The Military

Russian Forces Suffer Radiation Sickness After Digging Trenches and Fishing in Chernobyl (independent.co.uk) 177

The Independent reports: Russian troops who dug trenches in Chernobyl forest during their occupation of the area have been struck down with radiation sickness, authorities have confirmed.

Ukrainians living near the nuclear power station that exploded 37 years ago, and choked the surrounding area in radioactive contaminants, warned the Russians when they arrived against setting up camp in the forest. But the occupiers who, as one resident put it to The Times, "understood the risks" but were "just thick", installed themselves in the forest, reportedly carved out trenches, fished in the reactor's cooling channel — flush with catfish — and shot animals, leaving them dead on the roads...

In the years after the incident, teams of men were sent to dig up the contaminated topsoil and bury it below ground in the Red Forest — named after the colour the trees turned as a result of the catastrophe... Vladimir Putin's men reportedly set up camp within a six-mile radius of reactor No 4, and dug defensive positions into the poisonous ground below the surface.

On 1 April, as Ukrainian troops mounted counterattacks from Kyiv, the last of the occupiers withdrew, leaving behind piles of rubbish. Russian soldiers stationed in the forest have since been struck down with radiation sickness, diplomats have confirmed. Symptoms can start within an hour of exposure and can last for several months, often resulting in death.

Space

Droids for Space? Startup Plans Satellites With Robotic Arms For Repairs and Collecting Space Junk (msn.com) 19

The Boston Globe reports on a 25-person startup pursuing an unusual solution to the problem of space junk: "Imagine if every car we ever created was just left on the road," said aerospace entrepreneur Jeromy Grimmett. "That's what we're doing in space." Grimmett's tiny company, Rogue Space Systems Corp., has devised a daring solution. It's building "orbots" — satellites with robotic arms that can fly right up to a disabled satellite and fix it. Or these orbots could use their arms to collect orbiting rubble left behind by hundreds of previous launches — dangerous junk that's become a hazard to celestial navigation...

Rogue Space aims to catch up fast, with help from Small Business Technology Transfer funds from the SpaceWERX Orbital Prime initiative. Created by the U.S. Space Force, Orbital Prime seeks to build up U.S. private-sector firms that can protect national security by maintaining military satellites and clearing hazardous space debris.

Its first 10-pound, proof-of-concept satellite will launch later this year, the article points out, "to test sensors and software to confirm the system can identify and track other satellites." But "the real excitement will begin later this year" when the company launches a prototype that's four times larger that will "use maneuvering thrusters to test the extremely precise navigation needed to approach a satellite."

And then in late 2024 or early 2025 the company will launch its 660-pound satellite "with robotic arms for fixing other satellites or for dragging debris to a lower orbit, where it will fall back to Earth."
AI

Nuke-Launching AI Would Be Illegal Under Proposed US Law 77

A group of Senators on Wednesday announced bipartisan legislation that seeks to prevent an AI system from making nuclear launch decisions. "The Block Nuclear Launch by Autonomous Artificial Intelligence Act would prohibit the use of federal funds for launching any nuclear weapon by an automated system without 'meaningful human control,'" reports Ars Technica. From the report: The new bill builds on existing US Department of Defense policy, which states that in all cases, "the United States will maintain a human 'in the loop' for all actions critical to informing and executing decisions by the President to initiate and terminate nuclear weapon employment." The new bill aims to codify the Defense Department principle into law, and it also follows the recommendation of the National Security Commission on Artificial Intelligence, which called for the US to affirm its policy that only human beings can authorize the employment of nuclear weapons.

"While US military use of AI can be appropriate for enhancing national security purposes, use of AI for deploying nuclear weapons without a human chain of command and control is reckless, dangerous, and should be prohibited," Buck said in a statement. "I am proud to co-sponsor this legislation to ensure that human beings, not machines, have the final say over the most critical and sensitive military decisions."
AI

Palantir Demos AI To Fight Wars (vice.com) 80

An anonymous reader quotes a report from Motherboard: Palantir, the company of billionaire Peter Thiel, is launching Palantir Artificial Intelligence Platform (AIP), software meant to run large language models like GPT-4 and alternatives on private networks. In one of its pitch videos, Palantir demos how a military might use AIP to fight a war. In the video, the operator uses a ChatGPT-style chatbot to order drone reconnaissance, generate several plans of attack, and organize the jamming of enemy communications. In Palantir's scenario, a "military operator responsible for monitoring activity within eastern Europe" receives an alert from AIP that an enemy is amassing military equipment near friendly forces. The operator then asks the chatbot to show them more details, gets a little more information, and then asks the AI to guess what the units might be.

