Democrats

Ukrainian Hackers Compromised Russian Spy Who Hacked Democrats In 2016 (reuters.com) 72

An anonymous reader quotes a report from Reuters: Ukrainian hackers claim to have broken into the emails of a senior Russian military spy wanted by the Federal Bureau of Investigation for hacking the Hillary Clinton campaign and other senior U.S. Democrats ahead of Donald Trump's election to the presidency in 2016. In a message posted to Telegram on Monday, a group calling itself Cyber Resistance said it had stolen correspondence from Lt. Col. Sergey Morgachev, who was charged in 2018 with helping organize the hack and leak of emails from the Democratic National Committee (DNC) and the Clinton campaign.

InformNapalm said in an article about the breach that it had confirmed Morgachev's identity by poring through personnel files and a curriculum vitae stolen by the hackers, including one document that identified him as a department head in Unit 26165 -- the same position which the FBI accused him of holding in 2018. [...] It wasn't immediately clear what information the hackers had managed to steal or how significant it was. Morgachev's inbox could potentially hold insight into Russia's hacking operations, including the operation against Clinton and the Democrats.

In its indictment, the FBI described him as an officer in the Russia's military spy agency, still known by its old acronym, GRU. It said his department was "dedicated to developing and managing malware," including the "X-Agent" spy software used to hack the DNC. In its message announcing the theft, the group said of Morgachev: "A very cool and clever hacker, but ... We hacked him."

Role Playing (Games)

Leaked Classified Documents Also Include Roleplaying Game Character Stats (vice.com) 59

An anonymous reader quotes a report from Motherboard: Over the past month, classified Pentagon documents have circulated on 4chan, Telegram, and various Discord servers. The documents contain daily intelligence briefings, sensitive information about Ukrainian military positions, and a handwritten character sheet for a table-top roleplaying game. No one knows who leaked the Pentagon documents or how. They appeared online as photographs of printed pages, implying someone printed them out and removed them from a secure location, similar to how NSA translator Reality Winner leaked documents. The earliest documents Motherboard has seen are dated February 23, though the New York Times and Bellingcat reported that some are dated as early as January. According to Bellingcat, the earliest known instances of the leaks appearing online can be traced back to a Discord server.

At some point, a Discord user uploaded a zip file of 32 images from the leak onto a Minecraft Discord server. Included in this pack alongside highly sensitive, Top Secret and other classified documents about the Pentagon's strategy and assessment of the war in Ukraine, was a handwritten piece of paper that appeared to be a character sheet for a roleplaying game. It's written on a standard piece of notebook paper, three holes punched out on the side, blue lines crisscrossing the page. The character's name is Doctor "Izmer Trotzky," his character class is "Professor Scientist." They've got a strength of 5, a charisma of 4, and 19 rubles to their name. Doctor Trotzky has 10 points in first aid and occult skills, and 24 in spot hidden. He's carrying a magnifying glass, a fountain pen, a sword cane, and a deringer. [...]

But what game is it from? Motherboard reached out to game designer Jacqueline Bryk to find out. Bryk is an award-winning designer of roleplaying games who has worked on Kult: Divinity Lost, Changeling: the Lost, Fading Suns: Pax Alexius, and Vampire: the Masquerade. "I strongly suspect this is Call Of Cthulhu," Bryk said when first looking at the sheet. Call of Cthulhu (COC) is an RPG based on the work of H.P. Lovecraft where players attempt to stave off madness while investigating eldritch horrors. "This is a pretty classic Professor build. The sword cane really clinches it for me. I notice he's currently carrying a derringer and a dagger but took no points in firearms or fighting. I'm not sure which edition this is but it seems like the most he could do with his weapons is throw them."
"After some research, Bryk concluded that the game is a homebrewed combination of COC and the Fallout tabletop game based on the popular video game franchise," adds Motherboard. "My best guest here is Fallout: Cthulhu the Homebrew," Bryk said, giving the home designed game a name.
The Military

Better Electronic Sensors Mean Militaries Need Better Camouflage (livemint.com) 72

Long-time Slashdot reader SpzToid shares a new report from the Economist: Thanks to innovations such as fractal colouration patterns, which mimic nature by repeating shapes at different scales, the distance from which naked eyes can quickly spot soldiers wearing the best camouflage has shrunk, by one reckoning, by a fifth over the past two decades. That is impressive. On today's battlefields, however, it is no longer enough to merely hide from human eyes.

