Security

DanaBot Malware Devs Infected Their Own PCs (krebsonsecurity.com) 10

The U.S. unsealed charges against 16 individuals behind DanaBot, a malware-as-a-service platform responsible for over $50 million in global losses. "The FBI says a newer version of DanaBot was used for espionage, and that many of the defendants exposed their real-life identities after accidentally infecting their own systems with the malware," reports KrebsOnSecurity. From the report: Initially spotted in May 2018 by researchers at the email security firm Proofpoint, DanaBot is a malware-as-a-service platform that specializes in credential theft and banking fraud. Today, the U.S. Department of Justice unsealed a criminal complaint and indictment from 2022, which said the FBI identified at least 40 affiliates who were paying between $3,000 and $4,000 a month for access to the information stealer platform. The government says the malware infected more than 300,000 systems globally, causing estimated losses of more than $50 million. The ringleaders of the DanaBot conspiracy are named as Aleksandr Stepanov, 39, a.k.a. "JimmBee," and Artem Aleksandrovich Kalinkin, 34, a.k.a. "Onix," both of Novosibirsk, Russia. Kalinkin is an IT engineer for the Russian state-owned energy giant Gazprom. His Facebook profile name is "Maffiozi."

According to the FBI, there were at least two major versions of DanaBot; the first was sold between 2018 and June 2020, when the malware stopped being offered on Russian cybercrime forums. The government alleges that the second version of DanaBot -- emerging in January 2021 -- was provided to co-conspirators for use in targeting military, diplomatic and non-governmental organization computers in several countries, including the United States, Belarus, the United Kingdom, Germany, and Russia. The indictment says the FBI in 2022 seized servers used by the DanaBot authors to control their malware, as well as the servers that stored stolen victim data. The government said the server data also show numerous instances in which the DanaBot defendants infected their own PCs, resulting in their credential data being uploaded to stolen data repositories that were seized by the feds.

"In some cases, such self-infections appeared to be deliberately done in order to test, analyze, or improve the malware," the criminal complaint reads. "In other cases, the infections seemed to be inadvertent -- one of the hazards of committing cybercrime is that criminals will sometimes infect themselves with their own malware by mistake." A statement from the DOJ says that as part of today's operation, agents with the Defense Criminal Investigative Service (DCIS) seized the DanaBot control servers, including dozens of virtual servers hosted in the United States. The government says it is now working with industry partners to notify DanaBot victims and help remediate infections. The statement credits a number of security firms with providing assistance to the government, including ESET, Flashpoint, Google, Intel 471, Lumen, PayPal, Proofpoint, Team CYRMU, and ZScaler.

The Military

Nations Meet At UN For 'Killer Robot' Talks (reuters.com) 35

An anonymous reader quotes a report from Reuters: Countries are meeting at the United Nations on Monday to revive efforts to regulate the kinds of AI-controlled autonomous weapons increasingly used in modern warfare, as experts warn time is running out to put guardrails on new lethal technology. Autonomous and artificial intelligence-assisted weapons systems are already playing a greater role in conflicts from Ukraine to Gaza. And rising defence spending worldwide promises to provide a further boost for burgeoning AI-assisted military technology.

Progress towards establishing global rules governing their development and use, however, has not kept pace. And internationally binding standards remain virtually non-existent. Since 2014, countries that are part of the Convention on Conventional Weapons (CCW) have been meeting in Geneva to discuss a potential ban fully autonomous systems that operate without meaningful human control and regulate others. U.N. Secretary-General Antonio Guterres has set a 2026 deadline for states to establish clear rules on AI weapon use. But human rights groups warn that consensus among governments is lacking. Alexander Kmentt, head of arms control at Austria's foreign ministry, said that must quickly change.

"Time is really running out to put in some guardrails so that the nightmare scenarios that some of the most noted experts are warning of don't come to pass," he told Reuters. Monday's gathering of the U.N. General Assembly in New York will be the body's first meeting dedicated to autonomous weapons. Though not legally binding, diplomatic officials want the consultations to ramp up pressure on military powers that are resisting regulation due to concerns the rules could dull the technology's battlefield advantages. Campaign groups hope the meeting, which will also address critical issues not covered by the CCW, including ethical and human rights concerns and the use of autonomous weapons by non-state actors, will push states to agree on a legal instrument. They view it as a crucial litmus test on whether countries are able to bridge divisions ahead of the next round of CCW talks in September.
"This issue needs clarification through a legally binding treaty. The technology is moving so fast," said Patrick Wilcken, Amnesty International's Researcher on Military, Security and Policing. "The idea that you wouldn't want to rule out the delegation of life or death decisions ... to a machine seems extraordinary."

