Hundreds of thousands of Americans may be at the mercy of Russia.
Hackers successfully breached the unclassified Executive Office of the President (eop) network in October.
“Any such activity is something we take very seriously. In this case, we took immediate measures to evaluate and mitigate the activity,” a White House official said. “Our actions are ongoing, and some have resulted in some temporary outages and loss of connectivity for our users.” Continue reading
It could soon be lights out for America. The banking system is compromised. The national power grid remains unguarded and vulnerable to attack — and one needs to knock out only nine substations to black the nation out indefinitely. The U.S. strategic nuclear forces are being cut while America reduces its own, thinking it’s taking ‘the moral high road’. Not one new nuclear weapon has been made since roughly 1989. Meanwhile, a military purge is wiping out critical senior military leadership across all branches. Ebola, which has the potential to wipe out entire populations is intentionally underreported, whitewashed or not reported at all. The U.S. Federal Reserve intervenes in the markets when the market shows signs of crashing. The White House can’t defend itself from people hopping over the fence.
If you’ve been following this site long enough, you’ll know this is just a small list of many failures indicating a perfect storm, or sword, rather, is coming to America.
In the meantime, the American shopping mall regime keeps rolling along and fighting over cheap Chinese goods on ‘Black Friday’ and continues following the Kardashians. Move along now, nothing to see here.
Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said.
The intrusion occurred in late September but officials gave no indication that they had a problem until Oct. 20, according to three people familiar with the hack and the subsequent reaction by the National Oceanic and Atmospheric Administration or NOAA, which includes the National Weather Service. Even then, NOAA did not say its systems were compromised.
Officials also said that the agency did not notify the proper authorities when it learned of the attack. Continue reading
With its strict privacy laws, Germany is the refuge of choice for those hounded by the security services. Carole Cadwalladr visits Berlin to meet Laura Poitras, the director of Edward Snowden film Citizenfour, and a growing community of surveillance refuseniks
It’s the not knowing that’s the hardest thing, Laura Poitras tells me. “Not knowing whether I’m in a private place or not.” Not knowing if someone’s watching or not. Though she’s under surveillance, she knows that. It makes working as a journalist “hard but not impossible”. It’s on a personal level that it’s harder to process. “I try not to let it get inside my head, but… I still am not sure that my home is private. And if I really want to make sure I’m having a private conversation or something, I’ll go outside.”
Poitras’s documentary about Edward Snowden, Citizenfour, has just been released in cinemas. She was, for a time, the only person in the world who was in contact with Snowden, the only one who knew of his existence. Before she got Glenn Greenwald and the Guardian on board, it was just her – talking, electronically, to the man she knew only as “Citizenfour”. Even months on, when I ask her if the memory of that time lives with her still, she hesitates and takes a deep breath: “It was really very scary for a number of months. I was very aware that the risks were really high and that something bad could happen. I had this kind of responsibility to not fuck up, in terms of source protection, communication, security and all those things, I really had to be super careful in all sorts of ways.”
Bad, not just for Snowden, I say? “Not just for him,” she agrees. We’re having this conversation in Berlin, her adopted city, where she’d moved to make a film about surveillance before she’d ever even made contact with Snowden. Because, in 2006, after making two films about the US war on terror, she found herself on a “watch list”. Every time she entered the US – “and I travel a lot” – she would be questioned. “It got to the point where my plane would land and they would do what’s called a hard stand, where they dispatch agents to the plane and make everyone show their passport and then I would be escorted to a room where they would question me and oftentimes take all my electronics, my notes, my credit cards, my computer, my camera, all that stuff.” She needed somewhere else to go, somewhere she hoped would be a safe haven. And that somewhere was Berlin. Continue reading
It’s been said many times here that the Chinese military is on par or more advanced than the U.S. military. Now, with proof from actual U.S. military personnel – and an experienced pilot, we see that it is more advanced.
The J-31, China’s second fifth-generation stealth fighter designed by Shenyang Aircraft Corporation, is capable of outperforming all US fourth-generation fighters in aerial combat, according to a US fighter pilot cited in our sister newspaper Want Daily. Continue reading
Beijing sees the US president as a weak leader in the autumn of his presidency
Second-term US presidents traditionally seek solace on the global stage. Barack Obama is no exception. Following last week’s drubbing in the US midterm elections, he lands in China on Monday for a summit with Xi Jinping. He is unlikely to find Beijing more pliable than Washington DC. As time goes on, it becomes ever harder to separate his domestic weakness from his global standing. Even the tone is spreading. “US society has grown tired of [Obama’s] banality,” China’s semi-official Global Times said last week. Continue reading
Company founded to blackmail US innovators could damage US economy
The Chinese regime is getting into the patent trolling business, having set up a company that will start suing American companies for patent fraud. Experts believe the new Chinese company, which the regime seeded with $50 billion in fluff patents, could be detrimental to American innovation.
Patent trolls, officially called patent assertion entities, are companies that produce no goods. They make their profits by buying vague and outdated patents, then suing other companies for violating their patents. According to a press release from the nonprofit Citizen Outreach, patent trolls cost the U.S. economy $29 billion a year and destroy jobs.
China’s shiny new patent troll is a company called Ruichuan IPR Funds. The company is based in China’s main technology hub in Zhongguancun, Beijing. Continue reading
Hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks, sources said, resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion.
