News

'High Risk of Biological Hazard' In Sudan After Fighters Seize Biolab, WHO Says (vice.com) 50

The World Health Organization (WHO) said there's a "high risk of biological hazard" in Khartoum, the capitol of Sudan, after a biolab containing deadly pathogens was seized by fighters. From a report: There's a war in Sudan right now as two rival generals struggle for power. After a week of fighting, one of the factions has seized the National Public Health Laboratory which contains samples of measles, cholera, polio, and other diseases. Now, lab workers are unable to return to the facility and secure the hazardous materials. "This is the main concern: no accessibility to the lab technicians to go to the lab and safely contain the biological material and substances available," Nima Saeed Abid, the WHO's representative in Sudan, told reporters on Tuesday.

According to the lab's website, it contains "reference laboratories related to the control of some diseases such as polio, measles, tuberculosis, malaria and AIDS." The lab is engaged in various aspects of studying and controlling diseases, including identifying pathogens, testing for them, and sending samples to international labs. The work is aimed at preventing and identifying possible epidemics, and the lab works with the WHO. The fighting in Sudan has already killed 459 people and injured 4,072, and the release of a deadly pathogen would lead to more suffering. The fighting is between generals Abdel Fattah Burhan and Mohammed Hamdan Dagalo. Burhan is the head of the country's military and Dagalo is the leader of a paramilitary group called the Rapid Support Forces. The RSF got its start as a Janjaweed militia, an Arab fighting group that operated in Darfur.

United States

US Department of Homeland Security is Now Studying How to Make Use of AI (cnbc.com) 59

America's Department of Homeland Security "will establish a new task force to examine how the government can use artificial intelligence technology to protect the country," reports CNBC.

The task force was announcement by department secretary Alejandro Mayorkas Friday during a speech at a Council on Foreign Relations event: "Our department will lead in the responsible use of AI to secure the homeland," Mayorkas said, while also pledging to defend "against the malicious use of this transformational technology." He added, "As we do this, we will ensure that our use of AI is rigorously tested to avoid bias and disparate impact and is clearly explainable to the people we serve...."

Mayorkas gave two examples of how the task force will help determine how AI could be used to fine-tune the agency's work. One is to deploy AI into DHS systems that screen cargo for goods produced by forced labor. The second is to use the technology to better detect fentanyl in shipments to the U.S., as well as identifying and stopping the flow of "precursor chemicals" used to produce the dangerous drug.

Mayorkas asked Homeland Security Advisory Council Co-Chair Jamie Gorelick to study "the intersection of AI and homeland security and deliver findings that will help guide our use of it and defense against it."

The article also notes that earlier this week America's defense department hired a former Google AI cloud director to serve as its first advisor on AI, robotics, cloud computing and data analytics.
The Military

Leaker of US Documents Shared More Secrets Earlier in a Discord Group with 600 Members (japantimes.co.jp) 119

Remember that U.S. Air National Guardsman who's suspected of leaking classified documents? The New York Times has discovered "a previously undisclosed chat group on Discord" where the same airman apparently also posted "sensitive information" including "secret intelligence on the Russian war effort," this time to a group with 600 members — and "months earlier than previously known," in February of 2022. The case against Airman Teixeira, 21, who was arrested on April 13, pertains to the leaking of classified documents on another Discord group of about 50 members, called Thug Shaker Central. There, he began posting sensitive information in October 2022, members of the group told The Times. His job as an information technology specialist at an Air Force base in Massachusetts gave him top secret clearance... The user claimed to be posting information from the National Security Agency, the Central Intelligence Agency and other intelligence agencies.

The additional information raises questions about why authorities did not discover the leaks sooner, particularly since hundreds more people would have been able to see the posts... The exposure of some of America's most closely guarded secrets has prompted criticism about how the Pentagon and intelligence agencies protect classified data, and whether there are weaknesses in both vetting people for security clearances and enforcing the mantra that access to secrets should only be given to people with a "need to know."

Unlike Thug Shaker Central, the second chat room was publicly listed on a YouTube channel and was easily accessed in seconds... Apparently eager to impress others in the group who questioned his analysis, he said: "I have a little more than open source info. Perks of being in a USAF intel unit," referring to the United States Air Force... At times, he appeared to be posting from the military base where he was stationed... Airman Teixeira also claimed that he was actively combing classified computer networks for material on the Ukraine war.

When one of the Discord users urged him not to abuse his access to classified intelligence, Teixeira replied: "too late...."

