Crime

Truck Thief Gunned Down by Owner After AirTag Gives Away Location (appleinsider.com) 497

"A Texas truck theft ended in gun fire after the suspected thief was tracked down by thevehicle's owner's AirTag," reports AppleInsider: San Antonio police received a stolen vehicle report at around 1 pm from a Braesview home. However, before police could recover the stolen truck, the owners of the vehicle decided to perform their own investigation, using an AirTag left in the truck to do so. The unnamed owners tracked the truck to a shopping center in Southeast Military Drive, reports KSAT. However, rather than wait for police to arrive, the truck owners decided to approach the vehicle and confront the suspect.

While it is unknown exactly what happened, Police say it seems the suspected thief may have pulled out their own firearm. The vehicle owner responded by shooting and killing the suspect while they were inside the truck. It is unclear whether the vehicle owner will face charges over the matter, and an investigation is ongoing into whether the suspect actually had a weapon in the first place.

The San Antonio police department's public information officer offered these remarks (in a video from KSAT):

"Most importantly is, to the public, SAPD is urging you if you are to get your vehicle stolen: I know that it's frustrating, but please do not take matters into your own hands like this. Our police department has plenty of resources that could go into finding your vehicle, i.e. our drone system, trackers ourselves, very good patrolmen that look for these kind of things. It's never safe to take matters into your own hands, as you can see today by this incident.... That's why I urge the public, wait for police in this matter. Let us go with you. We have the training. We know exactly how to determine what's going to happen, these kind of factors and situations, and we know how to handle them."
China

China's Chip Industry Will Be 'Reborn' Under US Sanctions, Says Huawei (cnbc.com) 58

An anonymous reader quotes a report from CNBC: China's chip industry will be "reborn" as a result of U.S. sanctions, a top boss at Huawei said Friday, as the Chinese telecommunications giant confirmed a breakthrough in semiconductor design technology. Eric Xu, rotating chairman at Huawei, issued fighting words against Washington's tech export restrictions on China. "I believe China's semiconductor industry will not sit idly by, but take efforts around ... self-strengthening and self reliance," according to an official translation of Xu's comments during a press conference. "For Huawei, we will render our support to all such self-saving, self-strengthening and self reliance efforts of the Chinese semiconductor industry."

The U.S. is concerned that China could use advanced semiconductors for military purposes. Huawei's Xu said these developments could boost, rather than hamper China's domestic semiconductor industry. "I believe China's semiconductor industry will get reborn under such sanctions and realize a very strong and self-reliant industry," Xu said.
Last week, Huawei claimed to have completed work on electronic design automation tools for laying out and making chips down to 14nm process nodes.

"But Huawei ideally needs chips of a much smaller nanometer size for more advanced applications, which they are currently finding it difficult to obtain," adds Reuters. "The company is still reeling from the effects of U.S. sanctions -- on Friday, it said net profit dropped 69% year-on-year in 2022, marking the biggest decline on record."
Japan

Japan Restricts Chipmaking Equipment Exports as It Aligns With US China Curbs (reuters.com) 12

Japan said on Friday it will restrict exports of 23 types of semiconductor manufacturing equipment, aligning its technology trade controls with a U.S. push to curb China's ability to make advanced chips. From a report: Japan, home to major chip equipment makers such as Nikon and Tokyo Electron, did not specify China as the target of the restrictions, saying manufacturers would need to seek export permission for all regions. "We are fulfilling our responsibility as a technological nation to contribute to international peace and stability," Minister for Economy, Trade and Industry Yasutoshi Nishimura told a news conference. Japan wants to stop its advanced technology being used for military purposes and does not have a specific country in mind, he said. But the decision, coming ahead of a weekend visit to Beijing by Japanese Minister for Foreign Affairs Yoshimasa Hayashi, will be seen as a major win for the U.S., which in October announced sweeping restrictions on access to chipmaking technology to slow China's technological and military advances.
Security

'Vulkan Files' Leak Reveals Putin's Global and Domestic Cyberwarfare Tactics (theguardian.com) 42

"The Gaurdian reports on a document leak from Russian cyber 'security' company Vulkan," writes Slashdot reader Falconhell. From the report: Inside the six-storey building, a new generation is helping Russian military operations. Its weapons are more advanced than those of Peter the Great's era: not pikes and halberds, but hacking and disinformation tools. The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin's cyberwarfare capabilities.

