Earth

UN Watchdog Warns Russia Bombardment Endangers Ukraine's Nuclear Security, Calls for Restraint (cnbc.com) 89

The U.N.'s nuclear watchdog on Wednesday warned Russia's onslaught of Ukraine is raising the risk of nuclear accidents, calling for restraint from all actions that could jeopardize the safe operations of Ukraine's nuclear facilities. From a report: It comes as Russia's war with Ukraine enters its seventh day, with fighting raging across the country. The International Atomic Energy Agency said Russia's invasion of Ukraine marks the first time a military conflict has taken place amidst the facilities of a large and established nuclear power program -- which in this case includes the site of the world's worst nuclear disaster at the Chornobyl Nuclear Power Plant in 1986. "The situation in Ukraine is unprecedented and I continue to be gravely concerned," IAEA Director General Rafael Mariano Grossi said in an introductory statement to the 35-nation Board of Governors. "The safety and security of nuclear facilities, and nuclear and other radioactive material, in Ukraine must under no circumstances be endangered."
United Kingdom

UK Rejects Russian Space Agency's Demands for Launch of OneWeb Internet Satellites (cnbc.com) 118

The corporate internet space race has taken a geopolitical turn. Russian space agency Roscosmos is refusing to launch the next batch of 36 OneWeb internet satellites Friday, unless the company meets the state agency's demands. From a report: Roscosmos head Dmitry Rogozin particularly emphasized that the ultimatum is a response to the U.K. sanctioning Russia over its invasion of Ukraine. Roscosmos said in a statement that the Soyuz rocket will be removed from the launchpad at Baikonur Cosmodrome in Kazakhstan unless OneWeb meets two demands:

1.The U.K. government sells its stake in the company.
2. OneWeb guarantees that the satellites not be used for military purposes.
U.K. Business and Energy Secretary Kwasi Kwarteng said in a statement that there is "no negotiation" with Roscosmos about OneWeb and that the government "is not selling its share." Kwarteng added, "we are in touch with other shareholders to discuss next steps."
Security

Russian Cybersecurity Giant Kaspersky Tries To Maintain Neutrality During Ukraine War (vice.com) 161

An anonymous reader quotes a report from Motherboard, written by Joseph Cox: Around the same time Russian forces launched a massive rocket into a square in Kharkiv, Ukraine's second-largest city, killing and wounding an as of yet unknown number of people, Eugene Kaspersky, head of his namesake Russian cybersecurity firm, tweeted that he hoped negotiations between Ukraine and Russia would lead to "a compromise." The statement encapsulates the company's position since Russia invaded Ukraine six days ago -- that of attempted neutrality in a war where silence or fence sitting is implicitly siding with the Russian forces. In another statement to Motherboard sent on Monday, the company said "As a technology and cybersecurity service provider the company is not in a position to comment or speculate on geopolitical developments outside of its area of expertise."

Kaspersky is one of the best-known Russian companies, and for years its antivirus product has been among the most used in the world. The antivirus software also harvests telemetry data for Kaspersky's researchers who can then use that to identify and counter new threats. Its researchers are some of the best in the world, with its Global Research & Analysis Team (GReAT) regularly publishing leading research on various government malware operations. Famously the company first revealed details of a U.S. government hacking group that it dubbed Equation Group. Kaspersky has also researched suspected Russian government linked hackers. Eugene's tweet also brings something else to the surface again: how much is Kaspersky, the company, influenced by the Russian government, even if indirectly? As a Russian firm operating in Moscow under Russian laws, it may feel the need to toe the line on Russian issues.

Kaspersky's company statement on Monday added that "Kaspersky is focused on its mission to build a safer world. For 25 years, the company delivers deep threat intelligence and security expertise that is constantly transforming into innovative security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. Kaspersky's business operations remain stable. The company guarantees the fulfillment of its obligations to partners and customers -- including product delivery and support and financial transaction continuity. The global management team is monitoring the situation carefully and is ready to act very quickly if needed." Kaspersky may not currently feel it is in a position to speculate or take a position on the invasion of Ukraine. But with a 40 mile long Russian military convoy making its way to Kyiv, and with the prospect of more cyber attacks playing a role in the invasion, Kaspersky may need to take a side.

