Encryption

Feds Bust Alaska Man With 10,000+ CSAM Images Despite His Many Encrypted Apps (arstechnica.com) 209

A recent indictment (PDF) of an Alaska man stands out due to the sophisticated use of multiple encrypted communication tools, privacy-focused apps, and dark web technology. "I've never seen anyone who, when arrested, had three Samsung Galaxy phones filled with 'tens of thousands of videos and images' depicting CSAM, all of it hidden behind a secrecy-focused, password-protected app called 'Calculator Photo Vault,'" writes Ars Technica's Nate Anderson. "Nor have I seen anyone arrested for CSAM having used all of the following: [Potato Chat, Enigma, nandbox, Telegram, TOR, Mega NZ, and web-based generative AI tools/chatbots]." An anonymous reader shares the report: According to the government, Seth Herrera not only used all of these tools to store and download CSAM, but he also created his own -- and in two disturbing varieties. First, he allegedly recorded nude minor children himself and later "zoomed in on and enhanced those images using AI-powered technology." Secondly, he took this imagery he had created and then "turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see." In other words, he created fake AI CSAM -- but using imagery of real kids.

The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have "created his own public Telegram group to store his CSAM." He also joined "multiple CSAM-related Enigma groups" and frequented dark websites with taglines like "The Only Child Porn Site you need!" Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera "was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices."

The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the "I'll hide it behind an encrypted app that looks like a calculator!" technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly "admitted to seeing CSAM online for the past year and a half" in an interview with the feds.

United States

Appliance and Tractor Companies Lobby Against Giving the Military the Right to Repair (404media.co) 142

Device manufacturers across multiple industries are lobbying against proposed legislation that would require military contractors to provide the U.S. military with easier access to repair materials and information, according to a document obtained by 404 Media.

The legislation, Section 828 of the Defense Reauthorization Act, aims to address the military's current inability to repair equipment ranging from fighter jets to Navy battleships without relying on contractors. Sen. Elizabeth Warren highlighted the issue in a May hearing, citing examples of how repair restrictions lead to increased costs and operational delays for the Department of Defense.

The lobbying effort extends beyond military contractors to include organizations representing industries such as irrigation equipment, motorcycles, tractors, plumbing, medical devices, and consumer technology. In a letter to lawmakers, these groups argue that the legislation would impose significant burdens on contractors and undermine existing technical data rights statutes.
The Military

The US Military's Latest Psyop? Advertising on Tinder (techcrunch.com) 54

An anonymous reader shares a report: The U.S. military is using ads to warn people across Lebanon not to attack the United States or its allies amid rising tensions across the Middle East. Some of those ads have turned up in an unlikely place: the dating app Tinder. Freelance reporter Seamus Malekafzali posted on X screenshots of the ads seen in the Tinder app, warning residents of Lebanon to "not take up arms."

The ads, written in Arabic, say that the U.S. will "protect its partners in the face of threats from the Iranian regime and its proxies," which operate across the region, referring to groups like Hezbollah located in Lebanon. The ads, which are not clandestine in nature, display the logo of U.S. Central Command and link to a tweet featuring F-16 and A10 fighter jets. These kinds of military psychological operations (or psyops), aimed at influencing the views of a target audience or population, are not new, even if their placement on a dating app is raising eyebrows in the military community, the Washington Post reported Tuesday.

The Military

Telegram CEO Pavel Durov's Arrest Upends Kremlin Military Communications (politico.eu) 107

Telegram founder and CEO Pavel Durov was arrested Saturday night by French authorities on allegations that his social media platform was being used for child pornography, drug trafficking and organized crime. The move sparked debate over free speech worldwide from prominent anti-censorship figures including Elon Musk, Robert F. Kennedy. Jr. and Edward Snowden. However, "the immediate freakout came from Russia," reports Politico. "That's because Telegram is widely used by the Russian military for battlefield communications thanks to problems with rolling out its own secure comms system. It's also the primary vehicle for pro-war military bloggers and media -- as well as millions of ordinary Russians." From the report: "They practically detained the head of communication of the Russian army," Russian military blogger channel Povernutie na Z Voine said in a Telegram statement. The blog site Dva Mayora said that Russian specialists are working on an alternative to Telegram, but that the Russian army's Main Communications Directorate has "not shown any real interest" in getting such a system to Russian troops. The site said Durov's arrest may actually speed up the development of an independent comms system. Alarmed Russian policymakers are calling for Durov's release.

