People’s Republic of China Cyber Situational Awareness for 11JUL2013…

Good Day Folks;

Much cyber news fem around the globe today – pay particular attention to a very good letter written by the People’s Republic of China’s Premier Li Keqiang regarding the notion of Chinese Intellectual Property theft…much more cyber situational awareness news available below for today, Thursday 11 JULY 2013…enjoy!

Full text of Chinese vice premier’s signed article published in U.S. newspaper – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-07/10/c_132526707.htm
Commentary: China-U.S. dialogue to transcend talks of cyber security – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-07/10/c_132528418.htm
People’s Republic of China concerned over U.S. restrictions on high-tech product exports: officials – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-07/11/c_132531823.htm
New China-U.S. relations start with Asia-Pacific: senior Chinese official – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-07/11/c_132532664.htm
Economic Impact of Cyber Espionage and IP Theft Hits U.S. Businesses Hard
http://www.cio.com/article/736132/Economic_Impact_of_Cyber_Espionage_and_IP_Theft_Hits_U.S._Businesses_Hard#ixzz2YfNU5alM
Why the People’s Republic of China will not buy the world –
http://www.ft.com/intl/cms/s/0/28d1a4a8-e7ba-11e2-babb-00144feabdc0.html
People’s Republic of China’s Evolving Overseas Interests and Its Diplomatic Strategy
http://en.siis.org.cn/index.php?m=content&c=index&a=show&catid=42&id=71
The Positive That Might Have Come Out the U.S.-China Cybersecurity Working Group
http://blogs.cfr.org/asia/2013/07/10/the-positive-that-might-have-come-out-the-u-s-china-cybersecurity-working-group/
Why isn’t LinkedIn Blocked in the People’s Republic of China?
http://www.techinasia.com/why-linkedin-not-blocked-china/
‘5 eyes’ spy network revealed
http://www.szdaily.com/content/2013-07/10/content_8282336.htm
New Snowden leak: Australia’s place in US spying web
http://rt.com/news/australia-nsa-snowden-surveillance-784/
People’s Republic of China, U.S. discuss cyber security
http://eng.mod.gov.cn/DefenseNews/2013-07/10/content_4458073.htm
People’s Republic of Hacking: Security in cyberspace ‘still major problem’- China.org.cn
http://www.china.org.cn/china/2013-07/10/content_29376741.htm
People’s Republic of Hackers…China’s freelance hackers: Proof that propaganda works
http://www.cbsnews.com/8301-202_162-57592999/chinas-freelance-hackers-for-love-of-country-and-proof-that-propaganda-works/
People’s Republic of China firmly supports cyber security: Chinese president – China.org.cn
http://www.china.org.cn/world/Off_the_Wire/2013-06/09/content_29080547.htm
Chinese Telecom Giant Huawei Pondering Pakistan Plant
http://www.techinasia.com/chinese-telecom-giant-huawei-pondering-pakistan-plant/?
Japan’s ‘white paper’ hypes up ‘China threat’
In his own words: Confessions of a cyber warrior
http://www.infoworld.com/print/222266
Time to redraw mental map of Sino-US issues
http://www.scmp.com/comment/insight-opinion/article/1279625/time-redraw-mental-map-sino-us-issues?login=1
People’s Republic of China’s security ministry says GSK executives confess to economic crimes
http://www.globalpost.com/dispatch/news/thomson-reuters/130711/china-security-ministry-says-gsk-execs-confess-crimes
People’s Republic of China To Loan Nigeria, Africa’s Largest Oil Exporter, $1.1B…OP Middle Kingdom continues…
http://www.ibtimes.com/nigeria-lands-11b-low-interest-loan-china-china-seeks-closer-ties-africas-largest-oil-exporter
IDC: People’s Repubic of China’s Lenovo Passes HP as World’s Top PC Maker
http://www.techinasia.com/idc-says-lenovo-passes-hp-worlds-top-pc-maker/
Recall Lenovo is under the leadership of China’s Chiese Academy of Science (CAS)…
http://www.techinasia.com/idc-says-lenovo-passes-hp-worlds-top-pc-maker/
Our computers are not going to kill us all: Cyber-war is military fiction
http://www.theglobeandmail.com/commentary/cyberspace-is-not-a-combat-zone/article13035562/
Luxembourg PM quits amid spying scandal –
http://www.telegraph.co.uk/news/worldnews/europe/luxembourg/10172654/Luxembourg-PM-quits-amid-spying-scandal.html
Iran Launches National Email Service For All Citizens
http://www.techweekeurope.co.uk/news/iran-national-email-service-121414?
MoD Data Compromised By Cyber Espionage Onslaught
http://www.techweekeurope.co.uk/news/mod-data-stolen-cyber-espionage-committee-report-121437?
Traitor Snowden case not the first embarrassment for Booz Allen, or D.C. contracting industry |
http://www.washingtonpost.com/politics/snowden-case-not-the-first-embarassment-for-booz-allen–or-washingtons-burgeoning-contracting-industry/2013/07/08/30440b0a-d9b3-11e2-a9f2-42ee3912ae0e_story.html
Commentary: Snowden and People’s Republic of China’s High-Tech Trade | The National Interest
http://nationalinterest.org/commentary/snowden-chinas-high-tech-trade-8712
Military Cyber-war wiped tens of thousands of PCs
http://www.myce.com/news/military-cyber-war-wipes-tens-of-thousands-of-pcs-67915/

Semper Fi,

謝謝
紅龍

US & People’s Republic of China FINALLY Make Cyber Security a Strategic Issue…

Good Day Folks;

US & People’s Republic of China FINALLY Make Cyber Security a Strategic Issue…FBI are you paying attention?
Many differing reporting styles from around the World regarding the US & the People’s Republic of China discussing cyber security as a strategic national/international matter…NOT one for Law Enforcement…Only now all the Chinese pay attention the US regarding the loosely attributable claims of hacking by the “Chinese” against the US…I wonder why it took so long for the “China Experts” in DC to figure this one out…!?

Enjoy the news folks – and note to the FBI – the People’s Republic of China perhaps isn’t the boogeyman we want them to be…interesting…no!?

People’s Republic of China, US hold talks on cyber security – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-07/10/c_132527602.htm
Commentary: Don’t let cyber security overshadow key China-U.S. dialogue – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-07/09/c_132525189.htm
Cyber, trade, relationship building among top issues at China-U.S. S&ED talks – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-07/09/c_132525193.htm
VLADIVOSTOK…CPC official urges global cooperation against cyber crimes, faster steps on norms – Xinhua |
http://news.xinhuanet.com/english/china/2013-07/04/c_132512368.htm
People’s Republic of China and US talks on cyber security ‘make progress’

http://www.computing.co.uk/ctg/news/2280515/china-and-us-talks-on-cyber-security-make-progress

People’s Republic of China, US hold talks on cyber security – China.org.cn
http://www.china.org.cn/world/2013-07/10/content_29377680.htm
People’s Republic of China, US hold cyberissues talks
http://usa.chinadaily.com.cn/us/2013-07/10/content_16754690.htm
People’s Republic of China, US talks on cyber security work…IRAN English Radio

http://english.irib.ir/news/political4/item/113895-china,-us-talks-on-cyber-security-work

People’s Republic of China, U.S. talks on cyber security go well: REUTERS

http://www.reuters.com/article/2013/07/10/us-china-usa-cyber-idUSBRE96904820130710

U.S., China begin formal cybersecurity talks Cybersecurity |

http://www.homelandsecuritynewswire.com/dr20130710-u-s-china-begin-formal-cybersecurity-talks

US, People’s Republic of China to take up hacking, business rows

http://au.news.yahoo.com/a/-/business/17942478/us-china-to-take-up-hacking-business-rows/

U.S.-People’s Republic of China cybersecurity talks inching along –

http://www.politico.com/story/2013/07/us-china-cybersecurity-93909.html

US and People’s Republic of China cyber-security talks ‘go well’ despite Snowden factor |

http://www.itproportal.com/2013/07/10/us-and-china-cyber-security-talks-go-well-despite-snowden-factor/

Facts about the China-US Strategic and Economic Dialogue
http://usa.chinadaily.com.cn/epaper/2013-07/10/content_16756028.htm
People’s Republic of China has ‘mountains of data’ about cyber attacks coming from US

http://www.computing.co.uk/ctg/news/2272851/china-has-mountains-of-data-about-cyber-attacks-coming-from-us

Japan highlights China as ‘security threat’
http://usa.chinadaily.com.cn/world/2013-07/10/content_16754254_3.htm
China’s ministry of national defence slams US for cyber security

http://www.computing.co.uk/ctg/news/2278206/chinas-ministry-of-national-defence-slams-us-for-cyber-security-hypocrisy

Pentagon accuses People’s Republic of China of hacking US government computer systems

http://www.computing.co.uk/ctg/news/2266378/pentagon-accuses-china-of-hacking-us-government-computer-systems

US Government, Industry Fed up with Chinese Cyber Theft; What’s Being Done? | PBS NewsHour |

http://www.pbs.org/newshour/bb/military/july-dec13/cybercrime_07-08.html

People’s Republic of China and US in cyber security talks
http://www.bbc.co.uk/news/world-asia-china-23177538
U.S. Downplays Spying Accusations in China Hacking Talks

http://www.bloomberg.com/news/2013-07-08/spying-accusations-shadow-u-s-china-cybersecurity-talks.html

No wonder the People’s Republic of China is worried about Android—the NSA helped write its source code

http://qz.com/102346/no-wonder-china-is-worried-about-android-the-nsa-helped-write-its-source-code/

Data Wiping Attacks in South Korea Were Culmination of Multi-Year Espionage Campaign

http://www.securityweek.com/data-wiping-attacks-south-korea-were-culmination-multi-year-espionage-campaign?

South Korea Plans a Big Boost to Cybersecurity Staffing

http://blogs.wsj.com/korearealtime/2013/07/04/south-korea-plans-a-big-boost-to-cybersecurity-staffing/

Cyber Security: Pakistan To Promote And Legislate Cyber Security

http://buitems.net/2013/07/cyber-security-pakistan-to-promote-and-legislate-cyber-security/?

Federal Cybersecurity Initiatives Demand Vigilance of Communication and Energy Infrastructure Owners and Operators
http://www.privsecblog.com/2013/06/articles/main-topics/data-breach-security/federal-cybersecurity-initiatives-demand-vigilance-of-communication-and-energy-infrastructure-owners-and-operators/
20 critical controls do improve cybersecurity, but are you using them?
h
ttp://gcn.com/articles/2013/07/08/20-critical-security-controls-implementation-lags.aspx

NIST Releases Draft Outline of Cybersecurity Framework for Critical Infrastructure
http://www.nist.gov/itl/csd/cybersecurity-070213.cfm
Iran will begin assigning state-issued email addresses to all citizens, a move officials are contending will maintain citizens’ privacy and facilitate communication between the state and the people.

http://www.fastcompany.com/3014054/fast-feed/iran-to-issue-national-email-addresses-to-all-citizens

Enjoy –

Semper Fi…

謝謝
紅龍

Chinese Information Warfare (IW) Doctrinal Development Circa 2005….

