×
Security

Hackers Broke Into Real News Sites To Plant Fake Stories (wired.com) 67

A disinfo operation broke into the content management systems of Eastern European media outlets in a campaign to spread misinformation about NATO. Wired reports: On Wednesday, security firm FireEye released a report on a disinformation-focused group it's calling Ghostwriter. The propagandists have created and disseminated disinformation since at least March 2017, with a focus on undermining NATO and the US troops in Poland and the Baltics; they've posted fake content on everything from social media to pro-Russian news websites. In some cases, FireEye says, Ghostwriter has deployed a bolder tactic: hacking the content management systems of news websites to post their own stories. They then disseminate their literal fake news with spoofed emails, social media, and even op-eds the propagandists write on other sites that accept user-generated content. That hacking campaign, targeting media sites from Poland to Lithuania, has spread false stories about US military aggression, NATO soldiers spreading coronavirus, NATO planning a full-on invasion of Belarus, and more.

"They're spreading these stories that NATO is a danger, that they resent the locals, that they're infected, that they're car thieves," says John Hultquist, director of intelligence at FireEye. "And they're pushing these stories out with a variety of means, the most interesting of which is hacking local media websites and planting them. These fictional stories are suddenly bona fide by the sites that they're on, and then they go in and spread the link to the story."

FireEye itself did not conduct incident response analyses on these incidents and concedes that it doesn't know exactly how the hackers are stealing credentials that give them access to the content management systems that allow posting and altering news stories. Nor does it know who is behind the string of website compromises, or for that matter the larger disinformation campaign that the fake stories are a part of. But the company's analysts have found that the news site compromises and the online accounts used to spread links to those fabricated stories, as well as the more traditional creation of fake news on social media, blogs, and websites with an anti-US and anti-NATO bent, all tie back to a distinct set of personas, indicating one unified disinformation effort. FireEye's Hultquist points out that the campaign doesn't seem financially motivated, indicating a political or state backer, and notes that the focus on driving a wedge between NATO and citizens of Eastern Europe hints at possible Russian involvement.

China

How a Chinese Agent Used LinkedIn to 'Lure' American Targets (bbc.com) 61

Today the BBC told the story of Jun Wei Yeo, "an ambitious and freshly enrolled Singaporean PhD student" who was gradually recruited by Chinese intelligence.

Yeo "would end up using the professional networking website LinkedIn, a fake consulting company and cover as a curious academic to lure in American targets." Some of the targets that Yeo found by trawling through LinkedIn were commissioned to write reports for his "consultancy", which had the same name as an already prominent firm. These were then sent to his Chinese contacts. One of the individuals he contacted worked on the U.S. Air Force's F-35 fighter jet programme and admitted he had money problems. Another was a U.S. army officer assigned to the Pentagon, who was paid at least $2,000 (£1,500) to write a report on how the withdrawal of US forces from Afghanistan would impact China... According to the court documents, his handlers advised him to ask targets if they "were dissatisfied with work" or "were having financial troubles"...

In 2018, Yeo also posted fake online job ads for his consulting company. He told investigators he received more than 400 CVs with 90% of them coming from "US military and government personnel with security clearances". Some were passed to his Chinese handlers... Dickson Yeo does not appear to have got as far with his contacts as his handlers would have liked. But in November 2019, he travelled to the U.S. with instructions to turn the army officer into a "permanent conduit of information", his signed statement says.

He was arrested before he could ask.

The 39-year-old now faces up to 10 years in prison for being an "illegal agent of a foreign power" — but the article notes he was "aided by an invisible ally — the LinkedIn algorithm.

"Each time Yeo looked at someone's profile it would suggest a new slate of contacts with similar experience that he might be interested in..."
Sci-Fi

Pentagon's UFO Unit Will Make Some Findings Public (baltimoresun.com) 186

According to The New York Times, a secretive task force called the Unidentified Aerial Phenomenon Task Force is expected to release new and alarming findings that may involve vehicles made of materials not of this plant. From the report: Despite Pentagon statements that it disbanded a once-covert program to investigate unidentified flying objects, the effort remains underway -- renamed and tucked inside the Office of Naval Intelligence, where officials continue to study mystifying encounters between military pilots and unidentified aerial vehicles. Pentagon officials will not discuss the program, which is not classified but deals with classified matters. Yet it appeared last month in a Senate committee report outlining spending on the nation's intelligence agencies for the coming year. The report said the program, the Unidentified Aerial Phenomenon Task Force, was "to standardize collection and reporting" on sightings of unexplained aerial vehicles, and was to report at least some of its findings to the public every six months. While retired officials involved with the effort -- including Harry Reid, the former Senate majority leader -- hope the program will seek evidence of vehicles from other worlds, its main focus is on discovering whether another nation, especially any potential adversary, is using breakout aviation technology that could threaten the United States.

