“GPS and other Global Navigation Satellite Systems (GNSS) are used in everything from cellular communication networks, to basic consumer goods, high-end military systems, and stock trading inputs. But these systems are vulnerable: by attacking positioning, navigational, and timing (PNT) data through electronic warfare (EW) capabilities, state and non-state actors can cause significant damage to modern militaries, major economies, and everyday consumers alike. With recent technological advances, the tools and methodologies for conducting this interference are now at a high risk for proliferation. GNSS attacks are emerging as a viable, disruptive strategic threat.
In this report, we present findings from a year-long investigation ending in November 2018 on an emerging subset of EW activity: the ability to mimic, or “spoof,” legitimate GNSS signals in order to manipulate PNT data. Using publicly available data and commercial technologies, we detect and analyze patterns of GNSS spoofing in the Russian Federation, Crimea, and Syria that demonstrate the Russian Federation is growing a comparative advantage in the targeted use and development of GNSS spoofing capabilities to achieve tactical and strategic objectives at home and abroad. We profile different use cases of current Russian state activity to trace the activity back to basing locations and systems in use.”“Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria.” C4ADS.org. April 2019.
“Even before Barr releases the report, those planning on reading it would do well to reflect on what it is — and what it is not. It is, by regulation, a report on the prosecutions and declinations the Mueller team took during their tenure.
It is not supposed to be, contrary to many claims, a report on everything that Mueller discovered. Already there have been hints that it will not include the second half of Rod Rosenstein’s mandate to Mueller — to figure out the nature of links between Trump’s team and Russia. If that stuff is excluded, then it probably will get reported, secretly, to the Intelligence Committees and no further. That’s important because the stuff that would compromise Trump — but would not necessarily implicate him in a crime — may by definition not show up in this report (though the stuff specifically relating to Trump may show up in the obstruction case).
Finally, it’s unclear how much Mueller will include about referrals and ongoing investigations. I expect he’ll include descriptions of the things he and Rosenstein decided deserved further prosecutorial scrutiny but did not fit under the narrow rubric of whether Trump’s team coordinated or conspired with the Russian government on the hack-and-leak.”
—Marcy Wheeler, “How to Read the Mueller Report.” emptywheel.net. April 15, 2019.
Nice overview of the origins and evolution of cybercrime from 2000 to present.
When the United States does it, it’s to spread “democracy,” natch.
“Explore the Facebook ads purchased by Russia-linked agents to influence the 2016 U.S. presidential election. This tool unravels the contradictory messages used to target people across the political spectrum, discourage voter turnout and increase hostility.”
“…a deeply comprehensive timeline detailing what actually happened and what’s still happening in the ever-changing story of the president, his inner circle and a web of Russian oligarchs, hackers and government officials.
Since first launched in February 2017, the Trump-Russia Timeline has grown to more than 600 entries — and we will continue to add updates regularly.”
—Steven Harper, “Interactive Timeline: Everything We Know About Russia and President Trump.” BillMoyers.com. Last updated, January 31, 2018.