Privacy

Amazon Studio Plans Lighthearted Show of Ring Surveillance Footage (arstechnica.com) 39

An anonymous reader quotes a report from Ars Technica: For some people, the term "Ring Nation" might evoke a warrantless surveillance dystopia overseen by an omnipotent megacorp. To Amazon-owned MGM, Ring Nation is a clip show hosted by comedian Wanda Sykes, featuring dancing delivery people and adorable pets. Deadline reports that the show, due to debut on September 26, is "the latest example of corporate synergy at Amazon." Amazon owns household video security brand Ring, Hollywood studio MGM, and Big Fish, the producer of Ring Nation. Viral videos captured by doorbell cameras have been hot for a while now. You can catch them on late-night talk shows, the r/CaughtOnRing subreddit, and on millions of TikTok users' For You page. Amazon's media properties, perhaps sensing an opportunity to capitalize and soften Ring's image, are sallying forth with an officially branded offering.

Ring Nation will feature "neighbors saving neighbors, marriage proposals, military reunions and silly animals," Deadline writes. But Ring Nation might be aiming even higher, according to Ring founder Jamie Siminoff -- to something approaching a salve for our deeply divided nation. "Bringing the new community together is core to our mission at Ring, and Ring Nation gives friends and family a fun new way to enjoy time with one another," Siminoff told Deadline. "We're so excited to have Wanda Sykes join Ring Nation to share people's memorable moments with viewers."
"Ring sharing its owners' moments with other viewers has been a contentious issue," notes Ars. Amazon's Ring can share footage with police during emergencies without consent and without warrants. The service has also reportedly partnered with hundreds of law enforcement agencies across the country to increase Ring installations and ease police access to footage.
United States

Fighter Pilots Will Don AR Helmets For Training (washingtonpost.com) 25

In the near future, "Top Gun" may get a reboot. Roughly one year from now, fighter pilots will begin flying with helmets outfitted with visors that can augment reality and place digital replicas of enemy fighter jets in their field of vision. For the first time, pilots will get to fly in the air and practice maneuvering against imitations of highly advanced aircraft made by countries like China and Russia. From a report: It is also part of the U.S. military's investment of billions into virtual reality, artificial intelligence and algorithms to modernize the way it fights wars. The pilot training solution, created by military technology company Red6, will be rolled out to the Air Force first as part of its $70 million contract with the branch. Company and former military officials say the technology will be a safe, cheap and realistic way to ensure American pilots are prepared to battle the best fighter planes in the world.

"Better, faster, cheaper," said Daniel Robinson, founder and chief executive of Red6. "This is the way we'll train them in the future." The military wants new 'robot ships' to replace sailors during battle For decades, the way America trains its fighter pilots has changed little. Aviators from the Air Force and Navy often start their training flying on a Northrop T-38 jet, often using a similar syllabus to one that has been around since the 1960s. From there, they train on planes, such as F-22 or F-35 fighter jets, that they will fly during their career.

Space

A Russian Military Satellite Appears to Be Stalking a New US Spy Satellite (thedrive.com) 61

When a U.S. satellite passed over Russia's Plesetsk Cosmodrome, a Russian satellite was launched close behind it "with capabilities unknown," reports the Drive, adding that it's now "getting suspiciously close..." Russia has launched satellite 14F150 Nivelir into orbit under a mission dubbed Kosmos-2558, and its current orbital path could soon place it in close proximity to what is reported to be the spy satellite designated USA-326. Unconfirmed rumors that the asset will serve as an 'inspector' satellite to covertly spy on nearby spacecraft have begun to circulate online following the launch and would line up with Russia's known on-orbit anti-satellite weapons capabilities and developments.

Its exact purpose is unknown at present, but it has been described as an "inspector" satellite, a term that is often associated with so-called "killer satellites...." Jonathan McDowell, an astronomer at the Center for Astrophysics, or @planet4589 on Twitter, has noted that Kosmos-2558's current orbital path will soon place it within 80 km of what is believed to be the USA 326 satellite. For reference, the Center for Astrophysics is a collaborative effort run jointly by the Smithsonian Astrophysical Observatory and Harvard College Observatory....

USA-326 was launched in February of this year by a SpaceX Falcon 9 rocket out of Vandenberg Space Force Base, its mission designated NROL-87, which is a classified national security operation led by the National Reconnaissance Office (NRO) in partnership with SpaceX. A press release shared by the NRO following the initial launch claimed that NROL-87 was designed, built, and now operated by the NRO to support its "overhead reconnaissance mission," which is largely centered around protecting national security through the exploitation of space-based intelligence, surveillance, and reconnaissance.

