Democrats

Russian Hackers Targeted California, Indiana Democratic Parties In Repeat of 2016 Attacks (reuters.com) 58

An anonymous reader quotes a report from Reuters: The group of Russian hackers accused of meddling in the 2016 U.S. presidential election earlier this year targeted the email accounts of Democratic state parties in California and Indiana, and influential think tanks in Washington and New York, according to people with knowledge of the matter. The attempted intrusions, many of which were internally flagged by Microsoft Corp over the summer, were carried out by a group often nicknamed "Fancy Bear." The hackers' activity provides insight into how Russian intelligence is targeting the United States in the run-up to the Nov. 3 election. The targets identified by Reuters, which include the Center for American Progress, the Council on Foreign Relations and the Washington-based Carnegie Endowment for International Peace, said they had not seen any evidence of successful hacking attempts.

Fancy Bear is controlled by Russia's military intelligence agency and was responsible for hacking the email accounts of Hillary Clinton's staff in the run-up to the 2016 election, according to a Department of Justice indictment filed in 2018. News of the Russian hacking activity follows last month's announcement here by Microsoft that Fancy Bear had attempted to hack more than 200 organizations, many of which the software company said were tied to the 2020 election. Microsoft was able to link this year's cyber espionage campaign to the Russian hackers through an apparent programming error that allowed the company to identify a pattern of attack unique to Fancy Bear, according to a Microsoft assessment reviewed by Reuters. The thrust of espionage operations could not be determined by Reuters. The Office of the Director of National Intelligence said in August here that Russian operations were attempting to undermine the campaign of presidential candidate Joe Biden.

China

China's Leaders Vow Tech 'Self-Reliance,' Military Power and Economic Recovery (nytimes.com) 108

An anonymous reader quotes a report from The New York Times: China's Communist Party emerged from four days of meetings behind closed doors in Beijing declaring the country's leader, Xi Jinping, a "helmsman" who would lead "the ship of socialism sailing into the wind and waves with determination." At a time when other world leaders remain consumed by the coronavirus pandemic, China promised an economic revival, greater technological self-reliance and a stronger military to protect the country's economic and political interests. The meeting underscored Mr. Xi's seemingly boundless political control, as well as his ambitions to propel China out of the current crisis into a new phase of growth, less vulnerable to external risks. Here are the main outcomes from the meeting, which outlined policy priorities for the coming years.

Economic revival: After the shock from the coronavirus crisis of the first months of this year, China's economy returned to4.9 percent growth in the July-to-September quarter, and exports have revived strongly. In its five-year plan, China aims to expand domestic markets and encourage innovation across the economy -- from cutting-edge technology to more efficient farming -- the party leaders said in an official summary of their meeting. That summary did not offer specific growth projections from 2021.

Homegrown technology: The meeting of the party's Central Committee declared that China would make enhanced technological self-reliance a priority over the next 15 years. "Insist on the core status of innovation across all of our national modernization," the leaders said. "Make technological self-sufficiency a strategic pillar of national development."

Military modernization and security: The Central Committee declared that China's military -- one of Mr. Xi's core priorities since taking office in 2012 -- had improved greatly, even as it promised to make still more "major steps" to enhance the country's security. The committee did not detail any new programs but called for "comprehensively strengthening military training and preparedness."

Security

'How 30 Lines of Code Blew Up a 27-Ton Generator' (wired.com) 110

After the U.S. unveiled charges against six members of the Sandworm unit in Russia's military intelligence agency, Wired re-visited "a secret experiment in 2007 proved that hackers could devastate power grid equipment beyond repair — with a file no bigger than a gif." It's an excerpt from the new book SANDWORM: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers which also remembers the late industrial control systems security pioneer Mike Assante: Among [Sandworm's] acts of cyberwar was an unprecedented attack on Ukraine's power grid in 2016, one that appeared designed to not merely cause a blackout, but to inflict physical damage on electric equipment. And when one cybersecurity researcher named Mike Assante dug into the details of that attack, he recognized a grid-hacking idea invented not by Russian hackers, but by the United State government, and tested a decade earlier...