The Times says they learned about the larger chat room "from another Discord user."
Communications

China Building Cyberweapons To Hijack Enemy Satellites, Says US Leak (arstechnica.com) 38

An anonymous reader quotes a report from Ars Technica: China is building sophisticated cyber weapons to "seize control" of enemy satellites, rendering them useless for data signals or surveillance during wartime, according to a leaked US intelligence report. The US assesses that China's push to develop capabilities to "deny, exploit or hijack" enemy satellites is a core part of its goal to control information, which Beijing considers to be a key "war-fighting domain." The CIA-marked document, which was issued this year and has been reviewed by the Financial Times, was one of dozens allegedly shared by a 21-year-old US Air Guardsman in the most significant American intelligence disclosures in more than a decade. A cyber capability of this nature would far exceed anything Russia has deployed in Ukraine, where electronic warfare teams have taken a brute-force approach with little effect.

These attacks, first developed in the 1980s, attempt to drown out signals between low-orbit SpaceX satellites and their on-ground terminals by broadcasting on similar frequencies from truck-borne jamming systems such as the Tirada-2. China's more ambitious cyber attacks aim to mimic the signals that enemy satellites receive from their operators, tricking them into either being taken over completely or malfunctioning during crucial moments in combat. The classified US document said this cyber capability would allow China "to seize control of a satellite, rendering it ineffective to support communications, weapons, or intelligence, surveillance, and reconnaissance systems." The US has never disclosed whether it has similar capabilities.

Taiwan, which has taken note of how indispensable satellite communications have been to the Ukrainian military, is seeking to build out communications infrastructure that can survive an attack from China. It is courting investors to establish its own satellite provider, while experimenting with non-geostationary satellite receivers in 700 locations around Taiwan to guarantee bandwidth in the event of war or disasters, the Financial Times reported in January. China's goals, according to the leaked assessment, [...] would seek to knock out the ability of satellites -- which tend to operate in interconnected clusters -- to communicate with each other, to relay signals and orders to weapons systems, or to send back visual and intercepted electronic data, according to experts.
"China understands the superiority that the United States has in the space and cyber domains, so they are very interested in not only improving their own capabilities but in capitalizing on what we refer to as a first-mover advantage in both domains," said Moore, now a visiting professor at Vanderbilt University in Tennessee.

"They are working on all the capabilities that they want to have from a defensive and offensive standpoint, and from an ISR [intelligence, surveillance, and reconnaissance] standpoint. They're firing on all cylinders," he said.
United States

A Tech Industry Pioneer Sees a Way for the US To Lead in Advanced Chips (nytimes.com) 17

Ivan Sutherland played a key role in foundational computer technologies. Now he sees a path for America to claim the mantle in "superconducting" chips. From a report: It has been six decades since Ivan Sutherland created Sketchpad, a software system that foretold the future of interactive and graphical computing. In the 1970s, he played a role in rallying the computer industry to build a new type of microchip with hundreds of thousands of circuits that would become the foundation of today's semiconductor industry. Now Dr. Sutherland, who is 84, believes the United States is failing at a crucial time to consider alternative chip-making technologies that would allow the country to reclaim the lead in building the most advanced computers.

By relying on supercooled electronic circuits that switch without electrical resistance and as a consequence generate no excess heat at higher speeds, computer designers will be able to circumvent the greatest technological barrier to faster machines, he claims. "The nation that best seizes the superconducting digital circuit opportunity will enjoy computing superiority for decades to come," he and a colleague recently wrote in an essay that circulated among technologists and government officials. Dr. Sutherland's insights are significant partly because decades ago he was instrumental in helping to create today's dominant approach to making computer chips.

In the 1970s, Dr. Sutherland, who was chairman of the computer science department at the California Institute of Technology, and his brother Bert Sutherland, then a research manager at a division of Xerox called the Palo Alto Research Center, introduced the computer scientist Lynn Conway to the physicist Carver Mead. They pioneered a design based on a type of transistor, known as complementary metal-oxide semiconductor, or CMOS, which was invented in the United States. It made it possible to manufacture the microchips used by personal computers, video games and the vast array of business, consumer and military products. Now Dr. Sutherland is arguing that an alternative technology that predates CMOS, and has had many false starts, should be given another look. Superconducting electronics was pioneered at the Massachusetts Institute of Technology in the 1950s and then pursued by IBM in the 1970s before being largely abandoned. At one point, it even made an odd international detour before returning to the United States.