"[Durov's] arrest may have political grounds and be a tool for gaining access to the personal information of Telegram users," the Deputy Speaker of the Russian Duma Vladislav Davankov said in a Telegram statement. "This cannot be allowed. If the French authorities refuse to release Pavel Durov from custody, I propose making every effort to move him to the UAE or the Russian Federation. With his consent, of course." Their worry is that Durov may hand over encryption keys to the French authorities, allowing access to the platform and any communications that users thought was encrypted.

French President Emmanuel Macron said Monday that the arrest of Durov was "in no way a political decision." The Russian embassy has demanded that it get access to Durov, but the Kremlin has so far not issued a statement on the arrest. "Before saying anything, we should wait for the situation to become clearer," said Kremlin spokesperson Dmitry Peskov. However, officials and law enforcement agencies were instructed to clear all their communication from Telegram, the pro-Kremlin channel Baza reported. "Everyone who is used to using the platform for sensitive conversations/conversations should delete those conversations right now and not do it again," Kremlin propagandist Margarita Simonyan said in a Telegram post. "Durov has been shut down to get the keys. And he's going to give them."

Sci-Fi

Netflix Shares First Six Minutes of New Anime Series 'Terminator Zero' (netflix.com) 66

"It's going to be violent," warns the creator of Terminator Zero, an eight-episode anime series premiering Thursday August 29th on Netflix. "It's going to be dark, it's going to be horrific, and it's going to be arresting."

And the Netflix blog has now shared the first six minutes online: In the world of Terminator, the future is never set, yet some things are guaranteed: The Terminator is still a cyborg that feels no remorse, pity, or fear. The anime series TERMINATOR ZERO, landing on Netflix on Aug. 29 — known to fans as Judgment Day — looks different from any incarnation of the Terminator franchise we've seen before, but you can tell from these opening six minutes that the brutal, sophisticated action will remain.

"I realized the first minutes of the show have to declare what it is," creator and executive producer Mattson Tomlin tells Tudum. A joint production between Skydance and the Japanese animation studio Production I.G, TERMINATOR ZERO has the challenge of drawing in both anime fans and fans of the Terminator series. "The way to do that was to have a sequence that had no dialogue, that was really planting a flag in letting everybody know this is going to be violent, it's going to be dark, it's going to be action-driven, it's going to be horrific, and it's going to be arresting," says Tomlin, who previously wrote Project Power for Netflix and is currently writing The Batman Part II. "That's just what it has to be."

The series follows "a new batch of characters who live in Japan in 1997," writes CBR — and in an interview the show's director said "There's a balance" when representing Japan's actual culture while keeping the show futuristic: One of the things that I really took for granted was guns. [Points to self] Dumb American over here had to write a scene where Eiko gets into a parking lot and smashes the window of a car, goes to the glove box, takes out a revolver, and it instantly gets flagged. [Other people working on the series] were like, "No, we don't have guns. What you are describing, that's over there. We're over here in civilization where that can't happen." That triggered a really fruitful and creatively challenging discussion about weapons. The military has guns and the police have guns. That's kind of it. So these characters have to arm themselves. How are they going to do it? What could we do? And that's why the Terminator has a crossbow. Eiko has all of these different weapons that she concocted from a hardware store. It was all born out of that.
Security

'Invasive' Iranian Intelligence Group Believed to Be The Ones Who Breached Trump's Campaign (reuters.com) 98

Reuters reports that the Iranian hacking team which compromised the campaign of U.S. presidential candidate Donald Trump "is known for placing surveillance software on the mobile phones of its victims, enabling them to record calls, steal texts and silently turn on cameras and microphones, according to researchers and experts who follow the group." Known as APT42 or CharmingKitten by the cybersecurity research community, the accused Iranian hackers are widely believed to be associated with an intelligence division inside Iran's military, known as the Intelligence Organization of the Islamic Revolutionary Guard Corps or IRGC-IO. Their appearance in the U.S. election is noteworthy, sources told Reuters, because of their invasive espionage approach against high-value targets in Washington and Israel. "What makes (APT42) incredibly dangerous is this idea that they are an organization that has a history of physically targeting people of interest," said John Hultquist, chief analyst with U.S. cybersecurity firm Mandiant, who referenced past research that found the group surveilling the cell phones of Iranian activists and protesters... Hultquist said the hackers commonly use mobile malware that allows them to "record phone calls, room audio recordings, pilfer SMS (text) inboxes, take images off of a machine," and gather geolocation data...

APT42 also commonly impersonates journalists and Washington think tanks in complex, email-based social engineering operations that aim to lure their targeting into opening booby-trapped messages, which let them takeover systems. The group's "credential phishing campaigns are highly targeted and well-researched; the group typically targets a small number of individuals," said Josh Miller, a threat analyst with email security company Proofpoint. They often target anti-Iran activists, reporters with access to sources inside Iran, Middle Eastern academics and foreign-policy advisers. This has included the hacking of western government officials and American defense contractors. For example, in 2018, the hackers targeted nuclear workers and U.S. Treasury department officials around the time the United States formally withdrew from the Joint Comprehensive Plan of Action (JCPOA), said Allison Wikoff, a senior cyber intelligence analyst with professional services company PricewaterhouseCoopers.

