Monday, March 21, 2022

Cyberwar Is Coming - Is The World Ready?

INTELLECTUAL PROPERTY RIGHTS CONCERNS?? Ukrainian Soldier Moves To Trademark ‘Russian Warship, Go Fuck Yourself”

A story from Snake Island that Timothy Geigner in a report from Techdirt didn't see coming

Ukrainian Soldier Moves To Trademark ‘Russian Warship, Go Fuck Yourself”

Because Of Course

<div class=__reading__mode__extracted__imagecaption>The illustration by the artist Boris Groh received the most votes in a competition held by the Ukrainian postal service. Photograph: Ukrposhta<br>The illustration by the artist Boris Groh received the most votes in a competition held by the Ukrainian postal service. Photograph: Ukrposhta</div> 

Trademark

from the licensing-bravery dept

from the licensing-bravery dept

"Thanks to Vladimir Putin and his one-man show designed to educate the world on just what can happen when a murderous dictator decides to throw a fit, the news is chock full of Ukraine. This has included Techdirt’s pages, which really shouldn’t be that big of a surprise. Still, I will admit that I didn’t see the possibility of trademark-related stories coming out of the war.

Yet here we are. You may recall the name Roman Gribov. He was one of several soldiers stationed on Snake Island in the Black Sea. When Russian warships began their part of the assualt of their sovereign neighbor, those warships communicated with Gribov, demanding that he and his fellow soldiers surrender. While staring down the barrel of the Russian Navy, Gribov offered up what is now an iconic response: “Russian warship… go fuck yourself!

From there, the rebuttal took on meme status. Other attacks on Russian military assets were punctuated with versions of the phrase. Ukraine’s postal service created a commemorative stamp consisting of a sketch based on the quote. And thorughout the Western world, the phrase began showing up on t-shirts and other items.

Which perhaps partially explains why Gribov, through his family, is attempting to trademark the now iconic verbal middle finger.

WTR has learned that the soldier who uttered the ‘f*ck yourself’ phrase – with permission obtained from his family and the Ukrainian military – is seeking an EU trademark for the term (in both Cyrillic script and English). It was filed yesterday by Taras Kulbaba, founder and lawyer at Bukovnik & Kulbaba, and covers a variety of goods and services from clothing and bags to entertainment and NFTs.

With the safety of the soldier and his family in mind, Kulbaba took a relatively unusual approach when filing for the mark. “When we got in touch with both the military and his family with the idea for a trademark, they all approved but were also concerned that if the application had the family address, it would be dangerous and lead to people making their life hell,” he told WTR. “So after discussing it with both parties, we decided to file the application with the Snake Island address, because it was his place of domicile for quite a long period of time.”

A couple of comments on this. This Ukranian soldier is at the very least a badass and, for me frankly, something of a vulgar hero who perfectly fits my personal sensibilities. And it seems a great many people agree and wanted to spread his iconic message around. And, sure, some of those people are trying to make money off of the phrase.

But is any of this really deserving of trademark protection? You see this sort of thing with athletes sometimes, but at least they tend to have plans to use their marks in actual commerce. In this case, there was no plan to do so until others started making money off these words first...

[.  ] I want to see this soldier and his family get good things coming to them, now more than ever. But the above still isn’t the purpose of trademark law. The idea here isn’t that you say something that goes viral and then you trademark it to turn it into a licensing business. Instead, trademarks are supposed to keep customer confusion at bay when it comes to a source of a good. I find it hard to believe that anyone is out there buying these t-shirts thinking that a Ukrainian soldier previously stationed on Snake Island made them in his off-time.

It’s all just kind of a depressing coda to an otherwise inspiring story. Ukrainian Soldier Moves To Trademark ‘Russian Warship, Go Fuck Yourself” Because Of Course

Filed Under: , , , ,

READ MORE DETAILS >> https://www.techdirt.com/2022/03/18/ukrainian-soldier-moves-to-trademark-russian-warship-go-fuck-yourself-because-of-course/

Saudi Reportedly in Talks to Price Oil in Yuan

FOR WHAT IT'S WORTH: Competition for Control of Fossil Fuels Creates Cross-Border Weaponized Conflict

Intro: Keep in mind there are huge profits generated by wars and conflicts. There's a Kingdom in The Middle East named after the ruling House of Saud - a theocratic monarchy
Established in 1933, Saudi Aramco is the world's largest oil producer.
Officially known as Saudi Arabian Oil Company, the company is primarily state-owned and is based in Dhahran, Saudi Arabia.
According to Wikipedia, It is the world's most profitable company, eclipsing even tech giants such as Apple (AAPL) and Alphabet's Google (GOOGL).

Saudi Aramco’s 2021 profit more than doubles on higher oil prices

Saudi giant says its net income increased by 124 percent to $110bn in 2021, compared with $49bn in 2020.

