×
Social Networks

Conspiracy Theorists Who'd First Popularized QAnon Now Accused of Financial Motives (nbcnews.com) 152

QAnon "was first championed by a handful of people who worked together to stir discussion of the 'Q' posts, eventually pushing the theory on to bigger platforms and gaining followers — a strategy that proved to be the key to Qanon's spread and the originators' financial gain..." reports NBC News, in an article shared by long-time Slashdot reader AmiMoJo .

"NBC News has found that the theory can be traced back to three people who sparked some of the first conversation about Qanon and, in doing so, attracted followers who they then asked to help fund Qanon 'research.'" In November 2017, a small-time YouTube video creator and two moderators of the 4chan website, one of the most extreme message boards on the internet, banded together and plucked out of obscurity an anonymous and cryptic post from the many conspiracy theories that populated the website's message board. Over the next several months, they would create videos, a Reddit community, a business and an entire mythology based off the 4chan posts of "Q," the pseudonym of a person claiming to be a high-ranking military officer. The theory they espoused would become Qanon, and it would eventually make its way from those message boards to national media stories and the rallies of President Donald Trump.

Now, the people behind that effort are at the center of a fractious debate among conspiracy enthusiasts, some of whom believe the three people who first popularized the Qanon theory are promoting it in order to make a living. Others suggest that these original followers actually wrote Q's mysterious posts...

Qanon was just another unremarkable part of the "anon" genre until November 2017, when two moderators of the 4chan board where Q posted predictions, who went by the usernames Pamphlet Anon [real name: Coleman Rogers] and BaruchtheScribe, reached out to Tracy Diaz, according to Diaz's blogs and YouTube videos. BaruchtheScribe, in reality a self-identified web programmer from South Africa named Paul Furber, confirmed that account to NBC News. "A bunch of us decided that the message needed to go wider so we contacted Youtubers who had been commenting on the Q drops," Furber said in an email... As Diaz tells it in a blog post detailing her role in the early days of Qanon, she banded together with the two moderators. Their goal, according to Diaz, was to build a following for Qanon — which would mean bigger followings for them as well... Diaz followed with dozens more Q-themed videos, each containing a call for viewers to donate through links to her Patreon and PayPal accounts. Diaz's YouTube channel now boasts more than 90,000 subscribers and her videos have been watched over 8 million times. More than 97,000 people follow her on Twitter.

Diaz, who emerged from bankruptcy in 2009, says in her YouTube videos that she now relies on donations from patrons funding her YouTube "research" as her sole source of income. Diaz declined to comment on this story. "Because I cover Q, I got an audience," Diaz acknowledged in a video that NBC News reviewed last week before she deleted it.

To reach a more mainstream audience (older people and "normies," who on their own would have trouble navigating the fringe message boards), Diaz said in her blog post she recommended they move to the more user-friendly Reddit. Archives listing the three as the original posters and moderators show they created a new Reddit community... Their move to Reddit was key to Qanon's eventual spread. There, they were able to tap into a larger audience of conspiracy theorists, and drive discussion with their analysis of each Q post. From there, Qanon crept to Facebook where it found a new, older audience via dozens of public and private groups...

As Qanon picked up steam, growing skepticism over the motives of Diaz, Rogers, and the other early Qanon supporters led some in the internet's conspiracy circles to turn their paranoia on the group. Recently, some Qanon followers have accused Diaz and Rogers of profiting from the movement by soliciting donations from their followers. Other pro-Trump online groups have questioned the roles that Diaz and Rogers have played in promoting Q, pointing to a series of slip-ups that they say show Rogers and Diaz may have been involved in the theory from the start.

Those accusations have led Diaz and Rogers to both deny that they are Q and say they don't know who Q is.

Science

Culled Mink Rise From the Dead To Denmark's Horror (theguardian.com) 108

Dead mink are rising from their graves in Denmark after a rushed cull over fears of a coronavirus mutation led to thousands being slaughtered and buried in shallow pits -- from which some are now emerging. From a report: "As the bodies decay, gases can be formed," Thomas Kristensen, a national police spokesman, told the state broadcaster DR. "This causes the whole thing to expand a little. In this way, in the worst cases, the mink get pushed out of the ground." Police in West Jutland, where several thousand mink were buried in a mass grave on a military training field, have tried to counter the macabre phenomenon by shovelling extra soil on top of the corpses, which are in a 1 metre-deep trench. "This is a natural process," Kristensen said. "Unfortunately, one metre of soil is not just one metre of soil -- it depends on what type of soil it is. The problem is that the sandy soil in West Jutland is too light. So we have had to lay more soil on top." Adding to the popular concern, local media reported that the animals may also have been buried too close to lakes and underground water reserves, prompting fears of possible contamination of ground and drinking water supplies.
Businesses

