United States

Many Military UFO Reports Are Just Foreign Spying or Airborne Trash (nytimes.com) 52

Government officials believe that surveillance operations by foreign powers and weather balloons or other airborne clutter explain most recent incidents of unidentified aerial phenomenon -- government-speak for U.F.O.s -- as well as many episodes in past years. From a report: The sightings have puzzled the Pentagon and intelligence agencies for years, fueling theories about visiting space aliens and spying by a hostile nation using advanced technology. But government officials say many of the incidents have far more ordinary explanations. Intelligence agencies are set to deliver a classified document to Congress by Monday updating a report made public last year that said nearly all of the incidents remain unexplained. The original document looked at 144 incidents between 2004 and 2021 that were reported by U.S. government sources, mostly American military personnel.

This article is based on interviews with American officials familiar with the findings of the Pentagon and intelligence agencies' examination of the incidents. The officials spoke on the condition of anonymity to discuss the classified work. Some of the incidents have been formally attributed to Chinese surveillance -- with relatively ordinary drone technology -- and others are also thought to be connected to Beijing. China, which has stolen plans for advanced fighter planes, wants to learn more about how the United States trains its military pilots, according to American officials.

Sci-Fi

NASA Kicks Off Independent UFO Study (cnn.com) 68

NASA's independent study to delve into the mysteries surrounding unidentified aerial phenomena kicked off today. CNN reports: The group will include experts across numerous disciplines -- including astrobiology, data science, oceanography, genetics, policy and planetary science -- as well as retired NASA astronaut Scott Kelly, a former fighter pilot and test pilot and retired US Navy captain. The space agency, which first announced it was forming the group in June, previously revealed that the team would be led by astrophysicist David Spergel, who is president of the Simons Foundation in New York City.

The new group won't necessarily seek to determine exactly what the UAPs, which have been seen moving through restricted military airspace over the past several decades, are. Rather, the team will look to hash out exactly how it's best for NASA to approach further study of the phenomenon. The space agency has already noted that the limited number of observations of UAPs has made it difficult to draw scientific conclusions about the nature of such events. "Without access to an extensive set of data, it is nearly impossible to verify or explain any observation, thus the focus of the study is to inform NASA what possible data could be collected in the future to scientifically discern the nature of UAP," according to a NASA news release.

This study, expected to last about nine months, will also be entirely unclassified and within the public domain. "Exploring the unknown in space and the atmosphere is at the heart of who we are at NASA," Zurbuchen said in a Friday statement. "Understanding the data we have surrounding unidentified aerial phenomena is critical to helping us draw scientific conclusions about what is happening in our skies. Data is the language of scientists and makes the unexplainable, explainable." Specifically, the team will look for data on "events in the sky that cannot be identified as aircraft or known natural phenomena -- from a scientific perspective," the agency said. Unidentified aerial phenomena are of interest, NASA said, from a security and safety perspective. There was no evidence UAPs are extraterrestrial in origin, NASA emphasized during the initial announcement in June.

The Military

AI-Assisted Guns Deployed By Israel To Track Targets In the West Bank (euronews.com) 167

Israel has deployed a new kind of robotic weapon over a Palestinian refugee camp in the West Bank, reports Euronews. "The twin gun turrets can fire tear gas, stun grenades, and sponge-tipped bullets."

"Operated by trained soldiers, they track their targets using AI."

Slashdot reader DevNull127 writes: A Euronews video features footage of Sharone Aloni, Research and Development VP of Sharp Shooter, demonstrating one of the company's devices with an automatic Fire Control System. "Inside here, you have the computer running all the artificial intelligence, computer vision algorithms, which makes this what we call a true fire control system," Aloni says. "It's not only just relying on static information. It actually considers the human, the soldier, which is not stable. He's under pressure. He's tired. Sometimes he didn't get enough training. And also, the target is usually dynamic, and it's moving all the time."

The company's web site promises the systems "significantly increase weapon accuracy." And according to Euronews, Israel's army "says the tech protects soldiers, who can fire more accurately at a distance." But Omar Shakir, Human Rights Watch's director for Israel and Palestine, counters that when he hears claims of a reduction in risks, "that's often a one-sided kind of risk. It might minimize the risk for the occupying force or the army deploying it, but often it invariably increases the risk to affected communities." Sophisticated weapons systems "will lack elements of human control and agency that are often the difference between life and death." Euronews adds that "Palestinians and human rights experts say the weapons are dehumanizing, dangerous and unaccountable."