Saudi Aramco

(A strong rebound last year saw oil prices recover from their 2020 lows, and they have soared to highs not seen since 2014 this year, amid global supply shortages and Russia's invasion of Ukraine) [File: Bloomberg]

"Energy giant Saudi Aramco says its 2021 net profit soared by more than 120% due to higher crude oil prices, as global economic growth recovered from a pandemic induced downturn.

The announcement came on Sunday hours after Yemen’s Houthi rebels – against whom Saudi Arabia leads a military coalition – targeted several locations, including Aramco facilities, in cross-border armed drone attacks.

Aramco, Saudi Arabia’s cash cow, did not say if the attacks caused any damage.

“Aramco’s net income increased by 124 percent to $110bn in 2021, compared to $49bn in 2020,” the company said in a statement.

Aramco achieved a net income of $88.2bn in 2019 before the coronavirus pandemic hit global markets, resulting in huge losses for the oil and aviation sectors, among others.

A strong rebound last year saw oil prices recover from their 2020 lows, and they have soared to highs not seen since 2014 this year, amid global supply shortages and Russia’s invasion of Ukraine. . .

“Our strong results are a testament to our financial discipline, flexibility through evolving market conditions and steadfast focus on our long-term growth strategy,” Aramco President and CEO Amin Nasser said in a statement.

“Although economic conditions have improved considerably, the outlook remains uncertain due to various macroeconomic and geopolitical factors,” he said.

“But our investment plan aims to tap into rising long-term demand for reliable, affordable and ever more secure and sustainable energy,” he added.

“We recognise that energy security is paramount for billions of people around the world, which is why we continue to make progress on increasing our crude oil production capacity, executing our gas expansion program and increasing our liquids to chemicals capacity.”

Diversification of the economy

Since Mohammed bin Salman’s appointment as crown prince in 2017, Saudi Arabia has sought to diversify its oil-dominated economy. In February, the kingdom – one of the world’s top crude exporters – moved 4 percent of Aramco shares worth $80bn to the country’s sovereign wealth fund.

The transfer was also a sign that Saudi Arabia wants to further open up the oil giant and “crown jewel” of the Saudi economy, the Arab world’s largest.

The crown prince said last year that Aramco was in talks to sell a 1 percent stake to a foreign energy giant. . .

Brent crude is currently selling at more than $100 per barrel – in part due to Russia’s invasion of Ukraine.

Russia is the world’s largest producer of gas and one of the biggest oil producers and is grappling with mounting Western sanctions.

Oil-rich Gulf countries, including Saudi Arabia, have so far resisted Western pressure to raise oil output to rein in prices, stressing their commitment to the OPEC+ alliance of oil producers, which Riyadh and Moscow lead."

READ MORE >> https://www.aljazeera.com/news/2022/3/20/saudi-aramco-says-annual-profit-more-than-doubled-in-2021

 

Sunday, March 20, 2022

BETTER CALL SOME PLUMBERS! . . .A Hit-Piece on Putin when both sides use Elusive "Leaks"

Intro: Here we go again with so-called "Hacker Gangs" using presuppositional conditional qualifiers like sometimes.

Leaked ransomware documents show Conti helping Putin from the shadows

Hacker gang sometimes acts in Russia’s interest, with ad hoc links to FSB, Cozy Bear.

<div class=__reading__mode__extracted__imagecaption>EnlargeWired | Getty Images

 

 

Russian cosmonauts board ISS wearing colours of Ukraine flag

FLASH-BANG 21st CENTURY CYBER ATTACKS: Intelligence Operations at The Edge of War

Intro: Cyberwar has come, is happening now and will most likely escalate.
But the digital confrontation is playing out in the shadows, as inconspicuous as it is insidious. Several interlocking dynamics of cyberoperations in war stand out from what we have seen in Ukraine so far. . .Some of the most consequential computer network breaches may stay covert for years, even decades.
Cyberwar is here, but we don’t always know who is launching the shots.

Why You Haven’t Heard About the Secret Cyberwar in Ukraine

"For decades now, we have heard this refrain from the American defense establishment. We were warned that the next big state-on-state military confrontation could start with a flash-bang cyberattack: power outages in major cities, air traffic control going haywire, fighter jets bricked.

As Russia started amassing around 100,000 troops along its western and southern borders through 2021, Ukraine seemed to be the ideal battle space for such an apocalyptic scenario. The country has already seen some of the most brazen, shrewd and costly cyberattacks in history over the past eight years: hacks and election interference in 2014 as Russia annexed Crimea, remotely caused blackouts in 2015, devastating ransomware attacks in 2017.

In 2022 the war came but seemingly without the cyberapocalypse and waves of pummeling digital strikes we expected. “Cyberattacks on Ukraine Are Conspicuous by Their Absence,” headlined The Economista week into the war.

Such claims, however, are misleading. Cyberwar has come, is happening now and will most likely escalate. But the digital confrontation is playing out in the shadows, as inconspicuous as it is insidious. Several interlocking dynamics of cyberoperations in war stand out from what we have seen in Ukraine so far. 