In 2023, 164 states signed a 2023 U.N. General Assembly resolution calling for the international community to urgently address the risks posed by autonomous weapons.
Communications

SpaceX Gets Approval To Sell Starlink In India (behindtheblack.com) 26

schwit1 shares a report from Behind The Black: Almost immediately after India's government issued this week new tightened regulations for allowing private satellite constellations to sell their services in India, it also apparently completed negotiations with SpaceX to allow it to sell Starlink in India based on these rules. Business Today reports: "According to sources, the DoT [Department of Transportation] granted the LoI [Letter of Intent] after Starlink accepted 29 strict security conditions, including requirements for real-time terminal tracking, mandatory local data processing, legal interception capabilities, and localisation of at least 20% of its ground segment infrastructure within the first few years of operation.

Starlink's nod came amid heightened national security sensitivities, coinciding with India's pre-dawn Operation Sindoor strikes on terror camps across the border in response to the Pahalgam massacre. However, DoT officials clarified that the decision to approve Starlink was independent of these military developments." At the moment SpaceX's chief competitors, OneWeb and Amazon's Kuiper constellation, have not yet obtained the same permissions. This allows SpaceX to grab a large portion of the market share in India before either of these other companies.

The Military

Stratolaunch's Talon-A2 Prototype Goes Hypersonic After Dropping From World's Largest Airplane (space.com) 13

Stratolaunch successfully flew its uncrewed Talon-A2 prototype to hypersonic speeds twice -- once in December and again in March. "We've now demonstrated hypersonic speed, added the complexity of a full runway landing with prompt payload recovery and proven reusability," Stratolaunch President and CEO Zachary Krevor said in a statement on Monday. "Both flights were great achievements for our country, our company and our partners." Space.com reports: Microsoft co-founder Paul Allen established Stratolaunch in 2011, with the goal of air-launching satellites from a giant carrier plane called Roc, which has a wingspan of 385 feet (117 meters). That vision changed after Allen's 2018 death, however; the company is now using Roc as a platform to test hypersonic technology.

Hypersonic vehicles are highly maneuverable craft capable of flying at least five times the speed of sound. Their combination of speed and agility make them much more difficult to track and intercept than traditional ballistic missiles. The United States, China and other countries view hypersonic tech as vital for national security, and are therefore developing and testing such gear at an ever-increasing pace. Stratolaunch, Roc and the winged, rocket-powered Talon-2A are part of this evolving picture, as the two newly announced test flights show. They were both conducted for the U.S. military's Test Resource Management Center Multi-Service Advanced Capability Hypersonic Test Bed (MACH-TB) program, under a partnership with the Virginia-based company Leidos.

On both occasions, Roc lifted off from California and dropped Talon-2A over the Pacific Ocean. The hypersonic vehicle then powered its way to a landing at Vandenberg Space Force Base, on California's Central Coast. "These flights were a huge success for our program and for the nation," Scott Wilson, MACH-TB program manager, said in the same statement. "The data collected from the experiments flown on the initial Talon-A flight has now been analyzed and the results are extremely positive," he added. "The opportunity for technology testing at a high rate is highly valuable as we push the pace of hypersonic testing. The MACH-TB program is pleased with the multiple flight successes while looking forward to future flight tests with Stratolaunch."

