Fivefold surge in Americans on Chinese-firm payroll in the US: report

Although the numbers are still quite low, the key issue is not the amount. It likely wouldn’t take more than running 5% of American businesses nation-wide in the most critical industries and businesses to wreak economic havoc if the CCP so wished to pull the trigger — and as the last few years have increasingly shown us, the Chinese leadership’s behavioral patterns and actions indicate wreaking havoc on America is their intention.

 

The number of Americans on Chinese company payrolls has surged more than fivefold over the past five years along with growing foreign direct investment by China in the United States, a study by two US-based organisations has found.

The report – released this month by non-profit group, the National Committee on US-China Relations, and economic think tank Rhodium Group – highlighted the expansion of Chinese firms in various American congressional districts.

The report, titled “New Neighbours: Chinese Investment in the United States by Congressional District”, showed Chinese firms had invested US$46 billion in new establishments and acquisitions in the US since 2000.

Continue reading

Russian spy plane spotted over LANCASHIRE: Shock sighting as tensions with Putin boil over

A RUSSIAN spy plane has been spotted flying low over Lancashire as tensions between Vladimir Putin and the West mount to near emergency levels.

The Antonov An-30, armed with five high-resolution cameras, was spotted by photographer Steve Bradley, 41, who was astonished to see it over his garden in Colne, Lancashire.

It comes as British Typhoon jets were forced to intercept a Russian spy plane last week and escort it away from UK airspace.

In the last month, three Russian warships have been monitored sailing through the English Channel. Continue reading

Chinese Military Declares the Internet an Ideological ‘Battleground’

China’s military newspaper, the People’s Liberation Army Daily, warned on Wednesday that China must “resolutely protect ideological and political security on the invisible battleground of cyberspace.” The call to arms against “Western hostile forces” on the Internet comes amidst a broader push for tighter Internet controls, including experiments with offensive cyber capabilities against websites that have been banned in China.

The piece begins by repeating a claim China has made often: that Internet or cyber sovereignty is a manifestation of national sovereignty. Over the past year, China has called attention to this concept in media articles and official speeches, seeking to win international recognition of its conceptualization of how the internet should be governed. The PLA Daily piece makes it clear that China’s “cyber territory” must be defended as vigorously as physical territory. The article warned that if China doesn’t occupy and defend its “cyber territory,” then nameless “hostile forces” will use it as a “bridgehead” to attack China. Continue reading

Bird Flu Is Slamming Factory Farms But Sparing Backyard Flocks. Why?

Why? Because we’re likely seeing bio-terrorism.

Terrorists who could be poisoning the food supply don’t care about the smaller targets since they will have little or no impact if 50 chickens wind up dead. They are bent on maximum damage to human health and economic destruction. Prices are skyrocketing and the food supply is facing shortage and scarcity issues.

Don’t be surpised this Thanksgiving if you find difficulty in putting a Turkey on the table.

 

The Midwest’s ongoing avian flu crisis is wreaking havoc on the region’s large-scale egg and turkey farms. Last week alone, the US Department of Agriculture confirmed that the virus had turned up in more than 20 additional facilities in the region, condemning 4 million birds to euthanasia. Altogether, the H5N2 virus—”highly pathogenic” to birds, so far non-threatening to humans—has affected 168 sites and a jaw-dropping 36 million birds, the great bulk of them in Iowa and surrounding states. It’s the largest avian flu outbreak in US history—and it has already wiped out 40 percent of the egg-laying flock h Iowa, the number-one egg-producing state in the US, according to The New York Times.

But it’s largely leaving backyard flocks unscathed. Why? Continue reading

The New German Arrogance (II)

Germany knows controlling the flow of information is key, therefore it is now capturing the cyber realm. This, plus taking steps towards an EU Army, forcing further integration of EU member states and turning them into vassal states (i.e. Cyprus) are all key actions/characteristics of a nation striving to be a world superpower. Germany is now directly competing against the United States. The Fourth Reich has (almost) landed.

