Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence – sources

Yahoo billboard

By Joseph Menn

SAN FRANCISCO (Reuters) – Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified.

Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

According to two of the former employees, Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled some senior executives and led to the June 2015 departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook Inc.

“Yahoo is a law abiding company, and complies with the laws of the United States,” the company said in a brief statement in response to Reuters questions about the demand. Yahoo declined any further comment.

Through a Facebook spokesman, Stamos declined a request for an interview.

The NSA referred questions to the Office of the Director of National Intelligence, which declined to comment.

The request to search Yahoo Mail accounts came in the form of a classified edict sent to the company’s legal team, according to the three people familiar with the matter.

U.S. phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad demand for real-time Web collection or one that required the creation of a new computer program.

“I’ve never seen that, a wiretap in real time on a ‘selector,'” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance issues for 20 years before moving to Stanford University this year. A selector refers to a type of search term used to zero in on specific information.

“It would be really difficult for a provider to do that,” he added.

Experts said it was likely that the NSA or FBI had approached other Internet companies with the same demand, since they evidently did not know what email accounts were being used by the target. The NSA usually makes requests for domestic surveillance through the FBI, so it is hard to know which agency is seeking the information.

Alphabet Inc’s Google and Microsoft Corp, two major U.S. email service providers, separately said on Tuesday that they had not conducted such email searches.

“We’ve never received such a request, but if we did, our response would be simple: ‘No way’,” a spokesman for Google said in a statement.

A Microsoft spokesperson said in a statement, “We have never engaged in the secret scanning of email traffic like what has been reported today about Yahoo.” The company declined to comment on whether it had received such a request.

CHALLENGING THE NSA

Under laws including the 2008 amendments to the Foreign Intelligence Surveillance Act, intelligence agencies can ask U.S. phone and Internet companies to provide customer data to aid foreign intelligence-gathering efforts for a variety of reasons, including prevention of terrorist attacks.

Disclosures by former NSA contractor Edward Snowden and others have exposed the extent of electronic surveillance and led U.S. authorities to modestly scale back some of the programs, in part to protect privacy rights.

Companies including Yahoo have challenged some classified surveillance before the Foreign Intelligence Surveillance Court, a secret tribunal.

Some FISA experts said Yahoo could have tried to fight last year’s demand on at least two grounds: the breadth of the directive and the necessity of writing a special program to search all customers’ emails in transit.

Apple Inc made a similar argument earlier this year when it refused to create a special program to break into an encrypted iPhone used in the 2015 San Bernardino massacre. The FBI dropped the case after it unlocked the phone with the help of a third party, so no precedent was set.

“It is deeply disappointing that Yahoo declined to challenge this sweeping surveillance order, because customers are counting on technology companies to stand up to novel spying demands in court,” Patrick Toomey, an attorney with the American Civil Liberties Union, said in a statement.

Some FISA experts defended Yahoo’s decision to comply, saying nothing prohibited the surveillance court from ordering a search for a specific term instead of a specific account. So-called “upstream” bulk collection from phone carriers based on content was found to be legal, they said, and the same logic could apply to Web companies’ mail.

As tech companies become better at encrypting data, they are likely to face more such requests from spy agencies.

Former NSA General Counsel Stewart Baker said email providers “have the power to encrypt it all, and with that comes added responsibility to do some of the work that had been done by the intelligence agencies.”

SECRET SIPHONING PROGRAM

Mayer and other executives ultimately decided to comply with the directive last year rather than fight it, in part because they thought they would lose, said the people familiar with the matter.

Yahoo in 2007 had fought a FISA demand that it conduct searches on specific email accounts without a court-approved warrant. Details of the case remain sealed, but a partially redacted published opinion showed Yahoo’s challenge was unsuccessful.

Some Yahoo employees were upset about the decision not to contest the more recent edict and thought the company could have prevailed, the sources said.

They were also upset that Mayer and Yahoo General Counsel Ron Bell did not involve the company’s security team in the process, instead asking Yahoo’s email engineers to write a program to siphon off messages containing the character string the spies sought and store them for remote retrieval, according to the sources.

The sources said the program was discovered by Yahoo’s security team in May 2015, within weeks of its installation. The security team initially thought hackers had broken in.

When Stamos found out that Mayer had authorized the program, he resigned as chief information security officer and told his subordinates that he had been left out of a decision that hurt users’ security, the sources said. Due to a programming flaw, he told them hackers could have accessed the stored emails.