People and kit are given away as well by signals beyond the visual spectrum, and devices that detect these wavelengths are getting better, lighter and cheaper. Thermal sensors are a case in point. Today, one that costs about $1,000 and weighs as little as five sachets of sugar can, in good weather, detect a warm vehicle as far off as 10km. As Hans Kariis, deputy head of signatures research at the Swedish Defence Research Agency, notes, that is well beyond the range at which a small drone would be spotted. Two decades ago, he adds, a less sensitive thermal sensor weighing a kilogram cost ten times as much.

And then there's automatic target-detection software, the article points out, like the Kestrel software deployed in more than 3,500 aircraft around the world, which "scans feeds of visual, infrared and radar data, and places red boxes around people and other potential targets, even as their positions in the frame move." And the threat has only increased with the arrival of satellite-based synthetic-aperture-radar (SAR) imagery.

But then the article lists examples of new camouflage that now tricks electronic sensors:
  • Military vehicles affix hexagon-shaped sheets that can be cooled with electricity to blend into the temperature of their surroundings.
  • Camouflage netting that absorbs (some) incoming radar beams with semi-conducting polymers while reducing heat signatures with insulation — and reflecting back the cooler temperature of the ground.
  • Netherlands-based TNO makes "battery-powered sniper suits" embedded with 500 LEDs that match the luminosity and color of the surroundings using real-time data from a helmet camera.

Communications

How Much Data Did the Chinese Spy Balloon Collect? (nbcnews.com) 50

Long-time Slashdot reader schwit1 shared this report from NBC News: The Chinese spy balloon that flew across the U.S. was able to gather intelligence from several sensitive American military sites, despite the Biden administration's efforts to block it from doing so, according to two current senior U.S. officials and one former senior administration official. China was able to control the balloon so it could make multiple passes over some of the sites (at times flying figure-eight formations) and transmit the information it collected back to Beijing in real time, the three officials said.

The intelligence China collected was mostly from electronic signals, which can be picked up from weapons systems or include communications from base personnel, rather than images, the officials said. The three officials said China could have gathered much more intelligence from sensitive sites if not for the administration's efforts to move around potential targets and obscure the balloon's ability to pick up their electronic signals by stopping them from broadcasting or emitting signals.

America's Department of Defense "directed NBC News to comments senior officials made in February that the balloon had 'limited additive value' for intelligence collection by the Chinese government 'over and above what [China] is likely able to collect through things like satellites in low earth orbit.'"
United States

Classified US Documents Leaked on 4chan, Telegram, Discord, and Twitter (msn.com) 133

America's Department of Justice just launched an investigation into the leaking of classified documents from the U.S. Department of Defense, reports the Washington Post.

"On Wednesday, images showing some of the documents began circulating on the anonymous online message board 4chan and made their way to at least two mainstream social media platforms, Telegram and Twitter." Earlier Friday, The Washington Post obtained dozens of what appeared to be photographs showing classified documents, dating to late February and early March, that range from worldwide intelligence briefings to tactical-level battlefield updates and assessments of Ukraine's defense capabilities. They outline information about the Ukrainian and Russian militaries, and include highly sensitive U.S. analyses about China and other nations. The materials also reference highly classified sources and methods that the United States uses to collect such information, alarming U.S. national security officials who have seen them.... The material that appeared online includes photographs of documents labeled "Secret" or "Top Secret," and began appearing on Discord, a chat platform popular with gamers, according to a Post review.

In some cases, it appears that the slides were manipulated. For instance, one image features combat casualty data suggesting the number of Russian soldiers killed in the war is far below what the Pentagon publicly has assessed. Another version of the image showed higher Russian casualty figures. Besides the information on casualties that appeared to be manipulated to benefit the Russian government, U.S. officials who spoke to The Post said many of the leaked documents did not appear to be forged and looked consistent in format with CIA World Intelligence Review reports distributed at high levels within the White House, Pentagon and the State Department....