Sen. Marco Rubio, R-Fla., who is the acting chairman of the Senate Select Committee on Intelligence, told a CBS affiliate in Miami this month that he was primarily concerned about reports of unidentified aircraft over U.S. military bases -- and that it was in the government's interest to find out who was responsible. He expressed concerns that China or Russia or some other adversary had made "some technological leap" that "allows them to conduct this sort of activity." Rubio said some of the unidentified aerial vehicles over U.S. bases possibly exhibited technologies not in the U.S. arsenal. But he also noted: "Maybe there is a completely, sort of, boring explanation for it. But we need to find out."

Crime

'World's Most Wanted Man' Involveld In Bizarre Attempt To Buy Hacking Tools (vice.com) 27

An anonymous reader quotes a report from Motherboard: The fugitive executive of the embattled payment startup Wirecard was mentioned in a brazen and bizarre attempt to purchase hacking tools and surveillance technology from an Italian company in 2013, an investigation by Motherboard and the German weekly Der Spiegel found. Jan Marsalek, a 40-year-old Austrian who until recently was the chief operating officer of the rising fintech company Wirecard, seems to have taken a meeting with the infamous Italian surveillance technology provider Hacking Team in 2013. At the time, Marsalek is described as an official representative of the government of Grenada, a small Caribbean island of around 100,000 people, in a letter that bears the letterhead of the Grenada government. The documents were included in a cache published after Hacking Team was hacked in 2015. In recent days, Marsalek has been described as the 'world's most wanted man.'

It is unclear from the documents alone whether Marsalek played any role in the attempt to procure hacking tools, or whether his name was simply used. However, months before Marsalek appears to have contacted with Hacking Team, several websites with official sounding names such as StateOfGrenada.org were registered under the name of Jan Marsalek, as Der Spiegel reported last week. Some of the sites were registered with Marsalek's phone number and his Munich address at the time, and the servers were apparently operated from Germany. Wirecard provided digital payment services and was considered one of the most important companies in the financial tech industry. Wirecard offered a mobile payment app called Boon, which was essentially a virtual MasterCard card, it also offered a prepaid debit card called mycard2go, and worked with companies such as KLM, Rakuten, and Qatar Airways to manage their online transactions. The company suddenly collapsed in June after German regulators raided its headquarters as part of an investigation into fraudulent stock price manipulation and 1.9 billion euros that are missing from the company's books. Marsalek is now a fugitive and a key suspect in the German investigation. He reportedly fled to Belarus, and is now hiding in Russia under the protection of the FSB, according to German news reports. In the past, he was involved in other strange dealings: he bragged about an attempt to recruit 15,000 Libyan militiamen, and about a trip to Syria along with Russian military, according to the Financial Times.

United States

Marco Rubio Hopes UFOs Are Aliens, Not Chinese Planes (vice.com) 144

Florida Senator Marco Rubio said he hopes that UFOs are extraterrestrials and not advanced Chinese aircraft. From a report: In a July 16 interview with CBS reporter Jim DeFede about a range of topics, including the government's Covid-19 response and the possible existence of extraterrestrial life. "We have things flying over our military bases and places where we're conducting military exercises and we don't know what it is and it isn't ours," Rubio said. "Frankly, if it's something outside this planet that might actually be better than the fact that we've seen some sort of technological leap from the Chinese or Russians or some other adversary that allows them to conduct this sort of activity," Rubio said. "That to me is a national security risk and one we should be looking into."
The Military

'If War Breaks Out on Top of the World' (popularmechanics.com) 83

The United States Air Force's elite "PJ" pararescue units and Alaska National Guard units "are ready to respond if war breaks out on top of the world," reports a new article in Popular Mechanics: With much of the ice cap melted, the Arctic is teeming with competitive activity because it's no longer an impenetrable land of glaciers — void of economic or strategic military advantages. In fact, quite the opposite. The U.S., Russia, and China all recognize that new shipping lanes and natural resources, worth trillions of dollars, are becoming more viable every day in the Arctic. Each nation has its own economic interests and the competition for control in the Arctic is only increasing.

