×
AI

How Ukraine Uses Facial Recognition Technology to Identify Dead Russian Soldiers and War Criminals (cnn.com) 76

"Ukraine is using facial recognition technology to identify bodies of Russian soldiers killed in war," reads the chyron on CNN's latest video report. It explains how Ukraine is using the technology "both to help with this difficult task and help advance their aims in the propaganda war with Moscow." And it may even help identify suspected war criminals.

But first Ukraine's chief civil-military liaison officer tells CNN that Geneva Convention rules mandate storing the bodies of the enemy (to be exchanged after the end of active combat) -- but also that they make an attempt to first identify the dead.

From CNN's report: This is where the Ministry of Digital Transformation comes in. "We have identified about 300 cases," says Mykhailo Fedorov [Ukraine's vice prime minister and Minister of Digital Transformation]. They do it by using a myriad of techniques, but the most effective has been facial recognition technology. They upload a picture of a face, the technology scrubs all the social networks... Once they have a match, they go one step further. "We send messages to their friends and relatives."


CNN: These are often gruesome photos of dead soldiers. Why do you send them to the families in Russia?

Fedorov: There are two goals. One is to show the Russians there's a real war going on here, to fight against the Russian propaganda, to show them they're not as strong as shown on TV, and Russians really are dying here. The second goal is to give them an opportunity to pick up the bodies in Ukraine.


They do get responses from Russian families.


CNN: They're responding with, basically saying "You will be killed. I will come and I will also take part in this war."

Fedorov: 80% of the familes' answers are, We'll come to Ukraine ourselves and kill you, and you deserve what's happening to you.

CNN: What about the other 20%?

Fedorov: Some of them say they're grateful, and they know about the situation. And some would like to come and pick up the body.


The technology is not just being used on the dead. It is also being used to identify Russian soldiers who are alive, some of whom are being accused of war crimes.


Ukraine chief regional prosecutor Ruslan Kravchenko: We have established the identity of one military man.


"We have a lot of materials - irreputable evidence," this prosecutor says. [Kravchenko] says he was caught on video in Belarus trying to sell items he had looted from Ukrainian homes. But his alleged crimes go far beyond that. The soldier is accused of taking part in the execution of four Ukrainian men, with their hands bound behind their backs.... Prosecutors say the soldier was first identified by the technology, and then by a Ukrainian citizen who said the soldier tortured him after entering his home.


Kravchenko: We showed these photos to the witnesses and victims.


They identified the specific person who was among other Russian military personnel who killed four people in this particular place, the prosecutor said. The end result of all their investigations, they hope, will be a full record of what happened in Ukraine. And the proof they need to prosecute those who committed crimes against its pepole.

Communications

UK, US, and EU Officially Blame Russia For Cyberattack Targeting Viasat (sky.com) 24

An anonymous reader quotes a report from Sky News: The UK, US and EU have formally accused Russia of being behind a cyber attack targeting a satellite communications network used in Ukraine. Businesses and individuals using routers made by Viasat, an American business that provides broadband-speed satellite internet connections, were knocked offline just before tanks began to roll into the country.

"The cyberattack took place one hour before Russia's unprovoked and unjustified invasion of Ukraine on 24 February 2022, thus facilitating the military aggression," the EU said in its statement. "Although the primary target is believed to have been the Ukrainian military, other customers were affected, including personal and commercial internet users," the Foreign Office added. As a result of the attack 5,800 wind turbines in Germany were knocked offline as they depended upon Viasat routers for remote monitoring and control. The company said in total tens of thousands of its terminals were effectively destroyed and needed to be replaced.
UK Foreign Secretary Liz Truss said: "This is clear and shocking evidence of a deliberate and malicious attack by Russia against Ukraine which had significant consequences on ordinary people and businesses in Ukraine and across Europe. We will continue to call out Russia's malign behavior and unprovoked aggression across land, sea and cyberspace, and ensure it faces severe consequences."

The attack was described as "yet another example of Russia's continued pattern of irresponsible behavior in cyberspace, which also formed an integral part of its illegal and unjustified invasion of Ukraine," in the EU's statement.

"Such behavior is contrary to the expectations set by all UN member states, including the Russian Federation, of responsible state behavior and the intentions of states in cyberspace. Russia must stop this war and bring an end to the senseless human suffering immediately," the EU added.
Software

Remote Lockouts Reportedly Stop Russian Troops From Using Stolen Ukrainian Farm Equipment (theverge.com) 152

An anonymous reader quotes a report from The Verge: Russian troops stole almost $5 million worth of farm equipment from a John Deere dealer in the occupied city of Melitopol, Ukraine, only to discover that the machines have been shut down remotely, making them inoperable, according to a report from CNN. Some of the equipment, which comes with a remote locking feature and a built-in GPS, was tracked over 700 miles away in the Zakhan Yurt village of Chechnya.