The documents appear to have been drawn from multiple reports and agencies, and concern matters other than Ukraine. Two pages, for example, are purportedly a "CIA Operations Center Intelligence Update," and includes information about events concerning Russia, Hungary and Iran.... Rachel E. VanLandingham, a former Air Force attorney and expert on military law, said that whoever is responsible for the leak "is in a world of hurt." Such breaches, she said, constitute "one of the most serious crimes that exist regarding U.S. national security...."

Skepticism abounded Friday among both Russian and Ukrainian officials aware of reports about the leaks, with each side accusing the other of being involved in a deliberate act of disinformation.

The Post notes one defense official told them "hundreds — if not thousands" of people had access to the documents, so their source "could be anyone."

But the photographs received by the Post were apparently taken from printed documents, and "classified documents may only be printed from computers in a secure facility, and each transaction is electronically logged, said Glenn Gerstell, a former general counsel with the National Security Agency who emphasized that he was speaking only about general procedures. "The fact that the documents were printed out should significantly narrow the universe of the initial inquiry."
China

US Military Prepares for Space Warfare As Potential Threats Grow From China (wsj.com) 52

America's Department of Defense "is gearing up for a future conflict in space," reports the Wall Street Journal, "as China and Russia deploy missiles and lasers that can take out satellites and disrupt military and civilian communications." The White House this month proposed a $30 billion annual budget for the U.S. Space Force, almost $4 billion more than last year and a bigger jump than for other services including the Air Force and the Navy.... A key aim of a stand-alone force was to plan, equip and defend U.S. interests in space for all of the services and focus attention on the emerging threats. For the first time, the spending request also includes plans for simulators and other equipment to train Guardians, as Space Force members are known, for potential battle....

Just as it is on Earth, China is the Pentagon's big worry in space. In unveiling a defense strategy late last year, the Biden administration cast China as the greatest danger to U.S. security. In space, the threats from China range from ground-launched missiles or lasers that could destroy or disable U.S. satellites, to jamming and other cyber interference and attacks in space, said Pentagon officials. China has invested heavily in its space program, with a crewed orbiting station, developing ground-based missiles and lasers as well as more surveillance capabilities. This is part of its broader military aims of denying adversaries access to space-based assets.

China is "testing on-orbit satellite systems which could be weaponized as they have already shown the capability to physically control and move other satellites," Gen. Chance Saltzman, chief of space operations for the U.S. Space Force, told a congressional hearing this month. "There's nothing we can do in space that's of any value if the networks that process the information and data are vulnerable to attack," Gen. Saltzman said. A central part of the Space Force's next tranche of military contracts for rocket launches is protecting them from attacks by China and other adversaries. The hope is to make satellites tougher to approach by adversaries' equipment as well as less susceptible to lasers and jamming from space or the ground, said Space Force leaders.

The article also notes the US Defense Department "is moving away from a small number of school bus-size satellites to a planned constellation of hundreds of smaller ones.

"The larger number of targets makes any one satellite less crucial to the network but also requires changes in the capabilities of the satellites themselves, the rockets that put them into orbit and the communications systems they host."
Crime

Truck Thief Gunned Down by Owner After AirTag Gives Away Location (appleinsider.com) 497

"A Texas truck theft ended in gun fire after the suspected thief was tracked down by thevehicle's owner's AirTag," reports AppleInsider: San Antonio police received a stolen vehicle report at around 1 pm from a Braesview home. However, before police could recover the stolen truck, the owners of the vehicle decided to perform their own investigation, using an AirTag left in the truck to do so. The unnamed owners tracked the truck to a shopping center in Southeast Military Drive, reports KSAT. However, rather than wait for police to arrive, the truck owners decided to approach the vehicle and confront the suspect.

While it is unknown exactly what happened, Police say it seems the suspected thief may have pulled out their own firearm. The vehicle owner responded by shooting and killing the suspect while they were inside the truck. It is unclear whether the vehicle owner will face charges over the matter, and an investigation is ongoing into whether the suspect actually had a weapon in the first place.

