China Rapidly Building Advanced Arms for Use Against U.S.

China Holds Military Parade To Commemorate End Of World War II In Asia

China Holds Military Parade To Commemorate End Of World War II In Asia (Getty Images)

 

Space weapons, drones using artificial intelligence priority in Beijing military buildup

China is rapidly building space weapons and other advanced arms infused with artificial intelligence capabilities as part of Beijing’s bid for military dominance, according to a congressionally sponsored study.

Anti-satellite missiles and orbiting killer satellites, swarms of attack drones, hypersonic missiles, maneuvering warheads, lasers, and high-speed rail guns are key systems China is fielding in the coming years in a bid to leap ahead of the U.S. military supremacy. Continue reading

China speeds ahead of U.S. as quantum race escalates, worrying scientists

In this photo released by China’s Xinhua News Agency, a rocket carrying the world’s first quantum satellite lifts off from northwestern China’s Gansu Province, on Aug. 16, 2016. China’s creation of a quantum satellite system pushes forward its ability to send communications that are impenetrable by hackers. Jin Liwang AP

 

U.S. and other Western scientists voice awe, and even alarm, at China’s quickening advances and spending on quantum communications and computing, revolutionary technologies that could give a huge military and commercial advantage to the nation that conquers them.

The concerns echo — although to a lesser degree — the shock in the West six decades ago when the Soviets launched the Sputnik satellite, sparking a space race.

In quick succession, China in recent months has utilized a quantum satellite to transmit ultra-secure data, inaugurated a 1,243-mile quantum link between Shanghai and Beijing, and announced a $10 billion quantum computing center.

Continue reading

Germany Secretly Passed Total Surveillance of Everything

 

The law was intentionally hidden in a law on driving bans. It was secretly attached at the last minute hoping nobody would notice. Now the German government can monitor messenger services on smartphones and targets WhatsApp so they can intercept or read messages BEFORE encryption. The government can secretly download their spyware to the cell phone of the suspect without their knowledge. The government claimed: “We are increasingly observing that criminals communicate in encrypted form. This makes it increasingly difficult for the authorities to clarify even the most serious offenses, “said Thomas de Maizière (CDU). The problem is the term “criminal” and tax avoidance is a criminal offense.

Continue reading

China Could Control the Global Internet After Oct. 1

https://i2.wp.com/img.theepochtimes.com/n3/eet-content/uploads/2016/09/14/ICANN_Chair-463030862.jpg

ICANN Chairman Steve Crocker speaks during the opening of the ICANN meeting in Singapore on Feb. 9, 2015. The U.S. plan to relinquish control of ICANN opens the door for China to have greater influence over the global internet. (Roslan Rahman/AFP/Getty Images)

 

The handover of ICANN, the body that governs domain name registration, fits into a strategy by the Chinese regime to determine how the Internet is run

In November 2014, Li Yuxiao, a research fellow at the Chinese Academy of Cyberspace, stated, according to the state-run China Daily, “Now is the time for China to realize its responsibilities. If the United States is willing to give up its running of the internet sphere, the question comes as to who will take the baton and how it would be run?”

“We have to first set our goal in cyberspace, and then think about the strategy to take, before moving on to refining our laws,” he said.

Li’s comments were in response to news, also in 2014, that the United States would relinquish its remaining federal government control of the internet by ending its contract between the Commerce Department and the Internet Corporation for Assigned Names and Numbers (ICANN), which is scheduled for Oct. 1. Continue reading

A Cyberattack Has Paralyzed a Los Angeles Hospital

Hospitals have little or no safeguards against this threat and it’s sadly just a matter of time before they start manipulating patient dosages at pharmacies or taint hospital food at production plants.

 

 

Doctors have been locked out of patient records for more than a week by hackers who are demanding money to release the data.

A hospital in Los Angeles has been operating without access to email or electronic health records for more than a week, after hackers took over its computer systems and demanded millions of dollars in ransom to return it.

The hackers that broke into the Hollywood Presbyterian Medical Center’s servers are asking for $3.6 million in Bitcoin, a local Fox News affiliate reported. Hospital staff are working with investigators from the Los Angeles Police Department and the FBI to find the intruders’ identities. Continue reading

Exposure of US spying on Israeli drones served a pressing Russian interest

https://i1.wp.com/www.debka.com/dynmedia/photos/2016/01/30/src/IAI_drones_carrying_missiles.jpg

 

The latest batch of “top secret” documents to be leaked to the web magazine The Intercept by fugitive former NSA advisor Edward Snowden, showing that the US had spied on Israeli air force operations for more than 18 years, is as interesting for its timing as its revelations.

