Russia jammed GPS during major NATO military exercise with US troops

As Russia had did to the USS Donald Cook in the Black Sea some years ago, albeit not as threatening.

For more information on the USS Donald Cook incident, see the following previous posts:

What frightened the USS Donald Cook so much in the Black Sea?

NATO warns that Russia could exert control over entire Black Sea

Nuclear War: Russia Shocks US With Tactical Weapons, Pentagon Retaliates

This latest stunt by Russia also comes after news of Great Britain’s research on a quantum compass to avert such a national security threat.

 

https://cdn.cnn.com/cnnnext/dam/assets/181031201334-putin-submarines-russia-missile-tests-nato-us-tsr-pleitgen-dnt-vpx-00002921-exlarge-169.jpg

 

(CNN) The Russian military jammed GPS signals during a major NATO military exercise in Norway that involved thousands of US and NATO troops, the alliance said Wednesday, citing the Norwegian government.

The NATO exercise, Trident Juncture, concluded Sunday and involved some 50,000 personnel. It was labeled the alliance’s largest exercise since the Cold War. Non-NATO members Finland and Sweden also participated in the exercise. Continue reading

Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones

U.S. Air Force Combat Control JTACs from the 21st Special Tactics Squadron call for close air support from an A-10 Thunderbolt II while attending the Air Force's JTAC Advanced Instructor Course

Wikimedia Commons

 

Practice raises alarm after Navy IG report confirms hacking vulnerabilities in mapping apps

Special operators and other troops must stop taking their unsecured personal tablets and smart phones into combat after an internal Navy investigation found that mapping applications can be hacked by hostile actors, cybersecurity experts warn. Continue reading

A New Era for the China-Russia-U.S. Triangle

https://amgreatness.com/wp-content/uploads/2018/10/20181011msvdh-a.jpg

 

Nearly a half-century ago, President Richard Nixon’s secretary of state, Henry Kissinger, established a successful U.S. strategy for dealing with America’s two most dangerous rivals. He sought closer ties to both the Soviet Union, with its more than 7,000 nuclear weapons, and Communist China, with the world’s largest population.

Kissinger’s approach was sometimes called “triangulation.” But distilled down to its essence, the phrase meant ensuring that China and Russia were not friendlier to each other than each was to the United States

Given that the Soviet Union was much stronger than China at the time, Kissinger especially courted Beijing. Continue reading

U.S. Weapons Systems Vulnerable to Cyberhacks, Report Warns

Pentagon

Getty Images

 

Investigators ‘routinely found mission-critical cyber vulnerabilities’

Major U.S. weapons systems are increasingly vulnerable to hacking attacks, according to federal investigators who “routinely found mission-critical cyber vulnerabilities” in multiple critical systems operated by the Department of Defense.

The Defense Department has been caught flatfooted when it comes to protecting critical systems that oversee and run an increasing number of U.S. defense systems, according to a new Government Oversight Report that warns defense officials have little understanding of how to protect these systems from hacking attacks by foreign governments and other rogue actors. Continue reading

New Evidence Of Chinese Spy Hardware Found By Ex-Mossad Investigators; Super Micro Shares Plunge

https://www.zerohedge.com/sites/default/files/inline-images/supermicro.jpg?itok=k6VWxORv

 

A major US telecommunications company found “manipulated” hardware from Super Micro Computer Inc. in its network in August – bolstering claims in a Bloomberg report last week alleging that China installed bugging devices on hardware bought by Apple, Amazon and a host of other companies.

According to a new report by Bloomberg, the unnamed telecom company hired former Israeli Intelligence Corps security expert Yossi Appleboum, now of Maryland-based Sepio Systems, who provided “documents, analysis and other evidence of the discovery” following last week’s report detailing how China’s intelligence agencies had ordered subcontractors to install malicious chips in Super Micro motherboards between 2013 and 2015.  Continue reading

The UK is practicing cyberattacks that could black out Moscow

https://cms.qz.com/wp-content/uploads/2018/10/The-UK-military-practices-cyber-attack-against-Russia.jpg

Cyber warfare is considered preferable to nuclear warfare.

 

British defense officials say they have practiced cyber war games that could shut off electricity in Russia’s capital, the Sunday Times (paywall) reports.

The measures are part of a wider range of strategies to hit back at an increasingly assertive Russia—accused of interfering with US elections, cyberattacks on Western targets, and poisoning a former spy on UK soil—without resorting to a full-blown nuclear attack. Continue reading

China’s Strategic Force Gears Up for Space and Cyber War

Li Shangfu (3rd left) is seen in this photo

Li Shangfu (3rd left) is seen in this photo / Getty Images

 

NDU report reveals PLA information warfare plans

China’s new Strategic Support Force highlights Beijing’s growing military might and plans to expand both power and influence using space, cyber, and information warfare in both peacetime and a future high-tech war, according to a Pentagon-sponsored study.