Sharp Shooter has a response to that, according to Eurnoews: the robotic guns are not fully automated, so a soldier must always pull the trigger, with the system only firing "after algorithms assess factors like wind speed, distance and velocity." And Michal Mor, Sharp Shooter's CEO and founder, also describes its utility in fighting a terrorist. "Usually the terrorist will be inside a civilian environment with many people that we do not want to hurt.

"We're enabling the soldier to look through his fire control system, to make sure that the target that he wants to hit is the legitimate target. Once he locks on the target, the system will make sure that the round will be released when he presses the trigger, only on the legitimate target, and none of the bystanders can be hit by the weapon."

The Israeli army stressed to Euronews that their deployment isn't using live rounds, and can only fire tear gas, stun grenades, and sponge-tipped bullets.

A resident of the refugee camp tells Euronews that the gun "is very fast, even faster than the soldiers."
Communications

Dallas Air Traffic Rerouted As FAA Probes Faulty GPS Signals (bloomberg.com) 54

An anonymous reader quotes a report from Bloomberg: Flights into the Dallas area are being forced to take older, cumbersome routes and a runway at Dallas-Fort Worth International Airport was temporarily closed after aviation authorities said GPS signals there aren't reliable. The Federal Aviation Administration said in an emailed statement Tuesday it's investigating the possible jamming of the global-positioning system that aircraft increasingly use to guide them on more efficient routes and to runways. So far, the agency has found "no evidence of intentional interference," it said. American Airlines, the primary carrier at DFW, said the GPS issue is not affecting its operations. Southwest Airlines, which flies from nearby Love Field, said it also isn't experiencing any disruptions. The FAA reopened the closed runway earlier on Tuesday.

The GPS problem -- despite the lack of impact -- highlights the risk of widespread reliance on the weak GPS radio signals from space used for everything from timing stock trades to guiding jetliners. The FAA occasionally warns pilots in advance of military testing that may degrade the GPS signals and pilots sometimes report short-lived problems, but the interference in Dallas is atypical, said Dan Streufert, founder of the flight-tracking website ADSBexchange.com. "In the US, it's very unusual to see this without a prior notice," Streufert said in an interview. ADSBExchange.com monitors aircraft data streams that indicate the accuracy of the GPS signals they are receiving and the website began seeing problems around Dallas on Monday, he said. The military has told the FAA it isn't conducting any operations that would interfere with GPS in that area, said a person familiar with the situation who wasn't authorized to speak publicly about it. The primary way FAA's air-traffic system tracks planes is based on GPS, but older radars and radio-direction beacons have remained in place as backups.

Microsoft

Microsoft's Army Goggles Left US Soldiers With Nausea, Headaches in Test (bloomberg.com) 68

US soldiers using Microsoft's new goggles in their latest field test suffered "mission-affecting physical impairments" including headaches, eyestrain and nausea, according to a summary of the exercise compiled by the Pentagon's testing office. From a report: More than 80% of those who experienced discomfort had symptoms after less than three hours using the customized version of Microsoft's HoloLens goggles, Nickolas Guertin, director of Operation Test and Evaluation, said in a summary for Army and Defense Department officials. He said the system also is still experiencing too many failures of essential functions. The problems found in the testing in May and June were outlined in a 79-page report this month. The Army marked it "Controlled Unclassified Information" to prevent public distribution, but Bloomberg News obtained a summary. Despite the device's flaws, Guertin doesn't deem it a lost cause. He recommended that the Army "prioritize improvements" before widespread deployment to reduce the "physical discomfort of users." He said improvements are also needed to the goggle's low-light sensors, display clarity, field of vision and poor reliability of some essential functions.
China

China May Prove Arm Wrong About RISC-V's Role In the Datacenter (theregister.com) 49

Arm might not think RISC-V is a threat to its newfound foothold in the datacenter, but growing pressure on Chinese chipmaking could ultimately change that, Forrester Research analyst Glenn O'Donnell tells The Register. From the report: Over the past few years the US has piled on export bans and trade restrictions on Chinese chipmakers in an effort to stall the country's semiconductor industry. This has included barring companies with ties to the Chinese military from purchasing x86 processors and AI kit from the likes of Intel, AMD, and Nvidia. "Because the US-China trade war restricts x86 sales to China, Chinese infrastructure vendors and cloud providers need to adapt to remain in business," O'Donnell said. "They initially pivoted to Arm, but trade restrictions exist there too. Chinese players are showing great interest in RISC-V."

