military - X-Industry - Red Sky Alliance2024-03-28T11:56:44Zhttps://redskyalliance.org/xindustry/feed/tag/militaryAuchtung !!https://redskyalliance.org/xindustry/auchtung2024-03-06T12:55:00.000Z2024-03-06T12:55:00.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}12397806069,RESIZE_400x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}12397806069,RESIZE_400x{{/staticFileLink}}" width="215" alt="12397806069?profile=RESIZE_400x" /></a>Russia has been accused of attempting to inflame divisions in Germany by publishing an intercepted conversation in which Bundeswehr officials discuss the country’s support for Ukraine, particularly around the supply of Taurus cruise missiles.</p>
<p>The 38-minute conversation, which took place on 19 February 2024, was first published on social media platform Telegram by Margarita Simonyan, the editor-in-chief of RT and a sanctioned propagandist, who said the recording had been provided to her by “comrades in uniform.” The intercepted conversation reportedly took place using Webex, a consumer-grade web conferencing software, rather than on a secured military system.</p>
<p>It features the head of the German air force, LT GEN Ingo Gerhartz, discussing preparations and methods to supply Taurus missiles to Ukraine, and then support the Ukrainian Armed Forces in using the missiles, while observing that the federal Chancellor Olaf Scholz is continuing to block the move.<a href="#_ftn1">[1]</a> Scholz has argued that the air-launched missiles, which have a range of around 500 km, about the distance from Ukraine’s border to Moscow, could escalate the conflict and risk Germany becoming directly involved in the war. The chancellor’s position is a cause of division in his three-party coalition government, with his coalition partners repeatedly arguing in favor of providing the Taurus missiles.</p>
<p>According to the material published by Simonyan, the Bundeswehr has considered several steps to insulate Germany from the repercussions of Ukraine using the cruise missiles, referencing controls that the British and French have in place when supplying their own Storm Shadow and Scalp-EG cruise missiles. Among the claims attributed to Gerhartz were that there were British personnel deployed to Ukraine. The British Ministry of Defense declined to comment on the matter.</p>
<p>It is not clear whether all of the conversation published by Simonyan, who has a history of spreading falsehoods, is authentic. A spokesperson for the German ministry of defense said, "According to our assessment, a conversation in the air force division was intercepted. We are currently unable to say for certain whether changes were made to the recorded or transcribed version that is circulating on social media.”</p>
<p>While the leak is likely to amplify divisions in Berlin and raise embarrassing questions about the security of German military communications, the relatively overt nature of the information operation could potentially encourage solidarity among those being targeted.</p>
<p>Boris Pistorius, Germany’s defense minister, said on 3 March, “The incident is much more than just the interception and publication of a conversation. It is part of an information war that Putin is waging. It is a hybrid disinformation attack. It is about division. It is about undermining our unity.”</p>
<p>Following the leak, the Russian foreign ministry said it “demanded an explanation from Germany” without stating what it was demanding an explanation about.</p>
<p>This article is presented at no charge for educational and informational purposes only.</p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.com </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: https://www. redskyalliance. org/</li>
<li>Website: https://www. redskyalliance. com/</li>
<li>LinkedIn: https://www. linkedin. com/company/64265941 </li>
</ul>
<p>Weekly Cyber Intelligence Briefings:</p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/5504229295967742989">https://attendee.gotowebinar.com/register/5504229295967742989</a></p>
<p><a href="#_ftnref1">[1]</a> <a href="https://therecord.media/german-air-force-conversation-leaked-russia/">https://therecord.media/german-air-force-conversation-leaked-russia/</a></p></div>Risky On-line Gaming Chat Roomshttps://redskyalliance.org/xindustry/risky-on-line-gaming-chat-rooms2023-04-19T11:30:00.000Z2023-04-19T11:30:00.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}11029840082,RESIZE_930x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}11029840082,RESIZE_400x{{/staticFileLink}}" width="250" alt="11029840082?profile=RESIZE_400x" /></a>The US military forces used to actively recruit candidates who were avid gamers, due to their expertise in on-line problem solving and keyboard skills. Now, on-line gaming forums have become a particular worry of the military because of their lure for young service members. In many US military base recreation halls you will see it; young troops immersed in the world of online games, using government-funded gaming machines or their own consoles.<a href="#_ftn1">[1]</a></p>
<p>The enthusiasm military personnel have for gaming and the risk that carries is in the spotlight after Jack Teixeira, a 21-year-old Massachusetts Air National Guardsman, was charged with illegally taking and posting highly classified material in a geopolitical chat room on Discord, a social media platform that started as a hangout for gamers. State secrets can be illegally shared in countless different ways, from whispered conversations and dead drops to social media platforms. On-line gaming forums have been a particular worry of the military because of their lure for young service members. US officials are limited in how closely they can monitor those forums to make sure nothing on them threatens national security. According to officials, the social media world and gaming sites have been identified as a counterintelligence concern for over a decade now.</p>
<p>It is suspected that foreign intelligence agents could use an avatar in a gaming room to connect with 18 to 23-year-old sailors gaming from the rec center at Norfolk Naval Base, win their confidence over for months, and then, through that process, start to connect with them on other social media platforms. It has been noted that US spy agencies have also created avatars to conduct surveillance in the online games World of Warcraft and Second Life.</p>