Foxconn Plant Championed By Trump Lands Google Server Contract (bloomberg.com) 65

Foxconn plans to assemble key components for Google servers from its plant in Wisconsin, people familiar with the matter said, finally breathing life into a factory Donald Trump hailed as crucial to bringing manufacturing back to the U.S. Bloomberg reports: The Taiwanese company has decided to locate production for this new contract at the existing complex rather than make the components at home or in China, the people said, asking not to be identified discussing a sensitive move. The under-utilized factory should start mass production in the first quarter, timed with the release of Intel Corp.'s Ice Lake server chips, they said. Foxconn is setting up surface-mount technology assembly lines that it will use to place semiconductors onto circuit boards, they added. A Foxconn representative confirmed it's developing data center infrastructure and high-performance computing "capabilities" in Wisconsin, but declined to name any customers.

Taiwan counts Washington as an essential diplomatic, economic and military ally amid rising tensions with Beijing. Foxconn, which operates most of its factories in central and southern China, won Google's business because it was the only contract manufacturer capable of establishing a surface-mount technology line on American soil, one of the people said. Shanghai-listed Foxconn Industrial Internet Co., its cloud business unit, will oversee the server business in Wisconsin, another person familiar with Foxconn's operations said.

The Military

In Historic Test, US Navy Shoots Down an Intercontinental Ballastic Missile (popularmechanics.com) 175

"In a historic test, a U.S. Navy guided missile destroyer shot down an intercontinental ballistic missile (ICBM) warhead aimed at a patch of ocean off the Hawaiian Islands," reports Popular Mechanics: Once the missile launched, a network of sensors picked it up. The data was then handed off to the guided missile destroyer USS John Finn, which launched a SM-3 Block IIA interceptor. Just as the ICBM released a [simulated] nuclear warhead, the SM-3 released an Exoatmospheric Kill Vehicle (EKV) designed to smash itself into the incoming warhead. Infrared cameras recorded a visible explosion as the EKV took out the simulated nuclear warhead.

Most types of ballistic missiles are basically small payload space rockets designed to boost nuclear warheads into low-Earth orbit. Once in space, the warhead coasts through orbit at several thousand miles per hour — the so-called midcourse phase when the warhead is midway between its launch point and target. The warhead then de-orbits into a trajectory that sends it plunging toward its target.

Meanwhile, space-based infrared sensors pick up the hot launch plume of the ballistic missile. A launch alert is passed on to ground-based long range radars, which search the skies for the incoming threat. As the missile falls away and the warhead continues on to its target, missile defense radars track the target, plot its trajectory, and alert any "shooters" in the flight path capable of shooting down the warhead. The shooter then launches an interceptor, and the EKV steers itself into the warhead path...

The article includes video of the test, and concludes that the ability to shoot down missiles is "terrible news for China" — while adding this "could very well cause Beijing to increase its nuclear arsenal."
Government

FAA Chief '100% Confident' of 737 MAX Safety As Flights To Resume (yahoo.com) 170

Hmmmmmm shares a report: U.S. Federal Aviation Administration (FAA) chief Steve Dickson is "100% confident" in the safety of the Boeing 737 MAX but says the airplane maker has more to do as it works to improve its safety culture. Dickson on Wednesday signed an order to allow the best-selling plane to resume flights after it was grounded worldwide in March 2019 following two crashes that killed 346 people and led to Boeing's biggest crisis in decades. The order will end the longest grounding in commercial aviation history and paves the way for Boeing to resume U.S. deliveries and commercial flights by the end of the year. "We've done everything humanly possible to make sure" these types of crashes do not happen again," FAA Administrator Dickson told Reuters in a 30-minute telephone interview, adding the design changes "have eliminated what caused these particular accidents." The FAA is requiring new training to deal with a key safety system called MCAS that is faulted for the two fatal crashes as well as significant new safeguards and other software changes. "I feel 100% confident," said Dickson, a former airline and military pilot, who took over as FAA administration in August 2019 and took the controls for a 737 MAX test flight in September. In a video message released on Wednesday, he said that the 20-month review was "long and grueling, but we said from the start that we would take the time necessary to get this right." Dickson said he emphasized to Boeing the importance of safety. "I understand they have a business to run but they don't have anything if they don't have a safe product," Dickson said. Dickson suggested Boeing has more to do to improve safety.
Privacy