RISC-V provides China with a shortcut around the laborious prospect of developing their own architecture. "Coming up with a whole new architecture is nearly impossible," O'Donnell said. But "a design based on some architecture is very different from the architecture itself." So it should come as no surprise that the majority of RISC-V members are based in China, according to a report published last year. And the country's government-backed Chinese Academy of Sciences is actively developing open source RISC-V performance processors.

Alibaba's T-Head, which is already deploying Arm server processors and smartNICs, is also exploring RISC-V-based platforms. But for now, they're largely limited to edge and IoT appliances. However, O'Donnell emphasizes that there is no technical reason that would prevent someone from developing a server-grade RISC-V chip. "Similar to Arm, many people dismiss RISC-V as underpowered for more demanding applications. They are wrong. Both are architectures, not specific designs. As such, one can design a powerful processor based on either architecture," he said. [...] One of the most attractive things about RISC-V over Softbank-owned Arm is the relatively low cost of building chips based on the tech, especially for highly commoditized use cases like embedded processors, O'Donnell explained. While nowhere as glamorous as something like a server CPU, embedded applications are one of RISC-V's first avenues into the datacenter. [...] These embedded applications are where O'Donnell expects RISC-V will see widespread adoption, including in the datacenter. Whether the open source ISA will rise to the level of Arm or x86 is another matter entirely.

United States

The Biden Administration Issues Sweeping New Rules on Chip-Tech Exports To China (protocol.com) 90

The U.S. unveiled a set of new regulations Friday that aim to choke off China's access to advanced chips, the tools necessary to manufacture years-old designs, and the service and support mechanisms needed to keep chip fabrication systems running smoothly. From a report: On a briefing call with reporters Thursday, administration officials said the goal is to block the People's Liberation Army and China's domestic surveillance apparatus from gaining access to advanced computing capabilities that require the use of advanced semiconductors. The chips, tools, and software are helping China's military, including aiding the development of weapons of mass destruction, according to the officials, who asked to remain anonymous to discuss the administration's policies freely.

The new rules are comprehensive, and cover a range of advanced semiconductor technology, from chips produced by the likes of AMD and Nvidia to the expensive, complex equipment needed to make those chips. Much of highest-quality chip manufacturing equipment is made by three U.S. companies: KLA, Applied Materials, and Lam Research, and cutting off China's access to their tools has the potential to damage the country's ambitions to become a chipmaking powerhouse. The Biden administration's new controls on chip exports represent a significant shift in U.S. policy related to China. For decades, the U.S. has attempted to keep China two generations of tech behind, typically by denying China access to the tools necessary to make advanced chips, or other technology, themselves. Now, the goal looks to be to cripple China's ability to produce chips with technology that is nearly a decade old, several generations behind the state-of-the-art capabilities.

Businesses

Amazon Provides Cloud Technology For a Chinese Military Company (nationalreview.com) 10

New submitter Billi-13 shares a report: Amazon's business relationships with two Chinese surveillance giants, Hikvision and Dahua, may violate a law prohibiting federal contractors from doing business with certain Chinese firms, a joint investigation by National Review and IPVM, a surveillance and security research group, reveals. While lawmakers are calling out these practices, Amazon has defended them and maintains that it is in full compliance with the law. Specifically, the Seattle-based tech giant might be running afoul of a provision in the 2019 National Defense Authorization Act barring contracts with firms that use certain Chinese surveillance hardware or software. One potentially significant issue is that Amazon Web Services simultaneously provides cloud Internet services to the U.S. National Security Agency and Hikvision, which the U.S. government designated as a Chinese military-industrial complex company last year.

"Facing a clear threat to federal networks, Congress drew a line in the sand for its contractors: if you do business with Hikvision or Dahua, you can't do business with the federal government," said Conor Healy, IPVM's director of government research. "Amazon seems determined to do the opposite. It is actively facilitating and incubating the very threat Congress sought to mitigate." Even absent the NDAA ban, enforcement of which is spotty, the record of the two Chinese surveillance firms -- neither of which responded to NR's requests for comment -- should be cause for concern. In 2019, Hikvision and Dahua were both blacklisted by the Commerce Department for their extensive work with the authorities in Xinjiang, as the Chinese Communist Party built out a sophisticated police state to systematically target ethnic minorities in the region. Dahua sells cameras that can identify Uyghur faces, with an alarm that goes off when they are in view. The company characterizes this as a smart-policing feature to detect "real-time Uyghur warnings" and "hidden terrorist inclinations." Hikvision, in addition to providing cameras used in Xinjiang prison camps, sells "tiger chair" torture and interrogation systems, among other things. Hikvision also has a well-documented relationship with the Chinese military, providing the People's Liberation Army air force with drone jammers, and pitching its technology as key to improving missile and tank systems.