Stamos’s announcement in June 2015 that he had joined Facebook did not mention any problems with Yahoo. (http://bit.ly/2dL003k)

In a separate incident, Yahoo last month said “state-sponsored” hackers had gained access to 500 million customer accounts in 2014. The revelations have brought new scrutiny to Yahoo’s security practices as the company tries to complete a deal to sell its core business to Verizon Communications Inc for $4.8 billion.

(Reporting by Joseph Menn; Editing by Jonathan Weber and Tiffany Wu)

Hacking group claims to offer cyber-weapons in online auction

Cyber coder

By Joseph Menn

(Reuters) – Hackers going by the name Shadow Brokers said on Monday they will auction stolen surveillance tools they say were used by a cyber group linked to the U.S. National Security Agency.

To arouse interest in the auction, the hackers released samples of programs they said could break into popular firewall software made by companies including Cisco Systems Inc, Juniper Networks Inc and Fortinet Inc.

The companies did not respond to request for comment, nor did the NSA.

Writing in imperfect English, the Shadow Brokers promised in postings on a Tumblr blog that the auctioned material would contain “cyber weapons” developed by the Equation Group, a hacking group that cyber security experts widely believe to be an arm of the NSA. [http://reut.rs/2aVA7LD]

The Shadow Brokers said the programs they will auction will be “better than Stuxnet,” a malicious computer worm widely attributed to the United States and Israel that sabotaged Iran’s nuclear program.

Reuters could not contact the Shadow Brokers or verify their assertions. Some experts who looked at the samples posted on Tumblr said they included programs that had previously been described and therefore were unlikely to cause major damage.

“The data [released so far] appears to be relatively old; some of the programs have already been known for years,” said researcher Claudio Guarnieri, and are unlikely “to cause any significant operational damage.”

Still, they appeared to be genuine tools that might work if flaws have not been addressed. After examining the code released Monday, Matt Suiche, founder of UAE-based security startup Comae Technologies, concluded they looked like “could be used.”

Other security experts warned the posting could prove to be a hoax. The group said interested parties had to send funds in advance of winning the auction via Bitcoin currency and would not get their money back if they lost.

The auction will end at an unspecified time, Shadow Brokers said, encouraging bidders to “keep bidding until we announce winner.”

(Editing by Cynthia Osterman)

Cisco to lay off about 14,000 employees: tech news site CRN

person walking past Cisco logo

(Reuters) – Cisco Systems Inc is laying off about 14,000 employees, representing nearly 20 percent of the network equipment maker’s global workforce, technology news site CRN reported, citing sources close to the company.

Cisco, which is due to report fourth-quarter results later on Wednesday, is expected to announce the cuts within the next few weeks, the report said. (http://bit.ly/2bEQfa3)

“We think it’s true,” Jefferies analysts wrote in a client note, referring to the report.

“As we’ve met with investors in recent weeks, we’ve picked up on concerns that Cisco may be looking to reduce headcount in the not-too-distant future.”

If confirmed, it would be the second big tech industry layoff of a similar scale announced this year. Intel Corp said in April that it would slash up to 12,000 jobs globally, or 11 percent of its workforce.

San Jose-based Cisco is facing sluggish spending by telecom carriers and enterprises on network switches and routers, its main business. In response, the company has been beefing up its wireless security and datacenter businesses.

These rumored cuts, if they turn out to be true, would be a bit of a catch-up the company is doing as it moves away from hardware, Needham & Co analyst Alex Henderson said.

“I do not think that they are going to be done after this,” Henderson said.

The company has already offered many early retirement packages to employees, the CRN report said.

Cisco, which had more than 70,000 employees as of April 30, declined to comment.

The company’s shares were down 1.4 percent at $30.71 on Wednesday on the Nasdaq.

Jefferies raised its price target on the stock to $35 from $30.72 and maintained its “buy” rating.

Up to Tuesday’s close, Cisco’s stock had risen about 15 percent this year, compared with a 10.5 percent increase in the Dow Jones U.S. Technology Hardware & Equipment index.

(Reporting by Ankit Ajmera, Bhanu Pratap and Supantha Mukherjee and Rishika Sadam in Bengaluru; Editing by Sandra Maler, Sunil Nair and Anil D’Silva)

China says cyber rules no cause for foreign business concern

Computer mouse with China light

BEIJING (Reuters) – China’s pending cyber security law will not create obstacles for foreign business, China’s Foreign Ministry said, responding to concerns by international business lobbies over the planned rules.