Good Day Chinese Cyber Conflict Fans…the following post about Chinese Information Warfare Doctrine as written by Lu Yong, Department of National Defense Strategy, 中國人民解放軍, 總參謀部..yes The People’s Liberation Army…circa 2005. This post was discovered by the Red Dragon a week ago and has already been removed from the web…sinister?

Here it is folks, a glimpse into Chinese Information Warfare Doctrinal Development in 2005…

“Information Warfare Challenges and Countermeasures For Executing the People’s War”

http://www.chinamil.com.cn/site1/zgmb/2005-08/18/content_148840.htm

 Lu Yong, Department of National Defense Strategy, 中國人民解放軍, 總參謀部

    People’s War is a traditional weapon to defeat the enemy army. Since the 90s of last century, with the world’s burgeoning revolution in military affairs, and high-tech weapons in the war widely used form of war started by the mechanized warfare to information warfare changes, “Information warfare is the major wars of the 21st century form “has become a consensus. In the semi-mechanized and mechanized warfare formed and developed the people’s war, and how to address information warfare challenges, how to continue in the information war play its unique advantages to ensure winning future possible war, is we are faced with a major theoretical issues and practical issues urgent. First, information warfare launched the people’s war is faced with severe challenges     (a) the purpose of information warfare, the limited size of the previous national war, the country is facing severe challenges the way to meet the enemy     since World War II, especially in the last century 80 years, the international situation has undergone major changes, “peace and development” instead of “war and revolution”, a theme of the times. Correspondingly, local war to replace the previous world wars and the full-scale war, become the world’s major warfare. We may face future information warfare, must be local wars, which makes the whole war, lasting way to defeat the enemy is facing severe challenges.    

 First, the purpose of information technology local wars, limited size, the possibility of universal war greatly reduced. Compared with the world wars and the full-scale war, information local war by political, economic, diplomatic and other factors more directly, the purpose of war is often limited to a certain political and economic goals, the scale of war is also controlled in a certain range. In this case, the state can not disrupt the overall national development strategic steps, the state transferred from peacetime “Everything for the front, everything for victory in the war,” the wartime regime, to mobilize all the people participate in the war.     Secondly, information warfare, the power of the warring parties is not primarily the number of competitions contest, but the quality of competition, the number of people’s war in the traditional pattern of strengths compensate for disadvantages quality hard work. In information warfare, weapons and equipment quality exists “Time difference” has been impossible to quantify the advantage to make the war directly to the performance of quality and efficiency, technology-intensive confrontation between elite standing army.

 Therefore, national mobilization, national war is neither necessary, nor can fundamentally change the balance of forces contrast.     Again, the limited capacity of information warfare battlefield, the war directly to the masses are severely constrained. Information warfare battlefield often limited to the parties directly within a certain depth, certain waters or airspace, such as the Anti-Japanese war the Japanese into my territory impossible to reproduce the situation, which makes the past that a large number of armed and unarmed masses to direct war Traditional methods are severely constrained, even though the war is also useless.     (Two) Information sudden outbreak of war increased, shortening the process of war, lasting defeat the enemy’s strategic facing severe challenges     in the past war, war lasted a relatively long time to carry out the people’s war, it is possible to mobilize the masses to participate in the war, give full play to the advantages of quantity, quality and quantity of weapons and equipment to make up for the disadvantages, to make up for military, material deficiencies, gradual change through sustained combat enemy forces, and ultimately win the war. This is the victory of people’s war past, the basic experience, but also from the other instructions, the traditional gathering of people’s war and the release force take a long time.    

Information warfare is one of the important features of the sudden outbreak of war increased, the process of shortening the war. Provoke a war party, in order to create a fait accompli and a more favorable situation, often with a sudden attack caught off guard the way to the other side to blow, and seeks to achieve a decisive victories in a short time. In addition, information warfare consumption increased dramatically, both sides are trying to combat a quick fix with little cost to achieve the purposes of war. In this case, change through sustained combat enemy forces greatly reduces the possibility. Therefore, the information warfare conduct civil wars, not only faced with how to release in a short test of the people’s war Weili, and the possibility of lasting defeat the enemy becomes negligible.     (Three) high-tech information warfare, and more in the sparsely populated border and coastal areas as well as sea and air for the masses traditional way of war frontline facing serious challenges     in the past war, a large scale because of the war and the relatively tech weaponry low, logistical and equipment support technical requirements are not high, coupled with the war mainly on land, ordinary people will be able to directly participate in a little training operations, delivering supplies to the front or to the way frontline. Therefore, human and human frontline war is war frontline people’s traditional way of war.    

 In the information war, the warring parties tend to use one or the most advanced aircraft, ships, tanks, artillery, missiles, and other cutting-edge technology, greatly improve the technical content of war, battle space from the past in order to develop a terrestrial land-based , sea, air, space, electricity multidimensional space to support security operations equipment and technical means of highly specialized equipment. In addition, information warfare unit time combat strength increases rapidly, fighting more intense, direct combatants psychological and physical quality put forward higher requirements. No rigorous professional training not only ordinary people cannot use advanced weapons and equipment and well-trained and have high-tech weapons of the enemy to make a direct confrontation, and even logistical and equipment support is difficult to carry out the task. Coupled with the war mostly in sparsely populated border and coastal areas as well as sea and air, greatly increased the masses direct war frontline of difficulty. Therefore, information warfare, the masses will direct the war, supporting the front of the main changes is indirect war, supporting the front main support for the war is also supported by the human and material resources into technology-based intelligence support based.    

(Four) of information warfare undergone revolutionary change, people’s war is facing severe challenges the traditional tactics     of people’s war in the long-term practice, the army formed a set of flexible strategies and tactics of people’s war, created numerous “survival of the fittest,” the war miracle. However, we should see that in the past we have conducted a people’s war, is the relatively low level of weaponry semi-mechanized warfare, the main battle, the battle is on the ground, thus forming the main form of combat – trench warfare, warfare and a series of guerrilla warfare and related, are conducive to our full advantage of the number of people. Especially in irregular warfare guerrilla warfare that, in the proportion of combat operations and the impact of the outcome of the war is relatively large.     Engels pointed out: “Once technological advances can be used for military purposes and has been used for military purposes, they will almost immediately forcibly, and often is a violation of the will of the commander of the changes caused by warfare or even revolution.”

With IT The rapid development of high-tech weapons and the widespread use of information warfare revolutionary change taking place. For example: Battlefield to the five-dimensional space development; missiles, electronic warfare, network warfare, and many other new combat styles have been in war; C4 ISR against the increasingly fierce battle to win control of information and operational command of the army to become the premise and focus; to become independent of combat raids, much warfare, night fighting, the proportion of firepower increases; emphasize more arms, a variety of weapons to combat the overall implementation of the integration of diverse, asymmetric, non-contact, non-linear operations become an important mode of combat, etc. and so on. In this case, the traditional to the Army mainly to ground-based battlefield warfare, warfare, guerrilla warfare combat forms and information warfare will be difficult to adapt to the requirements. For example, in past wars, melee midnight oil has been the army’s forte. But in the information war, faced with advanced surveillance technology and long-range precision strike weapons of the enemy, we will be faced with melee midnight oil does not rely on rope, unseen challenges, and even enemies in the night-side occupy a greater advantage.

 How to deal with the challenges of information warfare, the development of people’s war strategy and tactics, to carry out the people’s war to become an urgent problem. 

Second, information warfare still insist on carrying out the people’s war     (a) information warfare does not change the inherent social and political attributes of war, still have to carry out the basic conditions of the people’s war     and class produced since private ownership since the war is never left over politics. Compared with previous wars, although the scale of information warfare, duration, and other aspects of weapons and equipment have undergone significant changes, showing a lot of new features, but the war itself has properties and not because of social and political development of warfare change.

 Information warfare is still a continuation of politics, there is still justice and injustice of distinction, the nature of war and the people’s support or oppose the war are still often contributing factors, the basic conditions for the conduct of civil war, that the justice of the war and mass still exists.     The justice of the war is the political basis for the conduct of civil war, but also an important factor in the outcome of war. China’s socialist nature and a defensive national defense policy decisions for our future information warfare is necessarily oppose hegemonism and safeguarding national security and unity, the protection of national survival and development interests, building a moderately prosperous society to ensure the smooth conduct of the just war . The justice of this war is that we carry out in the information warfare solid political foundation for the people’s war is our war to win the final victory of the future fundamental guarantee.    

War mass is the source of strength to win the victory. Our future of information warfare, represents the fundamental interests of the overwhelming majority of people just war, and thus be able to get the full support of the masses. Information warfare is a comprehensive national strength, is the political, economic, military, technological, diplomatic, cultural, social and psychological fronts, including the overall war. Although the majority of the people cannot direct a large scale as before the war, supporting the front, but they are in the war embodied the role of the masses through the comprehensive national strength of support and backing for the war action reflected. In this sense, the people and the comprehensive national strength, and is inextricably linked to the outcome of war in the vast masses of people, there remains a great power war deepest roots, as long as this kind of hidden among the great masses of the people forces play out, we can still win the information war.    

 (Two) information war did not change the outcome of the basic laws of war, the determinants of the outcome of war is still the person     information warfare, the growing importance of weaponry, an advantage in weaponry easier to win the war party initiative and even war. However, no matter how the change in the form of war, the basic law of the outcome of war is constant, that is, people are the main body of the war, the determining factor is winning the war, weapons and equipment is an important factor in the decision outcome of the war.     In information warfare dominance and decisive role, not because of the extensive application of high-tech weaponry and all reduced. Engels long ago: “gun that he is not moving, you need to by a brave heart and a strong hand to use them.” Then advanced weaponry, once removed from the people, will lose its proper performance. U.S. Department of Defense submitted to the U.S. Congress in the Gulf War report: “Winning the war victory is people, not machines or technology.” Justice of the people’s war and mass decisions, our combatants are equipped with more high political consciousness and consciously contribute to achieve the purpose of the war, they better than the enemy weapons in the hands full performance.    

 Practice shows that war, weaponry weaknesses, you can play to people’s subjective initiative to change. Person’s conscious activity, not only in understanding the dynamic laws of war, revealing the possibility of victory, the most important is to actively create conditions for the use of various means of victory possibility into reality. Information warfare unprecedented fierce, brutal, war scale and process more vulnerable to a variety of factors, which also enhances the role of people in the war. Weaponry at a disadvantage in the case, as long as the person’s subjective initiative into full play, relying on the excellent political and military qualities, based on the existing equipment, creating and choosing the right strategy and tactics to achieve the best combination of people and weapons, we will be able to superior weaponry against the enemy find ways to make up for the lack of weapons, and promote superior enemy on the battlefield transformed my bad posture, and ultimately win the war.    