Social Networks

Leaked Documents Show Russians Boasted Just 1% of Fake Social Profiles are Detected (msn.com) 69

"The Russian government has become far more successful at manipulating social media and search engine rankings than previously known," reports the Washington Post, "boosting lies about Ukraine's military and the side effects of vaccines with hundreds of thousands of fake online accounts, according to documents recently leaked on the chat app Discord.

"The Russian operators of those accounts boast that they are detected by social networks only about 1 percent of the time, one document says." That claim, described here for the first time, drew alarm from former government officials and experts inside and outside social media companies contacted for this article. "Google and Meta and others are trying to stop this, and Russia is trying to get better. The figure that you are citing suggests that Russia is winning," said Thomas Rid, a disinformation scholar and professor at Johns Hopkins University's School of Advanced International Studies. He added that the 1 percent claim was likely exaggerated or misleading.

The undated analysis of Russia's effectiveness at boosting propaganda on Twitter, YouTube, TikTok, Telegram and other social media platforms cites activity in late 2022 and was apparently presented to U.S. military leaders in recent months. It is part of a trove of documents circulated in a Discord chatroom and obtained by The Washington Post. Air National Guard technician Jack Teixeira was charged Friday with taking and transmitting the classified papers, charges for which he faces 15 years in prison...

Many of the 10 current and former intelligence and tech safety specialists interviewed for this article cautioned that the Russian agency whose claims helped form the basis for the leaked document may have exaggerated its success rate.

The leaked document was apparently prepared by the Joint Chiefs of Staff, U.S. Cyber Command and Europe Command, which directs American military activities in Europe. "It refers to signals intelligence, which includes eavesdropping, but does not cite sources for its conclusions," the Post reports, describing the document as offering "a rare candid assessment by U.S. intelligence of Russian disinformation operations."

The assessment concludes that foreign bots "view, 'like,' subscribe and repost content and manipulate view counts to move content up in search results and recommendation lists." And the document says a Russian center's disinformation network — working directly for Russia's presidential administration — was still working on improvements as recently as late 2022 and expected to improve its ability to "promote pro-Russian narratives abroad." After Russia's 2016 efforts to interfere in the U.S. presidential election, social media companies stepped up their attempts to verify users, including through phone numbers. Russia responded, in at least one case, by buying SIM cards in bulk, which worked until companies spotted the pattern, employees said. The Russians have now turned to front companies that can acquire less detectable phone numbers, the document says.

A separate top-secret document from the same Discord trove summarized six specific influence campaigns that were operational or planned for later this year by a new Russian organization, the Center for Special Operations in Cyberspace. The new group is mainly targeting Ukraine's regional allies, that document said. Those campaigns included one designed to spread the idea that U.S. officials were hiding vaccine side effects, intended to stoke divisions in the West.

China

New Leaked Documents on Discord Reveal More Chinese Spy Balloons (msn.com) 43

The Washington Post found a new tranche of "top-secret intelligence documents" on Discord, and based on them reported Friday that U.S. intelligence agencies were aware of at least two additional Chinese spy balloons.

Based on the classified documents, the Post also reports that "questions lingered about the true capabilities of the one that flew over the continental United States in January and February." The Chinese spy balloon that flew over the United States this year, called Killeen-23 by U.S. intelligence agencies, carried a raft of sensors and antennas the U.S. government still had not identified more than a week after shooting it down, according to a document allegedly leaked to a Discord chatroom by Jack Teixeira, a member of the Massachusetts Air National Guard.

Another balloon flew over a U.S. carrier strike group in a previously unreported incident, and a third crashed in the South China Sea, a second top-secret document stated, though it did not provide specific information for launch dates.... [Chinese spy balloon] Bulger-21 carried sophisticated surveillance equipment and circumnavigated the globe from December 2021 until May 2022, the NGA document states. Accardo-21 carried similar equipment as well as a "foil-lined gimbaled" sensor, it says....

Annotating what appear to be detailed photos of the balloon that flew over the United States, presumably taken from a U-2 spy plane, intelligence analysts assessed that it could generate enough power to operate "any" surveillance and reconnaissance technology, including a type of radar that can see at night and through clouds and thin materials [including tarps].... China's military has operated a vast surveillance balloon project for several years, partly out of Hainan province off China's south coast, U.S. officials have previously told The Post.