Microsoft

Microsoft Detected 'Destructive Cyberattacks' Against Ukraine Hours Before Russian Invasion (geekwire.com) 26

Microsoft says it began detecting "destructive cyberattacks directed against Ukraine's digital infrastructure" several hours before the Russian military began launching missiles or moving tanks into the country last week. From a report: The disclosure Monday, part of a larger blog post about Ukraine by Microsoft President Brad Smith, provides a glimpse of how cyber-warfare is being used as part of the ongoing invasion. The company says it is giving ongoing guidance to the Ukrainian government about cyberthreats as the situation unfolds. Smith also outlined the company's efforts to combat state-sponsored disinformation campaigns, ensuring that its platforms are not displaying or distributing any content or apps from Russia's state-sponsored RT and Sputnik news organizations, in line with a recent European Union decision. He wrote that there's "a well-orchestrated battle ongoing in the information ecosystem where the ammunition is disinformation, undermining truth and sowing seeds of discord and distrust," he wrote.
Government

Russian Government Sites Facing 'Unprecedented' Cyberattacks from Thousands in Pro-Ukranian 'IT Army' (msn.com) 116

Though the Russian government has tried geofencing access to crucial web sites, the Jerusalem Post reports that two Russian government web site still went offline Saturday — the Kremlin and the Ministry of Defense. "Gosuslugi, Russia's web portal of state services, went offline on Saturday night as well, with the Russian Ministry of Digital Development, Communications and Mass Media telling TASS that the site is facing cyberattacks on an 'unprecedented scale.'"

Meanwhile, the Washington Post interviews 22-year-old Alex Horlan, a Ukrainian cybersecurity expert in Spain "helping take down some of Russia's most powerful websites — including state media and even the official page of the Kremlin." The attacks he and others are helping to carry out on Russian websites are part of a wide information war in the background of the much larger conflict here, as Ukrainians target Russian websites to rewrite the narrative Moscow is presenting to Russians back home. "We are creating an IT army," Ukrainian Vice Prime Minister Mykhailo Fedorov tweeted on Saturday. Horlan is a cybersecurity expert who recently launched an app called disBalancer that helps take down scam websites by overwhelming them with online traffic. He has redirected his team's efforts in recent days to instead target Russian websites he says are spreading dangerous disinformation about the Russian invasion of Ukraine....

Thousands of people are joining Horlan and others' efforts to target the Russian sites, with around 2,000 logging into his app at any given time, he said. The main challenge is that many are losing WiFi when air raid sirens force them to retreat to underground bunkers....

Volunteers are gathering information on attacks and casualties to fact check and challenge Russia's version of events, posting messages on Telegram and other Russian social media platforms [according to Liuba Tsbulska, a Ukrainian analyst and activist who has tracked Russian disinformation for eight year]. Others work to educate international audiences or produce patriotic content. Some also target Russian military and intelligence officers, flooding their emails and other platforms with messages. Volunteers are reaching out to the mothers of Russian soldiers to convince them to call for Russian President Vladimir Putin to bring their boys back home.

In Kharkiv, after reports that Russian troops and armored vehicles entered Ukraine's second largest city early Sunday, one local Telegram channel with more than 400,000 subscribers urged people to continue to document the adversary's movements as a way to aid Ukraine's forces in the area. In one message, the Truha Kharkiv channel asked citizens to "carefully film and send information about the movement of Russian troops to our channel. This is vital to the defense of our city."

Another message instructed citizens on how to make molotov cocktails.

Medicine

Epstein-Barr Virus May Be Leading Cause of Multiple Sclerosis (harvard.edu) 32

Harvard's School of Public Health has an announcement...

"Multiple sclerosis (MS), a progressive disease that affects 2.8 million people worldwide and for which there is no definitive cure, is likely caused by infection with the Epstein-Barr virus (EBV), according to a study led by Harvard T.H. Chan School of Public Health researchers."