The new force, set up in late 2015, is not part of army, navy, air force, or missile force and is directly under the Communist Party’s Central Military Commission, according to a report published this week by the National Defense University. Continue reading

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies

Recognition of this urgent and grave matter is finally receiving recognition by the mainstream media. Chinese microchips have been planted within every facet of U.S. life, from the military to household PC components, as well as everyday appliances such as irons and microwaves.

Further information previously archived on Global Geopolitics can be found within the following previous posts:

The Secret Ways of Chinese Telecom Giant Huawei (2013)

Security backdoor found in China-made US military chip (2012)

 

Click for a larger animated version. (Illustrator: Scott Gelber for Bloomberg Businessweek)

 

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. Continue reading

China Launching More Sophisticated Cyber Attacks and Plans to Persist, Report Says

https://www.theepochtimes.com/assets/uploads/2018/09/26/GettyImages-675019440.jpg

The offices of PricewaterhouseCoopers in St. Helier, Jersey, U.K., on April 12, 2017. That month, China-based hackers attacked PwC through its IT service providers. (Matt Cardy/Getty Images)

 

China doesn’t plan to cease conducting commercial espionage that benefits the central government, even as the U.S. is rolling out new, proactive cyber strategies to counter threats from Beijing, a new report by an Australian think tank says.

Furthermore, China’s hacking capabilities have gotten more sophisticated, with the intention of making the hacking harder to detect, according to a new report by the Australian Strategic Policy Institute. Continue reading

Germany, seeking independence from US, pushes cyber security research

https://www.channelnewsasia.com/image/10664756/16x9/991/557/d755d746e24d803319dcfaff5ae4a1a9/Mc/german-interior-minister-seehofer-at-ard--sommerinterview-in-berlin-4.jpg

German Interior Minister Horst Seehofer talks to journalists after the ARD- Sommerinterview in front of the Reichstag building in Berlin, Germany August 5, 2018. REUTERS/Joachim Herrmann

 

BERLIN: Germany on Wednesday announced a new agency to fund cutting-edge research on cyber security and to end its reliance on digital technologies from the United States, China and other countries.

Interior Minister Horst Seehofer told reporters that Germany needed new tools to become a key player in the field of cybersecurity and shore up European security and independence. Continue reading

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

https://cdn.defenseone.com/media/img/upload/2018/08/13/AP_18224544149695/defense-large.jpg

Russian President Vladimir Putin and presidential spokesman Dmitry Peskov, left, attend a meeting during the 5th Caspian summit in Aktau, the Caspian Sea port in Kazakhstan, Sunday, Aug. 12, 2018. [Alexei Nikolsky, Sputnik, Kremlin Pool Photo (Via AP)]

 

In May, the Justice Department told Americans to reboot their routers. But there’s more to do — and NSA says it’s up to device makers and the public.

LAS VEGASThe Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in a massive attack intended to disrupt global economic activity or target institutions.

On May 27, Justice Department officials asked Americans to reboot their routers to stop the attack. Afterwards, the world largely forgot about it. That’s a mistake, said Rob Joyce, senior advisor to the director of the National Security Agency and the former White House cybersecurity coordinator.

“The Russian malware is still there,” said Joyce. Continue reading

Worldwide ATM hack could see millions withdrawn from banks in major operation, warns FBI

atm-hack-fbi-cash.jpg

An attack on cash machines around the world could be imminent (Getty Images/iStockphoto)

 

Agency warns banks of an imminent ‘cashout’ attack by gangs of criminals on cash points around the world

Cyber criminals are planning a highly-coordinated attack on cash machines around the world that could see millions of dollars withdrawn from customer bank accounts, the FBI has warned. Continue reading

New Pentagon report names Russia, China as threats to US space capabilities

https://i0.wp.com/www.spxdaily.com/images-hg/china-russia-flag-600-hg.jpg

 

A new space report by the Pentagon has named Russia and China as key threats to US space capabilities, according to a document released on Thursday.

“The United States faces rapidly growing threats to our space capabilities. China and Russia, our strategic competitors, are explicitly pursuing space warfighting capabilities to neutralize US space capabilities during a time of conflict,” the report said. “Other potential adversaries are also pursuing counter-space capabilities such as jamming, dazzling, and cyber-attacks.” Continue reading

China, Russia, Iran Engaged in Aggressive Economic Cyber Spying

https://fb13.akamaized.net/up/2018/07/china-economic-spying.png

 

Counterintelligence report details foreign spies theft of advanced U.S. technology

Foreign spies from China, Russia, and Iran are conducting aggressive cyber operations to steal valuable U.S. technology and economic secrets, according to a U.S. counterintelligence report.

The report by the National Counterintelligence and Security Center, a DNI counterspy unit, concludes China is among the most aggressive states engaged in stealing U.S. proprietary information as part of a government-directed program. Continue reading