A source close to the situation told CNN that Russian troops gradually began taking machinery away from the dealer following their occupation of Melitopol in March. It reportedly started with two combine harvesters worth $300,000 each, a tractor, and a seeder, until troops hauled away all 27 pieces of equipment. Some of the equipment went to Chechnya, while others reportedly landed in a nearby village. "When the invaders drove the stolen harvesters to Chechnya, they realized that they could not even turn them on, because the harvesters were locked remotely," CNN's source told the outlet. Although the pieces of equipment were remotely disabled, CNN's source says that Russian troops may be trying to find a way around the block, as they're in contact with "consultants in Russia who are trying to bypass the protection."

The Military

Russians Plundered $5M Farm Vehicles from Ukraine - to Find They've Been Remotely Disabled (cnn.com) 125

CNN cites a local source imagining the surprise of the looters of a Ukranian farm equipment dealership who'd transported some heavy machines over 700 miles to Russia. "They realized that they could not even turn them on, because the harvesters were locked remotely."

CNN adds that "The equipment now appears to be languishing at a farm near Grozny." Over the past few weeks there's been a growing number of reports of Russian troops stealing farm equipment, grain and even building materials — beyond widespread looting of residences. But the removal of valuable agricultural equipment from a John Deere dealership in Melitopol speaks to an increasingly organized operation, one that even uses Russian military transport as part of the heist. CNN has learned that the equipment was removed from an Agrotek dealership in Melitopol, which has been occupied by Russian forces since early March. Altogether it's valued at nearly $5 million. The combine harvesters alone are worth $300,000 each....

The contact said the process began with the seizure of two combine harvesters, a tractor and a seeder. Over the next few weeks, everything else was removed: in all 27 pieces of farm machinery. One of the flat-bed trucks used, and caught on camera, had a white "Z" painted on it and appeared to be a military truck. The contact said there were rival groups of Russian troops: some would come in the morning and some in the evening.

Some of the machinery was taken to a nearby village, but some of it embarked on a long overland journey to Chechnya more than 700 miles away. The sophistication of the machinery, which are equipped with GPS, meant that its travel could be tracked....

The end result? "After a journey of more than 700 miles, the thieves were unable to use any of the equipment — because it had been locked remotely."
The Military

How Russians - and Ukranians - are Using Stolen Data (apnews.com) 48

While Russia's "relentless digital assaults" on Ukraine might seem less damaging than anticipated, the attacks actually focused on a different goal with "chilling potential consequences," reports the Associated Press. "Data collection."

Even in an early February blog post, Microsoft said Russia's intelligence agency had tried "exfiltrating sensitive information" over the previous six months from military, government, military, judiciary and law enforcement agencies.

The AP reports: Ukrainian agencies breached on the eve of the February 24 invasion include the Ministry of Internal Affairs, which oversees the police, national guard and border patrol. A month earlier, a national database of automobile insurance policies was raided during a diversionary cyberattack that defaced Ukrainian websites. The hacks, paired with prewar data theft, likely armed Russia with extensive details on much of Ukraine's population, cybersecurity and military intelligence analysts say. It's information Russia can use to identify and locate Ukrainians most likely to resist an occupation, and potentially target them for internment or worse.

"Fantastically useful information if you're planning an occupation," Jack Watling, a military analyst at the U.K. think tank Royal United Services Institute, said of the auto insurance data, "knowing exactly which car everyone drives and where they live and all that."

As the digital age evolves, information dominance is increasingly wielded for social control, as China has shown in its repression of the Uyghur minority. It was no surprise to Ukrainian officials that a prewar priority for Russia would be compiling information on committed patriots. "The idea was to kill or imprison these people at the early stages of occupation," Victor Zhora, a senior Ukrainian cyber defense official, alleged.... There is little doubt political targeting is a goal. Ukraine says Russian forces have killed and kidnapped local leaders where they grab territory....

The Ukrainian government says the Jan. 14 auto insurance hack resulted in the pilfering of up to 80% of Ukrainian policies registered with the Motor Transport Bureau.

But the article also points out that Ukraine also "appears to have done significant data collection — quietly assisted by the U.S., the U.K., and other partners — targeting Russian soldiers, spies and police, including rich geolocation data." Serhii Demediuk [deputy secretary of Ukraine's National Security and Defense Council] said the country knows "exactly where and when a particular serviceman crossed the border with Ukraine, in which occupied settlement he stopped, in which building he spent the night, stole and committed crimes on our land."

"We know their cell phone numbers, the names of their parents, wives, children, their home addresses," who their neighbors are, where they went to school and the names of their teachers, he said.

Analysts caution that some claims about data collection from both sides of the conflict may be exaggerated. But in recordings posted online by Ukrainian Digital Transformation Minister Mikhailo Fedorov, callers are heard phoning the far-flung wives of Russian soldiers and posing as Russian state security officials to say parcels shipped to them from Belarus were looted from Ukrainian homes.