But the NGA document is notable as much for what it doesn't say, reflecting the government's possible lack of insight, at least in mid-February, into the balloons' capabilities... The lack of detailed conclusions about the balloon's surveillance capabilities raises questions about the decision to let it fly over the United States before shooting it down, an action the Defense Department justified at the time as an opportunity to collect additional intelligence.

The Post also reports that another leaked document (relying on intercepted communications) assessed that within the Chinese military the balloon surveillance program lacked "strong leadership" oversight.
Sci-Fi

Pentagon Official Floats a Theory For Unexplained Sightings: Alien Motherships (politico.com) 118

The official in charge of a secretive Pentagon effort to investigate unexplained aerial incursions has co-authored an academic paper that presents an out-of-this-world theory: Recent objects could actually be alien probes from a mothership sent to study Earth. Politico reports: In a draft paper dated March 7 (PDF), Sean Kirkpatrick, head of the Pentagon's All-domain Anomaly Resolution Office, and Harvard professor Avi Loeb teamed up to write that the objects, which appear to defy all physics, could be "probes" from an extraterrestrial "parent craft." It's unusual for government officials, especially those involved in the nascent effort to collect intelligence on recent sightings, to discuss the possibility of extraterrestrial life, although top agency officials don't rule it out when asked. After Loeb posted it online, the paper gained notoriety from a post on Military Times and has also circulated among science-focused news outlets.

More than half of the five-page paper is devoted to discussing the possibility that the unexplained objects DoD is studying could be the "probes" in the mothership scenario, including most of the page-long introduction. One section is titled: "The Extraterrestrial Possibility" and another "Propulsion Methods." Kirkpatrick's involvement in the academic paper demonstrates that the Pentagon is open to scientific debate of the origins of UFOs, an important signal to send to the academic world, experts said. But they add that his decision to attach his name to a theory considered in most academic circles to be highly unsubstantiated also raises questions about AARO's credibility.

The paper explains that interstellar objects such as the cigar-shaped "Oumuamua" that scientists spotted flying through the galaxy in 2017 "could potentially be a parent craft that releases many small probes during its close passage to Earth." The paper goes on to compare the probes to "dandelion seeds" that could be separated from the parent craft by the sun's gravitational force. It examines the physics of how the smaller craft could move through the Earth's atmosphere to reach the surface, where they could be spotted by humans. The paper notes that the "probes" could use starlight to "charge their batteries" and the Earth's water as fuel. It also speculates on the motive for aliens to send exploratory probes to Earth. "What would be the overarching purpose of the journey? In analogy with actual dandelion seeds, the probes could propagate the blueprint of their senders," the authors write. "As with biological seeds, the raw materials on the planet's surface could also be used by them as nutrients for self-replication or simply scientific exploration."

The Military

Leader of Online Group Where Secret Documents Leaked Is Air National Guardsman (nytimes.com) 182

An anonymous reader quotes a report from the New York Times: The leader of a small online gaming chat group where a trove of classified U.S. intelligence documents leaked over the last few months is a 21-year-old member of the intelligence wing of the Massachusetts Air National Guard, according to interviews and documents reviewed by The New York Times. The National Guardsman, whose name is Jack Teixeira, oversaw a private online group called Thug Shaker Central, where about 20 to 30 people, mostly young men and teenagers, came together over a shared love of guns, racist online memes and video games. On Thursday afternoon, about a half-dozen F.B.I. agents pushed into a residence in North Dighton, Mass. Attorney General Merrick B. Garland later said in a short statement that Airman Teixeira had been arrested "without incident." Federal investigators had been searching for days for the person who leaked the top secret documents online.

Starting months ago, one of the users uploaded hundreds of pages of intelligence briefings into the small chat group, lecturing its members, who had bonded during the isolation of the pandemic, on the importance of staying abreast of world events. [...] The Times spoke with four members of Thug Shaker Central, one of whom said he had known the person who leaked for at least three years, had met him in person and referred to him as the O.G. The friends described him as older than most of the group members, who were in their teens, and the undisputed leader. One of the friends said the O.G. had access to intelligence documents through his job. While the gaming friends would not identify the group's leader by name, a trail of digital evidence compiled by The Times leads to Airman Teixeira. The Times has been able to link Airman Teixeira to other members of Thug Shaker Central through his online gaming profile and other records. Details of the interior of Airman Teixeira's childhood home -- posted on social media in family photographs -- also match details on the margins of some of the photographs of the leaked secret documents.

