Cyber Command moves closer to a major new weapon

https://www.armytimes.com/resizer/RLZgP9H16d0iMFk8r-77ilZ6Vw8=/1200x0/filters:quality(100)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/J3PNNQCXKNAUXK6BW3KQNOUSAE.jpg

A proposal for the next generation cyber operations platform went out to industry recently, however, details are scarce. (J.M. Eddins Jr./Air Force)

 

The Air Force issued a formal proposal earlier this month for the Department of Defense’s long-awaited cyber weapon system, known as the Unified Platform, sources tell Fifth Domain.

DoD officials have said the Unified Platform is one of U.S. Cyber Command’s largest and most critical acquisition programs to date. Industry officials have said it is necessary to conduct cyber operations and is critical to national security. Continue reading

Mysteries of HYPERSONIC super fighter jet that will ‘circle globe in 3 HOURS’ REVEALED

The Valkyrie II is expected to be in production within 10 to 20 years

HYPERSONIC: The Valkyrie II is expected to be in production within 10 to 20 years (BOEING/ FACEBOOK)

 

THE incredible first details about a hypersonic fighter jet that can blast enemy targets as it zaps around the world in three hours have been revealed.

Boffins first unveiled plans for the Valkyrie II last month, which they aim to build in the next 10 to 20 years. Continue reading

U.S. Navy Launches First-Ever Submarine Drone Squadron

USS Nimitz, USS Kitty Hawk, and USS John C. Stennis Carrier Strike Groups transit in formation during a joint photo exercise / Getty Images

 

The U.S. Navy launched its first-ever underwater drone squadron on Wednesday, demonstrating the growing role of unmanned craft as a vital component of the military. Continue reading

China unveils ‘armed attack’ robots armed with guns and grenades

https://i1.wp.com/i.telegraph.co.uk/multimedia/archive/03511/robot-m_3511149b.jpg

An armed attack robot

 

“Armed attack” robots that carry rifles and grenade launchers have been unveiled in China as the latest line of defence in the fight against “global terror”, state media reported.

The toy-sized attacker is one of a trio of new “anti-terror” machines, Xinhua news agency said, in a report which did not specify measures that would stop the robots falling into the wrong hands.

Continue reading

Iranian Warships Confront U.S. Navy On ‘Daily Basis’

U.S. naval forces operating in and around the Strait of Hormuz, a critical shipping lane, are “routinely approached by Iranian warships and aircraft” on a “nearly daily basis,” according to a Pentagon official familiar with operations in the region.

During these interactions between U.S. and Iranian forces, American aircraft and ships are routinely photographed by the Iranians for intelligence purposes, according to the official, who said that most confrontations between the sides are “conducted in a safe and professional manner.” Continue reading

China Preparing for Drone Warfare

Bear in mind that China has for years now the rights for over 90% of the entire rare earth minerals, globally. China is also an industrial and manufacturing powerhouse that make it possible, when these two factors are combined, to crank out hundreds of thousands of widgets.

If you have ever wondered how an attack could be like a cloud covering the land as described in the book of Ezekiel 38, this is how.

The sword is being sharpened and coming.

 

https://i2.wp.com/s1.freebeacon.com/up/2015/05/lijianUAV.jpg

 

PLA plans to build 42,000 UAVs, Pentagon says

China’s military plans to produce nearly 42,000 land-based and sea-based unmanned weapons and sensor platforms as part of its continuing, large-scale military buildup, the Pentagon’s annual report on the People’s Liberation Army (PLA) disclosed Friday.

China currently operates several armed and unarmed drone aircraft and is developing long-range range unmanned aerial vehicles (UAVs) for both intelligence gathering and bombing attacks.

“The acquisition and development of longer-range UAVs will increase China’s ability to conduct long-range reconnaissance and strike operations,” the report said. Continue reading

Kiev Preparing Strike Against Eastern Ukraine – DPR Leader

MOSCOW (Sputnik) – The eastern Ukrainian self-proclaimed Donetsk People’s Republic’s reconnaissance organs have reported that Kiev is planning to strike against the country’s eastern regions, DPR leader Alexander Zakharchenko said Thursday. Continue reading

Swarm robots poised to fly amid acquisitions and military investment

military-5.jpg

 

Summary: The military is going miniature, and that means big investments in small flying machines that will eventually operate in swarms.

