Performing high-energy physics experiments can get very expensive, a fact that attracts debate on public funding for scientific research. But the reality is that scientists often work very hard to stretch their funding as far as they can. This is why we need informative and entertaining stories like Gizmodo’s How Physicists Recycled WWII Ships and Artillery to Unlock the Mysteries of the Universe.
The military have specific demands on components for their equipment. Hackers are well aware MIL-SPEC parts typically command higher prices. That quality is useful beyond their military service, which lead to how CERN obtained large quantities of a specific type of brass from obsolete Russian naval ordnance.
The remainder of the article shared many anecdotes around Fermilab’s use of armor plate from decommissioned US Navy warships. They obtained a mind-boggling amount – thousands of tons – just for the cost of transport. Dropping the cost of high quality steel to “only” $53 per ton (1975 dollars, ~$250 today) and far more economical than buying new. Not all of the steel acquired by Fermilab went to science experiments, though. They also put a little bit towards sculptures on the Fermilab campus. (One of the few contexts where 21 tons of steel can be considered “a little bit”.)
Continue reading “Military Surplus Repurposed for High Energy Physics”
Just in case you’re one of the people out there who still doesn’t believe in “the cyber” — it appears that the Russian military served malicious cell-phone apps to the Ukrainian army that allowed them to track a particular artillery cannon.
The legitimate version of the Android app helped its operator use the 1960’s-era former Soviet howitzer. The trojanized version of this application did just the same, except it also phoned home to Russian military intelligence with its location. In addition to giving the Russian army valuable information about troop movements in general, it also led to the destruction of 80% of the cannons in question over two years.
The cited article goes into depth about how certain it is that a hacking group, referred to as FANCY BEAR, are nearly certainly responsible for the attack. The exploit has fingerprints that are not widely known outside of the security research community, and the use of the exploit against the Ukrainian army pretty much ties FANCY BEAR to the Russian military.
This is also the same exploit that was used against the Democratic National Committee in the United States. Attribution is one of the hardest parts of white-hat hacking — attackers don’t want to be found and will leave misleading clues when they can — but the use of the same proprietary malware in these two attacks is pretty convincing evidence that Russian military intelligence has also hacked into US political parties and NGOs.
(Banner image by Vitaly Kuzmin, CC-BY-SA 3.0.)