"They ask what enemy units are in the region and leverage AI to build out a likely unit formation," the video said. After getting the AI's best guess as to what's going on, the operator then asks the AI to take better pictures. It launches a Reaper MQ-9 drone to take photos and the operator discovers that there's a T-80 tank, a Soviet-era Russia vehicle, near friendly forces. Then the operator asks the robots what to do about it. "The operator uses AIP to generate three possible courses of action to target this enemy equipment," the video said. "Next they use AIP to automatically send these options up the chain of command." The options include attacking the tank with an F-16, long range artillery, or Javelin missiles. According to the video, the AI will even let everyone know if nearby troops have enough Javelins to conduct the mission and automate the jamming systems. [...]

What Palantir is offering is the illusion of safety and control for the Pentagon as it begins to adopt AI. "LLMs and algorithms must be controlled in this highly regulated and sensitive context to ensure that they are used in a legal and ethical way," the pitch said. According to Palantir, this control involves three pillars. The first claim is that AIP will be able to deploy these systems into classified networks and "devices on the tactical edge." It claims it will be able to parse both classified and real-time data in a responsible, legal, and ethical way. According to the video, users will then have control over what every LLM and AI in the Palantir-backed system can do. "AIP's security features what LLMs and AI can and cannot see and what they can and cannot do," the video said. "As operators take action, AIP generates a secure digital record of operations. These capabilities are crucial for mitigating significant legal, regulatory, and ethical risks in sensitive and classified settings.

News

'High Risk of Biological Hazard' In Sudan After Fighters Seize Biolab, WHO Says (vice.com) 50

The World Health Organization (WHO) said there's a "high risk of biological hazard" in Khartoum, the capitol of Sudan, after a biolab containing deadly pathogens was seized by fighters. From a report: There's a war in Sudan right now as two rival generals struggle for power. After a week of fighting, one of the factions has seized the National Public Health Laboratory which contains samples of measles, cholera, polio, and other diseases. Now, lab workers are unable to return to the facility and secure the hazardous materials. "This is the main concern: no accessibility to the lab technicians to go to the lab and safely contain the biological material and substances available," Nima Saeed Abid, the WHO's representative in Sudan, told reporters on Tuesday.

According to the lab's website, it contains "reference laboratories related to the control of some diseases such as polio, measles, tuberculosis, malaria and AIDS." The lab is engaged in various aspects of studying and controlling diseases, including identifying pathogens, testing for them, and sending samples to international labs. The work is aimed at preventing and identifying possible epidemics, and the lab works with the WHO. The fighting in Sudan has already killed 459 people and injured 4,072, and the release of a deadly pathogen would lead to more suffering. The fighting is between generals Abdel Fattah Burhan and Mohammed Hamdan Dagalo. Burhan is the head of the country's military and Dagalo is the leader of a paramilitary group called the Rapid Support Forces. The RSF got its start as a Janjaweed militia, an Arab fighting group that operated in Darfur.

United States

US Department of Homeland Security is Now Studying How to Make Use of AI (cnbc.com) 59

America's Department of Homeland Security "will establish a new task force to examine how the government can use artificial intelligence technology to protect the country," reports CNBC.

The task force was announcement by department secretary Alejandro Mayorkas Friday during a speech at a Council on Foreign Relations event: "Our department will lead in the responsible use of AI to secure the homeland," Mayorkas said, while also pledging to defend "against the malicious use of this transformational technology." He added, "As we do this, we will ensure that our use of AI is rigorously tested to avoid bias and disparate impact and is clearly explainable to the people we serve...."

Mayorkas gave two examples of how the task force will help determine how AI could be used to fine-tune the agency's work. One is to deploy AI into DHS systems that screen cargo for goods produced by forced labor. The second is to use the technology to better detect fentanyl in shipments to the U.S., as well as identifying and stopping the flow of "precursor chemicals" used to produce the dangerous drug.

Mayorkas asked Homeland Security Advisory Council Co-Chair Jamie Gorelick to study "the intersection of AI and homeland security and deliver findings that will help guide our use of it and defense against it."

The article also notes that earlier this week America's defense department hired a former Google AI cloud director to serve as its first advisor on AI, robotics, cloud computing and data analytics.
The Military

Leaker of US Documents Shared More Secrets Earlier in a Discord Group with 600 Members (japantimes.co.jp) 119

Remember that U.S. Air National Guardsman who's suspected of leaking classified documents? The New York Times has discovered "a previously undisclosed chat group on Discord" where the same airman apparently also posted "sensitive information" including "secret intelligence on the Russian war effort," this time to a group with 600 members — and "months earlier than previously known," in February of 2022. The case against Airman Teixeira, 21, who was arrested on April 13, pertains to the leaking of classified documents on another Discord group of about 50 members, called Thug Shaker Central. There, he began posting sensitive information in October 2022, members of the group told The Times. His job as an information technology specialist at an Air Force base in Massachusetts gave him top secret clearance... The user claimed to be posting information from the National Security Agency, the Central Intelligence Agency and other intelligence agencies.