<p>The military does not have the authority to conduct surveillance of US citizens on US soil, that is the role of domestic law enforcement agencies like the FBI. Even when monitoring members of the armed forces, there are privacy issues, something the Defense Department ran into head-on as it tried to establish social media policies to counter extremism in the ranks.</p>
<p>The military does have a presence in the online game community. Both the Army and the Navy have service members whose full-time job is to compete in video game tournaments as part of military E-sports teams. The teams are seen as an effective way to reach and potentially recruit youth who have grown up with online gaming. Neither of the services reported that they had any sort of similar team playing online to monitor for potential threats or leaks.</p>
<p>A Pentagon spokeswoman said its intelligence activities are primarily focused internationally. In collecting any information on US citizens, the Defense Department does so “in accordance with law and policy and in a manner that protects privacy and civil liberties,” she said in a statement to The Associated Press. She said the procedures must be approved by the attorney general.</p>
<p>The military has focused on training service members never to reveal classified information in the first place (period). Since the recent online leaks, the department is reviewing its processes to protect classified information, reducing the number of people who have access, and reminding the force that “the responsibility to safeguard classified information is a lifetime requirement for each individual granted a security clearance,” Deputy Secretary of Defense said in a memo issued 13 April 2023 following Teixeira’s arrest. “These various gaming channels are just another form of social networks,” said the author of <u>Burn In</u>, centered on attacks on the US that are plotted in a private chamber of an online war game and where all the plotters use avatars of historical figures to disguise themselves. His advice was that the Pentagon on future warfare, expects that future (predict) espionage and plotting will likely find refuge in some of these private online worlds. “There’s a shift from it being viewed as niche, and for kids to adults using it for everything from marketing and entertainment to criminality,” he said. “Is this the future? Most definitely.”</p>
<p>But besides the legal limitations on monitoring these games, the vast number of sites and private chats would be virtually impossible for the Pentagon to manage. “Your answer to this can’t be ‘How do I find it on video game channels?’” he said. “Your answer has to be, ‘How do I keep it from getting out in the first place?’”</p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@wapacklabs.com </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: https://www. redskyalliance. org/</li>
<li>Website: https://www. wapacklabs. com/</li>
<li>LinkedIn: https://www. linkedin. com/company/64265941 </li>
</ul>
<p>Weekly Cyber Intelligence Briefings:</p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/5504229295967742989">https://attendee.gotowebinar.com/register/5504229295967742989</a></p>
<p><a href="#_ftnref1">[1]</a> <a href="https://www.securityweek.com/online-gaming-chats-have-long-been-spy-risk-for-us-military/">https://www.securityweek.com/online-gaming-chats-have-long-been-spy-risk-for-us-military/</a></p></div>Cyber Soldiershttps://redskyalliance.org/xindustry/cyber-soldiers2022-06-23T18:40:29.000Z2022-06-23T18:40:29.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}10590951269,RESIZE_584x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}10590951269,RESIZE_400x{{/staticFileLink}}" width="200" alt="10590951269?profile=RESIZE_400x" /></a>Have you ever heard of the term "cyber soldier"? <strong> </strong>If yes, Uncle Sam wants you. There are military hackers who do fascinating work.<strong> </strong>From defending the nation's critical infrastructure to launching attacks on enemy targets, cyber soldiers get advanced training to conduct cyber warfare, even during peacetime.<strong> </strong>A cyber soldier's job is to conduct defensive and offensive operations within the military. <strong> </strong>Defensive operations refer to protecting their network from enemy cyber soldiers conducting offensive operations.<strong> </strong>These include trying to access data to gather intelligence, conduct computer network attacks, disrupt communications, or shut down critical infrastructure for the military.<strong> </strong>To accomplish their missions, cyber soldiers are trained in all aspects of the electromagnetic battlefields and thus have to work very closely with signal soldiers, electronic warfare specialists, and intelligence personnel. They also use very secretive military networks and cyber weapon systems.<strong> </strong>They usually work at the top-secret level, and yes, usually from an office building, although they could also be deployed to work from the field, a ship, or an airplane.</p>
<p>Most cyber soldiers start their careers in very general areas. <strong> </strong>Still, as they gain experience, they specialize in different things like in-network vulnerability analysis, digital forensics, or cyber threat intelligence.<a href="#_ftn1"><strong>[1]</strong></a></p>
<p>Examples of Cyber Warfare Operations<strong> - </strong>One of the best things about cyber warfare (for nations) is that it is very deniable. A perfect example is the <a href="https://www.makeuseof.com/us-gas-pipeline-ransomware-attack/">Colonial Pipeline attack</a>. Another example from June 2010 was when Iran suffered a cyberattack on its Natanz nuclear facility, which erased over 1,000 nuclear centrifuges. The attack was so devastating that it sent Iran's atomic program back by two years. It's mostly accepted that the US was responsible, but government officials have never confirmed this.</p>
<p>One favorite <a href="https://www.makeuseof.com/why-hackers-target-critical-infrastructure/">target of cyber soldiers is critical infrastructure</a>. Critical infrastructure is vital to a nation for it not to descend into chaos. A great example is the power grid of a town or city. Russia is infamous for attacking these, as it did in 2015 when it launched a cyberattack and hacked Ukraine's power grid, leaving 230,000 Ukrainians without electricity. Another example of critical infrastructure is banks, which Russia also attacked during its invasion of Ukraine this year.</p>