Thanks to long-time Slashdot reader schwit1 for sharing the story.
Businesses

TSMC Warns Taiwan-China War Would Make Everybody Losers (cnbc.com) 197

An anonymous reader quotes a report from CNBC: If China were to invade Taiwan, the most-advanced chip factory in the world would be rendered "not operable," TSMC Chair Mark Liu said in an English-language interview with CNN this week. In the undated interview, Liu said that if Taiwan were invaded by China, the chipmaker's plant would not be able to operate because it relies on global supply chains. "Nobody can control TSMC by force. If you take a military force or invasion, you will render TSMC factory not operable," Liu said. "Because this is such a sophisticated manufacturing facility, it depends on real-time connection with the outside world, with Europe, with Japan, with U.S., from materials to chemicals to spare parts to engineering software and diagnosis." The remarks were aired as tensions between China and Taiwan have escalated in recent days as House Speaker Nancy Pelosi visits the island. "The war brings no winners, everybody's losers," Liu said.

Liu compared a potential conflict in Taiwan to Russia's invasion of Ukraine, saying that while the two conflicts are very different, the economic impact to other countries would be similar. He encouraged political leaders to try to avoid war. "Ukraine war is not good for any of the sides, it's lose-lose-lose scenarios," Liu said. Liu said an invasion of the territory would cause economic turmoil for China, Taiwan and Western countries. He said that TSMC sells chips to consumer-facing Chinese companies that need the company's services and the supply of advanced computer chips. "How can we avoid war? How can we ensure that the engine of the world economy continues humming, and let's have a fair competition," Liu said.
Further reading: US To Stop TSMC, Intel From Adding Advanced Chip Fabs In China
Cloud

Will the US Army, Not Meta, Build an 'Open' Metaverse? (venturebeat.com) 35

Just five weeks before his death in 2001, Douglas Adams made a mind-boggling pronouncement. "We are participating in a 3.5 billion-year program to turn dumb matter into smart matter..." He gave the keynote address for an embedded systems conference at San Francisco's Moscone Center... Adams dazzled the audience with a vision of a world where information devices are ultimately "as plentiful as chairs...." When the devices of the world were networked together, they could create a "soft earth" — a shared software model of the world assembled from all the bits of data. Communicating in real time, the soft earth would be alive and developing — and with the right instruments, humankind could just as easily tap into a soft solar system.
It's 21 years later, in a world where the long-time global software company Bohemia Interactive Simulations claims to be "at the forefront of simulation training solutions for defense and civilian organizations." And writing in VentureBeat, their chief commercial officer argues that "We do not yet have a shared imagination for the metaverse and the technology required to build it," complaining that big-tech companies "want to keep users reliant on their tech within a closed, commercialized ecosystem." I envision an open virtual world that supports thousands of simultaneous players and offers valuable, immersive use cases.

The scope of this vision requires an open cloud architecture with native support for cloud scalability. By prioritizing cloud development and clear goal-setting, military organizations have taken significant leaps toward building an actual realization of this metaverse. In terms of industry progress towards the cloud-supported, scalable metaverse, no organization has come further than the U.S. Army.

Their Synthetic Training Environment (STE) has been in development since 2017. The STE aims to replace all legacy simulation programs and integrate different systems into a single, connected system for combined arms and joint training. The STE fundamentally differs from traditional, server-based approaches. For example, it will host a 1:1 digital twin of the Earth on a cloud architecture that will stream high fidelity (photo-realistic) terrain data to connected simulations. New terrain management platforms such as Mantle ETM will ensure that all connected systems operate on exactly the same terrain data. For example, trainees in a tank simulator will see the same trees, bushes and buildings as the pilot in a connected flight simulator, facilitating combined arms operations.

Cloud scalability (that is, scaling with available computational power) will allow for a better real-world representation of essential details such as population density and terrain complexity that traditional servers could not support. The ambition of STE is to automatically pull from available data resources to render millions of simulated entities, such as AI-based vehicles or pedestrians, all at once.... [D]evelopers are creating a high-fidelity, digital twin of the entire planet.

Commercial metaverses created for entertainment or commercial uses may not require an accurate representation of the earth.... Still, the military metaverse could be a microcosm of what may soon be a large-scale, open-source digital world that is not controlled or dominated by a few commercial entities....

STE success will pave the way for any cloud-based, open-source worlds that come after it, and will help prove that the metaverse's value extends far beyond that of a marketing gimmick.

United States

US Air Force Grounds Most of Its F-35 Fighter Jets Over Ejection Seat Concerns (taskandpurpose.com) 102

The F-35 stealth-combat aircraft is the "crown jewel" of America's Air Force fight fleet, according to the defense news site Task & Purpose.

