The Linkielist

Linking ideas with the world

The Linkielist

NSA spied on European politicians through Danish telecommunications hub

Denmark’s foreign secret service allowed the US National Security Agency to tap into a crucial internet and telecommunications hub in Denmark and spy on the communications of European politicians, a joint investigation by some of Europe’s biggest news agencies revealed on Sunday.

The covert spying operation, called Operation Dunhammer, took place between 2012 and 2014, based on a secret partnership signed by the two agencies.

The secret pact, signed between the NSA and the Danish Defense Intelligence Service (Danish: Forsvarets Efterretningstjeneste, FE) allowed US spies to deploy a data interception system named XKeyscore on the network of Sandagergårdan, an important internet and communications hub in the city of Dragor, near Copenhagen, where several key submarine cables connected Denmark (and continental Europe) to the Scandinavian peninsula.

dragor

The NSA allegedly used XKeyscore to mass-sniff internet and mobile traffic and intercept communications such as emails, phone calls, SMS texts, and chat messages sent to the phone numbers and email addresses of European politicians.

The covert operation abruptly stopped in 2014 after Danish government officials learned of the NSA-FE collaboration following the Snowden leaks.

Danish officials put a stop to the operation after they learned that the NSA had also spied on Danish government members.

Several high-ranking FE officials were suspended from the agency last year for their involvement in the operation, as Danish law prohibits the foreign intelligence agency from using its resources to spy internally.

News of the scandal leaked over the weekend after journalists from Danish broadcaster DR got their hands on a document called the Dunhammer Report, which contained the results of the Danish government’s investigation into the NSA-FE secret pact, and which was presented to Danish government officials back in 2015.

[…]

Source: NSA spied on European politicians through Danish telecommunications hub | The Record by Recorded Future

Many Need For Speed Games Are About To Be Erased From Reality

[…]

Today, via Reddit (while most the English-speaking world is on a holiday), it’s been announced that Need For Speed: Carbon, Need For Speed: Undercover, Need For Speed: Shift, Shift 2: Unleashed and Need For Speed: The Run will be “retired”. Which I suppose is an apposite word, given they’ll be limping off the tracks as they leave digital storefronts today, and their servers switched off come the end of August.

The reasons given are the usual: that maintaining servers for the few remaining players is prohibitively expensive, and hey, look, they’ve released loads of (astoundingly poor) NFS games since then, so you could buy those instead!

“[T]he number of players has come to a point where it’s no longer feasible to continue the work behind the scenes required to keep [the games] up and running. We hope you have gotten many victories, satisfying drifts, moments of friendly rivalry, and hours of joy over the last few years out of these games. And we hope you’ll keep driving with us in one of our newer titles…”

It’s always this way. “Shrug! What else could we do?!” Well, here are some other things they could do:

  • They could release the source code for the 10-15 year old games, and allow others to continue their development in the public domain
  • They could release the server code for the games, to allow enthusiasts to continue to host the few dedicated players remaining
  • They could offer to upgrade players to one of the many NFS games of the 2010s (although this may be crueller than just nothing at all)
  • They could recognise that last year EA made a revenue of $5.5bn, and it’s likely they could just about afford to leave the servers on with minimal maintenance, without taking too big of a hit

[…]

Source: Many Need For Speed Games Are About To Be Erased From Reality

Google reportedly made it harder to find Android privacy settings

Google’s approach to Android privacy is coming under fire following revelations from Arizona’s antitrust lawsuit over phone tracking. As Insider reports, freshly unredacted documents in the case suggest Google made Android privacy settings harder to find. When Google tested OS releases that surfaced privacy features, the company reportedly saw greater use of those features as a “problem” and aimed to put them deeper into the menu system.

The tech giant also “successfully pressured” phone brands like LG to bury location settings as they were popular, according to Arizona’s attorneys. Google personnel further acknowledged that it was difficult to stop the company from determining your home and work locations, and complained that there was “no way” to give third-party apps your location without also handing them to Google.

[…]

Source: Google reportedly made it harder to find Android privacy settings | Engadget

Dark Energy Survey releases most precise look at the universe’s evolution

New results from the Dark Energy Survey use the largest ever sample of galaxies over an enormous piece of the sky to produce the most precise measurements of the universe’s composition and growth to date. Scientists measured that the way matter is distributed throughout the universe is consistent with predictions in the standard cosmological model, the best current model of the universe.

Over the course of six years, DES surveyed 5,000 square degrees — almost one-eighth of the entire sky — in 758 nights of observation, cataloguing hundreds of millions of objects. The results announced today draw on data from the first three years — 226 million galaxies observed over 345 nights — to create the largest and most precise maps yet of the distribution of galaxies in the universe at relatively recent epochs.

[…]

Ordinary matter makes up only about 5% of the universe. Dark energy, which cosmologists hypothesize drives the accelerating expansion of the universe by counteracting the force of gravity, accounts for about 70%. The last 25% is dark matter, whose gravitational influence binds galaxies together. Both dark matter and dark energy remain invisible and mysterious, but DES seeks to illuminate their natures by studying how the competition between them shapes the large-scale structure of the universe over cosmic time.