Epstein-Barr virus has already been linked to some forms of cancer. But now, as the New York Times put it, "New research proves a virus — one that almost all of us have — 'causes' multiple sclerosis." (More than 90% of adults have the Epstein-Barr virus, and "The very ubiquity of Epstein-Barr has made it especially difficult to isolate as a causal factor...") Researchers from the Harvard T.H. Chan School of Public Health and elsewhere, however, devised a novel way to carry out that study, and they published their findings in January in Science. U.S. military recruits, a group of more than 10 million people, are screened for H.I.V. when their service starts and biennially thereafter. Their blood serum samples are then archived in the Department of Defense Serum Repository and can be retested for other pathogens. Between 1993 and 2013, the researchers identified cases of M.S. among active-duty U.S. military personnel. Then they tested their first serum sample; their last sample before M.S. onset; and one in between. They found that of 801 soldiers with M.S., 800 were positive for Epstein-Barr....

"In practical terms, if you're not infected with E.B.V., your risk of M.S. is virtually zero," says Alberto Ascherio, a professor of epidemiology and nutrition at Harvard and a senior author of the Science study. "After infection, your risk jumps by over 30-fold." The odds of that increase having occurred by chance are less than one in a million....

That was the strongest evidence yet that Epstein-Barr initiates M.S., but it didn't explain why. Just over a week after the Science paper came out, though, Robinson and colleagues published their own paper in Nature that demonstrated how the virus triggers the disease in some people. Epstein-Barr produces proteins that mimic a protein in the myelin sheath, they found; when the immune system makes antibodies to attack the virus, they also attack the myelin — "the insulation around your neurons," as Robinson puts it. "Like electrical wires, if the insulation gets stripped off, it short-âcircuits," he says. "That's what results in M.S."

This protein mix-up, though, can only explain about a quarter of M.S. cases. And while the Science paper concludes that Epstein-Barr is the "leading cause" of M.S., Cohen says he wants to be careful with the word "cause." He thinks the study proves that the virus is a necessary precondition for M.S., but the fact that so many people have Epstein-Barr and so few of them get M.S. demonstrates that other factors, very likely including genetic susceptibility, must play a significant role in the development of the disease....

What is exciting about the discovery that Epstein-Barr is necessary for M.S. is that it raises the prospect that a vaccine could prevent that disease — as well as other serious conditions — even if we never understand precisely why the virus behaves as it does in a given individual.

Thanks to long-time Slashdot reader Thelasko for sharing the news!
Bitcoin

How a US Tech Firm Struggled to Get Its Employees Out of Kyiv (washingtonpost.com) 167

On Friday the Washington Post's live updates on the Russia-Ukraine situation included the story of a tech firm trying to get its employees out of Kyiv: John Sung Kim, chief executive of the software outsourcing company JetBridge, has been communicating with his 24 employees in Kyiv, all software developers, through Slack. Half of them are trying to leave Ukraine, but Kim says he is struggling to help them and has been unable to get them train tickets, a rental car or gasoline.

"The other half of my team wants to stay and fight," said Kim. "I got on an all-hands with them this morning and told them it's not their responsibility to be soldiers and there's other ways they can contribute since they're software engineers, but there's nothing I can say to dissuade them." Kim said JetBridge's clients are almost exclusively Silicon Valley tech companies that are publicly traded or have raised venture capital financing. "The universal issue other than transportation logistics seems to be grandparents. 'My babushka' is the common theme of why they're torn from actually leaving," he said. The fallout from Russia's invasion has also impacted JetBridge's employees in Belarus. "The males in Belarus are scared that there's going to be military conscription, and unlike the Ukrainians, my Belarusian engineers have zero desire to pick up a rifle. Zero," he said.

In anticipation of European Union sanctions on Belarus, Kim said JetBridge has started paying employees in bitcoin.

