Is Earth’s Magnetic Field Ready to ‘Flip’?

https://image.zype.com/593087b25d3c19148e001735/5ae9df83e6ab7811f2000582/custom_thumbnail/1080.jpg

(Photo Credit: Steele Hill/NASA)

 

Such an event would dramatically alter the planet’s weather, and cripple communications and power systems.

Despite scientists going well out of their way to insist it’s not going to happen, there is tangible evidence to suggest something major is about to happen with Earth’s magnetic field. And that could impact every human being. Continue reading

Russian Deputy Foreign Minister Sergey Ryabkov: We Will Not At This Time Be Returning To Nuclear Arms Reduction Talks With U.S. Under ‘New START’ Treaty

Meanwhile, Russia and China’s military space programs have expanded, as well as having space weapons already deployed. The U.S., if it were to deploy, would be the third to weaponize space. Yet, as we see again, Russia continues to portray an-already suicidally disarming America as the bully. This is the propaganda and word game readers need to be aware of.

Here are two such examples of Russian and Chinese weaponization of space:

Mysterious Russian satellite, Object 2014-28E, raises fears we may be on the edge of a space arms race

Mysterious Actions of Chinese Satellites Have Experts Guessing

 

To mark the fifth anniversary of the New START (Strategic Arms Reduction Treaty), which was signed in April 2010 and came into force on February 5, 2011, U.S. National Security Advisor Susan Rice stated: “We look forward to full implementation of the Treaty and continue to call on Russia to answer the President’s invitation five years ago to begin talks on further reductions to our nuclear arsenals.”[1]

Several Russian media outlets reported on statements by Russian Deputy Foreign Minister Sergey Ryabkov to the effect that Russia will not at this time be returning to nuclear arms reduction talks with the U.S.    Continue reading

U.S. Shadowing Russian Ship in Atlantic Near Nuclear Submarine Areas

https://i1.wp.com/freebeacon.com/wp-content/uploads/2015/09/yantarminisub.jpg

 

High-tech spy vessel carries cable-cutting gear, mini-subs

U.S. intelligence ships, aircraft, and satellites are closely watching a Russian military vessel in the Atlantic that has been sailing near a U.S. nuclear missile submarine base and underwater transit routes, according to Pentagon officials.

The Russian research ship Yantar has been tracked from the northern Atlantic near Canada since late August as it makes its way south toward Cuba.

Defense officials familiar with reports on the Russian ship say the Yantar is believed to be gathering intelligence on underwater sensors and other equipment used by U.S. nuclear submarines based at Kings Bay, Georgia. The submarines, their transit lanes, and training areas stretch from the coastal base through the Atlantic to Europe.

Intelligence analysts believe the ship, one of Russia’s newest military research vessels commissioned earlier this year, is part of a larger strategic intelligence-gathering operation against U.S. nuclear missile submarines and other targets. Continue reading

The biggest heist of secret US personnel data in cyber history is still ongoing

As was mentioned just the other day, all U.S. intelligence agencies have been compromised in addition to all other government entities that were attacked.

 

The White House has admitted that systems containing deeply personal information, submitted by current, former and prospective federal government employees for security clearances, had been “exfiltrated.” If the breach of the Office of Personnel Management (OPM) was conducted by hackers linked to China, as suspected, access to the Standard Form 86 submitted by an estimated 41 million federal employees provided them with what may be the world’s largest stolen data base of US intelligence and military personnel.

This is a “gold mine” of unencrypted data that leave US intelligence officers, for example, open to blackmail or coerced recruitment.

While officials speak of two hacks, debkafile’s cyber security and intelligence experts report that it was a single breach and is still ongoing. Known to experts as an “Advanced Persistent Threat,” it amounts to slow, continuous penetration by a computer virus, planted in an individual computer of a network which duplicates itself gradually and insidiously. Continue reading

China pursuing huge South China Sea land reclamation: US

China has dramatically ramped up its land reclamation efforts in the South China Sea this year, building artificial islands at an unprecedented pace to bolster its territorial claims in the disputed area, US officials said Friday.

The rapid construction of artificial islands in the strategic waters comes to 2,000 acres (800 hectares), with 75 percent of the total in the last five months, officials said.

“China has expanded the acreage on the outposts it occupies by some four hundred times,” said a US defense official. Continue reading

Russian hack of White House ‘far more worrisome than has been publicly acknowledged’

The United States has not officially confirmed reports that Russia was responsible for the attack. Continue reading

China’s Military Preparing for ‘People’s War’ in Cyberspace, Space

China’s military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital “people’s war,” according to an internal Chinese defense report.

“As cyber technology continues to develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in space is vital for China’s military modernization. Continue reading

Chinese Army Prepares for Conflict with United States

The People’s Liberation Army (PLA) of China is making significant strides toward developing a global military power large enough to protect its rapidly increasing global economic interests, an author of a new book on China explained Wednesday.

“Chinese military planners really seem convinced that their most likely enemy and their greatest potential threat is the United States,” Wortzel said his analysis of PLA journals showed. “Things aren’t great with Russia, and things are a lot worse with Japan, but they focus on us and our technology.”

The transformation began less than a decade ago when in 2004 leader Hu Jintao announced that the PLA’s mission must be to go global in order to safeguard the country’s expanding national interests. Continue reading

French intelligence spying on emails, phonecalls: newspaper

As mentioned in a previous post, the real scandal is that the foreign governments who are screaming the loudest, have been doing it as well.

AFP – French secret services intercept all communications in France, stocking telephone and computer data for years, daily newspaper Le Monde reported Thursday amid an international uproar over spying by the United States.