DES photographed the night sky using the 570-megapixel Dark Energy Camera on the Victor M. Blanco 4-meter Telescope at the Cerro Tololo Inter-American Observatory in Chile, a program of the National Science Foundation’s NOIRLab.

[…]

 

The Dark Energy Survey is a collaboration of more than 400 scientists from 25 institutions in seven countries. For more information about the survey, please visit the experiment’s website.

[…]

Second, DES detected the signature of dark matter through weak gravitational lensing. As light from a distant galaxy travels through space, the gravity of both ordinary and dark matter can bend it, resulting in a distorted image of the galaxy as seen from Earth. By studying how the apparent shapes of distant galaxies are aligned with each other and with the positions of nearby galaxies along the line of sight, DES scientists inferred the spatial distribution (or clumpiness) of the dark matter in the universe.

[…]

The recent DES results will be presented in a scientific seminar on May 27. Twenty-nine papers are available on the arXiv online repository.

A large blue disc with the top portion open has a has a big white instrument sitting at its center. This instrument sits atop a yellow stand. In a large room with a flight of stairs, the whole instrument is large, much taller than the flight of stairs and equally wide.

The Dark Energy Survey photographed the night sky using the 570-megapixel Dark Energy Camera on the Victor M. Blanco 4-meter Telescope at the Cerro Tololo Inter-American Observatory in Chile, a program of the National Science Foundation’s NOIRLab. Photo: Reidar Hahn, Fermilab

Source: Dark Energy Survey releases most precise look at the universe’s evolution

WhatsApp Won’t Limit Functionality if You Refuse Privacy Policy – for now. But it will pester you about it.

WhatsApp initially threatened to revoke core functions for users that refused to accept its controversial new privacy policy, only to walk back the severity of those consequences earlier this month amid international backlash, and now, it’s doing away with them altogether (for the time being, at least).

In a reversal, the company clarified on Friday that it won’t restrict any functionality even if you haven’t accepted the app’s updated privacy policy yet, TNW reports.

“Given recent discussions with various authorities and privacy experts, we want to make clear that we will not limit the functionality of how WhatsApp works for those who have not yet accepted the update,” a WhatsApp spokesperson said in a statement to the Verge. They added that this is the plan moving forward indefinitely.

In an update to the company’s FAQ page, WhatsApp clarifies that no users will have their accounts deleted or lose functionality if they don’t accept the new policies. That being said, WhatsApp will still send these users reminders to update “from time to time,” WhatsApp told the Verge. On its support page, WhatsApp claims that the majority of users who have seen the update have accepted.

Source: WhatsApp Won’t Limit Functionality if You Refuse Privacy Policy

Israel’s operation against Hamas was the world’s first AI war

Having relied heavily on machine learning, the Israeli military is calling Operation Guardian of the Walls the first artificial-intelligence war.

“For the first time, artificial intelligence was a key component and power multiplier in fighting the enemy,” an IDF Intelligence Corps senior officer said. “This is a first-of-its-kind campaign for the IDF. We implemented new methods of operation and used technological developments that were a force multiplier for the entire IDF.”

In 11 days of fighting in the Gaza Strip, the Israeli military carried out intensive strikes against Hamas and Palestinian Islamic Jihad targets. It targeted key infrastructure and personnel belonging to the two groups, the IDF said.

While the military relied on what was already available on the civilian market and adapted it for military purposes – in the years prior to the fighting – the IDF established an advanced AI technological platform that centralized all data on terrorist groups in the Gaza Strip onto one system that enabled the analysis and extraction of the intelligence.

Soldiers in Unit 8200, an Intelligence Corps elite unit, pioneered algorithms and code that led to several new programs called “Alchemist,” “Gospel” and “Depth of Wisdom,” which were developed and used during the fighting.

Collecting data using signal intelligence (SIGINT), visual intelligence (VISINT), human intelligence (HUMINT), geographical intelligence (GEOINT) and more, the IDF has mountains of raw data that must be combed through to find the key pieces necessary to carry out a strike.

“Gospel” used AI to generate recommendations for troops in the research division of Military Intelligence, which used them to produce quality targets and then passed them on to the IAF to strike.

“For the first time, a multidisciplinary center was created that produces hundreds of targets relevant to developments in the fighting, allowing the military to continue to fight as long as it needs to with more and more new targets,” the senior officer said.

While the IDF had gathered thousands of targets in the densely populated coastal enclave over the past two years, hundreds were gathered in real time, including missile launchers that were aimed at Tel Aviv and Jerusalem.

The military believes using AI helped shorten the length of the fighting, having been effective and quick in gathering targets using super-cognition.

The IDF carried out hundreds of strikes against Hamas and PIJ, including rocket launchers, rocket manufacturing, production and storage sites, military intelligence offices, drones, commanders’ residences and Hamas’s naval commando unit. Israel has destroyed most of the naval commando unit’s infrastructure and weaponry, including several autonomous GPS-guided submarines that can carry 30 kg. of explosives.

IDF Unit 9900’s satellites that have gathered GEOINT over the years. They were able to automatically detect changes in terrain in real time so that during the operation, the military was able to detect launching positions and hit them after firing.

For example, Unit 9900 troops using satellite imagery were able to detect 14 rocket launchers that were located next to a school.