"APT42 is still actively targeting campaign officials and former Trump administration figures critical of Iran, according to a blog post by Google's cybersecurity research team."
Earth

Megatsunami Risk On the Rise As Glacial Melt Drives Landslides (theguardian.com) 50

An anonymous reader quotes a report from The Guardian: Just under a year ago, the east coast of Greenland was hit by a megatsunami. Triggered by a large landslide entering the uninhabited Dickson Fjord, the resulting tsunami was 200 meters high -- equivalent to more than 40 double-decker buses. Luckily no one was hurt, though a military base was obliterated. Now analysis of the seismic data associated with the event has revealed that the tsunami was followed by a standing wave, which continued to slosh back and forth within the narrow fjord for many days.

Angela Carrillo Ponce from the German Research Centre for Geosciences in Potsdam, analyzed the seismic data, recorded at earthquake monitoring stations more than 3,000 miles (5,000km) away, and found signals persisting long after the 16 September 2023 landslide event. Using satellite images and computer modeling, Ponce and her colleagues were able to confirm the presence of a standing wave of about 1 meter in height which lasted for more than a week.

Their findings, published in The Seismic Record, warn that climate change is accelerating the melt of Greenland's glaciers and permafrost, increasing the chance of landslides and subsequent megatsunamis. Smaller events have been observed a number of times in recent years, such as the rock avalanche into western Greenland's Karrat Fjord in 2017, which triggered a tsunami that flooded the village of Nuugaatsiaq, destroying 11 houses and killing four people.

The Military

Workers at Google DeepMind Push Company to Drop Military Contracts (time.com) 143

Nearly 200 Google DeepMind workers signed a letter urging Google to cease its military contracts, expressing concerns that the AI technology they develop is being used in warfare, which they believe violates Google's own AI ethics principles. "The letter is a sign of a growing dispute within Google between at least some workers in its AI division -- which has pledged to never work on military technology -- and its Cloud business, which has contracts to sell Google services, including AI developed inside DeepMind, to several governments and militaries including those of Israel and the United States," reports TIME Magazine. "The signatures represent some 5% of DeepMind's overall headcount -- a small portion to be sure, but a significant level of worker unease for an industry where top machine learning talent is in high demand." From the report: The DeepMind letter, dated May 16 of this year, begins by stating that workers are "concerned by recent reports of Google's contracts with military organizations." It does not refer to any specific militaries by name -- saying "we emphasize that this letter is not about the geopolitics of any particular conflict." But it links out to an April report in TIME which revealed that Google has a direct contract to supply cloud computing and AI services to the Israeli Military Defense, under a wider contract with Israel called Project Nimbus. The letter also links to other stories alleging that the Israeli military uses AI to carry out mass surveillance and target selection for its bombing campaign in Gaza, and that Israeli weapons firms are required by the government to buy cloud services from Google and Amazon.

"Any involvement with military and weapon manufacturing impacts our position as leaders in ethical and responsible AI, and goes against our mission statement and stated AI Principles," the letter that circulated inside Google DeepMind says. (Those principles state the company will not pursue applications of AI that are likely to cause "overall harm," contribute to weapons or other technologies whose "principal purpose or implementation" is to cause injury, or build technologies "whose purpose contravenes widely accepted principles of international law and human rights.") The letter says its signatories are concerned with "ensuring that Google's AI Principles are upheld," and adds: "We believe [DeepMind's] leadership shares our concerns." [...]

The letter calls on DeepMind's leaders to investigate allegations that militaries and weapons manufacturers are Google Cloud users; terminate access to DeepMind technology for military users; and set up a new governance body responsible for preventing DeepMind technology from being used by military clients in the future. Three months on from the letter's circulation, Google has done none of those things, according to four people with knowledge of the matter. "We have received no meaningful response from leadership," one said, "and we are growing increasingly frustrated."

Games

'Civilization 7 Captures the Chaos of Human History In Manageable Doses' (theguardian.com) 62

An anonymous reader quotes a report from The Guardian, written by Julian Benson: It's been eight years since Civilization 6 -- the most recent in a very long-running strategy game series that sees you take a nation from the prehistoric settlement of their first town through centuries of development until they reach the space age. Since 2016 it has amassed an abundance of expansions, scenario packs, new nations, modes and systems for players to master -- but series producer Dennis Shirk at Firaxis Games feels that enough it enough. "It was getting too big for its britches," he says. "It was time to make something new."