Members of Thug Shaker Central who spoke to The Times said that the documents they discussed online were meant to be purely informative. While many pertained to the war in Ukraine, the members said they took no side in the conflict. The documents, they said, started to get wider attention only when one of the teenage members of the group took a few dozen of them and posted them to a public online forum. From there they were picked up by Russian-language Telegram channels and then The Times, which first reported on them. The person who leaked, they said, was no whistle-blower, and the secret documents were never meant to leave their small corner of the internet. "This guy was a Christian, antiwar, just wanted to inform some of his friends about what's going on," said one of the person's friends from the community, a 17-year-old recent high school graduate. "We have some people in our group who are in Ukraine. We like fighting games; we like war games."

Democrats

Ukrainian Hackers Compromised Russian Spy Who Hacked Democrats In 2016 (reuters.com) 72

An anonymous reader quotes a report from Reuters: Ukrainian hackers claim to have broken into the emails of a senior Russian military spy wanted by the Federal Bureau of Investigation for hacking the Hillary Clinton campaign and other senior U.S. Democrats ahead of Donald Trump's election to the presidency in 2016. In a message posted to Telegram on Monday, a group calling itself Cyber Resistance said it had stolen correspondence from Lt. Col. Sergey Morgachev, who was charged in 2018 with helping organize the hack and leak of emails from the Democratic National Committee (DNC) and the Clinton campaign.

InformNapalm said in an article about the breach that it had confirmed Morgachev's identity by poring through personnel files and a curriculum vitae stolen by the hackers, including one document that identified him as a department head in Unit 26165 -- the same position which the FBI accused him of holding in 2018. [...] It wasn't immediately clear what information the hackers had managed to steal or how significant it was. Morgachev's inbox could potentially hold insight into Russia's hacking operations, including the operation against Clinton and the Democrats.

In its indictment, the FBI described him as an officer in the Russia's military spy agency, still known by its old acronym, GRU. It said his department was "dedicated to developing and managing malware," including the "X-Agent" spy software used to hack the DNC. In its message announcing the theft, the group said of Morgachev: "A very cool and clever hacker, but ... We hacked him."

Role Playing (Games)

Leaked Classified Documents Also Include Roleplaying Game Character Stats (vice.com) 59

An anonymous reader quotes a report from Motherboard: Over the past month, classified Pentagon documents have circulated on 4chan, Telegram, and various Discord servers. The documents contain daily intelligence briefings, sensitive information about Ukrainian military positions, and a handwritten character sheet for a table-top roleplaying game. No one knows who leaked the Pentagon documents or how. They appeared online as photographs of printed pages, implying someone printed them out and removed them from a secure location, similar to how NSA translator Reality Winner leaked documents. The earliest documents Motherboard has seen are dated February 23, though the New York Times and Bellingcat reported that some are dated as early as January. According to Bellingcat, the earliest known instances of the leaks appearing online can be traced back to a Discord server.

At some point, a Discord user uploaded a zip file of 32 images from the leak onto a Minecraft Discord server. Included in this pack alongside highly sensitive, Top Secret and other classified documents about the Pentagon's strategy and assessment of the war in Ukraine, was a handwritten piece of paper that appeared to be a character sheet for a roleplaying game. It's written on a standard piece of notebook paper, three holes punched out on the side, blue lines crisscrossing the page. The character's name is Doctor "Izmer Trotzky," his character class is "Professor Scientist." They've got a strength of 5, a charisma of 4, and 19 rubles to their name. Doctor Trotzky has 10 points in first aid and occult skills, and 24 in spot hidden. He's carrying a magnifying glass, a fountain pen, a sword cane, and a deringer. [...]

But what game is it from? Motherboard reached out to game designer Jacqueline Bryk to find out. Bryk is an award-winning designer of roleplaying games who has worked on Kult: Divinity Lost, Changeling: the Lost, Fading Suns: Pax Alexius, and Vampire: the Masquerade. "I strongly suspect this is Call Of Cthulhu," Bryk said when first looking at the sheet. Call of Cthulhu (COC) is an RPG based on the work of H.P. Lovecraft where players attempt to stave off madness while investigating eldritch horrors. "This is a pretty classic Professor build. The sword cane really clinches it for me. I notice he's currently carrying a derringer and a dagger but took no points in firearms or fighting. I'm not sure which edition this is but it seems like the most he could do with his weapons is throw them."
"After some research, Bryk concluded that the game is a homebrewed combination of COC and the Fallout tabletop game based on the popular video game franchise," adds Motherboard. "My best guest here is Fallout: Cthulhu the Homebrew," Bryk said, giving the home designed game a name.
The Military

Better Electronic Sensors Mean Militaries Need Better Camouflage (livemint.com) 72

Long-time Slashdot reader SpzToid shares a new report from the Economist: Thanks to innovations such as fractal colouration patterns, which mimic nature by repeating shapes at different scales, the distance from which naked eyes can quickly spot soldiers wearing the best camouflage has shrunk, by one reckoning, by a fifth over the past two decades. That is impressive. On today's battlefields, however, it is no longer enough to merely hide from human eyes.