More than 40 global business groups last week petitioned Premier Li Keqiang, according to a copy of a letter seen by Reuters, urging China to revise draft cyber rules they believe are vague and discriminate against foreign enterprises.

The groups say the pending rules, including a cyber security law that could be passed this year, include provisions for invasive government security reviews and onerous requirements to keep data in China.

They say the regulations would impede China’s economic growth, create barriers to market entry and impair the country’s security by isolating it technologically.

The ministry, in a faxed statement to Reuters late on Tuesday night, said the law will not be used to “carry out differential treatment and will not create obstacles and barriers for international trade and foreign businesses investing in China.”

It said companies would be able to transfer data required for business purposes outside China’s borders after passing a security evaluation.

“These evaluations are for supervising and guaranteeing that the security of this data accords with China’s security standards,” the ministry said.

“As for the legal requirement for internet operators to provide relevant data in the course of enforcement agencies’ counter-terrorism and criminal investigations, this is necessary for safeguarding national security and investigating crimes. All countries do this,” the ministry said.

‘UNNECESSARY’ CONCERNS

“The concerns of foreign investors and businesses invested in China are unnecessary,” it said.

Some foreign businesses in China are becoming increasingly pessimistic, in part due to rules companies think could make it harder to operate there.

The cyber rules have added to tensions between China and its trade partners, who have been concerned about Beijing’s Made in China 2025 plan. The proposal calls for a progressive increase in domestic components in sectors such as advanced information technology and robotics.

Business lobbies also say requirements to hand over sensitive data or source code to the government could put business secrets at risk and boost the capabilities of domestic competitors.

How much technology firms should cooperate with governments has been a contentious issue in many countries, not just in China.

Apple Inc <AAPL.O> was asked by Chinese authorities within the past two years to hand over its source code but refused, the company’s top lawyer said this year, even as U.S. law enforcement tried to get the company to unlock encrypted data from an iPhone linked to a mass shooting.

(Reporting by Michael Martina; Editing by Richard Borsuk)

Exclusive: Hackers accessed Telegram messaging accounts in Iran – researchers

Guy working with those whose accounts were hacked

By Joseph Menn and Yeganeh Torbati

SAN FRANCISCO/WASHINGTON (Reuters) – Iranian hackers have compromised more than a dozen accounts on the Telegram instant messaging service and identified the phone numbers of 15 million Iranian users, the largest known breach of the encrypted communications system, cyber researchers told Reuters.

The attacks, which took place this year and have not been previously reported, jeopardized the communications of activists, journalists and other people in sensitive positions in Iran, where Telegram is used by some 20 million people, said independent cyber researcher Collin Anderson and Amnesty International technologist Claudio Guarnieri, who have been studying Iranian hacking groups for three years.

Telegram promotes itself as an ultra secure instant messaging system because all data is encrypted from start to finish, known in the industry as end-to-end encryption. A number of other messaging services, including Facebook Inc’s <FB.O> WhatsApp, say they have similar capabilities.

Headquartered in Berlin, Telegram says it has 100 million active subscribers and is widely used in the Middle East, including by the Islamic State militant group, as well as in Central and Southeast Asia, and Latin America.

Telegram’s vulnerability, according to Anderson and Guarnieri, lies in its use of SMS text messages to activate new devices. When users want to log on to Telegram from a new phone, the company sends them authorization codes via SMS, which can be intercepted by the phone company and shared with the hackers, the researchers said.

Armed with the codes, the hackers can add new devices to a person’s Telegram account, enabling them to read chat histories as well as new messages.

“We have over a dozen cases in which Telegram accounts have been compromised, through ways that sound like basically coordination with the cellphone company,” Anderson said in an interview.

Telegram’s reliance on SMS verification makes it vulnerable in any country where cellphone companies are owned or heavily influenced by the government, the researchers said.

A spokesman for Telegram said customers can defend against such attacks by not just relying on SMS verification. Telegram allows – though it does not require – customers to create passwords, which can be reset with so-called “recovery” emails.

“If you have a strong Telegram password and your recovery email is secure, there’s nothing an attacker can do,” said Markus Ra, the spokesman.