"It's tough to even get through the whole game," designer Ed Beach says, singling out the key problem that Firaxis aims to solve with the forthcoming Civilization 7. While the early turns of a campaign in Civilization 6 can be swift, when you're only deciding the actions for the population of a single town, "the number of systems, units, and entities you must manage explodes after a while," Beach says. From turn one to victory, a single campaign can take more than 20 hours, and if you start falling behind other nations, it can be tempting to restart long before you see the endgame. That's why Civilization 7's campaign has been split into three ages -- Antiquity, Exploration and Modern -- with each ending in a dramatic explosion of global crises. "Breaking the game into chapters lets people get through history in a more digestible fashion," Beach says.

When you start a new campaign, you pick a leader and civilization to govern, and direct your people in establishing their first settlements and encounters with the other peoples populating a largely undeveloped land. You'll choose the technologies they research, the expansions they make to their cities, and whom they try to befriend or conquer. Every turn you complete or scientific, economic, cultural and military milestone you pass adds points to a meter running in the background. Once that meter hits 200, you and all the other surviving civilizations on the map will transition into the next age. When moving from Antiquity to Exploration and later Exploration to Modern, you select a new civilization to lead. You'll retain all the cities you controlled before but have access to different technologies and attributes. This may seem strange, but it's built to reflect history: think of London, which was once run by the Romans before being supplanted by the Anglo-Saxons. No empire lasts for ever, but they don't all collapse, either.

Breaking Civilization 7 into chapters also gives campaigns a new rhythm. As you approach the end of an age, you'll begin to face global crises. In Antiquity, for instance, you can see a proliferation of independent powers similar to the tribes that tore down Rome. "We're not calling them barbarians any more," Beach says. "It's a more nuanced way to present them." These crises multiply and strengthen until you reach the next age. "It's like a sci-fi or fantasy series with a huge, crazy conclusion, and then the next book starts nice and calm," Beach says. "There's a point where getting to the next age is a relief."
Here's a round-up of thoughts on Civilization 7 from some of the most respected gaming outlets and reviewers:

Civilization VII hands-on: This strategy sequel rethinks the long game -- Ars Technica's Samuel Axon
Civilization 7 pairs seismic changes with a lovably familiar formula -- Eurogamer's Chris Tapsell
Civilization 7 hands-on: Huge changes are coming to the classic strategy series - PC Gamer's Tyler Wilde
Civilization 7 lets you mix and match history -- and it's a blast - The Verge's Ash Parrish
Civilization 7 Hands-On Preview: Creating Your Legacy - Game Rant's Joshua Duckworth
Sid Meier's Civilization VII preview -- possibly the freshest sequel yet - GamesHub's Jam Walker
How Civilization 7 Rethinks The Series' Structure - GameSpot's Steve Watts
The Military

To Best China, Pentagon Must Shed 'the Same Old Mindsets' (axios.com) 38

An anonymous reader shares a report: Pentagon officials say the U.S. stands at the precipice of a new golden age of defense innovation driven by upstart contractors, advances in technology and a world brimming with threats. The Defense Department's inability to make unorthodox bets, feed a vibrant industrial base and embrace readily available technologies has rendered it under-supplied, the target of dual-use evangelists and vulnerable to more nimble adversaries.

Deputy Defense Secretary Kathleen Hicks said in a speech last week the department "cannot tolerate the same old mindsets" as it butts heads with Russia and China, while also invoking America's mass production overhaul during World War II. Heidi Shyu, the Pentagon's chief tech officer, separately called the clip of "nontraditional, venture-backed companies" entering the defense industry "unprecedented," adding: "They're nipping at the heels, I tell you. I have traditional defense contractors say, 'Hey, this isn't fair.'"

Defense Innovation Unit director Doug Beck said the department is at a "positive tipping point." "We've been given the tools, and now it's about execution and delivery," Beck said. "I think we're well on our way out of the dark age." Hicks' declaration comes one year after she stuck her neck out for Replicator, meant to arm troops with thousands of drones and prove the Pentagon can be agile. That $1 billion gambit is on track, with more than 1,000 AeroVironment-made Switchblade 600 drones already in the pipeline, according to officials.