The additional information raises questions about why authorities did not discover the leaks sooner, particularly since hundreds more people would have been able to see the posts... The exposure of some of America's most closely guarded secrets has prompted criticism about how the Pentagon and intelligence agencies protect classified data, and whether there are weaknesses in both vetting people for security clearances and enforcing the mantra that access to secrets should only be given to people with a "need to know."

Unlike Thug Shaker Central, the second chat room was publicly listed on a YouTube channel and was easily accessed in seconds... Apparently eager to impress others in the group who questioned his analysis, he said: "I have a little more than open source info. Perks of being in a USAF intel unit," referring to the United States Air Force... At times, he appeared to be posting from the military base where he was stationed... Airman Teixeira also claimed that he was actively combing classified computer networks for material on the Ukraine war.

When one of the Discord users urged him not to abuse his access to classified intelligence, Teixeira replied: "too late...."

The Times says they learned about the larger chat room "from another Discord user."
Communications

China Building Cyberweapons To Hijack Enemy Satellites, Says US Leak (arstechnica.com) 38

An anonymous reader quotes a report from Ars Technica: China is building sophisticated cyber weapons to "seize control" of enemy satellites, rendering them useless for data signals or surveillance during wartime, according to a leaked US intelligence report. The US assesses that China's push to develop capabilities to "deny, exploit or hijack" enemy satellites is a core part of its goal to control information, which Beijing considers to be a key "war-fighting domain." The CIA-marked document, which was issued this year and has been reviewed by the Financial Times, was one of dozens allegedly shared by a 21-year-old US Air Guardsman in the most significant American intelligence disclosures in more than a decade. A cyber capability of this nature would far exceed anything Russia has deployed in Ukraine, where electronic warfare teams have taken a brute-force approach with little effect.

These attacks, first developed in the 1980s, attempt to drown out signals between low-orbit SpaceX satellites and their on-ground terminals by broadcasting on similar frequencies from truck-borne jamming systems such as the Tirada-2. China's more ambitious cyber attacks aim to mimic the signals that enemy satellites receive from their operators, tricking them into either being taken over completely or malfunctioning during crucial moments in combat. The classified US document said this cyber capability would allow China "to seize control of a satellite, rendering it ineffective to support communications, weapons, or intelligence, surveillance, and reconnaissance systems." The US has never disclosed whether it has similar capabilities.

Taiwan, which has taken note of how indispensable satellite communications have been to the Ukrainian military, is seeking to build out communications infrastructure that can survive an attack from China. It is courting investors to establish its own satellite provider, while experimenting with non-geostationary satellite receivers in 700 locations around Taiwan to guarantee bandwidth in the event of war or disasters, the Financial Times reported in January. China's goals, according to the leaked assessment, [...] would seek to knock out the ability of satellites -- which tend to operate in interconnected clusters -- to communicate with each other, to relay signals and orders to weapons systems, or to send back visual and intercepted electronic data, according to experts.
"China understands the superiority that the United States has in the space and cyber domains, so they are very interested in not only improving their own capabilities but in capitalizing on what we refer to as a first-mover advantage in both domains," said Moore, now a visiting professor at Vanderbilt University in Tennessee.

"They are working on all the capabilities that they want to have from a defensive and offensive standpoint, and from an ISR [intelligence, surveillance, and reconnaissance] standpoint. They're firing on all cylinders," he said.
United States

A Tech Industry Pioneer Sees a Way for the US To Lead in Advanced Chips (nytimes.com) 17

Ivan Sutherland played a key role in foundational computer technologies. Now he sees a path for America to claim the mantle in "superconducting" chips. From a report: It has been six decades since Ivan Sutherland created Sketchpad, a software system that foretold the future of interactive and graphical computing. In the 1970s, he played a role in rallying the computer industry to build a new type of microchip with hundreds of thousands of circuits that would become the foundation of today's semiconductor industry. Now Dr. Sutherland, who is 84, believes the United States is failing at a crucial time to consider alternative chip-making technologies that would allow the country to reclaim the lead in building the most advanced computers.

By relying on supercooled electronic circuits that switch without electrical resistance and as a consequence generate no excess heat at higher speeds, computer designers will be able to circumvent the greatest technological barrier to faster machines, he claims. "The nation that best seizes the superconducting digital circuit opportunity will enjoy computing superiority for decades to come," he and a colleague recently wrote in an essay that circulated among technologists and government officials. Dr. Sutherland's insights are significant partly because decades ago he was instrumental in helping to create today's dominant approach to making computer chips.

