Space

SpaceX Launches Advanced GPS Satellite for US Space Force, Sticks Rocket Landing at Sea (space.com) 62

SpaceX successfully launched an advanced GPS satellite for the U.S. Space Force on Thursday (June 17), marking the 19th launch of the year here on the Space Coast. From a report: One of the company's two-stage Falcon 9 rockets blasted off from Space Launch Complex 40 at Cape Canaveral Air Force Station here at 12:09 p.m. EST (1409 GMT), carrying the GPS III SV05 navigation satellite to orbit. Nine minutes later, the rocket's first stage touched down on the deck of "Just Read the Instructions," one of SpaceX's two drone ships. "What a beautiful view of the first stage landing," Youmei Zhou, a SpaceX propulsion engineer, said during the company's live launch commentary.

The GPS III SV05 satellite mission is the second to launch so far this month for SpaceX, following the launch of a broadband satellite for Sirius XM on June 6. It was nothing but blue skies over the launch pad, and onlookers were treated to a gorgeous view as the rocket climbed to orbit. Today's flight marks the fourth GPS satellite delivery by SpaceX for the U.S. military. Three previous advanced GPS III missions also launched on Falcon 9 rockets, including two missions last year. Another of the satellites launched in August 2019 on the United Launch Alliance's final flight of the Delta IV Medium rocket. "If you've ever used your phone's mapping service or retrieved a location via a pin drop, you've used a satellite in this system," Zhou said.

United States

NSA Leaker Reality Winner Released Early for Good Behavior (therecord.media) 84

Reality Winner, a former NSA intelligence contractor who leaked a classified hacking report to the press in 2017, was released on Monday from prison for good behavior, her attorney said. From a report: Winner is not yet at large. She has been transferred from prison to a Residential Reentry Management facility in San Antonio, Texas, where she will remain until November 2021, when she will be fully released under supervised release, her lawyer said. Winner, who worked for NSA contractor Pluribus International Corporation, was initially arrested in June 2017 on charges that a month earlier, she leaked a classified NSA report to online news outlet The Intercept.

In the report, the NSA detailed a hacking campaign linked to Russia's military intelligence service, the General Staff Main Intelligence Directorate (GRU), which compromised the email accounts of multiple employees of election software maker VR Systems ahead of the 2016 US Presidential Election. The hack, which took place in August 2016, was used by the GRU hackers as a springboard to send spear-phishing emails with malware-laced documents to US government employees. Winner's leak, although not extensive, served as the base material for an article titled "Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election."

The Military

Drone Refuels US Navy Fighter Jet In Midair For the First Time (cbsnews.com) 122

An unmanned aircraft successfully refueled a U.S. fighter jet in midair for the first time, officials said Monday. CBS News reports: A Navy F/A-18 Super Hornet and a Boeing-made drone were briefly connected by a hose as the drone transferred jet fuel to the aircraft in the skies over the Midwest during Friday's test flight. During the flight, the Super Hornet approached the drone, known as a MQ-25 Stingray, from behind and were as close as 20 feet from each other, Boeing said. The hose extended from the drone, and the Super Hornet connected with the drogue at the end of the hose to receive the fuel. The Navy posted video of the test flight to Twitter.
Space

Will the US Air Force Use SpaceX's Starship for Speedy Cargo Deliveries? (arstechnica.com) 133

The U.S. Air Force wants to invest $38 million next year in projects under the heading "Rocket Cargo." Ars Technica reports that Air Force is already spending $9.7 million on the projects, "but seeks to increase that total for the coming year as it moves into the test phase of the program. The funds will have to be approved by Congress as part of its budget deliberation process this summer and fall."

The Air Force's 462-page budget-justifying document says their branch of the military "seeks to leverage the current multi-billion dollar commercial investment to develop the largest rockets ever, and with full reusability to develop and test the capability to leverage a commercial rocket to deliver Air Force cargo anywhere on the Earth in less than one hour, with a 100-ton capacity."