Thousands of pages of secret documents reveal how Vulkan's engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company's work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia's foreign intelligence organization.

One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks. Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia's command, and also enables disinformation via fake social media profiles. A third Vulkan-built system -- Crystal-2V -- is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: "The level of secrecy of processed and stored information in the product is 'Top Secret'."

United States

Russia Arrests Wall Street Journal Reporter on Spying Charge (apnews.com) 86

Russia's security service arrested an American reporter for The Wall Street Journal on espionage charges, the first time a U.S. correspondent has been detained on spying accusations since the Cold War. The newspaper denied the allegations. From a report: Evan Gershkovich was detained in the Ural Mountains city of Yekaterinburg while allegedly trying to obtain classified information, the Federal Security Service, known by the acronym FSB, said Thursday. The service, which is the top domestic security agency and main successor to the Soviet-era KGB, alleged that Gershkovich "was acting on the U.S. orders to collect information about the activities of one of the enterprises of the Russian military-industrial complex that constitutes a state secret." Kremlin spokesman Dmitry Peskov told reporters Wednesday: "It is not about a suspicion, is it about the fact that he was caught red-handed." "The Wall Street Journal vehemently denies the allegations from the FSB and seeks the immediate release of our trusted and dedicated reporter, Evan Gershkovich," the newspaper said. "We stand in solidarity with Evan and his family."
The Military

Norway Company Can't Produce Ukraine Ammunition Because of TikTok (theguardian.com) 258

quonset writes: In what has to be one of the most inconceivable confluences ever, the Norwegian company Nammo says it is unable to expand its production of artillery shells to support Ukraine because of "cat videos" on TikTok. To placate European scrutiny, TikTok is opening two data centers in Europe to house European user data locally. One of those data centers is in the Hamar region of Norway. Because of this expansion, there is no excess capacity for the factory to ramp up production of artillery shells.

"The chief executive of Nammo, which is co-owned by the Norwegian government, said a planned expansion of its largest factory in central Norway hit a roadblock due to a lack of surplus energy, with the construction of TikTok's new data centre using up electricity in the local area," reports the Guardian. "Elvia, the local energy provider, confirmed to the Financial Times that the electricity network had no spare capacity after allocating it to the data center on a first-come, first-served basis. Additional capacity would take time to become available."
"We are concerned because we see our future growth is challenged by the storage of cat videos," Morten Brandtzaeg told the Financial Times.
Technology

Russia Supplies Iran With Cyber Weapons as Military Cooperation Grows (wsj.com) 50

Russia is helping Iran gain advanced digital-surveillance capabilities as Tehran seeks deeper cooperation on cyberwarfare, WSJ reported Tuesday, citing people familiar with the matter said, adding another layer to a burgeoning military alliance that the U.S. sees as a threat. From the report: The potential for cyberwarfare collaboration comes after Iran has, according to U.S. and Iranian officials, sold Russia drones for use in Ukraine, agreed to provide short-range missiles to Moscow and shipped tank and artillery rounds to the battlefield. Tehran is seeking the cyber help along with what U.S. and Iranian officials have said are requests for dozens of elite Russian attack helicopters and jet fighters and aid with its long-range missile program.

Russia and Iran both have sophisticated cyber capabilities and have long collaborated with each other, signing a cyber-cooperation agreement two years ago that analysts said focused mostly on cyber-defense networks. Moscow has long resisted sharing digital-offensive capabilities with Iran in the past, for fear they will end up being sold later on the dark web, the people said. Since the start of the war in Ukraine, Russia has provided Iran with communication-surveillance capabilities as well as eavesdropping devices, advanced photography devices and lie detectors, people familiar with the matter said. Moscow has likely already shared with Iran more advanced software that would allow it to hack the phones and systems of dissidents and adversaries, the people said. Russian authorities have determined that the benefits of advancing the military relationship with Iran outweigh any downsides, the people said.