<p>What Are Cyber Soldiers Called by Recruiters?<strong> </strong>The United States has the most impressive cyber force in <u><a href="https://www.makeuseof.com/what-is-nato-cyber-defence-pledge/">NATO, which is increasing cyber capabilities</a></u>. <strong> </strong>If you are in the US, you are lucky, as you can potentially join the US Army Cyber Command in several capacities, like as a:</p>
<ul>
<li>Cyber Operations Specialist</li>
<li>Cyber Network Defender</li>
<li>Cyber Operations Officer</li>
<li>Cyber And Electronic Warfare Officer</li>
<li>Cyber Operations Technician</li>
</ul>
<p>If you are looking to join the US Air Force or the Space Force, you could join as a:</p>
<ul>
<li>Cyber Systems Operator</li>
<li>Cyber Warfare Operator</li>
<li>Cyber Surety Specialist</li>
<li>Cyber Operations Officer</li>
<li>Cyber Warfare Operations Officer</li>
<li>Cyber Transport Systems Specialist</li>
</ul>
<p>And finally, you could also join the US Navy and US Marine Corps as a cyber sailor/marine in the following specializations:</p>
<ul>
<li>Navy Cyber Warfare Engineer</li>
<li>Navy Cryptologic Warfare Officer</li>
<li>USMC Cyberspace Operations Officers</li>
<li>USMC Cyberspace Warfare Operator</li>
<li>USMC Cybersecurity Technicians</li>
<li>Cyber Soldiers in Canada and the UK</li>
</ul>
<p>If you are a friendly neighbor to our north and live in Canada, you could join the Canadian Forces as a Cyber Operator. However, you have more options if you live in the UK as you could investigate joining as a Cyber Unit Reserve (Royal Navy), Cyber Engineer (UK Army), or Cyberspace Communication Specialist (Royal Air Force).</p>
<p>So How Do You Become a Cyber Soldier?<strong> </strong>If you want to be a cyber soldier, or cyber warrior, as sometimes referred to, you must still be a soldier first. <strong> </strong>This means that you must complete boot camp, regardless of what branch you join (army, navy, air force, space force, marine corps, national guard, etc.). <strong> </strong>In boot camp, you will likely get yelled at, drill (march around), clean and fold, do push-ups and pull-ups, run an obstacle course, and learn how to shoot and handle a firearm.</p>
<p>Even if you were to work in a building or an HQ away from the front line and all the action, there is no guarantee that your base does not come under attack or experience a raid by enemy infiltrators while hacking into an enemy's military network. <strong> </strong>Believe it or not, this has happened in the past, which is why it does not matter if you are a cook, a clerk, a driver, or a cyber soldier; everyone must know how to defend their positing if under attack.</p>
<p>Once you complete your boot camp, you will be trained in the art of cyber warfare. Depending on your specialization, training could include cyber intelligence collection skills, computer programming languages, IT security fundamentals, electronic warfare, computer forensics, malware creation and detection, and all aspects of hacking.</p>
<p>What Your Career Progression Could Look Like as a Cyber Soldier<strong> - </strong>Once you become a cyber soldier, you will be assigned to a unit where you will specialize in several tasks and work with top-secret systems. <strong> </strong>Your day could look anything from protecting a network from cyber-attacks to creating a virus to infiltrate the power grid of an enemy. Over the years, you will then be taught leadership skills and lead other cyber soldiers in operations and training.</p>
<p>The further you advance in your <strong>career;</strong> the more responsibility will be given to you.<strong> </strong>You could work for the FBI, NSA, or DIA or provide expert advice to commanders worldwide. <strong> </strong>And if you are looking for more adventure, you could end up in a specialized unit, providing cyber support to special forces, fighter jet pilots, or spy agencies.<strong> </strong>You could also end up in an aircraft carrier providing intelligence to the commander and intelligence staff or in an air force base abroad, doing anything from taking down terrorist propaganda online or keeping the critical infrastructure safe from North Korean hackers looking to conduct <a href="https://www.makeuseof.com/what-is-cyber-extortion/">cyber extortion</a> for money.</p>
<p>In the end, wherever you end up as a cyber soldier, you will have plenty of opportunities within the government or the civilian sector. <strong> </strong>Cyber soldier's skills are highly sought after in every sector of the private industry, from education and healthcare to personal security and banking. <strong> </strong>Everyone is looking to hire ethical hackers, especially with military experience. <strong> </strong>Some jobs you could look after are internet security analyst, network support analyst, IT specialist, programmer, cyber reporter, and systems auditor.</p>
<p>Do You Have What It Takes to Be a Cyber Soldier?<strong> </strong>If you are looking for adventure, be part of a team, get free specialized training, and are not afraid of challenges and discipline, you should <strong>investigate</strong> becoming a cyber soldier. <strong> </strong>Another reason you may want to consider becoming a cyber soldier is that you will be guaranteed a high-paying job after leaving the military. <strong> </strong>Cyber soldiers are considered superstars in the civilian sector due to their real-life experience, advanced training, and working standards.</p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or <a href="mailto:feedback@wapacklabs.com">feedback@wapacklabs. com</a> </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: <a href="https://www.redskyalliance.org/">https://www. redskyalliance. org/</a></li>
<li>Website: <a href="https://www.wapacklabs.com/">https://www. wapacklabs. com/</a></li>
<li>LinkedIn: <a href="https://www.linkedin.com/company/64265941">https://www. linkedin. com/company/64265941</a> </li>
</ul>
<p>Weekly Cyber Intelligence Briefings:</p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/5504229295967742989">https://attendee.gotowebinar.com/register/5504229295967742989</a></p>