Although this does not refer to Starship by name, this is the only vehicle under development in the world with this kind of capability. The Air Force does not intend to invest directly into the vehicle's development, the document says. However, it proposes to fund science and technology needed to interface with the Starship vehicle so that the Air Force might leverage its capabilities. Clearly, some Air Force officials are intrigued by the possibility of launching 100 tons of cargo from the United States and having the ability to land it anywhere in the world about an hour later.
The Military

After Years of Detecting Land Mines, A Heroic Rat Is Hanging Up His Sniffer (npr.org) 30

A heroic rat named Magawa is retiring from sniffing out dozens of land mines in Cambodia for the last five years. NPR reports: Magawa is a Tanzanian-born African giant pouched rat who was trained by APOPO to sniff out explosives. With careful training, he and his rat colleagues learn to identify land mines and alert their human handlers, so the mines can be safely removed. Even among his skilled cohorts working in Cambodia, Magawa is a standout sniffer: In four years he has helped to clear more than 2.4 million square feet of land. In the process, he has found 71 land mines and 38 items of unexploded ordnance. Last year, Magawa received one of Britain's highest animal honors.

Magawa is part of a cohort of rats bred by APOPO for this purpose. He was born in Tanzania in 2014, socialized and moved to Siem Reap, Cambodia, in 2016 to begin his bomb-sniffing career. APOPO uses positive reinforcement methods that give the rats food rewards for accomplishing tasks such as finding a target or walking across a surface. Then they're trained in scent discrimination: choosing explosive smells over something else to get a food reward. Though they have terrible eyesight, the rats are ideal for such work, with their extraordinary sense of smell and their size -- they are too light to trigger the mines. When they detect a mine, they lightly scratch atop it, signaling to their handler what they've found. Their reward: a banana. [T]he rats hone their skills in a training field and are only cleared to begin work once they have perfect accuracy over an 8,600-square-foot area with various stages of complexity.

Government

The Secret Behind Amazon's Domination in Cloud Computing (politico.com) 35

Amazon's massive cloud-computing unit is aggressively recruiting U.S. government officials as it pushes to make itself essential to branches such as the military and the intelligence community, POLITICO reported Friday. From the report: Since 2018, Amazon Web Services has hired at least 66 former government officials with acquisition, procurement or technology adoption experience, most hired directly away from government posts and more than half of them from the Defense Department. That's a small portion of AWS' tens of thousands of employees, but a particularly key group to its federal business. Other AWS hires have come from departments including Homeland Security, Justice, Treasury and Veterans Affairs.

That's on top of more than 600 hires of government officials across all of Amazon during the same time -- itself a mark of the company's expanding footprint in the D.C. region. Amazon employs more than 1 million people overall, after adding 500,000 new jobs last year alone. The hiring spree highlights how tech companies are becoming more entrenched in the operations of the government itself -- and indispensable to Cabinet agencies and national security operations -- even as politicians shout about the danger of letting them get too powerful.

United States

Biden Order Bans Investment in Dozens of Chinese Defense, Tech Firms (reuters.com) 98

President Joe Biden signed an executive order on Thursday that bans U.S. entities from investing in dozens of Chinese companies with alleged ties to defense or surveillance technology sectors. From a report: The move, which his administration says expands the scope of a legally flawed Trump-era order, drew anger from Beijing. The Treasury Department will enforce and update on a "rolling basis" the new list of about 59 companies, which bars buying or selling publicly traded securities in target companies, and replaces an earlier list from the Department of Defense, senior administration officials told reporters. The order prevents U.S. investment from supporting the Chinese military-industrial complex, as well as military, intelligence, and security research and development programs, Biden said in the order. "In addition, I find that the use of Chinese surveillance technology outside the PRC and the development or use of Chinese surveillance technology to facilitate repression or serious human rights abuse constitute unusual and extraordinary threats," Biden said, using the acronym for the People's Republic of China.
The Military

YouTube Channel Remembers and Preserves Ads From US Military's TV Service (stripes.com) 18

The American Forces Network is a U.S. government TV and radio broadcast service provided by the military for overseas personnel. But there's an interesting quirk. As an official Department of Defense product, it's not allowed to run ads or even mention commercial products, according to Stars and Stripes. "Instead, it lets commanders put out messages about force protection, weather, current events and base services."

And that's where things get creative...

Killer vending machines, security-conscious hamsters and a roommate who devolves into a caveman. These are some of the memorable features of Garry Terrell's vast collection of military-grade videos from the American Forces Network and its predecessor, the Armed Forces Radio and Television Service. The son of a former U.S. soldier, Terrell is trying to preserve "all things AFN/AFRTS," and boasts over 3,600 videos on the YouTube channel AFRTSfan. He began his collection nearly three decades ago, after learning that little had been done to save the many AFN spots that serve as a touchstone for troops and military families who've lived overseas.