How the US Military Buys Location Data from Ordinary Apps (vice.com) 40

Joseph Cox, reporting for Motherboard at Vice: The U.S. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned. The most popular app among a group Motherboard analyzed connected to this sort of data sale is a Muslim prayer and Quran app that has more than 98 million downloads worldwide. Others include a Muslim dating app, a popular Craigslist app, an app for following storms, and a "level" app that can be used to help, for example, install shelves in a bedroom. Through public records, interviews with developers, and technical analysis, Motherboard uncovered two separate, parallel data streams that the U.S. military uses, or has used, to obtain location data. One relies on a company called Babel Street, which creates a product called Locate X. U.S. Special Operations Command (USSOCOM), a branch of the military tasked with counterterrorism, counterinsurgency, and special reconnaissance, bought access to Locate X to assist on overseas special forces operations. The other stream is through a company called X-Mode, which obtains location data directly from apps, then sells that data to contractors, and by extension, the military.

The news highlights the opaque location data industry and the fact that the U.S. military, which has infamously used other location data to target drone strikes, is purchasing access to sensitive data. Many of the users of apps involved in the data supply chain are Muslim, which is notable considering that the United States has waged a decades-long war on predominantly Muslim terror groups in the Middle East, and has killed hundreds of thousands of civilians during its military operations in Pakistan, Afghanistan, and Iraq. Motherboard does not know of any specific operations in which this type of app-based location data has been used by the U.S. military. The apps sending data to X-Mode include Muslim Pro, an app that reminds users when to pray and what direction Mecca is in relation to the user's current location. The app has been downloaded over 50 million times on Android according to the Google Play Store, and over 98 million in total across other platforms including iOS, according to Muslim Pro's website.

Privacy

Your Computer Isn't Yours (sneak.berlin) 345

Security researcher Jeffrey Paul, writes in a blog post: On modern versions of macOS, you simply can't power on your computer, launch a text editor or eBook reader, and write or read, without a log of your activity being transmitted and stored. It turns out that in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn't realize this, because it's silent and invisible and it fails instantly and gracefully when you're offline, but today the server got really slow and it didn't hit the fail-fast code path, and everyone's apps failed to open if they were connected to the internet. Because it does this using the internet, the server sees your IP, of course, and knows what time the request came in. An IP address allows for coarse, city-level and ISP-level geolocation, and allows for a table that has the following headings: Date, Time, Computer, ISP, City, State, Application Hash; Apple (or anyone else) can, of course, calculate these hashes for common programs: everything in the App Store, the Creative Cloud, Tor Browser, cracking or reverse engineering tools, whatever.

This means that Apple knows when you're at home. When you're at work. What apps you open there, and how often. They know when you open Premiere over at a friend's house on their Wi-Fi, and they know when you open Tor Browser in a hotel on a trip to another city. "Who cares?" I hear you asking. Well, it's not just Apple. This information doesn't stay with them: These OCSP requests are transmitted unencrypted. Everyone who can see the network can see these, including your ISP and anyone who has tapped their cables. These requests go to a third-party CDN run by another company, Akamai. Since October of 2012, Apple is a partner in the US military intelligence community's PRISM spying program, which grants the US federal police and military unfettered access to this data without a warrant, any time they ask for it. In the first half of 2019 they did this over 18,000 times, and another 17,500+ times in the second half of 2019.

This data amounts to a tremendous trove of data about your life and habits, and allows someone possessing all of it to identify your movement and activity patterns. For some people, this can even pose a physical danger to them. Now, it's been possible up until today to block this sort of stuff on your Mac using a program called Little Snitch (really, the only thing keeping me using macOS at this point). In the default configuration, it blanket allows all of this computer-to-Apple communication, but you can disable those default rules and go on to approve or deny each of these connections, and your computer will continue to work fine without snitching on you to Apple. The version of macOS that was released today, 11.0, also known as Big Sur, has new APIs that prevent Little Snitch from working the same way. The new APIs don't permit Little Snitch to inspect or block any OS level processes. Additionally, the new rules in macOS 11 even hobble VPNs so that Apple apps will simply bypass them.