Power

Fire Damages Russian-Occupied Nuclear Plant in Ukraine (theguardian.com) 249

The Guardian reports Sunday, Ukraine's president, Volodymyr Zelenskiy, highlighted that Russian forces appeared to have started a fire in one of the cooling towers of the Zaporizhzhia nuclear power plant that it has occupied since the early days of the war. "Radiation levels are within norm," Zelenskiy said before accusing Russia of using its control of the site, whose six reactors are in shutdown mode, "to blackmail Ukraine, all of Europe, and the world". A Ukrainian official in Nikopol, the nearest town across the river Dnipro from the nuclear plant, added that according to "unofficial information", the fire was caused by setting fire to "a large number of automobile tyres" in a cooling tower. Video and pictures showed smoke dramatically billowing from one of the towers, although experts said they are not in use while the reactor is in shutdown mode, prompting some to question whether it was a way of trying raise the stakes over Ukraine's incursion into Russia.
From the CBC: The Russian management of the facility said emergency workers had contained the fire and that there was no threat of it spreading further. "The fire did not affect the operation of the station," it said. The six reactors at the plant located close to the front line of the war in Ukraine are not in operation but the facility relies on external power to keep its nuclear material cool and prevent a catastrophic accident. Moscow and Kyiv have routinely accused each other of endangering safety around it.
Japan

Survivors of the Atomic Bomb Attack on Hiroshima Struggle - and Speak (nytimes.com) 231

"Not many Americans have August 6 circled on their calendars," writes the New York Times, "but it's a day that the Japanese can't forget."

79 years after an atomic bomb attack on Hiroshima, the Times visits a hospital that "continues to treat, on average, 180 survivors — known as hibakusha — of the blasts each day." The bombs killed an estimated 200,000 men, women and children and maimed countless more. In Hiroshima 50,000 of the city's 76,000 buildings were completely destroyed. In Nagasaki nearly all homes within a mile and a half of the blast were wiped out. In both cities the bombs wrecked hospitals and schools. Urban infrastructure collapsed...

[T]he hibakusha and their offspring have formed the backbone of atomic memory. Many see their life's work as informing the wider world about what it's like to carry the trauma, stigma and survivor's guilt caused by the bombs, so that nuclear weapons may never be used again. Their urgency to do so has only increased in recent years. With an average age of 85, the hibakusha are dying by the hundreds each month — just as the world is entering a new nuclear age. Countries like the United States, China and Russia are spending trillions of dollars to modernize their stockpiles. Many of the safeguards that once lowered nuclear risk are unraveling, and the diplomacy needed to restore them is not happening. The threat of another blast can't be relegated to history...

Kunihiko Sakuma [who was 9 months old the day of the attack]: "People died or got sick not just right after the bombing. The reality is, their symptoms are emerging even today, 79 years later. I thought all this was in the past. But as I started talking to survivors, I realized their suffering was ongoing. The atomic bomb is such an inhumane weapon, and the effects of radiation stay with survivors for a very long time. That's why they need our continued support."

The article includes this quote from Keiko Ogura, who was 8 years old at the time of the attack — and still worries she hasn't done enough to abolish the use of nuclear weapons: "As survivors, we cannot do anything but tell our story. 'For we shall not repeat the evil' — this is the pledge of survivors. Until we die, we want to tell our story, because it's difficult to imagine."

Many of the stories are horrifying. But I'll note this one by Seiichiro Mise — who on the day of the atomic bomb attack was 10 years old: "I got married in 1964. At the time, people would say that if you married an atomic bomb survivor, any kids you had would be deformed.

"Two years later, I got a call from the hospital saying my baby had been born. But on my way, my heart was troubled. I'm an atomic bomb victim. I experienced that black rain. So I felt anguished. Usually new parents simply ask the doctor, 'Is it a boy or girl?' I didn't even ask that. Instead, I asked, 'Does my baby have 10 fingers and 10 toes?'

"The doctor looked unsettled. But then he smiled and said it was a healthy boy. I was relieved."

The first U.S. president to visit Hiroshima was Barack Obama in 2016. The article notes he did not issue the official apology many Japanese had hoped for. But he did say "we have a shared responsibility to look directly into the eye of history and ask what we must do differently to curb such suffering again...

"Someday the voices of the hibakusha will no longer be with us to bear witness. But the memory of the morning of Aug. 6, 1945, must never fade."
Government

How America's FBI Sabotaged Tech-Stealing Spies from the USSR (politico.com) 27

FBI agent Rick Smith remembered seeing that Austrian-born Silicon Valley entrepreneur one year earlier — walking into San Francisco's Soviet Consulate in the early 1980s. Their chance reunion at a bar "would sow the seeds for a major counterintelligence campaign," writes a national security journalist in Politico, describing the collaboration as "an FBI-led operation that sold the Soviet Bloc millions in secretly sabotaged U.S. hi-tech."