People and kit are given away as well by signals beyond the visual spectrum, and devices that detect these wavelengths are getting better, lighter and cheaper. Thermal sensors are a case in point. Today, one that costs about $1,000 and weighs as little as five sachets of sugar can, in good weather, detect a warm vehicle as far off as 10km. As Hans Kariis, deputy head of signatures research at the Swedish Defence Research Agency, notes, that is well beyond the range at which a small drone would be spotted. Two decades ago, he adds, a less sensitive thermal sensor weighing a kilogram cost ten times as much.

And then there's automatic target-detection software, the article points out, like the Kestrel software deployed in more than 3,500 aircraft around the world, which "scans feeds of visual, infrared and radar data, and places red boxes around people and other potential targets, even as their positions in the frame move." And the threat has only increased with the arrival of satellite-based synthetic-aperture-radar (SAR) imagery.

But then the article lists examples of new camouflage that now tricks electronic sensors:
  • Military vehicles affix hexagon-shaped sheets that can be cooled with electricity to blend into the temperature of their surroundings.
  • Camouflage netting that absorbs (some) incoming radar beams with semi-conducting polymers while reducing heat signatures with insulation — and reflecting back the cooler temperature of the ground.
  • Netherlands-based TNO makes "battery-powered sniper suits" embedded with 500 LEDs that match the luminosity and color of the surroundings using real-time data from a helmet camera.

Communications

How Much Data Did the Chinese Spy Balloon Collect? (nbcnews.com) 50

Long-time Slashdot reader schwit1 shared this report from NBC News: The Chinese spy balloon that flew across the U.S. was able to gather intelligence from several sensitive American military sites, despite the Biden administration's efforts to block it from doing so, according to two current senior U.S. officials and one former senior administration official. China was able to control the balloon so it could make multiple passes over some of the sites (at times flying figure-eight formations) and transmit the information it collected back to Beijing in real time, the three officials said.

The intelligence China collected was mostly from electronic signals, which can be picked up from weapons systems or include communications from base personnel, rather than images, the officials said. The three officials said China could have gathered much more intelligence from sensitive sites if not for the administration's efforts to move around potential targets and obscure the balloon's ability to pick up their electronic signals by stopping them from broadcasting or emitting signals.

America's Department of Defense "directed NBC News to comments senior officials made in February that the balloon had 'limited additive value' for intelligence collection by the Chinese government 'over and above what [China] is likely able to collect through things like satellites in low earth orbit.'"
United States

Classified US Documents Leaked on 4chan, Telegram, Discord, and Twitter (msn.com) 133

America's Department of Justice just launched an investigation into the leaking of classified documents from the U.S. Department of Defense, reports the Washington Post.

"On Wednesday, images showing some of the documents began circulating on the anonymous online message board 4chan and made their way to at least two mainstream social media platforms, Telegram and Twitter." Earlier Friday, The Washington Post obtained dozens of what appeared to be photographs showing classified documents, dating to late February and early March, that range from worldwide intelligence briefings to tactical-level battlefield updates and assessments of Ukraine's defense capabilities. They outline information about the Ukrainian and Russian militaries, and include highly sensitive U.S. analyses about China and other nations. The materials also reference highly classified sources and methods that the United States uses to collect such information, alarming U.S. national security officials who have seen them.... The material that appeared online includes photographs of documents labeled "Secret" or "Top Secret," and began appearing on Discord, a chat platform popular with gamers, according to a Post review.

In some cases, it appears that the slides were manipulated. For instance, one image features combat casualty data suggesting the number of Russian soldiers killed in the war is far below what the Pentagon publicly has assessed. Another version of the image showed higher Russian casualty figures. Besides the information on casualties that appeared to be manipulated to benefit the Russian government, U.S. officials who spoke to The Post said many of the leaked documents did not appear to be forged and looked consistent in format with CIA World Intelligence Review reports distributed at high levels within the White House, Pentagon and the State Department....