In one, a nervous-sounding woman acknowledges receiving what she calls souvenirs — a woman's bag, a keychain.

The caller tells her she shares criminal liability, that her husband "killed people in Ukraine and stole their stuff."

She hangs up.

AI

Lyft Exec Craig Martell Tapped As Pentagon's AI Chief (breakingdefense.com) 3

According to Breaking Defense, the head of machine learning at Lyft, Craig Martell, has been named the Pentagon's Chief Digital and Artificial Intelligence Officer. From the report: The hiring of a Silicon Valley persona for the CDAO role is likely to be cheered by those in the defense community who have been calling for more technically-minded individuals to take leadership roles in the department. At the same time, Martell's lack of Pentagon experience -- he was a professor at the Naval Postgraduate School for over a decade studying AI for the military, but has never worked in the department's bureaucracy -- may pose challenges as he works to lead an office only months old. In an exclusive interview with Breaking Defense, Martell, who also worked as head of machine learning at Dropbox and led several AI teams at LinkedIn, acknowledged both the benefits and risks of bringing in someone with his background. [...]

As CDAO, Martell will be responsible for scaling up DoD's data, analytics and AI to enable quicker and more accurate decision-making and will also play an important role in the Pentagon's Joint All-Domain Command and Control efforts to connect sensors and shooters. "If we're going to be successful in achieving the goals, if we're going to be successful in being competitive with China, we have to figure out where the best mission value can be found first and that's going to have to drive what we build, what we design, the policies we come up with," Martell said. "I just want to guard against making sure that we don't do this in a vacuum, but we do it with real mission goals, real mission objectives in mind."

His first order of business? Figuring out what needs to be done, and how to best use the $600 million in fiscal year 2023 dollars the CDAO's office was marked for in the Pentagon's most recent budget request. "So whenever I tackle a problem, whenever I go into a new organization, the first questions that I ask are: Do we have the right people? Do we have the right processes? Do we have the right tools to solve the visions [and] goals?" Martell said. To tackle that, Martell wants to identify the office's "marquee customers" and figure out what's "broken in terms of... people, platform, processes and tools" -- a process that could take anywhere from three to six months, he added. "We really want to be customer-driven here," Martell said. "We don't want to walk in and say if we build it, they'll come."

The Military

US Army May Be About To 'Waste' Up To $22 Billion On Microsoft HoloLens (theregister.com) 45

The US Army could end up wasting much as $22 billion in taxpayer cash if soldiers aren't actually interested in using, or able to use as intended, the Microsoft HoloLens headsets it said it would purchase, a government watchdog has warned. The Register reports: In 2018, the American military splashed $480 million on 100,000 prototype augmented-reality goggles from Redmond to see how they could help soldiers train for and fight in combat. The Integrated Visual Augmentation System (IVAS) project was expanded when the Army decided it wanted the Windows giant to make custom, battle-ready AR headsets in a ten-year deal worth up to $22 billion. The project was delayed and is reportedly scheduled to roll out some time this year. But the US Dept of Defense's Office of the Inspector General (OIG) cast some doubt on whether it was worth it at all.

"Procuring IVAS without attaining user acceptance could result in wasting up to $21.88 billion in taxpayer funds to field a system that soldiers may not want to use or use as intended," the Pentagon oversight body wrote in an audit [PDF] report this month. In other words, the Army hasn't yet fully determined if or how service members will find these HoloLens headsets valuable in the field. Although the heavily redacted report did not reveal soldiers' responses to the prototype testing, it said feedback from surveys showed "both positive and negative user acceptance." The Army plans to purchase 121,500 IVAS units from Microsoft while admitting that "if soldiers do not love IVAS and do not find it greatly enhances accomplishing the mission, then soldiers will not use it," the report disclosed.

Security

Russian Hacking in Ukraine Has Been Extensive and Intertwined With Military Operations, Microsoft Says (cnn.com) 18

At least six different Kremlin-linked hacking groups have conducted nearly 240 cyber operations against Ukrainian targets, Microsoft said Wednesday, in data reveal a broader scope of alleged Russian cyberattacks during the war on Ukraine than previously documented. From a report: "Russia's use of cyberattacks appears to be strongly correlated and sometimes directly timed with its kinetic military operations," said Tom Burt, a Microsoft vice president.

The Microsoft report is the most comprehensive public record yet of Russian hacking efforts related to the war in Ukraine. It fills in some gaps in public understanding of where Russia's vaunted cyber capabilities have been deployed during the war. Burt cited a cyberattack on a Ukrainian broadcast company on March 1, the same day as a Russian missile strike against a TV tower in Kyiv, and malicious emails sent to Ukrainians falsely claiming the Ukrainian government was "abandoning" them amid the Russian siege of the city of Mariupol. Suspected Russian hackers "are working to compromise organizations in regions across Ukraine," and may have been collecting intelligence on Ukrainian military partnerships many months before the full-scale invasion in February, the Microsoft report says.