But Friday they were all grounded — "sidelined for an indeterminate amount of time as the service inspects most of its F-35 fighter jet ejection seats for faulty launch cartridges, service officials said..." The news marks the latest difficult headline for the beleaguered fighter, which U.S. military officials have placed at the forefront of their airpower strategy despite a long list of maintenance issues. Air Combat Command, the Air Force command which oversees the bulk of the service's fighter fleet, made the decision to ground its F-35s on Friday after other units of the Air Force and Navy grounded many of their aircraft due to concerns over faulty parts which could prevent the pilot ejection seat from launching out of the cockpit in an emergency. Air Combat Command spokesperson Alexi Worley said that the command started a 90-day inspection period of all cartridges on its F-35 ejection seats on July 19.

"Out of an abundance of caution, ACC units will execute a stand-down on July 29 to expedite the inspection process," Worley said. "Based on data gathered from those inspections, ACC will make a determination to resume operations."

Worley later added that the stand-down "will continue through the weekend, and a determination to safely resume normal operations is expected to be made early next week, pending analysis of the inspection data."

Many jet aircraft in the U.S. military are equipped with ejection seats made by the company Martin-Baker, which notified the Navy about potential defects earlier this month, according to Breaking Defense, which first reported the F-35 grounding story on Friday. The problem part is the cartridge actuated device, an explosive cartridge that helps launch the ejection seat out of an aircraft. Martin-Baker identified certain production lots of cartridge actuated devices as being defective and in need of replacement, the Air Force told Breaking Defense.

"While the aircraft are flyable, I don't think too many pilots would be willing to fly knowing they may not be able [to] eject," Michael Cisek, a senior associate at the aviation consulting firm AeroDynamic Advisory, told Breaking Defense....

America's allies may also be affected by the issue. On Wednesday, Breaking Defense reported that the Navy had informed foreign military sales customers about the issue and was working with them to resolve it.

Security

Anonymous Hacktivists Breach Russian Databases, Leak 'Massive' Amounts of Data (cnbc.com) 80

"The Anonymous declaration of cyberwar was a top news story despite no evidence," writes cybersecurity specialist Jeremiah Fowler (an American who worked in Kyiv for the last 10 years — until fleeing in February to Poland). To investigate, Fowler performed a random sampling of 100 exposed Russian databases — and discovered that 92 of them had indeed been compromised. "Anti-Russian hackers used a similar script to the infamous 'MeowBot' that changed the name of folders and deleted the contents of the files. " (For example, renaming the folders to "putin_stop_this_war".)

And that was just the beginning, reports CNBC: Anonymous has claimed to have hacked over 2,500 Russian and Belarusian sites, said Fowler. In some instances, stolen data was leaked online, he said, in amounts so large it will take years to review. "The biggest development would be the overall massive number of records taken, encrypted or dumped online," said Fowler. Shmuel Gihon, a security researcher at the threat intelligence company Cyberint, agreed that amount of leaked data is "massive."

"We currently don't even know what to do with all this information, because it's something that we haven't expected to have in such a short period of time," he said....

The more immediate outcome of the hacks, Fowler and Gihon agreed, is that Russia's cybersecurity defenses have been revealed as being far weaker than previously thought.

Fowler's report argues that Anonymous has "rewritten the rules of how a crowdsourced modern cyberwar is conducted" — with the group also offering penetration testing to Ukraine, "finding vulnerabilities before Russia could exploit them." But in addition, Fowler writes, Anonymous's efforts have also "transformed into a larger operation that spread far beyond the Russian government, companies, or organizations, and included an information campaign aimed at Russian citizens."

Some examples: Hacking Printers — Russian censorship has blocked many inside the country from knowing the true scale of the war and Russian losses. Anonymous hacked printers across Russia and printed uncensored facts or anti-propaganda and pro-ukrainian messages. The group claims to have printed over 100,000 documents. This also includes barcode printers at grocery stores where prices were changed and product names were changed to anti-war or pro-Ukrainian slogans....

RoboDial, SMS, and Email Spam — Almost everyone on earth has received some form of spam in the form of a phone call, text, or email message. These usually try to sell a service or scam victims out of money. Now this same technology has been used to bypass Russian censorship and inform citizens of news and messages they are forbidden to learn on state sponsored propaganda channels. Anonymous affiliated Squad303 claimed to have sent over 100 million messages to Russian devices.

