Last year at a NATO summit, Obama explicitly disavowed the idea of containing ISIS. “You can’t contain an organization that is running roughshod through that much territory, causing that much havoc, displacing that many people, killing that many innocents, enslaving that many women,” he said.
Instead he argued, “The goal has to be to dismantle them.” Continue reading
Foreign intelligence agents and other hackers attacked Interior Department networks 19 times in recent years, before walking away from keyboards with unknown amounts of stolen data, according to agency inspectors.
The incidents are unrelated to a previously disclosed assault on Interior networks connected to Office of Personnel Management systems, the agency says. That high-profile campaign seized from the U.S. government 21.5 million confidential records on national security personnel and their family members. Continue reading
If you’ve been following Global Geopolitics for the last two years or so, this would be a no-brainer. The good news is that the mainstream picked up on it.
Rare tweet by media giant alludes to sinister Obama policy
Matt Drudge’s first tweet in months came with a cryptic message: “A shocking truth is unfolding: America has been arming ISIS.”
The Obama administration has been plagued for weeks over news U.S. weapons supplied to Syrian rebels were inadvertently winding up in the hands of terror groups. The media giant’s tweet on Tuesday alludes to something far more sinister.
Remember the hilarious 1960s movie, “It’s a Mad Mad Mad World?” Well, we live in a fake fake fake America. Politicians, economists, all MSM talking heads, Big Business, virtually every commercial that has ever aired, preachers, and on and on and on, all have one thing in common. They’re all liars and fake as a three dollar bill.
“Fake”, a simple definition: something that is not what it purports to be, a worthless imitation passed off as genuine; an impostor or charlatan. Example: “American society is extraordinarily fake; filled with lies, fraud, facades, mirages, deception, disinformation, misinformation, propaganda and brainwashing.” Continue reading
A Chinese defense contractor may be on its way to key breakthroughs in railgun weaponry.
Railguns are one of the potential game-changing weapons of future war. Instead of using the power of chemical explosives such as gunpowder, a railgun uses electromagnetic force to propel projectiles to hypersonic speeds, potentially up to ranges of several hundred miles. A railgun’s barrel has two parallel conducting rails built into it. When a moving armature (usually the projectile) is inserted into the barrel, it connects the parallel rails to complete the current, thus generating an intense electromagnetic field. The projectile then accelerates out of the barrel at high speeds. Continue reading
“Our military battle preparation appears to aim at Taiwan, but in fact is aimed at the United States, and the preparation is far beyond the scope of attacking aircraft carriers or satellites.” – Chinese Defense Minister Chi Haotian, December 2005.
Tacoma, Washington – Chinese military operated on US soil for the first time in American history, marking an unprecedented provocation by the Obama administration and angering national security skeptics. Continue reading
A series of videos apparently leaked by the Russian Defense Ministry reveal the presence of Iranian F-14 and MiG -29 fighters in Syrian skies for the first time. They were shown by “The Aviationist,” Italian magazine, escorting heavy Russian bombers, including the Tupolev TU-160, the heaviest, fastest and most destructive bomber ever built, on missions no more than 150 km from Israel’s northern border. Continue reading
Russian aggression continues to pose a threat to a massive series of undersea cables that carry worldwide Internet communications, according to a leading senator who received a top-secret classified briefing on the matter on Wednesday.
Russian subs and spyships have been caught “aggressively operating” near these cables in the last month, prompting concern among lawmakers and others who have warned that Moscow could easily sever these cables and toss large portions of America and other nations off the web. Continue reading
Researchers are concerned over the strength and comprehensiveness of cybersecurity in the U.S., as companies across the country are being targeted in cyber attacks at an increasing rate of both occurrence and cost. Concerns continue to grow as both the number of attacks on companies’ networks and the cost to companies are increasing. The quantity and quality of information being hacked, stolen, destroyed, or leaked is becoming more of a problem for consumers and businesses alike. Continue reading
U.S. counterintelligence chief Bill Evanina said on Wednesday he was skeptical China had followed through on recent promises to curb spying on the United States.
Evanina told a briefing that he had seen “no indication” from the U.S. private sector “that anything has changed” in the extent of Chinese espionage on the United States. Continue reading
Again, don’t forget who you need to thank for China’s technological leaps and bounds that will surpass the United States much sooner than you think.
China has almost tripled its number of supercomputers, according to a reputable list of the world’s most powerful machines.
If you recall this post from 2011, you knew this day was coming.
The culture of “Patch & Pray” will be the downfall so long as America chooses to be reactive over proactive.
Firewalls and medical devices are extremely vulnerable, and everyone’s pointing fingers
In the fall of 2013, Billy Rios flew from his home in California to Rochester, Minn., for an assignment at the Mayo Clinic, the largest integrated nonprofit medical group practice in the world. Rios is a “white hat” hacker, which means customers hire him to break into their own computers. His roster of clients has included the Pentagon, major defense contractors, Microsoft, Google, and some others he can’t talk about.
But when he showed up, he was surprised to find himself in a conference room full of familiar faces. The Mayo Clinic had assembled an all-star team of about a dozen computer jocks, investigators from some of the biggest cybersecurity firms in the country, as well as the kind of hackers who draw crowds at conferences such as Black Hat and Def Con. The researchers split into teams, and hospital officials presented them with about 40 different medical devices. Do your worst, the researchers were instructed. Hack whatever you can. Continue reading
Germany’s BND foreign intelligence service spied on the FBI and U.S. arms companies, a public radio station in the country disclosed Wednesday. Continue reading
Two American firms contracted by the Department of Defense have settled a lawsuit accusing them of having hired Russian programmers based in Moscow to write computer code for classified systems. The hires allegedly occurred as part of a $613 million contract, which was awarded by the US Pentagon to Massachusetts-based Netcracker Technology Corporation and Virginia-based Computer Systems Corporation (CSC). The two companies were hired to write software for the US Defense Information Systems Agency (DISA), a Pentagon outfit that provides the US armed forces with secure real-time combat communications. But in 2011, contractor John C. Kingsley, who had a supervisory role in the project, notified the US government that the two companies had farmed out part of the contract’s coding duties to programmers in Moscow and other Russian cities. Continue reading