Privacy

Messaging App Used by Mike Waltz, Trump Deportation Airline GlobalX Both Hacked in Separate Breaches (reuters.com) 40

TeleMessage, a communications app used by former Trump national security adviser Mike Waltz, has suspended services after a reported hack exposed some user messages. The breach follows controversy over Waltz's use of the app to coordinate military updates, including accidentally adding a journalist to a sensitive Signal group chat. From the report: In an email, Portland, Oregon-based Smarsh, which runs the TeleMessage app, said it was "investigating a potential security incident" and was suspending all its services "out of an abundance of caution." A Reuters photograph showed Waltz using TeleMessage, an unofficial version of the popular encrypted messaging app Signal, on his phone during a cabinet meeting on Wednesday. A separate report from 404 Media says hackers have also targeted GlobalX Air -- one of the main airlines the Trump administration is using as part of its deportation efforts -- and claim to have stolen flight records and passenger manifests for all its flights, including those for deportation. From the report: The data, which the hackers contacted 404 Media and other journalists about unprompted, could provide granular insight into who exactly has been deported on GlobalX flights, when, and to where, with GlobalX being the charter company that facilitated the deportation of hundreds of Venezuelans to El Salvador. "Anonymous has decided to enforce the Judge's order since you and your sycophant staff ignore lawful orders that go against your fascist plans," a defacement message posted to GlobalX's website reads. Anonymous, well-known for its use of the Guy Fawkes mask, is an umbrella some hackers operate under when performing what they see as hacktivism.
United States

US National Security Official Caught Using 'Less-Secure Signal App Knockoff' (theguardian.com) 101

Remember when U.S. National Security Adviser Mike Waltz mistakenly included a journalist in an encrypted chatroom to discuss looming U.S. military action against Yemen's Houthis?

A recent photo of a high-level cabinet meeting caught Waltz using a "less-secure Signal app knockoff," reports the Guardian: The chat app Waltz was using appears to be a modified version of Signal called TM SGNL, made by a company that copies messaging apps but adds an ability to retain messages and archive them. The White House officials may be using the modified Signal in order to comply with the legal requirement that presidential records be preserved... That function suggests the end-to-end encryption that makes Signal trusted for sharing private communications is possibly "not maintained, because the messages can be later retrieved after being stored somewhere else", according to 404 Media.
Thursday the national security adviser was removed from his position, the article points out.

He was instead named America's ambassador to the United Nations.
The Military

Army Will Seek Right To Repair Clauses In All Its Contracts (404media.co) 49

An anonymous reader quotes a report from 404 Media: A new memo from Secretary of Defense Pete Hegseth is calling on defense contractors to grant the Army the right-to-repair. The Wednesday memo is a document about "Army Transformation and Acquisition Reform" that is largely vague but highlights the very real problems with IP constraints that have made it harder for the military to repair damaged equipment.

Hegseth made this clear at the bottom of the memo in a subsection about reform and budget optimization. "The Secretary of the Army shall identify and propose contract modifications for right to repair provisions where intellectual property constraints limit the Army's ability to conduct maintenance and access the appropriate maintenance tools, software, and technical data -- while preserving the intellectual capital of American industry," it says. "Seek to include right to repair provisions in all existing contracts and also ensure these provisions are included in all new contracts." [...]

The memo would theoretically mean that the Army would refuse to sign contracts with companies that make it difficult to fix what it sells to the military. The memo doesn't carry the force of law, but subordinates do tend to follow the orders given within. The memo also ordered the Army to stop producing Humvees and some other light vehicles, and Breaking Defense confirmed that it had.
"This is a victory in our work to let people fix their stuff, and a milestone on the campaign to expand the Right to Repair. It will save the American taxpayer billions of dollars, and help our service members avoid the hassle and delays that come from manufacturers' repair restrictions," Isaac Bowers, the Federal Legislative Director of U.S. PIRG, said in a statement.
Microsoft

Microsoft Vows Legal Fight Against US To Protect European Cloud Customers (ft.com) 49

Microsoft has pledged to take the US government to court if necessary [alternative source] to protect European customers' access to its cloud services, as concerns mount over potential technology disruptions under President Donald Trump. Brad Smith, Microsoft's president and vice-chair, announced five "digital commitments" to Europe on Wednesday, responding to regional anxieties following Trump's temporary suspension of military support to Ukraine.