The Military

US Military Needs 7th Branch Just For Cyber, Leaders Say (therecord.media) 120

An anonymous reader quotes a report from the Record: A national association of current and former military digital security leaders is calling on Congress to establish a separate cyber service, arguing that the lack of one creates an "unnecessary risk" to U.S. national security. In a March 26 memorandum, the Military Cyber Professional Association urged lawmakers to establish a U.S. Cyber Force in this year's annual defense policy bill.

"For over a decade, each service has taken their own approach to providing United States Cyber Command forces to employ and the predictable results remain inconsistent readiness and effectiveness," according to the group, which boasts around 3,700 members. "Only a service, with all its trappings, can provide the level of focus needed to achieve optimal results in their given domain," the memo states. "Cyberspace, being highly contested and increasingly so, is the only domain of conflict without an aligned service. How much longer will our citizenry endure this unnecessary risk?"

The creation of a Cyber Force would follow the arrival of the Space Force in 2019. It was the first new branch of the U.S. military in 72 years, bringing the total to six. The association's missive is likely to spark fresh debate on Capitol Hill, where an increasing number of policymakers see a cyber-specific military service as an inevitability. [..] In its memo, the association says that while "steps should be taken to establish such a service, with urgency, pursuing it in a hasty manner would likely prove to be a source of great disruption and risk to our own forces and operations." Therefore, any legislative approval of a Cyber Force should be accompanied by a "thorough study to determine what this military service should look like, how it be implemented, and the applicable timeline," according to the group.

The Internet

The New US-China Proxy War Over Undersea Internet Cables (reuters.com) 43

400 undersea cables carry 95% of the world's international internet traffic, reports Reuters (citing figures from Washington-based telecommunications research firm TeleGeography).

But now there's "a growing proxy war between the United States and China over technologies that could determine who achieves economic and military dominance for decades to come." In February, American subsea cable company SubCom LLC began laying a $600-million cable to transport data from Asia to Europe, via Africa and the Middle East, at super-fast speeds over 12,000 miles of fiber running along the seafloor. That cable is known as South East Asia-Middle East-Western Europe 6, or SeaMeWe-6 for short. It will connect a dozen countries as it snakes its way from Singapore to France, crossing three seas and the Indian Ocean on the way. It is slated to be finished in 2025.

It was a project that slipped through China's fingers....

The Singapore-to-France cable would have been HMN Tech's biggest such project to date, cementing it as the world's fastest-rising subsea cable builder, and extending the global reach of the three Chinese telecom firms that had intended to invest in it. But the U.S. government, concerned about the potential for Chinese spying on these sensitive communications cables, ran a successful campaign to flip the contract to SubCom through incentives and pressure on consortium members.... It's one of at least six private undersea cable deals in the Asia-Pacific region over the past four years where the U.S. government either intervened to keep HMN Tech from winning that business, or forced the rerouting or abandonment of cables that would have directly linked U.S. and Chinese territories....

Justin Sherman, a fellow at the Cyber Statecraft Initiative of the Atlantic Council, a Washington-based think tank, told Reuters that undersea cables were "a surveillance gold mine" for the world's intelligence agencies. "When we talk about U.S.-China tech competition, when we talk about espionage and the capture of data, submarine cables are involved in every aspect of those rising geopolitical tensions," Sherman said.

Space

Russia's Space Program Is In Big Trouble (wired.com) 126

schwit1 writes:

Crippled by war and sanctions, Russia now faces evidence that its already-struggling space program is falling apart. In the past three months alone, Roscosmos has scrambled to resolve two alarming incidents. First, one of its formerly dependable Soyuz spacecraft sprang a coolant leak. Then the same thing happened on one of its Progress cargo ships. The civil space program's Soviet predecessor launched the first person into orbit, but with the International Space Station (ISS) nearing the end of its life, Russia's space agency is staring into the abyss.