The Military

Viral 'Ghost of Kyiv' Video Is From Simulation Game (snopes.com) 33

A viral video showing the "Ghost of Kyiv" shooting down a Russian fighter yet was created with Digital Combat Simulator, "a simulation game that was first released in 2008," reports fact-checking website Snopes. From the report: The video was originally posted to YouTube by âoeComrade_Corb.â The original caption identified this clip as a simulation and noted that it was created as an homage to the Ghost of Kyiv. This footage is from DCS, but is nevertheless made out of respect for âoeThe Ghost of Kiev.â If he is real, may God be with him; if he is fake, I pray for more like "him."

When this video was posted to other social media sites, it was miscaptioned as genuine footage of the Ghost of Kyiv. While this video does not feature genuine footage, the general of the Ukrainian armed forces claimed that they had truly downed several Russian aircraft. CNN reported: "The General Staff of the Ukrainian Armed Forces has claimed five Russian aircraft and a helicopter were shot down early Thursday, as Russian forces attacked Ukraine. The Russian military has denied the claims, state news agency TASS reported on Thursday."

Further reading: 'The Ghost of Kyiv' is the first urban legend of Russia's invasion of Ukraine.
The Almighty Buck

Roblox Currency 'Robux' Is Outperforming the Ruble (vice.com) 36

An anonymous reader quotes a report from Motherboard: As of this writing, the Ruble is worth about 0.012 U.S. dollars. The Robux, the money people use to buy things in Roblox, is worth about 0.0125. This means that the Robux has slightly more buying power than the Russian ruble. The Russian economy has been in decline for some time, but both the Ruble and its main stock index took a nose dive on Thursday after Russia invaded Ukraine. As trading began that day, the Ruble collapsed and the Russian equities index, the MOEX, fell 45 percent. Both are in flux and have recovered some of their losses, but the situation with the Ruble is so dire that the Russian central bank has decided to step in and prop it up.
EU

NATO Secretary-General Warns Cyberattacks Could Trigger Article 5 (nbcnews.com) 73

NATO Secretary-General Jens Stoltenberg said Friday that cyberattacks could trigger Article 5 of the organization's charter, the so-called "commitment clause" that considers an attack on any NATO ally an attack on all. NBC News reports: Stoltenberg's comment comes as national security professionals and cybersecurity industry professionals remain on high alert for any major attacks. While conflict on the ground in Ukraine continues to escalate, little has been seen thus far in terms of major cyberwar activities. Still, some hacker and activist groups have sprung into action. One ransomware group announced Friday that it supported the Russian government and would respond to cyberattacks on Russia by going after "critical infrastructures of an enemy." As for attacks on Ukraine, the country's computer emergency response team said Friday that it had seen a large email phishing campaign from Belarus targeted at military personnel. The statement comes amid a major cyberattack on Nvidia that was initiated at the same time as the Russian cyber warfare division started their offensive against Ukraine. Security researchers are concerned that somebody could put something malicious in one of the software updates that are then sent out to Nvidia's clients.
News

Radiation Spike at Chernobyl's Nuclear Power Plant Seized by Russian Forces (bbc.com) 128

A radiation spike has been recorded near Chernobyl's nuclear power plant which has been seized by Russian forces, monitoring data shows. BBC: Invading Russian troops took control of the plant - the site of the world's worst nuclear disaster in 1986 - on Thursday, Ukraine said. Radiation levels increased about 20-fold on Thursday, monitoring stations there reported. But experts say another major nuclear disaster there is "extremely unlikely." The rise was caused by heavy military vehicles stirring contaminated soil in the 4,000-sq-km (2,485 sq-mile) exclusion zone surrounding the abandoned plant, Ukraine's State Nuclear Regulatory Inspectorate reported. The biggest spike was recorded close to the damaged reactor. Radiation levels are continuously monitored there -- measured as a dose that you would receive per hour in a location. Close to the reactor, you would normally receive a dose of about three units -- called microsieverts -- every hour. But on Thursday, that jumped to 65 microSv/hrs -- about five times more than you would get on one transatlantic flight.
Security

Ukraine Says Belarusian Hackers Are Targeting Its Defense Forces (techcrunch.com) 29