The IDF also killed more than 150 PIJ and Hamas operatives, many of them considered senior commanders or irreplaceable in their roles, especially those who led the research and development of the missile projects.

One strike, against senior Hamas operative Bassem Issa, was carried out with no civilian casualties despite being in a tunnel under a high-rise building surrounded by six schools and a medical clinic. Issa, a brigade commander for Gaza City, was the highest-ranking military figure in Hamas to be killed by Israel since Operation Protective Edge in 2014.

He was killed along with Hamas’s cyber and missile technology chief Jomaa Tahla, head of the development and projects department Jemal Zebda and 13 members of the faction’s weapons manufacturing unit.

Hamas’s underground “Metro” tunnel network was also heavily damaged over the course of several nights of airstrikes. Military sources said they were able to map the network, consisting of hundreds of kilometers under residential areas, to a degree where they knew almost everything about them.

The mapping of Hamas’s underground network was done by a massive intelligence-gathering process that was helped by the technological developments and use of Big Data to fuse all the intelligence. Once mapped, the IDF was able to have a full picture of the network both above and below ground with details, such as the depth of the tunnels, their thickness and the nature of the routes. With that, the military was able to construct an attack plan that was used during the operation.

While the IDF acknowledges that it has not destroyed the entire network, it says it has struck parts of the network that make it nearly impossible for Hamas to use again. And the ability of the IDF to crack Hamas’s network and completely map it removes one of the central dimensions of Hamas’s combat strategy.

“Years of work, out-of-the-box thinking and the fusion of all the power of the intelligence division together with elements in the field led to the breakthrough solution of the underground,” the senior officer said.

Using the data gathered and analyzed through AI, the IAF was able to use the appropriate munitions to hit a target, whether an apartment, a tunnel or a building.

The IDF also used a system dubbed “Alchemist,” which was developed by Unit 8200 and used AI and machine learning to alert troops in the field to possible attacks by Hamas or PIJ. The dynamic and updating system was used by every unit commander in the field who had the system on a user-friendly tablet.

The military said the attack that killed St.-Sgt. Omer Tabib is being investigated. Troops had been alerted to the possibility of anti-tank fire targeting their jeeps outside the community of Netiv Ha’asara.

Tabib was the only soldier killed in the fighting.

The military also relied heavily on intelligence to carry out precision strikes in an attempt to minimize civilian casualties.

The Hamas-run Health Ministry in Gaza said at least 243 Palestinians were killed during the fighting, including 66 children and teens, with 1,910 people wounded.

The IDF said more than 100 operatives belonging to the terrorist groups were killed and that some of the civilian casualties were caused by Hamas rockets falling short or civilian homes collapsing after an airstrike on Hamas’s tunnel network.

In an interview with Channel 12, the head of the United Nations Palestinian refugee agency in Gaza, Matthias Schmale, acknowledged that while the “viciousness and ferocity of the strikes was heavily felt,” he had “the impression that there is a huge sophistication in the way the Israeli military struck.”

Source: Israel’s operation against Hamas was the world’s first AI war – The Jerusalem Post

EU starts protectionist measures, increasing prices of Chinese E-Commerce imports

At Amazon in Spain, France and Italy, Chinese sellers already make up more than half of the largest merchants in the marketplace, says market research firm Marketplace Pulse. The Thuiswinkel Markt Monitor shows that we in the Netherlands spent 1.1 billion euros on products from abroad in 2019. Chinese online stores, such as AliExpress, are in first place with almost 33 percent. One reason for the rise of Chinese retailers is that they supply European customers directly through platforms such as Amazon or AliExpress. They also often pay no import duties and pay little attention to product safety. At the beginning of July, new EU tax rules will come into effect for orders from non-European online retailers. The most important change is the abolition of the current exemption limit of 22 euros for direct imports. As a result, 19 percent import tax is due on all packages. In addition, dealers will have to complete a customs declaration for all shipments in the future. The prices of Chinese articles will therefore rise sharply. If you want to spend something of 22 euros, you will soon pay 4 euros 84 in VAT and approximately 13 euros in handling costs for the delivery person. Then you do not lose 22 euros for the product, but almost 40 euros. Brussels expects a lot from the measures. The tax reform will ensure “fair competition between European and foreign operators in the e-commerce market,” the Brussels government writes in a brochure. It expects an additional tax revenue of 7 billion euros per year. Organization GS1 advises retailers to let marketplaces take care of the VAT return because they know who is buying, at what price and where the package must be delivered. They can also provide the authorities with unique identifiers for the product, the Global Trade Item Number (GTIN), the sales transaction a Global Shipment Identification Number (GSIN) in which the price is recorded and the package identification code, a GS1 Serial Shipping Container Code (SSCC). to enable an automated check. In this way, the customer can look forward to his package without any problems.

Source: EU verscherpt regels voor internationale onlinehandel, Chinese pakketjes fors duurder – Emerce

Creepy Social Media Face Stealing firm Clearview hit with complaints in France, Austria, Italy, Greece and the UK

Data rights groups have filed complaints in the UK, France, Austria, Greece and Italy against Clearview AI, claiming its scraped and searchable database of biometric profiles breaches both the EU and UK General Data Protection Regulation (GDPR).

