×
China

Chinese Satellite Observed Grappling Another and Pulling It Out of Orbit (thedrive.com) 161

Last week a Chinese satellite "was observed grabbing another satellite and pulling it out of its normal geosynchronous orbit," reports the Drive, "and into a 'super-graveyard drift orbit.'"

"The maneuver raises questions about the potential applications of these types of satellites designed to maneuver close to other satellites for inspection or manipulation and adds to growing concerns about China's space program overall." On January 22, China's Shijian-21 satellite, or SJ-21, disappeared from its regular position in orbit during daylight hours when observations were difficult to make with optical telescopes. SJ-21 was then observed executing a "large maneuver" to bring it closely alongside another satellite, a dead BeiDou Navigation System satellite. SJ-21 then pulled the dead satellite out of its normal geosynchronous orbit and placed it a few hundred miles away in what is known as a graveyard orbit. These distant orbits are designated for defunct satellites at the end of their lives and are intended to reduce the risk of collision with operational assets....

According to Chinese state news outlets, SJ-21 was designed to "test and verify space debris mitigation technologies."

SJ-21's recent maneuver raises questions and concerns about these types of satellites and their potential for military use. Todd Harrison, director of CSIS's Aerospace Project, told Breaking Defense that SJ-21's actions present "more questions than answers," adding that while we can observe the satellite's actions, "the intent behind it and what China plans to do with this technology is a more subjective assessment."

This isn't the first time SJ-21 has made headlines with its questionable behavior. In November 2021, just a month after its launch, an unknown object was seen orbiting alongside SJ-21. At the time, Space Force designated the unidentified object as a spent apogee kick motor, but it was also reported that it might have been an experimental payload designed to test SJ-21's ability to perform remote operations and manipulate other satellites....

Analyzing the potential applications of these dual-use satellites is difficult.

Thanks to long-time Slashdot reader schwit1 for submitting the story!
Privacy

Apple's AirTags Catch a Moving Van Driver Lying About His Location (msn.com) 116

Moving halfway across America, from Colorado to New York, Austin and Valerie McNulty had a bad experience after hiring a moving company that subcontracted the work to another moving company.

But they'd also included an Apple AirTag in one of their boxes, Newsweek reports: A moving guy reportedly told Austin that he "just picked up the stuff" and would take another day or two. Due to the AirTag, the couple knew the moving guy was not in Colorado but was just less than five hours away in Harrisburg, Pennsylvania. As for the family's possessions, which were supposed to be inventoried and in a safe location, GPS tracking showed that neither action allegedly occurred. "It turns out [the items] just stayed overnight in a sketchy part of New Jersey," Austin told Newsweek.

According to Austin, that same driver who allegedly lied about his whereabouts told Austin in a phone call that he went to see "his lady" and that was part of the delay....

"I think we would have been waiting a lot longer for our home goods to arrive [if we didn't have the AirTag]," Valerie said.... "I would say that AirTags are fairly inexpensive and it's an easy way to hold the third parties accountable."

"When we brought up the fact that we knew his exact location he hung up on us," Valerie McNulty said in a Facebook post (which has been shared more than 4,600 times) — although the driver did eventually call back a few minutes later and the items were delivered the next day.

ABC News reports that the driver "was put on probation" according to his moving company — which also added that it "plans to use AirTags for tracking their drivers in the future."

Valerie McNulty argued to ABC News that "I was never tracking the driver, that was never my intention. I was tracking my belongings." Yet the Washington Post notes the story "comes amid a robust debate about the small plastic-and-metal disks, which launched last spring: Are they creepy or helpful? The trackers have been found on expensive cars, presumably so they could be stolen. But they can also be attached to commonly lost valuables, like keys, to make finding them easier."

Apple Insider reports a Pennsylvania state legislator is even proposing legislation making it a crime to track someone else's location or belongings without their consent, adding that if passed in Pennsylvania the law would "create a precedent for other states to follow suit if passed."

ZDNet quotes a remark from the Director of Cyber-Security at the Electronic Frontier Foundation to the BBC, calling Apple's AirTags "a perfect tool for stalking." But ZDNet columnist Chris Matyszczyk adds "That's the problem with technology, isn't it? For every potential good use, there are at least several pain-inducing, criminal-pleasing, world-ending uses. Too often, the bad outweighs the good, especially in the public eyes and ears. Here, though, is a tale of a woman who's glad she used an AirTag for her own surveillance purposes....