Iranian officials were not available to comment. Iran has in the past denied government links to hacking.

ROCKET KITTEN

The Telegram hackers, the researchers said, belonged to a group known as Rocket Kitten, which used Persian-language references in their code and carried out “a common pattern of spearphishing campaigns reflecting the interests and activities of the Iranian security apparatus.”

Anderson and Guarnieri declined to comment on whether the hackers were employed by the Iranian government. Other cyber experts have said Rocket Kitten’s attacks were similar to ones attributed to Iran’s powerful Revolutionary Guards.

The researchers said the Telegram victims included political activists involved in reformist movements and opposition organizations. They declined to name the targets, citing concerns for their safety.

“We see instances in which people … are targeted prior to their arrest,” Anderson said. “We see a continuous alignment across these actions.”

The researchers said they also found evidence that the hackers took advantage of a programing interface built into Telegram to identify at least 15 million Iranian phone numbers with Telegram accounts registered to them, as well as the associated user IDs. That information could provide a map of the Iranian user base that could be useful for future attacks and investigations, they said.

“A systematic de-anonymization and classification of people who employ encryption tools (of some sort, at least) for an entire nation” has never been exposed before, Guarnieri said.

Ra said Telegram has blocked similar “mapping” attempts in the past and was trying to improve its detection and blocking strategies.

Cyber experts say Iranian hackers have become increasingly sophisticated, able to adapt to evolving social media habits. Rocket Kitten’s targets included members of the Saudi royal family, Israeli nuclear scientists, NATO officials and Iranian dissidents, U.S.-Israeli security firm Check Point said last November.

POPULAR IN THE MIDDLE EAST

Telegram was founded in 2013 by Pavel Durov, known for starting VKontakte, Russia’s version of Facebook, before fleeing the country under pressure from the government.

While Facebook and Twitter are banned in Iran, Telegram is widely used by groups across the political spectrum. They shared content on Telegram “channels” and urged followers to vote ahead of Iran’s parliamentary elections in February 2016.

Last October, Durov wrote in a post on Twitter that Iranian authorities had demanded the company provide them with “spying and censorship tools.” He said Telegram ignored the request and was blocked for two hours on Oct. 20, 2015.

Ra said the company has not changed its stance on censorship and does not maintain any servers in Iran.

After complaints from Iranian activists, Durov wrote on Twitter in April that people in “troubled countries” should set passwords for added security.

Amir Rashidi, an internet security researcher at the New York-based International Campaign for Human Rights in Iran, has worked with Iranian hacking victims. He said he knew of Telegram users who were spied on even after they had set passwords.

Ra said that in those cases the recovery email had likely been hacked.

Anderson and Guarnieri will present their findings at the Black Hat security conference in Las Vegas on Thursday. Their complete research is set to be published by the Carnegie Endowment for International Peace, a Washington-based think tank, later this year.

(Reporting by Joseph Menn in San Francisco and Yeganeh Torbati in Washington; Additional reporting by Michelle Nichols at the United Nations and Parisa Hafezi in Ankara; Editing by Jonathan Weber and Tiffany Wu)

U.S. to sanction cyber attackers, cites Russia, China

US sanctioning cyber attackers

WASHINGTON (Reuters) – The United States will use sanctions against those behind cyber attacks that target transportation systems or the power grid, the White House said on Tuesday, citing Russia and China as increasingly assertive and sophisticated cyber operators.

The sanctions will be used “when the conditions are right and when actions will further U.S. policy,” White House counter terrorism adviser Lisa Monaco said in prepared remarks to a cyber security conference.

Monaco cited an “increasingly diverse and dangerous” global landscape in which Iran has launched denial-of-service attacks on U.S. banks and North Korea has shown it would conduct destructive attacks.

“To put it bluntly, we are in the midst of a revolution of the cyber threat – one that is growing more persistent, more diverse, more frequent and more dangerous every day,” she said.

The United States is working with other countries to adopt voluntary norms of responsible cyber behavior and work to reduce malicious activity, she said. At the same time, it will use an executive order authorizing sanctions against those who attack U.S. critical infrastructure.

Monaco introduced a new directive from President Barack Obama that establishes a “clear framework” to coordinate the government’s response to cyber incidents.

“It will help answer a question heard too often from corporations and citizens alike – ‘In the wake of an attack, who do I call for help?'” she said.