[S]creens showed live footage from several angles of a massive diesel generator. The machine was the size of a school bus, a mint green, gargantuan mass of steel weighing 27 tons, about as much as an M3 Bradley tank. It sat a mile away from its audience in an electrical substation, producing enough electricity to power a hospital or a navy ship and emitting a steady roar. Waves of heat coming off its surface rippled the horizon in the video feed's image. Assante and his fellow Idaho National Laboratory researchers had bought the generator for $300,000 from an oil field in Alaska. They'd shipped it thousands of miles to the Idaho test site, an 890-square-mile piece of land where the national lab maintained a sizable power grid for testing purposes, complete with 61 miles of transmission lines and seven electrical substations. Now, if Assante had done his job properly, they were going to destroy it. And the assembled researchers planned to kill that very expensive and resilient piece of machinery not with any physical tool or weapon but with about 140 kilobytes of data, a file smaller than the average cat GIF shared today on Twitter....

Protective relays are designed to function as a safety mechanism to guard against dangerous physical conditions in electric systems. If lines overheat or a generator goes out of sync, it's those protective relays that detect the anomaly and open a circuit breaker, disconnecting the trouble spot, saving precious hardware, even preventing fires... But what if that protective relay could be paralyzed — or worse, corrupted so that it became the vehicle for an attacker's payload...?

Black chunks began to fly out of an access panel on the generator, which the researchers had left open to watch its internals. Inside, the black rubber grommet that linked the two halves of the generator's shaft was tearing itself apart. A few seconds later, the machine shook again as the protective relay code repeated its sabotage cycle, disconnecting the machine and reconnecting it out of sync. This time a cloud of gray smoke began to spill out of the generator, perhaps the result of the rubber debris burning inside it... The engineers had just proven without a doubt that hackers who attacked an electric utility could go beyond a temporary disruption of the victim's operations: They could damage its most critical equipment beyond repair...

Assante also remembers feeling something weightier in the moments after the Aurora experiment. It was a sense that, like Robert Oppenheimer watching the first atomic bomb test at another U.S. national lab six decades earlier, he was witnessing the birth of something historic and immensely powerful.

"I had a very real pit in my stomach," Assante says. "It was like a glimpse of the future."

EU

Massive Criminal Trial Begins For 'Cyberbunker' Dark Web Server (dutchnews.nl) 16

The Times of London reports: A gang of cyberexperts turned a former German military bunker into one of Europe's biggest hubs for the "dark web" and a superhighway for at least a quarter of a million offences, including drug trafficking and the falsification of identity papers, a court has been told.

Four people from the Netherlands, three Germans and a Bulgarian are accused of creating a digital safe haven in which criminals could operate with impunity.

Dutch News reports: Deals which were processed through the servers include drugs — with platforms such as Cannabis Road — which had millions of active users, the Telegraaf said on Tuesday. Other sites allowed people to order fake money and ID papers, and the bunker was also used to stage a bot attack on German telecom firm Deutsche Telekom, the paper said.

The investigation into the bunker took years of observation and phone tapping, culiminating in a raid involving 650 police officers in September 2019. .

Long-time Slashdot reader Qbertino writes: Prosecuters believe to have a case which is set to take 15 months until the end of 2021 simply due to the sheer mass of material they've gatherd to make a case. The defendants, which include adolescents at the time of crime, face up to 15 years in prison should they be convicted.
As recently as this June, the cyberbunker was still being contacted by several phishing sites, as well as thousands of bots looking for their old command and control server.
EU

EU Sanctions Russia Over 2015 German Parliament Hack (zdnet.com) 58

The European Union has imposed sanctions today against Russia for its involvement in the 2015 German Parliament (Bundestag) hack. From a report: Sanctions were levied against the GRU (Russian Main Intelligence Directorate), a military intelligence agency part of the Russian Army, and two of its officers. The two GRU officers were identified as Dmitry Badin and Igor Kostyukov. EU officials said Badin was part of a team of Russian military intelligence officers who hacked the Bundestag IT network between April and May 2015. "This cyber-attack targeted the parliament's information system and affected its operation for several days," the EU said today. "A significant amount of data was stolen and the email accounts of several MPs as well as of Chancellor Angela Merkel were affected." Kostyukov was sanctioned for his role as First Deputy Head of the GRU. EU officials said Kostyukov commands the 85th Main Centre for Special Services (GTsSS), also known as Military Unit 26165, but more commonly known in the cyber-security industry under the hacker codenames of APT28, Fancy Bear, Sofacy, or Strontium.
Google

