Stories
Slash Boxes
Comments

SoylentNews is people

Politics

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

posted by janrinok on Tuesday February 18, @02:29AM   Printer-friendly

DOGE as a National Cyberattack - Schneier on Security:

In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign espionage, but through official orders by a billionaire with a poorly defined government role. And the implications for national security are profound.

First, it was reported that people associated with the newly created Department of Government Efficiency (DOGE) had accessedtheUSTreasury computer system, giving them the ability to collect data on and potentially control the department's roughly $5.45 trillion in annual federal payments.

Then, we learned that uncleared DOGE personnel had gained access to classified data from the US Agency for International Development, possibly copying it onto their own systems. Next, the Office of Personnel Management—which holds detailed personal data on millions of federal employees, including those with security clearances—wascompromised. After that, Medicaid and Medicare records were compromised.

Meanwhile, only partially redacted names of CIA employees were sent over an unclassified email account. DOGE personnel are also reported to be feeding Education Department data into artificial intelligence software, and they have also started working at the Department of Energy.

This story is moving very fast. On Feb. 8, a federal judge blocked the DOGE team from accessing the Treasury Department systems any further. But given that DOGE workers have already copied data and possibly installed and modified software, it's unclear how this fixes anything.

In any case, breaches of other critical government systems are likely to follow unless federal employees stand firm on the protocols protecting national security.

The systems that DOGE is accessing are not esoteric pieces of our nation's infrastructure—they are the sinews of government.

For example, the Treasury Department systems contain the technical blueprints for how the federal government moves money, while the Office of Personnel Management (OPM) network contains information on who and what organizations the government employs and contracts with.

What makes this situation unprecedented isn't just the scope, but also the method of attack. Foreign adversaries typically spend years attempting to penetrate government systems such as these, using stealth to avoid being seen and carefully hiding any tells or tracks. The Chinese government's 2015 breach of OPM was a significant US security failure, and it illustrated how personnel data could be used to identify intelligence officers and compromise national security.

In this case, external operators with limited experience and minimal oversight are doing their work in plain sight and under massive public scrutiny: gaining the highest levels of administrative access and making changes to the United States' most sensitive networks, potentially introducing new security vulnerabilities in the process.

But the most alarming aspect isn't just the access being granted. It's the systematic dismantling of security measures that would detect and prevent misuse—including standard incident response protocols, auditing, and change-tracking mechanisms—by removing the career officials in charge of those security measures and replacing them with inexperienced operators.

The Treasury's computer systems have such an impact on national security that they were designed with the same principle that guides nuclear launch protocols: No single person should have unlimited power. Just as launching a nuclear missile requires two separate officers turning their keys simultaneously, making changes to critical financial systems traditionally requires multiple authorized personnel working in concert.

This approach, known as "separation of duties," isn't just bureaucratic red tape; it's a fundamental security principle as old as banking itself. When your local bank processes a large transfer, it requires two different employees to verify the transaction. When a company issues a major financial report, separate teams must review and approve it. These aren't just formalities—they're essential safeguards against corruption and error. These measures have been bypassed or ignored. It's as if someone found a way to rob Fort Knox by simply declaring that the new official policy is to fire all the guards and allow unescorted visits to the vault.

The implications for national security are staggering. Sen. Ron Wyden said his office had learned that the attackers gained privileges that allow them to modify core programs in Treasury Department computers that verify federal payments, access encrypted keys that secure financial transactions, and alter audit logs that record system changes. Over at OPM, reports indicate that individuals associated with DOGE connected an unauthorized server into the network. They are also reportedly trainingAI software on all of this sensitive data.

This is much more critical than the initial unauthorized access. These new servers have unknown capabilities and configurations, and there's no evidence that this new code has gone through any rigorous security testing protocols. The AIs being trained are certainly not secure enough for this kind of data. All are ideal targets for any adversary, foreign or domestic, also seeking access to federal data.

There's a reason why every modification—hardware or software—to these systems goes through a complex planning process and includes sophisticated access-control mechanisms. The national security crisis is that these systems are now much more vulnerable to dangerous attacks at the same time that the legitimate system administrators trained to protect them have been locked out.