The documents appear to have been drawn from multiple reports and agencies, and concern matters other than Ukraine. Two pages, for example, are purportedly a "CIA Operations Center Intelligence Update," and includes information about events concerning Russia, Hungary and Iran.... Rachel E. VanLandingham, a former Air Force attorney and expert on military law, said that whoever is responsible for the leak "is in a world of hurt." Such breaches, she said, constitute "one of the most serious crimes that exist regarding U.S. national security...."

Skepticism abounded Friday among both Russian and Ukrainian officials aware of reports about the leaks, with each side accusing the other of being involved in a deliberate act of disinformation.

The Post notes one defense official told them "hundreds — if not thousands" of people had access to the documents, so their source "could be anyone."

But the photographs received by the Post were apparently taken from printed documents, and "classified documents may only be printed from computers in a secure facility, and each transaction is electronically logged, said Glenn Gerstell, a former general counsel with the National Security Agency who emphasized that he was speaking only about general procedures. "The fact that the documents were printed out should significantly narrow the universe of the initial inquiry."
China

US Military Prepares for Space Warfare As Potential Threats Grow From China (wsj.com) 52

America's Department of Defense "is gearing up for a future conflict in space," reports the Wall Street Journal, "as China and Russia deploy missiles and lasers that can take out satellites and disrupt military and civilian communications." The White House this month proposed a $30 billion annual budget for the U.S. Space Force, almost $4 billion more than last year and a bigger jump than for other services including the Air Force and the Navy.... A key aim of a stand-alone force was to plan, equip and defend U.S. interests in space for all of the services and focus attention on the emerging threats. For the first time, the spending request also includes plans for simulators and other equipment to train Guardians, as Space Force members are known, for potential battle....

Just as it is on Earth, China is the Pentagon's big worry in space. In unveiling a defense strategy late last year, the Biden administration cast China as the greatest danger to U.S. security. In space, the threats from China range from ground-launched missiles or lasers that could destroy or disable U.S. satellites, to jamming and other cyber interference and attacks in space, said Pentagon officials. China has invested heavily in its space program, with a crewed orbiting station, developing ground-based missiles and lasers as well as more surveillance capabilities. This is part of its broader military aims of denying adversaries access to space-based assets.

China is "testing on-orbit satellite systems which could be weaponized as they have already shown the capability to physically control and move other satellites," Gen. Chance Saltzman, chief of space operations for the U.S. Space Force, told a congressional hearing this month. "There's nothing we can do in space that's of any value if the networks that process the information and data are vulnerable to attack," Gen. Saltzman said. A central part of the Space Force's next tranche of military contracts for rocket launches is protecting them from attacks by China and other adversaries. The hope is to make satellites tougher to approach by adversaries' equipment as well as less susceptible to lasers and jamming from space or the ground, said Space Force leaders.

The article also notes the US Defense Department "is moving away from a small number of school bus-size satellites to a planned constellation of hundreds of smaller ones.

"The larger number of targets makes any one satellite less crucial to the network but also requires changes in the capabilities of the satellites themselves, the rockets that put them into orbit and the communications systems they host."
Crime

Truck Thief Gunned Down by Owner After AirTag Gives Away Location (appleinsider.com) 497

"A Texas truck theft ended in gun fire after the suspected thief was tracked down by thevehicle's owner's AirTag," reports AppleInsider: San Antonio police received a stolen vehicle report at around 1 pm from a Braesview home. However, before police could recover the stolen truck, the owners of the vehicle decided to perform their own investigation, using an AirTag left in the truck to do so. The unnamed owners tracked the truck to a shopping center in Southeast Military Drive, reports KSAT. However, rather than wait for police to arrive, the truck owners decided to approach the vehicle and confront the suspect.

While it is unknown exactly what happened, Police say it seems the suspected thief may have pulled out their own firearm. The vehicle owner responded by shooting and killing the suspect while they were inside the truck. It is unclear whether the vehicle owner will face charges over the matter, and an investigation is ongoing into whether the suspect actually had a weapon in the first place.