Google AI Tech Will Be Used For Virtual Border Wall, CBP Contract Shows (theintercept.com) 76

An anonymous reader quotes a report from The Intercept: After years of backlash over controversial government work, Google technology will be used to aid the Trump administration's efforts to fortify the U.S.-Mexico border, according to documents related to a federal contract. In August, Customs and Border Protection accepted a proposal to use Google Cloud technology to facilitate the use of artificial intelligence deployed by the CBP Innovation Team, known as INVNT. Among other projects, INVNT is working on technologies for a new "virtual" wall along the southern border that combines surveillance towers and drones, blanketing an area with sensors to detect unauthorized entry into the country.

Contracting documents indicate that CBP's new work with Google is being done through a third-party federal contracting firm, Virginia-based Thundercat Technology. Thundercat is a reseller that bills itself as a premier information technology provider for federal contracts. The contract was obtained through a FOIA request filed by Tech Inquiry, a new research group that explores technology and corporate power founded by Jack Poulson, a former research scientist at Google who left the company over ethical concerns. Not only is Google becoming involved in implementing the Trump administration's border policy, the contract brings the company into the orbit of one of President Donald Trump's biggest boosters among tech executives.

Documents show that Google's technology for CBP will be used in conjunction with work done by Anduril Industries, a controversial defense technology startup founded by Palmer Luckey. The brash 28-year-old executive -- also the founder of Oculus VR, acquired by Facebook for over $2 billion in 2014 -- is an open supporter of and fundraiser for hard-line conservative politics; he has been one of the most vocal critics of Google's decision to drop its military contract. Anduril operates sentry towers along the U.S.-Mexico border that are used by CBP for surveillance and apprehension of people entering the country, streamlining the process of putting migrants in DHS custody. CBP's Autonomous Surveillance Towers program calls for automated surveillance operations "24 hours per day, 365 days per year" to help the agency "identify items of interest, such as people or vehicles." The program has been touted as a "true force multiplier for CBP, enabling Border Patrol agents to remain focused on their interdiction mission rather than operating surveillance systems." It's unclear how exactly CBP plans to use Google Cloud in conjunction with Anduril or for any of the "mission needs" alluded to in the contract document.
Google faced internal turmoil in 2018 over a contract with the Pentagon to deploy AI-enhanced drone image recognition solutions. "In response to the controversy, Google ended its involvement with the initiative, known as Project Maven, and established a new set of AI principles to govern future government contracts," notes The Intercept.
China

Sweden Bans Chinese Telecoms Huawei and ZTE From 5G Networks (axios.com) 42

Sweden banned Chinese telecom giants Huawei and ZTE from its 5G mobile networks on Tuesday, citing China's "extensive intelligence gathering and theft of technology." From a report: Since the Trump administration announced its own ban last year, the U.S. government has increasingly pressured allies to follow its lead amid growing tensions between the West and China. In July, the United Kingdom became the first European country to announce plans to exclude Huawei from its networks by 2027. The Swedish government has given telecom companies until 2025 to remove Huawei and ZTE equipment from their infrastructure. "China is one of the biggest threats to Sweden," said Klas Friberg, head of Sweden's security services. He said Beijing's "extensive intelligence gathering and theft of technology, research and development" is key to its economic and military development, according to the Financial Times. "This is what we must consider when building the 5G network of the future. We cannot compromise with Sweden's security."
Security

US Charges Russian Hackers Behind NotPetya, KillDisk, OlympicDestroyer Attacks (zdnet.com) 33