The military-made productions fill what would normally be ad time in broadcasts back home... Because they're broadcast across various theaters, the ads served as "kind of like this bonding thing" for kids' friend groups frequently reshaped by duty station changes, said Sabine Brown, an airman's daughter who grew up in Germany in the 80s and 90s. For Terrell, whose mother is German, "it was just my local TV and radio provider" growing up on the bases where his father served as a career U.S. soldier in the 70s and 80s. He took it for granted until the early 90s Base Realignment and Closure process threatened to shutter bases he'd grown up on.

"Fearing that AFN might also go away, I decided to try and collect some AFN radio and TV items to add to my ever-growing memory book of Germany," he said in an email. "I felt like I was in a race against time."

He began contacting and befriending AFN staff and alumni, growing his collection through contributions from his expanding network of AFN insiders and "superfans." He started sharing this burgeoning library on YouTube over a decade ago, creating something of a time capsule, with spots that run the gamut from cringe-inducing, silly or lame to fun, brilliant and truly memorable.

The article notes that the videos once were even affectionately lampooned in a duet by two folk-singing Air Force pilots — which apparently remembers, among other things, the AFN ad illustrating the importance of the power-of-attorney by re-dubbing an old Hercules movie.
AI

Jerusalem Post: Israel's Gaza Strip Bombing Was 'World's First AI War' (jpost.com) 276

"For the first time, artificial intelligence was a key component and power multiplier in fighting the enemy," says a senior officer in the intelligence corps of the Israeli military, describing the technology's use in 11 days of fighting in the Gaza Strip.

They're quoted in a Jerusalem Post article on "the world's first AI war": Soldiers in Unit 8200, an Intelligence Corps elite unit, pioneered algorithms and code that led to several new programs called "Alchemist," "Gospel" and "Depth of Wisdom," which were developed and used during the fighting. Collecting data using signal intelligence, visual intelligence, human intelligence , geographical intelligence, and more, the Israel Defense Forces (IDF) has mountains of raw data that must be combed through to find the key pieces necessary to carry out a strike. "Gospel" used AI to generate recommendations for troops in the research division of Military Intelligence, which used them to produce quality targets and then passed them on to the IAF to strike...

While the IDF had gathered thousands of targets in the densely populated coastal enclave over the past two years, hundreds were gathered in real time, including missile launchers that were aimed at Tel Aviv and Jerusalem. The military believes using AI helped shorten the length of the fighting, having been effective and quick in gathering targets using super-cognition. The IDF carried out hundreds of strikes against Hamas and PIJ, including rocket launchers, rocket manufacturing, production and storage sites, military intelligence offices, drones, commanders' residences and Hamas's naval commando unit. Israel has destroyed most of the naval commando unit's infrastructure and weaponry, including several autonomous GPS-guided submarines that can carry 30 kg. of explosives.

IDF Unit 9900's satellites have gathered geographical intelligence over the years. They were able to automatically detect changes in terrain in real time so that during the operation, the military was able to detect launching positions and hit them after firing. For example, Unit 9900 troops using satellite imagery were able to detect 14 rocket launchers that were located next to a school... One strike, against senior Hamas operative Bassem Issa, was carried out with no civilian casualties despite being in a tunnel under a high-rise building surrounded by six schools and a medical clinic... Hamas's underground "Metro" tunnel network was also heavily damaged over the course of several nights of airstrikes. Military sources said they were able to map the network, consisting of hundreds of kilometers under residential areas, to a degree where they knew almost everything about them.

The mapping of Hamas's underground network was done by a massive intelligence-gathering process that was helped by the technological developments and use of Big Data to fuse all the intelligence.

Government

With 'Massive' Cybersecurity Labor Shortage, Will Corporations Compete with Local Governments? (cnn.com) 83

it's high time for companies to start adding cybersecurity professionals to their teams, reports CNN. "The only hitch: There's a massive, longstanding labor shortage in the cybersecurity industry." "It's a talent war," said Bryan Orme, principal at GuidePoint Security. "There's a shortage of supply and increased demand."