The San Antonio police department's public information officer offered these remarks (in a video from KSAT):

"Most importantly is, to the public, SAPD is urging you if you are to get your vehicle stolen: I know that it's frustrating, but please do not take matters into your own hands like this. Our police department has plenty of resources that could go into finding your vehicle, i.e. our drone system, trackers ourselves, very good patrolmen that look for these kind of things. It's never safe to take matters into your own hands, as you can see today by this incident.... That's why I urge the public, wait for police in this matter. Let us go with you. We have the training. We know exactly how to determine what's going to happen, these kind of factors and situations, and we know how to handle them."
China

China's Chip Industry Will Be 'Reborn' Under US Sanctions, Says Huawei (cnbc.com) 58

An anonymous reader quotes a report from CNBC: China's chip industry will be "reborn" as a result of U.S. sanctions, a top boss at Huawei said Friday, as the Chinese telecommunications giant confirmed a breakthrough in semiconductor design technology. Eric Xu, rotating chairman at Huawei, issued fighting words against Washington's tech export restrictions on China. "I believe China's semiconductor industry will not sit idly by, but take efforts around ... self-strengthening and self reliance," according to an official translation of Xu's comments during a press conference. "For Huawei, we will render our support to all such self-saving, self-strengthening and self reliance efforts of the Chinese semiconductor industry."

The U.S. is concerned that China could use advanced semiconductors for military purposes. Huawei's Xu said these developments could boost, rather than hamper China's domestic semiconductor industry. "I believe China's semiconductor industry will get reborn under such sanctions and realize a very strong and self-reliant industry," Xu said.
Last week, Huawei claimed to have completed work on electronic design automation tools for laying out and making chips down to 14nm process nodes.

"But Huawei ideally needs chips of a much smaller nanometer size for more advanced applications, which they are currently finding it difficult to obtain," adds Reuters. "The company is still reeling from the effects of U.S. sanctions -- on Friday, it said net profit dropped 69% year-on-year in 2022, marking the biggest decline on record."
Japan

Japan Restricts Chipmaking Equipment Exports as It Aligns With US China Curbs (reuters.com) 12

Japan said on Friday it will restrict exports of 23 types of semiconductor manufacturing equipment, aligning its technology trade controls with a U.S. push to curb China's ability to make advanced chips. From a report: Japan, home to major chip equipment makers such as Nikon and Tokyo Electron, did not specify China as the target of the restrictions, saying manufacturers would need to seek export permission for all regions. "We are fulfilling our responsibility as a technological nation to contribute to international peace and stability," Minister for Economy, Trade and Industry Yasutoshi Nishimura told a news conference. Japan wants to stop its advanced technology being used for military purposes and does not have a specific country in mind, he said. But the decision, coming ahead of a weekend visit to Beijing by Japanese Minister for Foreign Affairs Yoshimasa Hayashi, will be seen as a major win for the U.S., which in October announced sweeping restrictions on access to chipmaking technology to slow China's technological and military advances.
Security

'Vulkan Files' Leak Reveals Putin's Global and Domestic Cyberwarfare Tactics (theguardian.com) 42

"The Gaurdian reports on a document leak from Russian cyber 'security' company Vulkan," writes Slashdot reader Falconhell. From the report: Inside the six-storey building, a new generation is helping Russian military operations. Its weapons are more advanced than those of Peter the Great's era: not pikes and halberds, but hacking and disinformation tools. The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin's cyberwarfare capabilities.

Thousands of pages of secret documents reveal how Vulkan's engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company's work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia's foreign intelligence organization.

One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks. Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia's command, and also enables disinformation via fake social media profiles. A third Vulkan-built system -- Crystal-2V -- is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: "The level of secrecy of processed and stored information in the product is 'Top Secret'."