The Austrian was already selling American tech goods to European countries, and "By the early 1980s, the FBI knew the Soviet Union was desperate for cutting-edge American technology, like the U.S.-produced microchips then revolutionizing a vast array of digital devices, including military systems..." Moscow's spies worked assiduously to steal such dual use tech or purchase it covertly. The Soviet Union's ballistic missile programs, air defense systems, electronic spying platforms, and even space shuttles, depended on it.... But such tech-focused sanctions-evasion schemes by America's foes offer opportunities for U.S. intelligence, too — including the opportunity to launch ultra-secret sabotage campaigns to alter sensitive technologies before they reach their final destination... Working under the FBI's direction, the Austrian agreed to pose as a crook, a man willing to sell prohibited technology to the communist Eastern Bloc... [T]he FBI and the Austrian would seed faulty tech to Moscow and its allies; drain the Soviet Bloc's coffers; expose its intelligence officers and secret American conspirators; and reveal to American counterspies exactly what tech the Soviets were after...

[T]he Soviet Bloc would unknowingly purchase millions of dollars' worth of sabotaged U.S. goods. Communist spies, ignorant that they were being played, would be feted with a literal parade in a Warsaw Pact capital for their success in purchasing this forbidden technology from the West... The Austrian's connections now presented a major opportunity. The Bulgarians, and their East German and Russia allies, were going to get that forbidden tech. But not before the FBI tampered with it first...

Some of the tech was subtly altered before the Bulgarians could get their hands on it. Some was rendered completely unusable. Some of it was shipped unadulterated to keep the operation humming — and allay any suspicions from the Eastern Bloc about what might be going on. And some of it never made its way to the Bulgarians at all. In one case, the bureau intercepted a $400,000 order of computer hardware from the San Jose-based firm Proquip and shipped out 6,000 pounds of sandbags instead.... Some suffered what appeared to be "accidental" wear-and-tear during the long journey to the Eastern Bloc, recalled Ed Appel [a former senior FBI official]. Other times, the FBI would tamper with the electronics so they would experience "chance" voltage overloads once Soviet Bloc operatives plugged them in. The sabotage could also be more subtle, designed to degrade machine parts or microchips over time, or to render hi-tech tools that required intense precision slightly, if imperceptibly, inaccurate.

The article concludes that "While the Soviet Union might have imploded over three decades ago... Russia's intelligence services are still scouring the globe for prohibited U.S. tech, particularly since Moscow's February 2022 invasion of Ukraine...

"Russia has reportedly even covertly imported household items like refrigerators and washing machines to rip out the microchips within them for use in military equipment."
Space

China's Long March 6A Rocket Is Making a Mess In Low-Earth Orbit. (arstechnica.com) 34

Longtime Slashdot reader schwit1 shares a report from Ars Technica: The upper stage from a Chinese rocket that launched a batch of Internet satellites Tuesday has broken apart in space, creating a debris field of at least 700 objects in one of the most heavily-trafficked zones in low-Earth orbit. US Space Command, which tracks objects in orbit with a network of radars and optical sensors, confirmed the rocket breakup Thursday. Space Command initially said the event created more than 300 pieces of trackable debris. The military's ground-based radars are capable of tracking objects larger than 10 centimeters (4 inches). Later Thursday, LeoLabs, a commercial space situational awareness company, said its radars detected at least 700 objects attributed to the Chinese rocket. The number of debris fragments could rise to more than 900, LeoLabs said. The culprit is the second stage of China's Long March 6A rocket, which lifted off Tuesday with the first batch of 18 satellites for a planned Chinese megaconstellation that could eventually number thousands of spacecraft. The Long March 6A's second stage apparently disintegrated after placing its payload of 18 satellites into a polar orbit.

Space Command said in a statement it has "observed no immediate threats" and "continues to conduct routine conjunction assessments to support the safety and sustainability of the space domain." According to LeoLabs, radar data indicated the rocket broke apart at an altitude of 503 miles (810 kilometers) at approximately 4:10 pm EDT (20:10 UTC) on Tuesday, around 13-and-a-half hours after it lifted off from northern China. At this altitude, it will take decades or centuries for the wispy effect of aerodynamic drag to pull the debris back into the atmosphere. As the objects drift lower, their orbits will cross paths with SpaceX's Starlink Internet satellites, the International Space Station and other crew spacecraft, and thousands more pieces of orbital debris, putting commercial and government satellites at risk of collision.