An updated version of a battle-tested nano-UAV stole the show at an annual trial of military gadgets at Fort Benning, Georgia, last month. Tech readers may be nearing peak-UAV, but this autonomous bug-like vehicle is worth paying attention to.

The PD-100 Black Hornet, manufactured by Prox Dynamics, is an air vehicle about the size of a man’s finger. The UAV weighs 18 grams and now contains day and night-vision cameras that send still images or video back to an operator via a data-link. Designed for reconnaissance, the vehicle is incapable of attack or defense. But its size and ability to fly autonomously or semi-autonomously make it a clear precursor to the next generation of swarm robots. Welcome to the future of warfare. Continue reading

Russia Develops Two New Drones, Ready for Testing

The Russian United Instrument Corporation (UIC) has constructed two prototype versions of reconnaissance and strike drones, code-named “Chirok,” and is currently preparing them for tests, a source at UIC told RIA Novosti Friday. Continue reading

China’s Military Preparing for ‘People’s War’ in Cyberspace, Space

China’s military is preparing for war in cyberspace involving space attacks on satellites and the use of both military and civilian personnel for a digital “people’s war,” according to an internal Chinese defense report.

“As cyber technology continues to develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in space is vital for China’s military modernization. Continue reading

Chinese Army Prepares for Conflict with United States

The People’s Liberation Army (PLA) of China is making significant strides toward developing a global military power large enough to protect its rapidly increasing global economic interests, an author of a new book on China explained Wednesday.

“Chinese military planners really seem convinced that their most likely enemy and their greatest potential threat is the United States,” Wortzel said his analysis of PLA journals showed. “Things aren’t great with Russia, and things are a lot worse with Japan, but they focus on us and our technology.”

The transformation began less than a decade ago when in 2004 leader Hu Jintao announced that the PLA’s mission must be to go global in order to safeguard the country’s expanding national interests. Continue reading

Game of Drones — China stepping up drone deployment

China’s military is expanding its unmanned aerial vehicle forces with a new Predator-like armed drone and a new unmanned combat aircraft amid growing tensions with neighbors in Asia, according to U.S. intelligence officials.

New unarmed drone deployments include the recent stationing of reconnaissance and ocean surveillance drones in Northeast Asia near Japan and the Senkaku islands and along China’s southern coast. Drones also are planned for the South China Sea where China has been encroaching on international waters and bullying nations of that region in asserting control over international waters, said officials familiar with intelligence reports. Continue reading

White House Hack Attack

What good is a nuclear deterrent when it’s compromised? The “MAD” concept has been effectively thrown out the window. What’s more is the American public is 99.9% unaware of the grave danger this puts them in, let alone it happened at all. Sadly, the only “football” most are concerned about is the one that gets tossed around on Monday nights.

Hackers linked to China’s government broke into one of the U.S. government’s most sensitive computer networks, breaching a system used by the White House Military Office for nuclear commands, according to defense and intelligence officials familiar with the incident.

One official said the cyber breach was one of Beijing’s most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks.

U.S. officials familiar with reports of the White House hacking incident said it took place earlier this month and involved unidentified hackers, believed to have used computer servers in China, who accessed the computer network used by the White House Military Office (WHMO), the president’s military office in charge of some of the government’s most sensitive communications, including strategic nuclear commands. The office also arranges presidential communications and travel, and inter-government teleconferences involving senior policy and intelligence officials.

“This is the most sensitive office in the U.S. government,” said a former senior U.S. intelligence official familiar with the work of the office. “A compromise there would cause grave strategic damage to the United States.”

Security officials are investigating the breach and have not yet determined the damage that may have been caused by the hacking incident, the officials said.

Despite the administration national security official’s assertion, one defense official said there is fairly solid intelligence linking the penetration of the WHMO network to China, and there are concerns that the attackers were able to breach the classified network.

Details of the cyber attack and the potential damage it may have caused remain closely held within the U.S. government.

However, because the military office handles strategic nuclear and presidential communications, officials said the attack was likely the work of Chinese military cyber warfare specialists under the direction of a unit called the 4th Department of General Staff of the People’s Liberation Army, or 4PLA.