By modifying core systems, the attackers have not only compromised current operations, but have also left behind vulnerabilities that could be exploited in future attacks—giving adversaries such as Russia and China an unprecedentedopportunity. These countries have long targeted these systems. And they don't just want to gather intelligence—they also want to understand how to disrupt these systems in a crisis.

Now, the technical details of how these systems operate, their security protocols, and their vulnerabilities are now potentially exposed to unknown parties without any of the usual safeguards. Instead of having to breach heavily fortified digital walls, these parties  can simply walk through doors that are being propped open—and then erase evidence of their actions.

The security implications span three critical areas.

First, system manipulation: External operators can now modify operations while also altering audit trails that would track their changes. Second, data exposure: Beyond accessing personal information and transaction records, these operators can copy entire system architectures and security configurations—in one case, the technical blueprint of the country's federal payment infrastructure. Third, and most critically, is the issue of system control: These operators can alter core systems and authentication mechanisms while disabling the very tools designed to detect such changes. This is more than modifying operations; it is modifying the infrastructure that those operations use.

To address these vulnerabilities, three immediate steps are essential. First, unauthorized access must be revoked and proper authentication protocols restored. Next, comprehensive system monitoring and change management must be reinstated—which, given the difficulty of cleaning a compromised system, will likely require a complete system reset. Finally, thorough audits must be conducted of all system changes made during this period.

This is beyond politics—this is a matter of national security. Foreign national intelligence organizations will be quick to take advantage of both the chaos and the new insecurities to steal US data and install backdoors to allow for future access.

Each day of continued unrestricted access makes the eventual recovery more difficult and increases the risk of irreversible damage to these critical systems. While the full impact may take time to assess, these steps represent the minimum necessary actions to begin restoring system integrity and security protocols.

Assuming that anyone in the government still cares.

This essay was written with Davi Ottenheimer, and originally appeared in Foreign Policy.

Posted on February 13, 2025 at 7:03 AM53 Comments


Original Submission

posted by janrinok on Saturday February 15, @09:09PM   Printer-friendly
from the Måke-Califørnia-Great-Ægain dept.

Several sites are noticing a joke (for now) petition for Denmark to take pesky California off the US' hands:

Have you ever looked at a map and thought, "You know what Denmark needs? More sunshine, palm trees, and roller skates." Well, we have a once-in-a-lifetime opportunity to make that dream a reality.

Let's buy California from Donald Trump!

Yes, you heard that right.

California could be ours, and we need your help to make it happen.

See also English language articles like "Danes offer to buy California to spite Trump's Greenland aims: 'We'll bring hygge to Hollywood'" at The Guardian and "Petition for Denmark to buy California for $1 trillion surpasses 200,000 signatures" at CBS, among others.

I think we need a "Humor" topic. Can you better this?


Original Submission

posted by janrinok on Friday February 14, @04:17PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

A federal judge appointed by a Republican President has castigated Trump administration officials — and ordered them to immediately restore public health websites that they abruptly abruptly shut down.

The lawsuit against the website removal, brought by a group of physicians known as Doctors for America, concerns sites operated by the Department of Health and Human Services, the Centers for Disease Control and Prevention and the Food and Drug Administration. Doctors for America says the scrubbing of the sites makes it more difficult for them to treat patients.

U.S. District Judge John Bates, appointed by George W Bush, agreed. He ordered the government to restore the pages by the end of the day of his ruling (Tuesday Feb. 11).

The TL;DR of Bates' ruling? It "was done without any public rationale, recourse or ability to challenge the decisions, despite laws and regulations that typically require them," as Politico summarized.

Sites removed by Trump officials concern HIV care, plus information on contraception drugs and student health. In their lawsuit filed against the Office for Personnel Management, HHS, CDC, and the FDA, Doctors for America says the removal of websites offering them guidance on these subjects is creating confusion, which eats up time that is better spent treating patients.

Justice Department attorneys defended the government's decision to remove the sites, saying doctors could still access the information by using the Wayback Machine, which archives offline websites. But that didn't fly with the judge.