The San Antonio police department's public information officer offered these remarks (in a video from KSAT):

"Most importantly is, to the public, SAPD is urging you if you are to get your vehicle stolen: I know that it's frustrating, but please do not take matters into your own hands like this. Our police department has plenty of resources that could go into finding your vehicle, i.e. our drone system, trackers ourselves, very good patrolmen that look for these kind of things. It's never safe to take matters into your own hands, as you can see today by this incident.... That's why I urge the public, wait for police in this matter. Let us go with you. We have the training. We know exactly how to determine what's going to happen, these kind of factors and situations, and we know how to handle them."
China

China's Chip Industry Will Be 'Reborn' Under US Sanctions, Says Huawei (cnbc.com) 58

An anonymous reader quotes a report from CNBC: China's chip industry will be "reborn" as a result of U.S. sanctions, a top boss at Huawei said Friday, as the Chinese telecommunications giant confirmed a breakthrough in semiconductor design technology. Eric Xu, rotating chairman at Huawei, issued fighting words against Washington's tech export restrictions on China. "I believe China's semiconductor industry will not sit idly by, but take efforts around ... self-strengthening and self reliance," according to an official translation of Xu's comments during a press conference. "For Huawei, we will render our support to all such self-saving, self-strengthening and self reliance efforts of the Chinese semiconductor industry."

The U.S. is concerned that China could use advanced semiconductors for military purposes. Huawei's Xu said these developments could boost, rather than hamper China's domestic semiconductor industry. "I believe China's semiconductor industry will get reborn under such sanctions and realize a very strong and self-reliant industry," Xu said.
Last week, Huawei claimed to have completed work on electronic design automation tools for laying out and making chips down to 14nm process nodes.

"But Huawei ideally needs chips of a much smaller nanometer size for more advanced applications, which they are currently finding it difficult to obtain," adds Reuters. "The company is still reeling from the effects of U.S. sanctions -- on Friday, it said net profit dropped 69% year-on-year in 2022, marking the biggest decline on record."
Japan

Japan Restricts Chipmaking Equipment Exports as It Aligns With US China Curbs (reuters.com) 12

Japan said on Friday it will restrict exports of 23 types of semiconductor manufacturing equipment, aligning its technology trade controls with a U.S. push to curb China's ability to make advanced chips. From a report: Japan, home to major chip equipment makers such as Nikon and Tokyo Electron, did not specify China as the target of the restrictions, saying manufacturers would need to seek export permission for all regions. "We are fulfilling our responsibility as a technological nation to contribute to international peace and stability," Minister for Economy, Trade and Industry Yasutoshi Nishimura told a news conference. Japan wants to stop its advanced technology being used for military purposes and does not have a specific country in mind, he said. But the decision, coming ahead of a weekend visit to Beijing by Japanese Minister for Foreign Affairs Yoshimasa Hayashi, will be seen as a major win for the U.S., which in October announced sweeping restrictions on access to chipmaking technology to slow China's technological and military advances.
Security

'Vulkan Files' Leak Reveals Putin's Global and Domestic Cyberwarfare Tactics (theguardian.com) 42

"The Gaurdian reports on a document leak from Russian cyber 'security' company Vulkan," writes Slashdot reader Falconhell. From the report: Inside the six-storey building, a new generation is helping Russian military operations. Its weapons are more advanced than those of Peter the Great's era: not pikes and halberds, but hacking and disinformation tools. The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin's cyberwarfare capabilities.

Thousands of pages of secret documents reveal how Vulkan's engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company's work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia's foreign intelligence organization.

One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks. Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia's command, and also enables disinformation via fake social media profiles. A third Vulkan-built system -- Crystal-2V -- is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: "The level of secrecy of processed and stored information in the product is 'Top Secret'."

United States

Russia Arrests Wall Street Journal Reporter on Spying Charge (apnews.com) 86

Russia's security service arrested an American reporter for The Wall Street Journal on espionage charges, the first time a U.S. correspondent has been detained on spying accusations since the Cold War. The newspaper denied the allegations. From a report: Evan Gershkovich was detained in the Ural Mountains city of Yekaterinburg while allegedly trying to obtain classified information, the Federal Security Service, known by the acronym FSB, said Thursday. The service, which is the top domestic security agency and main successor to the Soviet-era KGB, alleged that Gershkovich "was acting on the U.S. orders to collect information about the activities of one of the enterprises of the Russian military-industrial complex that constitutes a state secret." Kremlin spokesman Dmitry Peskov told reporters Wednesday: "It is not about a suspicion, is it about the fact that he was caught red-handed." "The Wall Street Journal vehemently denies the allegations from the FSB and seeks the immediate release of our trusted and dedicated reporter, Evan Gershkovich," the newspaper said. "We stand in solidarity with Evan and his family."

Slashdot Top Deals