(Reporting by Doina Chiacu; Editing by Jonathan Oatis)

EU eyes Israeli technologies for spotting militants online

By Dan Williams

TEL AVIV (Reuters) – European powers are trying to develop better means for pre-emptively spotting “lone-wolf” militants from their online activities and are looking to Israeli-developed technologies, a senior EU security official said on Tuesday.

Last week’s truck rampage in France and Monday’s axe attack aboard a train in Germany have raised European concern about self-radicalized assailants who have little or no communications with militant groups that could be intercepted by spy agencies.

“How do you capture some signs of someone who has no contact with any organization, is just inspired and started expressing some kind of allegiance? I don’t know. It’s a challenge,” EU Counter-Terrorism Coordinator Gilles de Kerchove told Reuters on the sidelines of a intelligence conference in Tel Aviv.

Internet companies asked to monitor their own platforms’ content for material that might flag militants had begged off, De Kerchove said.

He said they had argued that the information was too massive to sift through and contextualize, unlike pedophile pornography, for which there were automatic detectors.

“So maybe a human’s intervention is needed. So you cannot just let the machine do it,” De Kerchove said. But he said he hoped “we will soon find ways to be much more automated” in sifting through social networks.

“That is why I am here,” he said of his visit to Israel. “We know Israel has developed a lot of capability in cyber.”

ADVANCE WARNING

Beset by Palestinian street attacks, often by young individuals using rudimentary weapons and without links to armed factions, Israeli security agencies that once focused on “meta data”, or information regarding suspects’ communications patterns, have refocused on social media in hope of gaining advance warnings from private posts.

Israeli officials do not disclose how far the technology has come, but private experts say the methods are enough to provide often basic alerts regarding potential attackers, then require follow-up investigation.

“Nine out of 10 times, the terrorist has contacts with others who provide support or inspiration, so meta data still applies,” said Haim Tomer, a former Mossad intelligence division chief turned security consultant.

When it comes to true lone wolves, even a valedictory Facebook message can often be picked up by Israel, he said.

“But in such cases, it would be a low-level ‘green alert’, meaning the person should be looked at further, whereas a ‘red alert’ would warrant instant action. That leaves the security services to decide how to handle matters,” Tomer said.

As De Kerchove was at pains to make clear to the conference, European standards of civil rights, such as privacy, make the introduction of intrusive intelligence-gathering technologies in the public sphere and aggressive police follow-ups difficult.

While Israel’s emergency laws give security services more leeway, its intelligence minister, Yisrael Katz, called for cooperation with Internet providers rather than state crackdowns. He cited, for example, the encryption provided by messaging platform WhatsApp which, he said, could be a new way for militants to communicate and evade detection.

“We will not block these services,” Katz told the conference. “What is needed is an international organization, preferably headed by the United States, where shared (security) concerns need to be defined, characterized.”

(Editing by Jeffrey Heller/Mark Heinrich)

Likely hack of U.S. banking regulator by China covered up: probe

Mouse with Chinese flag projection

By Jason Lange and Dustin Volz

WASHINGTON (Reuters) – The Chinese government likely hacked computers at the Federal Deposit Insurance Corporation in 2010, 2011 and 2013 and employees at the U.S. banking regulator covered up the intrusions, according to a congressional report on Wednesday.

The report cited an internal FDIC investigation as identifying Beijing as the likely perpetrator of the attacks, which the probe said were covered up to protect the job of FDIC Chairman Martin Gruenberg, who was nominated for his post in 2011.

“The committee’s interim report sheds light on the FDIC’s lax cyber security efforts,” said Lamar Smith, a Republican representative from Texas who chairs the House of Representatives Committee on Science, Space and Technology.

“The FDIC’s intent to evade congressional oversight is a serious offense.”

The report was released amid growing concern about the vulnerability of the international banking system to hackers and the latest example of how deeply Washington believes Beijing has penetrated U.S. government computers.

The report did not provide specific evidence that China was behind the hack.

Shane Shook, a cyber security expert who has helped investigate some of the breaches uncovered to date, said he did not see convincing evidence in the report that the Chinese government was behind the FDIC hack.

“As with all government agencies, there are management issues stemming from leadership ignorance of technology oversight,” Shook said.

Speaking in Beijing, Chinese Foreign Ministry spokesman Lu Kang repeated that China opposed hacking and acted against it.

People should provide evidence for their accusations and not wave around speculative words like “maybe” and “perhaps”, he told reporters.