Patents

Meta Ordered To Pay $175 Million For Copying Green Beret Veteran's App (militarytimes.com) 36

Meta, the parent company of Facebook and Instagram, was found by a federal jury in Austin, Texas, to have infringed on two patents held by Voxer, a walkie talkie messaging app founded by a former Army Green Beret. The social media giant was ordered to pay nearly $175 million in damages. Military Times reports: Voxer launched the app in 2011, which was named Best Overall App in the First Annual Silicon Valley Business App Awards in 2013. In 2012, Facebook approached Voxer about a potential collaboration that led to Voxer sharing its patents and proprietary information with the company. "When early meetings did not result in an agreement, Facebook identified Voxer as a competitor although Facebook had no live video or voice product at the time," court filings read. "Facebook revoked Voxer's access to key components of the Facebook platform and launched Facebook Live in 2015 followed by Instagram Live in 2016. Both products incorporate Voxer's technologies and infringe its patents."

The Texas jury found that Facebook Live and Instagram Live incorporated two pieces of Voxer's technologies that involve streaming media over networks. Meta countered in court filings that "Facebook has prioritized live video messaging since the launch of Facebook Live and Instagram Live, with one report identifying Facebook Live as Facebook's 'top priority.'"
In a statement to TechCrunch, Meta said the social media company will continue to press the issue through the courts. "We believe the evidence at trial demonstrated that Meta did not infringe Voxer's patents," Meta's spokesperson said in the statement. "We intend to seek further relief, including filing an appeal."
United Kingdom

ARM Founder: UK Has 'No Chance In Hell' of Making Its Own Tech Champs (bloomberg.com) 137

An anonymous reader quotes a report from Bloomberg: The UK has "no chance in hell" of becoming technologically sovereign, Hermann Hauser, the co-founder of Amadeus Capital Partners and Acorn Computers, said at Bloomberg's Technology Summit in London. Hauser emphasized the need for Europe and the UK to have access to critical technologies so it is not dependent on countries like the US. He mentioned former US President Donald Trump, who he said used semiconductor design software as "a weapon to force other countries including Britain to do what he wants."

"These dependencies are as severe now as military occupation was in the past," Hauser said. "And we just have to find our own independent access to critical technologies." One question countries have to ask themselves if whether they have all the critical technologies needed to run a country and its economy. "The answer for Britain" is "absolutely no, there is no chance in hell that Britain could ever become technologically sovereign," he said. Hauser added that Europe is clearly in a recession that could last a year or two. "It's difficult to know for how long with so many imponderables." "The UK in particular is in this very stormy period of having a financially undereducated chancellor, who goes by neoliberal ideology rather than rational decision making so that doesn't help," he added.
"The UK has struggled to keep its tech firms owned by local investors," notes Bloomberg. "Arm, one of the most significant global tech companies, is currently being prepped to be floated in the US by its Japanese owner SoftBank."

"French firm Schneider Electric SE has recently agreed to buy out minority shareholders in Aveva Group Plc, currently the UK's largest listed tech firm, in a deal that values the industrial software company at $10.8 billion."
Government

Richard Nixon Exposed To Radiation On Moscow Trip In 1959, Documents Reveal (theguardian.com) 88

An anonymous reader quotes a report from the Guardian: Richard Nixon and his wife, Pat, were exposed to potentially harmful radiation while staying at the US ambassador's residence in Moscow in 1959, according to declassified Secret Service documents. Nixon, who was vice-president at the time, was not informed of the threat, and the state department was only informed in 1976, when a member of his Secret Service detail, James Golden, revealed that detection equipment had measured significant levels of radiation in and around the Nixons' sleeping quarters at the residence, Spaso House. Golden said he was later told by the state department that he had been exposed to "massive dosages" of ionizing radiation produced by an atomic battery used by Soviet spies to power bugging devices hidden in the building. However, Golden had doubts about that explanation and it was not confirmed.

After Secret Service agents denounced Soviet dirty tricks in earshot of the listening devices in the residence, the radiation stopped. "We sat down on the beds facing each other and began berating the Russians in loud voices cursing them for pulling a trick like this and wondering in loud voices why they were taking us for fools and asking each other if they thought they were going to get away with doing this," Golden testified. Before his Moscow visit, Nixon was asked by another member of his Secret Service detail, John Sherwood, whether he wanted radiation detection devices taken on the trip. Sherwood pointed out that Soviet officials visiting the US had asked for Geiger counters. The vice-president turned down Geiger counters, but yes to more discreet dosimeters -- though he said he would not wear one himself and did not want it known that the matter had been discussed.