The facial recognition company, which is based in the US, claims to have “the largest known database of 3+ billion facial images”. Clearview AI’s facial recognition tool is trained on images harvested from YouTube, Facebook, Twitter and attempts to match faces fed into its machine learning software with results from its multi-billion picture database. The business then provides a link to the place it found the “match”.

Google, Twitter, Facebook and even Venmo all sent cease and desist letters to Clearview AI last year asking that it stop scraping people’s photos from their websites. The firm’s CEO defended its business model at the time by saying: “Google can pull in information from all different websites. So if it’s public and it’s out there and could be inside Google’s search engine, it can be inside ours as well.”

The US firm was sued last year by the American Civil Liberties Union. The ACLU also sued the US Department of Homeland Security and its law enforcement agencies last month for failing to respond to Freedom of Information Act requests about their use of Clearview’s tech.

[…]

Back in January this year, [PDF], Chaos Computer Club member Matthias Marx managed to get Clearview to delete the hash value representing his biometric profile – although not the actual images or metadata – after filing a complaint with the Hamburg data protection authorities.

The decision by the Hamburg DPA was that Clearview AI had added his biometric profile to its searchable database without his knowledge or consent. It did not order the deletion of the photographs, however.

“It is long known that Clearview AI has not only me, but many, probably thousands of Europeans in its illegal face database. An order by the European data protection authorities to remove the faces of all Europeans is long overdue,” Marx told The Reg via email. “It is not a solution that every person has to file [their] own complaint.”

[…]

 

Source: Facial recog firm Clearview hit with complaints in France, Austria, Italy, Greece and the UK • The Register

Boeing KC-46A’s Vision System Can’t Reliably Show The End Of The Refueling Boom. Boom doesn’t work much anyway.

KC-46A’s Remote Vision System (RVS), which the boom operators use to connect the boom with receiving aircraft. It’s a critical system on the Pegasus and fundamental to its ability to operate as a tanker for receptacle-equipped aircraft from the U.S. military and its allies.

It’s also a new kind of technology for Air Force refueling aircraft. The service’s previous tankers have all had position for the boom operator to physically lie in at in the rear fuselage, from where could watch the boom directly with their own eyes and guide it into the receiving aircraft. The KC-46, in contrast, has the boom operator seated in the aircraft’s main cabin where they perform their task via the RVS. Since this is a hybrid 2D/3D system, the operators wear special glasses that are, at least in principle, supposed to provide enhanced depth perception while viewing through a flatscreen.

[…]

“The camera feed does not accurately show the end of the boom — there’s about another foot and a half beyond what is visible on the screen, so boom operators use the shadows to gauge where the tip is before connecting to the receptacle. If there’s no shadow, on a cloudy day, for example, the operator has to rely on experience, rather than technology, to make the connection.”

[…]

“Even with the 3D goggles, depth perception is difficult. Moving the refueling boom around the F-16’s canopy to then line up with the receptacle, flying at 290 knots, is a delicate process. While wearing the goggles, the center of the screen is sharp, but when you look to the edge of the screen, it gets blurry and disorienting.”

[…]

an Air Force official explained to Defense News that “There is a slight difference between the motion viewed in the RVS versus what is actually occurring in the physical world.” That now seems as if it might have been a serious understatement.

At one point in the Mobiliy Guardian maneuvers, for instance, the weather during the sortie prevented a C-5 Galaxy strategic transport aircraft from taking on fuel, when “direct-sunlight washout” meant the RVS screen was no longer useable.

[…]

the RVS has a fundamental problem to begin with and that the shadows, in particular, have been used by boom operators as a workaround. Furthermore, it seems to be apparent that the effects of shadows can be both a solution and a problem, depending on the context.

Amid all the other difficulties that have faced the KC-46, the RVS has surely been the most enduring one. It’s for this reason that work is now underway on an ‘RVS 2.0’ that will provide all-new equipment, including a laser ranger to measure the distance between tanker and receiver, color rather than black and white screens, plus augmented reality for the boom operator.

[…]

it emerged that the ongoing effort to redesign the boom, costing $100 million, could likely have been avoided had the Air Force taken note of problems that had emerged much earlier in the program.

Alarmingly, a technology readiness assessment (TRA) — which assesses the maturity of critical hardware and software technologies — also revealed that Boeing engineers used no new or novel technology in the design of the boom because the design was “based on that of the well-proven KC-10 [refueling boom] and the control laws [were] based on the Italian KC-767A and Japanese KC-767J control laws.”

“We reviewed the preliminary design review documentation and found that it showed a refueling boom design that differed significantly from the proposed design that the independent review team documented in the TRA report,” the Pentagon’s Inspector General states in a recent report into the KC-46 program.

Source: KC-46A’s Long-Troubled Vision System Can’t Even Reliably Show The End Of The Refueling Boom

Bet the US wishes they hadn’t recanted from the Airbus tanker they originally chose.