White House officials, speaking on the condition of anonymity to discuss an ongoing investigation, said that the intruders did not damage any of the systems and that, to date, there is no evidence the classified network was hacked. Continue reading
It’s not hard to imagine, after obtaining information such as this, seeing key dams failing. How would this happen? Not necessarily with terrorist bombings, but with cyberwarfare. If you wanted to physically take them down via power grids, as a professional hit team had done in California, you need only to take out nine substations to indefinitely cripple America and potentially kill hundreds of millions from the aftereffect. It’s already on the edge of failure now as we speak. On the cyberwarfare front, you only need to take advantage of the SCADA system (See also HERE and HERE) that remains largely unprotected and vulnerable as well.
America is in the final phase of a perfect storm overseeing its collapse (on the economic and social front as well) that could happen at any given time as it is now past the point of no return in protecting itself. It can’t even screen itself from espionage in its vital infrastructure, as seen in this article. Having said that, it’s not hard to see that America’s adversaries have first strike capability, and therefore likely checkmate.
But hey, no time for that, we have a MLB World Series to watch and cheap (sometimes toxic) Chinese goods to scuffle over on Black Friday.
A sensitive database that lists vulnerabilities in every major U.S. dam was breached last year in an attack traced back to the Chinese regime. The security breach had U.S. officials worried that China could be planning to attack America’s power grid.
Now, one year later, a Chinese woman was arrested for breaching that same network. Xiafen “Sherry” Chen, 59, was arrested on Oct. 20 for allegedly downloading the sensitive files on U.S. dams and for lying to federal investigators.
The registry Chen allegedly accessed and downloaded ranks the dams by the number of Americans who would die if they failed, according to Nextgov. It also lists vulnerabilities that could be exploited in the dams, which could be used by a hostile nation to attack the United States. Continue reading
A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.
In a report to be issued Tuesday, the researchers said Axiom is going after intelligence benefiting Chinese domestic and international policies — an across-the-waterfront approach that combines commercial cyberespionage, foreign intelligence and counterintelligence with the monitoring of dissidents.
Axiom’s work, the FBI said in an industry alert this month, is more sophisticated than that of Unit 61398, a People’s Liberation Army hacker unit that was highlighted in a report last year. Five of the unit’s members were indicted this year by a U.S. grand jury. The researchers concur with the FBI’s conclusion, noting that, unlike Unit 61398, Axiom is focused on spying on dissidents as well as on industrial espionage and theft of intellectual property.
More than 200 men, Swedish stealth ships, minesweepers and helicopters have been searching an area of the Baltic Sea about 50 kilometres (30 miles) east of the Swedish capital since Friday evening, following a tip-off from what the military called a “credible source”.
“I have decided to increase the number of units in the area — units with specialised sensors,” Commander Jonas Wikstroem told reporters at a press conference in Stockholm.
“We still judge that the information we received yesterday was very trustworthy,” he added, but declined to comment on what the military had discovered after more than 24 hours sweeping the sea around islands in Stockholm’s archipelago.
Swedish defence analysts cited by local media speculated that a foreign submarine may have been in the area to replace old spy equipment or to monitor a Swedish naval exercise. Continue reading
Boston: The US Federal Bureau of Investigation warned US businesses on Wednesday that hackers it believes to be backed by the Chinese government have recently launched attacks on US companies. Continue reading
New York City’s Waldorf Astoria hotel is set to become the biggest prize yet for buyers from China who have been pouring money into U.S. real estate as they seek stable investments outside their country.
Beijing’s Anbang Insurance Group Co. agreed to pay $1.95 billion for the 1,232-room tower on Park Avenue, an Art Deco landmark and one of Manhattan’s signature properties. That would be the highest price for a single existing hotel in the country, and the most paid for a standing U.S. building by a Chinese buyer, said Kevin Mallory, global head of the hotels unit of commercial real estate brokerage CBRE Group Inc. (CBG)
“We’re seeing a diversification strategy being employed by insurance companies and others, and it’s also true when it comes to private Chinese investors,” he said in a telephone interview. “We’ve seen a lot of wealth generated there over the last decade, and we see see private investors diversifying their portfolio around the globe.” Continue reading
The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse.
Questions over who the hackers are and the approach of their attack concern government and industry officials. Also troubling is that about nine other financial institutions — a number that has not been previously reported — were also infiltrated by the same group of overseas hackers, according to people briefed on the matter. The hackers are thought to be operating from Russia and appear to have at least loose connections with officials of the Russian government, the people briefed on the matter said.
It is unclear whether the other intrusions, at banks and brokerage firms, were as deep as the one that JPMorgan disclosed on Thursday. The identities of the other institutions could not be immediately learned.
The breadth of the attacks — and the lack of clarity about whether it was an effort to steal from accounts or to demonstrate that the hackers could penetrate even the best-protected American financial institutions — has left Washington intelligence officials and policy makers far more concerned than they have let on publicly. Some American officials speculate that the breach was intended to send a message to Wall Street and the United States about the vulnerability of the digital network of one of the world’s most important banking institutions.
“It could be in retaliation for the sanctions” placed on Russia, one senior official briefed on the intelligence said. “But it could be mixed motives — to steal if they can, or to sell whatever information they could glean.” Continue reading
JPMorgan’s own investigators have found clues that a global network of computers available for hire by sophisticated criminals was used to reroute data stolen from the bank to a major Russian city, according to people familiar with the probe.
Like street magicians using sleight of hand, the hackers tapped computers from Latin America to Asia to send commands and obscure their identity while ferrying malicious traffic past one of the most heavily guarded networks on Wall Street.
Bank investigators working nearly around the clock have identified what they believe to be the assault’s staging ground, called a “bulletproof” hosting platform because of its resilience to other attackers and to law enforcement, according to one of the people, who requested anonymity because of the continuing investigation. The constellation of computers was used in previous hacking attacks and is now being tapped by professional cybercriminals operating out of Eastern Europe to target banks. Continue reading