Chinese hackers who breached Google gained access to sensitive data, U.S. officials say

Chinese hackers who breached Google’s servers several years ago gained access to a sensitive database with years’ worth of information about U.S. surveillance targets, according to current and former government officials.

The breach appears to have been aimed at unearthing the identities of Chinese intelligence operatives in the United States who may have been under surveillance by American law enforcement agencies. Continue reading

Pentagon: Iran Expands Use of Proxies

Hagel shortens public version and for first time calls Iran strategy ‘defensive’

Iran’s terrorist-backing government is expanding the use of proxies around the world to carry out its military policies, according to a Pentagon report.

The public portion of the first report to Congress under Hagel also was sharply curtailed this year from the four-page, unclassified assessment released in April 2012, to five paragraphs for the latest unclassified executive summary of the report dated January 2013.

Pentagon spokesmen initially said the five-paragraph executive summary was classified as “for official use only” and would not be released. A spokeswoman for the office of the undersecretary of defense for intelligence later made a copy of the new assessment available to the Washington Free Beacon. Continue reading

Troops in Motion — Chinese troops continue mobilization along N. Korean border

China’s military is continuing to mobilize military forces along the North Korean border despite official denials as Pyongyang appears set for a missile test launch this week, according to U.S. officials.

U.S. intelligence agencies continued to collect reports of Chinese military movements in border provinces that have been underway since last month. Continue reading

Obama brushes off Congress on Russian helicopters for Afghan military

WASHINGTON — The administration of President Barack Obama has
dismissed congressional objections to purchase military helicopters from Russia.

The Defense Department said it would proceed with the procurement of Mi-17 utility helicopters from Russia. The Pentagon said the helicopters would be transferred to the Afghanistan military. Continue reading

China Stealing State Secrets

Benjamin Bishop, a defense contractor with top secret clearance, was arrested on March 15 for passing on state secrets to a 27-year-old Chinese spy. The severe breach in national security shows that beyond losing information via Chinese hackers, more traditional methods of espionage, such as the “honey pot,” are continuing to take their toll.

Mr. Bishop was compromised when he met the young woman during a conference on international military defense issues. The name of the woman has not been released, but is referred to as “Person 1.” What is known is that Person 1 was living in Hawaii on a student visa, and was most likely at the military meeting to target people such as Mr. Bishop, who have access to classified information. Continue reading

Inside the Ring: New Bear bomber flights

Two Russian strategic nuclear bombers carried out a fourth high-profile training flight last week, flying near South Korea, where large-scale war games are under way, and near Japan and the U.S. military bases on Okinawa.

It was the fourth time since June 2012 that Russian bombers have run up against U.S. and allied air defense zones in the Pacific. Continue reading

Iran Navy to extend its presence to the Atlantic ocean in 2013

NICOSIA — The Iranian Navy plans to deploy warships in the Atlantic Ocean, having entered the Pacific Ocean for the first time since 1979 in late February.

The Iranian Navy said deployment in the Atlantic would begin in 2013. Officials said this would mark the first Iranian missions in the Atlantic. Continue reading

Recent cyberattacks could be part of a Chinese military strategy started nearly 20 years ago

In light of this, it’s highly recommended two read two books that were ahead of the curve and how they illustrate (by publishing date alone) that what we see transpiring just now was planned many decades ago. One could only imagine what the Chinese are up to now if we just now caught on to decades-old warfare plans. It’s often what you don’t see that hits you the hardest. Read the quotes and ask yourself if what you see happening today in general with a “recession” going on its 6th year (something no real economist has ever heard of) just happens to be what is called a ‘correction of the free market’ or something else.

The two books:

The first signs of China’s interest in cyberwarfare began with Major General Wang Pufeng, a former Director of the Strategy Department at the Academy of Military Science in Beijing. Now regarded as the founding father of “Chinese information warfare” (link in Chinese), Wang’s 1995 paper titled “The Challenge of Information Warfare” (a more literal translation of the Chinese, 信息战争与军事革命, would be “Information Technology and Military Revolution”) analyzed the way the US had used information technology to win battles. Wang urged the Chinese military to ”strive for an active approach in a reactive situation and use every means possible to destroy the opponent’s information superiority and transform our inferior position in information.”

Major General Wang Pufeng, the founding father of Chinese information warfare No. 1 School, Jiangyang City, Jiangsu Province

Here’s a longer excerpt from his analysis of how cyberwarfare would play out (emphasis is ours):

The large-scale importation of information technology deep into the field of warfare will inevitably bring about a military revolution. This revolution has actually already started.Those who perceive it first will swiftly rise to the top and have the advantage of the first opportunities. Those who perceive it late will unavoidably also be caught up in the vortex of this revolution. Every military will receive this baptism. Continue reading

Denial-of-service attack takes down JP Morgan Chase sites

The Web sites for banking giant JP Morgan Chase are offline this afternoon as the result of a distributed-denial-of-service attack, a representative told CNET.

The site’s usual banking tools and content were replaced this afternoon with a message that said:

Our website is temporarily down, but our branches and Mobile Apps are available. Please try again later. Continue reading

Russians Conduct Huge Nuke Drill

While the U.S. continues to “reset”, the neo-Soviet Union continues to restart.

Treaties are like pie crusts, they are made to be broken” – Vladimir Lenin

Russian nuclear forces hold large exercise involving movement of strategic and tactical warheads

The exercise raised concerns inside the Pentagon and with the U.S. European Command because it was the largest exercise of its kind in 20 years and involved heightened alert status of Russian nuclear forces.