This whole tale makes me wonder, though, what we've come to and where we're going.... If our default is that we can trust no one and fear everyone, how can we ever really get along?

The Military

America Races to Salvage Its Sunken F-35 Warplane - Before China Does (bbc.com) 193

"A race against time is under way for the U.S. Navy to reach one of its downed fighter jets — before the Chinese get there first," reports the BBC: The $100m (£74m) F-35C plane came down in the South China Sea after what the Navy describes as a "mishap" during take-off from the USS Carl Vinson. The jet is the Navy's newest, and crammed with classified equipment. As it is in international waters, it is technically fair game. Whoever gets there first, wins.

The prize? All the secrets behind this very expensive, leading-edge fighting force....

A U.S. salvage vessel looks to be at least 10 days away from the crash site. That's too late, says defence consultant Abi Austen, because the black box battery will die before then, making it harder to locate the aircraft. "It's vitally important the U.S. gets this back," she says. "The F-35 is basically like a flying computer. It's designed to link up other assets — what the Air Force calls 'linking sensors to shooters'."

The BBC describes the plane as the U.S. Navy's first "low observable" carrier-based aircraft, "which enables it to operate undetected in enemy airspace." And it's also "the most powerful fighter engine in the world," flying at speeds up to 1,200 mph, or Mach 1.6.

After the $100 million warplane crash-landed onto the deck of an aircraft carrier — and then tumbled into the water — images of the crash appeared on social media, reports CNN.

Thanks to Slashdot reader Thelasko for submitting the story!
Communications

Space Force Just Launched Satellites Capable of 'Inspecting' Enemy Satellites (thedrive.com) 52

An anonymous reader quotes a report from The Drive: Space Force launched two additional satellites today as part of its push for greater Space Domain Awareness, or SDA, in geosynchronous orbit some 22,000 miles away from Earth. The two satellites are part of the Geosynchronous Space Situational Awareness Program, or GSSAP, and will allow Space Force to not only locate and identify objects in this distant orbit, but also maneuver close to them in order to inspect them or assess their capabilities. The launch comes as Space Force leadership continues to sound the alarm about the risks posed to U.S. satellites in orbit.

The Northrop Grumman-built GSSAP-5 and GSSAP-6 were launched today at Cape Canaveral Space Force Station in Florida atop a United Launch Alliance (ULA) Atlas V 511 rocket. The first two GSSAP satellites were launched in 2014, with the second two following in 2016. Space Force has not released any details about how these two new GSSAP satellites might differ from the previous four, which were designed to operate near the belt of other geosynchronous satellites and maneuver close to them to conduct surveillance. A spokesperson for Space Systems Command stated this week that the new GGSAP satellites "will provide improved SDA data to the National Space Defense Center and other national users to enhance our ability to navigate freely and safely within the GEO belt."

GSSAP-5 and GSSAP-6 were originally scheduled to be launched in 2020, and it is not known why the launch was delayed almost two years. The GSSAP program was originally highly classified and was only revealed to the public in 2014. While the exact capabilities of the satellites are not public, it's known that they are able to capture close-up images of other satellites in geosynchronous orbit. Former Commander of Air Force Space Command Gen. William Shelton (Ret.) told Aviation Week in 2014 that the satellites are designed to drift in and out of the geosynchronous belt collecting intelligence on specific targets. The Air Force has previously used one of the satellites for Remote Proximity Operations (RPO), maneuvering close enough to inspect another Department of Defense satellite operated by the Navy that was experiencing a malfunction. The former head of Air Force Space Command, General John Hyten (Ret.), has previously said the satellites are capable of capturing some "truly eye-watering" imagery.

Security

Hacktivists Say They Hacked Belarus Rail System To Stop Russian Military Buildup (arstechnica.com) 71

Hacktivists in Belarus said on Monday they had infected the network of the country's state-run railroad system with ransomware and would provide the decryption key only if Belarus President Alexander Lukashenko stopped aiding Russian troops ahead of a possible invasion of Ukraine. Ars Technica reports: Referring to the Belarus Railway, a group calling itself Cyber Partisans wrote on Telegram: "BelZhD, at the command of the terrorist Lukashenko, these days allows the occupying troops to enter our land. As part of the 'Peklo' cyber campaign, we encrypted the bulk of the servers, databases and workstations of the BelZhD in order to slow down and disrupt the operation of the road. The backups have been destroyed [...]." The group also announced the attack on Twitter.