In the 1970s, Dr. Sutherland, who was chairman of the computer science department at the California Institute of Technology, and his brother Bert Sutherland, then a research manager at a division of Xerox called the Palo Alto Research Center, introduced the computer scientist Lynn Conway to the physicist Carver Mead. They pioneered a design based on a type of transistor, known as complementary metal-oxide semiconductor, or CMOS, which was invented in the United States. It made it possible to manufacture the microchips used by personal computers, video games and the vast array of business, consumer and military products. Now Dr. Sutherland is arguing that an alternative technology that predates CMOS, and has had many false starts, should be given another look. Superconducting electronics was pioneered at the Massachusetts Institute of Technology in the 1950s and then pursued by IBM in the 1970s before being largely abandoned. At one point, it even made an odd international detour before returning to the United States.

Social Networks

Leaked Documents Show Russians Boasted Just 1% of Fake Social Profiles are Detected (msn.com) 69

"The Russian government has become far more successful at manipulating social media and search engine rankings than previously known," reports the Washington Post, "boosting lies about Ukraine's military and the side effects of vaccines with hundreds of thousands of fake online accounts, according to documents recently leaked on the chat app Discord.

"The Russian operators of those accounts boast that they are detected by social networks only about 1 percent of the time, one document says." That claim, described here for the first time, drew alarm from former government officials and experts inside and outside social media companies contacted for this article. "Google and Meta and others are trying to stop this, and Russia is trying to get better. The figure that you are citing suggests that Russia is winning," said Thomas Rid, a disinformation scholar and professor at Johns Hopkins University's School of Advanced International Studies. He added that the 1 percent claim was likely exaggerated or misleading.

The undated analysis of Russia's effectiveness at boosting propaganda on Twitter, YouTube, TikTok, Telegram and other social media platforms cites activity in late 2022 and was apparently presented to U.S. military leaders in recent months. It is part of a trove of documents circulated in a Discord chatroom and obtained by The Washington Post. Air National Guard technician Jack Teixeira was charged Friday with taking and transmitting the classified papers, charges for which he faces 15 years in prison...

Many of the 10 current and former intelligence and tech safety specialists interviewed for this article cautioned that the Russian agency whose claims helped form the basis for the leaked document may have exaggerated its success rate.

The leaked document was apparently prepared by the Joint Chiefs of Staff, U.S. Cyber Command and Europe Command, which directs American military activities in Europe. "It refers to signals intelligence, which includes eavesdropping, but does not cite sources for its conclusions," the Post reports, describing the document as offering "a rare candid assessment by U.S. intelligence of Russian disinformation operations."

The assessment concludes that foreign bots "view, 'like,' subscribe and repost content and manipulate view counts to move content up in search results and recommendation lists." And the document says a Russian center's disinformation network — working directly for Russia's presidential administration — was still working on improvements as recently as late 2022 and expected to improve its ability to "promote pro-Russian narratives abroad." After Russia's 2016 efforts to interfere in the U.S. presidential election, social media companies stepped up their attempts to verify users, including through phone numbers. Russia responded, in at least one case, by buying SIM cards in bulk, which worked until companies spotted the pattern, employees said. The Russians have now turned to front companies that can acquire less detectable phone numbers, the document says.

A separate top-secret document from the same Discord trove summarized six specific influence campaigns that were operational or planned for later this year by a new Russian organization, the Center for Special Operations in Cyberspace. The new group is mainly targeting Ukraine's regional allies, that document said. Those campaigns included one designed to spread the idea that U.S. officials were hiding vaccine side effects, intended to stoke divisions in the West.

China

New Leaked Documents on Discord Reveal More Chinese Spy Balloons (msn.com) 43

The Washington Post found a new tranche of "top-secret intelligence documents" on Discord, and based on them reported Friday that U.S. intelligence agencies were aware of at least two additional Chinese spy balloons.

Based on the classified documents, the Post also reports that "questions lingered about the true capabilities of the one that flew over the continental United States in January and February." The Chinese spy balloon that flew over the United States this year, called Killeen-23 by U.S. intelligence agencies, carried a raft of sensors and antennas the U.S. government still had not identified more than a week after shooting it down, according to a document allegedly leaked to a Discord chatroom by Jack Teixeira, a member of the Massachusetts Air National Guard.

Another balloon flew over a U.S. carrier strike group in a previously unreported incident, and a third crashed in the South China Sea, a second top-secret document stated, though it did not provide specific information for launch dates.... [Chinese spy balloon] Bulger-21 carried sophisticated surveillance equipment and circumnavigated the globe from December 2021 until May 2022, the NGA document states. Accardo-21 carried similar equipment as well as a "foil-lined gimbaled" sensor, it says....