Lt. Gen. Tom Bussiere says simply: "Whoever holds Alaska holds the region, and that impacts the globe," and according to the U.S. Senator of Alaska Dan Sullivan, "we have fallen behind in the race with China and Russia." Russia is reviving Soviet-era Arctic bases, increasing its fleet of Arctic icebreakers to a whopping 41 vessels (the U.S. has only two though this shortage is getting more attention), and Russian TU-95 "Bear" bombers frequently test F-22A Raptors' readiness near U.S. airspace.

And China has its own plans. Though not an Arctic nation like the U.S. or Russia, China's economic clout gained the nation an observer seat in the Arctic Council under the claims that they are a "near-Arctic state." China is positioning itself to stake a greater claim to the bountiful resources that the Arctic can provide, based on a bold plan they call the "Polar Silk Road." If completed, the plan will create an economic network beneficial to China through the once-frozen ocean.

In response to Russian operations and Chinese advances, the U.S. Air Force is battling for air superiority in the Arctic with its most valuable — and lethal — assets in Alaska, including the F-22A Raptor and F-35A Joint Strike Fighter.

By "battling" I think they mean "spending." A related side note: The article was co-authored by the producer of the TV series War On Top of The World
Social Networks

Hoax That Fooled Armed Protesters Was Created By a Socialist Troll on Food Stamps (stripes.com) 281

Remember that anonymous online hoaxster who urged hundreds of armed protesters to counter a non-existent flag-burning event at America's historic Civil War battefield at Gettysburg?

An investigation by the Washington Post reveals that the hoaxster had in fact been a "lifelong Democrat" before instead registering in 2015 with the Socialist Party — and that he now collects food stamps: Adam Rahuba, a former concert promoter, works part-time as a food-delivery driver and a DJ. [Alternate URL here] At 38, he spent most of the past year staying on a friend's couch in a small town north of Pittsburgh. A Washington Post investigation found that Rahuba is also the anonymous figure behind a number of social media hoaxes — the most recent played out in Gettysburg on Independence Day — that have riled far-right extremists in recent years and repeatedly duped partisan media outlets...

These false claims circulated widely on social media and on Internet message boards. They were often amplified by right-wing commentators and covered as real news by media outlets such as Breitbart News and the Gateway Pundit... They have led to highly combustible situations — attracting heavily armed militia members and far-right activists eager to protect values they think are under siege — as well as large mobilizations of police... His July 4 hoax, a purported burning of the American flag, was billed as an antifa event. Hundreds of counterprotesters, including skinheads, flocked to Gettysburg National Military Park to confront the nonexistent flag burners.

A Post examination of Rahuba's activities provides a rare inside look at the work of a homegrown troll who uses social media to stoke partisan division. It shows that in an era of heightened sensitivity about disinformation campaigns carried out by foreign nations, bad-faith actors with far fewer resources can also manipulate public discourse and affect events in the real world.... Post reporters located Rahuba last week at a friend's apartment in Harmony Township, Pa., where he acknowledged in an interview that he was behind 13 aliases and social media accounts that promoted hoaxes as far back as 2013.... A self-described democratic socialist and supporter of former presidential candidate Bernie Sanders, Rahuba said he antagonizes far-right extremists mostly for his own amusement...

"The message here was that any idiot on the Internet can get a bunch of people to show up at a Union cemetery with a bunch of Confederate flags and Nazi tattoos on their necks that just make them look foolish," he said.

The Post also reports that to deal with his July 4th hoax, "A local middle school was transformed into a makeshift command center to help coordinate the 16 federal and local law enforcement agencies monitoring the event. The state provided 100 Pennsylvania State troopers to assist, including mounted officers and a helicopter, according to Gettysburg city manager Charles Gable....

"That weekend, Rahuba said, he went camping with his girlfriend."
The Military

Twitch Tells US Army To Stop Sharing Fake Prize Giveaways That Sent Users To Recruitment Page (theverge.com) 35

Twitch has intervened to stop the US Army using fake prize giveaways on its esports channel to redirect viewers to army recruitment pages. From a report: The practice was brought to light by a report from The Nation on the use of esports as a recruitment tool by the American military. The US Army, Navy, and Air Force all field esports teams comprised of active and reserve personnel who stream on Twitch and chat with young viewers about life, video games, and the opportunities afforded by military service. "Esports is just an avenue to start a conversation," Major-General Frank Muth, head of the army's recruiting command, told ThinkTech Hawaii recently. "We go out there and we have a shared passion for esports ... and it naturally devolves into a conversation, 'What do you do?', 'I'm in the army.'"