Flaris’s New LAR-01 May Be World’s Fastest Single-Engine Business Jet, can land on grass fields – at only $1.5m

The Flaris LAR-01 has a number of striking stats, including being a ton lighter (literally) than its competitors, along with an unusually short-field landing capability, and detachable wings. But its most impressive number is the 250-knot true air speed,

[…]

Garmin G600 avionics and Flaris Flight Assistance System flight computer, as well as the landing gear and emergency parachute system. But it also claims more impressive stats like the 250-knot TSA at 10,000 feet. Its 6,000-feet-per-minute climb rate, adds the company, is equal to combat-trainer aircraft. Oh, and the required length of the runway for takeoff is just 650 feet

[…]

It is able to transport four people to a distance of 1,550 miles in less than 3.5 hours

[…]

Accommodating a pilot and four passengers, the LAR-01 has a 4,078-pound maximum takeoff weight, with a service ceiling of 46,000 feet. Its expected range is 1,350 nautical miles. Flaris says the $1.5 million price tag as well as the fuel and operating costs will be much lower than competitors. With an empty weight of 1,543 pounds, the company added that the composite frame is a ton lighter than other VLJ-class aircraft.

Behind the stats is a cool-looking design with a “car-like cabin” that offers good headroom and large windows with a Garmin G600 avionics suite. A parachute is designed into the jet’s nose area. Measuring 28’6” across, the semi-elliptical wings are built for both high speeds and a 62-knot stall.

Flaris is attempting to move beyond a traditional light jet, noting the LAR-01 can take off from grass airstrips and short airfields, and the wings detach, so the jet can be trailered and stored in a home garage.

Source: Flaris’s New LAR-01 May Be World’s Fastest Single-Engine Business Jet – Robb Report

Not entirely sure if detachable wings is the way forward tbh…

Norway fines Tesla for reducing battery capacities and charging speeds

A court in Norway has found Tesla guilty after it was sued by owners who complained of reduced battery capacities and charging speeds. It has been ordered to pay 136,000 kroner ($16,000) each to buyers of certain Model S owners, a judgement that could run into the hundreds of millions of dollars, according to Nettavisen .

Owners in Norway and elsewhere complained about drops in range of up to 30 miles following a 2019 software update, as Electrek reported. They also noticed reduced DC fast-charging rates at Tesla’s Supercharger stations. The issues reportedly involve 2013-2015 models and Tesla said at the time that the aim was to “protect the battery and improve battery longevity.” The company added that it would only affect “a small percentage of owners.”

Some owners saw precipitous drops in battery capacity of up to 11 percent, compared to the normal gradual declines expected. Those issues have led to lawsuits not only in Norway, but in Denmark, the US and elsewhere.

Tesla reportedly failed to reply to the suit, so the judgement was made in absentia. As a result, the 30 owners behind the lawsuit will be awarded $16,000 each unless Tesla appeals. EVs are huge in Norway, however and Nettavisen notes that there are over 10,000 buyers of the affected models in Norway — as such, the lawsuit could get considerably more expensive.

Source: Norway fines Tesla for reducing battery capacities and charging speeds | Engadget

Indonesia’s national health insurance scheme leaks at least a million citizens’ records

Indonesia’s government has admitted to leaks of personal data from the agency that runs its national health insurance scheme

On May 20th Kominfo, Indonesia’s Ministry of Communication and Information Technology, acknowledged it was aware of a post on notorious stolen-data-mart Raidforums offering to sell a million records leaked from the Badan Penyelenggara Jaminan Sosial (BPJS), an agency that runs national health insurance scheme Jaminan Kesehatan Nasional (JKN).

The Ministry said it had found leaked data and that the leak was not “massive”.

By May 21st, the Ministry stated it had identified an entity trying to sell the data and found the data itself on three sites – bayfiles.com, mega.nz, and anonfiles.com. The Ministry claimed only the last-named site had not responded to takedown requests, and that it hosted only around 100,000 records.

Later on the 21st a new announcement raised the number of stolen records to a million, said the fields matched those used by the BPJS, and said further investigation is needed to understand the nature of the data and extent of the breach.

[…]

Source: Indonesia’s national health insurance scheme leaks at least a million citizens’ records • The Register

Mobile app developers’ misconfiguration of third party services leave personal data of over 100 million exposed – Check Point Research

[…]

Check Point Research (CPR) recently discovered that in the last few months, many application developers put their data and users’ data at risk. By not following best practices when configuring and integrating 3rd party cloud services into applications, millions of users’ private data was exposed. In some cases, this type of misuse only affects the users, however, the developers were also left vulnerable. The misconfiguration put users’ personal data and developer’s internal resources, such as access to update mechanisms and storage at risk.

In this research, CPR outlines how the misuse of real-time database, notification managers, and storage exposed over 100 million users’ personal data (email, passwords, names, etc.) and left corporate resources vulnerable to malicious actors.

[…]

 

Source: Mobile app developers’ misconfiguration of third party services leave personal data of over 100 million exposed – Check Point Research

The New Sonos One SL Reminds Us That Smart Devices Have a Shelf Life, forces you to spying S2 update

[…]

if you’re thinking of buying a new One SL, you ought to keep in mind that it’ll only work with the newer Sonos S2 app.