For three years, the magazine has published Snowdon leaks almost exclusively. This time, on Tuesday, Jan. 26, it released files exposing a joint operation by US and British intelligence agencies codenamed Anarchist. For almost two decades, Israeli air force operations, mainly by drones, were monitored and their transmission feeds intercepted from the British intelligence base in the Troodos Mountains in Cyprus, as well as the NSA base in Menwith Hill, north of Manchester, England. Continue reading

Israeli Drone Feeds Hacked by American and British Intelligence

In case you were wondering what side the United States (and Great Britain) now takes in regards to Israel and Iran, wonder no more:

 

 

AMERICAN AND BRITISH INTELLIGENCE secretly tapped into live video feeds from Israeli drones and fighter jets, monitoring military operations in Gaza, watching for a potential strike against Iran, and keeping tabs on the drone technology Israel exports around the world.

Under a classified program code-named “Anarchist,” the U.K.’s Government Communications Headquarters, or GCHQ, working with the National Security Agency, systematically targeted Israeli drones from a mountaintop on the Mediterranean island of Cyprus. GCHQ files provided by former NSA contractor Edward Snowden include a series of “Anarchist snapshots” — thumbnail images from videos recorded by drone cameras. The files also show location data mapping the flight paths of the aircraft. In essence, U.S. and British agencies stole a bird’s-eye view from the drones. Continue reading

Experian hack exposes 15 million people’s personal information

Hack of one of the largest data brokers and credit agencies in the world affects T-Mobile USA users who applied for credit checks, company says

Experian, one of the largest credit agency data brokers in the world, has been hacked. Some 15 million people who used the company’s services, among them customers of cellular company T-Mobile who had applied for Experian credit checks, may have had their private information exposed, the company confirmed on Thursday.

Information from the hack includes names, addresses, and social security, driver’s license and passport numbers. The license and passport numbers were in an encrypted field, but Experian said that encryption may also have been compromised. Continue reading

Britain pulls spies as Moscow cracks Snowden files: reports

Now that Comrade Snowden might’ve run out of material, his usefulness to the Soviets could’ve just ended. When you’re no longer useful to the Kremlin you’re likely going to be disposed of. This is not to wish any harm on him or for anything to happen, but it’s how they operate. Once the ‘useful idiots’ have served their purpose, they are eliminated.

On another note, it’s also important to keep in mind he could’ve very well been a Russian agent all along. You don’t collect and transfer 1.7 million files for a simple espionage assignment. You have to be one of them to create such extensive damage. This might even give China and Russia additional critical information on other European agencies working with both their U.S. and British counterparts.

Expect a lot of revelations soon to be coming out of the Russian propaganda outlets such as Russia Today.

There’s also a 99.9% certainty he just cost thousands of American and British lives.

See the following posts for further information on Snowden:

NSA Leaker “Outed” as Russian Agent

Edward Snowden Seeking to Join KGB Veterans Group

Edward Snowden was targeted by Russian spies 6 years BEFORE he exposed US secrets

 

London (AFP) – Britain has been forced to move some of its spies after Russia and China accessed the top-secret raft of documents taken by former US intelligence contractor Edward Snowden, British media reported.

The BBC and the Sunday Times cited senior government and intelligence officials as saying agents had been pulled, with the newspaper saying the move came after Russia was able to decrypt more than one million files.

“It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information,” a Downing Street source said, according to the newspaper. Continue reading

Smart cities the world over ripe for hacking, expert says

So-called smart cities, with wireless sensors controlling everything from traffic lights to water management, may be vulnerable to cyberattacks, according to a computer security expert.

Last year, Cesar Cerrudo, an Argentine security researcher and chief technology officer at IOActive Labs, demonstrated how 200,000 traffic control sensors installed in major hubs like Washington, New York, Melbourne and Lyon were vulnerable to attack. Mr. Cerrudo showed how information coming from these sensors could be intercepted from 1500 feet away — or even by drone — because one company had failed to encrypt its traffic.

Just last Saturday, Mr. Cerrudo tested the same traffic sensors in San Francisco and found that, one year later, they were still not encrypted. Continue reading

NSA Wants ‘Front Door’ Access to Encrypted Data

The head of the National Security Agency, Admiral Michael S. Rogers, said the intelligence group no longer is interested in backdoor solutions to digital surveillance.

Instead, the NSA wants a “front-door” solution – which some privacy experts think could be even worse.

Rogers suggested a solution in which at least two parties – one of which is the NSA – retain parts of a data encryption key. The solution would require all of the parties to provide their key in order for the NSA to access encrypted communications, as well as prevent the agency from acting unilaterally. Continue reading

‘Falklands invasion guide’ containing GPS coordinates of facilities published on MoD website

The Ministry of Defence failed to encrypt a secret document on its website that describes the exact make-up of runways, ­thickness of concrete and gives GPS coordinates of facilities.

The information was freely available from the homepage and would be priceless to an enemy bomber planning a strike.

Continue reading

Everything Is Broken

Software is so bad because it’s so complex, and because it’s trying to talk to other programs on the same computer, or over connections to other computers. Even your computer is kind of more than one computer, boxes within boxes, and each one of those computers is full of little programs trying to coordinate their actions and talk to each other. Computers have gotten incredibly complex, while people have remained the same gray mud with pretensions of godhood. Continue reading

NSA seeks to build quantum computer that could crack most types of encryption

In room-size metal boxes ­secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md. Continue reading