Russians use front-company to access US federal employees’ contact info, says report

EFIS Estonia

 

Russian spy agencies use front companies to purchase directorates that contain the contact details of United States government employees, according to a new intelligence report. The contact details are contained in multi-page directories of Congressional staff members and employees of US federal agencies. They are published every January by a specialist vendor called Leadership Connect with the cooperation of a Washington, DC-based provider of publishing services. The directories contain the names, job titles, professional addresses and telephone numbers of US government employees. Continue reading

Chinese Communist Party Funds Washington Think Tanks

China's President Xi Jinping

China’s President Xi Jinping / Getty Images

 

United Front Work Department conducts aggressive influence operations in U.S.

China’s Communist Party is intensifying covert influence operations in the United States that include funding Washington think tanks and coercing Chinese Americans, according to a congressional commission report.

The influence operations are conducted by the United Front Work Department, a Central Committee organ that employs tens of thousands of operatives who seek to use both overt and covert operations to promote Communist Party policies. Continue reading

China To Deploy Elite Troops In Syria To Fight Alongside Assad’s Army

File photo via “Life of Soldiers” blog

 

According to multiple reports in Middle East regional sources, China plans to send elite military units to Syria to advise and assist the Syrian Army in an attempt to root out the country’s terrorist insurgency, especially Chinese Islamist foreign fighters who have shown up in increasing numbers in Syria’s north since the start of the conflict. Continue reading

Australian spy agency says it is facing ‘unprecedented’ espionage threat

 

The primary intelligence agency of Australia says its resources are overextended as the country faces “espionage and foreign interference [of an] unprecedented” scale. In its annual report to the Australian houses of parliament, which was produced on Tuesday, the Australian Security Intelligence Organisation (ASIO) says it lacks resources to counter “harmful espionage” and “malicious activity” against the country. The unclassified report is published every year as a summary of a much longer classified report, which is shared with senior government officials and senior civil servants. It is endorsed by ASIO Director Duncan Lewis, who serves as Australia’s Director-General of Security. Continue reading

Iranian state-backed cyber spies becoming increasingly skilled, says report

Computer hacking

 

A group of cyber spies with close links to the Iranian government is becoming increasingly competent and adept, and could soon bring down entire computer networks, according to a leading cyber security firm. The California-based cyber security company FireEye said that it has been monitoring the operations of the mysterious group of cyber spies since 2013. The company, whose clients include Sony Pictures, JP Morgan Chase and Target, said that the Iranian group appears to be especially interested in gathering secrets from aviation, aerospace and petrochemical companies. Continue reading

Turkish diplomats stepping up espionage in Europe, claims German report

Turkish embassy in Germany

 

Turkish state agencies have asked the country’s diplomats stationed all over Europe to spy on Turkish expatriate communities there, in an effort to identify those opposed to the government, according to a German report. The government of Turkish President Recep Tayyip Erdoğan accuses members of the so-called Gülen movement of orchestrating a military coup in July of last year, which resulted in an armed attack on the country’s parliament and the murder of over 200 people across Turkey. The Gülen movement consists of supporters of Muslim cleric Fethullah Gülen, who runs a global network of schools, charities and businesses from his home in the United States. The government of Turkey has designated Gülen’s group a terrorist organization and claims that its members have stealthily infiltrated state institutions since the 1980s. Continue reading

China’s spies gain valuable US defense technology: report

US intelligence agencies have determined that China stole secrets relating to the F-35 jet fighter from a US contractor. Photo: Reuters

US intelligence agencies have determined that China stole secrets relating to the F-35 jet fighter from a US contractor. Photo: Reuters

 

According to the annual report of the US-China Economic and Security Review Commission, Chinese cyber espionage is a “major problem” for America

China has gained military benefits in recent years from stealing defense secrets through industrial and cyber espionage carried out by its intelligence services, according to a US congressional report.

“In recent years, Chinese agents have extracted data on some of the most advanced weapons and weapons systems in the US arsenal, such as jet fighters and unmanned submersible vehicles,” states the annual report of the US-China Economic and Security Review Commission, released on November 16.

“The loss of these and other sensitive defense technologies undermines US military superiority by accelerating China’s military modernization and giving China insight into the capabilities and operation of US weapons and weapons systems,” the report adds. Continue reading

Is Chinese salvage ship searching for flight MH370 spying on Australia?

The Chinese embassy in Canberra has strongly denied accusations that a Chinese government ship involved in the international effort to find the missing Malaysia Airlines Flight MH370 is spying on the Royal Australian Navy. The ship, the Dong Hai Jiu 101, is a salvage and rescue vessel built in Shanghai in 2012 and currently sailing under the Chinese flag. In April, the Chinese government contracted the Dong Hai Jiu 101 to join the international search effort for the wreckage of Flight MH370. The Boeing 777 aircraft disappeared over the South China Sea on March 8, 2014, while flying from Kuala Lumpur International Airport in Malaysia, to the Beijing Capital International Airport in China. Continue reading

Six Aircraft Carriers Underway Marks Milestone for Navy: Top Officer

As the aircraft carrier USS Dwight D. Eisenhower entered the Mediterranean Sea this week, Chief of Naval Operations Adm. John Richardson told lawmakers on Capitol Hill the deployment has historic import [sic] for the Navy.

American warships are operating in the South China Sea, where intensifying territorial counterclaims and aggressive actions by China are responsible for heightening tension, and the Middle East, where two carriers — the Harry S. Truman and the Eisenhower — now are positioned to carry out airstrikes against targets of the Islamic State in Iraq and Syria, or ISIS.

As of last week, Richardson said, the Navy had six carriers underway — a development he called “a milestone.” Continue reading

What Happens When Spies Can Eavesdrop on Any Conversation?

Imagine having access to the all of the world’s recorded conversations, videos that people have posted to YouTube, in addition to chatter collected by random microphones in public places. Then picture the possibility of searching that dataset for clues related to terms that you are interested in the same way you search Google. You could look up, for example, who was having a conversation right now about plastic explosives, about a particular flight departing from Islamabad, about Islamic State leader Abu Bakr al-Baghdadi in reference to a particular area of Northern Iraq.

On Nov. 17, the U.S. announced a new challenge called Automatic Speech recognition in Reverberant Environments, giving it the acronym ASpIRE. The challenge comes from the Office of the Director of National Intelligence, or ODNI, and the Intelligence Advanced Research Projects Agency, or IARPA. It speaks to a major opportunity for intelligence collection in the years ahead, teaching machines to scan the ever-expanding world of recorded speech. To do that, researchers will need to take a decades’ old technology, computerized speech recognition, and re-invent it from scratch. Continue reading