“This is extremely irresponsible.”

The FDIC, a major U.S. banking regulator which keeps confidential data on America’s biggest banks, declined to comment. Gruenberg is scheduled to testify on Thursday before the committee on the regulator’s cyber security practices.

Washington has accused China of hacking computers at a range of federal agencies in recent years, including the theft of more than 21 million background check records from the federal Office of Personnel Management beginning in 2014.

WATCHDOG MEMO

The compromise of the FDIC computers by a foreign government had been previously reported in May and some lawmakers had mentioned China as a possible suspect, but the report on Wednesday for the first time cited a 2013 memo by the FDIC’s inspector general, an internal watchdog, as pointing toward China.

“Even the former Chairwoman’s computer had been hacked by a foreign government, likely the Chinese,” the congressional report said, referring to Gruenberg’s predecessor, Sheila Bair, who headed the FDIC from 2006 until 2011 when Gruenberg took over as acting chairman.

Bair could not be immediately reached for comment.

A redacted copy of the 2013 FDIC inspector general’s memo seen by Reuters said investigators were unable to determine exactly which files had been extracted from agency computers.

But a source familiar with the FDIC’s internal investigation said the areas of the regulator’s network that were hacked suggested the intruders were seeking “economic intelligence.”

In all, hackers compromised 12 FDIC workstations, including those of other executives such as the regulator’s former chief of staff and former general counsel, and 10 servers, the congressional report said.

It accused the FDIC of trying to cover up the hacks so as not to endanger the congressional approval of Gruenberg, who was nominated by President Barack Obama and confirmed by the U.S. Senate in November 2012.

A witness interviewed by congressional staff said the FDIC’s current head of its technology division, Russ Pittman, instructed employees not to disclose information about the foreign government’s hack, the report said.

The witness said the hush order was to “avoid effecting the outcome of Chairman Gruenberg’s confirmation,” according to the report. Pittman could not immediately be contacted for comment.

The report also provided details of data breaches in which FDIC employees leaving the regulator took sensitive documents with them. It said current FDIC officials have purposely concealed information about breaches that had been requested by Congress.

U.S. intelligence officials believe Beijing has decreased its hacking activity since signing a pledge with Washington last September to refrain from breaking into computer systems for the purposes of commercial espionage.

At the same time, Obama has acknowledged difficulties in keeping government information secure. In addition, Republican opponents have said that Democratic presidential candidate Hillary Clinton’s use of a private email server when she was secretary of state could have exposed classified information to foreign governments.

(Reporting by Jason Lange and Dustin Volz; Additional reporting by Jim Finkle in Boston, and Ben Blanchard in BEIJING; Editing by Grant McCool)

NASA’s Juno spacecraft loops into orbit around Jupiter

Jupiter

By Irene Klotz

CAPE CANAVERAL, Fla. (Reuters) – NASA’s Juno spacecraft capped a five-year journey to Jupiter late Monday with a do-or-die engine burn to sling itself into orbit, setting the stage for a 20-month dance around the biggest planet in the solar system to learn how and where it formed.

“We’re there. We’re in orbit. We conquered Jupiter,” lead mission scientist Scott Bolton, with the Southwest Research Institute in San Antonio, told reporters on Tuesday. “Now the fun begins.”

Juno will spend the next three months getting into position to begin studying what lies beneath Jupiter’s thick clouds and mapping the planet’s gargantuan magnetic fields.

Flying in egg-shaped orbits, each one lasting 14 days, Juno also will look for evidence that Jupiter has a dense inner core and measure how much water is in the atmosphere, a key yardstick for figuring out how far away from the sun the gas giant formed.

Jupiter’s origins, in turn, affected the development and position of the rest of the planets, including Earth and its fortuitous location conducive to the evolution of life.

“The question I’ve had my whole life that I’m hoping we get an answer to is ‘How’d we get here?’ That’s really pretty fundamental to me,” Bolton said.

Jupiter orbits five times farther from the sun than Earth, but it may have started out elsewhere and migrated, jostling its smaller sibling planets as it moved.

Jupiter’s immense gravity also diverts many asteroids and comets from potentially catastrophic collisions with Earth and the rest of the inner solar system.

Launched from Florida nearly five years ago, Juno needed to be precisely positioned, ignite its main engine at exactly the right time and keep it firing for 35 minutes to become only the second spacecraft to orbit Jupiter.