This outreach included automated links dropped into the army's stream chat that told viewers they could win an Xbox Elite Series 2 controller in a "giveaway." But when anyone clicked the link, says The Nation, they were directed to "a recruiting form with no additional mention of a contest, odds, total number of winners, or when a drawing will occur." Viewers, streamers, and game developers reacted with anger to the news, saying that any other channel would face repercussions for such behavior. Twitch itself has now apparently forced the army to stop these giveaways, according to a report from Kotaku.

Security

Iranian Spies Accidentally Leaked Videos of Themselves Hacking (wired.com) 41

An anonymous reader quotes a report from Wired: Researchers at IBM's X-Force security team revealed today that they've obtained roughly five hours of video footage that appears to have been recorded directly from the screens of hackers working for a group IBM calls ITG18, and which other security firms refer to as APT35 or Charming Kitten. It's one of the most active state-sponsored espionage teams linked to the government of Iran. The leaked videos were found among 40 gigabytes of data that the hackers had apparently stolen from victim accounts, including U.S. and Greek military personnel. Other clues in the data suggest that the hackers targeted U.S. State Department staff and an unnamed Iranian-American philanthropist.

The IBM researchers say they found the videos exposed due to a misconfiguration of security settings on a virtual private cloud server they'd observed in previous APT35 activity. The files were all uploaded to the exposed server over a few days in May, just as IBM was monitoring the machine. The videos appear to be training demonstrations the Iran-backed hackers made to show junior team members how to handle hacked accounts. They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims. This sort of data exfiltration and management of hacked accounts is hardly sophisticated hacking. It's more the kind of labor-intensive but relatively simple work that's necessary in a large-scale phishing operation. But the videos nonetheless represent a rare artifact, showing a first-hand view of state-sponsored cyberspying that's almost never seen outside of an intelligence agency.

Government

White House Reportedly Orders Hospitals To Bypass CDC During COVID-19 Data Collection 189

The Trump administration is now ordering hospitals to send coronavirus patient data to a database in Washington, DC as part of a new initiative that may bypass the Centers for Disease Control and Prevention (CDC), according to a report from The New York Times published on Tuesday. The Verge reports: As outlined in a document (PDF) posted to the website of the Department of Health and Human Services (HHS), hospitals are being ordered to send data directly to the administration, effective tomorrow, a move that has alarmed some within the CDC, according to The Times. The database that will collect and store the information is referred to in the document as HHS Protect, which was built in part by data mining and predictive analytics firm Palantir. The Silicon Valley company is known most for its controversial contract work with the US military and other clandestine government agencies as well as for being co-founded and initially funded by Trump ally Peter Thiel.

"A unique link will be sent to the hospital points of contact. This will direct the [point of care] to a hospital-specific secure form that can then be used to enter the necessary information. After completing the fields, click submit and confirm that the form has been successfully captured," reads the HHS instructions. "A confirmation email will be sent to you from the HHS Protect System. This method replaces the emailing of individual spreadsheets previously requested." While the White House's official reasoning is that this plan will help make data collection on the spread of COVID-19 more centralized and efficient, some current and former public health officials fear the bypassing of the CDC may be an effort to politicize the findings and cut experts out of the loop with regard to federal messaging and guidelines, The Times reports.
China

China Will Sanction Lockheed Martin Over Arms Sales To Taiwan (cnn.com) 60

China said on Tuesday it would place sanctions on Lockheed Martin for its involvement in arms sales to Taiwan, a move that could further escalate tensions between Beijing and Washington. hackingbear writes: "China firmly opposes US arms sales to Taiwan," Foreign Ministry spokesman Zhao Lijian said at a press conference. Taiwan is a self-ruled island, but China has long vowed to unify it with the mainland. The United States is one of Taiwan's main arms suppliers. The US State Department last week approved a request by Taiwan to upgrade its Patriot Surface-to-Air missiles at an estimated cost of $620 million, according to Taiwan's state-run Central News Agency. In response, China is imposing "sanctions on the main contractor of this arms sale, Lockheed Martin," Zhao said, without going into detail. The United States should "stop selling arms to Taiwan and cut its military ties to Taiwan, so it won't do further harm to bilateral relations between China and the United States," he added.
Security

