Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.
Malevolent

If what China just did doesn’t scare you, you’re not paying attention

3 posts in this topic

SOURCE: http://allenbwest.com/2015/09/what-chinas-doing-while-obama-snaps-selfies-should-set-off-major-alarms/

Written by Allen West on September 15, 2015
3634_chinaescort_03
 

The Obama administration pivoted its national security strategy and foreign policy away from the Middle East to the Pacific Rim. The biggest shift was to move a battalion of Marines to Australia — quite sure they’re enjoying being Down Under. Meanwhile, China has increased its cyber attacks against the United States. It has further encroached upon the Japanese territory known as the Senkaku Islands on the Philippines Scarborough Shoals. China has recently conducted naval exercises off the coast of Alaska while President Obama was there discussing climate change. And now China has just flipped Obama another response to his so-called shift to the Pacific.

 

As reported by the Washington Free Beacon“China appears to be building a third airstrip in contested territory in the South China Sea, a U.S. expert said on Monday, citing satellite photographs taken last week.

The photographs taken for Washington’s Center for Strategic and International Studies (CSIS) think tank on Sept. 8 show construction on Mischief Reef, one of several artificial islands China has created in the Spratly archipelago.The images show a rectangular area with a retaining wall, 3,000 meters (3,280 yards) long, matching similar work by China on two other reefs, Subi and Fiery Cross, said Greg Poling, director of CSIS’s Asia Maritime Transparency Initiative (AMTI).

“Clearly, what we have seen is going to be a 3,000-meter airstrip and we have seen some more work on what is clearly going to be some port facilities for ships,” he said. Security experts say the strip would be long enough to accommodate most Chinese military aircraft, giving Beijing greater reach into the heart of maritime Southeast Asia, where it has competing claims with several countries. China stepped up creation of artificial islands in the South China Sea last year, drawing strong criticism from Washington, which has spoken against militarization of outposts there.”

More at the link.... 

Share this post


Link to post
Share on other sites

Evil has no restrictions here on this earth ! 

The fact is God has a plan to conquer and divide the masses . He will call his people through death and pain . Don't fear the Reaper he will save you from the demise of this this world as it is . The Reaper is not a bad inanity he is just a guide to your deserved detestation . 

As most of you guys that know me know that I am not a religions person . I don't adhere to political ideologies is what a religion is but spiritualism that is another subject .

I had a dream a vision of the end times . We are it ! Like it or not ! The best we can do is to warn people of whats to come and lead them to what they seek; FREEDOM ...

True FREEDOM is only in the harts and minds of those that seek it . In this world there will always be as has been someone wanting to rule .

I love all humanity and all things living ! It's religions and political ideologies that I hate .

 

 

 

 

1 person likes this

Share this post


Link to post
Share on other sites

Meanwhile, China has increased its cyber attacks against the United States.

I'm not saying its not possible, but I previously had information (probably still do but it may have been lost as pc locks up alot, as to why I can't find it/maybe lost but anyhow) that its really nsa and it spelled it all out. This should allow you to learn more however, without that info atm.

 “The irony is that exactly what they are doing to us is what they have always charged that the Chinese are doing through us.”cont

A year ago, the Internet security firm Mandiant went public with what cyber-war watchers had known for some time: Unit 61398, a secret branch of the Chinese military, had been behind more than 1,000 cyber attacks on Western targets since 2006.  cont (hmm sounds like Israel's 1802 division (see echlon thread) and the attacks they are supposedly doing are the same ones nsa/gchq/israel is doing for a long time now..., letc continue shall we...

 Two days after checking out of the Mira Hotel on June 10, Snowdenshowed The South China Morning Post (SCMP) an unknown number of documents revealing "operational details of specific [NSA] attacks on [Chinese] computers, including internet protocol (IP) addresses, dates of attacks, and whether a computer was still being monitored remotely." cont

Snowden described MonsterMind as problematic, noting that cyberattacks are often routed through computers in “innocent” third countries. This raises the possibility of U.S. counter attacks against the wrong targets.  “You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia,” he said. “And then we end up shooting back at a Russian hospital. What happens next?” cont (what would be great is if the nsa and friends would fire enough crap to de st roy themselves)

The second quick idea I want to mention is that the distribution process could also be as different as making a fun trip to China with, for example, a USB stick that's carrying the malware, and physically distributing it to machines that are housed and maintained in China (most likely by regular, unwary people who would never even imagine it). It can also easily be done over WiFi networks, which would be nearly impossible to trace to the actual origin if some very simple measures are taken. The infected machines,--regardless of how they were infected,--will then continue the distribution process over the internet (we’re assuming) through Chinese networks in this case. Unless the owners of the infected machines are using satellite internet provided by businesses from other nations, which is a possibility, especially in China; although, an expensive possibility, pretty much no matter where you go. cont (which is exactly what nsa/has done and does). Also China's internet has "great firewall" blocking it, as to only allow about 2,000 websites accessible(last I checked and seen the map), although some use things to get around it.