Annotating what appear to be detailed photos of the balloon that flew over the United States, presumably taken from a U-2 spy plane, intelligence analysts assessed that it could generate enough power to operate "any" surveillance and reconnaissance technology, including a type of radar that can see at night and through clouds and thin materials [including tarps].... China's military has operated a vast surveillance balloon project for several years, partly out of Hainan province off China's south coast, U.S. officials have previously told The Post.

But the NGA document is notable as much for what it doesn't say, reflecting the government's possible lack of insight, at least in mid-February, into the balloons' capabilities... The lack of detailed conclusions about the balloon's surveillance capabilities raises questions about the decision to let it fly over the United States before shooting it down, an action the Defense Department justified at the time as an opportunity to collect additional intelligence.

The Post also reports that another leaked document (relying on intercepted communications) assessed that within the Chinese military the balloon surveillance program lacked "strong leadership" oversight.
Sci-Fi

Pentagon Official Floats a Theory For Unexplained Sightings: Alien Motherships (politico.com) 118

The official in charge of a secretive Pentagon effort to investigate unexplained aerial incursions has co-authored an academic paper that presents an out-of-this-world theory: Recent objects could actually be alien probes from a mothership sent to study Earth. Politico reports: In a draft paper dated March 7 (PDF), Sean Kirkpatrick, head of the Pentagon's All-domain Anomaly Resolution Office, and Harvard professor Avi Loeb teamed up to write that the objects, which appear to defy all physics, could be "probes" from an extraterrestrial "parent craft." It's unusual for government officials, especially those involved in the nascent effort to collect intelligence on recent sightings, to discuss the possibility of extraterrestrial life, although top agency officials don't rule it out when asked. After Loeb posted it online, the paper gained notoriety from a post on Military Times and has also circulated among science-focused news outlets.

More than half of the five-page paper is devoted to discussing the possibility that the unexplained objects DoD is studying could be the "probes" in the mothership scenario, including most of the page-long introduction. One section is titled: "The Extraterrestrial Possibility" and another "Propulsion Methods." Kirkpatrick's involvement in the academic paper demonstrates that the Pentagon is open to scientific debate of the origins of UFOs, an important signal to send to the academic world, experts said. But they add that his decision to attach his name to a theory considered in most academic circles to be highly unsubstantiated also raises questions about AARO's credibility.

The paper explains that interstellar objects such as the cigar-shaped "Oumuamua" that scientists spotted flying through the galaxy in 2017 "could potentially be a parent craft that releases many small probes during its close passage to Earth." The paper goes on to compare the probes to "dandelion seeds" that could be separated from the parent craft by the sun's gravitational force. It examines the physics of how the smaller craft could move through the Earth's atmosphere to reach the surface, where they could be spotted by humans. The paper notes that the "probes" could use starlight to "charge their batteries" and the Earth's water as fuel. It also speculates on the motive for aliens to send exploratory probes to Earth. "What would be the overarching purpose of the journey? In analogy with actual dandelion seeds, the probes could propagate the blueprint of their senders," the authors write. "As with biological seeds, the raw materials on the planet's surface could also be used by them as nutrients for self-replication or simply scientific exploration."

The Military

Leader of Online Group Where Secret Documents Leaked Is Air National Guardsman (nytimes.com) 182

An anonymous reader quotes a report from the New York Times: The leader of a small online gaming chat group where a trove of classified U.S. intelligence documents leaked over the last few months is a 21-year-old member of the intelligence wing of the Massachusetts Air National Guard, according to interviews and documents reviewed by The New York Times. The National Guardsman, whose name is Jack Teixeira, oversaw a private online group called Thug Shaker Central, where about 20 to 30 people, mostly young men and teenagers, came together over a shared love of guns, racist online memes and video games. On Thursday afternoon, about a half-dozen F.B.I. agents pushed into a residence in North Dighton, Mass. Attorney General Merrick B. Garland later said in a short statement that Airman Teixeira had been arrested "without incident." Federal investigators had been searching for days for the person who leaked the top secret documents online.

Starting months ago, one of the users uploaded hundreds of pages of intelligence briefings into the small chat group, lecturing its members, who had bonded during the isolation of the pandemic, on the importance of staying abreast of world events. [...] The Times spoke with four members of Thug Shaker Central, one of whom said he had known the person who leaked for at least three years, had met him in person and referred to him as the O.G. The friends described him as older than most of the group members, who were in their teens, and the undisputed leader. One of the friends said the O.G. had access to intelligence documents through his job. While the gaming friends would not identify the group's leader by name, a trail of digital evidence compiled by The Times leads to Airman Teixeira. The Times has been able to link Airman Teixeira to other members of Thug Shaker Central through his online gaming profile and other records. Details of the interior of Airman Teixeira's childhood home -- posted on social media in family photographs -- also match details on the margins of some of the photographs of the leaked secret documents.