US Threatens To Restrict WeChat Following TikTok Backlash (techcrunch.com) 36

Amid intense scrutiny over TikTok as a potential national security risk in the U.S., WeChat, the essential tool for Chinese people's day-to-day life, is also taking heat from Washington. TechCrunch reports: White House trade advisor Peter Navarro told Fox Business on Sunday that "[TikTok] and WeChat are the biggest forms of censorship on the Chinese mainland, and so expect strong action on that." Navarro alleged that "all of the data that goes into those mobile apps that kids have so much fun with and seem so convenient, it goes right to servers in China, right to the Chinese military, the Chinese communist party, and the agencies which want to steal our intellectual property."

It's unclear how the U.S. restriction will play out, if it will at all, though some WeChat users are already speculating workarounds to stay in touch with their family and friends back home. In the case that the Tencent-owned messenger is removed by Apple App Store or Google Play, U.S.-based users could switch to another regional store to download the app. If it were an IP address ban, they could potentially access the app through virtual private networks (VPNs), tools that are familiar to many in China to access online services blocked by Beijing's Great Firewall.

The Military

The F-16's Replacement Won't Have a Pilot At All (popularmechanics.com) 206

"The next combat aircraft to enter the U.S. Air Force inventory will not be a manned sixth-generation fighter or even the Northrop Grumman B-21," reports Aviation Week.

"By fiscal 2023, the Air Force expects to deliver the first operational versions of a new unmanned aircraft system (UAS) called Skyborg, a provocative portmanteau blending the medium of flight with the contraction for a cybernetic organism." The Skyborg family of aircraft is expected to fill an emerging "attritable" category for combat aircraft that blurs the line between a reusable unmanned aircraft system and a single-use cruise missile. As the aircraft are developed, Skyborg also will serve as the test case of a radical change in acquisition philosophy, with ecosystems of collaborative software coders and aircraft manufacturers replacing the traditional approach with a supply chain defined by a single prime contractor...

At the core of the Skyborg program is the software; specifically, the military aviation equivalent of the algorithm-fed convolutional neural networks that help driverless cars navigate on city streets... The autonomy mission system core — as integrated by Leidos from a combination of industry and government sources — will be inserted into multiple low-cost UAS designed by different companies, with each configured to perform a different mission or set of missions...

"Even though we call Skyborg an attritable aircraft, I think we'll think of them more like reusable weapons," says Will Roper, assistant secretary of the Air Force for acquisition, technology and logistics.... "I expect that the pilots, depending on the mission, [will] decide: Does the Skyborg return and land with them and then go to fight another day, or is it the end of its life and it's going to go on a one-way mission?" Roper explains. In some cases, the pilot may decide a target is important enough that it is worth the loss of a Skyborg, even if its service life has not been used up, he adds.

"The Air Force's goal is to build up a large fleet of armed, sort-of disposable jets that don't need conventional runways to take off and land," reports Popular Mechanics: Skyborg will be available with both subsonic and supersonic engines, indicating both attack and fighter jet versions. The basic design (or designs) will likely be stealthy, carrying guided bombs, air defense suppression missiles, and air-to-air missiles inside internal weapons bays. Interesting, according to AvWeek, the Air Force is considering Skyborg as a replacement not only for the MQ-9 Reaper attack drone but early versions of the F-16 manned fighter....

Unmanned jets like Skyborg promise to remake the U.S. Air Force and other air forces. Manned aircraft have become increasingly large, difficult to develop, and expensive. This in turn means the Pentagon can afford fewer jets, ultimately leading to a smaller Air Force. Unmanned jets, on the other hand, are smaller, easier to develop, and cheap — allowing the Air Force to buy lots of them... The drone will grow the fighting arm of the U.S. Air Force, move air power away from air fields, fly alongside fighter jets, and escort traditionally undefended assets like the E-3 Sentry.

And it promises to do it all affordably. If the Air Force really can get Skyborg into the game by 2023 it will dramatically change the shape of aerial warfare.

Software

Indian Army Personnel Banned From Using 89 Apps (indiatoday.in) 15

schwit1 writes: Indian troops will not be allowed to use some of the world's most well-known applications. The move goes further than for civilians when the government banned 59 apps, including TikTok, from general use. According to India Today, the Indian Army on Wednesday asked its personnel to delete 89 apps from their phones, including apps such as Facebook, Truecaller, Instagram and games like PUBG. "The latest instruction comes as a bid to plug leakage of sensitive national security information from phones of armed forces personnel," the report says. "The Army has set July 15 as the deadline for the security forces personnel to remove the 89 apps from their phones."