Experts have been tracking the cybersecurity labor shortage for at least a decade — and now, a new surge in companies looking to hire following recent attacks could exacerbate the problem. The stakes are only growing, as technology evolves and bad actors become more advanced. In the United States, there are around 879,000 cybersecurity professionals in the workforce and an unfilled need for another 359,000 workers, according to a 2020 survey by (ISC)2, an international nonprofit that offers cybersecurity training and certification programs. Globally, the gap is even larger at nearly 3.12 million unfilled positions, the group says... The U.S. Bureau of Labor Statistics projects "information security analyst" will be the 10th fastest growing occupation over the next decade, with an employment growth rate of 31% compared to the 4% average growth rate for all occupations.

If demand for cybersecurity professionals in the private sector increases dramatically, some experts say talented workers could leave the government for more lucrative corporate jobs — a risk that is especially acute for smaller, local government agencies that manage critical infrastructure in their communities but have limited budgets. "Think of the criticality of what your local government does: water purification, waste treatment, traffic management, communications for law enforcement, public safety, emergency management," said Mike Hamilton, chief information security officer at Critical Insight. "But Amazon is out there waving around bags of cash to protect their retail operation." Hamilton — who was the former chief information security officer for Seattle, Washington, from 2006 to 2013 — added that local governments "cannot attract and retain these people when the competition for them is so high, which is why we've got to make lots of them."

The article notes educational training/up-skilling programs working to address the shortage, including GuidePoint, which helps train veterans leaving the military for cybersecurity careers. CNN also notes U.S. President Joe Biden's $2 trillion American Jobs Plan included $20 billion for state, local and tribal governments to update and improve cybersecurity controls for their energy systems.

"Still, experts say more needs to be done, suggesting a broad rethinking of education systems from elementary school through higher education to include more cybersecurity training."
The Military

US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps (bellingcat.com) 39

An anonymous reader quotes a report from Bellingcat: For US soldiers tasked with the custody of nuclear weapons in Europe, the stakes are high. Security protocols are lengthy, detailed and need to be known by heart. To simplify this process, some service members have been using publicly visible flashcard learning apps -- inadvertently revealing a multitude of sensitive security protocols about US nuclear weapons and the bases at which they are stored. While the presence of US nuclear weapons in Europe has long been detailed by various leaked documents, photos and statements by retired officials, their specific locations are officially still a secret with governments neither confirming nor denying their presence. As many campaigners and parliamentarians in some European nations see it, this ambiguity has often hampered open and democratic debate about the rights and wrongs of hosting nuclear weapons.

However, the flashcards studied by soldiers tasked with guarding these devices reveal not just the bases, but even identify the exact shelters with "hot" vaults that likely contain nuclear weapons. They also detail intricate security details and protocols such as the positions of cameras, the frequency of patrols around the vaults, secret duress words that signal when a guard is being threatened and the unique identifiers that a restricted area badge needs to have. Like their analogue namesakes, flashcard learning apps are popular digital learning tools that show questions on one side and answers on the other. By simply searching online for terms publicly known to be associated with nuclear weapons, Bellingcat was able to discover cards used by military personnel serving at all six European military bases reported to store nuclear devices. Experts approached by Bellingcat said that these findings represented serious breaches of security protocols and raised renewed questions about US nuclear weapons deployment in Europe.
The report notes that some of the flashcards "had been publicly visible online as far back as 2013," while others "detailed processes that were being learned by users until at least April 2021."

Crucially, all flashcards mentioned in the article "have been taken down from the learning platforms on which they appeared after Bellingcat reached out to NATO and the US Military for comment prior to publication," the report states.
Space

Astronaut Chris Hadfield Calls Alien UFO Hype 'Foolishness' (cnet.com) 156

The Canadian astronaut, who commanded the International Space Station and recorded the famous microgravity rendition of David Bowie's Space Oddity, on Sunday spit some fire at true believers who see a link between UFOs or UAPs (for "unidentified aerial phenomena" in the newish military parlance) and some sort of alien intelligence. From a report: "Obviously, I've seen countless things in the sky that I don't understand," Chris Hadfield, a former pilot for the Royal Canadian Air Force, said during a CBC Radio call-in show.

"But to see something in the sky that you don't understand and then to immediately conclude that it's intelligent life from another solar system is the height of foolishness and lack of logic." [...] Hadfield added that he does think it's likely there's life somewhere else in the universe. "But definitively up to this point, we have found no evidence of life anywhere except Earth," he said, "and we're looking."