<p><a href="#_ftnref1">[1]</a> <a href="https://www.makeuseof.com/what-are-cyber-soldiers/">https://www.makeuseof.com/what-are-cyber-soldiers/</a></p></div>Full Scale Cyber Warhttps://redskyalliance.org/xindustry/full-scale-cyber-war2022-06-18T15:20:40.000Z2022-06-18T15:20:40.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}10579688677,RESIZE_584x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}10579688677,RESIZE_400x{{/staticFileLink}}" width="250" alt="10579688677?profile=RESIZE_400x" /></a>Ever since the beginning of the Internet Age, the potential to weaponize digital technologies as tools of international aggression has been known. This was exposed by Russia’s 2007 cyber-attack on Estonia, which was widely recognized as the first such act by one state against another. In 2016, NATO officially recognized cyberspace as a field of military operations alongside the more traditional domains of land, sea and air.</p>
<p>The current Russia-Ukraine War demonstrates the next major milestone in our rapidly developing understanding of cyber security. It is now becoming increasingly apparent that the invasion unleashed by Vladimir Putin on 24 February is the world’s first full-scale cyberwar. It will take many years to fully digest the lessons of this landmark conflict and assess the implications for the future of international security. However, it is already possible to draw several preliminary conclusions that have consequences for individuals, organizations and national governments around the world.</p>
<p>The current war has confirmed that while Russian hackers often exist outside of official state structures, they are highly integrated into the country’s security apparatus and their work is closely coordinated with other military operations. Much as mercenary military forces such as the Wagner Group are used by the Kremlin to blur the lines between state and non-state actors, hackers form an unofficial but important branch of modern Russia’s offensive capabilities.</p>
<p>One month before the current invasion began, hackers hit Ukraine with a severe cyber-attack designed to weaken government structures and prepare the ground for the coming offensive. Critical infrastructure was targeted along with private data in a bid to undermine Ukraine’s ability to defend itself.</p>
<p>Again and again during the first few months of the conflict, we have witnessed the coordination of cyber operations with more conventional forms of warfare. On one entirely typical occasion, a cyber-attack on the Odesa City Council in southern Ukraine was timed to coincide with cruise missile strikes against the city. </p>
<p>Just as the Russian army routinely disregards the rules of war, Russian hackers also appear to have no boundaries regarding legitimate targets for cyber-attacks. Popular targets have included vital non-military infrastructure such as energy and utilities providers. Hospitals and first responders have been subjected to cyber-attacks designed to disrupt the provision of emergency services in the immediate aftermath of airstrikes. As millions of Ukrainian refugees fled the fighting during the first month of the war, hackers attacked humanitarian organizations.</p>
<p>Individuals are also targets. Every Ukrainian citizen is potentially at risk of cyber-attack, with hacked personal data providing the Russian security services with opportunities to gain backdoor access to Ukrainian organizations and identify potential opponents or prepare tailored propaganda campaigns.</p>
<p>The scale of the cyber warfare currently being conducted against Ukraine is unprecedented but not entirely unexpected. Large-scale attacks began during the 2013-14 Euromaidan protests and initially enjoyed considerable success. This was followed by more ambitious attempts to hack into the Ukrainian electricity grid and spark power blackouts. Then came the Petya and NotPetya international cyber-attacks of 2016-17, which centered on Ukraine and caused huge global disruption.</p>
<p>It is clear that Russia’s current cyber offensive involves cybercriminals working in cooperation with military personnel while enjoying access to official intelligence data. This approach is relatively cheap, with cybercriminals often able to finance their operations using standard cyber fraud techniques. The idea of collaboration between the state and criminal elements is also nothing new. However, it is noteworthy that in this case, the state in question has a permanent seat on the United Nations Security Council.</p>
<p>Perhaps the single most important outcome of the cyberwar so far is that we now have a much better picture of the enemy. We are able to see the threats posed by Russia and also assess Moscow’s limitations. Just as naval threats are countered by missiles and mines, cyber security is achievable given sufficient knowledge and resources.</p>
<p>Ukraine has come under unprecedented cyber-attack on a daily basis for more than a quarter of a year, but the Ukrainian authorities have managed to maintain basic utility services for the vast majority of the country. Even more striking is the fact that mobile communications and internet connection disruption has been minimal. In many instances, Ukrainians have been able to access online information while under Russian bombardment.</p>
<p>One key lesson from the past few months is the need for everyone to take responsibility for their own cyber security. This applies to individuals and organizations alike. Neglecting cyber security risks creating weak links in wider systems which can have disastrous consequences for large numbers of people. Likewise, businesses should not rely on the state to take care of cyber security and should be prepared to invest in sensible precautions. This can no longer be viewed as an optional extra.</p>
<p>International cooperation is also vital for strong cyber security. Ukraine has received invaluable support from a number of partner countries while sharing its own experience and expertise. Much as the internet itself does not recognize national boundaries, the most successful cyber security efforts are also international in nature.</p>
<p>The Russian invasion of Ukraine has underlined the expansion of the modern battlefield to include almost every aspect of everyday life. The rise of the internet and the increasing ubiquity of digital technologies means that virtually anything from water supplies to banking services can and will be weaponized.</p>