The Military

World Military Expenditure Passes $2 Trillion for First Time (sipri.org) 89

World military spending continued to grow in 2021, reaching an all-time high of $2.1 trillion. This was the seventh consecutive year that spending increased. From a report: "Even amid the economic fallout of the Covid-19 pandemic, world military spending hit record levels," said Dr Diego Lopes da Silva, Senior Researcher with SIPRI's Military Expenditure and Arms Production Programme. "There was a slowdown in the rate of real-terms growth due to inflation. In nominal terms, however, military spending grew by 6.1 per cent." As a result of a sharp economic recovery in 2021, the global military burden -- world military expenditure as a share of world gross domestic product (GDP) -- fell by 0.1 percentage points, from 2.3 per cent in 2020 to 2.2 per cent in 2021. US military spending amounted to $801 billion in 2021, a drop of 1.4 per cent from 2020. The US military burden decreased slightly from 3.7 per cent of GDP in 2020 to 3.5 per cent in 2021. US funding for military research and development rose by 24 per cent between 2012 and 2021, while arms procurement funding fell by 6.4 per cent over the same period. In 2021 spending on both decreased. However, the drop in R&D spending (-1.2 per cent) was smaller than that in arms procurement spending (-5.4 per cent).
The Military

A Visit to the Nuclear Missile Next Door (sfgate.com) 126

78-year-old rancher Ed Butcher has, for 60 years, lived with a nuclear missile as his closest neighbor — an active U.S. government nuclear missile, buried just beneath his cow pasture.

"Do you think they'll ever shoot it up into the sky?" asks his wife Pam, during a visit from the Washington Post.

"I used to say, 'No way,' " Ed said. "Now it's more like, 'Please God, don't let us be here to see it.' " The missile was called a Minuteman III, and the launch site had been on their property since the Cold War, when the Air Force paid $150 for one acre of their land as it installed an arsenal of nuclear weapons across the rural West. About 400 of those missiles remain active and ready to launch at a few seconds notice in Montana, Wyoming, North Dakota, Colorado and Nebraska. They are located on bison preserves and Indian reservations. They sit across from a national forest, behind a rodeo grandstand, down the road from a one-room schoolhouse, and on dozens of private farms like the one belonging to the Butchers, who have lived for 60 years with a nuclear missile as their closest neighbor.

It's buried behind a chain-link fence and beneath a 110-ton door of concrete and steel. It's 60 feet long. It weighs 79,432 pounds. It has an explosive power at least 20 times greater than the atomic bomb that killed 140,000 people in Hiroshima. An Air Force team is stationed in an underground bunker a few miles away, ready to fire the missile at any moment if the order comes. It would tear out of the silo in about 3.4 seconds and climb above the ranch at 10,000 feet per second. It was designed to rise 70 miles above Earth, fly across the world in 25 minutes and detonate within a few hundred yards of its target. The ensuing fireball would vaporize every person and every structure within a half-mile. The blast would flatten buildings across a five-mile radius. Secondary fires and fatal doses of radiation would spread over dozens more miles, resulting in what U.S. military experts have referred to as "total nuclear annihilation."

"I bet it would fly right over our living room," Ed said. "I wonder if we'd even see it."

"We'd hear it. We'd feel it," Pam said. "The whole house would be shaking."

"And if we're shooting off missiles, you can bet some are headed back toward us," Ed said... "I guess we'd head for the storage room," Ed said.

"Make a few goodbye calls," Pam said. "Hold hands. Pray."

Ed got up to clear his plate. "Good thing it's all hypothetical. It's really only there for deterrence. It'll never actually explode."

"You're right," Pam said. "It won't happen. Almost definitely not."

Government

Open-Source Intelligence: How Bellingcat Uses Data Gathered by Authoritarian Governments (cnn.com) 52

CNN profiles Bellingcat, a Netherlands-based investigative group specializing in "open-source intelligence". And investigator Christo Grozev tells CNN that authoritarian governments make their work easier, because "they love to gather data, comprehensive data, on ... what they consider to be their subjects, and therefore there's a lot of centralized data."

"And second, there's a lot of petty corruption ... within the law enforcement system, and this data market thrives on that." Billions have been spent on creating sophisticated encrypted communications for the military in Russia. But most of that money has been stolen in corrupt kickbacks, and the result is they didn't have that functioning system... It is shocking how incompetent they are. But it was to be expected, because it's a reflection of 23 years of corrupt government.
Interestingly there's apparently less corruption in China — though more whistleblowers. But Bellingcat's first investigation involved the 2014 downing of a Boeing 777 over eastern Ukraine that killed 283 passengers. (The Dutch Safety Board later concluded it was downed by a surface-to-air missile launched from pro-Russian separatist-controlled territory in Ukraine.) "At that time, a lot of public data was available on Russian soldiers, Russian spies, and so on and so forth — because they still hadn't caught up with the times, so they kept a lot of digital traces, social media, posting selfies in front of weapons that shoot down airliners. That's where we kind of perfected the art of reconstructing a crime based on digital breadcrumbs..."