This won’t be a problem for every Sonos owner, especially if you bought all your Sonos devices in the past year or two. It might be an issue, however, if you’re still operating a mix of newer and older Sonos hardware. Namely, the “legacy” Sonos products that were “killed off” last year. Those legacy gadgets will only work with the S1 app, and although Sonos committed to providing updates for these devices, controlling a mix of legacy and current Sonos gadgets isn’t possible on the S2 app.

[…]

Source: The New Sonos One SL Reminds Us That Smart Devices Have a Shelf Life

You can’t roll back from the old update which basically only seems to add rounded corners to backgrounds and break in dark mode – except that you allow Sonos to spy on you through the built in microphone with S2.

Parents outraged after Florida high school edits girls’ yearbook pictures to make clothes more conservative

According to Action News Jax, Bartram Trail High School altered 80 different yearbook photos – all of them of girls. In many of them, crudely photoshopped rectangles in the colour of the girls’ clothing can be seen covering up their chests.

Many of those students have expressed outrage.

“I felt confident that day and I looked good, in dress code,” ninth grader Zoe Iannone told Action News Jax. “When I sent it to my mom and all of us saw it, I felt very sexualized, like that was what they were worrying about.”

Parents are furious as well.

“Our daughters of Bartram deserve an apology,” one anonymous mother told the station. “They are making them feel embarrassed about who they are.”

[…]

Source: Parents outraged after Florida high school edits girls’ yearbook pictures to make clothes more conservative

I thought this was the land of the free?!

Redditors Launch A ‘Rescue Mission’ For Embattled Sci-Hub, With The Ultimate Aim Of Building A Decentralized Version

Techdirt has just written about belated news that the FBI gained access two years ago to the Apple account of Alexandra Elbakyan, the founder of Sci-Hub. This is part of a continuing attempt to stop the widespread sharing of academic papers, mostly paid for by the public, and currently trapped behind expensive paywalls. You might think somebody helping scholars spread their work to a wider audience would be rewarded with prizes and grants, not pursued by the FBI and DOJ. But of course not, because, well, copyright. It’s easy to feel angry but helpless when confronted with this kind of bullying by publishing giants like Elsevier, but a group of publicly spirited Redditors aim to do something about it:

It’s time we sent Elsevier and the USDOJ a clearer message about the fate of Sci-Hub and open science: we are the library, we do not get silenced, we do not shut down our computers, and we are many.

They have initiated what they term a “Rescue Mission for Sci-Hub”, in order to prepare for a possible shutdown of the site:

A handful of Library Genesis seeders are currently seeding the Sci-Hub torrents. There are 850 scihub torrents, each containing 100,000 scientific articles, to a total of 85 million scientific articles: 77TB. This is the complete Sci-Hub database. We need to protect this.

The Redditors are calling for “85 datahoarders to store and seed 1TB of articles each, 10 torrents in total”. The idea is to download 10 random torrents, then seed them for as long as possible. Once enough people start downloading random torrents using these seeds, the Sci-Hub holdings will be safe. That would then lead to the “final wave”:

Development for an open source Sci-Hub. freereadorg/awesome-libgen is a collection of open source achievements based on the Sci-Hub and Library Genesis databases. Open source de-centralization of Sci-Hub is the ultimate goal here, and this begins with the data, but it is going to take years of developer sweat to carry these libraries into the future.

The centralized nature of Sci-Hub is certainly its greatest weakness, since it provides publishers with just a few targets to aim for, both legally and technically. A truly decentralized version would solve that problem, but requires a lot of work, as the Reddit post notes. Still, at least this “rescue plan” means people can do something practical to help Sci-Hub; sadly, protecting Elbakyan is harder.

Source: Redditors Launch A ‘Rescue Mission’ For Embattled Sci-Hub, With The Ultimate Aim Of Building A Decentralized Version | Techdirt

Belarus accused of ‘abhorrent action’ after Ryanair flight diverted midair with MiG 29 to arrest blogger

Belarusian authorities appear to have forced a Ryanair jet to perform an emergency landing in Minsk in order to arrest an opposition blogger wanted for organising last summer’s protests against leader Alexander Lukashenko.

Roman Protasevich, a former editor of the influential Telegram channels Nexta and Nexta Live, was detained by police after his flight was diverted to Minsk national airport due to a bomb threat. Minsk confirmed it had scrambled a Mig-29 fighter to escort the plane.

Protasevich has been accused of terrorism and provoking riots after the Nexta channels became one of the main conduits for organising last year’s anti-Lukashenko protests over elections fraud. Protasevich had been living in exile in 2019 and Poland had previously rejected an extradition request sent by Minsk.

Protasevich was flying on an intra-EU flight from Athens to Vilnius, the capital of Lithuania, when the plane was diverted to Minsk. According to online flight data, the plane was over Belarusian airspace when it diverted course but was closer to Vilnius than Minsk.

[…]

Protasevich, who has been living in exile since 2019, told colleagues earlier on Sunday he had been followed while travelling to the airport in Athens. A Russian speaker had followed him into a line at the airport and attempted to photograph his documents, he wrote to colleagues.

“He was next in line at the document check and just turned around and walked away,” he said. “For some reason, he also tried to secretly photograph my documents.” Colleagues said they had not heard from him since.