United States

Russia Arrests Wall Street Journal Reporter on Spying Charge (apnews.com) 86

Russia's security service arrested an American reporter for The Wall Street Journal on espionage charges, the first time a U.S. correspondent has been detained on spying accusations since the Cold War. The newspaper denied the allegations. From a report: Evan Gershkovich was detained in the Ural Mountains city of Yekaterinburg while allegedly trying to obtain classified information, the Federal Security Service, known by the acronym FSB, said Thursday. The service, which is the top domestic security agency and main successor to the Soviet-era KGB, alleged that Gershkovich "was acting on the U.S. orders to collect information about the activities of one of the enterprises of the Russian military-industrial complex that constitutes a state secret." Kremlin spokesman Dmitry Peskov told reporters Wednesday: "It is not about a suspicion, is it about the fact that he was caught red-handed." "The Wall Street Journal vehemently denies the allegations from the FSB and seeks the immediate release of our trusted and dedicated reporter, Evan Gershkovich," the newspaper said. "We stand in solidarity with Evan and his family."
The Military

Norway Company Can't Produce Ukraine Ammunition Because of TikTok (theguardian.com) 258

quonset writes: In what has to be one of the most inconceivable confluences ever, the Norwegian company Nammo says it is unable to expand its production of artillery shells to support Ukraine because of "cat videos" on TikTok. To placate European scrutiny, TikTok is opening two data centers in Europe to house European user data locally. One of those data centers is in the Hamar region of Norway. Because of this expansion, there is no excess capacity for the factory to ramp up production of artillery shells.

"The chief executive of Nammo, which is co-owned by the Norwegian government, said a planned expansion of its largest factory in central Norway hit a roadblock due to a lack of surplus energy, with the construction of TikTok's new data centre using up electricity in the local area," reports the Guardian. "Elvia, the local energy provider, confirmed to the Financial Times that the electricity network had no spare capacity after allocating it to the data center on a first-come, first-served basis. Additional capacity would take time to become available."
"We are concerned because we see our future growth is challenged by the storage of cat videos," Morten Brandtzaeg told the Financial Times.
Technology

Russia Supplies Iran With Cyber Weapons as Military Cooperation Grows (wsj.com) 50

Russia is helping Iran gain advanced digital-surveillance capabilities as Tehran seeks deeper cooperation on cyberwarfare, WSJ reported Tuesday, citing people familiar with the matter said, adding another layer to a burgeoning military alliance that the U.S. sees as a threat. From the report: The potential for cyberwarfare collaboration comes after Iran has, according to U.S. and Iranian officials, sold Russia drones for use in Ukraine, agreed to provide short-range missiles to Moscow and shipped tank and artillery rounds to the battlefield. Tehran is seeking the cyber help along with what U.S. and Iranian officials have said are requests for dozens of elite Russian attack helicopters and jet fighters and aid with its long-range missile program.

Russia and Iran both have sophisticated cyber capabilities and have long collaborated with each other, signing a cyber-cooperation agreement two years ago that analysts said focused mostly on cyber-defense networks. Moscow has long resisted sharing digital-offensive capabilities with Iran in the past, for fear they will end up being sold later on the dark web, the people said. Since the start of the war in Ukraine, Russia has provided Iran with communication-surveillance capabilities as well as eavesdropping devices, advanced photography devices and lie detectors, people familiar with the matter said. Moscow has likely already shared with Iran more advanced software that would allow it to hack the phones and systems of dissidents and adversaries, the people said. Russian authorities have determined that the benefits of advancing the military relationship with Iran outweigh any downsides, the people said.

The Military

US Military Needs 7th Branch Just For Cyber, Leaders Say (therecord.media) 120

An anonymous reader quotes a report from the Record: A national association of current and former military digital security leaders is calling on Congress to establish a separate cyber service, arguing that the lack of one creates an "unnecessary risk" to U.S. national security. In a March 26 memorandum, the Military Cyber Professional Association urged lawmakers to establish a U.S. Cyber Force in this year's annual defense policy bill.

"For over a decade, each service has taken their own approach to providing United States Cyber Command forces to employ and the predictable results remain inconsistent readiness and effectiveness," according to the group, which boasts around 3,700 members. "Only a service, with all its trappings, can provide the level of focus needed to achieve optimal results in their given domain," the memo states. "Cyberspace, being highly contested and increasingly so, is the only domain of conflict without an aligned service. How much longer will our citizenry endure this unnecessary risk?"