Power

DARPA Wants To Bypass the Thermal Middleman In Nuclear Power Systems (ans.org) 45

The Defense Advanced Research Projects Agency (DARPA) is exploring the possibility of directly converting radiation from nuclear reactors into electricity using radiovoltaics, a technology that could potentially revolutionize nuclear power generation by moving beyond traditional steam turbine methods. The agency is requesting information and suggestions on this topic in an RFI released on August 1st. Nuclear News reports: There's got to be a better way": Methods to convert the energy of nuclear fission reactions and the decay of radioisotopes into electricity have not evolved since the invention of radioisotope power systems and fission reactors over 70 years ago and remain unoptimized," the RFI says. They rely on thermal heat transfer, and "in each step of this indirect conversion method neutrons, heat, and energy are lost to the shielding material, working fluid, and other system materials." Advanced reactor designs that use alternative coolants, including helium, sodium, and salts, would still use what DARPA calls "heritage nuclear power conversion technology" with water and steam as the working fluids, as would the fusion power plants being planned today.

Why now? Tabitha Dodson, the program manager for DARPA DSO, which is launching the RFI, told Nuclear News that "two big things" are driving the interest. "One is the extreme surge of investment in small and advanced nuclear technologies, such as in fusion and space reactors, which do not have a concurrent pairing of advanced power generation methods that doesn't involve liquid-based heat transfer," she said. "Next, there has been an order of magnitude improvement in radiation tolerance and efficiency for voltaics in recent years with encouraging performance that indicates radiovoltaics could scale up as an array usable in nuclear reactors." [...]

What is the ask?: The RFI asks: "Is it possible to achieve [a] direct energy conversion nuclear power system, ranging in power from 10s of watts electric (We) to 100s of kWe?" DARPA wants information "on the potential to improve specific power greater than 1 We/kg conversion from watts-thermal per radiation emission product," and information on the potential to improve damage tolerance of the voltaic to nuclear radiation to reach an operating lifetime comparable to the life of its nuclear source, on the scale of decades. "We will learn what our boundary conditions are when respondents tell us what technologies in the field of voltaics are possible, and we'll use that to see if there is sufficient scientific rationale make a case to present for further DARPA investment," Dodson said. "I also hope people are going to start thinking about nuclear systems that use electromagnetic versus thermal-kinetic methods to harvest nuclear energetic reactions."

Security

USPS Text Scammers Duped His Wife, So He Hacked Their Operation (wired.com) 61

Security researcher Grant Smith uncovered a large-scale smishing scam where scammers posing as the USPS tricked victims into providing their credit card details through fake websites. Smith hacked into the scammers' systems, gathered evidence, and collaborated with the USPS and a US bank to protect over 438,000 unique credit cards from fraudulent activity. Wired reports: The flood of text messages started arriving early this year. They carried a similar thrust: The United States Postal Service is trying to deliver a parcel but needs more details, including your credit card number. All the messages pointed to websites where the information could be entered. Like thousands of others, security researcher Grant Smith got a USPS package message. Many of his friends had received similar texts. A couple of days earlier, he says, his wife called him and said she'd inadvertently entered her credit card details. With little going on after the holidays, Smith began a mission: Hunt down the scammers. Over the course of a few weeks, Smith tracked down the Chinese-language group behind the mass-smishing campaign, hacked into their systems, collected evidence of their activities, and started a months-long process of gathering victim data and handing it to USPS investigators and a US bank, allowing people's cards to be protected from fraudulent activity.

In total, people entered 438,669 unique credit cards into 1,133 domains used by the scammers, says Smith, a red team engineer and the founder of offensive cybersecurity firm Phantom Security. Many people entered multiple cards each, he says. More than 50,000 email addresses were logged, including hundreds of university email addresses and 20 military or government email domains. The victims were spread across the United States -- California, the state with the most, had 141,000 entries -- with more than 1.2 million pieces of information being entered in total. "This shows the mass scale of the problem," says Smith, who is presenting his findings at the Defcon security conference this weekend and previously published some details of the work. But the scale of the scamming is likely to be much larger, Smith says, as he didn't manage to track down all of the fraudulent USPS websites, and the group behind the efforts have been linked to similar scams in at least half a dozen other countries.

The Military

Palantir CTO Urges Pentagon To Prioritize Speed in Defense Spending (axios.com) 43

Palantir Chief Technology Officer Shyam Sankar has called for faster defense spending, arguing the Pentagon should focus on rapid deployment over higher budgets. "The biggest challenge is speed," Sankar told Axios in an interview. "The Department of Defense would be better off spending half as much money twice as quickly."