Members of Thug Shaker Central who spoke to The Times said that the documents they discussed online were meant to be purely informative. While many pertained to the war in Ukraine, the members said they took no side in the conflict. The documents, they said, started to get wider attention only when one of the teenage members of the group took a few dozen of them and posted them to a public online forum. From there they were picked up by Russian-language Telegram channels and then The Times, which first reported on them. The person who leaked, they said, was no whistle-blower, and the secret documents were never meant to leave their small corner of the internet. "This guy was a Christian, antiwar, just wanted to inform some of his friends about what's going on," said one of the person's friends from the community, a 17-year-old recent high school graduate. "We have some people in our group who are in Ukraine. We like fighting games; we like war games."

Democrats

Ukrainian Hackers Compromised Russian Spy Who Hacked Democrats In 2016 (reuters.com) 72

An anonymous reader quotes a report from Reuters: Ukrainian hackers claim to have broken into the emails of a senior Russian military spy wanted by the Federal Bureau of Investigation for hacking the Hillary Clinton campaign and other senior U.S. Democrats ahead of Donald Trump's election to the presidency in 2016. In a message posted to Telegram on Monday, a group calling itself Cyber Resistance said it had stolen correspondence from Lt. Col. Sergey Morgachev, who was charged in 2018 with helping organize the hack and leak of emails from the Democratic National Committee (DNC) and the Clinton campaign.

InformNapalm said in an article about the breach that it had confirmed Morgachev's identity by poring through personnel files and a curriculum vitae stolen by the hackers, including one document that identified him as a department head in Unit 26165 -- the same position which the FBI accused him of holding in 2018. [...] It wasn't immediately clear what information the hackers had managed to steal or how significant it was. Morgachev's inbox could potentially hold insight into Russia's hacking operations, including the operation against Clinton and the Democrats.

In its indictment, the FBI described him as an officer in the Russia's military spy agency, still known by its old acronym, GRU. It said his department was "dedicated to developing and managing malware," including the "X-Agent" spy software used to hack the DNC. In its message announcing the theft, the group said of Morgachev: "A very cool and clever hacker, but ... We hacked him."

Role Playing (Games)

Leaked Classified Documents Also Include Roleplaying Game Character Stats (vice.com) 59

An anonymous reader quotes a report from Motherboard: Over the past month, classified Pentagon documents have circulated on 4chan, Telegram, and various Discord servers. The documents contain daily intelligence briefings, sensitive information about Ukrainian military positions, and a handwritten character sheet for a table-top roleplaying game. No one knows who leaked the Pentagon documents or how. They appeared online as photographs of printed pages, implying someone printed them out and removed them from a secure location, similar to how NSA translator Reality Winner leaked documents. The earliest documents Motherboard has seen are dated February 23, though the New York Times and Bellingcat reported that some are dated as early as January. According to Bellingcat, the earliest known instances of the leaks appearing online can be traced back to a Discord server.

At some point, a Discord user uploaded a zip file of 32 images from the leak onto a Minecraft Discord server. Included in this pack alongside highly sensitive, Top Secret and other classified documents about the Pentagon's strategy and assessment of the war in Ukraine, was a handwritten piece of paper that appeared to be a character sheet for a roleplaying game. It's written on a standard piece of notebook paper, three holes punched out on the side, blue lines crisscrossing the page. The character's name is Doctor "Izmer Trotzky," his character class is "Professor Scientist." They've got a strength of 5, a charisma of 4, and 19 rubles to their name. Doctor Trotzky has 10 points in first aid and occult skills, and 24 in spot hidden. He's carrying a magnifying glass, a fountain pen, a sword cane, and a deringer. [...]