The US Department of Justice has unsealed charges today against six Russian nationals believed to be part of one of Russia's most elite and secretive hacking groups, universally known as Sandworm. From a report: US officials said all six nationals are officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the Russian Army, DOJ officials said today. Under orders from the Russian government, US officials said the six (believed to be part of a much larger group) conducted cyber-attacks on behalf of the Russian government with the intent to destabilize other countries, interfere in their internal politics, and cause havoc and monetary losses. Their attacks span the last decade and include some of the biggest cyber-attacks known to date: Ukrainian Government & Critical Infrastructure (between December 2015 to December 2016), French Elections (April and May 2017), Worldwide Businesses and Critical Infrastructure (aka NotPetya; June 2017), PyeongChang Winter Olympics Hosts, Participants, Partners, and Attendees (December 2017 through February 2018), PyeongChang Winter Olympics IT Systems (aka Olympic Destroyer; 2017 through February 2018), Novichok Poisoning Investigations (April 2018), and Georgian Companies and Government Entities (a 2018 spearphishing campaign targeting a major media company, 2019 efforts to compromise the network of Parliament, and a wide-ranging website defacement campaign in 2019.)
United States

SpaceX's First Military Contracts: One-Hour Cargo Deliveries By Rocket and Missile-Tracking Satellites (vice.com) 101

"The Pentagon is contracting Elon Musk's SpaceX to develop rockets that can deliver packages anywhere on the planet in under an hour," reports Vice: One of the things that makes the U.S. military a dominant global fighting force is its ability to move troops, weapons, and supplies quickly to where they're needed. C-17 transport planes soar across the globe delivering troops and weapons where they're needed. But America isn't making any more C-17s, so while demand for logistics in the military is up, the supply of vehicles designed to carry stuff around the planet is down. To fill the logistical gap, U.S. Transportation Command (USTRANSCOM) wants SpaceX to build rockets it can quickly fire around the globe...

The project is in the early stages and there's no telling when, or if, SpaceX will be able to move MRAPs, guns, and MREs from Fort Bragg to Djibouti in 45 minutes.

Earlier this week, the Pentagon also announced a $149 million contract with SpaceX to build four missile-tracking satellites, Vice reported: SpaceX will build and deliver four of its Starlink satellites which the Pentagon said it will fit with special sensors to allow them to track missiles, including nuke-bearing Intercontinental Ballistic Missiles and hypersonic glide vehicles....

SpaceX's four tracking satellites are a small part of a larger Pentagon plan to put hundreds of satellites in orbit over the next few years. The next layer of the system is slated for 2024 and will include several hundred more satellites in the transport layer and dozens more in the tracking layer, according to the Pentagon...

This is SpaceX's first military contract.

Security

America's 'Cyber Command' Is Trying to Disrupt the World's Largest Botnet (krebsonsecurity.com) 37

The Washington Post reports: In recent weeks, the U.S. military has mounted an operation to temporarily disrupt what is described as the world's largest botnet — one used also to drop ransomware, which officials say is one of the top threats to the 2020 election.

U.S. Cyber Command's campaign against the Trickbot botnet, an army of at least 1 million hijacked computers run by Russian-speaking criminals, is not expected to permanently dismantle the network, said four U.S. officials, who spoke on the condition of anonymity because of the matter's sensitivity. But it is one way to distract them at least for a while as they seek to restore operations.

U.S. Cyber Command also "stuffed millions of bogus records about new victims into the Trickbot database — apparently to confuse or stymie the botnet's operators," reports security researcher Brian Krebs: Alex Holden, chief information security officer and president of Milwaukee-based Hold Security, has been monitoring Trickbot activity before and after the 10-day operation. Holden said while the attack on Trickbot appears to have cut its operators off from a large number of victim computers, the bad guys still have passwords, financial data and reams of other sensitive information stolen from more than 2.7 million systems around the world. Holden said the Trickbot operators have begun rebuilding their botnet, and continue to engage in deploying ransomware at new targets. "They are running normally and their ransomware operations are pretty much back in full swing," Holden said. "They are not slowing down because they still have a great deal of stolen data."

Holden added that since news of the disruption first broke a week ago, the Russian-speaking cybercriminals behind Trickbot have been discussing how to recoup their losses, and have been toying with the idea of massively increasing the amount of money demanded from future ransomware victims.