United Kingdom

As UK Military Begins Mass Coronavirus Testing, Head of Armed Forces Ponders Robot Soldiers (sky.com) 47

Remembrance Sunday is the day of commemoration for British and Commonwealth servicemen, and the head of the British Armed Forces marked the occasion with a special interview on Sky News.

And he shared a thoughtful answer when asked whether the army might try to recruit fewer soldiers. "[W]hat I'm hinting at is that we need to be thinking about how we measure effects in a different way. I mean I suspect we can have an army of 120,000 of which 30,000 might be robots, who knows. But the answer is we need to open our minds to perhaps numbers not determining what we should be doing but rather the effect that we can achieve, is really what we should be looking for."

The armed forces are playing a key role in the government's response to the pandemic, with some 2,000 personnel deployed to Liverpool to help with a mass coronavirus testing programme for the city. "I suspect if that works successfully we might find there are other areas where we need to help in a similar sort of fashion," General Carter said. He said using the military to take over the entire coronavirus testing programme was an option but added that he had confidence in the current set-up at the moment.

The Guardian focused on the robots: Thirty thousand "robot soldiers" could form an integral part of the British army in the 2030s, working alongside humans in and around the frontline, the head of the armed forces said in a television interview on Sunday...

All Britain's armed forces have been engaged in a string of research projects involving small drones or remotely powered land or underwater vehicles, some of which are armed and others for reconnaissance. The Ministry of Defence says its policy is that only humans will be able to fire weapons, although there is growing concern about the potential danger of unrestricted robot warfare, led by the Campaign to Stop Killer Robots.

Technology under development includes the i9 drone, which is powered by six rotors and carries two shotguns. Remotely operated, it is intended to be used to storm buildings, typically an urban warfare situation that generates some of the highest casualties.

Earth

A Biden Victory Positions America For a 180-Degree Turn On Climate Change (seattletimes.com) 251

"Joe Biden, the projected winner of the U.S. presidency, will move to restore dozens of environmental safeguards President Donald Trump abolished," reports the Washington Post, "and launch the boldest climate change plan of any president in history."

destinyland shares their report: While some of Biden's most sweeping programs will encounter stiff resistance from Senate Republicans and conservative attorneys general, the United States is poised to make a 180-degree turn on climate change and conservation policy. Biden's team already has plans on how it will restrict oil and gas drilling on public lands and waters; ratchet up federal mileage standards for cars and SUVs; block pipelines that transport fossil fuels across the country; provide federal incentives to develop renewable power; and mobilize other nations to make deeper cuts in their own carbon emissions... Biden has vowed to eliminate carbon emissions from the electric sector by 2035 and spend $2 trillion on investments ranging from weatherizing homes to developing a nationwide network of charging stations for electric vehicles.

That massive investment plan stands a chance only if his party wins two Senate runoff races in Georgia in January; otherwise, he would have to rely on a combination of executive actions and more-modest congressional deals to advance his agenda.

Still, a number of factors make it easier to enact more-ambitious climate policies than even four years ago. Roughly 10% of the globe has warmed by 2 degrees Celsius (3.6 degrees Fahrenheit), a temperature rise the world has pledged to avoid. The price of solar and wind power has dropped, the coal industry has shrunk, and Americans increasingly connect the disasters they're experiencing in real time — including more-intense wildfires, hurricanes and droughts — with global warming. Biden has made the argument that curbing carbon will produce high-paying jobs while protecting the planet...

Some of the new administration's rules could be challenged in federal court, which have a number of Trump appointees on the bench. But even some conservative activists said that Biden could enact enduring policies, whether by partnering with Congress or through regulation... The new administration may be able to broker compromises with key industries that have experienced regulatory whiplash in the past decade, including the auto industry and power sector, while offering tax breaks for renewable energy that remain popular with both parties. And Biden can rebuild diplomatic alliances that will spur foreign countries to pursue more-ambitious carbon reductions...

Biden's advisers have said that they plan to elevate climate change as a priority in departments that have not always treated it as one, including the Transportation, State and Treasury departments. It will influence key appointments, affecting everything from overseas banking and military bases to domestic roads and farms.... Biden's pledge to achieve a carbon-free U.S. power sector within 15 years would mean the closing or revamping of nearly every coal- and gas-fired power plant around the country, and the construction of an unprecedented number of new wind turbines and solar farms. On top of that, engineers still need to devise a better way of storing energy when the sun is not shining or the wind is not blowing.

"If I were advising Biden on energy, my first three priorities would be storage, storage and storage," said Sen. Angus King, I-Maine, who worked in the alternative energy businesses before running for office.