"The Wayback Machine does not capture every webpage, and there is no information to suggest that is has archived each removed webpage," Bates wrote. "Additionally, pages archived on the Wayback Machine do not appear on search engines. In other words, a particular archived webpage is only viewable to a provider if the provider knows that the Wayback Machine exists and had recorded the pre-removal URL of the requested webpage."


Original Submission

posted by hubie on Saturday February 08, @06:32AM   Printer-friendly
from the Department-of-SEO dept.

News of mass immigration arrests has swept across the US over the past couple of weeks. Reports from Massachusetts to Idaho have described agents from Immigration and Customs Enforcement (Ice) spreading through communities and rounding people up. Quick Google searches for Ice operations, raids and arrests return a deluge of government press releases. Headlines include "ICE arrests 85 during 4-day Colorado operation", "New Orleans focuses targeted operations on 123 criminal noncitizens", and in Wisconsin, "ICE arrests 83 criminal aliens".

But The Guardian took a closer look at these Ice reports tells a different story.

All the archived Ice press releases soaring to the top of Google search results were marked with the same timestamp and read: "Updated: 01/24/2025".

So, it looks like rather than actually doing any immigration raids, they're simply changing the timestamps on [some] raids dating back to 2008 to claim credit again for raids they did long [ago]. Once again, hype over substance.


Original Submission

posted by hubie on Wednesday January 08, @02:08AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

The Federal Communications Commission's long-standing effort to establish stronger oversight of the internet was dealt a decisive blow this week when the Sixth Circuit Court of Appeals ruled that the FCC lacks the authority to regulate wireless and home broadband services under the same set of rules that have traditionally governed telephone service.

The court's decision hinged on the recent Supreme Court ruling that overturned the Chevron deference, a precedent that had previously granted federal agencies significant leeway in interpreting ambiguous statutory language. This ruling significantly curtailed the FCC's ability to implement and enforce net neutrality regulations.

Net neutrality, a principle that advocates for equal treatment of all internet traffic, has been a contentious issue in American politics for over a decade. The concept aims to prevent internet service providers from favoring certain websites or services over others – a practice that could potentially stifle competition and innovation.

The Obama administration introduced robust net neutrality rules in 2015, which were subsequently repealed in 2017 under the Trump administration. In 2021, President Biden signed an executive order calling for the reinstatement of these regulations. The FCC, under the leadership of Chairwoman Jessica Rosenworcel, voted to restore net neutrality rules in 2024.

The Sixth Circuit Court's decision effectively nullifies the FCC's Safeguarding Order, which would have reinstated net neutrality regulations. The court declared that broadband internet service providers offer only an "information service" as defined under current US law, and therefore, the FCC lacks the statutory authority to impose net neutrality policies through the "telecommunications service" provision of the Communications Act.

Furthermore, the court ruled that the FCC cannot classify mobile broadband as a "commercial mobile service," which would have allowed the agency to impose net neutrality regulations on those services. The Sixth Circuit explicitly cited the absence of Chevron deference in its ruling, stating that they no longer afford deference to the FCC's interpretation of the statute.

In response to the court's decision, Rosenworcel called on Congress to enshrine net neutrality principles in federal law – an acknowledgment that the FCC's regulatory efforts have reached an impasse.

On the other hand, Republican FCC Commissioner Brendan Carr, who is set to become the agency's chair later this month, praised the court's ruling. Carr criticized the Biden administration's approach, stating that their plan relied on "persuading Americans that the internet would break in the absence of these so-called 'net neutrality' regulations."

As for the future of net neutrality, the ball is now in Congress's court. However, given the current political landscape and the other pressing issues facing the government, it remains uncertain whether Congress will take up this challenge. With Carr poised to take the helm, it also seems unlikely that the agency will pursue further regulatory action on net neutrality.


Original Submission

posted by janrinok on Sunday December 29, @01:48AM   Printer-friendly
from the Pieces-in-our-time-.... dept.

Arthur T Knackerbracket has processed the following story:

This flavor of Scorched Earth has been dubbed the Broken Nest.