Apps like WhatsApp, Telegram, and YouTube are O.K. as long as the personnel don't reveal their army background on the platforms.
The Military

Shock-Dissipating Fractal Cubes Could Forge High-Tech Armor (phys.org) 49

An anonymous reader quotes a report from Phys.Org: Tiny, 3-D printed cubes of plastic, with intricate fractal voids built into them, have proven to be effective at dissipating shockwaves, potentially leading to new types of lightweight armor and structural materials effective against explosions and impacts. "The goal of the work is to manipulate the wave interactions resulting from a shockwave," said Dana Dattelbaum, a scientist at Los Alamos National Laboratory and lead author on a paper to appear in the journal AIP Advances. "The guiding principles for how to do so have not been well defined, certainly less so compared to mechanical deformation of additively manufactured materials. We're defining those principles, due to advanced, mesoscale manufacturing and design."

The researchers tested their fractal structures by firing an impactor into them at approximately 670 miles per hour. The structured cubes dissipated the shocks five times better than solid cubes of the same material. Although effective, it's not clear that the fractal structure is the best shock-dissipating design. The researchers are investigating other void- or interface-based patterns in search of ideal structures to dissipate shocks. New optimization algorithms will guide their work to structures outside of those that consist of regular, repeating structures. Potential applications might include structural supports and protective layers for vehicles, helmets, or other human-wearable protection.
The research will be published in the July 2020 issue of AIP Advances.
The Military

Thousands of Contracts Highlight Quiet Ties Between Big Tech and US Military (nbcnews.com) 42

Over the past two years, thousands of tech company employees have taken a stand: they do not want their labor and technical expertise to be used for projects with the military or law enforcement agencies. Knowledge of such contracts, however, hasn't been easy for tech workers to come by. From a report: On Wednesday, newly published research from the technology accountability nonprofit Tech Inquiry revealed that the Department of Defense and federal law enforcement agencies including Immigration and Customs Enforcement, the FBI, the Drug Enforcement Agency and the Federal Bureau of Prisons, have secured thousands of deals with Google, Amazon, Microsoft, Dell, IBM, Hewlett Packard and even Facebook that have not been previously reported. The report offers a new window into the relationship between tech companies and the U.S. government, as well as an important detail about why such contracts are often difficult to find.

Tech Inquiry's research was led by Jack Poulson, a former Google research scientist who quit the company in 2018 after months of internal campaigning to get clarity about plans to deploy a censored version of its search engine in China called Project Dragonfly. Poulson has publicly opposed collaborations between American technology companies and the U.S. and foreign governments that aid in efforts to track immigrants, dissenters, and bolster military activity. Poulson analyzed more than 30 million government contracts signed or modified in the past five years. The Department of Defense and federal law enforcement agencies accounted for the largest share of those contracts, with tech companies accounting for a fraction of the total number of contracts.

Security

Body Cam with Military Police Footage Sold on Ebay (azmirror.com) 17

"A security researcher was able to access files on a Axon body-worn camera he purchased from eBay that had video files of Fort Huachuca Military Police officers conducting investigations and filling out paperwork," reports the Arizona Mirror: The files were able to be extracted after the researcher, who goes by KF on Twitter, was able to remove a microSD card from the body-worn camera. KF was then able to extract the un-encrypted files, which were not protected by a password, using a tool called Foremost. KF shared screenshots of the footage he was able to pull from the cards that appeared to show members of the Fort Huachuca Military Police entering a person's home and filling out paperwork.

"We are aware of this issue and have launched an investigation looking into the matter," a statement from Scottsdale-based Axon said to Arizona Mirror. "We are also reevaluating our processes to better emphasize proper disposal procedures for our customers."

The camera that was purchased by KF was an Axon Body 1, one of the company's earliest generation models that launched in 2013. The company said it stopped the model in 2015. "Our latest generation camera, Axon Body 3, offers enhanced security measures such as storage encryption to protect video from being retrieved from lost or improperly disposed cameras," the statement said.

Friday the original security researcher posted an update on Twitter, saying he'd offered to send the body cam's SD card back to the military police -- an offer that was eventually accepted by Axon itself -- and "I only listened to a few seconds of audio merely to verify its presence. I've since removed all extracted data in full."