(Three) for the development of information technology to carry out the people’s war has injected new vitality into     this world, things are always dialectical, we must address the information war against the people’s war presented challenges, while also saw rapid information technology development but also to carry people’s war has injected new vitality.     First, the rapid development of information technology, in order to build a strong people’s war potential to provide a new historical opportunity. Since the reform and opening up, Deng Xiaoping’s “Science and technology are primary productive forces” and Jiang Zemin’s “education” under the correct guidance of strategic thinking, China’s information technology as the representative of the rapid development of high-tech, cutting-edge technology in a number of breakthrough has been made, in biotechnology, computer technology, rocket technology, satellite communications technology, superconducting materials and other fields of research, has been close to or reach the world advanced level. 

At present, the annual output value of China’s information industry to more than 2 times higher than the GDP growth rate for the overall national socio-economic structure of the increasing influence for the conduct of the people’s war has laid a relatively solid material and technological foundation.     Secondly, the rapid development of information technology, the war for the people supporting the front provides a new technical support. The level of development of science and technology determine the masses of the people to participate in and support the war, way, way. Although the material basis of information warfare and warfare has undergone a fundamental change, but the people on the course and outcome of the war has not reduced, but with the advancement of science and technology as well as improving the quality of people’s technology and growing. Compatible with the characteristics of modern high-tech military and civilian increasingly prominent in the current level of information of our military forces with a larger gap between the Western powers in the case, widely hidden in the masses of scientific and technological resources, will be the future of information warfare army survival of the fittest and the strong support necessary complement. As long as these potential technological forces in a planned, organized mobilization, we can effectively compensate for the overall military weaponry disadvantage, the formation of local areas, local battlefield technological advantages, to achieve survival of the fittest.    

 Finally, the development of information technology for innovative tactics to expand the people’s war, the new space. As Mao Zedong pointed out: “the world of things, always a thing down, there is one thing offensive, it also has a thing down. …… We believe that relying on the people, the world would not unassailable ‘magic’ . “On the one hand, the information it has its advanced weaponry side, but there are also weaknesses and limitations. Especially advanced information technology structure is very large and complex weapons systems, it is difficult for all-round protection. In recent years, several global epidemic of vicious computer viruses caused huge losses for countries that modern information systems vulnerability proof. On the other hand, the development of information technology, people’s war for us to provide new technical means, expanding the innovative tactics of people’s war room. 

In the past people’s war, we have to rely on relatively backward technology and weaponry, yet it can create a lot of strategy and tactics to defeat the enemy. Today, we already have in information technology for a foundation, but also for the specific characteristics of information warfare, transformation and creating new tactics, research and exploration play win the information war “trick.” 

Third, information warfare to carry out the people’s war Countermeasures     (a) accelerate the development of comprehensive national strength, and lay a solid foundation of people’s war     of information warfare in the final analysis is a comprehensive national strength. Refers to a country’s comprehensive national strength have all the resources and material and spiritual strength, marking the country’s economic, political, technological, military, cultural and other aspects of the overall level of development. To carry out the people’s war winning the information war, you must have a strong comprehensive national strength. On China’s national conditions, in order to accelerate the development of comprehensive national strength, lay the foundation of people’s war, we must focus on grasping the following aspects:    

First, to develop the economy. Economic strength of a country’s comprehensive national strength is an important indicator. Strong economic strength, winning the information war can lay a solid material foundation.Meanwhile, the economic strength is the material basis for the modernization of national defense, there are no certain economic forces for support, defense modernization will lose the foundation. Therefore, we must persist in taking economic construction as the center, concentrating on the development of social productive forces, the country’s overall economic construction to consciously obey.    

 Second, in order to accelerate the development of high-tech information technology as the representative. On the one hand, science and technology to enhance the comprehensive national strength has a decisive, transformative role. In the current form of society by the industrialized to the process of information, who can seize the technology “commanding heights” and “frontier”, whoever may enhance the comprehensive national strength to win. On the other hand, science and technology are primary productive forces, but also the first combat, defense construction is inseparable from the support of advanced science and technology. Especially information technology compared to other technologies, the military and civilian compatibility stronger, the new information technologies emerging, in accelerating national and social information, but also for the military information construction provides a rare historical opportunity.    

Third, comprehensively promote the construction of military information, and constantly enhance military strength. After the war directly to the performance of military forces of the contest, to winning the information war is inseparable from a strong line with the requirements of the military information warfare. To seize the world’s new military revolution brought to the army building historic opportunity to accelerate weaponry leapfrog development, modernization of the means to achieve the people’s war; unswervingly implement the strategic project, training a large number of qualified military personnel; at all levels to strengthen joint and combined arms training to improve joint operational capabilities; according elite, synthesis, efficient principle, establish and perfect an appropriate scale, reasonable structure, organization lean, agile command of military system; study the characteristics of information warfare, innovation and the development of information warfare theory.    

Fourth, for the information war characteristics, strengthen national defense reserve forces. For information militia building should be the characteristics of high-tech warfare, and universality in keeping the masses on the basis of outstanding quality construction. Primary militia and militia on the distinction between ordinary and should not be confined to the age criteria, but to combine their technological quality measure. To further reduce the size of infantry units, focus on strengthening the missiles, artillery, communications, chemical defense, information and other high-tech special unit of the building. Reserve forces to comprehensively enhance the quality of construction, vigorously improve the rapid mobilization and the ability to carry out combat missions, narrowing the gap with the active forces fighting efforts to achieve the establishment of an appropriate scale, reasonable structure, compiled scientific, reliable and workable objectives reserve forces.    

Fifth, to carry out various forms of national defense education, improve national defense. The strength of the concept of national defense exhibit a country preparing for war ideological foundation is solid, countries in the world to enhance the national defense concept placed in improving comprehensive national strength in an important position. To adhere to the masses of people’s war, we must carry out effective, diverse forms of national defense education, so that the masses has always been to establish a strong national defense, information warfare is carried out in the people’s war to lay a solid ideological foundation.    

(Two) features in-depth study of information warfare, development and innovation strategy and tactics of people’s war     strategy and tactics of people’s war, is to carry out the soul of the people’s war. As the saying goes: “The Sword inferior to sword better than people.” In past wars, people’s war has been able to repeatedly create a “survival of the fittest” miracle, one of the important reasons is that we have a set of adjustable strategy and tactics. In the future for a long period of time, we will be at a disadvantage on the weaponry, and the traditional people’s war strategy and tactics as the development of warfare changes facing severe challenges, so winning the information war under conditions of people , must examine the characteristics of information warfare, development and innovation strategy and tactics of people’s war. Create new tactics in the development process, should focus grasp the following principles:    

Ffirst, to establish and adapt to information warfare operational concepts. Since there has been no information warfare military practice, so in the process of creating new tactics, the concept of mechanized warfare vulnerable bondage. Therefore, the idea is to create new tactics update the premise that only break the shackles of old ideas, establish and adapt to information warfare operational concepts in order to provide a fresh perspective, with the correct way of thinking to create new tactics. For example: In the assessment of combat forces, we should abandon the labor-intensive, the number and scale of their concepts, technology-intensive, quality and efficiency concepts; choice of target in combat, to abandon the idea of annihilating the enemy’s effective strength-based, establish a centralized main forces to fight the enemy vital concept.    

Second, pay attention to the traditional military tactics absorb nutrients. Information warfare is a new form of war, our military has created in the last war tactics, may not apply to today’s wars, and some tactics need to abandon, and some need to be improved. We study and research the traditional tactics of war, not in the future information warfare copy of these tactics, but to learn the older generation of revolutionaries, military strategist creating new tactics stand, viewpoint and method. This is our future development and creating new tactics and source of wisdom. For example, in China’s Revolutionary War created a “concentrate superior forces to fight a war of annihilation” of war, in the information war, as a means of long-range precision strike extensive use of the practice of concentration of forces no longer feasible. However, we should understand the tactics of Mao Zedong created the spiritual essence, that the enemy superior in the case of my poor, through a certain method, the local formation of the war situation in who wins. This idea is still in the information war has important guiding significance. We can use this as a guide, according to the specific characteristics of information warfare, the development of the traditional tactics to “concentrate superior firepower to fight the enemy vital” new tactics.    

Third, the combination of the actual record of our military tactics. Creating new tactics, not behind closed doors, not on paper, must be combined with the actual situation of our army. Currently, the army is actually the largest in weaponry compared with the developed countries there is still a big gap, though they have some advanced weaponry, but still in a lot of low-tech equipment. Which determine our tactics neither copying Western countries of war, in order to avoid committing “Porgy and dragon than treasure” low-level errors, nor imagined, impractical so-called “new tactics.” Measure one kind of tactics is correct or not, not to see how its name sounds good, how novel methods, means, how advanced the key depends on whether it is really effective in combat. Enhance the value of research tactics, is that correct tactics to make up the gap weaponry to achieve superior weaponry with inferior equipment to defeat the purpose of the enemy. We should adhere to the “you hit, I hit my”, the focus on tactical innovation to existing equipment on high-tech enemy and seize enemy weapons and equipment information some of the weaknesses, give full play to existing weapons equipment performance, and strive to me for so long, and strike the enemy’s weaknesses, research, and create a “soil”, “foreign” combination of low high school weaponry combined tactics.     (Three) to establish a sound mechanism for rapid mobilization of national defense, to ensure the people’s war potential for rapid accumulation and transformation of information warfare to carry out the people’s war, faced with the short duration of the war and the people gathered the forces of war and transformation contradiction between the relatively long time. To resolve this conflict, we must establish a sound mechanism for rapid mobilization of national defense. The range includes the formation of rapid military expansion and expand quickly, persons and goods transport and complement fast, fast track to a wartime economy, the restructuring of the industrial structure and expand military production and fast; rapid mobilization mechanism of this standard is to be able to adapt to the information sudden outbreak of the war, the war is characterized by short duration, so that the potential of the people’s war in a very short time and quickly gathered quickly converted into national defense capabilities. Establishment of mechanisms for rapid mobilization of national defense, for the power of the people’s war play, winning the information war has very important significance. 

Rapid mobilization mechanism must have the following elements:     First, clear objectives and tasks. Should be included in national defense mobilization of economic and social development plans, incorporating national defense and army building master plan, clearly defined stages at different times under different circumstances and people’s armed mobilization, economic mobilization, civil air defense mobilization and mobilization readiness transportation and other aspects of the target with the task.    

Second, laws and regulations are complete. On the mobilization of rights and obligations, rewards and penalties, responsibilities and benefits should be based on the laws and regulations in the form of regulations, the mobilization of all aspects of the various aspects and rule-based, law.     Third, the mobilization plan carefully. Troops, economy, transportation, civil air defense, telecommunications, health and other aspects of the mobilization of both careful planning in order to prepare for mobilization in peacetime, wartime mobilization provide the basis for implementation.Army and local levels, according to the national mobilization plan to develop this level of mobilization plans and safeguards.    