But what game is it from? Motherboard reached out to game designer Jacqueline Bryk to find out. Bryk is an award-winning designer of roleplaying games who has worked on Kult: Divinity Lost, Changeling: the Lost, Fading Suns: Pax Alexius, and Vampire: the Masquerade. "I strongly suspect this is Call Of Cthulhu," Bryk said when first looking at the sheet. Call of Cthulhu (COC) is an RPG based on the work of H.P. Lovecraft where players attempt to stave off madness while investigating eldritch horrors. "This is a pretty classic Professor build. The sword cane really clinches it for me. I notice he's currently carrying a derringer and a dagger but took no points in firearms or fighting. I'm not sure which edition this is but it seems like the most he could do with his weapons is throw them."
"After some research, Bryk concluded that the game is a homebrewed combination of COC and the Fallout tabletop game based on the popular video game franchise," adds Motherboard. "My best guest here is Fallout: Cthulhu the Homebrew," Bryk said, giving the home designed game a name.
The Military

Better Electronic Sensors Mean Militaries Need Better Camouflage (livemint.com) 72

Long-time Slashdot reader SpzToid shares a new report from the Economist: Thanks to innovations such as fractal colouration patterns, which mimic nature by repeating shapes at different scales, the distance from which naked eyes can quickly spot soldiers wearing the best camouflage has shrunk, by one reckoning, by a fifth over the past two decades. That is impressive. On today's battlefields, however, it is no longer enough to merely hide from human eyes.

People and kit are given away as well by signals beyond the visual spectrum, and devices that detect these wavelengths are getting better, lighter and cheaper. Thermal sensors are a case in point. Today, one that costs about $1,000 and weighs as little as five sachets of sugar can, in good weather, detect a warm vehicle as far off as 10km. As Hans Kariis, deputy head of signatures research at the Swedish Defence Research Agency, notes, that is well beyond the range at which a small drone would be spotted. Two decades ago, he adds, a less sensitive thermal sensor weighing a kilogram cost ten times as much.

And then there's automatic target-detection software, the article points out, like the Kestrel software deployed in more than 3,500 aircraft around the world, which "scans feeds of visual, infrared and radar data, and places red boxes around people and other potential targets, even as their positions in the frame move." And the threat has only increased with the arrival of satellite-based synthetic-aperture-radar (SAR) imagery.

But then the article lists examples of new camouflage that now tricks electronic sensors:
  • Military vehicles affix hexagon-shaped sheets that can be cooled with electricity to blend into the temperature of their surroundings.
  • Camouflage netting that absorbs (some) incoming radar beams with semi-conducting polymers while reducing heat signatures with insulation — and reflecting back the cooler temperature of the ground.
  • Netherlands-based TNO makes "battery-powered sniper suits" embedded with 500 LEDs that match the luminosity and color of the surroundings using real-time data from a helmet camera.

Communications

How Much Data Did the Chinese Spy Balloon Collect? (nbcnews.com) 50

Long-time Slashdot reader schwit1 shared this report from NBC News: The Chinese spy balloon that flew across the U.S. was able to gather intelligence from several sensitive American military sites, despite the Biden administration's efforts to block it from doing so, according to two current senior U.S. officials and one former senior administration official. China was able to control the balloon so it could make multiple passes over some of the sites (at times flying figure-eight formations) and transmit the information it collected back to Beijing in real time, the three officials said.

The intelligence China collected was mostly from electronic signals, which can be picked up from weapons systems or include communications from base personnel, rather than images, the officials said. The three officials said China could have gathered much more intelligence from sensitive sites if not for the administration's efforts to move around potential targets and obscure the balloon's ability to pick up their electronic signals by stopping them from broadcasting or emitting signals.

America's Department of Defense "directed NBC News to comments senior officials made in February that the balloon had 'limited additive value' for intelligence collection by the Chinese government 'over and above what [China] is likely able to collect through things like satellites in low earth orbit.'"
United States

Classified US Documents Leaked on 4chan, Telegram, Discord, and Twitter (msn.com) 133

America's Department of Justice just launched an investigation into the leaking of classified documents from the U.S. Department of Defense, reports the Washington Post.

"On Wednesday, images showing some of the documents began circulating on the anonymous online message board 4chan and made their way to at least two mainstream social media platforms, Telegram and Twitter." Earlier Friday, The Washington Post obtained dozens of what appeared to be photographs showing classified documents, dating to late February and early March, that range from worldwide intelligence briefings to tactical-level battlefield updates and assessments of Ukraine's defense capabilities. They outline information about the Ukrainian and Russian militaries, and include highly sensitive U.S. analyses about China and other nations. The materials also reference highly classified sources and methods that the United States uses to collect such information, alarming U.S. national security officials who have seen them.... The material that appeared online includes photographs of documents labeled "Secret" or "Top Secret," and began appearing on Discord, a chat platform popular with gamers, according to a Post review.

In some cases, it appears that the slides were manipulated. For instance, one image features combat casualty data suggesting the number of Russian soldiers killed in the war is far below what the Pentagon publicly has assessed. Another version of the image showed higher Russian casualty figures. Besides the information on casualties that appeared to be manipulated to benefit the Russian government, U.S. officials who spoke to The Post said many of the leaked documents did not appear to be forged and looked consistent in format with CIA World Intelligence Review reports distributed at high levels within the White House, Pentagon and the State Department....