"By 2016, it was no longer possible to find soldiers leaving status selfies on the internet because a new law had been passed in Russia, for example, banning the use of mobile phones by secret services and by soldiers. So we had to develop a new way to get data on government crime. We found our way into this gray market of data in Russia, which is comprised of many, many gigabytes of leaked databases, car registration databases, passport databases. Most of these are available for free, completely freely downloadable from torrent sites or from forums and the internet." And for some of them, they're more current. You actually can buy the data through a broker, so we decided that in cases when we have a strong enough hypothesis that a government has committed the crime, we should probably drop our ethical boundaries from using such data — as long as it is verifiable, as long as it is not coming from one source only but corroborated by at least two or three other sources of data. That's how we develop it. And the first big use case for this approach was the ... poisoning of Sergei and Yulia Skripal in 2018 (in the United Kingdom), when we used this combination of open source and data bought from the gray market in Russia to piece together who exactly the two poisoners were. And that worked tremendously....

It has been what I best describe as a multilevel computer game.... [W]hen we first learned that we can get private data, passport files and residence files on Russian spies who go around killing people, they closed the files on those people. So every spy suddenly had a missing passport file in the central password database. But that opened up a completely new way for us to identify spies, because we were just able to compare older versions of the database to newer versions. So that allowed us to find a bad group of spies that we didn't even know existed before.

The Russian government did realize that that's maybe a bad idea to hide them from us, so they reopened those files but just started poisoning data. They started changing the photographs of some of these people to similar looking, like lookalikes of the people, so that they confused us or embarrass us if we publish a finding but it's for the wrong guy. And then we'll learn how to beat that.

When asked about having dropped some ethical boundaries about data use, Grozev replies "everything changes. Therefore, the rules of journalism should change with the changing times." "And it's not common that journalism was investigating governments conducting government-sanctioned crimes, but now it's happening." With a country's ruler proclaiming perpetual supreme power, "This is not a model that traditional journalism can investigate properly. It's not even a model that traditional law enforcement can investigate properly." I'll give an example. When the British police asked, by international agreement, for cooperation from the Russian government to provide evidence on who exactly these guys were who were hanging around the Skripals' house in 2018, they got completely fraudulent, fake data from the Russian government....

So the only way to counter that as a journalist is to get the data that the Russian government is refusing to hand over. And if this is the only way to get it, and if you can be sure that you can prove that this is valid data and authentic data — I think it is incumbent on journalists to find the truth. And especially when law enforcement refuses to find the truth because of honoring the sovereign system of respecting other governments.

It was Bellingcat that identified the spies who's poisoned Russian opposition leader Alexey Navalny. CNN suggests that for more details on their investigation, and "to understand Vladimir Putin's stranglehold on power in Russia, watch the new film Navalny which premieres Sunday at 9 p.m. ET on CNN."

The movie's tagline? "Poison always leaves a trail."
The Military

What Happened After Russia Seized Chernobyl Nuclear Disaster Site? (apnews.com) 144

The Associated Press files this report from Chernobyl, where invading tanks in February "churned up highly contaminated soil from the site of the 1986 accident that was the world's worst nuclear disaster..."

"Here in the dirt of one of the world's most radioactive places, Russian soldiers dug trenches. Ukrainian officials worry they were, in effect, digging their own graves." For more than a month, some Russian soldiers bunked in the earth within sight of the massive structure built to contain radiation from the damaged Chernobyl nuclear reactor. A close inspection of their trenches was impossible because even walking on the dirt is discouraged.... Maksym Shevchuck, the deputy head of the state agency managing the exclusion zone, believes hundreds or thousands of soldiers damaged their health, likely with little idea of the consequences, despite plant workers' warnings to their commanders. "Most of the soldiers were around 20 years old," he said....

The full extent of Russia's activities in the Chernobyl exclusion zone is still unknown, especially because the troops scattered mines that the Ukrainian military is still searching for. Some have detonated, further disturbing the radioactive ground. The Russians also set several forest fires, which have been put out.

Ukrainian authorities can't monitor radiation levels across the zone because Russian soldiers stole the main server for the system, severing the connection on March 2. The International Atomic Energy Agency said Saturday it still wasn't receiving remote data from its monitoring systems. The Russians even took Chernobyl staffers' personal radiation monitors....

When the Russians hurriedly departed March 31 as part of a withdrawal from the region that left behind scorched tanks and traumatized communities, they took more than 150 Ukrainian national guard members into Belarus. Shevchuck fears they're now in Russia. In their rush, the Russians gave nuclear plant managers a choice: Sign a document saying the soldiers had protected the site and there were no complaints, or be taken into Belarus. The managers signed.