Government

Prior to Invasion, Russian Agents May Have Infilitrated Chernobyl Nuclear Disaster Site (reuters.com) 211

Reuters investigated the strange thing that happened when Russia's invading armored vehicles reached Chernobyl, "a key staging post on the approach to Kyiv," on February 24th. "In less than two hours, and without a fight, the 169 members of the Ukrainian National Guard laid down their weapons."

The fall of Chernobyl, site of the world's worst nuclear disaster, stands out as an anomaly in the five-month old war: a successful blitzkrieg operation in a conflict marked elsewhere by a brutal and halting advance by Russian troops and grinding resistance by Ukraine. Now a Reuters investigation has found that Russia's success at Chernobylwas no accident, but part of a long-standing Kremlin operation to infiltrate the Ukrainian state with secret agents....

One source with direct knowledge of the Kremlin's invasion plans told Reuters that Russian agents were deployed to Chernobyl last year to bribe officials and prepare the ground for a bloodless takeover. Reuters couldn't independently verify the details of this assertion. However, Ukraine's State Bureau of Investigation has said it is investigating a former top intelligence official, Andriy Naumov, on suspicion of treason for passing Chernobyl security secrets to a foreign state.... A review of Ukrainian testimony and court documents and an interview with a local official show that Kyiv is conducting at least three investigations into the conduct of people who worked at Chernobyl. The investigations have identified at least two people suspected of providing information to Russian agents or otherwise helping them seize the plant, according to these documents....

For Russia's war planners, seizing Chernobyl was just a stepping stone to the main objective: taking control of the Ukrainian national government in Kyiv. There, too, the Kremlin expected that undercover agents in positions of power would play a crucial part, according to four sources with knowledge of the plan.

It's been said that journalism is a first draft of history. And Reuters is already wondering how this affected the invasion's ultimate outcome: Five people with knowledge of the Kremlin's preparations said war planners around President Vladimir Putin believed that, aided by these agents, Russia would require only a small military force and a few days to force Ukrainian President Volodymyr Zelenskiy's administration to quit, flee or capitulate.... At a national level, sources with knowledge of the Kremlin's plans said Moscow was counting on activating sleeper agents inside the Ukrainian security apparatus...

Though Russia captured Chernobyl, its plan to take power in Kyiv failed. In many cases, the sleeper agents Moscow had installed failed to do their job, according to multiple sources in Russia and Ukraine.... People the Kremlin counted on as its proxies in Ukraine overstated their influence in the years leading up to the invasion, said four of the sources with knowledge of the Kremlin's preparations. The Kremlin relied in its planning on "clowns — they know a little bit, but they always say what the leadership wants to hear because otherwise they won't get paid," said one of the four, a person close to the Moscow-backed separatist leadership in eastern Ukraine.

Putin now finds himself in a protracted, full-scale war, fighting for every inch of territory at huge cost.

Technology

Iran Ramps Up Drone Exports, Signaling Global Ambitions (nytimes.com) 16

Iran has made steady advances in the design and production of military drones in recent years, and has stepped up their transfer to militant groups across the Middle East as it seeks to shift the dynamics of battlefields from Yemen to Gaza. Those efforts have now extended far beyond the region. From a report: Iran is now seeking to build its global clout and sell increasingly sophisticated weapons-capable drones commercially to other nations, including those that have been subject to various sanctions in recent years, like Venezuela and Sudan, according to Iranian news media, satellite images and defense experts inside and outside Iran.

That has provided an important source of funds and political influence for Iran, which is itself isolated and struggling under U.S. financial restrictions. Now, Russia may be a potential client. Washington said this month that it had intelligence that Moscow planned to purchase hundreds of drones from Iran to bolster its arsenal for the war in Ukraine. U.S. officials have urged Iran not to sell drones to Russia and warned of consequences for both countries. Iran's foreign ministry said in a statement that its military cooperation with Russia predated the war, without providing details, and its foreign minister, Hossein Amir-Abdollahian, said in an interview with the Italian daily La Repubblica in July that the country had no plans to provide military equipment to either side of the conflict.

United States

Senate Passes $280 Billion Industrial Policy Bill To Counter China (nytimes.com) 62

The Senate on Wednesday passed an expansive $280 billion bill aimed at building up America's manufacturing and technological edge to counter China, embracing in an overwhelming bipartisan vote the most significant government intervention in industrial policy in decades. From a report: The legislation reflected a remarkable and rare consensus in an otherwise polarized Congress in favor of forging a long-term strategy to address the nation's intensifying geopolitical rivalry with Beijing, centered around investing federal money into cutting-edge technologies and innovations to bolster the nation's industrial, technological and military strength.