Social Networks

A Nameless Hiker and the Case the Internet Can't Crack (wired.com) 93

The man on the trail went by "Mostly Harmless." He was friendly and said he worked in tech. After he died in his tent, no one could figure out who he was. Wired: It's usually easy to to put a name to a corpse. There's an ID or a credit card. There's been a missing persons report in the area. There's a DNA match. But the investigators in Collier County couldn't find a thing. Mostly Harmless' fingerprints didn't show up in any law enforcement database. He hadn't served in the military, and his fingerprints didn't match those of anyone else on file. His DNA didn't match any in the Department of Justice's missing person database or in CODIS, the national DNA database run by the FBI. A picture of his face didn't turn up anything in a facial recognition database. The body had no distinguishing tattoos.

Nor could investigators understand how or why he died. There were no indications of foul play, and he had more than $3,500 cash in the tent. He had food nearby, but he was hollowed out, weighing just 83 pounds on a 5'8" frame. Investigators put his age in the vague range between 35 and 50, and they couldn't point to any abnormalities. The only substances he tested positive for were ibuprofen and an antihistamine. His cause of death, according to the autopsy report, was "undetermined." He had, in some sense, just wasted away. But why hadn't he tried to find help? Almost immediately, people compared Mostly Harmless to Chris McCandless, whose story was the subject of Into the Wild. McCandless, though, had been stranded in the Alaska bush, trapped by a raging river as he ran out of food. He died on a school bus, starving, desperate for help, 22 miles of wilderness separating him from a road. Mostly Harmless was just 5 miles from a major highway. He left no note, and there was no evidence that he had spent his last days calling out for help.

The investigators were stumped. To find out what had happened, they needed to learn who he was. So the Florida Department of Law Enforcement drew up an image of Mostly Harmless, and the Collier County investigators shared it with the public. In the sketch, his mouth is open wide, and his eyes too. He has a gray and black beard, with a bare patch of skin right below the mouth. His teeth, as noted in the autopsy, are perfect, suggesting he had good dental care as a child. He looks startled but also oddly pleased, as if he's just seen a clown jump out from behind a curtain. The image started to circulate online along with other pictures from his campsite, including his tent and his hiking poles.

United States

The US Military Has Experienced 55,443 COVID-19 Cases - Including Vice Chief of Space Force (upi.com) 45

UPI reports: Space Force's vice chief of space operations tested positive for COVID-19 Wednesday, Space Force announced.

According to a press release issued jointly by the Space Force and the Air Force, Gen. David D. Thompson took a test for the virus after learning that a close family member had tested positive. Air Force spokeswoman Ann Stefanek said Thompson has not shown symptoms of COVID-19 so far and was on leave last week, but returned to the Pentagon for work on Monday and Tuesday to address a virtual symposium for the National Defense Industrial Association and Texas A&M University. He is now self-isolating and working from home...

As of Thursday morning a total of 55,443 COVID-19 cases had been reported in the [U.S.] military since the beginning of the pandemic, with 8,839 of those reported among Air Force personnel.

Democrats

Russian Hackers Targeted California, Indiana Democratic Parties In Repeat of 2016 Attacks (reuters.com) 58

An anonymous reader quotes a report from Reuters: The group of Russian hackers accused of meddling in the 2016 U.S. presidential election earlier this year targeted the email accounts of Democratic state parties in California and Indiana, and influential think tanks in Washington and New York, according to people with knowledge of the matter. The attempted intrusions, many of which were internally flagged by Microsoft Corp over the summer, were carried out by a group often nicknamed "Fancy Bear." The hackers' activity provides insight into how Russian intelligence is targeting the United States in the run-up to the Nov. 3 election. The targets identified by Reuters, which include the Center for American Progress, the Council on Foreign Relations and the Washington-based Carnegie Endowment for International Peace, said they had not seen any evidence of successful hacking attempts.

Fancy Bear is controlled by Russia's military intelligence agency and was responsible for hacking the email accounts of Hillary Clinton's staff in the run-up to the 2016 election, according to a Department of Justice indictment filed in 2018. News of the Russian hacking activity follows last month's announcement here by Microsoft that Fancy Bear had attempted to hack more than 200 organizations, many of which the software company said were tied to the 2020 election. Microsoft was able to link this year's cyber espionage campaign to the Russian hackers through an apparent programming error that allowed the company to identify a pattern of attack unique to Fancy Bear, according to a Microsoft assessment reviewed by Reuters. The thrust of espionage operations could not be determined by Reuters. The Office of the Director of National Intelligence said in August here that Russian operations were attempting to undermine the campaign of presidential candidate Joe Biden.