A representative from the group said in a direct message that the Peklo cyber campaign targets specific entities and government-run companies with the goal of pressuring the Belarus government to release political prisoners and stop Russian troops from entering Belarus to use its ground for the attacks on Ukraine. "The government continues to suppress the free will of Belarusians, imprison innocent people, they continue to unlawfully keep... thousands of political prisoners," the representative wrote. "The major goal is to overthrow Lukashenko's regime, keep the sovereignty and build a democratic state with the rule of law, independent institutions and protection of human rights."

At the time this post went live, several services on the railway's website were unavailable. Online ticket purchases, for instance, weren't working [...]. The representative said that besides ticketing and scheduling being disrupted, the cyberattack also affected freight trains. According to reports, Russia has been sending military equipment and personnel by rail into Belarus, which shares a border with Ukraine. @belzhd_live, a group of Belarus Railway workers that tracks activity on the 5,512-km railway, said on Friday that in a week's time, more than 33 Russian military trains loaded with equipment and troops had arrived in Belarus for joint strategic exercises there. The worker group said at the time that it expected a total of 200 so-called echelons to arrive in the coming days.

Government

The Next Huawei? US Threatens to Inflict 'Export Control' on Russia if It Invades Ukraine (stripes.com) 119

How exactly could Russia be deterred from invading Ukraine? The U.S. government is now "threatening to use a novel export control to damage strategic Russian industries, from artificial intelligence and quantum computing to civilian aerospace," according to Stars and Stripes (an editorially-independent newspaper for the American military). The newspaper cites administration officials as its source: The administration may also decide to apply the control more broadly in a way that would potentially deprive Russian citizens of some smartphones, tablets and video game consoles, said the officials. Such moves would expand the reach of U.S. sanctions beyond financial targets to the deployment of a weapon used only once before — to nearly cripple the Chinese tech giant Huawei. The weapon, known as the foreign direct product rule, contributed to Huawei suffering its first-ever annual revenue drop, a stunning 30% last year, according to analysts.

The attraction of using the foreign direct product rule derives from the fact that virtually anything electronic these days includes semiconductors, the tiny components on which all modern technology depends, from smartphones to jets to quantum computers — and that there is hardly a semiconductor on the planet that is not made with U.S. tools or designed with U.S. software. And the administration could try to force companies in other countries to stop exporting these types of goods to Russia through this rule. "This is a slow strangulation by the U.S. government," technology analyst Dan Wang of Gavekal Dragonomics, a research firm in Shanghai, said of Huawei. The rule cut the firm's supply of needed microchips, which were made outside the United States but with U.S. software or tools.

Now officials in Washington say they are working with European and Asian allies to craft a version of the rule that would aim to stop flows of crucial components to industries for which Russian President Vladimir Putin has high ambitions, such as civil aviation, maritime and high technology.... But the effort could face head winds from American and European business interests that fear using export controls could lead to Russian retaliation in other spheres — and eventually cause foreign companies to seek to design U.S. technology out of their products. That's because the extension of the rule beyond a single company like Huawei to an entire country or entire sectors of a country is unprecedented.

"It's like a magic power — you can only use it so many times before it starts to degrade," said Robert D. Atkinson, president of the Information Technology and Innovation Foundation, a think tank. "Other countries will say, 'Oh, man, the U.S. has total control over us. We'd better find alternatives.'"

The newspaper also spoke to Paul Triolo, chief of technology policy at a global political risk research and consulting firm called Eurasia Group. His opinion "this would be weaponizing the U.S. semiconductor supply chain against an entire country."

And in more ways than one: Targeted use of the foreign direct product rule could be a blow to Russia's military, which relies on a type of chip called Elbrus that is designed in Russia but manufactured in Taiwan at a chip foundry called TSMC, according to Kostas Tigkos, an electronics expert at Janes Group, a U.K.-based provider of defense intelligence. If the United States barred TSMC from supplying those chips to Russia, as it successfully barred TSMC from supplying Huawei, that would have a "devastating effect," Tigkos said.

In a statement, TSMC said it "complies with all applicable laws and regulations" and that it has a "rigorous export control system in place ... to ensure export control restrictions are followed."Analysts say that Western multinational firms probably would comply with the export controls. All U.S. chipmakers include clauses in their contracts requiring customers to abide by U.S. export rules.

The article also explores a scenario where businesses in China step in to supply Russia (citing estimates from the Peterson Institute for International Economics that China already builds 70% of the computers and smartphones that Russia imports).