It passed on a lopsided bipartisan vote of 64 to 33, with 17 Republicans voting in support. The margin illustrated how commercial and military competition with Beijing -- as well as the promise of thousands of new American jobs -- has dramatically shifted longstanding party orthodoxies, generating agreement among Republicans who once had eschewed government intervention in the markets and Democrats who had resisted showering big companies with federal largess. "No country's government -- even a strong country like ours -- can afford to sit on the sidelines," Senator Chuck Schumer, Democrat of New York and the majority leader who helped to spearhead the measure, said in an interview. "I think it's a sea change that will stay."

United States

$79B to Boost US Semiconductor Production Opposed by 31 Republican Senators - and Bernie Sanders (apnews.com) 129

A long-awaited bill in the U.S. Congress proposes $79 billion (over 10 years) to boost U.S. semiconductor production, reports the Associated Press, "mostly as a result of new grants and tax breaks that would subsidize the cost that computer chip manufacturers incur when building or expanding chip plants in the United States."

But opposing the bill are 31 Republican senators — and democratic socialist senator Bernie Sanders: Supporters say that countries all over the world are spending billons of dollars to lure chipmakers. The U.S. must do the same or risk losing a secure supply of the semiconductors that power the nation's automobiles, computers, appliances and some of the military's most advanced weapons systems. Sanders (Independent — Vermont), and a wide range of conservative lawmakers, think tanks and media outlets have a different take. To them, it's "corporate welfare...."

"Not too many people that I can recall — I have been all over this country — say: 'Bernie, you go back there and you get the job done, and you give enormously profitable corporations, which pay outrageous compensation packages to their CEOs, billions and billions of dollars in corporate welfare,'" Sanders said.

Senator Mitt Romney (Republican — Utah), is among the likely Republican supporters. Asked about the Sanders' argument against the bill, Romney said that when other countries subsidize the manufacturing of high technology chips, the U.S. must join the club. "If you don't play like they play, then you are not going to be manufacturing high technology chips, and they are essential for our national defense as well as our economy," Romney said....

"My fear is that more and more companies will locate their manufacturing facilities in other countries and that we will be increasingly vulnerable," said Senator Susan Collin (Republican — Maine).

The bill's supporters remain confident it will pass the U.S. Senate, but then "the window for passing the bill through the House is narrow if progressives join with Sanders and if most Republicans line up in opposition based on fiscal concerns.

"The White House says the bill needs to pass by the end of the month because companies are making decisions now about where to build."
China

Chinese-Made Huawei Equipment Could Disrupt US Nuclear Arsenal Communications, FBI Determines (cnn.com) 84

There's been "a dramatic escalation of Chinese espionage on US soil over the past decade," sources in the U.S. counterintelligence community have told CNN this weekend.

But some dramatic new examples have been revealed. For example, in 2017 China's government offered to build a $100 million pavilion in Washington D.C. with an ornate 70-foot pagoda. U.S. counterintelligence officials realized its location — two miles from the U.S. Capitol — appeared "strategically placed on one of the highest points in Washington DC...a perfect spot for signals intelligence collection." Also alarming was that Chinese officials wanted to build the pagoda with materials shipped to the US in diplomatic pouches, which US Customs officials are barred from examining, the sources said. Federal officials quietly killed the project before construction was underway...

Since at least 2017, federal officials have investigated Chinese land purchases near critical infrastructure, shut down a high-profile regional consulate believed by the US government to be a hotbed of Chinese spies and stonewalled what they saw as clear efforts to plant listening devices near sensitive military and government facilities.

Among the most alarming things the FBI uncovered pertains to Chinese-made Huawei equipment atop cell towers near US military bases in the rural Midwest. According to multiple sources familiar with the matter, the FBI determined the equipment was capable of capturing and disrupting highly restricted Defense Department communications, including those used by US Strategic Command, which oversees the country's nuclear weapons.... It's unclear if the intelligence community determined whether any data was actually intercepted and sent back to Beijing from these towers. Sources familiar with the issue say that from a technical standpoint, it's incredibly difficult to prove a given package of data was stolen and sent overseas.

The Chinese government strongly denies any efforts to spy on the US.... But multiple sources familiar with the investigation tell CNN that there's no question the Huawei equipment has the ability to intercept not only commercial cell traffic but also the highly restricted airwaves used by the military and disrupt critical US Strategic Command communications, giving the Chinese government a potential window into America's nuclear arsenal.... As Huawei equipment began to proliferate near US military bases, federal investigators started taking notice, sources familiar with the matter told CNN. Of particular concern was that Huawei was routinely selling cheap equipment to rural providers in cases that appeared to be unprofitable for Huawei — but which placed its equipment near military assets.