 

BERLIN/WASHINGTON/VIENNA (Own report) – In cooperation with NSA, a US military intelligence service, the German Federal Intelligence Service (BND) has massively intercepted and stored emails from Austria, Luxembourg and the Czech Republic. This became evident through an internal email from an employee of the Deutsche Telekom AG, responsible for cooperation with the intelligence service and police. According to the email, published by the Austrian parliamentarian Peter Pilz, Telekom, already in early February 2005, had given a green light to the BND having access to a fiber optic cable for internet communication connecting Luxembourg to Austria and numerous other countries. At the time, Frank-Walter Steinmeier (SPD), as Head of the Federal Chancellery, bore the highest responsibility for the activities of the BND. According to reports, Austria’s domestic intelligence was also being tapped. Whoever is cognizant of this communication, knows “almost everything about the Republic’s political life,” summarized Pilz. The governments concerned have raised no serious protests, in the Germany-dominated EU. The German government is continuing the BND’s technological upgrading, aimed ultimately toward raising German espionage “to an equal footing” with the NSA – also in internet spying.

Continue reading

US Federal Reserve Bank Hit by Hackers

Hackers successfully attacked the Federal Reserve Bank of St. Louis, redirecting users of its online research services to fake websites set up by the attackers, the bank said on Tuesday.

The fake websites were designed to look like the web pages of services provided by the Federal Reserve Bank of St. Louis. The attack compromised the Internet’s routing system, known as the domain name system (DNS). Continue reading

U.S. Charges 6 Chinese with Economic Espionage

The U.S. Department of Justice has charged six Chinese nationals with economic espionage and theft of trade secrets for allegedly accessing secret U.S. technologies and sharing them with universities and companies controlled by the Chinese government.

Unsealing an indictment filed last month, U.S. officials in Washington announced the charges Tuesday. The defendants, all Chinese nationals, include Hao Zhang, who is in custody, his fellow engineer Wei Pang and four other Chinese engineers and professors of stealing trade secrets from two U.S. technology companies, Skyworks Solutions and Avago Technologies. Continue reading

ISIS preparing total cyber war on critical US systems

Hooded hackers released a video Monday stating that the Islamic State in Iraq and Syria was preparing to wage all-out “electronic” war on the US and Europe, but the war has not yet begun. Continue reading

Feds Say That Banned Researcher Commandeered a Plane

A security researcher kicked off a United Airlines flight last month after tweeting about security vulnerabilities in its system had previously taken control of an airplane and caused it to briefly fly sideways, according to an application for a search warrant filed by an FBI agent.

Chris Roberts, a security researcher with One World Labs, told the FBI agent during an interview in February that he had hacked the in-flight entertainment system, or IFE, on an airplane and overwrote code on the plane’s Thrust Management Computer while aboard the flight. He was able to issue a climb command and make the plane briefly change course, the document states.

“He stated that he thereby caused one of the airplane engines to climb resulting in a lateral or sideways movement of the plane during one of these flights,” FBI Special Agent Mark Hurley wrote in his warrant application (.pdf). “He also stated that he used Vortex software after comprising/exploiting or ‘hacking’ the airplane’s networks. He used the software to monitor traffic from the cockpit system.” Continue reading

US technology may have been used to upgrade PLA submarine

A bilateral nuclear cooperation agreement was signed between the United States and China in 1985. Because the agreement is expected to expire by the end of this year, the Obama administration plans to make a new deal known as 123 agreement with China based on the Atomic Energy Act. It will help regulate the sharing of nuclear technology. During the hearing held on May 12 on the new agreement, Corker said that China is in violation of the current agreement as it provided a US nuclear reactor to Pakistan. Continue reading

Greece in advanced talks with China’s Cosco on Piraeus port

May 15 Greece is in advanced discussions with China’s Cosco to boost their cooperation in the country’s biggest port Piraeus , the Greek defence minister said on Friday.

Cosco, which currently manages two container piers at Piraeus Port, is also interested in acquiring a majority stake. Athens has put the port up for sale. Continue reading

Gordon Brown Adopts Marx’s Theory – Eliminate Cash Will Eliminate the Boom Bust Cycle

Gordon Brown… arguably Great Britain’s first Communist Prime Minister.

 

James Gordon Brown is a British politician who was the Prime Minister from June 2007 to May 2010 of the United Kingdom of Great Britain and Northern Ireland. Gordon has floated the Marxist Balloon for all we hear about now is eliminating physical money. Those who have ever worked in government NEVER see themselves as the problem – it is always us. So what is the Marxist Balloon? People not immediately in power float an idea so the government can gauge how the press and the people take it. If it goes badly, they say he is speaking personally. If it is not attacked, they float the policy. This is what Gordon Brown has just done. Continue reading

Russian cyber group seen preparing to attack banks

As described earlier in a previous post, these are essentially proxy groups with state backing. They create a group that allows for plausible deniability, showing no attributable activity.

