757 words
4 minutes
CRACK Update 4
2024-06-30

US Military spacious idea#

The Pentagon is set to transform its relationship with commercial space companies through a groundbreaking program that will integrate private sector equipment directly into military units and operations. This initiative, known as the Commercial Augmentation Space Reserve (CASR), aims to bolster U.S. military capabilities in space, a domain now considered critical for national security.

CASR: Beyond Traditional Contracts#

CASR represents a significant shift from traditional contractor relationships. Private sector equipment will be embedded into military units, participating in both training exercises and real-world operations. This move is in response to increasing threats from China and Russia, which have been developing capabilities to disrupt American satellites essential for communication, navigation, surveillance, and missile warnings.

Col. Richard Kniseley, senior materiel leader of the Space Systems Command’s Commercial Space Office, emphasized the seriousness of this integration, stating, “CASR shows just how serious we are about integrating commercial capabilities along with our military space capabilities.”

Voluntary Participation with Strategic Benefits#

Participation in CASR is voluntary, unlike the state-controlled space sector in China. Companies that join will commit to supporting the Department of Defense (DoD) in potential wartime scenarios, contributing to the defense of the U.S. and its allies. These companies will gain access to valuable threat intelligence, enhancing their situational awareness in the evolving space landscape.

Tailored Contracts and Surge Capacity#

CASR contracts will be customized to match the specific capabilities of participating companies. These contracts will ensure seamless integration with military infrastructure and provide compensation for surge capacity during periods of increased demand. Kniseley highlighted the importance of negotiating these details in peacetime to avoid complications during wartime.

Legislative Support and Initial Focus#

The House Armed Services Committee’s draft 2025 defense policy bill authorizes the CASR program, giving it a significant legislative boost. Initial efforts will likely focus on space domain awareness, tracking objects in orbit to ensure space security.

Addressing Growing Threats#

The CASR initiative comes in response to growing concerns about threats to U.S. satellites. Gen. Chance Saltzman, Space Force chief of space operations, pointed to China’s development of a “sensor-shooter kill web” that could endanger U.S. forces in the Pacific. He stressed the importance of collaboration with commercial partners and allies, citing the success of SpaceX’s Starlink constellation in Ukraine as a model for military-commercial cooperation.

Building Resilience#

By integrating commercial capabilities, the U.S. military aims to build a more resilient space architecture. This strategic collaboration will enhance the U.S.’s ability to maintain space superiority and protect vital satellite infrastructure from emerging threats.

In conclusion, CASR is set to revolutionize the U.S. military’s approach to space security, blending commercial innovation with military needs to safeguard national interests in this critical domain.

Source: https://spacenews.com/pentagon-to-forge-deeper-ties-with-space-industry-in-first-of-its-kind-program/

The Polyfill.js Debacle: A Modern Supply Chain Attack#

In a shocking turn of events for web developers and users alike, the once-trusted Polyfill.js has become a conduit for malware. This popular open-source library, used by over 100,000 sites to support older browsers, was compromised when a Chinese company purchased the cdn.polyfill.io domain and the associated GitHub account earlier this year. Notable users such as JSTOR, Intuit, and the World Economic Forum were among those affected.

The Malware Injection#

Since the acquisition, the domain has been caught injecting malware into mobile devices via any site embedding the cdn.polyfill.io script. Complaints on the GitHub repository were swiftly removed, raising suspicions and frustrations among developers.

The polyfill code is dynamically generated based on HTTP headers, presenting multiple potential attack vectors. Sansec, a cybersecurity firm, decoded a specific malware variant that redirects mobile users to a sports betting site masquerading as Google Analytics (www.googie-anaiytics[.]com). The malware is particularly insidious, with specific protections against reverse engineering and activation triggers based on device type, time, and the presence of admin users or web analytics services.

Polyfill.js: No Longer Needed#

In light of these events, the original author of Polyfill.js advises against its use, pointing out that modern browsers no longer require such polyfills. For those who still need polyfill functionality, trustworthy alternatives from Fastly and Cloudflare are recommended.

A Classic Supply Chain Attack#

This incident highlights the vulnerabilities inherent in the software supply chain. When a trusted resource like Polyfill.js is compromised, it can have widespread repercussions. To mitigate such risks, visibility into the code that users are loading is crucial. Sansec offers a free CSP (Content Security Policy) monitoring service called Sansec Watch to help developers maintain vigilance over their resources.

Conclusion#

The Polyfill.js malware incident is a stark reminder of the importance of maintaining control over the third-party scripts and libraries integrated into our websites. By using secure alternatives and monitoring services, developers can protect their users and uphold the integrity of their applications in an increasingly complex digital landscape.

Source: https://sansec.io/research/polyfill-supply-chain-attack

CRACK Update 4
https://typetherapy.blog/posts/crackupdates/crackupdate30_6_24/
Author
Type Therapy Blog
Published at
2024-06-30
License
CC BY-NC-SA 4.0