Sci-Fi

Newly Leaked US Navy Video Shows UFO Sinking Into the Water (cnn.com) 216

alaskana98 writes: In a newly leaked video, ship based U.S. Navy personnel appear to be tracking an orb-shaped UFO as it tracks closely above the water, eventually appearing to dip beneath water's surface. Last month, a still from this video was teased along with another video showing a triangular UFO transit the sky along with photos of three strange objects at high altitudes captured within minutes of each other by Navy pilots in 2019. These photos and videos all come on the eve of a highly anticipated unclassified report due to be released sometime in June for the intelligence and armed services committees in Congress. Referring to this report, former Director of National Intelligence John Ratcliffe states: "There are instances where we don't have good explanations for some of the things that we've seen."

Not everyone is convinced that these objects are being piloted by grey aliens. In an exhaustive report by the site "The War Zone," a plausible theory is laid out that purports that these objects are nothing more than cleverly disguised blimps or drones launched by U.S. adversaries, using nothing more than the social stigma of taking UFOS/UAPS seriously as a means to dissuade any serious attempts by the U.S. military to treat these as conventional domestic threats.

Social Networks

'How Lies on Social Media Are Inflaming the Israeli-Palestinian Conflict' (msn.com) 362

The New York Times reports on misinformation that's further inflaming the Israeli-Palestinian conflict: In a 28-second video, which was posted to Twitter this week by a spokesman for Prime Minister Benjamin Netanyahu of Israel, Palestinian militants in the Gaza Strip appeared to launch rocket attacks at Israelis from densely populated civilian areas.

At least that is what Mr. Netanyahu's spokesman, Ofir Gendelman, said the video portrayed. But his tweet with the footage, which was shared hundreds of times as the conflict between Palestinians and Israelis escalated, was not from Gaza. It was not even from this week. Instead, the video that he shared, which can be found on many YouTube channels and other video-hosting sites, was from 2018. And according to captions on older versions of the video, it showed militants firing rockets not from Gaza but from Syria or Libya.

The video was just one piece of misinformation that has circulated on Twitter, TikTok, Facebook, WhatsApp and other social media this week about the rising violence between Israelis and Palestinians, as Israeli military ground forces attacked Gaza early on Friday. The false information has included videos, photos and clips of text purported to be from government officials in the region, with posts baselessly claiming early this week that Israeli soldiers had invaded Gaza, or that Palestinian mobs were about to rampage through sleepy Israeli suburbs. The lies have been amplified as they have been shared thousands of times on Twitter and Facebook, spreading to WhatsApp and Telegram groups that have thousands of members, according to an analysis by The New York Times.

The effect of the misinformation is potentially deadly, disinformation experts said, inflaming tensions between Israelis and Palestinians when suspicions and distrust have already run high.

Privacy

Pentagon Surveilling Americans Without a Warrant, Senator Reveals (vice.com) 43

An anonymous reader quotes a report from Motherboard: The Pentagon is carrying out warrantless surveillance of Americans, according to a new letter written by Senator Ron Wyden and obtained by Motherboard. Senator Wyden's office asked the Department of Defense (DoD), which includes various military and intelligence agencies such as the National Security Agency (NSA) and the Defense Intelligence Agency (DIA), for detailed information about its data purchasing practices after Motherboard revealed special forces were buying location data. The responses also touched on military or intelligence use of internet browsing and other types of data, and prompted Wyden to demand more answers specifically about warrantless spying on American citizens.

Some of the answers the DoD provided were given in a form that means Wyden's office cannot legally publish specifics on the surveillance; one answer in particular was classified. In the letter Wyden is pushing the DoD to release the information to the public. A Wyden aide told Motherboard that the Senator is unable to make the information public at this time, but believes it would meaningfully inform the debate around how the DoD is interpreting the law and its purchases of data. "I write to urge you to release to the public information about the Department of Defense's (DoD) warrantless surveillance of Americans," the letter, addressed to Secretary of Defense Lloyd J. Austin III, reads. Wyden and his staff with appropriate security clearances are able to review classified responses, a Wyden aide told Motherboard. Wyden's office declined to provide Motherboard with specifics about the classified answer. But a Wyden aide said that the question related to the DoD buying internet metadata.