Elbridge Colby, the nominee for U.S. Undersecretary of Defense for Policy, is known to favor the destruction of Taiwan’s chip fabs in the event of a Chinese invasion. As recently as last year, Colby publicly asserted that “destroying TSMC” was imperative if an aggressive PRC attempted to capture these facilities, reports Datacenter Dynamics. Furthermore, the security policy professional asserts that TSMC’s destruction shouldn’t be left to Taiwan’s government or military.

Colby’s particular take on the Scorched Earth strategy has become known as the ‘Broken Nest’ deterrent, a term coined by a U.S. Army College paper in 2021. The full title of the paper is Broken Nest: Deterring China from Invading Taiwan, and though it is 15 pages long, you can understand the deterrent immediately from the title. A key thread throughout the paper is that China has started to find Taiwan more and more attractive as the island’s semiconductor prowess has grown, largely through TSMC's chipmaking abilities.

Would the Chinese Communist Party (mainland China, PRC) care so much about the relatively small earthquake and typhoon-prone island of Taiwan (ROC) if the semicon business were out of the equation? The linked paper thinks not, and Colby has echoed the paper’s central thrusts, repeatedly. Being unequivocal about TSMC’s destruction in the event of a Chinese invasion is thus extremely important in the minds of some policymakers.

“Disabling or destroying TSMC is table stakes if China is taking over Taiwan,” wrote Colby on Twitter/X earlier this year. “Would we be so insane as to allow the world's key semiconductor company fall untouched into the hands of an aggressive PRC?”

Disabling or destroying TSMC is table stakes if China is taking over Taiwan. Would we be so insane as to allow the world's key semiconductor company fall untouched into the hands of an aggressive PRC? Taiwanese should realize that would be *the least* of their problems. https://t.co/Z8qmKxjWe9 href="https://twitter.com/cantworkitout/status/1761514916224139737" data-url="https://twitter.com/cantworkitout/status/1761514916224139737" target="_blank" referrerpolicy="no-referrer-when-downgrade" data-hl-processed="none">February 24, 2024

However, destroying TSMC and other advanced semiconductor facilities might not be easy. China would likely make great efforts to shield these locations from any wider aggression. Moreover, in 2023, we learned that Taiwan’s Minister for National Defense, Chiu Kuo-cheng (邱國正), would not tolerate any U.S. attempts to destroy TSMC in the event of a war with China. If the US and China are in a high-stakes game of chicken, Taiwan isn't (or wasn't) playing.

Colby, who was picked by Trump as Undersecretary of Defense for Policy over the weekend, has some other views that could cause a stir across the Taiwan Strait. A report published by the Taiwan News this week says he would be in favor of pushing Taiwan to increase its defense spending from 2.5 to 5% of GDP. Interestingly, he also recently suggested that the U.S. should prioritize arming Taiwan rather than Ukraine. Europe should do more for its neighbor, he argued.


Original Submission

posted by janrinok on Thursday December 26, @11:57AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Investments in semiconductor manufacturing and innovation matter more than bans and sanctions.

U.S. Secretary of Commerce Gina Raimondo said in an interview that the country should focus more on investments in domestic innovation than applying bans and sanctions. “Trying to hold China back is a fool’s errand,” said the politician. She also added that the Biden administration’s CHIPS and Science Act, which led the country to spend more money on building out its chip infrastructure than the past 28 years combined, “matters more than export controls.” Nevertheless, the Wall Street Journal says President Biden still pushed for bans and sanctions against Chinese firms and even urged its allies, including the Netherlands and Japan, to stop China from acquiring advanced tech, especially those containing American tech.

“The only way to beat China is to stay ahead of them,” said Sec. Raimondo. “We have to run faster, out innovate them. That’s the way to win.” Despite the various export controls that the U.S. has applied against several Chinese companies, many of its companies are still able to procure banned chips through the black market and unofficial conduits. Aside from that, Chinese innovation is seemingly continuing, with many businesses and organizations forced to be creative in pursuing their goals despite the roadblocks posed by American sanctions.