The article includes more stories from Chernobyl's staff: Even now, weeks after the Russians left, "I need to calm down," the plant's main security engineer, Valerii Semenov, told The Associated Press. He worked 35 days straight, sleeping only three hours a night, rationing cigarettes and staying on even after the Russians allowed a shift change. "I was afraid they would install something and damage the system," he said in an interview....

Another Ukrainian nuclear plant, at Zaporizhzhia in southeastern Ukraine, remains under Russian control. It is the largest in Europe.

Long-time Slashdot reader MattSparkes also notes reports that researchers at Chernobyl "had been looking for bacteria to eat radioactive waste — but they now fear that their work was irreparably lost during the Russian invasion of the facility."

New Scientist reports (in a pay-walled article) that scientist Olena Pareniuk "was attempting to identify bacteria that could consume radioactive waste within Chernobyl's destroyed reactor before the Russian invasion. If her samples are lost it will likely be impossible to replace them."
Social Networks

Ukraine's War Effort Gains an Unlikely Source of Funding: Memes (indianexpress.com) 24

The New York Times reports: Images such as Ukrainian tractors towing away a disabled Russian tank and helicopter, although unverified, have not only helped fight Russian disinformation, but also helped support Ukrainian charities and even the Ukrainian military. The merchandise sales they have generated in the United States and elsewhere are surprising given that many people buying the T-shirts, stickers, coffee mugs and chocolate bars would never have thought about the Eastern European country before the conflict.
One example? Toronto-based Christian Borys, who decided to launch a site selling stickers of the Virgin Mary hoisting an antitank missile (adapted from a painting by the American artist Chris Shaw.) In eight weeks Borys' "Saint Javelin" site "has raised so far almost $1.5 million to assist the Ukrainian charity Help Us Help, which has branched into multiple services, and to provide protective equipment for journalists covering the war, he said." Mr. Borys, who had worked for the e-commerce platform Shopify before turning to journalism, said he created a website in half an hour, hoping to raise money to send to a charity for Ukrainian orphans. That night, he made 88 Canadian dollars in sales. By the time he added T-shirts at the end of February, the threat of war had turned into a full-scale invasion, and he said sales grew to 170,000 Canadian dollars a day — most coming from the United States. "The internet speaks in memes and it just became this crazy, viral sensation," he said. "I think it's because people were looking for a symbol of support, a way to support Ukraine, because they saw the whole injustice of everything...."

Three weeks ago, Mr. Borys, a Canadian of Ukrainian Polish origin, turned Saint Javelin from an all-volunteer effort to a full-time staff of four to keep up with demand. His website has branched out from the Virgin Mary to other saints: Saint Carl Gustaf wears a gas mask, while "Saint Olha, the Warrior Queen of Kyiv" wears a crown and hoists a bazooka over her camouflaged shoulders. "People on Instagram demand we make things basically," Mr. Borys said. "We get messages from people in Spain who say, 'Hey, we just shipped the C-90,' a shoulder-fired rocket propelled grenade launcher," he said. "And they'll say, 'Hey we want a saint for Spain' or a saint specific to that type of system."

Privacy

Spyware and Pegasus: How Democracies Spy on Their Citizens (newyorker.com) 55

Writing for the New Yorker, Ronan Farrow reports on Pegasus, "a spyware technology designed by NSO Group, an Israeli firm, which can extract the contents of a phone, giving access to its texts and photographs, or activate its camera and microphone to provide real-time surveillance — exposing, say, confidential meetings." Pegasus is useful for law enforcement seeking criminals, or for authoritarians looking to quash dissent.... In Catalonia, more than sixty phones — owned by Catalan politicians, lawyers, and activists in Spain and across Europe — have been targeted using Pegasus. This is the largest forensically documented cluster of such attacks and infections on record. Among the victims are three members of the European Parliament... Catalan politicians believe that the likely perpetrators of the hacking campaign are Spanish officials, and the Citizen Lab's analysis suggests that the Spanish government has used Pegasus....

In recent years, investigations by the Citizen Lab and Amnesty International have revealed the presence of Pegasus on the phones of politicians, activists, and dissidents under repressive regimes. An analysis by Forensic Architecture, a research group at the University of London, has linked Pegasus to three hundred acts of physical violence. It has been used to target members of Rwanda's opposition party and journalists exposing corruption in El Salvador. In Mexico, it appeared on the phones of several people close to the reporter Javier Valdez Cárdenas, who was murdered after investigating drug cartels. Around the time that Prince Mohammed bin Salman of Saudi Arabia approved the murder of the journalist Jamal Khashoggi, a longtime critic, Pegasus was allegedly used to monitor phones belonging to Khashoggi's associates, possibly facilitating the killing, in 2018. (Bin Salman has denied involvement, and NSO said, in a statement, "Our technology was not associated in any way with the heinous murder.") Further reporting through a collaboration of news outlets known as the Pegasus Project has reinforced the links between NSO Group and anti-democratic states.