The Military

America's Defense Department Creates a New Office for Tracking and Analyzing UFOs (space.com) 43

This week America's Department of Defense "created an office to track unidentified objects in space and air, [and] under water," reports Space.com, "or even those that appear to travel between these domains." UFOs, or as they are now known, unidentified aerial phenomena (UAP) have been receiving newfound levels of government scrutiny not seen in decades. Multiple hearings and classified briefings have taken place in the halls of the U.S. Congress in recent months, and many lawmakers have expressed concern that America's airspace may not be as safe as we think due to the many sightings of unidentified objects military aviators and other armed forces personnel have reported.

With that in mind, the Department of Defense announced the creation of this new office in a statement published Wednesday (July 20). The office is known as the All-domain Anomaly Resolution Office, or AARO, and was established within the Office of the Under Secretary of Defense for Intelligence and Security... The office has six primary lines of effort: surveillance, collection and reporting; system capabilities and design; intelligence operations and analysis; mitigation and defeat; governance; and science and technology.

A statement from the U.S. Department of Defense spells out its mission:
  • To synchronize efforts across the Department of Defense, and with other U.S. federal departments and agencies
  • To detect, identify and attribute objects of interest in, on or near military installations, operating areas, training areas, special use airspace and other areas of interest
  • As necessary, to mitigate any associated threats to safety of operations and national security.

Long-time Slashdot reader schwit1 notes the office already has its own Twitter feed, providing "updates and information relative to our examinations of unidentified anomalous phenomena across space, air, and maritime domains."


Robotics

Robot Dog Not So Cute With Submachine Gun Strapped To Its Back (vice.com) 113

An anonymous reader quotes a report from Motherboard: A video started circulating on Twitter Thursday of a Boston Dynamics-style robot dog firing a submachine gun into targets amid a snowy backdrop. This type of robot dog (it doesn't seem like the robot in the video is a Boston Dynamics Spot, just looks a lot like it) is famous for dancing, but now appears to have fulfilled every warning given by journalists and analysts. It's got a gun and it's ready to kill. A lot of questions remain. First, the robot dog doesn't seem to be able to handle the recoil of the gun well. As it fires its rounds, the barrel trails up and the dog has to take a minute to get its balance back. We also don't know if the dog is firing on its own or if, and this is more likely, someone is off-camera pulling the trigger remotely.

The robot's feet, various ports, and its front are completely different from Boston Dynamics' Spot. There's dozens of knockoffs of the Boston Dynamics dog selling on the international market. The one in the video appears to be a UnitreeYusu "technology dog" selling on AliExpress for about $3,000. The feet, port placement, and joint coverings are all the same. The robot also has strips of Velcro on either of its flanks. The left flank bears a Russian flag and the other appears with a wolf's head. In another video on the channel, a man wears a similar patch on his arm. It appears to be a wolf's head insignia commonly associated with Russian Special Operations Forces or Spetsnaz. That doesn't mean that Spetsnaz is using armed robot dogs, as pretty much anyone can buy a similar patch online in various places.

The gun is also Russian. It appears to be a PP-19 Vityaz, a submachine gun based on the AK-74 design. As the dog wanders around and fires, it sometimes moves in front of an armored personnel carrier with a unique triangular door. That's a BDRM-2, a Russian armored car that's been spotted recently in Ukraine. Finally, there's the account the video originally appeared on. Before making its way to Twitter, the video of the dog was posted to the YouTube account of Alexander Atamov on March 22, 2022. Atamov is listed on his LinkedIn profile as the founder of "HOVERSURF" and his Facebook page lists him as living in Moscow. He posted a picture of the robot dog on March 21. According to Facebook's translation of his post, he called the dog "Skynet."

United States

US Probes China's Huawei Over Equipment Near Missile Silos (reuters.com) 39

The Biden administration is investigating Chinese telecoms equipment maker Huawei over concerns that U.S. cell towers fitted with its gear could capture sensitive information from military bases and missile silos that the company could then transmit to China, Reuters reported Thursday, citing people familiar with the matter. From the report: Authorities are concerned Huawei could obtain sensitive data on military drills and the readiness status of bases and personnel via the equipment, one of the people said, requesting anonymity because the investigation is confidential and involves national security. The previously unreported probe was opened by the Commerce Department shortly after Joe Biden took office early last year, the sources said, following the implementation of rules to flesh out a May 2019 executive order that gave the agency the investigative authority.
Privacy