Fourth, science and technology to mobilize prominent position. In information warfare launched the people’s war, the way people’s war frontline war intelligence and intelligence is mainly supporting the front, which determines the future of science and technology for national defense mobilization will be the prominent content.    

Fifth, the formal procedures quickly and efficiently. According to the characteristics of information warfare, military departure from China’s national conditions, to establish a war in the war potential into the strength of the effective ways and methods. For example, the expansion of the armed forces, civilian products, converting, transportation capacity for the acquisition, implementation of civil air defense, compensation for economic losses as well as other financial and material resources mobilization, should form a set of rapid and effective mobilization of forms and procedures, so that the people’s war bringing power and conversion speed can meet the requirement of information warfare.    

(Four) combining various approaches to play the overall power of the people’s war     of revolutionary war in the past, an important part of people’s war, is dominated by the armed struggle, the combination of a variety of forms of struggle to play the overall power of the people’s war . In information warfare, military struggle and political, economic, diplomatic, cultural, ideological struggles fields more closely intertwined, in some cases even non-dominant armed struggle. Therefore, adherence to the combination of a variety of forms of struggle, for winning the information war has a more important significance.    

 In information warfare, military by political factors more prominent political and military action, strong policy, and even a small tactical actions may be related to the overall strategic situation in the international community have a broad impact. Therefore, the information warfare conduct civil wars, on the one hand to make war all soldiers and civilians establish the overall concept of policy ideas, with significant international influence in the issue, in relation to the overall operations, ensure that the needs of the military and political obedience. On the other hand struggle in the UN and other international arena widespread publicity, win public support, and strive to get politically active.    

Information warfare increasingly focused on economic efficiency, greater dependence on the economy. In the rapidly growing trend of economic globalization, the case of economic blockade, economic sanctions would weaken the enemy’s comprehensive national strength is an important initiative, and to combat the economic center of the enemy, the better to play a drastic effect. During the Gulf War, the Kosovo War and the war in Iraq, the United States launched the war before the war and implementation process, are complemented by economic sanctions.

It is foreseeable that in the information war, economic sanctions and counter-sanctions, blockade and counter-blockade as a primary means of economic sectors will be fierce struggle to become another battlefield of information warfare. We conduct information warfare people’s war, on the one hand to use economic means of struggle, economic base and destroy the enemy’s ability to regenerate, maximize the economic loss to the enemy, eroding its war potential; hand to mobilize kind of strength, positive and effective implementation of economic protection, maintaining the normal operation of the national economy, efforts to develop production, economic development, for the victory of the war to lay a solid material foundation.     Any one country to war are very focused use of diplomatic means to secure more state support to maximize isolate each other, give each other causing huge political and moral pressure. Even superpowers also paid great attention to diplomacy with military struggle. In information warfare launched the people’s war, of course, but also actively through diplomatic struggle to establish a broad international united front. 

Reform and opening up, China has actively conducted exchanges and cooperation in the international political, economic, cultural and other fields has played an active and important role in the international community to establish a peace-loving, maintain stability, to just and responsible handling of international affairs the image of a big country, it’s all for us in the information warfare fruitful diplomatic struggle to create the conditions. In the information war, we want to make good use of all kinds of contradictions, give full play to all efforts conducive to my various international factors. To take full advantage of the favorable as a permanent member of the UN’s international status, to consolidate and expand the role of the United Nations, especially the UN Security Council in dealing with the leading role of international security to thwart any so-called international intervention against our country; give full play and the developing countries consistent with the fundamental interests of political advantage, and properly handle the relationship with the countries concerned, differentiation enemy’s allies; pay attention and have a special country with the same or equivalent national strategic interests of the military establishment of some form of collaboration or partnership, the strategic formation of a certain degree of cooperation and coordinate mechanisms. 

As long as we are able to unite all forces that can be united, to win the support of as many countries as to maximize isolate and attack the enemy, you can establish a broad international united front for the victory to carry out the people’s war to create a favorable international environment.     Information warfare, media warfare, warfare has become increasingly important. In the field of public opinion and propaganda, should make full use of newspapers, television, radio, Internet, multimedia and other traditional and non-traditional media, the Western developed countries of the world and strive to break the monopoly of public opinion, crushing hostile nations attempt to demonize the image of our country, torn hegemony doctrine of “human rights”, “humanitarian aid”, “democracy” and so gorgeous packaging, with true, correct public opinion supported the war inspired the masses of enthusiasm and self-consciousness, for the support of the international community on China.

 In the legal battle field, we should make good use of existing international law, to carry out the people’s war for me to provide a legal basis to prevent the enemy to international law as an excuse for me to intervene and wage war, but also to actively participate in international law and various international mechanisms the development and establishment, to prevent the establishment of prejudicial interests of our country, is conducive to hostile forces and international mechanisms of international law, but also to strengthen domestic legislation in the field work, so that hostile forces without loopholes. At the same time, pay attention to the psychological protection, encouraging all people to fight, winning the information war and build a strong psychological defense. 


信息化战争中开展人民战争面临的挑战和对策思考

国防大学战略教研室

中國人民解放軍

總參謀部

     人民战争是我军克敌制胜的传统法宝。上个世纪90年代以来,随着世界新军事变革的蓬勃兴起和高技术兵器在战争中的广泛应用,战争形态开始由机械化战争向信息化战争转变,信息化战争将是21纪的主要战争形态经成为共识。在半机械化、机械化战争中形成和发展起来的人民战争思想,如何正视信息化战争所带来的挑战、如何继续在信息化战争中发挥其特有的优势,确保打赢未来可能发生的战争,是我们面临的一个重大的理论问题和紧迫的实践问题。

   

Cyber Threat Situational Awareness for 09JUL2013

Good Day Folks;

Below is a short list of some of the latest stories you need to be aware of to maintain & improve your Cyber Threat Situational Awareness for today,09JUL2013…

矽對海洋和平,帕拉戰爭 or in Latin…Si vis pacem, para bellum…

Talking Cyberthreat With the People’s Republic of China

http://www.nytimes.com/2013/07/10/opinion/global/talking-cyberthreat-with-china.html?_r=0

Traitor Snowden revelations imperil cyber hacking talks with People’s Republic of China |

http://www.intellasia.net/snowden-revelations-imperil-cyber-hacking-talks-with-china-292273

Patriot hacker ‘The Jester’ attacks nations offering Snowden help

http://www.theregister.co.uk/2013/07/04/patriot_hacker_takes_aim_snowden_asylum_candidates/

South Korea Attackers ‘Pierced Military Networks’
Same crew that hit TV stations and banks managed to get malware onto military networks


http://www.techweekeurope.co.uk/news/mcafee-south-korea-attackers-military-hacks-121219?

Dissecting operation Troy: Cyberespionage in South Korea
http://www.net-security.org/article.php?id=1861
How Cybercriminals Operate — Dark Reading
A look at cybercriminal motives, resources, and processes — and how they may affect enterprise defense


http://www.darkreading.com/perimeter/how-cybercriminals-operate/240157738

Iran Planning Cyber Drills
http://english.farsnews.com/newstext.aspx?nn=13920415000930
US agency baffled by modern technology, destroys mice to get rid of viruses
The US Economic Development Administration (EDA) is an agency in the Department of Commerce takes a cyber threat property destruction lesson from the German Government 🙂 “…$170,000 of PCs, printers, keyboards, cameras, and mice destroyed in gross overreaction.”


http://arstechnica.com/information-technology/2013/07/us-agency-baffled-by-modern-technology-destroys-mice-to-get-rid-of-viruses/

Across Europe, Nations Mold Cyber Defenses

http://www.defensenews.com/article/20130709/DEFREG01/307090008/Across-Europe-Nations-Mold-Cyber-Defenses

Enjoy!

Semper Fi…

謝謝紅龍

Sign up for updates from MSI: http://eepurl.com/dk1PE

International Cyber Intelligence & Situational Awareness (SA)…Operation Middle Kingdom

Good day Folks;

Here is an extensive list of the recent International Cyber Intelligence & Situational Awareness (SA) you should be cognizant of…something cyber for everyone including the People’s Republic of H@cking, HUAWEI, Pakistan ~ People’s Republic of China relations and much, much more cybernia related…and coming soon to a computer and networked system near you OP Middle Kingdom…

Innovation and Disruption, & Why the People’s Republic of China Needs the Latter

http://www.techinasia.com/difference-innovation-disruption-important/

A Breakdown of the People’s Republic of China’s New Visa Rules
http://www.haohaoreport.com/l/43604
A New Anti-American Axis? People’s Republic of China & Russia…

http://www.nytimes.com/2013/07/07/opinion/sunday/a-new-anti-american-axis.html?

People’s Republic of China’s Huawei Zambia to invest $500,000 in brand promotion | Times of Zambia
http://www.times.co.zm/?p=22996
People’s Republic of China, Pakistan Build Communication, Transportation Links

http://www.ibtimes.com/china-pakistan-agree-communications-transport-links-huawei-board-fiber-optic-project-1335227?ft=w18y0

PM urges People’s Republic of China’s Huawei to set up research centre in Pakistan

http://www.pakistantoday.com.pk/2013/07/07/news/profit/pm-urges-huawei-to-set-up-research-centre-in-pakistan/

People’s Republic of China’s Huawei-Imperial plan renews Chinese cyber-security fears

http://theconversation.com/huawei-imperial-plan-renews-chinese-cyber-security-fears-15788

People’s Republic of China’s Huawei deploys high speed 4G on Mount Everest

http://www.theinquirer.net/inquirer/news/2279724/huawei-deploys-high-speed-4g-on-mount-everest

People’s Republic of China’s Huawei to build China-Pakistan link

http://www.defence.pk/forums/economy-development/262482-huawei-build-china-pakistan-link.html

People’s Republic of China’s Huawei Ready to Outspend Ericsson in R&D Race to Woo Clients

http://www.bloomberg.com/news/2013-07-02/huawei-woos-carriers-with-research-boost-beyond-me-too-networks.html

People’s Republic of China’s Huawei supports Asia Pacific hospitals

http://www.itwire.com/it-industry-news/market/60579-huawei-supports-asia-pacific-hospitals

People’s Republic of China’s Huawei boosts spending on research

http://www.scmp.com/business/companies/article/1275572/huawei-boosts-spending-research

People’s Republic of China, Switzerland sign free trade agreement
Switerland is latest OP MIddle Kingom acquistion by the People’s Republic of China…

http://www.reuters.com/article/2013/07/06/us-china-trade-idUSBRE96503E20130706

Studies: Cyberspying Targeted SKorea, US Military

http://abcnews.go.com/International/wireStory/studies-cyberspying-targeted-skorea-us-military-19602444

Turkish Agent Hacked US Air Force Culture & Language Center Website | Cyberwarzone
Didn’t the USAF tell the US Senate they were lead DoD on Cyber & were going to protect US Critical INfrastructure againsts hackers?
Hell, they cannot even protect themselves….
USAF CYBER ….MASSIVE FAIL….


http://cyberwarzone.com/turkish-agent-hacked-us-air-force-culture-language-center-website

Taiwanese Military to stage computer-aided war game later this month: MND
“tested the armed forces ability to fend off a simulated invasion by Chinese forces.”


http://www.chinapost.com.tw/taiwan/national/national-news/2013/07/03/382727/Military-to.htm

EU and People’s Republic of China close in on solar panel deal

http://www.reuters.com/article/2013/07/05/us-china-solar-idUSBRE9640L720130705

Pakistan, China set sights on Arabian Sea link |

http://www.ksl.com/?nid=235&sid=25866836&title=pakistan-china-set-sights-on-arabian-sea-link

Is People’s Republic of China’s Huawei Becoming Less Chinese?

http://blogs.wsj.com/digits/2013/07/04/is-huawei-becoming-less-chinese/?