Communications

SpaceX Starlink Aids Native American Tribe: 'It Catapulted Us Into the 21st Century' (teslarati.com) 55

Just a week after news broke that SpaceX was gifting Starlink internet service to Washington State's Emergency Management department, the state has revealed SpaceX's satellites are also benefitting the Native American Hoh Tribe. Teslarati reports: Now, with SpaceX's help and encouraged by the Washington State Military's successes, the Washington State Department of Commerce's Broadband Office has deployed Starlink terminals at the Hoh Tribe's Reserve in Forks, WA. Remote and rural, Hoh Tribe Vice Chairman Melvinjohn Ashue described trying to work with the reservation's existing communications infrastructure like "paddling up-river with a spoon" until Starlink's introduction.

Ashue was at least as effusive as [Washington State Military Department emergency telecommunications leader Richard Hall], frankly stating that "it seemed like out of nowhere, SpaceX came up and just catapulted [the Hoh Tribe] into the 21st century." They added: "Our youth are able to do education online and participate in videos. Telehealth is no longer going to be an issue, as well as telemental health. The Hoh Tribe is not alone. Many people in rural parts of [Washington] don't have high-speed internet connectivity, but we're changing that. We're helping create partnerships and find resources so every community in our state can access this critical bridge to jobs, education, healthcare and so much more."

EU

EU Lawmakers Ask Jeff Bezos Whether Amazon Spies on Politicians (theguardian.com) 49

A cross-party group of MEPs has written to Amazon's chief executive, Jeff Bezos, demanding information on the online retailer's monitoring of trade union activists and politicians in response to deleted job postings that described unions as "threats." From a report: The letter, from 37 members of the European parliament, said they were concerned Amazon deliberately targeted workers seeking to organise, and also questioned whether the company had "spied" on politicians. Trade unions last week called for a European commission investigation into whether Amazon's monitoring of workers was legal, after two job posts on the US company's website advertised "intelligence analyst" roles that referred to "labor organizing threats against the company." The advertisements, aimed at candidates with law enforcement or military experience, also mentioned the monitoring of "hostile political leaders." The posts grouped organised labour with hate groups and terrorism, two illegal activities, and listed French and Spanish language skills among the preferred qualifications, suggesting European workers could be targets. Amazon deleted the posts after Vice News first reported on them.
Microsoft

Microsoft Says Iranian Hackers Are Exploiting the Zerologon Vulnerability (zdnet.com) 29

Microsoft said on Monday that Iranian state-sponsored hackers are currently exploiting the Zerologon vulnerability in real-world hacking campaigns. From a report: Successful attacks would allow hackers to take over servers known as domain controllers (DC) that are the centerpieces of most enterprise networks and enable intruders to gain full control over their targets. The Iranian attacks were detected by Microsoft's Threat Intelligence Center (MSTIC) and have been going on for at least two weeks, the company said today in a short tweet. MSTIC linked the attacks to a group of Iranian hackers that the company tracks as MERCURY, but who are more widely known under their monicker of MuddyWatter. The group is believed to be a contractor for the Iranian government working under orders from the Islamic Revolutionary Guard Corps, Iran's primary intelligence and military service.
Security

Some Coronavirus Vaccine Trials Resort To Pen and Paper After Ransomware Hits Software (nytimes.com) 81

A software company supporting hundreds of clinical trials — including coronavirus vaccine trials — has been hit by a ransomware attack that "has slowed some of those trials over the past two weeks," reports the New York Times.

Employees "discovered that they were locked out of their data by ransomware..." eResearchTechnology (ERT) said clinical trial patients were never at risk, but customers said the attack forced trial researchers to track their patients with pen and paper. Among those hit were IQVIA, the contract research organization helping manage AstraZeneca's Covid vaccine trial, and Bristol Myers Squibb, the drugmaker leading a consortium of companies to develop a quick test for the virus. ERT has not said how many clinical trials were affected, but its software is used in drug trials across Europe, Asia and North America. It was used in three-quarters of trials that led to drug approvals by the Food and Drug Administration last year, according to its website.

On Friday, Drew Bustos, ERT's vice president of marketing, confirmed that ransomware had seized its systems on September 20. As a precaution, Mr. Bustos said, the company took its systems offline that day, called in outside cybersecurity experts and notified the Federal Bureau of Investigation. "Nobody feels great about these experiences, but this has been contained," Mr. Bustos said. He added that ERT was starting to bring its systems back online on Friday and planned to bring remaining systems online over the coming days...