"Are any DoD components buying and using without a court order internet metadata, including 'netflow' and Domain Name System (DNS) records," the question read, and asked whether those records were about "domestic internet communications (where the sender and recipient are both U.S. IP addresses)" and "internet communications where one side of the communication is a U.S. IP address and the other side is located abroad." Netflow data creates a picture of traffic flow and volume across a network. DNS records relate to when a user looks up a particular domain, and a system then converts that text into the specific IP address for a computer to understand; essentially a form of internet browsing history. Wyden's new letter to Austin urging the DoD to release that answer and others says "Information should only be classified if its unauthorized disclosure would cause damage to national security. The information provided by DoD in response to my questions does not meet that bar."

China

US Agrees To Remove Xiaomi From Blacklist After Lawsuit (bloomberg.com) 66

Xiaomi and the U.S. government have text to set aside a Trump administration blacklisting that could have restricted American investment in the Chinese smartphone maker. From a report: The Chinese smartphone giant had sued the government earlier this year, after the U.S. Defense Department under former President Donald Trump issued an order designating the firm as a Communist Chinese Military Company, which would have led to a de-listing from U.S. exchanges and deletion from global benchmark indexes. The U.S. Defense Department has now agreed that a final order vacating the designation "would be appropriate," according to a filing to the U.S. courts Tuesday. Xiaomi declined to comment. Pentagon representatives weren't immediately available for comment after normal hours. Chinese Foreign Ministry spokeswoman Hua Chunying said at a regular press briefing in Beijing she wasn't aware of any deal the firm may have reached with the U.S. "The Parties have agreed upon a path forward that would resolve this litigation without the need for contested briefing," according to the filing, which didn't state whether the agreement included any conditions for removal. The parties involved are negotiating over specific terms and will file a separate joint proposal before May 20.
The Military

Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight (wsj.com) 86

Pentagon officials are considering pulling the plug on the star-crossed JEDI cloud-computing project, which has been mired in litigation from Amazon and faces continuing criticism from lawmakers. From a report: The Joint Enterprise Defense Infrastructure contract was awarded to Microsoft in 2019 over Amazon, which has contested the award in court ever since. A federal judge last month refused the Pentagon's motion to dismiss much of Amazon's case. A few days later, Deputy Defense Secretary Kathleen Hicks said the department would review the project. "We're going to have to assess where we are with regard to the ongoing litigation around JEDI and determine what the best path forward is for the department," Ms. Hicks said at an April 30 security conference organized by the nonprofit Aspen Institute. Her comments followed a Pentagon report to Congress, released before the latest court ruling, that said another Amazon win in court could significantly draw out the timeline for the program's implementation. "The prospect of such a lengthy litigation process might bring the future of the JEDI Cloud procurement into question," the Jan. 28 report said. Ms. Hicks and other Pentagon officials say there is a pressing need to implement a cloud program that serves most of its branches and departments. The JEDI contract, valued at up to $10 billion over 10 years, aims to allow the Pentagon to consolidate its current patchwork of data systems, give defense personnel better access to real-time information and put the Defense Department on a stronger footing to develop artificial-intelligence capabilities that are seen as vital in the future.
United States

Capitol Rioters Identified Using Facial Recognition Software, Cellphone Records - and Social Media Posts (nbcnews.com) 352

NBC News reports more than 440 Americans have now been charged with storming the U.S. Capitol building on January 6th, with charges now filed against people from 44 of America's 50 states. They describe it as "one of the largest criminal investigations in American history." The largest number come from Texas, Pennsylvania, and Florida, in that order. Men outnumber women among those arrested by 7 to 1, with an average age of 39, according to figures compiled by the Program on Extremism at George Washington University in Washington, D.C. A total of 44 are military veterans.
Hundreds of arrests happened because rioters later bragged online: In nearly 90 percent of the cases, charges have been based at least in part on a person's own social media accounts.

A New York man, Robert Chapman, bragged on the dating app Bumble that he'd been in the Capitol during the riot. The person he was seeking to date responded, "We are not a match," and notified the FBI.

In fact, the investigative agency has now received "hundreds of thousands" of tips from the public, and has even posted photos of people who participated in the riots online asking for the public's help to identify them.