"What we're seeing is the continuing demise of the Russian civil space program," says Bruce McClintock, a former defense attache at the US embassy in Moscow and current head of the Space Enterprise Initiative of the Rand Corporation, a nonprofit research organization. Around 10 years ago, Russian leaders chose to prioritize the country's military space program -- which focuses on satellite and anti-satellite technologies -- over its civilian one, McClintock says, and it shows.

Russia's space fleet is largely designed to be expendable. The history of its series of Soyuz rockets and crew capsules (they both have the same name) dates back to the Soviet era, though they've gone through upgrades since. Its Progress cargo vessels also launch atop Soyuz rockets. The cargo ships, crewed ships, and rockets are all single-use spacecraft. Anatoly Zak, creator and publisher of the independent publication RussianSpaceWeb, estimates that Roscosmos launches about two Soyuz vehicles per year, takes about 1.5 to 2 years to build each one, and doesn't keep a substantial standing fleet.

While Roscosmos officials did not respond to interview requests, the agency has been public about its recent technical issues.

Plus this, which failed to make headlines here: "For crewed launches, Russia has long depended on its Baikonur spaceport in neighboring Kazakhstan. But the nation has charged costly annual fees, and in March Kazakhstan seized Russian spaceport assets, reportedly due to Roscosmos' debt."


The Military

Pentagon Study Reveals Higher Cancer Rates For Military Pilots, Ground Crews (axios.com) 62

A new study from the Department of Defense revealed that military pilots and ground crews experienced higher rates of certain cancers compared to the general population. Axios: Earlier military studies had not indicated that aviators were at higher risk, though the data has long been sought by those who raised alarm about the rates of cancer they observed among air and ground crew members, according to AP, which first reported the study. The study examined cancer rates among nearly 900,000 air and ground crew from 1992 to 2017. Overall -- compared to the general population after adjusting for age, sex and race -- aircrews saw a 24% higher rate of cancer of all types while ground crews saw a 3% higher rate of cancer of all types. However, both air and ground crews saw "lower or similar" cancer mortality rates for all cancer types compared to the general population.
Supercomputing

UK To Invest 900 Million Pounds In Supercomputer In Bid To Build Own 'BritGPT' (theguardian.com) 35

An anonymous reader quotes a report from The Guardian: The UK government is to invest 900 million pounds in a cutting-edge supercomputer as part of an artificial intelligence strategy that includes ensuring the country can build its own "BritGPT". The treasury outlined plans to spend around 900 million pounds on building an exascale computer, which would be several times more powerful than the UK's biggest computers, and establishing a new AI research body. An exascale computer can be used for training complex AI models, but also have other uses across science, industry and defense, including modeling weather forecasts and climate projections. The Treasury said the investment will "allow researchers to better understand climate change, power the discovery of new drugs and maximize our potential in AI.".

An exascale computer is one that can carry out more than one billion billion simple calculations a second, a metric known as an "exaflops". Only one such machine is known to exist, Frontier, which is housed at America's Oak Ridge National Laboratory and used for scientific research -- although supercomputers have such important military applications that it may be the case that others already exist but are not acknowledged by their owners. Frontier, which cost about 500 million pounds to produce and came online in 2022, is more than twice as powerful as the next fastest machine.

The Treasury said it would award a 1 million-pound prize every year for the next 10 years to the most groundbreaking AI research. The award will be called the Manchester Prize, in memory of the so-called Manchester Baby, a forerunner of the modern computer built at the University of Manchester in 1948. The government will also invest 2.5 billion pounds over the next decade in quantum technologies. Quantum computing is based on quantum physics -- which looks at how the subatomic particles that make up the universe work -- and quantum computers are capable of computing their way through vast numbers of different outcomes.