It is not clear how such a high-security network could be penetrated. Such classified computer systems are protected by multiple levels of security and are among the most “hardened” systems against digital attack.

However, classified computer systems were compromised in the past using several methods. They include the insertion of malicious code through a contaminated compact flash drive; a breach by a trusted insider, as in the case of the thousands of classified documents leaked to the anti-secrecy web site Wikileaks; and through compromised security encryption used for remote access to secured networks, as occurred with the recent compromise involving the security firm RSA and several major defense contractors.

According to the former official, the secrets held within the WHMO include data on the so-called “nuclear football,” the nuclear command and control suitcase used by the president to be in constant communication with strategic nuclear forces commanders for launching nuclear missiles or bombers.

The office also is in charge of sensitive continuity-of-government operations in wartime or crises.

The former official said if China were to obtain details of this sensitive information, it could use it during a future conflict to intercept presidential communications, locate the president for targeting purposes, or disrupt strategic command and control by the president to U.S. forces in both the United States and abroad.

Former McAffee cyber threat researcher Dmitri Alperovitch said he was unaware of the incident, but noted: “I can tell you that the Chinese have an aggressive goal to infiltrate all levels of U.S. government and private sector networks.”

The White House network would be the crown jewel of that campaign so it is hardly surprising that they would try their hardest to compromise it,” said Alperovictch, now with the firm Crowdstrike.

Last week the senior intelligence officer for the U.S. Cyber Command said Chinese cyber attacks and cyber-espionage against Pentagon computers are a constant security problem.

“Their level of effort against the Department of Defense is constant” and efforts to steal economic secrets are increasing, Rear Adm. Samuel Cox, Cyber Command director of intelligence, told Reuters after a security conference.

“It’s continuing apace,” Cox said of Chinese cyber-espionage. “In fact, I’d say it’s still accelerating.”

The office is also in charge of the White House Communications Agency, which handles all presidential telephone, radio, and digital communications, as well as airlift operations through both fixed-wing and helicopter aircraft.

It also operates the presidential retreat at Camp David and the White House Transportation Agency.

“To assure proper coordination and integration, the WHMO also includes support elements such as operations; policy, plans, and requirements; administration, information resource management; financial management and comptroller; WHMO counsel; and security,” the website states.

“Together, WHMO entities provide essential service to the president and help maintain the continuity of the presidency.”

A report by the defense contractor Northrop Grumman made public by the congressional U.S.-China Economic and Security Review Commission in March stated that China’s military has made targeting of U.S. command and control networks in cyber warfare a priority.

Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict,” the report said.

“PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict,” the report said.

C4ISR is military jargon for command, control, communications, computers, intelligence, surveillance, and reconnaissance.

Little is known within the U.S. intelligence community about Chinese strategic cyber warfare programs.

However, recent military writings have disclosed some aspects of the program, which is believed to be one of Beijing’s most closely guarded military secrets, along with satellite weapons, laser arms, and other high-technology military capabilities, such as the DF-21 ballistic missile modified to attack aircraft carriers at sea.

A Chinese military paper from March stated that China is seeking “cyber dominance” as part of its efforts to build up revolutionary military capabilities.

“In peacetime, the cyber combat elements may remain in a ‘dormant’ state; in wartime, they may be activated to harass and attack the network command, management, communications, and intelligence systems of the other countries’ armed forces,” wrote Liu Wangxin in the official newspaper of the Chinese military on March 6.

“While great importance is attached continuously to wartime actions, it is also necessary to pay special attention to non-wartime actions,” he said. “For example, demonstrate the presence of the cyber military power through cyber reconnaissance, cyber deployment, and cyber protection activities.”

Full article: White House Hack Attack (Washington Free Beacon)

Russia to Launch 100 Military Satellites in Next Decade

Russia is planning to launch at least 100 military satellites in the next 10 years to boost its reconnaissance and missile detection capabilities, head of Russian Space Agency Roscosmos Vladimir Popovkin said on Wednesday.

“The new 100 satellites will provide us with better quality intelligence, faster and more reliable communications,” Popovkin said in an interview with Vesti 24 television.

“This will also enable us to detect the launches and track not only ballistic, but also cruise missiles, theater and tactical missiles,” Popovkin said.

Full article: Russia to Launch 100 Military Satellites in Next Decade (Global Security)