<p>For years, the Kremlin has been developing the tools to carry out such attacks. The international community was slow to recognize the true implications of this strategy and is now engaged in a desperate game of catchup. The war in Ukraine has highlighted the military functions performed by hackers and the centrality of cyber-attacks to modern warfare. Restricting Russian access to modern technologies should therefore be viewed as an international security priority.</p>
<p>The Russo-Ukrainian War is the world’s first full-scale cyberwar but it will not be the last. On the contrary, all future conflicts will have a strong cyber component. In order to survive, cyber security will be just as important as maintaining a strong conventional military.</p>
<p>Author Yurii Shchyhol is head of Ukraine’s State Service of Special Communications and Information Protection.<a href="#_ftn1">[1]</a></p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or <a href="mailto:feedback@wapacklabs.com">feedback@wapacklabs. com</a> </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: <a href="https://www.redskyalliance.org/">https://www. redskyalliance. org/</a></li>
<li>Website: <a href="https://www.wapacklabs.com/">https://www. wapacklabs. com/</a></li>
<li>LinkedIn: <a href="https://www.linkedin.com/company/64265941">https://www. linkedin. com/company/64265941</a> </li>
</ul>
<p> Weekly Cyber Intelligence Briefings: </p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/5504229295967742989">https://attendee.gotowebinar.com/register/550422929596774298</a> </p>
<p><a href="#_ftnref1">[1]</a> <a href="https://www.stopfake.org/en/vladimir-putin-s-ukraine-invasion-is-the-world-s-first-full-scale-cyberwar/">https://www.stopfake.org/en/vladimir-putin-s-ukraine-invasion-is-the-world-s-first-full-scale-cyberwar/</a></p></div>All’s Quiet on the Russian Cyber Fronthttps://redskyalliance.org/xindustry/all-s-quiet-on-the-russian-cyber-front2022-03-21T16:50:55.000Z2022-03-21T16:50:55.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}10226651692,RESIZE_930x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}10226651692,RESIZE_400x{{/staticFileLink}}" width="250" alt="10226651692?profile=RESIZE_400x" /></a>A provocative piece from Vox, explains the current state of the Russian Cyber War. After three weeks of fighting, Russia is beginning to deploy increasingly brutal tactics in Ukraine, including indiscriminate shelling of cities and “medieval” siege warfare. Other elements of its military strategy, however, are conspicuously absent in cyberwarfare. Russia has a history of employing cyberwarfare tactics, which some experts believed could feature prominently in its invasion of Ukraine. The cyberattacks launched by Russia in the conflict so far have been relatively minimal though, and far less damaging than they could have been.</p>
<p>While Ukrainian government websites were the target of distributed denial of service (DDoS) attacks shortly before the invasion, for example, a larger attack, possibly knocking out Ukraine’s power grid or other key infrastructure, has not taken place. “I think the biggest surprise to date has been the lack of success for Russia with cyber-attacks against Ukraine,” a senior fellow in the American statecraft program at the Carnegie Endowment for International Peace said. “This has not been a major part of the conflict.”</p>
<p>This is particularly odd since the threat of cyberwarfare by Russian entities was already a major concern for the West, even before the recent escalation of the Russia-Ukraine conflict. It was widely established that Russia may have significant cyberwarfare capabilities following successive cyberattacks it launched against Ukraine after Russia’s 2014 annexation of Crimea. Notably, a pair of attacks in 2015 and 2016 took out power in parts of Ukraine, albeit at a relatively small scale. Since then, according to a Politico story from February, the United States and allies have attempted to bolster Ukraine’s power grid, but “nobody thinks it will be enough.”</p>
<p>In 2017, Kremlin-linked hackers launched a different kind of a cyberattack in Ukraine: a ransomware program known as NotPetya, which encrypted any data it reached, leaving the data’s unsuspecting owner locked out from accessing their own files. Victims were told to pay a ransom of $300 in bitcoin if they wanted access to their data returned. But the ransomware attack spread beyond Ukraine’s borders, infecting computer networks of companies around the world. According to a former US official, the attack resulted in more than $10 billion in total loss in damages, and the NotPetya attack is now regarded as one of the worst cyberattacks in modern history.<a href="#_ftn1">[1]</a></p>
<p>The US has not been safe from such cyberattacks, either. In 2021, for example, a group of Russia-based cybercriminals hacked into the IT network of Colonial Pipeline, a major oil pipeline system that carries gasoline and jet fuel to the southeastern US. The company was forced to pay a ransom of $5 million in exchange for the extracted files.</p>
<p>Despite the apparent vulnerabilities in Ukrainian and Western cyber-defenses, though, more sweeping cyberattacks haven’t to date been a part of Russia’s war in Ukraine. So why hasn’t Russia launched major cyberattacks yet?</p>
<p>The lack of full-scale Russian cyberattacks is a phenomenon that has surprised some at Carnegie Endowment for International Peace (CEIP)indicated. “On some level,” they said, “the reason Russia launched a full-scale war against Ukraine is precisely that it didn’t think cyber means were sufficient. But one might have expected the war itself to have involved more cyber operations.”</p>
<p>It’s difficult to know exactly what is behind Russia’s behavior, but experts have speculated about a number of potential reasons why Russia has hesitated to launch any stronger attacks. Some have theorized that Russia’s cyberwarfare capabilities may have been inflated, which is why it has not thus far launched a more sophisticated cyberattack against Ukraine or its Western allies. However, a more likely reason may be that Russia is still weighing its options carefully and is simply waiting for the right time to respond. “It could be that Russia fears retaliation that would set its cause back, at least at this point,” said CEIP, noting the relative lack of progress by Russia’s armed forces so far. “Perhaps over time, if and when Russian leaders believe that the situation is stabilized then Russia would be better able to absorb retaliation, it could launch a cyberattack then. It’s possible.”</p>