China

1,100 Scientists and Students Barred From UK Amid China Crackdown (theguardian.com) 36

An anonymous reader quotes a report from The Guardian: More than 1,000 scientists and postgraduate students were barred from working in the UK last year on national security grounds, amid a major government crackdown on research collaborations with China. Figures obtained by the Guardian reveal that a record 1,104 scientists and postgraduate students were rejected by Foreign Office vetting in 2022, up from 128 in 2020 and just 13 in 2016.

The sharp increase follows a hardening of the government's stance on scientific ties with China, with warnings from MI5 of a growing espionage threat, major research centers being quietly shut down and accusations by a government minister that China's leading genomics company had regularly sought to hack into the NHS's genetic database. Geopolitical tensions stepped up further this week, as the US, Australia and the UK announced a multi-decade, multibillion-dollar deal aimed at countering China's military expansion in the Indo-Pacific. China said the Aukus plan to build a combined fleet of elite nuclear-powered submarines was "a path of error and danger."

The Foreign Office declined to give a breakdown by nationality, but data supplied by leading universities including Oxford, Cambridge and Imperial College suggests that, at these institutions at least, Chinese academics account for a majority of those denied clearance. Some have welcomed the policy shift, with one security expert saying the number of academics being barred is "commensurate with the threat." But leading scientists say the scheme is leaving universities struggling to recruit the best talent from abroad.
"A majority of applicants are thought to be scientists seeking to move to the UK to take up offers of research degrees or fellowships," adds the Guardian. "But the Guardian is also aware of researchers, including five Chinese scientists at Imperial college, who did not pass clearance despite having already held positions at UK universities for several years -- and who may have had to leave the UK as a result."
Microsoft

Microsoft Warns Russia May Plan More Ransomware Attacks Beyond Ukraine (bloomberg.com) 27

Microsoft warned an infamous hacking group that is tied to Russia's military intelligence agency GRU could be gearing up for more ransomware attacks both inside and outside of Ukraine. From a report: Microsoft calls the group Iridium, but it is perhaps best known as Sandworm. It has been accused of attacks on Ukraine's electric power grid and government agencies, the 2018 Winter Olympics and businesses across the globe. Now, it appears to be preparing for a renewed destructive campaign, the software company said in a threat intelligence report on Wednesday. Russian hackers have been accused of bombarding Ukrainian institutions with "wiper malware" and DDoS attacks, a campaign that began even before President Vladimir Putin ordered troops to invade more than a year ago. However, Ukraine's defenses have largely fended off a major cyberwar with the help of foreign tech companies including Microsoft. The ransomware attack on Polish and Ukrainian transport services in October, attributed to Sandworm, may have been "a trial balloon" for further attacks, the report said. Microsoft warned it was a potential precursor to further Russian hacks beyond Ukrainian soil.
China

The Netherlands To Block Export of Advanced Chips Printers To China (politico.eu) 50

An anonymous reader quotes a report from Politico: The Dutch government confirmed for the first time Wednesday it will impose new export controls on microchips manufacturing equipment, bowing to U.S. pressure to block the sale of some of its prized chips printing machines to China. The U.S. and the Netherlands reached an agreement to introduce new export restrictions on advanced chip technology to China at the end of January, but until now, the Dutch government hadn't commented publicly on it. The deal, which also included Japan, involves the only three countries that are home to manufacturers of advanced machines to print microchips. It is a U.S.-led initiative to choke off the supply of cutting-edge chips to China.

"Given the technological developments and geopolitical context, the government has concluded that it is necessary for the (inter)national security to expand the existing export controls on specific manufacturing equipment for semiconductors," Foreign Trade Minister Liesje Schreinemacher wrote in a letter to Dutch lawmakers published Wednesday evening. The Dutch government wants to prevent Dutch technology from being used in military systems or weapons of mass destruction, Schreinemacher wrote — echoing the U.S. reasoning when it imposed its own export controls in October. The Netherlands also wants to avoid losing its pole position in producing cutting-edge chip manufacturing tools: Schreinemacher said the government wants to uphold "Dutch technological leadership." While China is not explicitly named in Schreinemacher's letter, the new policy is targeted at Chinese efforts to overtake the U.S. and others like Taiwan, South Korea, Japan and leading European countries in the global microchips supply chain.