"We as a company need to be a source of digital stability during a period of geopolitical volatility," Smith said. The commitments include contesting any government order to cease European cloud services through legal channels and establishing European oversight of its continental operations. Microsoft will increase its European data center capacity by 40% over the next two years, expanding in 16 countries with investments of "tens of billions of dollars" annually. The Seattle-based company, which derives more than a quarter of its business from Europe, becomes the first major American tech firm to proactively address European concerns amid escalating trade tensions.
Robotics

Soft Vine-Like Robot Helps Rescuers Find Survivors In Disaster Zones (mit.edu) 15

New submitter MicroBitz shares a report: SPROUT, short for Soft Pathfinding Robotic Observation Unit, is a flexible, vine-like robot developed by MIT Lincoln Laboratory in collaboration with the University of Notre Dame. Unlike rigid robots or static cameras, SPROUT can "grow" into tight, winding spaces that are otherwise inaccessible, giving first responders a new way to explore, map and assess collapsed structures. Beyond disaster response, the technology could be adapted for inspecting military systems or critical infrastructure in hard-to-reach places, making SPROUT a versatile tool for a variety of high-stakes scenarios. "The urban search-and-rescue environment can be brutal and unforgiving, where even the most hardened technology struggles to operate. The fundamental way a vine robot works mitigates a lot of the challenges that other platforms face," says Chad Council, a member of the SPROUT team, which is led by Nathaniel Hanson.

"The mechanical performance of the robots has an immediate effect, but the real goal is to rethink the way sensors are used to enhance situational awareness for rescue teams," adds Hanson. "Ultimately, we want SPROUT to provide a complete operating picture to teams before anyone enters a rubble pile."

You can see the SPROUT vine robot in action in a YouTube video from MIT Lincoln Laboratory.
AI

Google's DeepMind UK Team Reportedly Seeks to Unionize (techcrunch.com) 36

"Google's DeepMind UK team reportedly seeks to unionize," reports TechCrunch: Around 300 London-based members of Google's AI-focused DeepMind team are seeking to unionize with the Communication Workers Union, according to a Financial Times report that cites three people involved with the unionization effort.

These DeepMind employees are reportedly unhappy about Google's decision to remove a pledge not to use AI for weapons or surveillance from its website. They're also concerned about the company's work with the Israeli military, including a $1.2 billion cloud computing contract that has prompted protests elsewhere at Google.

At least five DeepMind employees quit, according to the report (out of a 2,000 total U.K. staff members).

"A small group of around 200 employees of Google and its parent company Alphabet previously announced that they were unionizing," the article adds, "though as a union representing just a tiny slice of the total Google workforce, it lacked the ability to collectively bargain."
China

China Shares Rare Moon Rocks With US (bbc.co.uk) 45

Longtime Slashdot reader AmiMoJo shares a report from the BBC: China will let scientists from six countries, including the U.S., examine the rocks it collected from the Moon -- a scientific collaboration that comes as the two countries remain locked in a bitter trade war. Two NASA-funded U.S. institutions have been granted access to the lunar samples collected by the Chang'e-5 mission in 2020, the China National Space Administration (CNSA) said on Thursday. CNSA chief Shan Zhongde said that the samples were "a shared treasure for all humanity," local media reported.

Chinese researchers have not been able to access NASA's Moon samples because of restrictions imposed by U.S. lawmakers on the space agency's collaboration with China. Under the 2011 law, Nasa is banned from collaboration with China or any Chinese-owned companies unless it is specifically authorized by Congress. But John Logsdon, the former director of the Space Policy Institute at George Washington University, told BBC Newshour that the latest exchange of Moon rocks have "very little to do with politics." While there are controls on space technology, the examination of lunar samples had "nothing of military significance," he said. "It's international cooperation in science which is the norm."

Android

New Android Spyware Is Targeting Russian Military Personnel On the Front Lines (arstechnica.com) 29

An anonymous reader quotes a report from Ars Technica: Russian military personnel are being targeted with recently discovered Android malware that steals their contacts and tracks their location. The malware is hidden inside a modified app for Alpine Quest mapping software, which is used by, among others, hunters, athletes, and Russian personnel stationed in the war zone in Ukraine. The app displays various topographical maps for use online and offline. The trojanized Alpine Quest app is being pushed on a dedicated Telegram channel and in unofficial Android app repositories. The chief selling point of the trojanized app is that it provides a free version of Alpine Quest Pro, which is usually available only to paying users.

The malicious module is named Android.Spy.1292.origin. In a blog post, researchers at Russia-based security firm Dr.Web wrote: "Because Android.Spy.1292.origin is embedded into a copy of the genuine app, it looks and operates as the original, which allows it to stay undetected and execute malicious tasks for longer periods of time. Each time it is launched, the trojan collects and sends the following data to the C&C server:

- the user's mobile phone number and their accounts;
- contacts from the phonebook;
- the current date;
- the current geolocation;
- information about the files stored on the device;
- the app's version."

If there are files of interest to the threat actors, they can update the app with a module that steals them. The threat actors behind Android.Spy.1292.origin are particularly interested in confidential documents sent over Telegram and WhatsApp. They also show interest in the file locLog, the location log created by Alpine Quest. The modular design of the app makes it possible for it to receive additional updates that expand its capabilities even further.

Space

Space Investor Sees Opportunities in Defense-Related Startups and AI-Driven Systems (yahoo.com) 12

Chad Anderson is the founder/managing partner of the early-stage VC Space Capital (and an investor in SpaceX, along with dozens of other space companies). Space Capital produces quarterly reports on the space economy, and he says today, unlike 2021, "the froth is gone. But so is the hype. What's left is a more grounded — and investable — space economy."

On Yahoo Finance he shares several of the report's insights — including the emergence of "investable opportunities across defense-oriented startups in space domain awareness, AI-driven command systems, and hardened infrastructure." The same geopolitical instability that's undermining public markets is driving national urgency around space resilience. China's simulated space "dogfights" prompted the US Department of Defense to double down on orbital supremacy, with the proposed "Golden Dome" missile shield potentially unleashing a new wave of federal spending...

Defense tech is on fire, but commercial location-based services and logistics are freezing over. Companies like Shield AI and Saronic raised monster rounds, while others are relying on bridge financings to stay afloat...

Q1 also saw a breakout quarter for geospatial artificial intelligence (GeoAI). Software developer Niantic launched a spatial computing platform. SkyWatch partnered with GIS software supplier Esri. Planet Labs collaborated with Anthropic. And Xona Space Systems inked a deal with Trimble to boost precision GPS. This is the next leg of the space economy, where massive volumes of satellite data is finally made useful through machine learning, semantic indexing, and real-time analytics.

Distribution-layer companies are doing more with less. They remain underfunded relative to infrastructure and applications but are quietly powering the most critical systems, such as resilient communications, battlefield networks, and edge-based geospatial analysis. Don't let the low round count fool you; innovation here is quietly outpacing capital.

The article includes several predictions, insights, and possible trends (going beyond the fact that defense spending "will carry the sector...")
  • "AI's integration into space (across geospatial intelligence, satellite communications, and sensor fusion) is not a novelty. It's a competitive necessity."
  • "Focusing solely on rockets and orbital assets misses where much of the innovation and disruption is occurring: the software-defined layers that sit atop the physical backbone..."
  • "For years, SpaceX faced little serious competition, but that's starting to change." [He cites Blue Origin's progress toward approval for launching U.S. military satellites, and how Rocket Lab and Stoke Space "have also joined the competition for lucrative government launch contracts." Even Relativity Space may make a comeback, with former GOogle CEO Eric Schmidt acquiring a controlling stake.]
  • "An infrastructure reset is coming. The imminent ramp-up of SpaceX's Starship could collapse the cost structure for the infrastructure layer. When that happens, legacy providers with fixed-cost-heavy business models will be at risk. Conversely, capital-light innovators in station design, logistics, and in-orbit servicing could suddenly be massively undervalued."

Japan

Why the 'Weakest Samurai Warlord' Is Admired To This Day 34

New research suggests Oda Ujiharu, long derided as feudal Japan's most ineffective military leader, may have been mischaracterized. The Sengoku-period daimyo, who ruled from Oda Castle in present-day Ibaraki Prefecture, lost his fortress an unprecedented nine times to rival clans -- but recaptured it eight times, often with inferior forces.

"His refusal to accept defeat and his iron will to get up and keep fighting is why many historians reject the 'weakest samurai warlord' nickname and instead refer to him as 'The Phoenix,'" notes the research published in Tokyo Weekender. While Ujiharu's battlefield decisions appear strategically baffling -- repeatedly abandoning castle defenses for open combat -- some researchers propose these actions were deliberately taken to protect peasant settlements from the devastation of prolonged sieges. From the article: Ujiharu's blind charges may actually have had a noble purpose. Japanese battles involving castles almost always turned into sieges, and those always ended the same way: with the nearby fields and peasant settlements being either destroyed to try and draw the lord out of the castle or looted to feed the occupying army. Some researchers believe that Ujiharu was trying to avoid a siege to save his subjects. Despite numerous military setbacks, Ujiharu maintained remarkable loyalty from his subordinates. Historical records indicate that after his initial campaigns, attempts to bribe or threaten his retainers to defect consistently failed.

The daimyo demonstrated considerable diplomatic acumen, forming multiple alliances with former enemies throughout his career. His downfall came only after hesitating to pledge allegiance to Toyotomi Hideyoshi during Japan's unification, resulting in his lands being confiscated.
Australia

Q-CTRL Unveils Jam-Proof Positioning System That's 50x More Accurate Than GPS (interestingengineering.com) 101

schwit1 shares a report from Interesting Engineering: Australia's Q-CTRL developed a new system called "Ironstone Opal," which uses quantum sensors to navigate without GPS. It's passive (meaning it doesn't emit signals that could be detected or jammed) and highly accurate. Instead of relying on satellites, Q-CTRL's system can read the Earth's magnetic field, which varies slightly depending on location (like a magnetic fingerprint or map). The system can determine where you are by measuring these variations using magnetometers. This is made possible using the company's proprietary quantum sensors, which are incredibly sensitive and stable. The system also comes with special AI-based software, which filters out interference like vibrations or electromagnetic noise (what they call "software ruggedization"). The system is small and compact and could, in theory, be installed in drones or cars and, of course, aircraft.

Q-CTRL ran some live tests on the ground and in the air to validate the technology. As anticipated, they found that it could operate completely independently of GPS. Moreover, the company reports that its quantum GPS was 50 times more accurate than traditional GPS backup systems (like Inertial Navigation Systems or INS). The systems also delivered navigation precision on par with hitting a bullseye from 1,000 yards. Even when the equipment was mounted inside a plane, where interference is much worse, it outperformed existing systems by at least 11x. This is the first time quantum technology has been shown to outperform existing tech in a real-world commercial or military application, a milestone referred to as achieving "quantum advantage."

Intel

Intel To Sell Majority Stake In Altera For $4.46 Billion To Fund Revival Effort (cnbc.com) 15

Intel will sell a 51% stake in its Altera programmable chip unit to private equity firm Silver Lake for $4.46 billion, aiming to cut costs, raise cash, and streamline the company's focus as it shifts toward becoming a contract chip manufacturer. CNBC reports: The deal, announced on Monday, values Altera at $8.75 billion, a sharp decline from the $17 billion Intel paid in 2015. [...] Since last year, Intel has taken steps to spin Altera out as a separate unit and said it planned to sell a portion of its stake. "Today's announcement reflects our commitment to sharpening our focus, lowering our expense structure and strengthening our balance sheet," [CEO Lip-Bu Tan], who took the helm after former top boss Pat Gelsinger's ouster, said.

Altera makes programmable chips that can be used for various purposes from telecom equipment to military. Reuters had first reported in November that Silver Lake was among potential suitors competing for a minority stake in Altera. The deal is expected to close in the second half of 2025, after which Intel expects to deconsolidate Altera's financial results from Intel's financial statements, the company said.

The Military

NATO Inks Deal With Palantir For Maven AI System (defensescoop.com) 31

An anonymous reader quotes a report from DefenseScoop: NATO announced Monday that it has awarded a contract to Palantir to adopt its Maven Smart System for artificial intelligence-enabled battlefield operations. Through the contract, which was finalized March 25, the NATO Communications and Information Agency (NCIA) plans to use a version of the AI system -- Maven Smart System NATO -- to support the transatlantic military organization's Allied Command Operations strategic command. NATO plans to use the system to provide "a common data-enabled warfighting capability to the Alliance, through a wide range of AI applications -- from large language models (LLMs) to generative and machine learning," it said in a release, ultimately enhancing "intelligence fusion and targeting, battlespace awareness and planning, and accelerated decision-making." [...] NATO's Allied Command Operations will begin using Maven within the next 30 days, the organization said Monday, adding that it hopes that using it will accelerate further adoption of emerging AI capabilities. Palantir said the contract "was one of the most expeditious in [its] history, taking only six months from outlining the requirement to acquiring the system."
EU

EU Issues US-bound Staff With Burner Phones Over Spying Fears (ft.com) 70

The European Commission is issuing burner phones and basic laptops to some US-bound staff to avoid the risk of espionage [non-paywalled source], a measure traditionally reserved for trips to China. Financial Times: Commissioners and senior officials travelling to the IMF and World Bank spring meetings next week have been given the new guidance, according to four people familiar with the situation. They said the measures replicate those used on trips to Ukraine and China, where standard IT kit cannot be brought into the countries for fear of Russian or Chinese surveillance.

