US Navy wants to reinstate fired captain of coronavirus-hit aircraft carrier as another destroyer has a breakout of covid-19

In an extraordinary reversal, the U.S. Navy has recommended reinstating the fired captain of the coronavirus-hit aircraft carrier Theodore Roosevelt, whose crew hailed him as their hero for risking his job to safeguard their lives, officials said on Friday.

The Navy’s leadership made the recommendation to reinstate Captain Brett Crozier to Defense Secretary Mark Esper on Friday, just three weeks after Crozier was relieved of command after the leak of a letter he wrote calling on the Navy for stronger measures to protect the crew, the officials said, speaking on condition of anonymity.

[…]

sper’s deliberations raised questions about whether political or other considerations might override the Navy’s recommendations in a case that has seen Democrats vocally critical of the Trump administration’s handling of the matter.

Sources say Crozier is one of the 856 sailors from the Roosevelt’s 4,800-member crew who have tested positive for the coronavirus, effectively taking one of the Navy’s most powerful ships out of operation.

Crozier was fired by the Navy’s top civilian, then-acting Navy Secretary Thomas Modly, against the recommendations of uniformed leaders, who suggested he wait for an investigation into the letter’s leak.

Modly’s decision backfired badly, as members of the crew hailed their captain as a hero in an emotional sendoff captured on video that went viral on social media.

Embarrassed, Modly then compounded his problems by flying out to the carrier to ridicule Crozier over the leak and question his character in a speech to the Roosevelt’s crew, which also leaked to the media. Modly then resigned.

News of the Navy’s recommendations could boost morale among sailors on the Roosevelt, who were caught between the Navy’s desire to keep the ship operational and its duty to shield them from unnecessary risk in peacetime.

[…]

The disclosure of the Navy’s recommendation, which was first reported by the New York Times, came just hours after the Pentagon announced that at least 18 sailors aboard a U.S. Navy destroyer – the Kidd – had tested positive for the new coronavirus.

It was another blow to the military as it faces fallout over its handling of the Roosevelt, raising additional questions about whether the revamped safeguards in place to protect U.S. troops are sufficient.

The crisis being triggered by the coronavirus is the biggest facing Navy leadership since two crashes in the Asia Pacific region in 2017 that killed 17 sailors.

Those incidents raised questions about Navy training and the pace of operations, prompting a congressional hearing and the removal of a number of officers.

Source: Navy wants to reinstate fired captain of coronavirus-hit aircraft carrier – Reuters

‘Zombie’ Satellite shutdown in 1972 Found alive By Amateur Radio Operator On COVID-19 Lockdown

There are more than 2,000 active satellites orbiting Earth. At the end of their useful lives, many will simply burn up as they reenter the atmosphere. But some will continue circling as “zombie” satellites — neither alive nor quite dead.

“Most zombie satellites are satellites that are no longer under human control, or have failed to some degree,” says Scott Tilley.

Tilley, an amateur radio operator living in Canada, has a passion for hunting them down.

In 2018, he found a signal from a NASA probe called IMAGE that the space agency had lost track of in 2005. With Tilley’s help, NASA was able to reestablish contact.

But he has tracked down zombies even older than IMAGE.

“The oldest one I’ve seen is Transit 5B-5. And it launched in 1965,” he says, referring to a nuclear-powered U.S. Navy navigation satellite that still circles the Earth in a polar orbit, long forgotten by all but a few amateurs interested in hearing it “sing” as it passes overhead.

Recently, Tilley got interested in a communications satellite he thought might still be alive — or at least among the living dead. LES-5, built by the Massachusetts Institute of Technology’s Lincoln Laboratory, was launched in 1967.

By scouring the Internet, he found a paper describing the radio frequency that LES-5, an experimental military UHF communications satellite, should be operating on — if it was still alive. So he decided to have a look.

“This required the building of an antenna, erecting a new structure to support it. Pre-amps, filters, stuff that takes time to gather and put all together,” he says.