"If Chinese firms wound up supplying Russia in violation of the rule, that would leave Washington with a major diplomatic dilemma: whether to sanction them, even if they make ordinary — not military — goods."
AI

DeepMind Co-founder Leaves Google After a Rocky Tenure (nytimes.com) 13

Mustafa Suleyman, a pioneer in the field of artificial intelligence, is leaving Google to join the venture capital firm Greylock Partners. From a report: The departure of Mr. Suleyman, who was Google's vice president of product management and policy for artificial intelligence, closes a tumultuous tenure at the company. He joined Google in 2014 when the search giant acquired DeepMind, a cutting-edge artificial intelligence research lab, in a deal valued at $650 million. The deal demonstrated the value of companies that specialized in "deep learning," a form of artificial intelligence that became more important in the early part of the last decade. In just a few years, DeepMind had hired many of the leading researchers in the field.

Mr. Suleyman, known to friends and colleagues as Moose, was not an A.I. researcher by training. But he led the company into an important area of research: health care. He also became a key voice in DeepMind's efforts to ensure that its technologies would not be used for military applications, which led to a clash with Google when the company joined a flagship A.I. project with the Defense Department. (Google eventually pulled out of the project.)

Security

Biden To Expand National Security Agency Role in Government Cybersecurity (wsj.com) 18

President Biden on Wednesday expanded the National Security Agency's role in protecting the U.S. government's most sensitive computer networks, issuing a directive intended to bolster cybersecurity within the Defense Department and intelligence agencies. From a report: The memorandum signed by Mr. Biden mandates baseline cybersecurity practices and standards, such as two-factor authentication and use of encryption, for so-called national security systems, which include the Defense Department and intelligence agencies and the federal contractors that support them. It effectively aligns the cybersecurity standards imposed on national security agencies with those previously established for civilian agencies under an executive order Mr. Biden signed last May. Affected agencies will soon be expected to implement various cybersecurity protocols, including use of certain cloud technologies and software that can detect security problems on a network. Cybersecurity failures have plagued the U.S. government for decades, including thefts of detailed personnel records and military secrets that have been blamed on Russia, China and other adversaries. While national security agencies are generally seen as more secure than their civilian counterparts, they have endured significant breaches, too.
The Military

FedEx Asks FAA To Let It Install Anti-Missile Lasers On Its Cargo Planes (gizmodo.com) 104

With the right military equipment, a single person can target a plane from three miles away using a heat-seeking missile. While such a nightmare is a rare occurrence, FedEx has applied to the FAA seeking approval to install a laser-based, anti-missile defense system on its cargo planes as an added safety measure. Gizmodo reports: FedEx's request to the Federal Aviation Administration, filed on Jan. 4, didn't come completely out of left field, however. In 2008, the company worked with Northrop Grumman to test its anti-missile laser-based defense systems on 12 of the shipping company's cargo planes for over a year. At the time, Northrop Grumman announced that its "system is ready to be deployed on civilian aircraft," although no commercial orders had been placed at the time, according to a company spokesperson. That may have changed, however.

FedEx's application to the FAA (PDF) to allow it to install and use anti-missile systems on its Airbus Model A321-200 cargo planes doesn't specifically mention Northrop Grumman's hardware, so the shipping company could now be working with another company, but the proposed hardware is basically the same as what was tested back in 2008. In the application document (PDF), which is "scheduled to be published in the Federal Register on Jan. 18," FedEx cites "several incidents abroad" where "civilian aircraft were fired upon by man-portable air defense systems" which are nearly impossible to detect given their range of operation, but undoubtedly a serious threat when operating aircraft in some parts of the world.

The biggest problem with FedEx's application seems to be that the FAA's "design standards for transport category airplanes did not envisage that a design feature could project infrared laser energy outside the airplane" and that the "FAA's design standards are inadequate to address this capability." As a result, the defense system is being considered a "novel or unusual design feature" and as such will be subjected to several special safety regulations given how dangerous intense infrared light can be to the skin and eyes of "persons on the aircraft, on the ground, and on other aircraft." These regulations will include the ability to completely disable the system while the airplane is on the ground to prevent "inadvertent operation," a design that prevents inflight use from ever damaging the aircraft itself or risking the safety of the crew and passengers, even in the event of a system failure or accidental operation. They also require extensive markings, labels, warnings, and documentation for everyone from maintenance staff to ground crew, to pilots, warning them of the laser's class and risks, including an addendum to the flight manual explaining the complete use of the system.