Pegasus Spyware Used Against Thailand's Pro-Democracy Movement (citizenlab.ca) 6

NSO Group's Pegasus spyware was used to target Thai pro-democracy protesters and leaders calling for reforms to the monarchy. "We forensically confirmed that at least 30 individuals were infected with NSO Group's Pegasus spyware," reports Citizen Lab. "The observed infections took place between October 2020 and November 2021." Here's an excerpt from the report: Introduction: Surveillance & Repression in Thailand: The Kingdom of Thailand is a constitutional monarchy with a parliamentary-style government divided into executive, legislative, and judiciary branches. The country has been beset by intense political conflict since 2005, during the government of former Prime Minister Thaksin Shinawatra. Corruption allegations against the regime culminated in a military coup on September 19, 2006 that ousted Thaksin. The military launched another coup on May 22, 2014 and seized power following mass protests against the civilian government led by Thaksin's sister, Yingluck Shinawatra. The junta claimed that the 2014 coup was needed to restore order and called itself the National Council for Peace and Order (NCPO).

Findings: Pegasus Infections in Thailand: On November 23, 2021, Apple began sending notifications to iPhone users targeted by state-backed attacks with mercenary spyware. The recipients included individuals that Apple believes were targeted with NSO Group's FORCEDENTRY exploit. Many Thai civil society members received this warning. Shortly thereafter, multiple recipients of the notification made contact with the Citizen Lab and regional groups. In collaboration with Thai organizations iLaw and DigitalReach, forensic evidence was obtained from notification recipients, and other suspected victims, who consented to participate in a research study with the Citizen Lab. We then performed a technical analysis of forensic artifacts to determine whether these individuals were infected with Pegasus or other spyware. Victims publicly named in this report consented to be identified as such, while others chose to remain anonymous, or have their cases described with limited detail.

Civil Society Pegasus Infections: We have identified at least 30 Pegasus victims among key civil society groups in Thailand, including activists, academics, lawyers, and NGO workers. The infections occurred from October 2020 to November 2021, coinciding with a period of widespread pro-democracy protests, and predominantly targeted key figures in the pro-democracy movement. In numerous cases, multiple members of movements or organizations were infected. Many of the victims included in this report have been repeatedly detained, arrested, and imprisoned for their political activities or criticism of the government. Many of the victims have also been the subject of lese-majeste prosecutions by the Thai government. While many of the infections were detected on the devices of prominent figures, hacking was also observed against individuals who are not publicly involved in the protests. Speculatively, this may reflect the attackers' intent to uncover details about how opposition movements were organized, and may have been prompted by specific financial transactions that would have been known to Thai financial institutions and the government, but not the public.

Google

Russia Hits Google With Fine For 'Illegal Content' (bbc.com) 189

Russia has hit Google with a $373 million fine for failing to restrict access to "prohibited" material about the war in Ukraine and other content. The BBC reports: Roskomnadzor, the country's communications regulator, said the information included "fake" reports that discredited Russia's military and posts urging people to protest. It called the US tech giant a "systematic" violator of its laws. Google did not comment immediately.

The company's local subsidiary declared bankruptcy last month. The move came after Russian authorities seized its local bank account, allowing them to recover 7.2bn roubles that the firm had been ordered to pay for similar reasons last year. [...] The fine announced on Monday, which was calculated as a share of the firm's local revenue, marks the biggest penalty ever imposed on a tech company in Russia, according to state media.

The Military

DARPA Is Worried About How Well Open-Source Code Can Be Trusted (technologyreview.com) 85

An anonymous reader quotes a report from MIT Technology Review: "People are realizing now: wait a minute, literally everything we do is underpinned by Linux," says Dave Aitel, a cybersecurity researcher and former NSA computer security scientist. "This is a core technology to our society. Not understanding kernel security means we can't secure critical infrastructure." Now DARPA, the US military's research arm, wants to understand the collision of code and community that makes these open-source projects work, in order to better understand the risks they face. The goal is to be able to effectively recognize malicious actors and prevent them from disrupting or corrupting crucially important open-source code before it's too late. DARPA's "SocialCyber" program is an 18-month-long, multimillion-dollar project that will combine sociology with recent technological advances in artificial intelligence to map, understand, and protect these massive open-source communities and the code they create. It's different from most previous research because it combines automated analysis of both the code and the social dimensions of open-source software.

Here's how the SocialCyber program works. DARPA has contracted with multiple teams of what it calls "performers," including small, boutique cybersecurity research shops with deep technical chops. One such performer is New York -- based Margin Research, which has put together a team of well-respected researchers for the task. Margin Research is focused on the Linux kernel in part because it's so big and critical that succeeding here, at this scale, means you can make it anywhere else. The plan is to analyze both the code and the community in order to visualize and finally understand the whole ecosystem.

