U.S. military satellites in crisis as foreign weapons advance and proliferate

(Associated Press/File)

(Associated Press/File)

 

The U.S. military’s satellite communications are facing a crisis, threatened by a growing array of foreign weapons, including cyberattack capabilities, lasers, electronic jammers and anti-satellite weapons, according to a Pentagon study.

An executive summary of the report by the Defense Science Board warns that military satellite communications used for global operations “will be contested by a myriad of effects ranging from reversible to destructive.”

“The estimated and projected electronic threats against satellite communication (satcom) have rapidly escalated in the last few years and will continue to increase in the foreseeable future,” the report says. Continue reading

Foreign States Preparing Cyber Attacks on Infrastructure in Future War

National Security Agency Director Mike Rogers

National Security Agency Director Mike Rogers / Getty Images

 

Rogers awaiting new Trump cyber policy

Foreign nations’ cyber intrusions into key infrastructure network are preparation for damaging attacks in a future conflict, the commander of Cyber Command told Congress Tuesday.

Adm. Mike Rogers, the commander who is also director of the National Security Agency, said one of his major concerns is cyber attacks on critical infrastructures used to run the electric grid, financial systems, communications networks, the transportation systems, and others. Continue reading

China tried to hack THAAD system: CNN

State-sponsored Chinese hackers tried to disrupt the operation of the controversial THAAD anti-missile system in South Korea, CNN reported, citing American cyber security experts.

The U.S. news network said the hacking had taken aim at an unidentified organization with connections to the THAAD system. Continue reading

Chinese Supercomputers Threaten U.S. Security

One part of where this article goes wrong is the first opening sentence, as China has already eclipsed the United States in supercomputer technology.

However, at least Americans know who they can thank for giving China their threatening capability: Bill and Hillary Clinton through the U.S. Department of Commerce.

Another component of the problem is that the American security apparatus believes in the simple ‘patch and pray‘ fix due to high costs. In other words, they’re also reactive and not proactive… a grave difference.

 

Supercomputers play a vital role in the design, development and analysis of almost all modern weapons systems, said a report by the National Security Agency-Energy Department based on an assessment of China’s new supercomputer called the TaihuLight. Photo by: David Mercer

 

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight.

National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Continue reading

America Is Losing the Cyber Information War

Getty Images

 

New strategies, tactics needed to fight influence, propaganda warfare threats, Senate told

The United States faces a growing threat of information warfare attacks and needs new strategies and organizations to counter it, national security experts told Congress this week.

John C. Inglis, former deputy director of the National Security Agency, said cyber attacks are only one form of influence, propaganda, and disinformation attacks being waged in the cyber war of ideas.

“Cyber warfare, in my view, is not a standalone entity,” Inglis told a Senate subcommittee hearing Thursday. “When you’re talking about information warfare, it’s at that top-most stack, and it does not necessarily comprise of an exchange of tools or an exchange of literal warfare. It is, in fact, a conflict of ideas.” Continue reading

Total Chaos: Cyber Attack Fears As MULTIPLE CITIES HIT With Simultaneous Power Grid Failures: Shockwave Of Delays In San Francisco, Los Angeles, New York

The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.

Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.

Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials. Continue reading

New report details one of history’s “largest ever” cyber espionage operations

 

A new report authored by a consortium of government and private organizations in Britain has revealed the existence of a computer hacking operation, allegedly based in China, that is said to be “one of the largest ever” such campaigns globally. The operation is believed to have compromised sensitive information from an inestimable number of private companies in Southeast Asia, Europe and the United States. The report was produced by a consortium of public and private organizations, including BAE systems and the London-based National Cyber Security Centre, an office of the United Kingdom’s signals intelligence agency, the Government Communications Headquarters. It details the outcome of Operation CLOUD HOPPER, which was launched to uncover the cyber espionage activities. Continue reading

U.S. Ill-Prepared to Stop Widespread Russian Information Warfare

Was there Russian influence during the 2016 election process? Sure. However, not as people think.

Moscow is engaged in what’s called the “scissor strategy”. In America’s case, both sides of the scissor blades represent the right-wing and left-wing of America. When the blades meet (conflict), America (material being cut) is destroyed. You can plainly see this in today’s media where CNN/MSNBC/ABC et al represent the left-wing of society, whereas (although it’s a false right) Fox News represents the right-wing base.

It’s interesting to note that Fox is a false right in the sense that it may represent the second side of the same coin in an information warfare campaign against the American people. Some of the anchors, hosts and reporters may be genuine, but the owners of Fox News are not. They consistently undermined Trump, the outside and anti-establishment candidate and constantly favored the progressive-socialists (aka RINOs) in the Republican party.