On the first evening of the visit, on 23 July 1959, the dosimeter readings climbed rapidly, leading a senior military official in the entourage, Adm Hyman Rickover, an expert on nuclear naval propulsion, to suspect that there had been a nuclear accident. Rickover and the US ambassador, Llewellyn Thompson, agreed not to tell Nixon. Golden was skeptical of the analysis by the state department's medical division that the radiation came from atomic batteries used to power listening devices inside Spaso House. He pointed out that the radiation had stopped while he was in the building, so no one could have come in and removed the batteries. He concluded the state department experts were not being frank with him.
The incident was reported after Golden's revelations in 1976, but this is the first time the underlying documentation has been made available online, after a request to the Nixon presidential library from the National Security Archive at George Washington University.
Google

Google Sees Russia Coordinating With Hackers in Cyberattacks Tied To Ukraine War (wsj.com) 5

A growing body of evidence suggests that pro-Russian hackers and online activists are working with the country's military intelligence agency, according to researchers at Google. From a report: Western officials and security experts are interested in the possible Kremlin links because it would help explain Moscow's intentions both inside and outside Ukraine despite recent military setbacks that prompted Russian President Vladimir Putin this week to announce a mobilization push. Officials in the U.S. and Europe have warned throughout the war that Russian hackers could lash out against Ukraine's allies by targeting critical infrastructure and governments with cyberattacks, but so far that has largely failed to materialize.

Over the past few months, Google's Mandiant cybersecurity group has observed apparent coordination between pro-Russian hacking groups -- ostensibly comprising patriotic citizen hackers -- and cyber break-ins by Russia's military intelligence agency, or GRU. In four instances, Mandiant says it observed hacking activity linked to the GRU in which malicious "wiper" software was installed on a victim's network. The initial wiper software caused disruption by destroying computer systems across the organization. Then, the hacktivists entered the picture. After each of these hacks -- within 24 hours of the wiping -- the hacktivist organizations have published data stolen from the same organizations.

Bitcoin

Pentagon Launches Effort To Assess Crypto's Threat To National Security (washingtonpost.com) 12

The military's innovation office is launching a sweeping review of cryptocurrencies to assess threats to national security and law enforcement posed by the rise of digital assets, the Washington Post reported Friday. From the report: The Defense Advanced Research Projects Agency -- better known as DARPA, the office that developed the earliest technology undergirding the internet -- has hired crypto intelligence firm Inca Digital to conduct the year-long project. The company will develop tools that give the Pentagon a granular view of crypto markets' inner workings, in part to help authorities crack down on illicit uses of digital assets. "The program underway here involves mapping out the cryptocurrency universe in some detail," Mark Flood, a program manager with the agency, said in an interview with The Washington Post. Beyond fighting illicit finance, the office aims to use the data for insights into dynamics shaping traditional financial markets, where detailed information is harder to gather. The deal is the latest evidence that federal agencies are ramping up efforts to thwart rogue regimes, terrorists and other criminal actors using crypto to fund their operations.
The Internet

Inside Russia's Vast Surveillance State (nytimes.com) 67

A cache of nearly 160,000 files from Russia's powerful internet regulator provides a rare glimpse inside Vladimir V. Putin's digital crackdown. The New York Times: Four days into the war in Ukraine, Russia's expansive surveillance and censorship apparatus was already hard at work. Roughly 800 miles east of Moscow, authorities in the Republic of Bashkortostan, one of Russia's 85 regions, were busy tabulating the mood of comments in social media messages. They marked down YouTube posts that they said criticized the Russian government. They noted the reaction to a local protest. Then they compiled their findings. One report about the "destabilization of Russian society" pointed to an editorial from a news site deemed "oppositional" to the government that said President Vladimir V. Putin was pursuing his own self-interest by invading Ukraine. A dossier elsewhere on file detailed who owned the site and where they lived. Another Feb. 28 dispatch, titled "Presence of Protest Moods," warned that some had expressed support for demonstrators and "spoke about the need to stop the war." The report was among nearly 160,000 records from the Bashkortostan office of Russia's powerful internet regulator, Roskomnadzor.