Ukrainian cybersecurity officials have warned that Belarusian state-sponsored hackers are targeting the private email addresses of Ukrainian military personnel. From a report: Announcing the activity in a Facebook post, Ukraine's Computer Emergency Response Team (CERT-UA) said that a mass phishing campaign is targeting the private i.ua and meta.ua accounts belonging to Ukrainian military personnel. "After the account is compromised, the attackers, by the IMAP protocol, get access to all the messages," it added. "Later, the attackers use contact details from the victim's address book to send the phishing emails." CERT-UA has attributed the ongoing campaign to the UNC1151 threat group, which Mandiant formally linked to the Belarusian government in November 2021. Mandiant also linked the state-backed cyber-espionage group to the Ghostwriter disinformation campaign, which has been involved in spreading anti-NATO rhetoric and hack-and-leak operations throughout Europe. "The Minsk-based group 'UNC1151' is behind these activities. Its members are officers of the Ministry of Defence of the Republic of Belarus," CERT-UA wrote.
Google

Google Faces Sanctions Dilemma With Pro-Russia YouTube Channels (bloomberg.com) 122

With sanctions on Russia ramping up following its invasion of Ukraine, Google's YouTube is under pressure to remove or cut commercial ties with some of its most prolific pro-Russian channels. From a report: The online video giant has a massive reach in Russia and has long been a popular platform for both government critics and state-backed media. But now officials in the U.S., the U.K. and Europe are discussing restrictions that could target groups and people with huge audiences on the platform, creating a dilemma for the Alphabet-owned business. European Union sanctions, for instance, would target Vladimir Solovyov, a TV and radio journalist behind a YouTube channel with more than 1 million subscribers. An EU report issued on Wednesday said that "Solovyov is known for his extremely hostile attitude toward Ukraine and praise of the Russian government." A four-hour video livestream published overnight on his YouTube channel about the Russian military attacks had over 2.7 million views within its first nine hours. That video also ran advertisements, at least for U.S. viewers.
News

Russia Attacks Ukraine (nytimes.com) 637

Russia President Vladimir V. Putin declared the start of a "special military operation" in Ukraine on Thursday, after months of speculation about Russia's intentions as it massed tens of thousands of troops on Ukraine's border. The New York Times: Addressing his nation in a televised speech broadcast just before 6 a.m. Thursday, Mr. Putin said his goal was to "demilitarize" but not occupy the country. Minutes later, large explosions were visible near Kharkiv, Ukraine's second-largest city, and blasts were reported in Kyiv, the capital, and other parts of the country. Ukraine's Interior Ministry said that Russian troops had landed in Odessa and were crossing the border. "The invasion has begun," the ministry said in a statement.

Ukraine's foreign minister, Dmytro Kuleba, said on Twitter that Mr. Putin had "started a full-scale war against Ukraine" and had begun shelling civilian cities. "This is a war of aggression," he wrote on Twitter. "Ukraine will defend itself and win. The world must act and stop Putin. It is time to act -- immediately." Evoking the NATO bombing of Yugoslavia in 1999 and the American invasion of Iraq in 2003, Mr. Putin cast his action as a long-overdue strike against an American-led world order that he described as an "empire of lies." Even as he spoke, the United Nations Security Council held an emergency meeting imploring him not to invade.
In bellicose language, Putin also issued what appeared to be a warning to other countries: "Anyone who tries to interfere with us, or even more so, to create threats for our country and our people, must know that Russia's response will be immediate and will lead you to such consequences as you have never before experienced in your history. We are ready for any turn of events." More coverage: NBC News, The Guardian and The Moscow Times.
United States

'Pathetic' Performance Has Left US 'Well Behind' China in 5G Race, ex-Google CEO Eric Schmidt Says (cnbc.com) 98

The U.S. government's "dithering" has left the country "well behind" China in the race to build out 5G technology, former Google CEO Eric Schmidt said, as he urged Washington to step up investment in the next-generation internet technology. From a report: Writing in an op-ed in the Wall Street Journal, Schmidt and Graham Allison, a professor of government at Harvard, said that America is "far behind in almost every dimension of 5G while other nations -- including China -- race ahead." The authors urged the Biden administration to make 5G a "national priority." Otherwise, they said, "China will own the 5G future." 5G refers to next-generation wireless internet that promises super-fast download speeds. But it could also form the basis for industrial and military applications and form a way for devices to communicate with each other. That's why it's seen as a critical technology and one of the reasons China is moving quickly with its own 5G rollout and future applications.
Security