Power

Germany To Dedicate 2% Of Its Land To Wind Power Development (cleantechnica.com) 89

The new German government is proposing a bold new initiative to dramatically increase onshore wind power in the country by 2030. "If successful, the plan would add up to 10 gigawatts of new onshore wind capacity every year for the rest of the decade," reports CleanTechnica. "In total, 2% of Germany's land area will be set aside for wind energy generation. [T]he German government also plans to increase its offshore wind target to 30 GW by 2030." From the report: During a press conference, [the nation's new Green Minister for Economics and Climate, Robert Habeck] made it clear that wind energy, particularly onshore wind, will remain the most important source of electricity in Germany and is the key to further emission reductions, according to WindEurope. "The Energiewende is roaring again. Germany wants a huge expansion of onshore wind. And the Government fully understands that that requires faster permitting of new wind farms -- and they intend to deliver this ASAP with a dedicated new 'Onshore Wind Law.' Today's announcements mark the comeback of German leadership on renewables -- fantastisch!" says WindEurope CEO Giles Dickson.

Habeck intends to remove restraints on onshore wind development caused by concerns about radar installations for civilian and military aviation. He estimates the government plan could free up 4 to 5 GW of new wind projects currently blocked by aviation radar, and an additional 4 GW currently blocked by the military. Support for renewable energies will be paid from the state budget, reducing the burden on low income households and small businesses. The package is also said to define the energy transition as a 'matter of public interest' in order to prioritize wind energy projects over other forms of land use -- an important precondition to streamlining the permit process and finding new sites for wind energy projects.

Medicine

Epstein-Barr Virus Found To Trigger Multiple Sclerosis (scientificamerican.com) 52

An anonymous reader quotes a report from Scientific American: A connection between the human herpesvirus Epstein-Barr and multiple sclerosis (MS) has long been suspected but has been difficult to prove. Epstein-Barr virus (EBV) is the primary cause of mononucleosis and is so common that 95 percent of adults carry it. Unlike Epstein-Barr, MS, a devastating demyelinating disease of the central nervous system, is relatively rare. It affects 2.8 million people worldwide. But people who contract infectious mononucleosis are at slightly increased risk of developing MS. In the disease, inflammation damages the myelin sheath that insulates nerve cells, ultimately disrupting signals to and from the brain and causing a variety of symptoms, from numbness and pain to paralysis. To prove that infection with Epstein-Barr causes MS, however, a research study would have to show that people would not develop the disease if they were not first infected with the virus. A randomized trial to test such a hypothesis by purposely infecting thousands of people would of course be unethical.

Instead researchers at the Harvard T. H. Chan School of Public Health and Harvard Medical School turned to what they call "an experiment of nature." They used two decades of blood samples from more than 10 million young adults on active duty in the U.S. military (the samples were taken for routine HIV testing). About 5 percent of those individuals (several hundred thousand people) were negative for Epstein-Barr when they started military service, and 955 eventually developed MS. The researchers were able to compare the outcomes of those who were subsequently infected and those who were not. The results, published on September 13 in Science, show that the risk of multiple sclerosis increased 32-fold after infection with Epstein-Barr but not after infection with other viruses. "These findings cannot be explained by any known risk factor for MS and suggest EBV as the leading cause of MS," the researchers wrote. In an accompanying commentary, immunologists William H. Robinson and Lawrence Steinman, both at Stanford University, wrote, "These findings provide compelling data that implicate EBV as the trigger for the development of MS." Epidemiologist Alberto Ascherio, senior author of the new study, says, "The bottom line is almost: if you're not infected with EBV, you don't get MS. It's rare to get such black-and-white results."

Games

You Can Now Play Video Games Developed Behind the Iron Curtain (vice.com) 15

An anonymous reader quotes a report from Motherboard: The Cold War couldn't stop gaming from thriving in the Eastern Bloc. From the late 1980s through the early 1990s, a generation of young people living behind the Iron Curtain designed and released their own video games and arcade cabinets. Now, you can play English translations of some of these lost classics of early gaming. One is a text adventure where a Soviet military officer hunts and kills Rambo. The translated games all come from Slovakia and are a collaboration between the Slovak Game Developers Association and the Slovak Design Museum.