Margin's work maps out who is working on what specific parts of open-source projects. For example, Huawei is currently the biggest contributor to the Linux kernel. Another contributor works for Positive Technologies, a Russian cybersecurity firm that -- like Huawei -- has been sanctioned by the US government, says Aitel. Margin has also mapped code written by NSA employees, many of whom participate in different open-source projects. "This subject kills me," says d'Antoine of the quest to better understand the open-source movement, "because, honestly, even the most simple things seem so novel to so many important people. The government is only just realizing that our critical infrastructure is running code that could be literally being written by sanctioned entities. Right now." This kind of research also aims to find underinvestment -- that is critical software run entirely by one or two volunteers. It's more common than you might think -- so common that one common way software projects currently measure risk is the "bus factor": Does this whole project fall apart if just one person gets hit by a bus?
SocialCyber will also tackle other open-source projects too, such as Python which is "used in a huge number of artificial-intelligence and machine-learning projects," notes the report. "The hope is that greater understanding will make it easier to prevent a future disaster, whether it's caused by malicious activity or not."
Businesses

US Military Contractor Moves To Buy Israeli Spy-Tech Company NSO Group (theregister.com) 5

US security technology provider L3Harris has courted controversial Israeli spyware firm NSO with an aim to buy it, according to reports. The Register reports: The New York Times claims L3Harris in recent months sent a team to Israel to try to smooth passage of the deal, which was made challenging by US president Joe Biden's decision to blacklist NSO following the use of its Pegasus software to crack phones of politicians and campaigners. The L3Harris executives delivered a message that the US government offers tacit support of its acquisition bid, although public statements were unlikely, according to five separate sources.

The claims run counter to statements from US officials who were said to be outraged to learn about the negotiations for an American company to purchase a blacklisted spy-tech vendor. Later, L3Harris told officials it planned to end its attempt to buy the company while conflicting accounts said it hoped to restart them. The Times says that the US military contractor hired lawyer Daniel Reisner, who once worked for Israeli Military Prosecutor's Office to advise on the deal. News website Intelligence Online has also reported L3Harris efforts to buy NSO, although it quoted White House officials as saying the deal could create "serious counterintelligence and security concerns" for the US.

United States

Efforts to Acquire Pegasus Spyware's Company Backed by US Spies, Says Stingray Maker (msn.com) 23

The New York Times describes Pegasus as "a 'zero-click' hacking tool that can remotely extract everything from a target's mobile phone [and] turn the mobile phone into a tracking and recording device." But they also report that the tool's "notorious" maker, NSO Group, was visited "numerous times" in recent months by a executives from American military contractor L3Harris — makes of the cellphone-tracking Stingray tool — who'd wanted to negotiate a purchase of the company.

Their first problem? The U.S. government had blacklisted NSO Group in November, saying Pegasus had been used to compromise phones of political leaders, human rights activists and journalists. But five people familiar with the negotiations said that the L3Harris team had brought with them a surprising message that made a deal seem possible. American intelligence officials, they said, quietly supported its plans to purchase NSO, whose technology over the years has been of intense interest to many intelligence and law enforcement agencies around the world, including the F.B.I. and the C.I.A.

The talks continued in secret until last month, when word of NSO's possible sale leaked and sent all the parties scrambling. White House officials said they were outraged to learn about the negotiations, and that any attempt by American defense firms to purchase a blacklisted company would be met by serious resistance.... Left in place are questions in Washington, other allied capitals and Jerusalem about whether parts of the U.S. government — with or without the knowledge of the White House — had seized an opportunity to try to bring control of NSO's powerful spyware under U.S. authority, despite the administration's very public stance against the Israeli firm....

[NSO Group] had seen a deal with the American defense contractor as a potential lifeline after being blacklisted by the Commerce Department, which has crippled its business. American firms are not allowed to do business with companies on the blacklist, under penalty of sanctions. As a result, NSO cannot buy any American technology to sustain its operations — whether it be Dell servers or Amazon cloud storage — and the Israeli firm has been hoping that being sold to a company in the United States could lead to the sanctions being lifted....

L3 Harris's representatives told the Israelis that U.S. intelligence agencies supported the acquisition as long as certain conditions were met, according to five people familiar with the discussions. One of the conditions, those people said, was that NSO's arsenal of "zero days" — the vulnerabilities in computer source code that allow Pegasus to hack into mobile phones — could be sold to all of the United States' partners in the so-called Five Eyes intelligence sharing relationship. The other partners are Britain, Canada, Australia and New Zealand.

"Several people familiar with the talks said there have been attempts to resuscitate the negotiations..."

Slashdot Top Deals