In an earlier tweet he'd added, "Those of you asking... NO, I won't dump the card for you. Procure your own BWC (Body Worn Cam), and dump it yourself " But it looks like they already are. Earlier on Twitter, one Security Operations Center analyst posted, "I just ordered two myself.

"I'd actually really like to get a fund going to buy literally all of them and dump them to an open cloud storage bucket... Freedom of Information Act through the secondhand market."
Cloud

Amazon Launches Space Push To Drive Cloud-Computing Growth (wsj.com) 20

Amazon.com is boosting efforts to lure military and commercial space organizations as major users of its cloud-computing services, hoping to benefit from rising government spending and burgeoning private investment. From a report: The move by Amazon Web Services, the online retail giant's cloud-computing arm, comes during a multiyear surge in U.S. military and civilian agency spending on space projects, with NASA, the Pentagon and their largest contractors -- including Lockheed Martin -- benefiting from hefty appropriated or proposed budget increases. Lockheed Martin already is an Amazon customer. Capitol Hill is pouring billions of dollars into new boosters and the next generation of superfast missiles, driven, in part, by White House and intelligence community warnings about Chinese and Russian advances in space. Commercial companies are building or planning to deploy swarms of small satellites encircling the globe, though the Covid-19 pandemic has dimmed the immediate outlook for many private space projects.

Amazon is anticipating a huge increase in space-related cloud-computing contracts globally with a market size estimated at hundreds of billions of dollars, said Teresa Carlson, AWS's vice president in charge of public sector business. "There's a need for a more modernized approach to this industry," Ms. Carlson said. AWS will formally announce it is establishing a dedicated segment, called Aerospace and Satellite Solutions, at an online summit focused on business with the public sector on Tuesday. The group will be run by retired Air Force Maj. Gen. Clint Crosier, who, until recently, was in charge of planning to set up the Space Force, the newly created branch of the military. The initiative comes as AWS faced increased pressure from cloud-computing rivals for public sector business. Last year, AWS lost out to Microsoft in a high-profile competition to provide the Pentagon cloud-computing services. The program, known as JEDI, could be worth up to $10 billion over 10 years. Amazon has challenged the outcome.

Medicine

China Approves COVID-19 Vaccine Candidate For Military Use 113

schwit1 writes: Same vaccine being tested in Canada. But China just skipped ahead and approved it for one year for its soldiers without full long-term data. The COVID-19 vaccine (Ad5-nCoV) in question is developed by China's Academy of Military (AMS) research unit and CanSino Biologics. Clinical trials proved it was safe and showed some efficacy, according to the company.

Reuters says the company has not disclosed whether the inoculation of the vaccine candidate is mandatory or optional, citing commercial secrets. "AMS received an approval earlier this month to test its second experimental coronavirus vaccine in humans," adds Reuters.
Security

An Embattled Group of Hackers Picks Up the WikiLeaks Mantle (arstechnica.com) 74

An anonymous reader quotes a report from Ars Technica: For the past year, WikiLeaks founder Julian Assange has sat in a London jail awaiting extradition to the US. This week, the US Justice Department piled on yet more hacking conspiracy allegations against him, all related to his decade-plus at the helm of an organization that exposed reams of government and corporate secrets to the public. But in Assange's absence, another group has picked up where WikiLeaks left off -- and is also picking new fights.

For roughly the past year and a half, a small group of activists known as Distributed Denial of Secrets, or DDoSecrets, has quietly but steadily released a stream of hacked and leaked documents, from Russian oligarchs' emails to the stolen communications of Chilean military leaders to shell company databases. Late last week, the group unleashed its most high-profile leak yet: BlueLeaks, a 269-gigabyte collection of more than a million police files provided to DDoSecrets by a source aligned with the hacktivist group Anonymous, spanning emails, audio files, and interagency memos largely pulled from law enforcement "fusion centers," which serve as intelligence-sharing hubs. According to DDoSecrets, it represents the largest-ever release of hacked US police data. It may put DDoSecrets on the map as the heir to WikiLeaks' mission -- or at least the one it adhered to in its earlier, more idealistic years -- and the inheritor of its never-ending battles against critics and censors. "Our role is to archive and publish leaked and hacked data of potential public interest," writes the group's cofounder, Emma Best, a longtime transparency activist, in a text message interview with WIRED. "We want to inspire people to come forward, and release accurate information regardless of its source."

Slashdot Top Deals