According to Stanislav Hrda, one of the programmers who created the games on offer, making video games was something only kids did. "The games were not sold in shops and the authors were not entitled to remuneration," he said in the post explaining the project. "Therefore, practically no one could engage in video game programming as a business activity, and adult programmers worked at most in state institutions on large mainframe computers. Thus, video game programmers became mainly teenagers." The computing power was limited and the teenagers' technological knowhow almost non-existent so many of these early games were text adventures. "These could also be programmed in the simpler Basic language that every home computer had built in," Hrda said. "Text-based games offered the opportunity to imprint one's fantasies into a world of characters, locations, descriptions of reality or fantasy at will. That is why hundreds of such video games were created in the 1980s in Czechoslovakia. The authors from the ranks of teenagers portrayed their friends, but also heroes from films that were distributed on VHS tapes or from the pop-cultural world of the West from the occasionally available comics, films, TV series and books."

Hrda loved American action movies and programmed the video game Satochin, a text adventure where a Soviet officer hunts John Rambo. "The game was very hard to win," Hrda told Ars Technica. "Whenever you made a small mistake, you would die. So before you win, you are killed ten times by Rambo." [...] The project has localized ten games for Western audiences, including Satochin, with plans to tackle more over the next few years. "The games translated over the next 2-3 years after the end of the project will represent almost the complete video game production from the period of 8-bit computers in Slovakia, with an emphasis on text adventure games," the site said. English versions are available here and can be played in the Fuse emulator. The Slovak versions can be played online through the project's website.

The Military

Five of World's Most Powerful Nations Pledge To Avoid Nuclear War (theguardian.com) 81

An anonymous reader quotes a report from The Guardian: Five of the world's most powerful nations have agreed that "a nuclear war cannot be won and must never be fought" in a rare joint pledge to reduce the risk of such a conflict ever starting. The pledge was signed by the US, Russia, China, the UK and France, the five nuclear weapons states recognized by the 1968 Nuclear Non-Proliferation Treaty (NPT) who are also the five permanent members of the UN security council. They are known as the P5 or the N5. Such a common statement on a major issue of global security has become a rarity at a time of increasing friction between Russia, China and the west. With Moscow threatening to invade Ukraine and China signaling its readiness to use military force against Taiwan, the joint statement represents a renewed commitment to prevent any confrontation turning into a nuclear catastrophe.

A senior US state department official said the wording of the statement had been hammered out at P5 meetings over several months, despite the high-tension environment. "At the base level to be able to say that this is how we think about these risks, and this is an acknowledgement that it is something that we want to avoid, particularly during a difficult time, I think is noteworthy," the official said. The release of the statement had been timed to coincide with the five-yearly review conference of the NPT, but that conference has been postponed amid the spread of the Omicron variant of Covid-19, and disagreements on whether the session could be held virtually. "We affirm that a nuclear war cannot be won and must never be fought," the statement said, echoing a joint declaration by Ronald Reagan and Mikhail Gorbachev at a 1985 summit in Geneva.

The NPT was a bargain between states without nuclear weapons, who pledged not to acquire them, and the five nuclear-armed states, which promised to disarm. The review conference, originally planned for 2020, was expected to be contentious as a result of the stalling of momentum towards disarmament and the moves made by the five weapons states to modernize their arsenals. Four other countries with nuclear weapons, not recognized under NPT: Israel, India, Pakistan and North Korea -- have also shown no signs of reducing their stockpiles. Meanwhile, the breakdown of the 2015 nuclear agreement with Iran and the deadlock so far in attempts to salvage it, have raised the risks of nuclear proliferation, particularly in the Middle East. Monday's joint statement was aimed at improving the atmosphere at the NPT review conference.

China

China Is Harvesting 'Masses' of Data on Western Targets from Social Media (msn.com) 42

The Washington Post reports: China is turning a major part of its internal Internet data surveillance network outward, mining Western social media, including Facebook and Twitter, to equip its government agencies, military and police with information on foreign targets, according to a Washington Post review of hundreds of Chinese bidding documents, contracts and company filings.

China maintains a countrywide network of government data surveillance services — called public opinion analysis software — that were developed over the past decade and are used domestically to warn officials of politically sensitive information online. The software primarily targets China's domestic Internet users and media, but a Washington Post review of bidding documents and contracts for over 300 Chinese government projects since the beginning of 2020 include orders for software designed to collect data on foreign targets from sources such as Twitter, Facebook and other Western social media.... These surveillance dragnets are part of a wider drive by Beijing to refine its foreign propaganda efforts through big data and artificial intelligence. They also form a network of warning systems designed to sound real-time alarms for trends that undermine Beijing's interests... Some of the Chinese government's budgeting includes buying and maintaining foreign social media accounts on behalf of police and propaganda departments....