 

A security firm is warning that a group of Russian hackers known for targeting military, government and media organizations is now preparing to attack banks in the U.S. and elsewhere.

The group’s preparations, which have included writing new malware, registering domain names similar to those of intended targets, and setting up command-and-control servers, were discovered by analysts from security firm Root9B.

Continue reading

Vladimir Putin has up to 10,000 troops in Ukraine, Russian opposition claims

Russia has 8000 to 10,000 soldiers in eastern Ukraine and has spent more than 53 billion roubles ($1.3 billion) supplying separatist rebels, according to a report compiled by Russian opposition activists.

The report, titled “Putin. War.”, was the last project of murdered Kremlin critic Boris Nemtsov, who used open source information and interviews with families to paint a picture contradicting Moscow’s argument that no serving Russian troops are fighting in Ukraine. Continue reading

Iran Rapidly Building Cyber Warfare Capabilities

Highlighted in teal below is a perfect example of grey terror during the ‘overture’ phase, as described in Soviet defector Viktor Suvorov’s book “Spetsnaz. The Story Behind the Soviet SAS” in chapter 15, Spetsnaz’s First World War.

Here’s a lengthy exerpt:

In Washington, as the President’s helicopter is taking off, several shots are fired at it from sniper’s rifles. The helicopter is only slightly damaged and the crew succeed in bringing it down again safely. No one in the craft is hurt. Responsibility for the attack is claimed by a previously unknown organisation calling itself ‘Revenge for Vietnam’.

There is a terrorist explosion at Vienna airport.

A group of unidentified men attack the territory of the British military base in Cyprus with mortars.

A serious accident takes place on the most important oil pipeline in Alaska. The pumping stations break down and the flow of oil falls to a trickle.

In West Germany there are several unsuccessful attempts on the lives of American generals.

In the North Sea the biggest of the British oil rigs tips over and sinks. The precise reason for this is not established, although experts believe that corrosion of main supports is the culprit.

In the United States an epidemic of some unidentified disease breaks out and spreads rapidly. It seems to affect port areas particularly, such as San Francisco, Boston, Charleston, Seattle, Norfolk and Philadelphia.

There are explosions practically every day in Paris. The main targets are the government districts, communication centres and military headquarters. At the same time terrible forest fires are raging in the South of France.

All these operations — because of course none of these events is an accident — and others like them are known officially in the GRU as the ‘preparatory period’, and unofficially as the ‘overture’. The overture is a series of large and small operations the purpose of which is, before actual military operations begin, to weaken the enemy’s morale, create an atmosphere of general suspicion, fear and uncertainty, and divert the attention of the enemy’s armies and police forces to a huge number of different targets, each of which may be the object of the next attack.

The overture is carried by agents of the secret services of the Soviet satellite countries and by mercenaries recruited by intermediaries. The principal method employed at this stage is ‘grey terror’, that is, a kind of terror which is not conducted in the name of the Soviet Union. The Soviet secret services do not at this stage leave their visiting cards, or leave other people’s cards. The terror is carried out in the name of already existing extremist groups not connected in any way with the Soviet Union, or in the name of fictitious organisations.

The GRU reckons that in this period its operations should be regarded as natural disasters, actions by forces beyond human control, mistakes committed by people, or as terrorist acts by organisations not connected with the Soviet Union.

The terrorist acts carried out in the course of the ‘overture’ require very few people, very few weapons and little equipment. In some cases all that may be needed is one man who has as a weapon nothing more than a screwdriver, a box of matches or a glass ampoule. Some of the operations can have catastrophic consequences. For example, an epidemic of an infectious disease at seven of the most important naval bases in the West could have the effect of halving the combined naval might of the Soviet Union’s enemies.

 

Cyber attacks on banks, casino highlight growing threat

“Iranian hackers have been suspected in multiple incidents that inflicted damage on various entities in the private sector, including finance and energy firms,” according to the five-page report, “Pistachios and Saffron: Investigating the Iranian Cyber Threat.”

“Current analysis indicates Iran may intend to use its growing cyber force to attack global critical infrastructure,” the report added.

Once limited to website defacements and other less damaging attacks, Tehran’s hacker forces are now capable of using customized malicious software designed for use against specific victims. Continue reading

Follow

Get every new post delivered to your Inbox.

Join 498 other followers

%d bloggers like this: