Germany says cut undersea data cables were sabotaged

According to the New York Times, Boris Pistorius, Germany’s defense minister, believes that undersea cables connecting Finland and Germany that were severed on Monday were not damaged by accident, the New York Times reports. Another cable connecting Lithuania and Sweden was also cut on Sunday. The internet connection between these countries remains active despite disruptions.

Pistorius said that “nobody believes these cables were severed by accident,” and he thinks anchors dropped from ships wouldn’t damage the cables like this. He claimed it was sabotage, but admitted he doesn’t yet have solid proof for this assertion.

Germany and Finland have released a joint statement, mentioning that a “thorough investigation” is ongoing. The statement also directly names Russia as a threat to European security while the country wages war against Ukraine. Cables aren’t the only potential targets — hybrid warfare, which includes cyberattacks and propaganda generation, is a looming threat.

This September, the US issued a warning of possible undersea cable sabotage following increased Russian military naval activity near crucial cables. Sweden, Denmark, Norway and Finland have also spotted potential Russian spy ships around these cables and wind farms in Nordic waters last year. NATO’s Allied Maritime Command (MARCOM) had warned Europeans in April about potential Russian hybrid warfare targeting pipelines and cables, The Guardian reports. After extended reconnaissance and planning, Russia may be finally carrying out sabotage plans on these cables.

As for the recently cut cables, we’ll have to wait for the investigations to conclude before being able to pin Russia as the culprit with more certainty. Besides Germany and Finland, Lithuania is conducting its own investigation but hasn’t yet made a statement about the damaged cable connecting it to Sweden.

This article originally appeared on Engadget at https://www.engadget.com/general/germany-says-cut-undersea-data-cables-were-sabotaged-154554172.html?src=rss

Discord leaker Jack Teixeira gets 15-year sentence for sharing classified documents

Massachusetts Air National Guard member Jack Teixeira received a 15-year sentence in federal prison for leaking classified military documents on Discord in a Boston federal court, according to The Washington Post.

Teixeira appeared before the court earlier today and asked the judge for leniency. He also issued a statement apologizing for “all of the harm that I’ve caused, to my friends, family and those overseas.”

Defense attorney Michael Bachrach also claimed that Teixeira was subjected to bullying in high school and his military unit as an adjudicating factor for his actions. Judge Indira Talwani didn’t buy the defense’s bullying claims stating that the Air Force has already disciplined 15 other members connected to Teixeira for not taking more actions “that might have stopped him from doing this.”

Teixeira shared classified military documents as far back as late 2022 on a Discord server dedicated to the pixelated sandbox game Minecraft. The leak included information about the Ukrainian and Russian troop movements and military equipment used in the war in Ukraine and Russia's attempts to obtain more weapons from Egypt and Turkey. The documents eventually found their way to other Discord servers as well as 4chan and Telegram.

FBI officials arrested Teixeira at his home in April of last year. Teixeira originally agreed to a plea deal with federal prosecutors in March that included a 16-year prison sentence for pleading guilty to six counts of willful retention and transmission of national defense information and violating the Espionage Act. If he stuck with his not guilty plea and received a guilty verdict, Teixeira faced a much steeper maximum prison term of 60 years.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/discord-leaker-jack-teixeira-gets-15-year-sentence-for-sharing-classified-documents-231319586.html?src=rss

China sanctions US drone maker Skydio in ongoing trade war

China has sanctioned Skydio, America’s largest drone maker, for providing unmanned aerial vehicles to Taiwan’s national fire service. Skydio CEO Adam Bry publicly acknowledged the sanctions on Wednesday. “A few weeks ago, China announced sanctions on Skydio for selling drones to Taiwan, where our only customer today is the National Fire Agency,” Bry wrote in a blog post.

As first reported by the Financial Times, the ban has sent Skydio racing to find alternative battery suppliers. Although the company manufactures its drones in the US and sources many of the components that go inside of them from outside of China, Skydio had been wholly dependent on a single Chinese provider for batteries before October 11, when the country’s government imposed the embargo.

According to Bry, the company has a “substantial stock” of power cells on hand, but those supplies won’t be enough to prevent near-term rationing, and the alternate suppliers Skydio is working to engage won’t “come online until the spring of next year.” Subsequently, future shipments of the company’s flagship X10 drone (pictured above) will only come with one battery for the time being.

Among the customers Skydio has been contracted to provide X10 drones to was Ukraine’s military, which planned to use the UAV for reconnaissance missions. Before the sanctions, Ukraine had requested thousands of X10 units, according to the Financial Times.

Skydio’s relationship with Taiwan may have only been a pretext for the sanctions. “We suspect Skydio was targeted by Beijing because it is likely seen as a competitor to DJI,” a US official told the Financial Times. “If there is a silver lining, we can use this episode to accelerate our work to diversify drone supply chains away from … China.”

DJI, it should be mentioned, has long been in the crosshairs of the US government. In mid-October, the Chinese drone maker filed a lawsuit against the Department of Defense over a decision the Pentagon made to designate it as a “Chinese military company.” Earlier in the year, DJI narrowly avoided a national ban when the US Senate released its version of the 2025 National Defense Authorization Act.

This article originally appeared on Engadget at https://www.engadget.com/general/china-sanctions-us-drone-maker-skydio-in-ongoing-trade-war-144507154.html?src=rss

China sanctions US drone maker Skydio in ongoing trade war

China has sanctioned Skydio, America’s largest drone maker, for providing unmanned aerial vehicles to Taiwan’s national fire service. Skydio CEO Adam Bry publicly acknowledged the sanctions on Wednesday. “A few weeks ago, China announced sanctions on Skydio for selling drones to Taiwan, where our only customer today is the National Fire Agency,” Bry wrote in a blog post.

As first reported by the Financial Times, the ban has sent Skydio racing to find alternative battery suppliers. Although the company manufactures its drones in the US and sources many of the components that go inside of them from outside of China, Skydio had been wholly dependent on a single Chinese provider for batteries before October 11, when the country’s government imposed the embargo.

According to Bry, the company has a “substantial stock” of power cells on hand, but those supplies won’t be enough to prevent near-term rationing, and the alternate suppliers Skydio is working to engage won’t “come online until the spring of next year.” Subsequently, future shipments of the company’s flagship X10 drone (pictured above) will only come with one battery for the time being.

Among the customers Skydio has been contracted to provide X10 drones to was Ukraine’s military, which planned to use the UAV for reconnaissance missions. Before the sanctions, Ukraine had requested thousands of X10 units, according to the Financial Times.

Skydio’s relationship with Taiwan may have only been a pretext for the sanctions. “We suspect Skydio was targeted by Beijing because it is likely seen as a competitor to DJI,” a US official told the Financial Times. “If there is a silver lining, we can use this episode to accelerate our work to diversify drone supply chains away from … China.”

DJI, it should be mentioned, has long been in the crosshairs of the US government. In mid-October, the Chinese drone maker filed a lawsuit against the Department of Defense over a decision the Pentagon made to designate it as a “Chinese military company.” Earlier in the year, DJI narrowly avoided a national ban when the US Senate released its version of the 2025 National Defense Authorization Act.

This article originally appeared on Engadget at https://www.engadget.com/general/china-sanctions-us-drone-maker-skydio-in-ongoing-trade-war-144507154.html?src=rss

President Biden sets up new AI guardrails for military, intelligence agencies

The White House issued its first national security memorandum outlining the use of artificial intelligence for the military and intelligence agencies. The White House also shared a shortened copy of the memo with the public.

The new memo sets up guidelines for military and intelligence agencies for using AI in its day-to-day operations. The memo sets a series of deadlines for agencies to study the applications and regulations of AI tools, most of which will lapse following President Biden’s term. The memo also aims to limit “the most dystopian possibilities, including the development of autonomous weapons,” according to the New York Times.

National Security Adviser Jake Sullivan announced the new directive today at the National Defense University as part of a talk on AI’s presence in government operations. Sullivan has been one of the President’s most vocal proponents for examining the benefits and risks of AI technology. He also raised concerns about China’s use of AI to control its population and spread misinformation and how the memo can spark conversations with other countries grappling with implementing its own AI strategies.

The memorandum establishes some hard edges for AI usage especially when it comes to weapons systems. The memo states that AI can never be used as a decision maker for launching nuclear weapons or assigning asylum status to immigrants coming to the US. It also prohibits AI from tracking anyone based on their race or religion or determining if a suspect is a known terrorist without human intervention.

The memo also lays out protections for private-sector AI advance as “national assets that need to be protected…from spying or theft by foreign adversaries,” according to the Times. The memorandum orders intelligence agencies to help private companies working on AI models secure their work and provide updated intelligence reports to project their AI assets.

This article originally appeared on Engadget at https://www.engadget.com/ai/president-biden-sets-up-new-ai-guardrails-for-military-intelligence-agencies-201752211.html?src=rss

DeepMind workers urge Google to drop military contracts

Google DeepMind workers have signed a letter calling on the company to drop contracts with military organizations, according to a report by Time. The document was drafted on May 16 of this year. Around 200 people signed the document, which amounts to five percent of the total headcount of DeepMind. 

For the uninitiated, DeepMind is one of Google’s AI divisions and the letter states that adopting military contracts runs afoul of the company’s own AI rules. The letter was sent out as internal concerns began circulating within the AI lab that the tech was allegedly being sold to military organizations via cloud contracts.

According to Time, Google’s contracts with the United States military and the Israeli military allow access to services via the cloud, and this reportedly includes AI technology developed by DeepMind. The letter doesn’t linger on any specific military organization, with workers emphasizing that it’s “not about the geopolitics of any particular conflict.” 

Reporting since 2021 has slowly revealed the scope of tech supplied by Google (and Amazon) to the Israeli government via a partnership known as Project Nimbus. This is far from the first instance of Google employees openly protesting their work being used to support politically fraught military aims — the company fired dozens of staffers who spoke out against Project Nimbus earlier this year.

“Any involvement with military and weapon manufacturing impacts our position as leaders in ethical and responsible AI, and goes against our mission statement and stated AI principles,” the DeepMind letter says. It’s worth noting that Google’s slogan used to be “don’t be evil.”

The letter goes on to ask DeepMind’s leaders to deny military users access to its AI technology and to set up a new in-house governance body to prevent the tech from being used by future militaries. According to four unnamed employees, Google has yet to offer a tangible response to the letter. “We have received no meaningful response from leadership,” one said, “and we are growing increasingly frustrated.”

Google did respond to Time’s reporting, saying that it complies with its AI principles. The company says that the contract with the Israeli government “is not directed at highly sensitive, classified or military workloads relevant to weapons or intelligence services.” However, its partnership with the Israeli government has fallen under plenty of scrutiny in recent months

Google purchased DeepMind back in 2014, but under the promise that its AI technology would never be used for military or surveillance purposes. For many years, DeepMind was allowed to operate with a good amount of independence from its parent company, but the burgeoning AI race looks to have changed that. The lab's leaders spent years seeking greater autonomy from Google, but were rebuffed in 2021.

This article originally appeared on Engadget at https://www.engadget.com/ai/deepmind-workers-urge-google-to-drop-military-contracts-190544509.html?src=rss

North Korean who used ransomware to attack US healthcare providers has been indicted

A grand jury in Kansas City has indicted Rim Jong Hyok, a North Korean intelligence operative who allegedly used ransomware to attack health providers' systems in the US, according to AP News. The State Department said Rim is part of a group called Andariel that's controlled by the North Korean intelligence agency, the Reconnaissance General Bureau. Rim is not in the US government's custody. The agency is now offering a $10 million reward for information that would lead to his location or the location of a foreign operative who "engages in certain malicious cyber activities against US critical infrastructure."

A Kansas medical center alerted the FBI about an attack that blocked personnel's access to patient files and lab test results, as well as prevented them from operating hospital equipment with their computers, was back in 2021. It's a common MO of Rim's Andariel group, which would infiltrate a computer system and infect it with Maui ransomware. The group would then ask their target for payment and would threaten to release sensitive information if they don't pay up. In the Kansas hospital's case, the group demanded a ransom in Bitcoin worth $100,000 within 48 hours. The group allegedly used the money it gets to buy more computers and servers to fund more cyberattacks. 

The FBI, the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of the Treasury issued a joint cybersecurity warning in the midst of Andariel's attacks on healthcare providers in 2022. "The North Korean state-sponsored cyber actors likely assume healthcare organizations are willing to pay ransoms because these organizations provide services that are critical to human life and health," they wrote. Federal investigators said they followed the ransom the Kansas medical center paid across blockchains and found that someone had transferred the Bitcoin to an address belonging to two Hong Kong nationals. Based on the court documents seen by AP, the money was then transferred to a Chinese bank and withdrawn from an ATM in China close to the Sino-Korean Friendship Bridge connecting the country to North Korea. 

Andariel and Rim are being accused of infiltrating 17 entities across 11 states, including four defense contractors, two US Air Force bases and NASA. The group was reportedly able to stay in NASA's computer system for three months and steal 17 gigabytes of classified information. During one of its operations that targeted a US defense contractor in November 2022, the State Department said the group was also able to extract over 30 gigabytes of data that include information on the material used in US military aircraft and satellites. 

This article originally appeared on Engadget at https://www.engadget.com/north-korean-who-used-ransomware-to-attack-us-healthcare-providers-has-been-indicted-140008610.html?src=rss

German Navy looks to replace its outdated floppy disk system for its frigate fleet

The German Navy is in need of a serious upgrade for its fleet of submarine frigates and we’re not talking about a digital upload or some kind of software patch. The country’s fleets of submarine frigates have operated on old-fashioned, 8-inch floppy disks since they were commissioned back in the 1990s.

Now the German Navy is trying to find a way to replace the outdated disk system that are “vital to the running of its Brandenburg class F123 frigates,” according to Tom’s Hardware.

Replacing the floppy disk system won’t be an easy task. These disks pretty much control everything on the ships from airflow systems to power generation. Does the German Navy still use Palm Pilots to organize its codewords and Tamagotchi to train its recruits in marine wildlife preservation?

Saab has been in charge of maintenance for Germany’s F123 frigate fleet since 2021, according to a press release. The frigates are designed to hunt for submarines so they’re also getting upgrades for its weapons and weapon control systems. Hopefully, they’ll also throw in one of those cool, luxurious night panel dashboards for free.

A lot of government institutions and programs have been on the floppy disk system for decades and long after the outdated computer storage system has fallen out of general use. Japan’s Digital Agency announced at the beginning of the month that it eliminated the use of floppy disks in its government systems. Does that mean that somewhere in the world, a core government agency is still using those Commodore cassette tapes to store its most vital data? Let's hope those disks aren't tied to nuclear weapons access... like they were in the US.

This article originally appeared on Engadget at https://www.engadget.com/german-navy-looks-to-replace-its-outdated-floppy-disk-system-for-its-frigate-fleet-211609734.html?src=rss

Russia can reportedly jam Ukraine’s access to Starlink at will

Russia has reportedly found new, more effective ways to knock out Ukraine’s Starlink service. The New York Times said on Friday that the increased interference has disrupted communications at critical moments and is posing “a major threat to Ukraine,” putting the country further on its heels more than two years into the war. How Russia is jamming Elon Musk’s satellite internet terminals is unclear.

The New York Times said Russia’s ability to jam communications has thrown off Ukraine’s ability to communicate, gather intelligence and conduct drone strikes. Ukrainian soldiers told the paper that jammed Starlink service stunts their ability to communicate quickly, leaving them scrambling to send text messages (often extremely slowly) to share intel about incoming or ongoing Russian maneuvers or attacks.

The jamming was reportedly repeated across Ukraine’s northern front line, often coinciding with Russian advances. The new outages are the first time Russia has jammed Starlink reception that widely and frequently. If it continues, it could “mark a tactical shift in the conflict,” highlighting Ukraine’s dependence on SpaceX’s internet technology. Without competing choices of similar quality, Volodymyr Zelenskyy’s democratic nation is left without many options that could work at the scale Ukraine needs.

Russia has tried to disrupt Ukraine’s comms since the war began, but Starlink service has reportedly held up well in the face of them. Something has changed. Ukraine’s digital minister, Mykhailo Federov, told The New York Times this week that Russia’s recent jamming appeared to use “new and more advanced technology.”

Federov told The NYT that Vladimir Putin’s army is now “testing different mechanisms to disrupt the quality of Starlink connections because it’s so important for us.” The digital minister didn’t specify the exact weapons Russia has been using, but a Russian official in charge of the country’s electronic warfare told state media last month that its military put Starlink on a “list of targets” and that it had developed ways to disrupt the service.

Ukraine President Volodymyr Zelenskyy sitting on steps with a partial smile on his face.
Ukraine President Volodymyr Zelenskyy
Armed Forces of Ukraine

The disruptions highlight the power that one mercurial billionaire can have over the pivotal Eastern European war. Ukrainian officials have reportedly “appealed directly to Mr. Musk to turn on Starlink access during military operations” ahead of crucial drone strikes, and he hasn’t always obliged.

The Wall Street Journal reported in February that concern has grown that Musk could harbor at least some degree of Russian sympathies. He has posted comments on X that could be viewed as taking a pro-Russian stance, and disinformation experts worry that the way he runs the social platform could be friendly to Russian interference in the pivotal 2024 elections, including those in the US.

Musk spoke out earlier this year against the US sending more aid to Ukraine. Putin’s army also reportedly began using its own Starlink service, although Musk says he wasn’t aware of the terminals being sold to the Slavic nation. Ukrainian officials raised concerns earlier this year that Russia was buying Starlink tech from third-party vendors.

However, the Pentagon said earlier this month that the US has been “heavily involved in working with the government of Ukraine and SpaceX to counter Russian illicit use of Starlink terminals,” and a departing space official described SpaceX as “a very reliable partner” in those operations.

This article originally appeared on Engadget at https://www.engadget.com/russia-can-reportedly-jam-ukraines-access-to-starlink-at-will-183642120.html?src=rss

The UK’s Ministry of Defence was hacked, and the country is reportedly blaming China

China is accused of hacking the payroll system for the United Kingdom's Ministry of Defence. The BBC and Sky News report that the severe data breach exposed the personal information of active military personnel and veterans. The information mainly consists of full names and bank details, but in some cases, it might also include personal addresses.

Affected individuals are being notified, and Defence Secretary Grant Shapps should provide MPs with a more detailed update today. He is anticipated to outline a plan of action for protecting anyone whose data was compromised. All salaries are expected to be paid as usual this month.

In a statement, China's foreign minister said the country "firmly opposes and fights all forms of cyber attacks" and "rejects the use of this issue politically to smear other countries." However, this isn't the first time the UK and China have clashed over security concerns. In March, UK Deputy Prime Minister Oliver Dowden accused China of being behind an August 2021 hack of the Electoral Commission, as the BBC reported at the time. The UK also banned TikTok — owned by Chinese tech company ByteDance — from all government devices in March 2023, claiming protective measures.

This article originally appeared on Engadget at https://www.engadget.com/the-uks-ministry-of-defence-was-hacked-and-the-country-is-reportedly-blaming-china-121954779.html?src=rss