The documents describe highly customizable programs that can collect real-time social media data from individual social media users. Some describe tracking broad trends on issues including U.S. elections... The exact scope of China's government public opinion monitoring industry is unclear, but there have been some indications about its size in Chinese state media. In 2014, the state-backed newspaper China Daily said more than 2 million people were working as public opinion analysts... In June 2020, Twitter suspended 23,000 accounts that it said were linked to the Chinese Communist Party and covertly spreading propaganda to undermine pro-democracy protests in Hong Kong. This month, Twitter said it removed a further 2,048 accounts linked to Beijing and producing coordinated content undermining accusations of rights abuses in Xinjiang.

Experts say those accounts represent a small fraction of China's efforts to boost pro-Beijing messaging on foreign social media.

Reached for comment, a Twitter spokesperson told the Post," We prohibit use of our API for surveillance purposes, as per our developer policy and terms."

The Post adds that Facebook "did not respond to requests for comment about whether it is aware of the monitoring...."
AI

China's New AI Policy Doesn't Prevent It From Building Autonomous Weapons (thenextweb.com) 46

The Next Web's Tristan Greene combed through a recently published "position paper" detailing China's views on military AI regulation and found that it "makes absolutely no mention of restricting the use of machines capable of choosing and firing on targets autonomously." From the report: Per the paper: "In terms of law and ethics, countries need to uphold the common values of humanity, put people's well-being front and center, follow the principle of AI for good, and observe national or regional ethical norms in the development, deployment and use of relevant weapon systems." Neither the US or the PRC has any laws, rules, or regulations currently restricting the development or use of military LAWs.

The paper's rhetoric may be empty, but there's still a lot we can glean from its contents. Research analyst Megha Pardhi, writing for the Asia Times, recently opined it was intended to signal that China's seeking to "be seen as a responsible state," and that it may be concerned over its progress in the field relative to other superpowers. According to Pardhi: "Beijing is likely talking about regulation out of fear either that it cannot catch up with others or that it is not confident of its capabilities. Meanwhile, formulating a few commonly agreeable rules on weaponization of AI would be prudent."
"Despite the fact that neither the colonel's article nor the PRC's position paper mention LAWs directly, it's apparent that what they don't say is what's really at the heart of the issue," concludes Greene. "The global community has every reason to believe, and fear, that both China and the US are actively developing LAWS."
The Military

Why the Air Force Wants To Put Lidar On Robot Dogs (popsci.com) 18

An anonymous reader quotes a report from Popular Science: Imagine being able to see the components of a potentially dangerous situation in live 3D and in fine detail without even having to survey the area,' says Brian Goddin, from the Air Force Installation and Mission Support Center public affairs, in a video produced by the military. [...] Putting lidar on drones and on ground robots gives the military a way to map the interior of a building with a machine. With that lidar data transmitted to the computers in a command center, or even just the tablet of an operator sitting outside the building, a human can see what the robot sees, and direct the robot accordingly. (In the civilian world, lidar sensors are commonly used on self-driving cars as one tool for the vehicles to perceive the world around them.) Goddin's presentation, released online December 9, 2021, shows lidar mounted on Spot, the Boston Dynamics dog-shaped robot. Ghost Robotics Q-UGV machines, also dog-shaped and sensor-rich, have been used to patrol the perimeter of Tyndall AFB, making Spot the second breed (or brand) of robot dog to serve the needs of the base.

While all of this mapping at Tyndall is happening in the wake of Hurricane Michael, creating a virtual 3D model of the buildings as they stand can guide future repair. Such a virtual model is a useful tool for regular maintenance and repair, and it provides a record of a prior state should disaster strike again. Such techniques could also allow better investigations of failure after the fact. By comparing lidar scans of downed or wrecked craft to those before launch, and to surviving aircraft that made it back from a fight, the Air Force could understand how to better make more durable craft. Scanning a wrecked plane with lidar also lets rescue workers and recovery teams know if and how they should act to save pilots and passengers, suggested Javier Rodriguez, a technician stationed at Tyndall.