This is where it gets complicated, but for those with discernment, they see right through it.

 

Clint Watts testifies before the Senate Intelligence Committee March 30 / Getty Images

 

Experts reveal methods, motivations behind Moscow’s cyber attacks

Russia is engaged in wide-ranging information warfare operations aimed at undermining the United States, and the federal government has few defenses against the attacks, information specialists told a Senate hearing last week.

Moscow’s large-scale operations include the covert attempt to sway the 2016 presidential election and dissemination of false news reports to sow confusion and weaken American democracy, according to testimony before the Senate Select Committee on Intelligence Thursday.

The committee hearing was called as part of an investigation into the Russian campaign to influence the 2016 election. Continue reading

Trump set up? The CIA’s UMBRAGE group can stage RUSSIAN hacking

FISA warrant could have been obtained through staged hacking

(INTELLIHUB) — Among the startling revelations coming out through the Wikileaks “Vault 7” release is the shocking fact that the CIA has the ability to “misdirect attribution” of a hack, effectively making it look as if a country such as Russian was the culprit when in reality it was forces within the Central Intelligence Agency itself.

According to the Wikileaks documents, a group within the CIA’s Remote Devices Branch, code-named UMBRAGE, collects and maintains a massive library of attack techniques stolen from other countries, including the Russian Federation.

“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from,” reads the Wikileaks release. “UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.” Continue reading

CIA used Frankfurt consulate to spy on Europeans

Protest against US dragnet surveillance tactics revealed by Edward Snowden (Photo: Valentina Pop)

 

The US intelligence agency, the CIA, has used the American consulate in Frankfurt as a covert base to carry out digital spy operations, Wikileaks revealed on Tuesday (7 March).

The Center for Cyber Intelligence Europe, based in the German city, was the base for CIA hackers covering Europe, the Middle East, and Africa, Wikileaks said. The information is based on documents from the agency’s internal discussion forum.

The leaked documents included a guide for CIA hackers on how to prepare for their trip to Germany. Continue reading

Files released by WikiLeaks show advanced CIA collection methods

As we all know by now:

 

Thousands of documents belonging to the United States Central Intelligence Agency, which were released on Tuesday by the international anti-secrecy website WikiLeaks, are almost certainly genuine. They reveal an entire universe of technical intelligence collection methods used by the CIA to extract information from digital applications and electronic devices, ranging from flash drives to smart screen televisions. WikiLeaks named the collection Vault 7, and said that it consists of nearly 8,000 web pages and 1,000 attachments. It also said that its editors redacted hundreds of pages of computer code, in order to prevent the public release of advanced cyberweapons that are allegedly used by the CIA to sabotage electronic devices and systems. Continue reading

How Israel Became a High-Tech Military Superpower

How did a country smaller than El Salvador with a population of eight million and few natural resources become a military superpower within a few decades?

In The Weapon Wizards:  How Israel Became a High-Tech Military Superpower (St. Martin’s Press, 2017), authors Yaakov Katz and Amir Bohbot explain this remarkable phenomenon.  Calling on their experience as Israel Defense Forces (IDF) veterans and seasoned national security analysts, they present an intriguing and engrossing account of Israel’s defense capabilities development.  From a country lacking bullets and aircraft, Israel transformed itself into one of the most effective militaries in the world and the sixth-largest arms exporter globally.  Today, Western powers, including the U.S., France, the UK, Russia and China, all come to Israel to learn and establish joint ventures. Continue reading

Russia Reveals Information Warfare Troops

Russian Defense Minister Sergei Shoigu / AP

 

Defense minister: New force ‘stronger’ than past counter propaganda efforts

Russia disclosed this week that it has strengthened its information warfare forces amid U.S. charges of influence operations aimed at swaying the outcome of the 2016 election.

Defense Minister Sergei Shoigu revealed information capabilities in an assessment of Russia’s military power provided to Russian officials on Wednesday in Moscow.

“Over this time, information operations forces have been formed, which are much more efficient and stronger than the counter propaganda department,” Shoigu said. He did not elaborate on what is regarded as one of the Russian military’s more secret capabilities. Continue reading

Iran Renews Destructive Cyber Attacks on Saudi Arabia

AP

Tehran strategy seeks takeover of oil-rich U.S. ally

After a four-year hiatus, Iran recently resumed destructive cyber attacks against Saudi Arabia in what U.S. officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional U.S. ally.

Late last month, the Saudi government warned in a notice to telecommunications companies that an Iranian-origin malicious software called Shamoon had resurfaced in cyber attacks against some 15 Saudi organizations, including government networks. Continue reading