The documents appear to have been drawn from multiple reports and agencies, and concern matters other than Ukraine. Two pages, for example, are purportedly a "CIA Operations Center Intelligence Update," and includes information about events concerning Russia, Hungary and Iran.... Rachel E. VanLandingham, a former Air Force attorney and expert on military law, said that whoever is responsible for the leak "is in a world of hurt." Such breaches, she said, constitute "one of the most serious crimes that exist regarding U.S. national security...."

Skepticism abounded Friday among both Russian and Ukrainian officials aware of reports about the leaks, with each side accusing the other of being involved in a deliberate act of disinformation.

The Post notes one defense official told them "hundreds — if not thousands" of people had access to the documents, so their source "could be anyone."

But the photographs received by the Post were apparently taken from printed documents, and "classified documents may only be printed from computers in a secure facility, and each transaction is electronically logged, said Glenn Gerstell, a former general counsel with the National Security Agency who emphasized that he was speaking only about general procedures. "The fact that the documents were printed out should significantly narrow the universe of the initial inquiry."
China

US Military Prepares for Space Warfare As Potential Threats Grow From China (wsj.com) 52

America's Department of Defense "is gearing up for a future conflict in space," reports the Wall Street Journal, "as China and Russia deploy missiles and lasers that can take out satellites and disrupt military and civilian communications." The White House this month proposed a $30 billion annual budget for the U.S. Space Force, almost $4 billion more than last year and a bigger jump than for other services including the Air Force and the Navy.... A key aim of a stand-alone force was to plan, equip and defend U.S. interests in space for all of the services and focus attention on the emerging threats. For the first time, the spending request also includes plans for simulators and other equipment to train Guardians, as Space Force members are known, for potential battle....

Just as it is on Earth, China is the Pentagon's big worry in space. In unveiling a defense strategy late last year, the Biden administration cast China as the greatest danger to U.S. security. In space, the threats from China range from ground-launched missiles or lasers that could destroy or disable U.S. satellites, to jamming and other cyber interference and attacks in space, said Pentagon officials. China has invested heavily in its space program, with a crewed orbiting station, developing ground-based missiles and lasers as well as more surveillance capabilities. This is part of its broader military aims of denying adversaries access to space-based assets.

China is "testing on-orbit satellite systems which could be weaponized as they have already shown the capability to physically control and move other satellites," Gen. Chance Saltzman, chief of space operations for the U.S. Space Force, told a congressional hearing this month. "There's nothing we can do in space that's of any value if the networks that process the information and data are vulnerable to attack," Gen. Saltzman said. A central part of the Space Force's next tranche of military contracts for rocket launches is protecting them from attacks by China and other adversaries. The hope is to make satellites tougher to approach by adversaries' equipment as well as less susceptible to lasers and jamming from space or the ground, said Space Force leaders.

The article also notes the US Defense Department "is moving away from a small number of school bus-size satellites to a planned constellation of hundreds of smaller ones.

"The larger number of targets makes any one satellite less crucial to the network but also requires changes in the capabilities of the satellites themselves, the rockets that put them into orbit and the communications systems they host."
Crime

Truck Thief Gunned Down by Owner After AirTag Gives Away Location (appleinsider.com) 497

"A Texas truck theft ended in gun fire after the suspected thief was tracked down by thevehicle's owner's AirTag," reports AppleInsider: San Antonio police received a stolen vehicle report at around 1 pm from a Braesview home. However, before police could recover the stolen truck, the owners of the vehicle decided to perform their own investigation, using an AirTag left in the truck to do so. The unnamed owners tracked the truck to a shopping center in Southeast Military Drive, reports KSAT. However, rather than wait for police to arrive, the truck owners decided to approach the vehicle and confront the suspect.

While it is unknown exactly what happened, Police say it seems the suspected thief may have pulled out their own firearm. The vehicle owner responded by shooting and killing the suspect while they were inside the truck. It is unclear whether the vehicle owner will face charges over the matter, and an investigation is ongoing into whether the suspect actually had a weapon in the first place.

The San Antonio police department's public information officer offered these remarks (in a video from KSAT):

"Most importantly is, to the public, SAPD is urging you if you are to get your vehicle stolen: I know that it's frustrating, but please do not take matters into your own hands like this. Our police department has plenty of resources that could go into finding your vehicle, i.e. our drone system, trackers ourselves, very good patrolmen that look for these kind of things. It's never safe to take matters into your own hands, as you can see today by this incident.... That's why I urge the public, wait for police in this matter. Let us go with you. We have the training. We know exactly how to determine what's going to happen, these kind of factors and situations, and we know how to handle them."

Slashdot Top Deals