<p>Given the setbacks that Russia has encountered on the battlefield, combined with the notable resistance by Ukrainian forces that have held steady against Russia’s attacks for the last three weeks, it may also be a matter of Russia prioritizing its military actions, according to Wertheim.</p>
<p>According to an adjunct professor of political science and national security at the University of New Haven, setbacks for Russia include the loss of junior, and even some higher-level, commanders among its military personnel, which may be affecting its operations on the ground. “We’re definitely seeing some leadership deficiencies that could explain some of these surprises,” she said.</p>
<p>The US could also be a target of Russian Cyber-attacks. US authorities were already wary of a possible cyberattack from Russian hackers as a potential response to US support for Ukraine. That concern has only increased following major sanctions imposed on Russia by Western powers, as well as escalating rhetoric from Russian President Vladimir Putin. Putin described the sanctions as “akin to declaring war,” and Russian government officials have warned there will be swift action from Russia in response. US officials warned public and private entities of potential ransomware attacks after President Joe Biden announced initial sanctions against Russia late last month. “DHS has been engaging in an outreach campaign to ensure that public and private sector partners are aware of evolving cybersecurity risks and taking steps to increase their cybersecurity preparedness,” a DHS spokesperson said in a statement to the press.</p>
<p>This strong response against sanctions that Russian officials have warned of has yet to materialize in the weeks since. Although it is certainly possible that Russia will react to US sanctions at some future point, the absence of action so far is notable, according to CEIP. “It’s very hard to sort of assign exact probabilities to these kinds of things,” they said. “But it’s notable that there hasn’t been a response. And I think it remains a real possibility that even if the West does nothing more to escalate in a conflict that Russia could do so by undertaking what it believes is retaliation.” That could be particularly likely as the impact of already-imposed sanctions continues to mount. Sanctions have had an enormous effect on day-to-day life inside the country: The value of the ruble, Russia’s official currency, has plummeted to less than 1 cent, and Russian citizens have already seen price surges, particularly for electronic goods and appliances. The early price hike has motivated many residents to stock up on items in case prices continue to rise as the conflict rages on. Russian authorities are now warning its citizens against hording goods.<a href="#_ftn2">[2]</a></p>
<p>“For the past few days, it’s been like Christmas for us,” one electronics-shop staffer told media sources. “People are ready to buy things even [though] we have been raising prices every few hours based on the forex situation.” With heavy economic sanctions already in place, CEIP says there are potential risks to pushing Putin further into a corner, which in itself could motivate Russia to take more drastic measures — including, potentially, cyberattacks — as the war continues.</p>
<p>“What I most worry about is a circumstance in which Vladimir Putin thinks that his regime may be teetering and that he has to do something dramatic to change the status quo in order to maintain his grip on power,” CEIP said. “And, thus, perhaps his own personal survival.”</p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or <a href="mailto:feedback@wapacklabs.com">feedback@wapacklabs.com</a> </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: <a href="https://www.redskyalliance.org/">https://www.redskyalliance.org/</a></li>
<li>Website: <a href="https://www.wapacklabs.com/">https://www.wapacklabs.com/</a></li>
<li>LinkedIn: <a href="https://www.linkedin.com/company/64265941">https://www.linkedin.com/company/64265941</a> </li>
</ul>
<p>Weekly Cyber Intelligence Briefings:</p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/5504229295967742989">https://attendee.gotowebinar.com/register/5504229295967742989</a></p>
<p><a href="#_ftnref1">[1]</a> <a href="https://www.vox.com/2022/3/19/22986316/russia-ukraine-cyber-attacks-holding-back">https://www.vox.com/2022/3/19/22986316/russia-ukraine-cyber-attacks-holding-back</a></p>
<p><a href="#_ftnref2">[2]</a> <a href="https://indianexpress.com/article/explained/explained-russia-ukraine-war-global-food-crisis-7829000/">https://indianexpress.com/article/explained/explained-russia-ukraine-war-global-food-crisis-7829000/</a></p></div>China Pursues ‘Brain Control’https://redskyalliance.org/xindustry/china-pursues-brain-control2022-01-04T19:54:24.000Z2022-01-04T19:54:24.000ZBill Schenkelberghttps://redskyalliance.org/members/BillSchenkelberg<div><p><a href="{{#staticFileLink}}9982049484,RESIZE_584x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}9982049484,RESIZE_400x{{/staticFileLink}}" width="250" alt="9982049484?profile=RESIZE_400x" /></a>Humanoid robot called “Jia Jia” was created by a team of engineers from the University of Science and Technology of China and was presented at a conference in Shanghai at the beginning of 2017. Jia Jia can hold a simple conversation and make specific facial expressions when asked, and her creator believes the eerily lifelike robot heralds a future of cyborg labor in China. This was five years ago and was billed as China’s first human-like robot. 2022 - The Brave New World is in full force. </p>
<p>Jia Jia was a harmless looking robot. But what about using this same technology in military forces, both with enhancing human military behavior and actual robot troops. Imagine launching troop assaults on the battlefield with a mere human thought. The Chinese are enhancing the human brain to create “super warriors” and disrupting the minds of enemy troops to make them submit to the controller’s command. Once believed to only exist in science-fiction movies, the weaponization of the brain has been discussed by Chinese military officials for years. And Beijing is spending billions each year on neuroscience that could draw these scenarios ever closer to reality. “The study into brain science was born out of a vision for how the future warfare would evolve,” a medical researcher at a subsidiary of China’s state-run Academy of Military Medical Sciences (AMMS), wrote in an article in 2017. Such research, he added, has “an extremely strong military characteristic” and is crucial to securing a “strategic high ground” for every country.<a href="#_ftn1">[1]</a> This researcher is not alone in stressing the urgency in militarizing brain science.</p>