The exercises followed a recent surge in Russian strategic bomber flights that include a recent circling of the U.S. Pacific island of Guam by two Tu-95 Bear bomber and simulated bombing runs by Tu-95s against Alaska and California in June and July. Continue reading

MONROE: The antiquation of America’s nuclear weapons

As mentioned many times here: As the list of America’s enemies continues to grow so do their threats and capacity to act upon them. The logical response would be to increase the would-be penalty for even coming close to showing intent in harming the United States. Yet, only what is counter-intuitive is the priority. Only in today’s times would people develop the illusion that total disarmament by the U.S. would be a demonstration of “moral strength.” Truth be told, there is nothing immoral about America preserving its military pre-eminence in the world.

In regards to a free world, when America (which is not untouchable) goes, so goes the rest of the free world. Any other Democratic countries are already too dependent on America for it’s security umbrella and will cave in to the demands of Russia and China (Shanghai Cooperation Organization — the new world war axis) after Washington gets hit with One Clenched Fist. It’s now 2013, a new year… and The United States is still consuming New Lies for Old.

Disarming while the world gears up a dangerous strategy

America is moving down a slippery slope, about to pass the point of no return. Our nuclear weapons capability is disintegrating. Here’s a quick assessment.

President Obama’s national goal — a world without nuclear weapons — is impossible and undesirable. Yet his administration is trying to lead the way into this fantasy land by making unilateral prohibitions, reductions, delays and cutbacks of all kinds. Today’s nuclear weapons policies — established by the Obama team in the Nuclear Posture Review — lead to nuclear weakness, rather than the nuclear strength that has kept us safe for over half a century. Continue reading

U.S. Warned: Al-Qaida Hit-Squads Coming

A senior Iranian Revolutionary Guard commander has warned America and Europe that al-Qaida operatives will soon attack them.

And a source in the Islamic regime’s Intelligence Ministry told WND that another terror team is about to enter the United States. Should the West not accept Iran’s rights to its nuclear program within six months, the terrorists will attack, he said.

The potential targets in the U.S. include high-voltage towers to create blackouts, cell towers, water supplies, public transportation and various buildings belonging to the Defense Department and military. Continue reading

Obama’s dangerous defense experiment

The United States military is blatantly being used as a divisive political wedge and being dismantled under the guise of a “sequester”, which is only the latest political means to an end. The US economic crisis is in general being used for a variety the Obama administration’s objectives. If this were happening in China the public and media would call this a coup and a national takeover. However, with the American public, the lights are on but nobody’s home.

The United States has cut down the military so rapidly and so blindly, we’re in danger of breaking the back of the force.

Mindful of the repeated rounds of cuts the military has already endured, Gen. Martin Dempsey, chairman of the Joint Chiefs, recently delivered a grim warning: “If you want [the military] to be doing what it’s doing today, then we can’t give you another dollar.”

His worries reflect reductions that started in 2009 and have reached crippling levels, even in President Obama’s proposals to avert sequestration. I take the general at his word, but I am concerned that the president does not. Continue reading

Exclusive: Cyberattack leaves natural gas pipelines vulnerable to sabotage

For further information on SCADAs, please see the following Global Geopolitics entries that were ahead of the curve:

Red Dragon Rising: Communist China’s Military Threat to America” from 1999 is a highly recommended read. The United States is in more vulnerable than most people know, and longer than most people would have thought.

Cyberspies linked to China’s military targeted nearly two dozen US natural gas pipeline operators over a recent six-month period, stealing information that could be used to sabotage US gas pipelines, according to a restricted US government report and a source familiar with the government investigation.

From December 2011 through June 2012, cyberspies targeted 23 gas pipeline companies with e-mails crafted to deceive key personnel into clicking on malicious links or file attachments that let the attackers slip into company networks, says the Department of Homeland Security (DHS) report.

The report does not mention China, but the digital signatures of the attacks have been identified by independent cybersecurity researchers as belonging to a particular espionage group recently linked to China’s military.

The confluence of these factors –  along with the sensitive operational and technical details that were stolen – make the cyberbreaches perhaps among the most serious so far, some experts say. The stolen information could give an adversary all the insider knowledge necessary to blow up not just a few compressor stations but perhaps many of them simultaneously, effectively holding the nation’s gas infrastructure hostage. Nearly 30 percent of the nation’s power grid now relies on natural gas generation.

“This theft of key information is about hearing the footsteps get closer and closer,” says William Rush, a retired scientist formerly with the Gas Technology Institute who chaired the effort to create a cybersecurity standard applicable to the gas pipeline industry.

“Anyone can blow up a gas pipeline with dynamite. But with this stolen information, if I wanted to blow up not one, but 1,000 compressor stations, I could,” he adds. “I could put the attack vectors in place, let them sit there for years, and set them all off at the same time. I don’t have to worry about getting people physically in place to do the job, I just pull the trigger with one mouse click.Continue reading

Beijing War Prep – China moves mobile missiles near coast amid tensions with Japan over islands

The PLA war machine’s intimidation is more than a test for the Japanese. Rather, it’s a test for the United States to show itself to Japan as either a reliable ally or an unreliable ally. At the rate the USA is disarming combined with the economy’s effect on the military and national security, it’s no longer unthinkable that it wouldn’t even be able to protect itself within the next four to ten years — let alone Japan or another ally.

United States intelligence agencies recently detected China’s military shifting road-mobile ballistic missiles closer to its southern coast near the disputed Senkaku Islands amid growing tensions between Beijing and Japan over the islands dispute.

U.S. defense officials said the movements are being watched closely as China’s military is also holding large-scale military exercises that some fear could be a trigger for a conflict with Japan that could involve U.S. forces. Continue reading