If anything had gone even slightly awry, Juno would have sailed helplessly past Jupiter, unable to complete a $1 billion mission.

The risky maneuver began as planned at 11:18 p.m. EDT as Juno soared through the vacuum of space at more than 160,000 mph (257,500 kph).

NASA expects Juno to be in position for its first close-up images of Jupiter on Aug. 27, the same day its science instruments are turned on for a test run.

Only one other spacecraft, Galileo, has ever circled Jupiter, which is itself orbited by 67 known moons. Bolton said Juno is likely to discover even more.

Seven other U.S. space probes have sailed past the gas giant on brief reconnaissance missions before heading elsewhere in the solar system.

The risks to the spacecraft are not over. Juno will fly in highly elliptical orbits that will pass within 3,000 miles (4,800 km) of the tops of Jupiter’s clouds and inside the planet’s powerful radiation belts.

Juno’s computers and sensitive science instruments are housed in a 400-pound (180-kg) titanium vault for protection. But during its 37 orbits around Jupiter, Juno will be exposed to the equivalent of 100 million dental X-rays, said Bill McAlpine, radiation control manager for the mission.

The spacecraft, built by Lockheed Martin, is expected to last for 20 months. On its final orbit, Juno will dive into Jupiter’s atmosphere, where it will be crushed and vaporized.

Like Galileo, which circled Jupiter for eight years before crashing into the planet in 2003, Juno’s demise is designed to prevent any hitchhiking microbes from Earth from inadvertently contaminating Jupiter’s ocean-bearing moon Europa, a target of future study for extraterrestrial life.

(Editing by Kim Coghill and Andrew Heavens)

Human flights to Mars still at least 15 years off: ESA head

Monitors in the ESOC

By Maria Sheahan and Ashutosh Pandey

DARMSTADT, Germany (Reuters) – Dreaming of a trip to Mars? You’ll have to wait at least 15 years for the technology to be developed, the head of the European Space Agency (ESA) said, putting doubt on claims that the journey could happen sooner.

“If there was enough money then we could possibly do it earlier but there is not as much now as the Apollo program had,” ESA Director-General Jan Woerner said, referring to the U.S. project which landed the first people on the moon.

Woerner says a permanent human settlement on the moon, where 3D printers could be used to turn moon rock into essential items needed for the two-year trip to Mars, would be a major step toward the red planet.

U.S. space agency NASA hopes to send astronauts to Mars in the mid-2030s and businessman Elon Musk, head of electric car maker Tesla Motors, says he plans to put unmanned spacecraft on Mars from as early as 2018 and have humans there by 2030.

The ESA’s Woerner said it would take longer.

A spacecraft sent to Mars would need rockets and fuel powerful enough to lift back off for the return trip and the humans would need protection from unprecedented physical and mental challenges as well as deep-space radiation.

Woerner would like to see a cluster of research laboratories on the moon, at what he calls a “moon village”, to replace the International Space Station when its lifetime ends and to test technologies needed to make the trip to Mars.

That could be funded and operated by a collection of private and public bodies from around the world, he said in an interview at the ESA’s Operations Centre.

“There are various companies and public agencies asking to join the club now, so they want to do different things, resource mining, in situ research, tourism and that kind of stuff. There is a big community interested,” he told Reuters.

“The moon village is a pit stop on the way to Mars,” Woerner said, adding that new 3D printing technology could be used to build material and structures out of rocks and dust, doing away with the cost of transporting everything needed for a mission.

“To test how to use lunar material to build some structures, not only houses, but also for a telescope or whatever, will teach us also how to do it on Mars,” he said.

The ESA, working with Russia, in March sent a spacecraft on a seven-month journey as part of the agency’s ExoMars mission, which will use an atmospheric probe to sniff out signs of life on Mars and deploy a lander to test technologies needed for a rover scheduled to follow in 2020.

Woerner said Europe was looking at ways to lower the cost of launches but did not plan to copy Elon Musk’s SpaceX, which is trying to develop relatively cheap, reusable launch vehicles.

“We should not copy. To follow and copy does not bring you into the lead. We are looking for totally different approaches,” Woerner said, adding the ESA was examining all manner of new technologies, including air-breathing engines that do not need to tap into oxygen from a spacecraft’s tank.

(Additional reporting by Reuters TV; Editing by Robin Pomeroy)