One of ERT's clients, IQVIA, said it had been able to limit problems because it had backed up its data. Bristol Myers Squibb also said the impact of the attack had been limited, but other ERT customers had to move their clinical trials to move to pen and paper.

The Times notes it's just one of "more than a thousand ransomware attacks on American cities, counties and hospitals over the past 18 months." Other interesting details from the article:
  • Two companies working on a coronavirus vaccine — Pfizer and Johnson & Johnson — emphasized to the Times that they weren't affected by ERT's issues, with a Pfizer spokesperson stressing they're not even using ERT's software.

Government

Trump Goes To Hospital After Testing Positive For COVID-19 (bbc.com) 279

President Donald Trump has been flown to the hospital less than 24 hours after testing positive for COVID-19. The BBC reports: The White House said the decision to transport him to Walter Reed National Military Medical Center was taken "out of an abundance of caution." Mr Trump began exhibiting "mild symptoms" of Covid-19 on Thursday. He said early on Friday he and First Lady Melania Trump had tested positive. The White House said he was feeling "fatigued but in good spirits."

Wearing a mask and suit, Mr Trump walked out across the White House lawn on Friday afternoon to his helicopter, Marine One, for the short trip to hospital. He waved and gave a thumbs-up to reporters but said nothing before boarding the aircraft. In a video posted to Twitter, Mr Trump said: "I want to thank everybody for the tremendous support. I'm going to Walter Reed hospital. I think I'm doing very well. But we're going to make sure that things work out. The first lady is doing very well. So thank you very much, I appreciate it, I will never forget it -- thank you."

NASA

NASA Reveals How Astronauts Will Vote From Space (nasa.gov) 50

AmiMoJo writes: Americans exercise their right to vote from all over the world, and for November's election, few ballots will have traveled as far as those cast by NASA astronauts living and working aboard the International Space Station. During earlier days of human spaceflight, astronauts would only visit space for days, or maybe weeks, at a time. Today, astronauts typically stay in space for six-month missions on the space station, increasing the odds of a spacefarer off the planet during an election. So how does one vote from space? Like other forms of absentee voting, voting from space starts with a Federal Postcard Application, or FPCA. It's the same form military members and their families fill out while serving outside of the U.S. By completing it ahead of their launch, space station crew members signal their intent to participate in an election from space. Because astronauts move to Houston for their training, most opt to vote as Texas residents. Of course, NASA's astronauts come from all over, so those wishing to vote as residents of their home states can work with their counties to make special arrangements to vote from space.

Once their FPCA is approved, the astronaut is almost ready to vote. Like many great things in space, voting starts with an experiment. The county clerk who manages elections in the astronaut's home county sends a test ballot to a team at NASA's Johnson Space Center in Houston. Then they use a space station training computer to test whether they're able to fill it out and send it back to the county clerk. After a successful test, a secure electronic ballot generated by the Clerk's office of Harris County and surrounding counties in Texas, is uplinked by Johnson's Mission Control Center to the voting crew member. An e-mail with crew member-specific credentials is sent from the County Clerk to the astronaut. These credentials allow the crew member to access the secure ballot. The astronaut will then cast their vote, and the secure, completed ballot is downlinked and delivered back to the County Clerk's Office by e-mail to be officially recorded. The clerk has their own password to ensure they are the only one who can open the ballot. It's a quick process, and the astronaut must be sure to submit it by 7 p.m. local time on Election Day if voting as a Texas resident.

Will astronauts vote in this election? Expedition 63/64 crew member Kate Rubins is assigned to a six-month mission launching Oct. 14, and will vote from space. It won't be her first time -- Rubins also cast her vote from the International Space Station during the 2016 election. With a SpaceX Crew Dragon scheduled to carry three additional U.S. crew members to the space station on Oct. 31 as part of the Crew-1 mission, Mike Hopkins, Victor Glover and Shannon Walker will make it to the space station just in time to cast their ballots there, as well. All three have filled out the paperwork and are ready to do so.