People’s Republic of China’s Huawei to overtake Ericsson in R&D spending

http://www.intomobile.com/2013/07/05/huawei-overtake-ericsson-rd-spending/?

Papua New Guinea’s fixed line incumbent Telikom recruits People’s Republic of China’s Huawei for NBN project

http://www.telegeography.com/products/commsupdate/articles/2013/07/05/telikom-recruits-huawei-for-nbn-project/?

FCC approves deals between Japan’s Softbank, Sprint, Clearwire
Softbank signs huge deal with Huawei….backdoor to United States critical infrastructure now wide open for Huawei courtesy of Japan…


http://www.washingtonpost.com/business/technology/fcc-approves-deals-between-softbank-sprint-clearwire/2013/07/05/f48c88d8-e5ad-11e2-a11e-c2ea876a8f30_story.html

People’s Republic of China’s Huawei, Imperial College, London announce big data joint venture |

http://www.zdnet.com/huawei-imperial-college-announce-big-data-joint-venture-7000017582/

Chinese Web giant Tencent faces obstacles in its goal to expand in global IM market

http://www.washingtonpost.com/business/economy/chinese-web-giant-tencent-faces-obstacles-in-its-goal-for-a-global-im-market/2013/07/05/6ee4016c-cff4-11e2-8845-d970ccb04497_story.html?

People’s Republic of China Says Private Banks Possible

http://www.npr.org/templates/story/story.php?storyId=198990603

Emerging market giants quick to grab Australian foothold
Chinese banks, among the world’s largest, are busy in Australia


http://www.brisbanetimes.com.au/business/emerging-market-giants-quick-to-grab-australian-foothold-20130705-2phh7.html

NJRAT ESPIONAGE MALWARE TARGETS MIDDLE EASTERN GOVERNMENTS, TELECOMS AND ENERGY

http://threatpost.com/njrat-espionage-malware-targets-middle-eastern-governments-telecoms-and-energy/

Current cybercrime market is all about Cybercrime-as-a-Service |
http://www.net-security.org/secworld.php?id=15173
TARGETED ESPIONAGE ATTACK BORROWING FROM CYBERCRIMINALS

http://threatpost.com/targeted-espionage-attack-borrowing-from-cybercriminals/

Traitorous Snowden Says the NSA and Israel Wrote Stuxnet Malware Together

http://news.softpedia.com/news/Snowden-Says-the-NSA-and-Israel-Wrote-Stuxnet-Malware-Together-366371.shtml?

EU adopts stricter penalties for cyber criminals
http://www.net-security.org/secworld.php?id=15183
EU Parliament to launch inquiry into US surveillance programs
http://www.net-security.org/secworld.php?id=15181
Piratin Nocun über den Überwachungsskandal…Cyberwar governments against their citizens

http://www.sueddeutsche.de/digital/ueberwachungsskandal-cyberwar-der-regierungen-gegen-ihre-buerger-1.1713200

Iran to hold nationwide cyber maneuver

http://www.presstv.ir/detail/2013/07/06/312582/iran-to-hold-nationwide-cyber-maneuver/

United Kingdom Cyber War ‘At Its Gunpowder Moment’

http://www.huffingtonpost.co.uk/2013/07/05/cyber-war-gunpowder-moment_n_3549048.html

Beware the Internet and the danger of cyberattacks

http://www.dallasnews.com/opinion/sunday-commentary/20130705-robert-j.-samuelson-beware-the-internet-and-the-danger-of-cyberattacks.ece
U.S. military realm extends to cyberspace

http://www.upi.com/Science_News/Technology/2013/07/02/US-military-realm-extends-to-cyberspace/UPI-85321372770741/

The cyber-intelligence complex and its useful idiots
“Those who tell us to trust the US’s secret, privatised surveillance schemes should recall the criminality of J Edgar Hoover’s FBI”

http://www.guardian.co.uk/commentisfree/2013/jul/01/cyber-intelligence-complex-useful-idiots
Cyberwar: Angriffe auf Industrieanlagen wachsen…Cyberwar: Attacks on industrial plants grow

http://business.chip.de/news/Cyberwar-Angriffe-auf-Industrieanlagen-wachsen_62848164.html

Blind Fear Of Cyberwar Drives Columnist To Call For Elimination Of The Internet |

https://www.techdirt.com/articles/20130701/10561323680/blind-fear-cyberwar-drives-columnist-to-call-elimination-internet.shtml

Cyberwar ist kein Kalter Krieg
http://www.dradio.de/dkultur/sendungen/interview/2162803/
Brazil was target of U.S. signals spying, Globo newspaper says
http://www.reuters.com/article/2013/07/07/brazil-espionage-snowden-idUSL1N0FD05120130707

Enjoy –

Semper Fi –

謝謝紅龍

People’s Republic of China’s Foreign Ministry sets up cyber security office – as Australian Defence Mag Day Three Cyber Security Summit concludes…Canberra…Red Dragon Rising & the People’s Republic of Hacking…err, China..

Good Day from the Front Line of Cyber – Here are today’s top Chinese Cyber Threat Stories from an international perspective….your daily dose of Cyber Threat Situational Awareness (SA)….

Codan network hacked by Chinese

http://www.electronicsnews.com.au/news/codan-network-hacked-by-chinese

Report: Australia spy plans hacked by Chinese

http://www.aljazeera.com/news/asia-pacific/2013/05/20135284536511454.html

Cybersecurity and the Limits of Leader Summits

http://thediplomat.com/the-editor/2013/06/28/cybersecurity-and-the-limits-of-leader-summits/

Trial flight photos of China’s J-31 stealth fighter – Xinhua | English.news.cn

http://news.xinhuanet.com/english/photo/2013-07/02/c_132502418_4.htm

InterDigital loses first round of U.S. case against People’s Republic of China’s Huawei

http://www.reuters.com/article/2013/07/01/us-interdigital-huawei-patent-idUSBRE96019420130701

Former Nokia head of sales takes his expertise to Huawei (updated)

http://www.engadget.com/2013/07/02/colin-giles-huawei/?

Nokia doubles up in networks to fight People’s Republic of China

http://blogs.ft.com/businessblog/2013/07/nokia-doubles-up-in-networks-to-fight-china/?

GCHQ claims British networks hit by 70 cyber attacks a month |

http://www.itpro.co.uk/security/20106/gchq-claims-british-networks-hit-70-cyber-attacks-month

NSA hacking and spying on EU officials

http://www.net-security.org/secworld.php?id=15169

U.S. intelligence community is out of control |

http://www.cnn.com/2013/07/01/opinion/rothkopf-surveillance-revelations/index.html?

Why the Story on Snowden and the NSA Doesn’t Add Up |

http://www.motherjones.com/kevin-drum/2013/07/nyt-snowden-was-hacker-nsa

The danger of what Edward Snowden has not revealed

http://www.washingtonpost.com/opinions/marc-thiessen-the-danger-of-what-edward-snowden-has-not-revealed/2013/07/01/67f95a18-e251-11e2-aef3-339619eab080_story.html?

HACKED!

http://www.abc.net.au/4corners/stories/2013/05/27/3766576.htm

People’s Republic of China: US should ‘explain hacking activity’ – People’s Daily Online
Uh oh – NSA has compromised US National Security as the People’s Republic of China demands to know why it is being hacked by the Top US Spy Agency….


http://english.peopledaily.com.cn/90883/8284267.html

People’s Republic of China’s Foreign Ministry sets up cyber security office – People’s Daily Online

http://english.peopledaily.com.cn/90883/8285401.html

提醒大家新的APT高峰期即將出現, 新 PDF Exploit CVE-2013-2729 已經用在 APT Email 攻擊中

http://blog.xecure-lab.com/2013/06/apt-pdf-exploit-cve-2013-2729-apt-email.html

Will People’s Republic of China Offer Snowden Freedom in exchange for Information?

http://www.slate.com/blogs/the_slatest/2013/06/14/edward_snowden_reveals_details_of_hong_kong_and_china_nsa_hacking.html

Booz Allen’s Snowden Smuggled Documents From NSA on a Thumb Drive |

http://www.wired.com/threatlevel/2013/06/snowden-thumb-drive/

“Snowden is a ‘card’ that People’s Republic of China never expected… But China is neither adept at nor used to playing it.”

http://althouse.blogspot.com.au/2013/06/snowden-is-card-that-china-never.html

Who’d You Rather Be Watched By: People’s Republic of China, or the U.S.?

http://www.theatlantic.com/china/archive/2013/06/whod-you-rather-be-watched-by-china-or-the-us/276898/

Chinese Telecoms ‘A Security Risk’ To Britain

http://news.sky.com/story/1100187/chinese-telecoms-a-security-risk-to-britain

People’s Republic of China’s Huawei faces UK heat over cyber-attack fears

http://www.theaustralian.com.au/news/world/huawei-faces-uk-heat-over-cyber-attack-fears/story-fnb64oi6-1226658100939

OP Middle Kingdom: People’s Republic of China Becoming The Most Important Factor In Global Gold Markets

http://seekingalpha.com/article/1502512-china-becoming-the-most-important-factor-in-global-gold-markets?

Operation Middle Kingdom ~ Canada…Ottawa delaying Wind Mobile deals on national security concerns

http://www.theglobeandmail.com/report-on-business/security-concerns-delay-wind-deal/article12538800/

PRISM Whistle-Blower: US Has Been Hacking the People’s Republic of China For Years

http://www.techweekeurope.co.uk/news/prism-america-hacking-china-119004?