The creation of a Cyber Force would follow the arrival of the Space Force in 2019. It was the first new branch of the U.S. military in 72 years, bringing the total to six. The association's missive is likely to spark fresh debate on Capitol Hill, where an increasing number of policymakers see a cyber-specific military service as an inevitability. [..] In its memo, the association says that while "steps should be taken to establish such a service, with urgency, pursuing it in a hasty manner would likely prove to be a source of great disruption and risk to our own forces and operations." Therefore, any legislative approval of a Cyber Force should be accompanied by a "thorough study to determine what this military service should look like, how it be implemented, and the applicable timeline," according to the group.

The Internet

The New US-China Proxy War Over Undersea Internet Cables (reuters.com) 43

400 undersea cables carry 95% of the world's international internet traffic, reports Reuters (citing figures from Washington-based telecommunications research firm TeleGeography).

But now there's "a growing proxy war between the United States and China over technologies that could determine who achieves economic and military dominance for decades to come." In February, American subsea cable company SubCom LLC began laying a $600-million cable to transport data from Asia to Europe, via Africa and the Middle East, at super-fast speeds over 12,000 miles of fiber running along the seafloor. That cable is known as South East Asia-Middle East-Western Europe 6, or SeaMeWe-6 for short. It will connect a dozen countries as it snakes its way from Singapore to France, crossing three seas and the Indian Ocean on the way. It is slated to be finished in 2025.

It was a project that slipped through China's fingers....

The Singapore-to-France cable would have been HMN Tech's biggest such project to date, cementing it as the world's fastest-rising subsea cable builder, and extending the global reach of the three Chinese telecom firms that had intended to invest in it. But the U.S. government, concerned about the potential for Chinese spying on these sensitive communications cables, ran a successful campaign to flip the contract to SubCom through incentives and pressure on consortium members.... It's one of at least six private undersea cable deals in the Asia-Pacific region over the past four years where the U.S. government either intervened to keep HMN Tech from winning that business, or forced the rerouting or abandonment of cables that would have directly linked U.S. and Chinese territories....

Justin Sherman, a fellow at the Cyber Statecraft Initiative of the Atlantic Council, a Washington-based think tank, told Reuters that undersea cables were "a surveillance gold mine" for the world's intelligence agencies. "When we talk about U.S.-China tech competition, when we talk about espionage and the capture of data, submarine cables are involved in every aspect of those rising geopolitical tensions," Sherman said.

Space

Russia's Space Program Is In Big Trouble (wired.com) 126

schwit1 writes:

Crippled by war and sanctions, Russia now faces evidence that its already-struggling space program is falling apart. In the past three months alone, Roscosmos has scrambled to resolve two alarming incidents. First, one of its formerly dependable Soyuz spacecraft sprang a coolant leak. Then the same thing happened on one of its Progress cargo ships. The civil space program's Soviet predecessor launched the first person into orbit, but with the International Space Station (ISS) nearing the end of its life, Russia's space agency is staring into the abyss.

"What we're seeing is the continuing demise of the Russian civil space program," says Bruce McClintock, a former defense attache at the US embassy in Moscow and current head of the Space Enterprise Initiative of the Rand Corporation, a nonprofit research organization. Around 10 years ago, Russian leaders chose to prioritize the country's military space program -- which focuses on satellite and anti-satellite technologies -- over its civilian one, McClintock says, and it shows.

Russia's space fleet is largely designed to be expendable. The history of its series of Soyuz rockets and crew capsules (they both have the same name) dates back to the Soviet era, though they've gone through upgrades since. Its Progress cargo vessels also launch atop Soyuz rockets. The cargo ships, crewed ships, and rockets are all single-use spacecraft. Anatoly Zak, creator and publisher of the independent publication RussianSpaceWeb, estimates that Roscosmos launches about two Soyuz vehicles per year, takes about 1.5 to 2 years to build each one, and doesn't keep a substantial standing fleet.

While Roscosmos officials did not respond to interview requests, the agency has been public about its recent technical issues.

Plus this, which failed to make headlines here: "For crewed launches, Russia has long depended on its Baikonur spaceport in neighboring Kazakhstan. But the nation has charged costly annual fees, and in March Kazakhstan seized Russian spaceport assets, reportedly due to Roscosmos' debt."


Slashdot Top Deals