But NBC also reports that technology is being used to identify participants:
  • "Investigators have also used facial recognition software, comparing images from surveillance cameras and an outpouring of social media and news agency videos against photo databases of the FBI and at least one other federal agency, Customs and Border Protection, according to court documents."
  • Investigators "have also subpoenaed records from companies providing cellphone service, allowing agents to tell whether a specific person's phone was inside the Capitol during the siege."

Security

Ransomware Cyberattack Forces Major US Pipeline Company to Halt Operations (apnews.com) 52

"Colonial Pipeline, which accounts for 45% of the East Coast's fuel, said it has shut down its operations due to a cyberattack," reports ZDNet. "The attack highlights how ransomware and other cyberattacks are increasingly a threat to real-world infrastructure.

"The company delivers refined petroleum products such as gasoline, diesel, jet fuel, home heating oil, and fuel for the U.S. Military."

UPDATE: Saturday the company confirmed that the attack involved ransomware.

The Associated Press reports: Colonial Pipeline said the attack took place Friday and also affected some of its information technology systems. The Alpharetta, Georgia-based company said it hired an outside cybersecurity firm to investigate the nature and scope of the attack and has also contacted law enforcement and federal agencies. "Colonial Pipeline is taking steps to understand and resolve this issue," the company said in a late Friday statement. "At this time, our primary focus is the safe and efficient restoration of our service and our efforts to return to normal operation. This process is already underway, and we are working diligently to address this matter and to minimize disruption to our customers and those who rely on Colonial Pipeline."

Oil analyst Andy Lipow said the impact of the attack on fuel supplies and prices depends on how long the pipeline is down. An outage of one or two days would be minimal, he said, but an outage of five or six days could causes shortages and price hikes, particularly in an area stretching from central Alabama to the Washington, D.C., area. Lipow said a key concern about a lengthy delay would be the supply of jet fuel needed to keep major airports operating, like those in Atlanta and Charlotte, North Carolina.

The precise nature of the attack was unclear, including who launched it and what the motives were...

Mike Chapple, teaching professor of IT, analytics and operations at the University of Notre Dame's Mendoza College of Business and a former computer scientist with the National Security Agency, said systems that control pipelines should not be connected to the internet and vulnerable to cyber intrusions. "The attacks were extremely sophisticated and they were able to defeat some pretty sophisticated security controls, or the right degree of security controls weren't in place," Chapple said...

The article also points out the U.S. government says it's "undertaking a new effort to help electric utilities, water districts and other critical industries protect against potentially damaging cyberattacks....to ensure that control systems serving 50,000 or more Americans have the core technology to detect and block malicious cyber activity. The White House has announced a 100-day initiative aimed at protecting the country's electricity system from cyberattacks by encouraging owners and operators of power plants and electric utilities to improve their capabilities for identifying cyber threats to their networks. It includes concrete milestones for them to put technologies into use so they can spot and respond to intrusions in real time. The Justice Department has also announced a new task force dedicated to countering ransomware attacks...
The Military

Honeywell Admits Sending F-35, F-22 Technical Drawings To China (upi.com) 110

schwit1 shares a report from UPI: The State Department announced it has reached a $13 million settlement with U.S. defense contractor Honeywell International over allegations it exported technical data concerning fighter jets and other military vehicles to foreign countries, including China. The settlement resolves 34 charges the State Department leveled against the company for disclosing dozens of engineering prints showing dimensions, geometries and layouts for manufacturing parts for aircraft, gas turbine engines and military electronics.

Honeywell voluntarily informed the department in two disclosures that it had violated arms export control laws by sending the technical drawings to foreign countries, the State Department said in a statement. Honeywell had identified 71-controlled drawings that it had exported to Canada, Ireland, China and Taiwan between July 2011 and October 2015. "The U.S. government reviewed copies of the 71 drawings and determined that exports to and retransfers in the PRC of drawings for certain parts and components for the engine platforms for the F-35 Joint Strike Fighter, B-1B Lancer Long-Range Strategic Bomber and the F-22 Fighter Aircraft harmed U.S. national security," the document said.
In a statement emailed to UPI, Honeywell explained it "inadvertently shared" the technology that was assessed as impacting national security during "normal business discussions" but remarked that the schematics were commercially available worldwide. "No detailed manufacturing or engineering expertise was shared," it said.

The company has agreed to pay the fine and have an external compliance officer oversee the consent agreement for at least 18 months as well as conduct an external audit of its compliance program.

Slashdot Top Deals