People’s Republic of China newspaper: Booz Allen’s Snowden could be useful to China

http://www.kimt.com/2013/06/14/china-newspaper-snowden-could-be-useful-to-china/

U.K. Warns on People’s Republic of China’s Huawei Cyber Security Risk

http://online.wsj.com/article/SB10001424127887323844804578529141741985244.html

UK defends China telecom firm deals

http://www.bbc.co.uk/news/uk-politics-22795226

Can N.S.A. Surveillance Be Likened to Chinese Spying?

http://rendezvous.blogs.nytimes.com/2013/06/13/can-n-s-a-surveillance-be-likened-to-chinese-spying/?

People’s Republic of China: U.S. in “Awkward Position” After Latest Hacking Claims

http://chinadigitaltimes.net/2013/06/netizens-on-us-hacking-what-a-hypocrite/?

Booz Allen Whistleblower Edward Snowden claims US targets Chinese computers for cyber attacks

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10117690/Whistleblower-Edward-Snowden-claims-US-targets-Chinese-computers-for-cyber-attacks.html

Pressure builds on US over Hong Kong civilian hacking allegations

http://www.guardian.co.uk/world/2013/jun/13/hong-kong-demands-us-answer-hacking-allegations

Booz Allen’s Edward Snowden claims US hacks Chinese Military & Political targets
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10117478/Edward-Snowden-claims-US-hacks-Chinese-targets.html
Chinese State Media Suggest That N.S.A. Disclosures Will Hurt U.S. Ties

http://www.nytimes.com/2013/06/14/world/asia/chinese-media-suggest-nsa-disclosure-will-hurt-us-ties.html?

Australia gets ‘deluge’ of US secret data, prompting a new data facility…Recall Aussie Company Codan was haced by the People’s Republic of China….

http://www.theage.com.au/it-pro/security-it/australia-gets-deluge-of-us-secret-data-prompting-a-new-data-facility-20130612-2o4kf.html

Calls Grow in People’s Republic of China to Press Claim for Okinawa…Now that US Marines are gone to Austraia…we know the PLA will overrun the USAF Base @ Kadena…

http://www.nytimes.com/2013/06/14/world/asia/sentiment-builds-in-china-to-press-claim-for-okinawa.html?&pagewanted=all

Taking the West’s Technology, Leaving its Freedoms – China Digital Times

http://chinadigitaltimes.net/2013/06/taking-the-wests-technology-leaving-its-freedoms/?

How China Got There First: Beijing’s Unique Path to ASBM Development and Deployment

http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=40994&cHash=4be1b6f4d1da712a29057d94f181c32c#.UbpnRPaG1JE

Thousands of Iranian Gmail Users Targeted in Attempted Hacks Before Election

http://www.wired.com/threatlevel/2013/06/iran-hack-election/

OWASP Top 10 for 2013 has been released! “Injection” tops the chart again. Download your copy here:
https://www.owasp.org/index.php/Top10

Enjoy –

Semper Fi,

謝謝
紅龍

International Cyber Situational Awareness for the Beginning of July 2013

Good day Folks;

My apologies for the late entry – international travel will do that to a person once in a awhile –

Nonetheless, here is a lengthy compilation of some of the latest International Cyber Situational Awareness for the Beginning of July 2013 –

Remember to search for “OP Middle Kingdom”

Enjoy!

U.S. to press People’s Republic of China on cyber theft: Lew

http://www.reuters.com/article/2013/07/01/us-treasury-china-idUSBRE96009X20130701

People’s Republic of China Accuses U.S. of Hypocrisy on Cyberattacks |

http://world.time.com/2013/07/01/china-accuses-u-s-of-hypocrisy-on-cyberattacks/?

People’s Republic of China’s Huawei’s Best-Kept Secret: An Army of Engineers

http://blogs.wsj.com/digits/2013/07/01/huaweis-best-kept-secret-an-army-of-engineers/?

U.S. Is a ‘Hacker Empire,’ Says Chinese Military Analyst

http://rendezvous.blogs.nytimes.com/2013/06/26/u-s-is-a-hacker-empire-says-chinese-military-analyst/?

U.S. Prism, Meet People’s Republic of China’s Golden Shield

http://rendezvous.blogs.nytimes.com/2013/06/28/u-s-prism-meet-chinas-golden-shield/?

LAP Green & the People’s Republic of China’s Huawei ink settlement agreement

http://www.telegeography.com/products/commsupdate/articles/2013/07/01/lap-green-huawei-ink-settlement-agreement/?

The Willie Suttons of the Cyberage – Can we stop bad guys from getting into U.S. networks? |

http://www.foreignpolicy.com/articles/2013/06/26/the_willie_suttons_of_the_cyberage_cybercrime?page=full

JFQ-70: Unpacking Cyberwar: The Sufficiency of the Law of Armed Conflict in the Cyber Domain
http://www.ndu.edu/press/unpacking-cyberwar.html

Awaiting Cyber 9/11

http://www.ndu.edu/press/awaiting-cyber-9-11.html

Snowden spy row grows as US is accused of hacking People’s Republic of China

http://www.guardian.co.uk/world/2013/jun/22/edward-snowden-us-china

EXCLUSIVE: NSA targeted People’s Republic of China’s Tsinghua University in extensive hacking attacks
“…Tsinghua University, widely regarded as the mainland’s top education and research institute, was the target of extensive hacking by US spies this year.”

http://www.scmp.com/news/china/article/1266892/exclusive-nsa-targeted-chinas-tsinghua-university-extensive-hacking

EXCLUSIVE: US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009

http://www.scmp.com/news/hong-kong/article/1266875/exclusive-us-hacked-pacnet-asia-pacific-fibre-optic-network-operator

EXCLUSIVE: Ex-Booz Hamilton NSA Contractor safe in Hong Kong, more US cyberspying details revealed

http://www.scmp.com/news/hong-kong/article/1266777/exclusive-snowden-safe-hong-kong-more-us-cyberspying-details-revealed

US hacks Chinese mobile phones: Booz Hamilton Contractor: US National Security FAIL

http://www.theaustralian.com.au/news/breaking-news/us-hacks-chinese-mobile-phones-snowden/story-fn3dxix6-1226668185301

Civic Party demands the US respond to hacking claims

http://www.scmp.com/news/hong-kong/article/1266716/civic-party-demands-us-respond-hacking-claims

Edward Snowden alleges US hacking People’s Republic of China phone firms

http://www.adelaidenow.com.au/news/world/edward-snowden-alleges-us-hacking-china-phone-firms/story-fnd11ay0-1226668186230

People’s Republic of China completes internet monitoring scheme in Tibet

http://www.guardian.co.uk/world/2013/jun/19/china-internet-monitoring-tibet

Xi Jinping’s Decade And The Future Of Sino-American Relations – Analysis

http://www.eurasiareview.com/22062013-xi-jinpings-decade-and-the-future-of-sino-american-relations-analysis/?

People’s Republic of China’s Xi harks back to Mao in party ‘cleanup’

http://wanderingchina.org/2013/06/20/chinas-xi-harks-back-to-mao-in-party-cleanup-ap-risingchina-corruption/

What to Make of Xi Jinping’s Maoist Turn

http://wanderingchina.org/2013/06/22/what-to-make-of-xi-jinpings-maoist-turn-wsj-risingchina-newleadership/

Hagel Vows to Prioritize Cyber, Nuclear Capabilities…Si vis pacem, para bellum
US DoD Defense.gov News Article…矽對海洋和平,帕拉戰爭


http://www.defense.gov/news/newsarticle.aspx?id=120339

People’s Republic of China: U.S. should not hold multiple standards in cyber world – People’s Daily Online

http://english.peopledaily.com.cn/90786/8290745.html

People’s Republic of China ~ Snowden spying claims rejected – People’s Daily Online

http://english.peopledaily.com.cn/90883/8287831.html

U.S. charges Snowden with espionage

http://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html

Edward Snowden: US government has been hacking Hong Kong and People’s Republic of China for years

http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china

Snowden’s Leaks on People’s Republic of China Could Affect Its Role in His Fate |

http://www.nytimes.com/2013/06/15/world/asia/ex-nsa-contractors-disclosures-could-complicate-his-fate.html?

Chinese Ministry of Foreign Affairs sets up cyberdiplomacy office

http://www.scmp.com/news/china/article/1261181/chinese-ministry-foreign-affairs-sets-cyberdiplomacy-office

People’s Republic of China asks U.S. to explain Internet surveillance

http://www.reuters.com/article/2013/06/17/us-usa-security-china-idUSBRE95G06R20130617

People’s Republic of China’s Huawei, ZTE see vindication amid US cyber-spying scandal

http://www.scmp.com/business/companies/article/1263200/huawei-zte-see-vindication-amid-us-cyber-spying-scandal

People’s Republic of Acquisition: Nokia stock rises on rumors of Huawei acquisition
Operation Middle Kingdom – Finalnd technology now acquistion target of People’s Republic of China’s HUAWEI


http://www.washingtonpost.com/business/technology/nokia-stock-rises-on-rumors-of-huawei-acquisition/2013/06/18/3aca3fba-d83a-11e2-a016-92547bf094cc_story.html?

People’s Republic of China completes Internet, phone monitoring scheme for Tibet

http://www.reuters.com/article/2013/06/19/china-tibet-idUSL3N0EV1W920130619

People’s Republic of China’s Huawei says has no plans to buy Nokia

http://www.crn.com.au/News/347193,huawei-says-has-no-plans-to-buy-nokia.aspx

Soft Power: A U.S.-China Battleground?

http://thediplomat.com/china-power/soft-power-a-u-s-china-battleground/?

People’s Republic of China’s tyranny of uniqueness

http://cmp.hku.hk/2013/06/14/33486/

Reforming the People’s Republic of China’s State-Owned Enterprises

http://thediplomat.com/2013/06/19/reforming-chinas-state-owned-enterprises/?

People’s Republic of China lands three astronauts on Tiangong-1 space station

http://www.guardian.co.uk/world/2013/jun/13/china-astronauts-tiangong-1-space-station

Home Office Throws £4m At Educating Britain On Cyber Security
Awareness push from government celebrated by industry


http://www.techweekeurope.co.uk/news/home-office-4m-cyber-security-awareness-119696?

Report: UK spies hacked foreign diplomats

http://www.news.com.au/technology/report-uk-spies-hacked-foreign-diplomats/story-e6frfro0-1226665303140

GCHQ taps fibre-optic cables for secret access to world’s communications

http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa?CMP=twt_gu

People’s Republic of China diversifies UK interests as Dalian Wanda invests £1bn in luxury brands

http://www.guardian.co.uk/business/2013/jun/19/china-uk-interests-dalian-wanda-luxury-brands

Use Tor, Get Targeted By the NSA –

http://yro.slashdot.org/story/13/06/21/1443204/use-tor-get-targeted-by-the-nsa?u

What the NSA Does With the Data It Isn’t Allowed to Keep

http://www.nextgov.com/cloud-computing/2013/06/what-nsa-does-data-it-isnt-allowed-keep/65324/

Schneier on Security: US Offensive Cyberwar Policy

http://www.schneier.com/blog/archives/2013/06/us_offensive_cy.html?