US Agencies Say Russian Hackers Compromised Defense Contractors (wired.com) 38

Hackers backed by the Russian government have breached the networks of multiple US defense contractors in a sustained campaign that has revealed sensitive information about US weapons-development communications infrastructure, the federal government said on Wednesday. Wired reports: The campaign began no later than January 2020 and has continued through this month, according to a joint advisory by the FBI, the National Security Agency, and the Cybersecurity and Infrastructure Security Agency. The hackers have been targeting and successfully hacking cleared defense contractors, or CDCs, which support contracts for the US Department of Defense and intelligence community. "During this two-year period, these actors have maintained persistent access to multiple CDC networks, in some cases for at least six months," officials wrote in the advisory. "In instances when the actors have successfully obtained access, the FBI, NSA, and CISA have noted regular and recurring exfiltration of emails and data. For example, during a compromise in 2021, threat actors exfiltrated hundreds of documents related to the company's products, relationships with other countries, and internal personnel and legal matters."

The exfiltrated documents included unclassified CDC-proprietary and export-controlled information. This information gives the Russian government "significant insight" into US weapons-platforms development and deployment timelines, plans for communications infrastructure, and specific technologies being used by the US government and military. The documents also include unclassified emails among employees and their government customers discussing proprietary details about technological and scientific research.

The hackers have used a variety of methods to breach their targets. The methods include harvesting network passwords through spear phishing, data breaches, cracking techniques, and exploitation of unpatched software vulnerabilities. After gaining a toehold in a targeted network, the threat actors escalate their system rights by mapping the Active Directory and connecting to domain controllers. From there, they're able to exfiltrate credentials for all other accounts and create new accounts. The hackers make use of virtual private servers to encrypt their communications and hide their identities, the advisory added. They also use "small office and home office (SOHO) devices, as operational nodes to evade detection."

Security

Ukraine's Military and Banks Hit By Apparent DDoS Cyberattack Campaign (cnet.com) 45

Ukraine's Ministry of Defense website suffered from what appeared to be a distributed denial of service attack Tuesday, according to the government's Facebook account. CNET reports: The military's website remained unavailable as of 12 p.m. PT Tuesday, with the Ukrainian military's Facebook account saying work is currently underway to restore regular functioning to the online portal. The nation's largest commercial bank, PrivatBank, has also been subjected to a "massive DDoS attack" for the past few hours, according to the Ukraine Center for Strategic Communications. There's no threat to customer funds stored at the bank, it said, though the attack is preventing customers from accessing the Privat24 application and viewing their balances. Online banking with Oschadbank is also down, the Center for Strategic Communications said, as reported earlier by Vice. Nobody has yet to be blamed for the attack, but as CNET notes, "it comes after Russia is believed to have mounted multiple cyberattacks on Ukraine as part of efforts that security experts say are designed to destabilize the country's government and economy."

UPDATE (2/16/2022): America's Undersecretary of State said Wednesday that "While we're still investigating and doing forensics along with the Ukrainians, I think what's most important is that these cyberattacks were not very successful," reports CNN, which adds that the official "credited Ukrainian officials for responding quickly and helping the websites recover."
The Military

US Army Turns To Microgrids, EVs To Hit Net Zero By 2050 (arstechnica.com) 95

An anonymous reader quotes a report from Ars Technica: The US Army released (PDF) its climate change strategy this week, and it's a lengthy document that shows how the largest and oldest branch of the military will not only prepare for climate change but will also zero out emissions from most of its operations and activities. The Army says that the goal isn't just to eliminate greenhouse gas emissions -- though that's a key outcome -- but also to make the force more resilient by "adapting infrastructure and natural environments to climate change risks." The strategy takes a multipronged approach toward addressing the climate threat, including overhauling the Army's installations and its acquisitions and logistics practices.

