February 6, 2013
According to intelligence expert David Wise, China and the US have been engaged in a cyber-espionage war behind closed doors. The Chinese government, Wise explains, will send spies to targeted locations to syphon data by the way of hackers and surveillance; whereas the US government “would target . . . with satellites and produce reams of data.”
Cyber warfare goes beyond surveillance of emails and cell phone calls and extends to the possible control over hardware such as missiles, aircraft, and radar systems. Wise states: “One reason is that only about 2 percent of the integrated circuits purchased every year by the military are manufactured in the United States. And even most American chip makers have moved offshore, where labor is cheaper. A computer chip made with a hidden, malicious flaw could sabotage a weapons system. And the compromised hardware is almost impossible to detect.”
Wise maintains that there is a possibility that a chip could be embedded with a kill-switch that would allow a foreign government to control the deployment of a weapon remotely. He states that the Israeli government already has this capability and has used it against Syrian air defenses in 2007.
James Woosley, acting director of the Central Intelligence Agency (CIA), told Wise: “Taking down the grid for months comes as close to a nuclear attack with many weapons on the United States as anything could. You’d have mass starvation and death from thirst and all the rest.”
Last month the Council on Foreign Relations claimed that hackers traced to China attacked their system last week. The “drive-by” hacking utilized a pirated computer. To compound the problem, the analysts said that the hackers removed their malware and traces of their presence from CFR computer systems.
Recognizing China as becoming a formidable replacement to the US as the world’s super power, the CFR has outlined specific responses to this crisis of supremacy. Citing Chinese internet policy, their disdain for freedom of speech in social media, and influence in global cyberspace, the CFR appreciates that this rising “foe” must be confronted indirectly with propaganda to distract from the obvious.
This attack marked a new level of attack by international hackers who aim to steal information from government websites and computers. The “drive-by” tactic covertly plants malware, then the website itself is used to attack visitors to the site. Visitors can be infected as hackers will them attempt to hack into other computers as visitors are passing by. The hackers use the main site as a “watering hole” that attacks users to it for the hackers to steal information from their computers.
Analysts recognized that the attack was to gain specific information from servers. As of now, the CFR cannot gage the extent of the damage – admitting that their internal data servers have been compromised by the hacking.
According to an anonymous White House official that spoke to mainstream media, yet acknowledged that they were not authorized to speak about the subject, referred to an attempt to hack into the executive branch’s computer system through an unclassified network. No data were removed, proving that this was not an actual hack. The nameless official said that the experiment was a “spear-phishing”.
The supposition is that China is behind these attacks because of a phishing expedition against Gmail accounts wherein several senior US government officials and military personnel were affected.
The US House Intelligence Committee (USHIC) is warning American corporations in a new report against conducting business with 2 Chinese firms because of national security threats. Both Huawei Technologies and ZTE, two of the world’s largest telecommunications corporations and suppliers of cellular phones and technology are being highlighted by the US government and blamed for cyber-attacks. It is also claimed by the USHIC that they are involved in digital espionage.
The White House, covertly tying the alleged cyber-attack to China is more diabolical than it appears. In July, Obama imposed stricter sanctions against Iran after they accepted gold as currency for petrol to China.
According to the report, “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes. . . . The investigation concludes that the risks associated with Huawei’s and ZTE’s provision of equipment to U.S. critical infrastructure could undermine core U.S. national-security interests.”
It is claimed that former industry insiders provided intelligence to the US concerning Huawei’s violations of US laws such as immigration, bribery and corruption as well as an alleged “pattern and practice” using pirated software in its US satellites.
It was cited in the report that the Chinese corporations were employing intelligence sources as well as private sector companies and other unnamed entities that could and assumedly did steal trade secrets, sensitive information and prehistory data while simultaneously shipped infected hard ware and software to the US with the intent to cause disruptions in national security during war time.
The recent allegations of Chinese cyber-attacks stem from their involvement with Iran to purchase petrol using gold as currency and not the US dollar as the global reserve currency.
The Chinese also began trading and bartering with the African nations for resources while Obama sent in troops under cover of AFRICOM during the Kony2012 debacle.
Vice Admiral Robert T. Moeller openly declared AFRICOM’s guiding principle as protecting “the free flow of natural resources from Africa to the global market.”
Moeller also mentioned China’s presence in the region as a “challenge” to American interests. He was referring to the deals China was making with the African nations in exchange and boarder for their resources. Where the US chose to invade a sovereign nation with the intention of stealing their resources, the Chinese used diplomacy; and as Moeller explained, this was a disruption to their scheme.
The movement in the mainstream media to further demonize China at this time is not arbitrary. Considering the plans and schemes of the Zionist regime through their puppet President Obama to involve not only Iran, but also China in their WW III, the claims of cyber-attacks are designed to force support from the populace for the pending death and destruction instigated by our own government.Add This to Technorati Faves