"They are worried about the US getting into the commission systems," said one official. The treatment of the US as a potential security risk highlights how relations have deteriorated since the return of Donald Trump as US president in January. Trump has accused the EU of having been set up to "screw the US" and announced 20 per cent so-called reciprocal tariffs on the bloc's exports, which he later halved for a 90-day period.

At the same time, he has made overtures to Russia, pressured Ukraine to hand over control over its assets by temporarily suspending military aid and has threatened to withdraw security guarantees from Europe, spurring a continent-wide rearmament effort. "The transatlantic alliance is over," said a fifth EU official.

China

WSJ Says China 'Acknowledged Its Role in U.S. Infrastructure Hacks' (msn.com) 48

Here's an update from the Wall Street Journal about a "widespread series of alarming cyberattacks on U.S. infrastructure."

China was behind it, "Chinese officials acknowledged in a secret December meeting... according to people familiar with the matter..." The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan, the people, who declined to be named, said... U.S. officials went public last year with unusually dire warnings about the uncovered Volt Typhoon effort. They publicly attributed it to Beijing trying to get a foothold in U.S. computer networks so its army could quickly detonate damaging cyberattacks during a future conflict. [American officials at the meeting perceived the remarks as "intended to scare the U.S. from involving itself if a conflict erupts in the Taiwan Strait."]

The Chinese official's remarks at the December meeting were indirect and somewhat ambiguous, but most of the American delegation in the room interpreted it as a tacit admission and a warning to the U.S. about Taiwan, a former U.S. official familiar with the meeting said... In a statement, the State Department didn't comment on the meeting but said the U.S. had made clear to Beijing it will "take actions in response to Chinese malicious cyber activity," describing the hacking as "some of the gravest and most persistent threats to U.S. national security...."

A Chinese official would likely only acknowledge the intrusions even in a private setting if instructed to do so by the top levels of Xi's government, said Dakota Cary, a China expert at the cybersecurity firm SentinelOne. The tacit admission is significant, he said, because it may reflect a view in Beijing that the likeliest military conflict with the U.S. would be over Taiwan and that a more direct signal about the stakes of involvement needed to be sent to the Trump administration. "China wants U.S. officials to know that, yes, they do have this capability, and they are willing to use it," Cary said.

The article notes that top U.S. officials have said America's Defense Department "will pursue more offensive cyber strikes against China."

But it adds that the administration "also plans to dismiss hundreds of cybersecurity workers in sweeping job cuts and last week fired the director of the National Security Agency and his deputy, fanning concerns from some intelligence officials and lawmakers that the government would be weakened in defending against the attacks."
Businesses

Pentagon Axes $5.1 Billion in IT and Consulting Contracts With Accenture, Deloitte 104

Defense Secretary Pete Hegseth has ordered the termination of multiple IT and consulting contracts with firms including Accenture, Deloitte, and Booz Allen Hamilton, describing them as "wasteful spending."

A Department of Defense memo indicates the cuts target the Defense Health Agency's consulting services contract and the Air Force's agreement with Accenture to "re-sell third-party Enterprise Cloud IT Services," services the government can "already fulfill directly with existing procurement resources."

The terminations also include 11 other contracts supporting "non-essential" activities like DEI programs, climate initiatives, and COVID-19 response efforts. The cuts represent $5.1 billion in spending and will yield nearly $4 billion in savings, according to Hegseth. The funds will be redirected toward "critical priorities to Revive the Warrior Ethos, Rebuild the Military, and Reestablish Deterrence," with Hegseth noting the money would better serve "healthcare for our warfighters and their families, instead of $500 an hour business process consultant."

Slashdot Top Deals