The keyboard: The weapon of choice in new type of warfare

http://www.irishexaminer.com/lifestyle/features/the-keyboard-the-weapon-of-choice-in-new-type-of-warfare-234768.html

Iran oil ministry denies cyber attack

http://en.trend.az/regions/iran/2164035.html

Semper Fi,

謝謝紅龍

Latest Cyber Threat Intelligence News from Australia…People’s Republic of H@cking, NGC & Raytheon’s Best Public Appearance…FAIL

G’Day from Day Two of Australian Defence Magazine’s 3rd Annual Cyber Security Summit from Canberra, Australia…

It was hilarious yesterday as pasty late middle aged Americans stormed into Canberra from two major DoD Contractors. Describing in acronym laden, nervous voices how they could save the Australian defense world both from themselves and the giant new menace called China…with, get this, VAPOR FRICKIN’ WARE…yes the boys from NGC and Raytheon came in for only their speaking portions and announced they would save the world and then left – typical disingenuous American behavior overseas – it was as if they, as American businessmen are too important to develop relationships here in Canberra… C’mon guys if you are the best from these two companies then executive leadership should review hiring practices at NGC & Raytheon…enough ranting…

Pentagon’s Cybersecurity Plan Sees $23 Billion Through 2018 (1)
This what those pasty white middle age exec’s from NGC & Raytheon smell…US taxdollars for their new enemy China…


http://www.businessweek.com/news/2013-06-10/pentagon-s-cybersecurity-plan-calls-for-23-billion-through-2018

People’s Republic of China’s agenda in Switzerland (and Europe)…Operation Middle Kingdom
Operation Middle Kingdom = colonization of the West…


http://www.lowyinterpreter.org/post/2013/06/13/Chinas-agenda-in-Switzerland-(and-Europe).aspx

In first response to Snowden, People’s Republic of Hacking e.g.; China, skirts direct comment

http://au.news.yahoo.com/thewest/a/-/world/17595123/in-first-response-to-snowden-china-skirts-direct-comment/

NSA hacks People’s Republic of China, leaker Snowden claims
National Security FAIL…Booz Allen Hamilton

http://edition.cnn.com/2013/06/12/politics/nsa-leak

Communist Party of China in Hong Kong wants answers on Snowden’s hacking claims

http://www.usatoday.com/story/news/world/2013/06/13/nsa-leaker-snowden-hong-kong/2418755/

Australia under attack from cyber spies

http://www.heraldsun.com.au/news/breaking-news/cyber-war-could-kill-millions/story-fni0xqi4-1226662512944

Malawi govt set to award digital TV migration deal to People’s Republic of China’s Huawei

http://www.telecompaper.com/news/malawi-govt-set-to-award-digital-tv-migration-deal-to-huawei–948691

The NSA Has A Secret Group Called ‘TAO’ That’s Been Hacking China For 15 Years

http://au.businessinsider.com/us-nsa-unit-tao-hacking-china-for-years-2013-6

U.S.-Chinese Summit: 4 Information Security Takeaways — People’s Republic of China Dominates Obama

http://www.informationweek.com/security/government/us-chinese-summit-4-information-security/240156396?

China Reveals First Space-Based Quantum Communications Experiment

http://wanderingchina.org/2013/06/12/china-reveals-first-space-based-quantum-communications-experiment-technology-review-risingchina-quantum/

Google Says It Has Uncovered Iranian Spy Campaign

http://bits.blogs.nytimes.com/2013/06/12/google-says-it-has-uncovered-iranian-spy-campaign/?

Iranian phishing on the rise as elections approach

http://googleonlinesecurity.blogspot.com.au/2013/06/iranian-phishing-on-rise-as-elections.html

The Shady Role of Start-ups in the NSA’s War on Cyber Terror

http://www.inc.com/eric-markowitz/the-shady-role-of-start-ups-in-nsa-war-on-cyber-terror.html?

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar |

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/2/

Wall Street goes to war with hackers in Quantum Dawn 2 simulation

http://blogs.reuters.com/unstructuredfinance/2013/06/13/wall-street-goes-to-war-with-hackers-in-cyber-dawn-2-simulation/

NSA leaker Edward Snowden: U.S. targets China with hackers
Massive National Security FAIL by Booz Allen….


http://www.washingtonpost.com/business/economy/snowden-wants-people-of-hong-kong-to-decide-my-fate/2013/06/12/a69e94ee-d370-11e2-a73e-826d299ff459_story.html?utm_medium=referral&utm_source=t.co

Chinese piracy ring operator sentenced after selling military-related software…OP Crack99

http://arstechnica.com/tech-policy/2013/06/chinese-piracy-ring-operator-sentenced-to-12-years-after-being-lured-to-us/?

China Syndrome: U.S. Issues Build

http://www.aim.org/guest-column/china-syndrome-u-s-issues-build/?

Hawaii Spy Case: Did Chinese Girlfriend Lure Secrets From Contractor?

http://www.civilbeat.com/articles/2013/04/23/18889-hawaii-spy-case-did-chinese-girlfriend-lure-secrets-from-contractor/

Infosecurity – Gartner analysts drop the bomb on cyberwar hysteria

http://www.infosecurity-us.com/view/32919/gartner-analysts-drop-the-bomb-on-cyberwar-hysteria/?

Presidential cyberwar directive gives Pentagon long-awaited marching orders

http://www.csmonitor.com/USA/Military/2013/0610/Presidential-cyberwar-directive-gives-Pentagon-long-awaited-marching-orders-video

Cybersecurity hearing: NSA head Keith Alexander testifies in front of Senate

http://www.globalpost.com/dispatch/news/regions/americas/united-states/130612/cybersecurity-hearing-nsa-keith-alexander-senate-live

Tens of thousands of spamvertised emails lead to W32/Casonline
http://blog.webroot.com/2013/06/12/tens-of-thousands-of-spamvertised-emails-lead-to-w32casonline/

Global BotNet Visualized
http://globe.cyberfeed.net/

RARSTONE Found In Targeted Attacks | …attacks were carried out using spear-phishing attacks against the target organizations, using messages related to diplomatic discussions in the Asia-Pacific region.

http://blog.trendmicro.com/trendlabs-security-intelligence/rarstone-found-in-targeted-attacks/?

Enjoy –

Semper Fi

謝謝
紅龍

Australian Defence Magazine (ADM) Cyber Security Summit Day One…

G’Day from Canberra, Australia – truly down under…

So here we are the Red Dragon back in Australia in less than 3 weeks – trust me there is no honor in all the air miles…just dehydration, sleep deprivation and lousy food…

Nonetheless, here are some of the latest cyber threat news items related to Operation Middle Kingdom which the People’s Republic of China’s worldwide political, military and economic colonization of the Western world…please note that the complete colonization of the United Kingdom has taken place…Australia is not far behind although at least their political leadership is being open and not hiding the fact that Huawei wants in on the national broadband initiative…

NSA’s ultra-secret China hacking group…Report from Asia 12 JUN 2013

http://www.scmp.com/news/china/article/1259175/inside-nsas-ultra-secret-china-hacking-group

How Ordinary Chinese Saw the Xi-Obama Summit

http://thediplomat.com/china-power/how-ordinary-chinese-saw-the-xi-obama-summit/?

Inside the NSA’s Ultra-Secret China Hacking Group – No Longer Ultra thanks to Booz Allen Hamilton Massive National Security FAIL

http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group?page=full

Inside the NSA’s Ultra-Secret China Hacking Group

http://chinadigitaltimes.net/2013/06/inside-the-nsas-ultra-secret-china-hacking-group/?

Can Apple Conquer the People’s Republic of China With iOS7?

http://thediplomat.com/china-power/can-apple-conquer-china-with-ios7/?

Realpolitik and Spinning the U.S.-China Summit

http://www.nytimes.com/2013/06/13/opinion/global/realpolitik-and-spinning-the-us-china-summit.html?

People’s Republic of Hacking…Adopting Technology, but Not the Freedoms, of the West

http://www.nytimes.com/2013/06/13/world/asia/13iht-letter13.html?partner=rssnyt&emc=rss&_r=0&pagewanted=all

OP Red Star (紅星): Another advanced hacking crew from the People’s Republic of China is revealed

http://i-hls.com/2013/06/red-star-another-advanced-hacking-crew-from-china-is-revealed/

OP Middle Kingdom and Colonization of Australia…Chinese hackers linked to attack on Australian spy agency

http://www.ft.com/intl/cms/s/0/5ed43574-c768-11e2-be27-00144feab7de.html#axzz2Uh0epN59

U.S., Australia reports allege new spying by People’s Republic of China hackers –
Blueprints of new Australian spy headquarters stolen, report says


http://www.cbc.ca/news/world/story/2013/05/28/australia-china-hacking.html

Canadian CIRC Anti-hacking agency slow to learn about Chinese cyberattack
People’s Republic of Hacking efforts to colonize Canada…Canadian Cyber Incident Response Centre fails to understand sophistication of Chinese hacking efforts….


http://www.cbc.ca/news/politics/story/2013/02/22/pol-weston-chinese-hackers-telvent.html

Operation Red Star (紅星): Another advanced hacking crew from the People’s Republic of China is revealed

http://killerapps.foreignpolicy.com/posts/2013/06/04/red_star_another_advanced_hacking_crew_from_china_revealed

NSA surveillance: The US is behaving like the People’s Republic of China

http://www.guardian.co.uk/commentisfree/2013/jun/11/nsa-surveillance-us-behaving-like-china

Edward Snowden breaks silence to defend himself over NSA surveillance leak –

http://www.telegraph.co.uk/news/worldnews/asia/hongkong/10116117/Edward-Snowden-breaks-silence-to-defend-himself-over-NSA-surveillance-leak.html

Inevitable: US Spy Program Leaker Escapes to Hong Kong, Other Aftermath, How It Might Play Out

http://blog.hiddenharmonies.org/2013/06/inevitable-us-spy-program-leaker-escapes-to-hong-kong-other-aftermath-how-it-might-play-out/

Booz Allen National Security Fink Snowden Is in Hong Kong. Chinese Don’t Care.
Yes and they hire only te best national securty risks at Booz Allen Hamilton…:-)


http://www.bloomberg.com/news/2013-06-10/snowden-is-in-hong-kong-chinese-don-t-care-.html

How the People’s Republic of China’s Huawei can dial down the fear factor –

http://tech.fortune.cnn.com/2013/06/12/huawei-fear-factor/

People’s Republic of Chain’s Huawei opens Reading HQ as part of UK investment
Colonization of Britain under Operation Middle Kingdom now complete


http://news.techworld.com/networking/3452105/huawei-opens-reading-hq-as-part-of-uk-investment/