Together the documents detail the inner workings of a critical facet of Mr. Putin's surveillance and censorship system, which his government uses to find and track opponents, squash dissent and suppress independent information even in the country's furthest reaches. The leak of the agency's documents "is just like a small keyhole look into the actual scale of the censorship and internet surveillance in Russia," said Leonid Volkov, who is named in the records and is the chief of staff for the jailed opposition leader Aleksei A. Navalny. "It's much bigger," he said. Roskomnadzor's activities have catapulted Russia, along with authoritarian countries like China and Iran, to the forefront of nations that aggressively use technology as a tool of repression. Since the agency was established in 2008, Mr. Putin has turned it into an essential lever to tighten his grip on power as he has transformed Russia into an even more authoritarian state. The internet regulator is part of a larger tech apparatus that Mr. Putin has built over the years, which also includes a domestic spying system that intercepts phone calls and internet traffic, online disinformation campaigns and the hacking of other nations' government systems. The agency's role in this digital dragnet is more extensive than previously known, according to the records.

It has morphed over the years from a sleepy telecom regulator into a full-blown intelligence agency, closely monitoring websites, social media and news outlets, and labeling them as "pro-government," "anti-government" or "apolitical." Roskomnadzor has also worked to unmask and surveil people behind anti-government accounts and provided detailed information on critics' online activities to security agencies, according to the documents. That has supplemented real-world actions, with those surveilled coming under attack for speaking out online. Some have then been arrested by the police and held for months. Others have fled Russia for fear of prosecution. The files reveal a particular obsession with Mr. Navalny and show what happens when the weight of Russia's security state is placed on one target. The system is built to control outbursts like the one this week, when protesters across Russia rallied against a new policy that would press roughly 300,000 people into military service for the war in Ukraine. At least 1,200 people have already been detained for demonstrating. More than 700 gigabytes of records from Roskomnadzor's Bashkortostan branch were made publicly available online in March by DDoSecrets, a group that publishes hacked documents.

Facebook

Facebook Report: Censorship Violated Palestinian Rights (theintercept.com) 72

Facebook and Instagram's speech policies harmed fundamental human rights of Palestinian users during a conflagration that saw heavy Israeli attacks on the Gaza Strip last May, according to a study commissioned by the social media sites' parent company Meta. From a report: "Meta's actions in May 2021 appear to have had an adverse human rights impact ... on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred," says the long-awaited report, which was obtained by The Intercept in advance of its publication. Commissioned by Meta last year and conducted by the independent consultancy Business for Social Responsibility, or BSR, the report focuses on the company's censorship practices and allegations of bias during bouts of violence against Palestinian people by Israeli forces last spring.

Following protests over the forcible eviction of Palestinian families from the Sheikh Jarrah neighborhood in occupied East Jerusalem, Israeli police cracked down on protesters in Israel and the West Bank, and launched military airstrikes against Gaza that injured thousands of Palestinians, killing 256, including 66 children, according to the United Nations. Many Palestinians attempting to document and protest the violence using Facebook and Instagram found their posts spontaneously disappeared without recourse, a phenomenon the BSR inquiry attempts to explain. Last month, over a dozen civil society and human rights groups wrote an open letter protesting Meta's delay in releasing the report, which the company had originally pledged to release in the "first quarter" of the year. While BSR credits Meta for taking steps to improve its policies, it further blames "a lack of oversight at Meta that allowed content policy errors with significant consequences to occur."

The Military

Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data (vice.com) 37

An anonymous reader shares an excerpt from a report via Motherboard, written by Joseph Cox: Multiple branches of the U.S. military have bought access to a powerful internet monitoring tool that claims to cover over 90 percent of the world's internet traffic, and which in some cases provides access to people's email data, browsing history, and other information such as their sensitive internet cookies, according to contracting data and other documents reviewed by Motherboard. Additionally, Sen. Ron Wyden says that a whistleblower has contacted his office concerning the alleged warrantless use and purchase of this data by NCIS, a civilian law enforcement agency that's part of the Navy, after filing a complaint through the official reporting process with the Department of Defense, according to a copy of the letter shared by Wyden's office with Motherboard.

The material reveals the sale and use of a previously little known monitoring capability that is powered by data purchases from the private sector. The tool, called Augury, is developed by cybersecurity firm Team Cymru and bundles a massive amount of data together and makes it available to government and corporate customers as a paid service. In the private industry, cybersecurity analysts use it for following hackers' activity or attributing cyberattacks. In the government world, analysts can do the same, but agencies that deal with criminal investigations have also purchased the capability. The military agencies did not describe their use cases for the tool. However, the sale of the tool still highlights how Team Cymru obtains this controversial data and then sells it as a business, something that has alarmed multiple sources in the cybersecurity industry.