Source: Belarus accused of ‘abhorrent action’ after Ryanair flight diverted to arrest blogger | Belarus | The Guardian

Air India breach compromised data for 4.5 million passengers also of other airlines

The Times of India reports Air India has revealed that a breach compromised about 4.5 million passengers whose data was registered at system provider SITA between August 2011 and late February 2021. The intruders couldn’t obtain passwords, but they had access to names, contact info, tickets and frequent flyer info (including for Star Alliance).

The perpetrators also had access to credit card info, although the usefulness of that data might be limited as the CVV/CVC numbers weren’t included.

The airline said it first learned of the incident on February 25th (and issued a warning on March 19th), but that it only learned the identities of affected passengers on March 25th and May 4th. It was already investigating the breach and had locked down the affected servers, including resetting passwords for its frequent flyer program.

It’s not clear who was responsible for the breach. However, the damage isn’t limited to one airline. STIA told BleepingComputer in a statement that customers from several airlines were victims, including travelers who flew with Air New Zealand, Cathay Pacific, Finnair, Jeju Air, Lufthansa, Malaysia Airlines, SAS and Singapore Airlines. While this isn’t as large as the 2018 Cathay Pacific breach that touched up to 9.4 million customers, the repercussions could be felt worldwide for a while to come.

Source: Air India breach compromised data for 4.5 million passengers | Engadget

This shows how incredibly interconnected we are and how poorly our data carriers care for our data

American insurance giant CNA reportedly pays $40m to ransomware crooks

CNA Finaincial, the US insurance conglomerate, has apparently paid $40m to ransomware operators to gets its files back.

In March the business revealed it had been hit by an extensive Phoenix Locker infection; this strain of malware was developed by Russian scam artists calling themselves Evil Corp, which may have links to Russian intelligence.

All CNA systems are now back up and running though it appears that the company didn’t manage this themselves and instead coughed up a widely reported $40m to the extortionists for the means to decrypt the scrambled files.

Source: American insurance giant CNA reportedly pays $40m to ransomware crooks • The Register

Virgin Galactic 3rd test flight to space successful

Virgin Galactic’s rocket-powered plane, carrying two pilots, soared into the upper atmosphere on its third mission to reach space Saturday morning.

The success cues up Virgin Galactic to begin launching paying customers within the next year as the company works to finish its testing campaign at its new headquarters in New Mexico.
Spaceplane VSS Unity reached an altitude of 55.45 miles, according to the company. The US government recognizes the 50-mile mark as the edge of space. The company tweeted Saturday morning that the spaceflight carried technology experiments for NASA’s Flight Opportunities Program.
[…]
Recently, the company installed a new CEO, former Disney executive Michael Colglazier, and has been pledging to slowly ramp up to commercial operations over the next year or so. It’s also focused on constructing a new line of planes, called SpaceShipIII, and is angling to one day fly about 400 flights each year from its New Mexico spaceport.

Source: Virgin Galactic test flight successful – CNN

The First Privately Owned F-16 Aggressor Jet Has Taken To The Sky

In a follow-up to our big piece on Top Aces’ recently acquired fleet of second-hand F-16A/B ‘Netz’ fighters from Israel, the company has now taken one of these jets aloft for the first time. This also marks the first time a 4th generation fighter of any kind has been flown by a private adversary support firm.

The maiden flight originated from Top Aces’ newly minted F-16 Center Of Excellence at Mesa Gateway Airport in Arizona. This is where the aggressor firm, which has its main headquarters in Canada, became a truly global operation and is now making a home for its budding F-16 operations. Ultimately, its fleet of Vipers is set to swell to 29 jets.

Kyler Noe

The flight of F-16A 78-0322, which had “Billy Bob” at the controls, lasted roughly an hour and saw the aircraft venture to the west of its home base for a number of checks, before safely returning to Mesa Gateway Airport. The aircraft itself is historic. It took part in Israel’s famous attack on Iraq’s Osirak nuclear reactor in 1981 and is also a MiG killer. You can read more about the jet’s history in this past piece of ours on Top Ace’s second-hand jets and their unique exploits.

ADSBexchange.com

Top Aces plans to use its private 4th generation fighter fleet to support the Pentagon’s growing demand for adversary air support, acting as advanced aggressors for Air Force, Navy, and Marine Corps flight crews. Currently, adversary service providers largely use 3rd generation fighters, some of which are deeply upgraded, to mimic more advanced threats at a cheaper cost than using actual 4th generation fighters.

It will be interesting to see Top Aces make its business case for more complex, and potentially far more expensive, private adversary capabilities. Although, the Air Force, in particular, has taken a methodical approach and upgrading the complexity of these services, so adding F-16s to the mix would seem to be a logical next step, at least conceptually speaking. Fiscally speaking, that could be another story.

Kyler Noe

For more information on Top Aces’ F-16 fleet, make sure to check out our special feature on the topic here. Beyond that, it looks like they threw a GoPro in the cockpit, so we may get some great video from the company of this historic first flight in the not-to-distant future.