“When you have a family and a busy business, you don’t really have a lot of time for that,” he says.

But then came the COVID-19 pandemic.

British Columbia, where Tilley lives, was on lockdown. Like many of us, suddenly Tilley had time on his hands. He used it to look for LES-5, and on March 24, he hit the ham radio equivalent of pay dirt.

He’s been making additional measurements ever since.

“The reason this one is kind of intriguing is its telemetry beacon is still operating,” Tilley says.

In other words, says Tilley, even though the satellite was supposed to shut down in 1972, it’s still going. As long as the solar panels are in the sun, the satellite’s radio continues to operate. Tilley thinks it may even be possible to send commands to the satellite.

The MIT lab that built LES-5 still does a lot of work on classified projects for the military. NPR contacted its news office to ask if someone could say more about LES-5 and whether it really could still receive commands.

But after repeated requests, Lincoln Laboratory finally answered with a “no comment.”

It seems that even a 50-year-old zombie satellite might still have secrets.

Source: ‘Zombie’ Satellite Found By Amateur Radio Operator On COVID-19 Lockdown : NPR

Facebook Accuses NSO Group of Using U.S. Servers for Spying, infecting phones via WhatsApp

In a filing released on Thursday in federal court in Oakland, California, lawyers representing the social media giant alleged that NSO Group had used a network of remote servers in California to hack into phones and devices that were used by attorneys, journalists, human rights activists, government officials and others.

NSO Group has argued that Facebook’s case against it should be thrown out on the grounds that the court has no jurisdiction over its operations. In a 13 May legal document, lawyers representing NSO Group said that the company had no offices or employees in California and “do no business of any kind there.”

NSO has also argued that it has no role in operating the spyware and is limited to “providing advice and technical support to assist customers in setting up” the technology.

John Scott-Railton, a senior researcher at the Citizen Lab at the University Of Toronto’s Munk School, said evidence presented by Facebook on Thursday indicated NSO Group was in a position to “look over its customer’s shoulders” and monitor who its government clients were targeting.

“This is a gut punch to years of NSO’s claims that it can’t see what its customers are doing,” said Scott-Railton. He said it also shows that the Israeli company “probably knows a lot more about what its customers do than it would like to admit.”

NSO’s spyware, known as Pegasus, can gather information about a mobile phone’s location, access its camera, microphone and internal hard drive, and covertly record emails, phone calls and text messages. Researchers have accused the company of supplying its technology to countries that have used it to spy on dissidents, journalists and other critics.

A representative for NSO Group said its products are “used to stop terrorism, curb violent crime, and save lives.”

“NSO Group does not operate the Pegasus software for its clients, nor can it be used against U.S. mobile phone numbers, or against a device within the geographic bounds of the United States,” the representative said, adding that a response to Facebook’s legal filing was forthcoming.

In its filing, Facebook alleged that NSO had rented a Los Angeles-based server from a U.S. company, QuadraNet, that it used to launch 720 hacks on people’s smartphones or other devices. It’s unclear whether NSO Group’s software was used to target people within the U.S.. The company has previously stated that its technology “cannot be used on U.S. phone numbers.”

Facebook accused NSO Group of reverse-engineering WhatsApp, using an unauthorized program to access WhatsApp’s servers and deploying its spyware against approximately 1,400 targets. NSO Group was then able to “covertly transmit malicious code through WhatsApp servers and inject” spyware onto people’s devices without their knowledge, according to the Facebook’s legal filings.

“Defendants had no authority to access WhatsApp’s servers with an imposter program, manipulate network settings, and commandeer the servers to attack WhatsApp users,” Facebook alleged in the Thursday filing. “That invasion of WhatsApp’s servers and users’ devices constitutes unlawful computer hacking” under the Computer Fraud and Abuse Act.

Source: Facebook Accuses NSO Group of Using U.S. Servers for Spying – Bloomberg