China

China's Leaders Vow Tech 'Self-Reliance,' Military Power and Economic Recovery (nytimes.com) 108

An anonymous reader quotes a report from The New York Times: China's Communist Party emerged from four days of meetings behind closed doors in Beijing declaring the country's leader, Xi Jinping, a "helmsman" who would lead "the ship of socialism sailing into the wind and waves with determination." At a time when other world leaders remain consumed by the coronavirus pandemic, China promised an economic revival, greater technological self-reliance and a stronger military to protect the country's economic and political interests. The meeting underscored Mr. Xi's seemingly boundless political control, as well as his ambitions to propel China out of the current crisis into a new phase of growth, less vulnerable to external risks. Here are the main outcomes from the meeting, which outlined policy priorities for the coming years.

Economic revival: After the shock from the coronavirus crisis of the first months of this year, China's economy returned to4.9 percent growth in the July-to-September quarter, and exports have revived strongly. In its five-year plan, China aims to expand domestic markets and encourage innovation across the economy -- from cutting-edge technology to more efficient farming -- the party leaders said in an official summary of their meeting. That summary did not offer specific growth projections from 2021.

Homegrown technology: The meeting of the party's Central Committee declared that China would make enhanced technological self-reliance a priority over the next 15 years. "Insist on the core status of innovation across all of our national modernization," the leaders said. "Make technological self-sufficiency a strategic pillar of national development."

Military modernization and security: The Central Committee declared that China's military -- one of Mr. Xi's core priorities since taking office in 2012 -- had improved greatly, even as it promised to make still more "major steps" to enhance the country's security. The committee did not detail any new programs but called for "comprehensively strengthening military training and preparedness."

Security

'How 30 Lines of Code Blew Up a 27-Ton Generator' (wired.com) 110

After the U.S. unveiled charges against six members of the Sandworm unit in Russia's military intelligence agency, Wired re-visited "a secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair — with a file no bigger than a gif." It's an excerpt from the new book SANDWORM: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers which also remembers the late industrial control systems security pioneer Mike Assante: Among [Sandworm's] acts of cyberwar was an unprecedented attack on Ukraine's power grid in 2016, one that appeared designed to not merely cause a blackout, but to inflict physical damage on electric equipment. And when one cybersecurity researcher named Mike Assante dug into the details of that attack, he recognized a grid-hacking idea invented not by Russian hackers, but by the United State government, and tested a decade earlier...

[S]creens showed live footage from several angles of a massive diesel generator. The machine was the size of a school bus, a mint green, gargantuan mass of steel weighing 27 tons, about as much as an M3 Bradley tank. It sat a mile away from its audience in an electrical substation, producing enough electricity to power a hospital or a navy ship and emitting a steady roar. Waves of heat coming off its surface rippled the horizon in the video feed's image. Assante and his fellow Idaho National Laboratory researchers had bought the generator for $300,000 from an oil field in Alaska. They'd shipped it thousands of miles to the Idaho test site, an 890-square-mile piece of land where the national lab maintained a sizable power grid for testing purposes, complete with 61 miles of transmission lines and seven electrical substations. Now, if Assante had done his job properly, they were going to destroy it. And the assembled researchers planned to kill that very expensive and resilient piece of machinery not with any physical tool or weapon but with about 140 kilobytes of data, a file smaller than the average cat GIF shared today on Twitter....

Protective relays are designed to function as a safety mechanism to guard against dangerous physical conditions in electric systems. If lines overheat or a generator goes out of sync, it's those protective relays that detect the anomaly and open a circuit breaker, disconnecting the trouble spot, saving precious hardware, even preventing fires... But what if that protective relay could be paralyzed — or worse, corrupted so that it became the vehicle for an attacker's payload...?

Black chunks began to fly out of an access panel on the generator, which the researchers had left open to watch its internals. Inside, the black rubber grommet that linked the two halves of the generator's shaft was tearing itself apart. A few seconds later, the machine shook again as the protective relay code repeated its sabotage cycle, disconnecting the machine and reconnecting it out of sync. This time a cloud of gray smoke began to spill out of the generator, perhaps the result of the rubber debris burning inside it... The engineers had just proven without a doubt that hackers who attacked an electric utility could go beyond a temporary disruption of the victim's operations: They could damage its most critical equipment beyond repair...