But there is evidence that Pegasus is being used in at least forty-five countries, and it and similar tools have been purchased by law-enforcement agencies in the United States and across Europe. Cristin Flynn Goodwin, a Microsoft executive who has led the company's efforts to fight spyware, told me, "The big, dirty secret is that governments are buying this stuff — not just authoritarian governments but all types of governments...." "Almost all governments in Europe are using our tools," Shalev Hulio, NSO Group's C.E.O., told me. A former senior Israeli intelligence official added, "NSO has a monopoly in Europe." German, Polish, and Hungarian authorities have admitted to using Pegasus. Belgian law enforcement uses it, too, though it won't admit it.

Calling the spyware industry "largely unregulated and increasingly controversial," the article notes how it's now impacting major western democracies. "The Citizen Lab's researchers concluded that, on July 26 and 27, 2020, Pegasus was used to infect a device connected to the network at 10 Downing Street, the office of Boris Johnson, the Prime Minister of the United Kingdom.... The United States has been both a consumer and a victim of this techÂnology. Although the National Security Agency and the C.I.A. have their own surveillance technology, other government offices, including in the military and in the Department of Justice, have bought spyware from private companies, according to people involved in those transactions."

But are the company's fortunes faltering? The company has been valued at more than a billion dollars. But now it is contending with debt, battling an array of corporate backers, and, according to industry observers, faltering in its long-standing efforts to sell its products to U.S. law enforcement, in part through an American branch, Westbridge Technologies. It also faces numerous lawsuits in many countries, brought by Meta (formerly Facebook), by Apple, and by individuals who have been hacked by NSO....

In November, the [U.S.] Commerce Department added NSO Group, along with several other spyware makers, to a list of entities blocked from purchasing technology from American companies without a license. I was with Hulio in New York the next day. NSO could no longer legally buy Windows operating systems, iPhones, Amazon cloud servers — the kinds of products it uses to run its business and build its spyware.

Privacy

American Phone-Tracking Firm Demo'd Surveillance Powers By Spying On CIA and NSA (arstechnica.com) 50

Anomaly Six, a secretive government contractor, claims to monitor the movements of billions of phones around the world and unmask spies with the press of a button. Reader BeerFartMoron shares a report: In the months leading up to Russia's invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six -- or "A6" -- the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6's powers inward, spying on the National Security Agency and CIA, using their own cellphones against them.

Virginia-based Anomaly Six was founded in 2018 by two ex-military intelligence officers and maintains a public presence that is scant to the point of mysterious, its website disclosing nothing about what the firm actually does. But there's a good chance that A6 knows an immense amount about you. The company is one of many that purchases vast reams of location data, tracking hundreds of millions of people around the world by exploiting a poorly understood fact: Countless common smartphone apps are constantly harvesting your location and relaying it to advertisers, typically without your knowledge or informed consent, relying on disclosures buried in the legalese of the sprawling terms of service that the companies involved count on you never reading.

The Internet

Ukraine War Stokes Concerns in Taiwan Over Its Fragile Internet Links (wsj.com) 48

The war in Ukraine is reviving concerns in Taiwan and some Asia-Pacific nations about the fragility of their internet connections because they rely on undersea cables that could be severed in a Chinese attack. From a report: Ukrainians have used the internet to rally resistance to Russia's invasion, counter Moscow's propaganda and win international support, including through President Volodymyr Zelensky's appeals for weapons. Ukraine has extensive internet connections across its land borders and most of the country has remained online despite Russian attacks on internet infrastructure.

In contrast, Taiwan, a self-ruled island that Beijing claims, receives and sends about 95% of its data-and-voice traffic via cables that lie on the seabed. Currently officials say about 14 cables -- bundles of fiber-optic lines about the thickness of a garden hose -- are in operation, and they reach land at four locations on Taiwan's coast. If the cables were to be cut at sea by submarines or divers, or if military strikes were to destroy the lightly protected landing stations, most of the island would be thrown offline. "We're very vulnerable," said Kenny Huang, chief executive of Taiwan Network Information Center, a government-affiliated cybersecurity and internet-domain-registration organization.

United States

US Commits To Ending Anti-Satellite Missile Testing, Calls For Global Agreement (cnbc.com) 71

The United States government has committed to ending the practice of anti-satellite missile tests, Vice President Kamala Harris announced on Monday, urging other nations to follow its lead. From a report: An anti-satellite weapons, or ASAT, test is a military demonstration in which a spacecraft in orbit is destroyed using a missile system. Countries performing ASAT tests historically have done so by targeting their own assets in space. Plans for the move were set late last year, after the Russian military destroyed a defunct satellite with an ASAT on Nov. 15. The Russian test created thousands of pieces of debris in low Earth orbit, and sent astronauts on the International Space Station into shelter as it passed through the shrapnel field.