---------------------

ON FEBRUARY 19th Mandiant, a security firm, released a report alleging that hackers from a Chinese military outfit known as Unit 61398 were probably behind attacks against more than a hundred companies and government agencies around the world. Without delving into the geopolitics of the the incident, involvement in which the Chinese authorities vehemently deny (and which we write about here), Babbage decided to examine what is known about the hackers' methods. In fact, Mandiant's detailed account of a group it dubs APT1 (after the term Advanced Persistent Threat) will not strike internet-security wonks as particularly Earth-shattering. It reveals the use of well-known techniques coupled with publicly available software—though some proprietary software, apparently perfected over many years, was also used. What has turned heads is the duration of the attacks and the range of the group's "ecosystem" of remote-control software. This combination allowed the hackers to siphon terabytes, or trillions of bytes, of data from their victims. In many ways, the attacks resembled those criminal groups and spammers deploy against individuals and businesses. A "spearphishing" e-mail is sent, which attempts to get members of an organisation to open an attachment that appears to originate from a colleague or business partner, and contains some typical business data. Rather than a file, though, the attachment is a piece of malware. When opened, it exploits system flaws to install backdoor access to the computer. This allows remote command-and-control servers anywhere on the internet to install additional software, capture keystrokes and images on the screen, and ferret around the local network. Mandiant says the hackers sometimes used malicious remote-access toolkits readily available on the "dark side" of the internet (if not through your average Google search). But mostly they either developed or acquired at least 42 "families" of proprietary remote-access tools. Some have dates imprinted in them which indicate they were initially programmed as early as 2004, with updates added over the subsequent six years. The attacks, in other words, were carefully planned and premeditated. To fool firewalls and other software, some remote-control malware mimicked traffic patterns of legitimate internet services, like the Jabber/XMPP chat system used by Google and Facebook, among others. This allowed them to send information to and from the infected machines without raising suspicions. A lot of the insidious traffic was encrypted, but this too is commonplace for many websites and services, including Twitter and standard e-mail.

(Emphasis on bolded, nsa does the same thing, traced back to Ohio, I forget the ip but I have it saved) Also nsa does all this stuff bolded.

Sony rootkits (millions of cd's) The software, which proved undetectable by anti-virus and anti-spyware programs, was in the form of a rootkit that opened the door for other malware to infiltrate computers unseen as well. cont

-----------

Sony came in for more criticism last week after it emerged that SunComm's MediaMax anti-piracy software used as an alternative to First4Internet's XCP program on Sony BMG CDs shipped in the US and Canada also created a security risk. The first version of the patch released to address SunnComm MediaMax version 5 software had a flaw of its own. Security researchers are currently reviewing a second patch. cont

--------------

Nov 20 2014 

NSA Chief: Damaging Cyber-Attack Coming

hackers have already penetrated key U.S. government and critical infrastructure IT systems to conduct surveillance. Once in a system, he said, the adversaries could turn destructive, if they choose, by shuttering turbines at power plants or disrupting electrical distribution systems, for instance, with a flip of a switch.

Except for China, the cyber commander wouldn't identify specific nation-states that pose a threat to the nation's critical infrastructure, but said some nations are turning to cybercriminal gangs as proxies to attack critical infrastructure to camouflage their nefarious activities in cyberspace. cont

(he must be referring to US and Isreal, like they did did to Iran centerfuges, furogemia(sp?), during jade helm to certain parts of the cell phone network, and where they cut off power to certain parts of the us)

-----------

If a government wanted information about specific types of employees at the Defense Department, it could hire or encourage a hacking group to attack a financial institution or health care system in the Washington, D. C., area. That would get them personal information about hundreds of thousands of individuals, some of whom may work at the Defense Department.

"They're hiding one attack in the noise of another, and everybody writes it off as cyber-crime," Graham said. cont

 

 

Share this post


Link to post
Share on other sites
Guest
You are commenting as a guest. If you have an account, please sign in.
Reply to this topic...

×   You have pasted content with formatting.   Restore formatting

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor


Our website is made possible by displaying online advertisements to our visitors.

Please consider supporting us by disabling your ad blocker.