The new export restrictions deal a blow to ASML, the global leader in producing advanced microchips printing machines based in Veldhoven, in southern Netherlands. In the letter, Schreinemacher said the new export control measures include the most advanced deep ultraviolet (DUV) machines, which are part of ASML's advanced chips printers portfolio. The Dutch firm, which is the highest-valued tech company in Europe, already did not receive export licenses for selling its most advanced machines using extreme ultraviolet light (EUV) technology to China since 2019. ASML in a statement confirmed it will now "need to apply for export licenses for shipment of the most advanced immersion DUV systems," but it noted it has not yet received more details about what "most advanced" means.

Privacy

FBI, Pentagon Helped Research Facial Recognition for Street Cameras, Drones (washingtonpost.com) 13

The FBI and the Defense Department were actively involved in research and development of facial recognition software that they hoped could be used to identify people from video footage captured by street cameras and flying drones, according to thousands of pages of internal documents that provide new details about the government's ambitions to build out a powerful tool for advanced surveillance. WashingtonPost: The documents, revealed in response to an ongoing Freedom of Information Act lawsuit the American Civil Liberties Union filed against the FBI, show how closely FBI and Defense officials worked with academic researchers to refine artificial-intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent. Many of the records relate to the Janus program, a project funded by the Intelligence Advanced Research Projects Agency, or IARPA, the high-level research arm of the U.S. intelligence community modeled after the Pentagon's Defense Advanced Research Projects Agency, known as DARPA. Program leaders worked with FBI scientists and some of the nation's leading computer-vision experts to design and test software that would quickly and accurately process the "truly unconstrained face imagery" recorded by surveillance cameras in public places, including subway stations and street corners, according to the documents, which the ACLU shared with The Washington Post.

In a 2019 presentation, an IARPA program manager said the goal had been to "dramatically improve" the power and performance of facial recognition systems, with "scaling to support millions of subjects" and the ability to quickly identify faces from partially obstructed angles. One version of the system was trained for "Face ID ... at target distances" of more than a half-mile. To refine the system's capabilities, researchers staged a data-gathering test in 2017, paying dozens of volunteers to simulate real-world scenarios at a Defense Department training facility made to resemble a hospital, a subway station, an outdoor marketplace and a school, the documents show. The test yielded thousands of surveillance videos and images, some of which were captured by a drone. The improved facial recognition system was ultimately folded into a search tool, called Horus, and made available to the Pentagon's Combating Terrorism Technical Support Office, which helps provide military technologies to civilian police forces, the documents show. The Horus tool has since been offered for use to at least six federal agencies, and their feedback is "continuing to be used to refine the tool," Department of Homeland Security officials said last year.

Games

Video Games Are a New Propaganda Machine for Iran (wired.com) 45

The state sponsors titles that cast it in a favorable light and punish indies for depicting a more complex vision of Iranian identity. From a report: Commander of the Resistance: Amerli Battle is a first-person shooter set in Iraq. Launched in 2022, the game pitches players against Islamic State militants laying siege to a town, based on a real-life event that took place in 2014. Its hero -- the commander of the title -- is a real-life figure too: Qasem Soleimani, a major general in the Islamic Revolutionary Guard Corps, a military force under the command of Iran's theocratic leadership. Soleimani, who was killed in a US drone strike in Iraq in January 2020, was a powerful figure in the regime -- and a controversial one, declared a terrorist by the US and accused of overseeing human rights abuses and extrajudicial killings in Iran, Iraq and Syria.