Assante also remembers feeling something weightier in the moments after the Aurora experiment. It was a sense that, like Robert Oppenheimer watching the first atomic bomb test at another U.S. national lab six decades earlier, he was witnessing the birth of something historic and immensely powerful.

"I had a very real pit in my stomach," Assante says. "It was like a glimpse of the future."

EU

Massive Criminal Trial Begins For 'Cyberbunker' Dark Web Server (dutchnews.nl) 16

The Times of London reports: A gang of cyberexperts turned a former German military bunker into one of Europe's biggest hubs for the "dark web" and a superhighway for at least a quarter of a million offences, including drug trafficking and the falsification of identity papers, a court has been told.

Four people from the Netherlands, three Germans and a Bulgarian are accused of creating a digital safe haven in which criminals could operate with impunity.

Dutch News reports: Deals which were processed through the servers include drugs — with platforms such as Cannabis Road — which had millions of active users, the Telegraaf said on Tuesday. Other sites allowed people to order fake money and ID papers, and the bunker was also used to stage a bot attack on German telecom firm Deutsche Telekom, the paper said.

The investigation into the bunker took years of observation and phone tapping, culiminating in a raid involving 650 police officers in September 2019. .

Long-time Slashdot reader Qbertino writes: Prosecuters believe to have a case which is set to take 15 months until the end of 2021 simply due to the sheer mass of material they've gatherd to make a case. The defendants, which include adolescents at the time of crime, face up to 15 years in prison should they be convicted.
As recently as this June, the cyberbunker was still being contacted by several phishing sites, as well as thousands of bots looking for their old command and control server.
EU

EU Sanctions Russia Over 2015 German Parliament Hack (zdnet.com) 58

The European Union has imposed sanctions today against Russia for its involvement in the 2015 German Parliament (Bundestag) hack. From a report: Sanctions were levied against the GRU (Russian Main Intelligence Directorate), a military intelligence agency part of the Russian Army, and two of its officers. The two GRU officers were identified as Dmitry Badin and Igor Kostyukov. EU officials said Badin was part of a team of Russian military intelligence officers who hacked the Bundestag IT network between April and May 2015. "This cyber-attack targeted the parliament's information system and affected its operation for several days," the EU said today. "A significant amount of data was stolen and the email accounts of several MPs as well as of Chancellor Angela Merkel were affected." Kostyukov was sanctioned for his role as First Deputy Head of the GRU. EU officials said Kostyukov commands the 85th Main Centre for Special Services (GTsSS), also known as Military Unit 26165, but more commonly known in the cyber-security industry under the hacker codenames of APT28, Fancy Bear, Sofacy, or Strontium.
Google

Google AI Tech Will Be Used For Virtual Border Wall, CBP Contract Shows (theintercept.com) 76

An anonymous reader quotes a report from The Intercept: After years of backlash over controversial government work, Google technology will be used to aid the Trump administration's efforts to fortify the U.S.-Mexico border, according to documents related to a federal contract. In August, Customs and Border Protection accepted a proposal to use Google Cloud technology to facilitate the use of artificial intelligence deployed by the CBP Innovation Team, known as INVNT. Among other projects, INVNT is working on technologies for a new "virtual" wall along the southern border that combines surveillance towers and drones, blanketing an area with sensors to detect unauthorized entry into the country.

Contracting documents indicate that CBP's new work with Google is being done through a third-party federal contracting firm, Virginia-based Thundercat Technology. Thundercat is a reseller that bills itself as a premier information technology provider for federal contracts. The contract was obtained through a FOIA request filed by Tech Inquiry, a new research group that explores technology and corporate power founded by Jack Poulson, a former research scientist at Google who left the company over ethical concerns. Not only is Google becoming involved in implementing the Trump administration's border policy, the contract brings the company into the orbit of one of President Donald Trump's biggest boosters among tech executives.