Sec. Raimondo said these statements in the interview as President Trump is about to return to the White House in early 2025. The CHIPS and Science Act had bipartisan support when it passed Congress, and some states that are Republican strongholds have seen the benefits of the federal government’s investments. However, the incoming President was quoted saying in October, “That chip deal is so bad.” Instead of direct government funding, Trump spokesman Kush Desai said that he prefers “enacting tariffs, cutting taxes, slashing regulations, and unleashing American energy.”

Because of the uncertainty about the future of the CHIPS Act, many subsidy applicants are rushing to get their funding in place before January 20. Nevertheless, Trump plans to expedite permits for any company that plans to invest at least a billion dollars in the U.S., with some regulations and reviews potentially getting waived. This is likely the reason why SoftBank plans to invest $100 billion in AI and other technologies in the country. But even if Sec. Raimondo agrees that some regulations hold back the competitiveness of American industry, she still believes that Washington shouldn’t let companies act with impunity, even if they have a huge war chest.


Original Submission

posted by janrinok on Friday December 20, @11:49AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

We’ve noted for decades that U.S. telecom security and privacy standards aren’t great. T-Mobile has been hacked so many times in the last five years it’s easy to lose count. AT&T not long ago had a breach impacting the data of 73 million users it initially tried to pretend hadn’t happened.

Telecoms have lobbied relentlessly to dismantle much in the way of corporate oversight, so when hacks or breaches or bad choices manifest, executives and companies alike routinely see little in the way of real, meaningful accountability. Which, of course, ensures nothing much changes.

This all came to a head recently with the Salt Typhoon hack, which involved 8 major U.S. telecom operators suffering a major intrusion by Chinese hackers. The hack, oddly getting far less attention than the TikTok moral panic did, was leveraged to help spy on U.S. political officials. It was so severe and extensive that the involved, unnamed telecoms have yet to fully remove the intruders from their networks:

This is par for the course for a country that’s literally too corrupt to pass even a baseline privacy law for the internet era, or hold telecom giants meaningfully accountable for much of anything. At best, telecoms have grown fat and comfortable with a paradigm that involves a tiny fine and wrist slap for their incompetence, assuming they get challenged over it at all.

Enter Senator Ron Wyden, who is proposing a new law that would require the FCC to take broader ownership of telecom cybersecurity.

His Secure American Communications Act would more clearly establish FCC authority to monitor telecoms for privacy and cybersecurity violations, require they conduct routine testing of their networks and systems, and contract outside independent auditors to make sure they’re doing a competent job. They’d also have to submit formal annual reviews to the FCC.

“It was inevitable that foreign hackers would burrow deep into the American communications system the moment the FCC decided to let phone companies write their own cybersecurity rules,” Wyden said. “Telecom companies and federal regulators were asleep on the job and as a result, Americans’ calls, messages, and phone records have been accessed by foreign spies intent on undermining our national security. Congress needs to step up and pass mandatory security rules to finally secure our telecom system against an infestation of hackers and spies.”

Of course the last thing AT&T, Verizon, Comcast, T-Mobile and Charter want is additional (or any) government oversight, so even if perfectly designed to minimize headaches and problems, the bill likely has zero real chance of passing a corrupt Congress.

Telecoms want to be able to exploit their regional monopolies to extract money from captive customers free from pesky government intervention. Which, as Wyden notes, is precisely how we got to this point. It’s the same reason the U.S. still doesn’t have even a basic internet-era privacy law after decades of endless scandal, fraud, hacks, and consumer data abuses. It’s corruption.

The real bummer is we’re not only going to not pass Wyden’s law, we’re going to do the exact opposite of what Wyden’s requesting. Trump’s incoming FCC boss Brendan Carr (R, AT&T) has professed to be super worried about all of this. But has not been subtle about his plan to obliterate whatever’s left of broadband consumer protection and FCC oversight of telecom.

At the same time, the Trump stocked Supreme Court, 5th, and 6th circuits are all in the process of neutering regulatory independence (which is why Wyden proposed this clearer law that won’t pass), and declaring FCC broadband consumer protection effectively illegal across a wide variety of subjects. That’s going to impact national security as much as it impacts consumer welfare.