Communications

Washington Emergency Responders First To Use SpaceX's Starlink Internet In the Field: 'It's Amazing' (cnbc.com) 85

The Starlink satellite internet network that SpaceX is developing has been used in the field by Washington state emergency responders in recent weeks, the first early application of the company's service to be disclosed. CNBC reports: Washington's state military, which includes its emergency response division, began employing Starlink user terminals in early August to bring internet service to areas devastated by wildfires. User terminals are the small devices on the ground that connect to the satellites. The emergency division has seven Starlink user terminals, which it is deploying with early success. "I have never set up any tactical satellite equipment that has been as quick to set up, and anywhere near as reliable" as Starlink, Richard Hall, the emergency telecommunications leader of the Washington State Military Department's IT division, told CNBC in an interview Monday.

Hall, whose division has used other satellite broadband services, said "there's really no comparison" between Starlink and traditional networks, where the satellites are farther away from the Earth in Geosynchronous or medium earth orbits. "Starlink easily doubles the bandwidth" in comparison, Hall said, noting that he's seen more than 150% decreases in latency. "I've seen lower than 30 millisecond latency consistently," he said. Hall said that, with other traditional services, it typically takes between 30 minutes to an hour to set up a satellite connection, "with a lot less speed and bandwidth and a lot higher latency in a much larger package."

By comparison, Hall emphasized that it took him between five and 10 minutes to set up and connect a Starlink terminal. And a single person can set up one of the devices: "It doesn't require a truck and a trailer and a whole lot of other additional equipment," Hall said. "I have spent the better part of four or five hours with some satellite equipment trying to get a good [connection]. So, to me, it's amazing," Hall added.

China

US-China Fight Spreads To the Chip Factory (axios.com) 62

The Trump administration's campaign against TikTok gets all the headlines, but the U.S. move last week to place restrictions on Semiconductor Manufacturing International Corp. (SMIC), China's top chipmaker, could end up making a greater difference. From a report: Semiconductor analysts say SMIC represented China's strongest bid to build a domestic chip industry and bolster its tech independence. Sanctions that cut off its access to advanced manufacturing and testing equipment from the U.S. could seriously set that effort back. The Commerce Department sent a letter Friday to U.S. semiconductor firms telling them they would need licenses to export some kinds of equipment to SMIC because anything they sold the company might be subject to "diversion to a military end use." SMIC denies any relationship with China's military.
The Military

The US Space Force Will Use Blockchain-Based Data Protection - and SpaceX's Reusable Rockets (upi.com) 43

"The service branch protecting U.S. interests outside the stratosphere may use blockchain to render its computer systems, on earth and in space, unhackable," reports CoinDesk: Last week, Xage Security won a contract from the United States Space Force to develop and roll out a blockchain-based data protection system across its networks. Called the Xage Security Fabric, the blockchain verifies data and protects the network from third party intervention, so confidential data sent from satellites to earth isn't intercepted en-route.

It also ensures security remains consistent across the entire United States Space Force network, preventing hackers and other malicious entities from identifying and exploiting any weak spots.

And UPI reports: The U.S. Space Force will start to fly missions on reused SpaceX rockets next year to save millions of dollars, the service announced Friday.

The Space Force will fly two GPS satellites into orbit on a Falcon 9 first-stage booster. The lower cost that SpaceX charges for reused rockets will save taxpayers $52.7 million, a statement from the military branch said... Gwynne Shotwell, SpaceX's president and chief operating officer, said in a news release that the company was pleased the Space Force saw "the benefits of the technology."

Communications

The Short Weird Life -- and Potential Afterlife -- of Quantum Radar (sciencemag.org) 66

sciencehabit writes: A mini-arms race is unfolding in the supposed field of quantum radar, spurred by press reports in 2016 that China had built one -- potentially threatening the ability of stealthy military aircraft to hide from conventional radars. Governments around the world have tasked physicists to look into the idea. Whereas a conventional radar searches for objects by detecting pulse of microwaves reflected from them, quantum radar would utilize pulses of microwaves linked by a quantum connection called entanglement. The system would retain one pulse and measure it in concert with the one reflected from the object. Correlations between the two would make it easier to spot an object through the glare of the surroundings. Or so researchers hoped. Groups have demonstrated elements of a quantum radar, but only in limited experiments that a nonquantum system can still match. And fundamental physical limits suggest the scheme can't beat ordinary radar for long-range detection. Even one of the inventors of the basic concept thinks it won't work when applied to radar.

Slashdot Top Deals