"The network data includes data from over 550 collection points worldwide, to include collection points in Europe, the Middle East, North/South America, Africa and Asia, and is updated with at least 100 billion new records each day," a description of the Augury platform in a U.S. government procurement record reviewed by Motherboard reads. It adds that Augury provides access to "petabytes" of current and historical data. Motherboard has found that the U.S. Navy, Army, Cyber Command, and the Defense Counterintelligence and Security Agency have collectively paid at least $3.5 million to access Augury. This allows the military to track internet usage using an incredible amount of sensitive information. Motherboard has extensively covered how U.S. agencies gain access to data that in some cases would require a warrant or other legal mechanism by simply purchasing data that is available commercially from private companies. Most often, the sales center around location data harvested from smartphones. The Augury purchases show that this approach of buying access to data also extends to information more directly related to internet usage.
"The Augury platform is not designed to target specific users or user activity. The platform specifically does not possess subscriber information necessary to tie records back to any users," said Team Cymru in a statement to Motherboard. "Our platform does not provide user or subscriber information, and it doesn't provide results that show any pattern of life, preventing its ability to be used to target individuals. Our platform only captures a limited sampling of the available data, and is further restricted by only allowing queries against restricted sampled and limited data, which all originates from malware, malicious activity, honeypots, scans, and third parties who provide feeds of the same. Results are then further limited in the scope and volume of what's returned," Team Cymru said in another email.

Charles E. Spirtos from the Navy Office of Information told Motherboard in an email that NCIS specifically "conducts investigations and operations in accordance with all applicable laws and regulations. The use of net flow data by NCIS does not require a warrant." He added that NCIS has not used netflow during any criminal investigation, but that "NCIS uses net flow data for various counterintelligence purposes."

Meanwhile, the Department of Defense Office of the Inspector General, which the whistleblower alleges referred their complaint to the Navy, told Motherboard it had received Wyden's letter and was reviewing it. The Office of the Naval Inspector General declined to comment and directed Motherboard back to its Department of Defense counterpart. The Defense Counterintelligence and Security Agency also deferred to the Department of Defense.
United States

President Biden Says Covid-19 Pandemic is Over in the US (bbc.com) 339

President Joe Biden has declared the pandemic over in the US, even as the number of Americans who have died from Covid continues to rise. From a report: Mr Biden said that while "we still have a problem", the situation is rapidly improving. Statistics show that over 400 Americans on average are dying from the virus each day. The head of the World Health Organization (WHO) said last week that the end of the pandemic is "in sight". In an interview with 60 Minutes on CBS, Mr Biden said that the US is still doing "a lot of work" to control the virus. The interview - aired over the weekend - was partly filmed on the floor of the Detroit Auto Show, where the president gestured towards the crowds. "If you notice, no one's wearing masks," he said. "Everybody seems to be in pretty good shape...I think it's changing."

In August, US officials extended the ongoing Covid-19 public health emergency, which has been in place since January 2020, through 13 October. To date, more than one million Americans have died from the pandemic. Data from Johns Hopkins University shows that the seven-day average of deaths currently stands at over 400, with more than 3,000 dead in the last week. In January 2021, by comparison, more than 23,000 people were reported dead from the virus over a single week-long span. About 65% of the total US population is considered fully vaccinated. Some federal vaccine mandates remain in place in the US - including on healthcare workers, military personnel and any non-US citizen entering the country by airplane.

United States

Pentagon Opens Sweeping Review of Clandestine Psychological Operations (washingtonpost.com) 29

The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms' rules. From a report: Colin Kahl, the undersecretary of defense for policy, last week instructed the military commands that engage in psychological operations online to provide a full accounting of their activities by next month after the White House and some federal agencies expressed mounting concerns over the Defense Department's attempted manipulation of audiences overseas, according to several defense and administration officials familiar with the matter.

The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. While the researchers did not attribute the sham accounts to the U.S. military, two officials familiar with the matter said that U.S. Central Command is among those whose activities are facing scrutiny. Like others interviewed for this report, they spoke on the condition of anonymity to discuss sensitive military operations. The researchers did not specify when the takedowns occurred, but those familiar with the matter said they were within the past two or three years. Some were recent, they said, and involved posts from the summer that advanced anti-Russia narratives citing the Kremlin's "imperialist" war in Ukraine and warning of the conflict's direct impact on Central Asian countries. Significantly, they found that the pretend personas -- employing tactics used by countries such as Russia and China -- did not gain much traction, and that overt accounts actually attracted more followers.