Source: The First Privately Owned F-16 Aggressor Jet Has Taken To The Sky

Driving Simulator Lets a Player Feel a Car’s Motions by Short-Circuiting Their Sense of Balance

[…]

It turns out a process called galvanic vestibular stimulation—also known as GVS—can be used to alter a human’s sense of balance by electrically stimulating a nerve in the ear using electrodes. Researchers haven’t quite figured out the best uses of the technology—medical, military, and entertainment companies are all investigating it—but when used properly it can convince a person that they need to move their bodies to the left or right to maintain balance, which the body will automatically do all on its own, even if they’re standing perfectly still. As a result there’s a peculiar side effect of GVS: the technology can be used to partially control a human’s movements as if they were being operated remotely.

That’s exactly what Mean Gene Hacks is doing here. Using about $50 worth of external hardware (plus the cost of a gaming PC) they’ve made BeamNG.drive, a highly realistic physics-based driving simulator—interface with GVS hardware. Custom code translates an in-game vehicle’s motions into the electrical signals that alter a player’s balance, which are delivered to a player’s nerve endings through a pair of adhesive electrodes that attach to the neck just behind the earlobes. The resulting effect has the player uncontrollably leaning to the left or to the right while playing, as if effected by the same G-forces the car in the game is experiencing.

[…]

Source: Terrifying Driving Simulator Lets a Player Feel a Car’s Motions by Short-Circuiting Their Sense of Balance

Russian malware will often not install on computers with a Russian virtual keyboard installed

 KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian

[…]

DarkSide and other Russian-language affiliate moneymaking programs have long barred their criminal associates from installing malicious software on computers in a host of Eastern European countries, including Ukraine and Russia. This prohibition dates back to the earliest days of organized cybercrime, and it is intended to minimize scrutiny and interference from local authorities.

In Russia, for example, authorities there generally will not initiate a cybercrime investigation against one of their own unless a company or individual within the country’s borders files an official complaint as a victim. Ensuring that no affiliates can produce victims in their own countries is the easiest way for these criminals to stay off the radar of domestic law enforcement agencies.

[…]

DarkSide, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS) — former Soviet satellites that mostly have favorable relations with the Kremlin. The full exclusion list in DarkSide (published by Cybereason) is below:

Image: Cybereason.

Simply put, countless malware strains will check for the presence of one of these languages on the system, and if they’re detected the malware will exit and fail to install.

[…]

Will installing one of these languages keep your Windows computer safe from all malware? Absolutely not. There is plenty of malware that doesn’t care where in the world you are. And there is no substitute for adopting a defense-in-depth posture, and avoiding risky behaviors online.

[…]

Cybercriminals are notoriously responsive to defenses which cut into their profitability, so why wouldn’t the bad guys just change things up and start ignoring the language check? Well, they certainly can and maybe even will do that (a recent version of DarkSide analyzed by Mandiant did not perform the system language check).

But doing so increases the risk to their personal safety and fortunes by some non-trivial amount

[…]

Source: Try This One Weird Trick Russian Hackers Hate – Krebs on Security

Colonial Pipeline hackers Darkside received $90 million in bitcoin

DarkSide, the hacker group behind the recent Colonial Pipeline ransomware attack, received a total of $90 million in bitcoin ransom payments before shutting down last week, according to new research.

Colonial Pipeline was hit with a devastating cyberattack earlier this month that forced the company to shut down approximately 5,500 miles of pipeline in the United States, crippling gas delivery systems in Southeastern states. The FBI blamed the attack on DarkSide, a cybercriminal gang believed to be based in Eastern Europe, and Colonial reportedly paid a $5 million ransom to the group.

[…]

In a blog post Tuesday, Elliptic said DarkSide and its affiliates bagged at least $90 million in bitcoin ransom payments over the past nine months from 47 victims. The average payment from organizations was likely $1.9 million, Elliptic said.

[…]

Of the $90 million total haul, $15.5 million went to DarkSide’s developer while $74.7 million went to its affiliates, according to Elliptic. The majority of the funds are being sent to crypto exchanges, where they can be converted into fiat money, Elliptic said.

[…]

Source: Colonial Pipeline hackers Darkside received $90 million in bitcoin: Report

Just 100 Companies Create 90% of Plastic Waste

Plastic producers have tried to make us think that individuals can solve pollution by improving our recycling and shopping habits. A new study makes it clear why that’s their tactic. Just 20 companies are responsible for more than half of the world’s trashed single-use plastic.

The Plastic Waste Makers Index, published Tuesday by the Australian foundation Minderoo, is a comprehensive account of the companies manufacturing plastic that goes into disposable products. It shows that energy giants and chemical conglomerates are among the 20 companies that created 55% of global plastic waste. Expanding the view just a bit further, the report also shows that just 100 businesses account for more than 90% of trashed plastic.

The top contributor to throwaway plastics, the report found, is Exxon. In 2019, it contributed 5.9 million metric tons of plastic that got thrown away. In close second and third were the world’s two largest chemical companies, U.S.-based Dow and China’s Sinopec. They created 5.5 million metric tons and 5.3 million metric tons of the stuff respectively.

The research also showed that recycled plastic account for just 2% of the world’s disposable plastics. The vast majority are made from virgin materials, meaning new fossil fuels were extracted to create them.

[…]

Source: Just 100 Companies Create 90% of Plastic Waste