Documents show that Google's technology for CBP will be used in conjunction with work done by Anduril Industries, a controversial defense technology startup founded by Palmer Luckey. The brash 28-year-old executive -- also the founder of Oculus VR, acquired by Facebook for over $2 billion in 2014 -- is an open supporter of and fundraiser for hard-line conservative politics; he has been one of the most vocal critics of Google's decision to drop its military contract. Anduril operates sentry towers along the U.S.-Mexico border that are used by CBP for surveillance and apprehension of people entering the country, streamlining the process of putting migrants in DHS custody. CBP's Autonomous Surveillance Towers program calls for automated surveillance operations "24 hours per day, 365 days per year" to help the agency "identify items of interest, such as people or vehicles." The program has been touted as a "true force multiplier for CBP, enabling Border Patrol agents to remain focused on their interdiction mission rather than operating surveillance systems." It's unclear how exactly CBP plans to use Google Cloud in conjunction with Anduril or for any of the "mission needs" alluded to in the contract document.
Google faced internal turmoil in 2018 over a contract with the Pentagon to deploy AI-enhanced drone image recognition solutions. "In response to the controversy, Google ended its involvement with the initiative, known as Project Maven, and established a new set of AI principles to govern future government contracts," notes The Intercept.
China

Sweden Bans Chinese Telecoms Huawei and ZTE From 5G Networks (axios.com) 42

Sweden banned Chinese telecom giants Huawei and ZTE from its 5G mobile networks on Tuesday, citing China's "extensive intelligence gathering and theft of technology." From a report: Since the Trump administration announced its own ban last year, the U.S. government has increasingly pressured allies to follow its lead amid growing tensions between the West and China. In July, the United Kingdom became the first European country to announce plans to exclude Huawei from its networks by 2027. The Swedish government has given telecom companies until 2025 to remove Huawei and ZTE equipment from their infrastructure. "China is one of the biggest threats to Sweden," said Klas Friberg, head of Sweden's security services. He said Beijing's "extensive intelligence gathering and theft of technology, research and development" is key to its economic and military development, according to the Financial Times. "This is what we must consider when building the 5G network of the future. We cannot compromise with Sweden's security."
Security

US Charges Russian Hackers Behind NotPetya, KillDisk, OlympicDestroyer Attacks (zdnet.com) 33

The US Department of Justice has unsealed charges today against six Russian nationals believed to be part of one of Russia's most elite and secretive hacking groups, universally known as Sandworm. From a report: US officials said all six nationals are officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the Russian Army, DOJ officials said today. Under orders from the Russian government, US officials said the six (believed to be part of a much larger group) conducted cyber-attacks on behalf of the Russian government with the intent to destabilize other countries, interfere in their internal politics, and cause havoc and monetary losses. Their attacks span the last decade and include some of the biggest cyber-attacks known to date: Ukrainian Government & Critical Infrastructure (between December 2015 to December 2016), French Elections (April and May 2017), Worldwide Businesses and Critical Infrastructure (aka NotPetya; June 2017), PyeongChang Winter Olympics Hosts, Participants, Partners, and Attendees (December 2017 through February 2018), PyeongChang Winter Olympics IT Systems (aka Olympic Destroyer; 2017 through February 2018), Novichok Poisoning Investigations (April 2018), and Georgian Companies and Government Entities (a 2018 spearphishing campaign targeting a major media company, 2019 efforts to compromise the network of Parliament, and a wide-ranging website defacement campaign in 2019.)
United States

SpaceX's First Military Contracts: One-Hour Cargo Deliveries By Rocket and Missile-Tracking Satellites (vice.com) 101

"The Pentagon is contracting Elon Musk's SpaceX to develop rockets that can deliver packages anywhere on the planet in under an hour," reports Vice: One of the things that makes the U.S. military a dominant global fighting force is its ability to move troops, weapons, and supplies quickly to where they're needed. C-17 transport planes soar across the globe delivering troops and weapons where they're needed. But America isn't making any more C-17s, so while demand for logistics in the military is up, the supply of vehicles designed to carry stuff around the planet is down. To fill the logistical gap, U.S. Transportation Command (USTRANSCOM) wants SpaceX to build rockets it can quickly fire around the globe...

The project is in the early stages and there's no telling when, or if, SpaceX will be able to move MRAPs, guns, and MREs from Fort Bragg to Djibouti in 45 minutes.

Earlier this week, the Pentagon also announced a $149 million contract with SpaceX to build four missile-tracking satellites, Vice reported: SpaceX will build and deliver four of its Starlink satellites which the Pentagon said it will fit with special sensors to allow them to track missiles, including nuke-bearing Intercontinental Ballistic Missiles and hypersonic glide vehicles....

SpaceX's four tracking satellites are a small part of a larger Pentagon plan to put hundreds of satellites in orbit over the next few years. The next layer of the system is slated for 2024 and will include several hundred more satellites in the transport layer and dozens more in the tracking layer, according to the Pentagon...

This is SpaceX's first military contract.

Slashdot Top Deals