The game was produced by Monadian Media, an offshoot of the Basij Cyberspace Organization -- the digital wing of the IRGC's paramilitary group, the Basij's and it is part of an ongoing propaganda effort by the regime to rewrite history and mythologize its leading figures. Facing growing discontent, the Islamic Republic has increasingly invested in producing video games, in the hope that it can use them to influence young people. The games' narratives try to reinforce the religious identity of the nation, to portray domestic opponents -- such as the Woman, Life, Freedom movement that began last year -- as sectarian extremists, and to rehabilitate figures like Soleimani, a military commander associated with brutal crackdowns. And it has thrust Iran's once-thriving games industry into the midst of a battle over Iranian identity.

Space

Is United Launch Alliance About To Be Sold? (arstechnica.com) 57

schwit1 shares a report from Ars Technica, written by Eric Berger: One of the world's most important rocket companies, United Launch Alliance, may be sold later this year. The potential sale has not been disclosed publicly, but three sources confirmed to Ars that potential buyers have been contacted about the opportunity. These sources said a deal is expected to be closed before the end of this year and that investment firm Morgan Stanley and consulting firm Bain & Company are managing the transaction.

The sale of United Launch Alliance, or ULA as it is known within the industry, would mark the end of an era that has lasted for nearly two decades. The company was officially formed in 2005 as part of a deal brokered by the US government, ensuring the military had access to both Atlas and Delta rockets to put national security satellites into space. To form ULA, Lockheed Martin and Boeing merged their launch businesses into a single company, each taking a 50 percent stake. This union was profitable for both parent companies, as ULA held a monopoly on launching national security missions and, effectively, NASA science probes. In return for 100 percent mission success, ULA received large launch contracts and an approximately $1 billion annual subsidy from the US Department of Defense to maintain "launch readiness."

The emergence of SpaceX in the early 2010s with the increasingly reliable Falcon 9 rocket started to disrupt this profitable arrangement. SpaceX sold the Falcon 9 rocket at a substantial discount to ULA's Atlas V and Delta IV rockets. The company also successfully sued the US government to allow the Falcon 9 rocket to compete for national security missions, and SpaceX launched its first one in 2017. In recent years, SpaceX has come to dominate United Launch Alliance in terms of cadence. By the end of 2022, the upstart was launching as many rockets each month as ULA launched during a calendar year. During the last four years, in fact, SpaceX has landed more rockets than ULA has launched during its existence. However, ULA still holds a prominent place in the global launch industry, and there will likely be no shortage of suitors.

Wikipedia

Russian Fines Wikipedia Over Military 'Misinformation' (reuters.com) 76

The Wikimedia Foundation was fined 2 million roubles ($27,000) by a Russian court on Tuesday after the authorities accused it of failing to delete "misinformation" about the Russian military from Wikipedia, the courts service said. From a report: Shortly after Russia invaded Ukraine last year, Russia introduced sweeping new laws restricting what people can report about the conflict, fining or blocking websites that spread information at odds with the Kremlin's official narrative. Wikimedia, which owns Wikipedia, was already fined last year after it failed to delete two articles related to the war, including one on "evaluations of Russia's 2022 invasion of Ukraine." The latest fine was imposed after the authorities accused Wikipedia of "spreading misinformation" in articles about Russian military units, Wikimedia Russia said.
Security

Sensitive US Military Emails Spill Online (techcrunch.com) 32

The U.S. Department of Defense secured an exposed server on Monday that was spilling internal U.S. military emails to the open internet for the past two weeks, TechCrunch reported Tuesday. From a report: The exposed server was hosted on Microsoft's Azure government cloud for Department of Defense customers, which uses servers that are physically separated from other commercial customers and as such can be used to share sensitive but unclassified government data. [...] But a misconfiguration left the server without a password, allowing anyone on the internet access to the sensitive mailbox data inside using only a web browser, just by knowing its IP address.

[...] The server was packed with internal military email messages, dating back years, some of which contained sensitive personnel information. One of the exposed files included a completed SF-86 questionnaire, which are filled out by federal employees seeking a security clearance and contain highly sensitive personal and health information for vetting individuals before they are cleared to handle classified information.

Slashdot Top Deals