Tag Archive for: military

Military Access, Mobility & Safety Improvement Program Updates for Week of April 30 — Colorado Department of Transportation


Colorado Springs — Construction on Interstate 25 between South Academy Boulevard and Santa Fe Avenue requires ramp closures on Thursday night and overnight lane closures throughout the week to shift traffic barriers to prepare for the northbound traffic switch from mile 128 to 135.

Beginning at 7 p.m. on Sunday, April 30, and continuing until Wednesday, May 3, drivers can anticipate left lane closures on northbound I-25. On Thursday night May 4, drivers can anticipate various lane closures and ramp closers on northbound I-25 to perform the traffic switch. All lanes reopen at 6 a.m. Monday through Friday, and at 9 a.m. on Saturday.

The traffic switch that was originally scheduled for Saturday night, April 29 has been rescheduled for Thursday night, May 4. Northbound I-25 traffic will move to the newly constructed southbound lanes and will be head-to-head, separated by temporary barrier with 11-foot lanes and two-foot shoulders, so northbound lanes can be constructed. Motorists can expect new on- and off-ramps, lane closures, ramp closures and several detours with the traffic switch.

Northbound I-25 ramp closure detours include:

  • Entrance 128 at Santa Fe Avenue.: Traffic will travel north on Santa Fe Avenue / CanAm Highway to South Academy Boulevard., turn west and enter I-25 at Entrance 135.
  • Exit 132 at Mesa Ridge Parkway: Traffic will continue north to South Circle Drive, turn around and travel south to Exit 132A or 132B
  • Entrance 132 at Mesa Ridge Parkway: Traffic will proceed west to southbound Entrance 132, travel south to Exit 128, turn east onto Santa Fe Avenue, continue north on CanAm Highway to South Academy Boulevard, turn west and enter I-25 at Entrance 135
  • Exit 135 at South Academy Boulevard: Traffic will continue north to South Circle Drive, turn around and travel south to Exit 135

Construction schedules are weather-dependent and subject to change

Northbound I-25 detour map for the night of May 4, 2023
Northbound I-25 detour map for the night of May 4, 2023

Traffic Impacts

I-25 between U.S. 85/Fountain (mile 127) and South Academy Boulevard (mile 135)
Nighttime closures:

  • Sunday, April 30, 7 p.m. to 6 a.m., northbound I-25 left lane closure between Mile Point 127 to 132
  • Sunday, April 30, 8 p.m. to 5 a.m., northbound I-25 left…

Source…

Estonian National Charged with Helping Russian Military Acquire U.S. Electronics, Including Radar Components; Sought-Computer Hacking Software


An eighteen-count indictment was unsealed today in Brooklyn charging Andrey Shevlyakov, an Estonian national, with conspiracy and other charges related to procuring U.S.-made electronics on behalf of the Russian government and military.

Shevlyakov was arrested on March 28, 2023 in Estonia.  As alleged in the indictment and other court filings, at the time of his arrest, the Estonian seized inbound shipments addressed to Shevlyakov’s front companies, including one that contained approximately 130 kilograms (286 pounds) of radio equipment.

Breon Peace, United States Attorney for the Eastern District of New York, James Smith, Special Agent in Charge, FBI Houston and Trey McClish, Special Agent in Charge of the U.S. Department of Commerce, Bureau of Industry and Security – Office of Export Enforcement’s Dallas Field Office announced the charges.

“As alleged, for more than a decade, the defendant has been acquiring sensitive electronics from U.S. manufacturers on behalf of the Russian government, in defiance of U.S. export controls,” stated United States Attorney Peace.  “Our Office will not relent in its efforts to stop those who unlawfully procure U.S. technology for Russia or any other sanctioned countries, entities or individuals.”

Mr. Peace expressed his appreciation for Task Force KleptoCapture, the Department of Justice’s Office of International Affairs, and the Estonian Internal Security Service (KAPO) for their valuable assistance.

“For years, Mr. Shevlyakov’s elaborate web of deceit allowed him to allegedly procure sensitive American-made electronics on behalf of the Russian military,” said FBI Houston Special Agent in Charge James Smith. “His illegal acquisitions of sophisticated U.S. technology endangered citizens in both Ukraine and the United States. FBI Houston will continue to work with our valued international partners, especially the Estonian Internal Security Service (KAPO), to investigate and disrupt actors who illicitly support the unprovoked invasion of Ukraine by Russian armed forces.”

“As these actions have proven, BIS will continue to hunt down and bring to justice those who harm our national security and illicitly supply the…

Source…

We must treat cyber wars the same as we treat conventional military encounters


Pictures and videos emanating from Ukraine show the widespread destruction wrought by Russian troops during a year-long war that continuously generates news coverage. But there is another side to this conflict that is lesser known and harder to see.

A parallel war has been running alongside Russia’s conventional ground invasion, one that involves unrelenting cyber attacks across various segments of Ukrainian society, if with less success than many experts initially anticipated. Mixed results aside, this cyber warfare at times has been significant enough that lines are being blurred between where cyber attacks stop and conventional warfare begins.

Since the start of the invasion in late February 2022, Russian actors have attacked Ukraine with two primary goals: to damage critical infrastructure and to exfiltrate or destroy data. According to Ukraine’s Computer Emergency Response Team, more than 2,000 cyber attacks plagued Ukraine in 2022 alone. Taking it a step further, at least eight different forms of malware have been used by Russian saboteurs in the past year, according to Microsoft, 40 percent of which were targeted at “critical infrastructure sectors.” Other targets included Ukrainian government websites, financial institutions, energy and communication service providers, and media outlets.

Russia’s intense use of cyber attacks in Ukraine predates its ground invasion by at least eight years. When Russia invaded the Crimean Peninsula in 2014, suspected Russian hackers knocked out power to 230,000 customers in western Ukraine. Two years later, suspected Russian hackers used malware to disrupt Ukrainian airports, railways and banks. One month before its ground invasion last February, Russia launched a massive cyber attack targeting government institutions in an attempt to weaken Ukraine’s position ahead of the impending military action.

These types of crimes aren’t unique to Ukraine and exist in the absence of active war. In 2007, hackers attacked Estonia in what is believed to be the first major cyberattack on an entire country, crippling banks, government websites and media companies. Closer to home, a ransomware attack in 2021 disabled the…

Source…

Security News This Week: Sensitive US Military Emails Exposed



Plus: Iran’s secret torture black sites, hacking a bank account with AI-generated voice, and Lance Bass’ unhinged encounter in Russia.

Source…