On just the facilities side, the Army buys more than $740 million of electricity every year, producing over 4.1 million metric tons of carbon pollution. To bring those numbers down while also improving its ability to operate when the grid goes down, the Army says it will install microgrids at each of its more than 130 installations by 2035. Already, 25 microgrids are "scoped and planned" through 2024. Microgrids are usually connected to the wider grid, though they can be easily cut off without losing power, allowing operations to continue if the connection is severed or the grid goes down. Currently, the Army is looking into solar, wind, and batteries to power microgrids.

On bases, myriad vehicles support day-to-day operations, and the new plan calls for the nontactical vehicle fleet to be all-electric by 2035. That includes everything from light trucks like Chevrolet Tahoes and Ford F-150s to massive prime movers like the "Dragon Wagon" and the HEMTT. Light-duty vehicles like the Tahoe are scheduled to be all-electric by 2027. Tactical vehicles, though, will take a bit longer. The Army hopes to hybridize them by 2035 before moving to all-electric in 2050. The plan doesn't spell out what it considers to be tactical vehicles, though the designation likely includes things like Humvees and MRAPs. Currently, there's no concrete plan for all-electric tanks and self-propelled artillery.
The Army's plan is also requiring it to "proactively train its people and prepare a force that is ready to operate in a climate-altered world," the document says.

Furthermore, a "Climate 101" course has been rolled out "to introduce fundamentals of climate science to base architects and garrison commanders, and it says it will update all of its training modules, exercises, and simulations to consider the impacts of climate change by 2028," adds Ars Technica. "The goal is to prepare the entire force for whatever conditions climate change presents, from severe weather to a thawing Arctic."
The Military

After 20 Years, the US Army Is Shutting Down Its Recruitment Video Game, 'America's Army' (fastcompany.com) 33

In the early 2000s, the U.S. Army released America's Army, a video game meant as a recruitment tool. "The free-to-play tactical shooter was wildly successful, reaching 20 million players," reports Fast Company. "But come May 5, the servers will be shut down -- and America's Army will surrender to the forces of time." From the report: To date, no industry has embraced games as warmly as the military, though. America's Army, for example, started with an initial budget of $7 million of your tax dollars at play -- and quickly grew from there. Recognizing that players know a quality title when they see one (and ignore and ridicule poor-quality efforts), it assembled a team of proven developers and bought a license for the Unreal Engine, which was (and remains) one of the premier game engines on the market. America's Army was only supposed to be a seven-year project, but its success encouraged the Defense Department to stay with the game, with the Pentagon spending more than $3 million a year to evolve and promote it -- a drop in the bucket compared to the overall $8 billion recruiting budget.

How well did it work? A 2008 study from the Massachusetts Institute of Technology found that "30% of all Americans ages 16 to 24 had a more positive impression of the Army because of the game and, even more amazingly, the game had more impact on recruits than all other forms of Army advertising combined." The end of America's Army is hardly the end of the military's use of games as recruiting tools. The Army has its own Twitch channel (with more than 23,000 followers) and has an e-sports team that competes at tournaments -- with recruiters in tow.

News

Russia Sentences Teens Over 'Terrorist' Plot To Blow Up Minecraft FSB Building (themoscowtimes.com) 98

A Russian court has sentenced three Siberian teenagers for terrorism Thursday for activities including plotting to blow up a virtual Federal Security Services (FSB) building in the popular online game Minecraft. From a report: Nikita Uvarov, Denis Mikhailenko and Bogdan Andreyev from Kansk, a town in Siberia's Krasnoyarsk region, were arrested in June 2020 for hanging up political leaflets on the local FSB office that included slogans such as "the FSB is the main terrorist" and support for Azat Miftakhov, an anarchist who was sentenced to six years in prison. All three suspects were 14 at the time of their arrest. The Eastern Military Court in Krasnoyarsk found Uvarov, Mikhailenko and Andreyev guilty of "undergoing training for the purpose of carrying out terrorist activities" on Thursday. Uvarov was sentenced to five years in a penal colony, while Mikhailenko and Andreyev were handed three and four-year suspended sentences.

Slashdot Top Deals