During Harris' first meeting in December as chair of the National Space Council, the vice president directed the group to work with other agencies and create proposals that would establish new national security norms in space. The U.S. ASAT commitment, which coincides with Harris' tour of Vandenberg Space Force Base in California on Tuesday, marks the first step of that effort. The White House stressed that "the United States is the first nation to make such a declaration" to end such testing.

The Military

Russia's Military Is Now On Full Display In Google Maps Satellite View (arstechnica.com) 67

An anonymous reader quotes a report from Ars Technica: On Monday, the Internet got a much better look at military facilities across Russia. Google Maps stopped obscuring the sensitive locations due to Russia's ongoing invasion of its neighbor Ukraine. The Ukrainian Armed Forces announced the end of Google's censorship of Russia's bases on Twitter. Thanks to former US President Donald Trump, we know that the 0.5 m per pixel resolution available on Google Maps' satellite view is a far cry from the images available to the US government. But it will be invaluable to the growing mass of open source intelligence analysts. Since Russia's invasion of Ukraine began in late February, the OSINT community on Twitter has been cataloging Russian losses by geolocating images of destroyed tanks, fighting vehicles, aircraft, and cruise missile attacks.

Twitter users have already identified some interesting sights. Images taken of a Russian airbase at Lipetsk show partially disassembled MiG-31s (or perhaps MiG-25s). Another shows several Sukhoi fighter jets painted in patriotic colors, at least one of which is also missing its wings. Zhukovsky Airport near Moscow shows some oddities parked outside thanks to its role as a test flight center, including a Buran shuttle and a Sukhoi Su-47 technology demonstrator.
UPDATE: A Google spokesperson told Ars that the company hasn't changed anything with regard to blurring out sensitive sites in Russia, so perhaps none of us were looking closely until now.
Social Networks

After Russia's Invasion of Ukraine, US Army Training Includes Countering Social Media Disinformation (apnews.com) 46

"In the dusty California desert, U.S. Army trainers are already using lessons learned from Russia's war against Ukraine as they prepare soldiers for future fights against a major adversary such as Russia or China," reports the Associated Press.

And their training scenarios include more than just a enemy willing to destroy a city with missiles and rockets. "The enemy force that controls the fictional town of Ujen is using a steady stream of social media posts to make false accusations against the American brigade preparing to attack." "I think right now the whole Army is really looking at what's happening in Ukraine and trying to learn lessons," said Army Secretary Christine Wormuth. Those lessons, she said, range from Russia's equipment and logistics troubles to communications and use of the internet. "The Russia-Ukraine experience is a very powerful illustration for our Army of how important the information domain is going to be," said Wormuth, who spent two days at the training center in the Mojave Desert watching an Army brigade wage war against the fictional "Denovian" forces. "We've been talking about that for about five years. But really seeing it and seeing the way Zelenskyy has been incredibly powerful.... This is a world war that the actual world can see and watch in real time.... "

Army Col. Ian Palmer said the exercise is using more drones by the friendly and enemy forces, both for surveillance and attacks. So his forces are trying to use camouflage and tuck into the terrain to stay out of sight. "You know if you can be seen, you can be shot, where ever you are," he said. Down in the makeshift town, the opposition forces are confident they can hold off Palmer's brigade despite the size difference. The Denovians only have about 1,350 forces, but they are throwing everything they have at the brigade, from jamming and other electronic warfare to insurgency attacks and propaganda.

The role-players have their phones ready to film and post quickly to social media.

The Denovian forces want to portray the unit in the worst possible light, said Taylor, and constantly twist the narrative on social media so Palmer's troops realize they are in a battle for the truth. That's a challenge, he said, because "when I've got a bunch of casualties and I'm getting overrun on my left flank and my supply trains aren't where they need to be and I can't find the bulldozers, it's hard to think about something that someone said about me on Twitter."

The Military

Ukraine Opens Russian Drone, Finds Duct Tape and Canon DSLR Inside (petapixel.com) 265

Long-time Slashdot reader wired_parrot writes: After the Ukrainian army captured one of Russia's Orlan-10 unmanned aerial vehicles, they decided to do a teardown of it. Their findings show a remarkable amount of jerry-rigged installations using off the shelf components, including the use of a Canon DSLR camera as the main image capturing sensor.
Petapixel notes it's a camera first launched in 2015 "with a retail price of $750 but which is currently worth about $300 to $400 on the used market... The camera is mounted to a board with a hook-and-loop fastener strip (commonly referred to as Velcro)."

The Ukranian Ministry of Defense posted a video showing one of one of its soldiers exploring the alleged Russian drone, and Petapixel shares more details and some screen grabs: The soldier notes how surprisingly low-tech the military drone is — observers quickly pointed out that certain aspects of it are more reminiscent of a hobbyist RC airplane project than a high-tech piece of military spying technology....

On the top of the drone, the fuel tank's cap suggests that it may have been made from some kind of plastic water bottle. Various parts of the drone are also fixed together with some kind of duct tape.

Slashdot Top Deals