People’s Republic of China Prepares Longest Ever Manned Space Mission

http://www.techinasia.com/china-longest-manned-space-mission-shenzhou10-in-2013/

Beijing, We Have a Space Program |
China’s latest launch of a three-person spacecraft shows the East moving well ahead of the once dominant West


http://science.time.com/2013/06/12/beijing-we-have-a-space-program/

Chinese spacecraft blasts off from Gobi desert
Shenzhou 10 takes three astronauts to experimental space laboratory where they will give a lecture to students on Earth


http://www.guardian.co.uk/world/2013/jun/11/chinese-spacecraft-shenzhou-10-gobi-desert

Intelligence: World War II LST Threatens People’s Republic of China

http://www.strategypage.com/htmw/htintel/articles/20130612.aspx

How Sony Won the Next-Gen Console War in the Poeple’s Republic of China

http://www.techinasia.com/sony-won-nextgen-console-war-country-consoles-illegal/

Colonization of Nicaragua waterway to dwarf Panama canal…OP Middle Kingdom continues unabated…

http://www.guardian.co.uk/world/2013/jun/12/nicaragua-canal-waterway-panama

Nicaragua fast-tracks Chinese plan to build canal to rival Panama

http://www.guardian.co.uk/world/2013/jun/11/nicaragua-chinese-plan-canal-panama

Edward Snowden vows not to ‘hide from justice’ amid new hacking claims
Booz Allen hiring practices…NATIONAL SECURITY FAIL…


http://www.guardian.co.uk/world/2013/jun/12/edward-snowden-us-extradition-fight

Why Don’t More Chinese Internet Companies Expand Overseas?

http://www.techinasia.com/chinese-internet-companies-expand-overseas/

Apple’s iOS 7 is Copying Other OS, Say Chinese Net Users

http://www.techinasia.com/chinese-net-users-apples-ios-7-copycat-os/

Why the People’s Republic of China May Limit “Carrier-Killer’s” Range

http://thediplomat.com/flashpoints-blog/2013/06/12/why-china-may-limit-carrier-killers-range/?

Internet Gurus Fear Iranian Assassins

http://www.strategypage.com/%5Chtmw%5Chtiw%5Carticles%5C20130611.aspx

Canada: Nation continues as growing breeding ground for malware

http://www.scmagazine.com//sc-congress-canada-nation-continues-as-growing-breeding-ground-for-malware/article/298414/?

Talking cyber security with the UK government

http://www.scmagazineuk.com/talking-cyber-security-with-the-uk-government/article/297212/

UK banks fear cyber-attack more than euro crisis

http://www.pcpro.co.uk/news/security/382411/uk-banks-fear-cyber-attack-more-than-euro-crisis

Enjoy!

Semper Fi…

謝謝
紅龍

People’s Republic of China and Hacking the US Defense Industrial Base (DIB)….

Good morning Folks –

Much news to post for a Sunday…remember the Red Dragon’s thought, controversial and unpopular stories are published on the weekends…today 9 JUNE 2013 is certainly a landmark day….enjoy the cyber threat intelligence news of the day from all corners of the cyber world…here is today’s edition of People’s Republic of China and Hacking the US Defense Industrial Base (DIB)….

Cyber ceasefire? US & the People’s Republic of Hacking <> square off over Internet espionage claims

http://rt.com/news/obama-xi-cyber-hacking-356/

US-China summit ends with accord on all but cyber-espionage
Obama’s meeting with Xi overshadowed by revelations of NSA’s snooping –


http://www.guardian.co.uk/world/2013/jun/09/us-china-summit-barack-obama-xi-jinping

Cyber crimes confrontation at Obama Xi summit

http://www.telegraph.co.uk/news/worldnews/asia/china/10108486/Cyber-crimes-confrontation-at-Obama-Xi-summit.html

U.S. and China Move Closer on North Korea, but Not on Cyberespionage

http://www.nytimes.com/2013/06/09/world/asia/obama-and-xi-try-building-a-new-model-for-china-us-ties.html?partner=rssnyt&emc=rss&pagewanted=all

Redefining relations [China Daily]

http://wanderingchina.org/2013/06/09/redefining-relations-china-daily-risingchina-xiobamasummit-transpacificcooperation/

Obama tells intelligence chiefs to draw up cyber target list – full document text
People’s Republic of China is @ the top of the targeting list…uh oh…


http://www.guardian.co.uk/world/interactive/2013/jun/07/obama-cyber-directive-full-text

People’s Republic of Hacking <> flips cybersecurity tables; reports claim U.S. is prepping attacks

http://www.washingtontimes.com/news/2013/jun/7/obama-urges-chinese-president-cooperate-cybersecur/

Did the People’s Republic of China Leak Prism Deliberately?

http://blog.knowbe4.com/bid/297153/did-china-leak-prism-deliberately?

The Economist’s ‘Brokeback Mountain’ Cover & PRISM Won’t Stop Obama & Xi

http://www.theatlanticwire.com/global/2013/06/economist-brokeback-mountain-cover-obama-xi/65999/

People’s Republic of China’s Response to Pentagon Report “Baseless, Counterproductive”

http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=40856&cHash=7454cb6965b8ef66e9be3338386ec41d

People’s Republic of China encircles U.S. by sailing warships in American waters, arming neighbors

http://www.washingtontimes.com/news/2013/jun/7/china-encircles-us-arming-western-hemisphere-state/

People’s Republic of China’s 2013 Defense White Paper in Perspective

http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=40783&cHash=ff46c8fad4f7da66e5e3e642e6da62e4

People’s Republic of China’s Iraq Oil Strategy Comes Into Sharper Focus

http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=40861&cHash=20da431fe2272ad34a6ace632cdecb96#.UbSEKfkqh8E

People’s Republic of China To America: You Hack Us, Too – Network Computing

http://www.networkcomputing.com/quickview/china-to-america-you-hack-us-too/3581?wc=4?cid=NWC_report_2013-06-08_html&elq=f22330ccd1b64c119ef17d90549174b7&wc=4

People’s Republic of China hacking vs. Pentagon whacking: An arms race in cyber-space?

http://rt.com/op-edge/china-pentagon-hacking-cyber-211/

People’s Republic of Chain’s Huawei reiterates that its products do not pose a security threat

http://www.phonearena.com/news/Huawei-reiterates-that-its-products-do-not-pose-a-security-threat_id43818?

Censoring Remembrance: People’s Republic of China’s Twenty-Fourth Unrealized Commemoration

http://wanderingchina.org/2013/06/08/censoring-remembrance-chinas-twenty-fourth-unrealized-commenoration-three-torches-risingchina-tiananmen/

People’s Republic of China’s Lenovo And Huawei: Chinese Smartphones Ready To Take On The World

http://seekingalpha.com/article/1487682-lenovo-and-huawei-chinese-smartphones-ready-to-take-on-the-world?source=feed

Fiat could look for new China partner for Jeep: CEO

http://www.reuters.com/article/2013/06/08/us-fiat-jeep-idUSBRE95707C20130608

US Naval Academy Launches Cyber Operations Major…Mandarin Chinese not to be offered….

http://defensetech.org/2013/06/08/naval-academy-launches-cyber-operations-major/

Is “cyber war” just a scare tactic?
“Officials warn of looming Armageddon. Critics say it’s a subterfuge to erode online privacy and accountability…”Oh, the hyperbole…”


http://www.salon.com/2013/05/26/is_cyber_war_just_a_scare_tactic_partner/singleton/

The State of Cyber-War
http://www.asiasentinel.com/index.php?option=com_content&task=view&id=5466&Itemid=422

Taiwan to open new cyberwar unit

http://phys.org/news/2013-05-taiwan-cyberwar.html

2 more Taiwanese sites attacked in cyberwar tit-for-tat

http://www.gmanetwork.com/news/story/308017/scitech/technology/2-more-taiwanese-sites-attacked-in-cyberwar-tit-for-tat

China’s 2nd State…Taiwan Military Reform: Declining Operational Capabilities?

http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=40996&cHash=c90aea17a261bdf85762692f2104d44f

People’s Republic of China’s ZTE sends 400Gbps over 3,100 miles
People’s Republic of China’s ZTE redines High Speed Avenue of Approach in Chinese Military offensive cyber weapons arsenal…


http://www.computerworld.com/s/article/9239903/ZTE_sends_400Gbps_over_3_100_miles?sou

CCTV reveals Chinese army unit number, military praised for transparency

http://www.globaltimes.cn/content/756590.shtml

China v the US: how the superpowers compare |
http://www.guardian.co.uk/news/datablog/2013/jun/07/china-us-how-superpowers-compare-datablog

Defending an Open, Global Internet: China Is Not the Only Challenge, But Is a Big One

http://blogs.cfr.org/asia/2013/06/07/defending-an-open-global-internet-china-is-not-the-only-challenge-but-is-a-big-one/

Chinese Corporate Espionage: A Legal Gray Area?

http://chinadigitaltimes.net/2013/06/chinese-corporate-espionage-a-legal-gray-area/?

UK monthly exports to China hit £1bn for first time
ONS sees marked shift in Britain’s trading patterns as UK firms diversify away from crisis-hit eurozone


http://www.guardian.co.uk/business/2013/jun/07/uk-exports-china-ons

U.S. Internet Spying Draws Anger, and Envy

http://www.nytimes.com/2013/06/08/business/global/us-internet-spying-draws-anger-and-envy.html?partner=rssnyt&emc=rss&pagewanted=all

Cyber Attacks — the Reality, the Reason and the Resolution. Part 1

http://www.digitalcommunities.com/Column-Cyber-Attacks—-the-Reality-the-Reason-and-the-Resolution-Part-1.html

Cyber Attacks — the Reality, the Reason and the Resolution. Part 2

http://www.digitalcommunities.com/articles/Column-Cyber-Attacks-the-Reality-the-Reason-and-the-Resolution-Part-2.html?

U.S. on Offense in Cyber War: Building Command Center, Hiring Warriors

http://www.insurancejournal.com/news/national/2013/06/07/294731.htm

Clearing the air on cyber, electronic warfare | Deep Dive Intel

http://www.deepdiveintel.com/2013/05/30/clearing-the-air-about-electronic-warfare/?

Editorial: Cyberwar Defense

http://www.vnews.com/opinion/6456148-95/editorial-cyberwar-defense

Commentary: Keep Cyberwar Narrow |

http://nationalinterest.org/commentary/keep-cyberwar-narrow-8459

US DoD Sheds First Clear Light On AirSea Battle: Warfare Unfettered…discovers Chinese PLA “Unrestricted Warfare”…
http://breakingdefense.com/2013/06/03/dod-document-sheds-first-new-light-on-airsea-battle-warfare-unfettered/?

Waging the cyber war in Syria
http://fullcomment.nationalpost.com/2013/05/21/ronald-deibert-waging-the-cyber-war-in-syria/

Iranian Lawmaker: US Cyber War on Iran Violating Int’l Law

http://english.farsnews.com/newstext.php?nn=9202246150

Enjoy!

Semper Fi,

謝謝
紅龍