<p>In March of 2021, a Chinese military run newspaper described cloud-powered artificial intelligence (AI) “integrating human and machine” as the key to winning wars. With the accelerating “intelligentization” of the military, it warned, China needs to quickly get a firm footing in this technology, and any delay “could lead to unimaginable consequences.”</p>
<p>‘Qualitative’ Advantage - According to research papers and articles in military newspapers, Chinese military officials see four areas where innovations in brain science could be weaponized. 1.) “Brain emulation” refers to the development of high-intelligence robots that function like humans. 2.) “Brain control” is the integration of humans with machines into one, allowing soldiers to perform tasks ordinarily impossible to them. 3.) “Superbrain” involves the use of electromagnetic radiation, such as infrasonic waves or ultrasound, to stimulate human brains and activate the brain’s latent potential. 4.) The fourth, termed “controlling the brain,” is about applying advanced technology to interfere with, and manipulate, how people think.</p>
<p>Two faculty members with the military-affiliated Chinese Academy of Military Medical Sciences (AMMS) in a 2018 paper discussed their state-funded project researching a piece of biotechnology dubbed “psycho-virus.” Applied in the military, such psychological weapon could help develop “super warriors” who are “loyal, brave, and strategic;” in wars, the psycho-virus could “manipulate the consciousness of the enemies, crush their will, and interfere with their emotions to make them submit to the will of our side,” the authors said.</p>
<p>Brain scientists may also aid the recovery of handicapped soldiers and systematically elevate the health protection of military personnel, according to a 2019 article on PLA Daily, the official newspaper for the Chinese military, known as the People’s Liberation Army. While the Chinese Communist Party (CCP) has been dedicated for years to “getting ahead of the biotechnology arms race,” the evolution of frontier technologies has brought added urgency, according to North Star Support Group (NSSG), a multinational risk management company. The “improbable futuristic technology that had been dreamed up in the past has now become more realistic in real-time,” the NSSC recently wrote. “This creates little room for error as a potential loss of dominance of such technology could potentially lead to the weakening of strategic barriers if left unchecked.”</p>
<p><a href="{{#staticFileLink}}9982050456,RESIZE_192X{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}9982050456,RESIZE_192X{{/staticFileLink}}" width="188" alt="9982050456?profile=RESIZE_192X" /></a></p>
<table width="100%">
<tbody>
<tr>
<td>
<p>Figure 1. A University of Florida student uses a brain-controlled interface headset to fly a drone during a mind-controlled drone race in Gainesville, Fla., on 16 April 2016. (Jason Dearen/AP Photo)</p>
</td>
</tr>
</tbody>
</table>
<p>Concerned about Chinese activities in biotechnology, the US in December black-listed China’s AMMS, the country’s top medical research institute run by the Chinese military—and its 11 affiliated biotechnology research institutes, accusing them of developing “purported brain-control weaponry” to further the Chinese military.<a href="#_ftn2">[2]</a></p>
<p>Weeks before the move, the US Commerce Department’s Industry and Security Bureau solicited public comments about a proposed rule to ban the export of brain-computer interface (BCI) technology, an emerging field that seeks to enable humans to directly communicate with an external device with just their thoughts. Such technology would provide a “qualitative military or intelligence advantage” for US adversaries, such as by “enhancing the capabilities of human soldiers, including collaboration for improved decision making, assisted-human operations, and advanced manned and unmanned military operations,” the Commerce Department said.</p>
<p><strong>‘A Matter of China’s Future’ </strong>The US has been at the forefront in the field of brain technology, with the world’s largest number of research papers published on the subject. In April 2021, Elon Musk’s neurotechnology startup Neuralink released a video showing a monkey playing computer games through a chip inserted in its brain. Synchron, a Silicon Valley developer of implantable neural interface technology, in December released seven tweets it said were sent wirelessly by an immobilized Australian patient who had received the company’s chip implant, known as Stentrode. The National Institutes of Health granted Synchron $10 million last July to help launch its first US human trial.</p>
<p>The US Defense Advanced Research Projects Agency (DARPA) has also researched BCI for military applications, such as an “Avatar” project that aimed to create a semi-autonomous machine to act as the soldier’s surrogate.</p>
<p><a href="{{#staticFileLink}}9982050868,RESIZE_1200x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}9982050868,RESIZE_400x{{/staticFileLink}}" width="250" alt="9982050868?profile=RESIZE_400x" /></a></p>
<table width="100%">
<tbody>
<tr>
<td>
<p>Figure 2. A young woman watches a man, wearing an EEG brain scanning apparatus on his head, play a pinball game solely through willing the paddles to react with his brain at the Berlin Brain Computer Interface research consortium stand at the CeBIT Technology Fair in Hannover, Germany, on March 2, 2010. (Sean Gallup/Getty Images)</p>
</td>
</tr>
</tbody>
</table>
<p>Beijing, closely tracking the developments in America, has demonstrated itself unwilling to stay behind. In January 2020, three months before Synchron began its first trial, eastern China’s Zhejiang University had completed testing of a brain implant on a 72-year-old paralyzed patient. Using his brainwaves, the patient could direct a robotic arm to perform handshakes, fetch drinks, and play a classic Chinese board game: Mahjong.</p>