Japan

Japan To Pay Companies To Keep Sensitive Patents Secret (reuters.com) 28

Japan will compensate companies to keep secret patents with potential military applications under proposed legislation, the Nikkei reported on Sunday, without citing sources. Reuters: The patents under review in the proposed economic security legislation will include technology that can help develop nuclear weapons, such as uranium enrichment and cutting-edge innovations like quantum technology, the financial daily said.
Security

A Growing Army of Hackers Helps Keep Kim Jong Un in Power (bloomberg.com) 52

Kim Jong Un marked a decade as supreme leader of North Korea in December. Whether he can hold on to power for another 10 years may depend on state hackers, whose cybercrimes finance his nuclear arms program and prop up the economy. From a report: According to the U.S. Cybersecurity & Infrastructure Security Agency, North Korea's state-backed "malicious cyberactivities" target banks around the world, steal defense secrets, extort money through ransomware, hijack digitally mined currency, and launder ill-gotten gains through cryptocurrency exchanges. Kim's regime has already taken in as much as $2.3 billion through cybercrimes and is geared to rake in even more, U.S. and United Nations investigators have said. The cybercrimes have provided a lifeline for the struggling North Korean economy, which has been hobbled by sanctions. Kim has shown little interest in returning to negotiations that could lead to a lifting of sanctions if North Korea winds down its nuclear arms program.

Money from cybercrimes represents about 8% of North Korea's estimated economy in 2020, which is smaller than when Kim took power, according to the Bank of Korea in Seoul. (The bank for years has provided the best available accounting on the economic activity of the secretive state.) Kim's decision to shut borders because of Covid-19 suspended the little legal trade North Korea had and helped send the economy into its biggest contraction in more than two decades. Kim's regime has two means of evading global sanctions, which were imposed to punish it for nuclear and ballistic missile tests. One is the ship-to-ship transfer of commodities such as coal: A North Korean vessel will shift its cargo to another vessel, or the other way around, and both vessels typically try to cloak their identity. The other is the cyberarmy. Its documented cybercrimes include attempts to steal $2 billion from the Swift (Society for Worldwide Interbank Financial Telecommunication) system of financial transactions. North Korea has also illegally accessed military technology that could be used for financial gain, according to a UN Security Council panel charged with investigating sanctions-dodging by the government.

AI

US Builds New Software Tool To Predict Actions that Could Draw China's Ire (reuters.com) 60

U.S. military commanders in the Pacific have built a software tool to predict how the Chinese government will react to U.S. actions in the region like military sales, U.S.-backed military activity and even congressional visits to hotspots like Taiwan. From a report: Deputy Secretary of Defense Kathleen Hicks was briefed on the new tool during a visit to the United States Indo-Pacific Command in Hawaii on Tuesday. "With the spectrum of conflict and the challenge sets spanning down into the grey zone. What you see is the need to be looking at a far broader set of indicators, weaving that together and then understanding the threat interaction," Hicks said in an interview aboard a military jet en route to California. The tool calculates "strategic friction," a defense official said. It looks at data since early 2020 and evaluates significant activities that had impacted U.S.-Sino relations. The computer-based system will help the Pentagon predict whether certain actions will provoke an outsized Chinese reaction. In October, the Chinese military condemned the United States and Canada for each sending a warship through the Taiwan Strait, saying they were threatening peace and stability in the region. The incident and others like it have fueled demand for the tool, the U.S. official said, to ensure the United States does not inadvertently upset China with its actions.
Businesses

US To Blacklist Eight More Chinese Companies, Including Drone Maker DJI (reuters.com) 115

schwit1 shares a report from the Financial Times: The US Treasury will put DJI and the other groups on its Chinese military-industrial complex companies blacklist on Thursday (Warning: source may be paywalled; alternative source), according to two people briefed on the move. US investors are barred from taking financial stakes in the 60 Chinese groups already on the blacklist. The measure marks the latest effort by President Biden to punish China for its repression of Uyghurs and other Muslim ethnic minorities in the north-western Xinjiang region.

The other Chinese companies that will be blacklisted on Thursday include Megvii, SenseTimes main rival that last year halted plans to list in Hong Kong after it was put on a separate US blacklist, and Dawning Information Industry, a supercomputer manufacturer that operates cloud computing services in Xinjiang. Also to be added are CloudWalk Technology, a facial recognition software company, Xiamen Meiya Pico, a cyber security group that works with law enforcement, Yitu Technology, an artificial intelligence company, Leon Technology, a cloud computing company, and NetPosa Technologies, a producer of cloud-based surveillance systems. DJI and Megvii are not publicly traded, but Dawning Information, which is also known as Sugon, is listed in Shanghai, and Leon, NetPosa and Meiya Pico trade in Shenzhen. All eight companies are already on the commerce department's "entity list," which restricts US companies from exporting technology or products from America to the Chinese groups without obtaining a government license.

Slashdot Top Deals