Transportation

GPS Jammers Are Being Used to Hijack Trucks and Down Drones (zdnet.com) 83

The world's freight-carrying trucks and ships use GPS-based satellite tracking and navigation systems, reports ZDNet. But "Criminals are turning to cheap GPS jamming devices to ransack the cargo on roads and at sea, a problem that's getting worse...." Jammers work by overpowering GPS signals by emitting a signal at the same frequency, just a bit more powerful than the original. The typical jammers used for cargo hijackings are able to jam frequencies from up to 5 miles away rendering GPS tracking and security apparatuses, such as those used by trucking syndicates, totally useless. In Mexico, jammers are used in some 85% of cargo truck thefts. Statistics are harder to come by in the United States, but there can be little doubt the devices are prevalent and widely used. Russia is currently availing itself of the technology to jam commercial planes in Ukraine.

As we've covered, the proliferating commercial drone sector is also prey to attack.... During a light show in Hong Kong in 2018, a jamming device caused 46 drones to fall out of the sky, raising public awareness of the issue.

While the problem is getting worse, the article also notes that companies are developing anti-jamming solutions for drone receivers, "providing protection and increasing the resiliency of GPS devices against jamming attacks.

"By identifying and preventing instances of jamming, fleet operators are able to prevent cargo theft."
Sci-Fi

Ukraine's Astronomers Say There Are Tons of UFOs Over Kyiv (vice.com) 283

An anonymous reader quotes a report from Motherboard: Ukraine's airspace has been busy this year -- that's the nature of war. But scientists in the country are looking to the skies and seeing something they didn't expect: An inordinate number of UFOs, according to a new preprint paper published (PDF) by Kyiv's Main Astronomical Observatory in coordination with the country's National Academy of Science. The paper does not specifically address the war, but in the United States, the Pentagon has long hinted, speculated, and warned that some UFOs could be advanced technology from foreign militaries, specifically China and Russia (though it hasn't really given any evidence this is actually the case). The Ukraine paper is particularly notable because it not only shows that science has continued to occur during the war, but also explains that there have been a lot of sightings. "We see them everywhere," the research said. "We observe a significant number of objects whose nature is not clear."

The paper is titled Unidentified aerial phenomena I. Observations of events come from observations made at NAS' Main Astronomical Observatory in Kyiv and a village south of Kyiv called Vinarivka. According to the paper's authors, the observatories took on the job of hunting for UFO's as an independent project because of the enthusiasm around the subject. It describes a specific type of UFO the researchers call "phantoms" that is an "object [that] is a completely black body that does not emit and absorbs all the radiation falling on it." The researchers also observed that the UFOs it's seeing are so fast that it's hard to take pictures of them. "The eye does not fix phenomena lasting less than one-tenth of a second," the paper said. "It takes four-tenths of a second to recognize an event. Ordinary photo and video recordings will also not capture the [unidentified aerial phenomenon]. To detect UAP, you need to fine-tune the equipment: shutter speed, frame rate, and dynamic range."

So the researchers did just that using two meteor monitoring stations in Kyiv and Vinarivka. "We have developed a special observation technique, taking into account the high speeds of the observed objects," the paper said. "The exposure time was chosen so that the image of the object did not shift significantly during exposure. The frame rate was chosen to take into account the speed of the object and the field of view of the camera. In practice, the exposure time was less than 1 ms, and the frame rate was no less than 50 Hz." The scientists divided the phenomenon they observed into two different categories: cosmics and phantoms. "We note that Cosmics are luminous objects, brighter than the background of the sky. We call these ships names of birds (swift, falcon, eagle)," the paper said. "Phantoms are dark objects, with contrast from several to about 50 percent."

Using the cameras, stationed roughly 75 miles apart, allowed the scientists to make repeated observations of strange objects moving in the sky. The paper didn't speculate on what the objects were, merely noted the observations and mentioned the objects' incredible speeds. "Flights of single, group and squadrons of the ships were detected, moving at speeds from 3 to 15 degrees per second," the research said. "Phantoms are observed in the troposphere at distances up to 10 -- 12 km. We estimate their size from 3 to 12 meters and speeds up to 15 km/s." The easy explanation would be that these are missiles, or rockets, or something else associated with the war. But the scientists insist that their nature "is not clear."

Slashdot Top Deals