The goal for corporate power was always to corrupt Congress to the point that real reforms can’t pass, then lobotomize regulatory independence and corporate oversight so they’re largely decorative. This was sold to you as some kind of good faith “rebalancing of institutional power” designed to “corral out of control regulators,” but it’s really just the ultimate manifestation of unchecked corruption.

The endless hacks and privacy scandals will join a rotating parade of problems across every industry that touches every corner of your lives, until the U.S. press and public finally realize corporate power may have taken things just a little too far with the whole “dismantling the federal regulatory state” thing. Which, with any luck, might occur by 2070… if it happens at all.


Original Submission

posted by janrinok on Thursday December 19, @01:53AM   Printer-friendly
from the in-Latin-it's-Stibium dept.

An Idaho mine will be the only US source of the key mineral antimony after 18 years of permitting:

The Chinese government in recent weeks expanded its ban on exports of a handful of minerals found in critical military and energy technologies in America. The move puts a spotlight on America's domestic mineral supplies, many of which are locked in years-long federal permitting and regulatory reviews.

One such case is a project located at an abandoned gold mine in the heart of Idaho. That mine contains some of the nation's largest known deposits of the rare mineral antimony, which is among those affected by China's export restrictions. But after a staggering 14 years, the federal government has yet to give the Idaho project a green light to begin production.

Perpetua Resources, the developer of the Stibnite gold mine in Valley County, Idaho, first initiated study, engineering, and community engagement on the project in 2010. Since then, it has faced mountains of permit filings and lengthy environmental reviews conducted by at least five separate federal agencies.

Experts and legislators say the federal regulatory and permitting behemoth with which developers like Perpetua must contend is both costly and detrimental to American national security. And they have pointed to the project as an example of why they say Congress must take up permitting reform legislation as soon as possible.

"China has weaponized the world's mineral supply chains," Rich Nolan, the president and CEO of the National Mining Association, told the Washington Free Beacon. "Again and again, Beijing has reached for the minerals lever to exert geopolitical leverage."

[...] Antimony, like the other minerals targeted by China, has significant defense and energy applications—it is a key component of munitions, night-vision goggles, and military uniforms and is required for both utility-scale and electric vehicle batteries.

The United States, though, imports 100 percent of its antimony supplies, 63 percent of which comes from China. China supplies the international market with about half of its antimony.

According to Perpetua, the Stibnite mine—which contains roughly 67,000 metric tons of antimony—could account for 35 percent of the nation's antimony demand in its first six years of production and fulfill long-term defense needs.


Original Submission

posted by janrinok on Saturday November 16, @12:14AM   Printer-friendly
from the D'oh! dept.

https://arstechnica.com/tech-policy/2024/11/trump-says-elon-musk-will-lead-doge-a-new-department-of-government-efficiency/

President-elect Donald Trump today announced that a new Department of Government Efficiency—or "DOGE"—will be led by Elon Musk and former Republican presidential candidate Vivek Ramaswamy.

[...] DOGE apparently will not be an official federal agency, as Trump said it will provide advice "from outside" of government. But Musk, who has frequently criticized government subsidies despite seeking public money and obtaining various subsidies for his own companies, will apparently have significant influence over spending in the Trump administration.

[...] Trump's statement said the department, whose name is a reference to the Doge meme, "will drive out the massive waste and fraud which exists throughout our annual $6.5 Trillion Dollars of Government Spending." Trump said DOGE will "liberate our Economy" and that its "work will conclude no later than July 4, 2026" because "a smaller Government, with more efficiency and less bureaucracy, will be the perfect gift to America on the 250th Anniversary of The Declaration of Independence."

[...] The Wall Street Journal wrote today that "Musk isn't expected to become an official government employee, meaning he likely wouldn't be required to divest from his business empire."

Obligatory SolyentNews Articles:
Elon Musk Reveals Real Reason He Supports Dogecoin, Says Many People at Tesla and Spacex Own DOGE - 20211030
Dogecoin: Inside the Joke Cryptocurrency That Somehow Became Real - 20210222
Hacker Exploits Synology NAS Box Vulnerabity, Mines $620k in Dogecoin - 20140620


Original Submission