Government officials have not responded to AFP requests for comment on the Le Monde report, which said data from communications was being stored on a supercomputer at the headquarters of the DGSE intelligence service.

The DGSE “systematically collects electromagnetic signals emitted by computers in France, as well as the data feed between France and abroad: the entirety of our communications are being spied upon,” said the report. Continue reading

White House Hack Attack

What good is a nuclear deterrent when it’s compromised? The “MAD” concept has been effectively thrown out the window. What’s more is the American public is 99.9% unaware of the grave danger this puts them in, let alone it happened at all. Sadly, the only “football” most are concerned about is the one that gets tossed around on Monday nights.

Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident.

One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks.

U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials.

“This is the most sensitive office in the U.S. government,” said a former senior U.S. intelligence official familiar with the work of the office. “A compromise there would cause grave strategic damage to the United States.”

Security officials are investigating the breach and have not yet determined the damage that may have been caused by the hacking incident, the officials said.

Despite the administration national security official’s assertion, one defense official said there is fairly solid intelligence linking the penetration of the WHMO network to China, and there are concerns that the attackers were able to breach the classified network.

Details of the cyber attack and the potential damage it may have caused remain closely held within the U.S. government.

However, because the military office handles strategic nuclear and presidential communications, officials said the attack was likely the work of Chinese military cyber warfare specialists under the direction of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA.

It is not clear how such a high-security network could be penetrated. Such classified computer systems are protected by multiple levels of security and are among the most “hardened” systems against digital attack.

However, classified computer systems were compromised in the past using several methods. They include the insertion of malicious code through a contaminated compact flash drive; a breach by a trusted insider, as in the case of the thousands of classified documents leaked to the anti-secrecy web site Wikileaks; and through compromised security encryption used for remote access to secured networks, as occurred with the recent compromise involving the security firm RSA and several major defense contractors.

According to the former official, the secrets held within the WHMO include data on the so-called “nuclear football,” the nuclear command and control suitcase used by the president to be in constant communication with strategic nuclear forces commanders for launching nuclear missiles or bombers.

The office also is in charge of sensitive continuity-of-government operations in wartime or crises.

The former official said if China were to obtain details of this sensitive information, it could use it during a future conflict to intercept presidential communications, locate the president for targeting purposes, or disrupt strategic command and control by the president to U.S. forces in both the United States and abroad.

Former McAffee cyber threat researcher Dmitri Alperovitch said he was unaware of the incident, but noted: “I can tell you that the Chinese have an aggressive goal to infiltrate all levels of U.S. government and private sector networks.”

The White House network would be the crown jewel of that campaign so it is hardly surprising that they would try their hardest to compromise it,” said Alperovictch, now with the firm Crowdstrike.

Last week the senior intelligence officer for the U.S. Cyber Command said Chinese cyber attacks and cyber-espionage against Pentagon computers are a constant security problem.

“Their level of effort against the Department of Defense is constant” and efforts to steal economic secrets are increasing, Rear Adm. Samuel Cox, Cyber Command director of intelligence, told Reuters after a security conference.

“It’s continuing apace,” Cox said of Chinese cyber-espionage. “In fact, I’d say it’s still accelerating.”

The office is also in charge of the White House Communications Agency, which handles all presidential telephone, radio, and digital communications, as well as airlift operations through both fixed-wing and helicopter aircraft.

It also operates the presidential retreat at Camp David and the White House Transportation Agency.

“To assure proper coordination and integration, the WHMO also includes support elements such as operations; policy, plans, and requirements; administration, information resource management; financial management and comptroller; WHMO counsel; and security,” the website states.

“Together, WHMO entities provide essential service to the president and help maintain the continuity of the presidency.”

A report by the defense contractor Northrop Grumman made public by the congressional U.S.-China Economic and Security Review Commission in March stated that China’s military has made targeting of U.S. command and control networks in cyber warfare a priority.

Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report said.

“PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict,” the report said.

C4ISR is military jargon for command, control, communications, computers, intelligence, surveillance, and reconnaissance.

Little is known within the U.S. intelligence community about Chinese strategic cyber warfare programs.

However, recent military writings have disclosed some aspects of the program, which is believed to be one of Beijing’s most closely guarded military secrets, along with satellite weapons, laser arms, and other high-technology military capabilities, such as the DF-21 ballistic missile modified to attack aircraft carriers at sea.

A Chinese military paper from March stated that China is seeking “cyber dominance” as part of its efforts to build up revolutionary military capabilities.

“In peacetime, the cyber combat elements may remain in a ‘dormant’ state; in wartime, they may be activated to harass and attack the network command, management, communications, and intelligence systems of the other countries’ armed forces,” wrote Liu Wangxin in the official newspaper of the Chinese military on March 6.

“While great importance is attached continuously to wartime actions, it is also necessary to pay special attention to non-wartime actions,” he said. “For example, demonstrate the presence of the cyber military power through cyber reconnaissance, cyber deployment, and cyber protection activities.”

Full article: White House Hack Attack (Washington Free Beacon)

The Network for America’s Nuclear Arsenal Is Falling Apart And Making The Air Force Uncomfortable

The head of U.S. Strategic Command said that the command, control and communications component of the nation’s nuclear force is in need of improvement, as reported by the Air Force Times.

Air Force Gen. Robert Kehler told the Senate Armed Services Committee that he is uncomfortable with the network.

Updating the system has been problematic after the newest military communications satellite suffered a near-devastating malfunction.

Full article: The Network for America’s Nuclear Arsenal Is Falling Apart And Making The Air Force Uncomfortable (Business Insider)