1

> First, some cyberattacks are meant to be visible and, in effect, distract from the stealthier and more dangerous sabotage. On Feb. 15 and 16, Ukrainian banks suffered major denial-of-service attacks, meaning their websites were rendered inaccessible. Western authorities swiftly attributed the attacks to Russia’s intelligence service, and Google is now helping protect 150 websites in Ukraine from such attacks. The Anonymous collective declared cyberwar against the Russian government soon after the attack and obtained a trove of data from a German subsidiary of Rosneft, a major Russian state-owned oil firm. Ukraine’s besieged government has embraced the idea of a crowdsourced I.T. army.

But these attacks and the decentralized volunteerism are simply a distraction. In fact, often the most damaging cyberoperations are covert and deniable by design. In the heat of war, it’s harder to keep track of who is conducting what attack on whom, especially when it is advantageous to both victim and perpetrator to keep the details concealed.

The day the Russian invasion started, ViaSat, a provider of high-speed satellite broadband services, suffered an outage. The services of Ka-Sat, one of its satellites, were seriously affected. The satellite covers 55 countries, predominantly in Europe, and provides fast internet connectivity. Among the affected Ka-Sat users: the Ukrainian armed forces, the Ukrainian police and Ukraine’s intelligence service.

ViaSat later revealed that the incident started in Ukraine and then spread, affecting 5,800 wind turbines in Germany and tens of thousands of modems across Europe as well. But details on the origin of this attack remain elusive, as does attribution. The Ukrainian security establishment, of course, has no interest in revealing the details of what might be a successful command-and-control attack in the middle of an existential war. Victor Zhora, a senior Ukrainian cybersecurity official, only generally acknowledged that the ViaSat incident caused “a really huge loss in communications” at the beginning of the war.

A week into the war, the Ukrainian newspaper Pravda published - Pravdapublished  -  the names, registration numbers and unit affiliations of 120,000 Russian soldiers fighting in Ukraine. Such large leaks can have powerful psychological effects on the exposed entity, which feels vulnerable and exposed.

Once again, though, the origin of the leak remains unclear. The material could have been procured from a Russian whistle-blower or taken through a network breach. Leaked files — in contrast to hacked machines — rarely contain clues for attribution. Some of the most consequential computer network breaches may stay covert for years, even decades. Cyberwar is here, but we don’t always know who is launching the shots.

2

> Second, cyberoperations in wartime are not as useful as bombs and missiles when it comes to inflicting the maximum amount of physical and psychological damage on the enemy. An explosive charge is more likely to create long-term harm than malicious software.

A similar logic applies to the coverage of hostilities and the psychological toll that media reporting can have on the public. There’s no bigger story than the violent effects of war: victims of missile attacks, families sheltering underground, residential buildings and bridges reduced to piles of smoking rubble. In comparison, the sensationalist appeal of cyberattacks is significantly lower. Largely invisible, they will struggle to break into the news cycle, their immediate effect greatly diminished.

We saw these dynamics play out in the Russian destructive malware “wiper” attacks of Feb. 23 and 24. Just hours before the invasion started, two cyberattacks hit Ukrainian targets: HermeticWizard, which affected several organizations, and IsaacWiper, which breached a Ukrainian government network. A third destructive malware attack was discovered on March 14, CaddyWiper, again targeting only some systems in a few unidentified Ukrainian organizations. It is unclear if these wiping attacks had any meaningful tactical effect against the victims, and the incidents never broke into the news cycle, especially when compared to the physical invasion of Ukraine by tanks and artillery.

3 >

Finally, without deeper integration within a broader military campaign, the tactical effects of cyberattacks remain rather limited. Thus far, we have no information on Russian computer network operators integrating and combining their efforts in direct support of traditional operations. Russia’s muted showing in the digital arena most likely reflects its subpar planning and performance on the ground and in the air. Close observers have been baffled by the Russian Army’s insufficient preparation and training, its lack of effective combined arms operations, its poor logistics and maintenance and its failure to properly encrypt communications.

Cyberwar has been playing a trick on us for decades — and especially in the past weeks. It keeps arriving for the first time, again and again, and simultaneously slipping away into the future. We’ve been stuck in a loop, doomed to repeat the same hackneyed debate, chasing sci-fi ghosts.

To harden our defenses, we must first recognize cyberoperations for what they have been, are and will be: an integral part of 21st-century statecraft.

The United States has a unique competitive advantage through its vibrant tech and cybersecurity industry. No other country comes even close to matching the U.S. public-private partnership in attributing and countering adversarial intelligence operations. These collaborative efforts must continue.

The contours of digital conflict are slowly emerging from the shadows, as digitally upgraded intelligence operations at the edge of war: espionage, sabotage, covert action and counterintelligence, full of deception and disinformation."

 

 

NO CAPTAIN ONBOARD