The U.S. military has "lost our ability to value time," he said. The Denver-based software company, known for its work in areas ranging from vaccine logistics to Ukraine demining efforts, has positioned itself as a "software prime" in the defense sector.
Security

North Korean Hackers Are Stealing Military Secrets, Say US and Allies (scmp.com) 59

North Korean hackers have conducted a global cyber espionage campaign to try to steal classified military secrets to support Pyongyang's banned nuclear weapons programme, the United States, Britain and South Korea said in a joint advisory on Thursday. From a report: The hackers, dubbed Anadriel or APT45 by cybersecurity researchers, have targeted or breached computer systems at a broad variety of defence or engineering firms, including manufacturers of tanks, submarines, naval vessels, fighter aircraft, and missile and radar systems, the advisory said. "The authoring agencies believe the group and the cyber techniques remain an ongoing threat to various industry sectors worldwide, including but not limited to entities in their respective countries, as well as in Japan and India," the advisory said.

It was co-authored by the U.S. Federal Bureau of Investigation (FBI), the U.S. National Security Agency (NSA) and cyber agencies, Britain's National Cyber Security Centre (NCSC), and South Korea's National Intelligence Service (NIS). "The global cyber espionage operation that we have exposed today shows the lengths that DPRK state-sponsored actors are willing to go to pursue their military and nuclear programmes," said Paul Chichester at the NCSC, a part of Britain's GCHQ spy agency. The FBI also issued an arrest warrant for one of the alleged North Korean hackers, and offered a reward of up to $10 million for information that would lead to his arrest. He was charged with hacking and money laundering, according to a poster uploaded to the FBI's Most Wanted website on Thursday.

ISS

Russia Announces It Will Create Core of New Space Station By 2030 (reuters.com) 99

"Despite its domestic space program faltering even before sanctions due to its invasion of Ukraine, and at least one very public failure on a less ambitious project, Russia has announced it will begin construction of a Russian-only replacement for the ISS and place it in a more difficult-to-access polar orbit," writes longtime Slashdot reader Baron_Yam. "Russia is motivated by military and political demands to achieve this, but whether it has the means or not seems uncertain at best." Reuters reports: Russia is aiming to create the four-module core of its planned new orbital space station by 2030, its Roscosmos space agency said on Tuesday. The head of Roscosmos, Yuri Borisov, signed off on the timetable with the directors of 19 enterprises involved in creating the new station. The agency confirmed plans to launch an initial scientific and energy module in 2027. It said three more modules would be added by 2030 and a further two between 2031 and 2033. [...]

Apart from the design and manufacture of the modules, Roscomos said the schedule approved by Borisov includes flight-testing a new-generation crewed spacecraft and building rockets and ground-based infrastructure. The new station will enable Russia to "solve problems of scientific and technological development, national economy and national security that are not available on the Russian segment of the ISS due to technological limitations and the terms of international agreements," it said.

The Courts

Lawsuit: T-Mobile Must Pay For Breaking Lifetime Price Guarantee (arstechnica.com) 30

An anonymous reader quotes a report from Ars Technica: Angry T-Mobile customers have filed a class action lawsuit over the carrier's decision to raise prices on plans that were advertised as having a lifetime price guarantee. "Based upon T-Mobile's representations that the rates offered with respect to certain plans were guaranteed to last for life or as long as the customer wanted to remain with that plan, each Plaintiff and the Class Members agreed to these plans for wireless cellphone service from T-Mobile," said the complaint (PDF) filed in US District Court for the District of New Jersey. "However, in May 2024, T-Mobile unilaterally did away with these legacy phone plans and switched Plaintiffs and the Class to more expensive plans without their consent."

The complaint, filed on July 12, has four named plaintiffs who live in New Jersey, Georgia, Nevada, and Pennsylvania. They are seeking to represent a class of all US residents "who entered into a T-Mobile One Plan, Simple Choice plan, Magenta, Magenta Max, Magenta 55+, Magenta Amplified or Magenta Military Plan with T-Mobile which included a promised lifetime price guarantee but had their price increased without their consent and in violation of the promises made by T-Mobile and relied upon by Plaintiffs and the proposed class." The complaint seeks "restitution of all amounts obtained by Defendant as a result of its violation," plus interest. It also seeks statutory and punitive damages, and an injunction to prevent further "wrongful, unlawful, fraudulent, deceptive, and unfair conduct."
The report notes that the lawsuit centers around T-Mobile's broken "Un-contract" promise made in January 2017, which assured customers that their T-Mobile One plan prices would never increase unless they decided to change their plans. Despite the guarantee, T-Mobile included a significant caveat in a FAQ on its website, stating they would only cover the final month's bill if the price was raised and the customer decided to cancel. Many customers missed this caveat, leading to confusion and frustration when prices were later hiked.

The lawsuit also addresses the transition from the "Un-contract" to a new "Price Lock" guarantee, which initially offered more protection but was later weakened, causing further dissatisfaction. The FCC said it has received around 1,600 complaints regarding these price hikes by late June.

Slashdot Top Deals