<p>Over the past six years, Beijing has come to see progress on brain-related research as “a matter of China’s future,” according to Chinese media reports. The country’s leading national scientific institution, the state-run Chinese Academy of Sciences (CAS), has pumped around 60 billion yuan (USD$9.4 billion) annually into efforts to map out brain functions, its website shows. Last September, China’s Ministry of Science and Technology opened up applications for research into the field, with an additional 3 billion yuan (about $471 million) allocated for 59 research streams.</p>
<p>The role of brain science has been significant enough that Chinese leader Xi Jinping has identified it as a priority field of emerging technology significant for the country’s national security, and for making China a central hub for world’s cutting-edge scientific innovations. “China is closer than in any time of history to the goal of rejuvenating the Chinese nation, and we need more than any time in history to build a world science and technology superpower,” he told CAS scholars in a 2018 speech.</p>
<p><img class="align-left" src="{{#staticFileLink}}9982054463,RESIZE_400x{{/staticFileLink}}" width="400" alt="9982054463?profile=RESIZE_400x" /><strong>Military ‘High Ground’ </strong>The Chinese regime is racing to close the gap with the United States in harnessing the power from this emerging technology. In terms of the volume of published papers on brain technology, China is second only to America, a senior engineer with state-run scientific research institute China Academy of Information and Communications Technology, said at a recent forum on BCI. That number grew at a pace of 41 percent over the period of 2016 to 2020, more than double the global average of 19 percent, according to a May report co-written by a Beijing-based AI robot manufacturer and a think tank advising Beijing on big data and AI. The stack of Chinese innovations on BCI has appeared to keep pace with the growing enthusiasm.</p>
<p>AMMS, the Chinese military academy under US sanctions, has been at the forefront of neuroscience research. Inventions from the AMMS and its affiliates since 2018 include various nerve signals collection devices, miniature skull implants, a remote monitoring system for restoring damaged nerves, and wearable augmented reality glasses designed for enhancing robot control, according to an open depository of patent applications. In 2019, the Institute of Military Medicine under AMMS created a brain-controlled unmanned aerial vehicle. To move the vehicle forward, an operator puts on an electrode cap and imagines moving their right hand. Thinking about feet movement would instruct the machine to descend.</p>
<p>Figure 3. Chinese People’s Liberation Army soldiers line up during military training at the Pamir Mountains in Kashgar, China, on Jan. 4, 2021. (STR/AFP via Getty Images)</p>
<p><a href="{{#staticFileLink}}9982052088,RESIZE_584x{{/staticFileLink}}"><img class="align-left" src="{{#staticFileLink}}9982052088,RESIZE_400x{{/staticFileLink}}" width="250" alt="9982052088?profile=RESIZE_400x" /></a></p>
<table width="100%">
<tbody>
<tr>
<td>
<p>Figure 4. Cho Yu Ng of Hong Kong competes during the wheelchair race in Kloten, Switzerland, at the Cybathlon Championship, the first edition of an international competition organized by ETH Zurich for physically impaired athletes using bionic assistive technology, such as robotic prostheses, brain-computer interfaces, and powered exoskeletons, on Oct. 8, 2016. (Michael Buholzer/AFP via Getty Images)</p>
</td>
</tr>
</tbody>
</table>
<p>The AMMS’ National Defence Science and Technology Innovation Research Institute in 2021 acquired a patent for using virtual reality for spacecraft docking. The device interprets the astronaut’s brain and limb activities and converts them into orders to adjust the aircraft’s position in real-time. While a sizable portion of innovations in BCI and other fields of brain technology has potential medical use, some may also be leveraged for military purposes.</p>
<p>One Chinese university previously touted unmanned combat via thought-controlled robots as a “high ground” in AI that China “must race to control.” “Witness more miracles with Chinese characteristics in strengthening the army,” proclaimed the National University of Defense Technology, a military academy that supplies talent for China’s armed forces, as it showed off a list of brain-controlled devices produced by the university, including a wheelchair and a car that could travel roughly 9.3 mph “on any road.” “Together, let’s change the world with our ‘minds,’” the school declared in a post on its website last November.</p>
<p><strong>Calls for Self-Reliance </strong>The US Commerce Department’s blocking rules may hinder or delay the regime in China in its path of advancing biotech and brain-related technologies but are unlikely to slow it down, according to a senior fellow with the Center for Security Policy and a retired US Marine colonel. “[T]he Chinese will simply maneuver a bit, change some names, and keep going full-speed ahead on these efforts to weaponize biotech,” he told media. But the sanctions serve a useful purpose at home: “making it impossible for Americans (and others) who want to invest in and partner with the Chinese organizations to claim they ‘didn’t know’ what the Chinese were doing—or to argue that ‘it isn’t prohibited,’” he added.</p>
<p>Meanwhile, Chinese researchers have been focused on achieving self-sufficiency in this area. In 2019, a research team at Tianjin University in northern China unveiled a “Brain Talker” chip, which, when linked to the brain through an electrode cap, could decode a user’s mind intent and translate it into computer commands in under two seconds.</p>
<p>Fudan University, an elite public institution in Shanghai, in January 2021 presented a remote BCI chip that can be recharged wirelessly from outside the body, avoiding potential damage to the brain. The chip consumes only a tenth of the power of its Western counterparts and costs half as much, Chinese state media reported at the time. The term “self-developed” was prominently featured in both team’s announcements and media reports.</p>
<p>The associate director at CAS’ Shanghai Institute of Microsystem and Information Technology, said China has the potential to lead the world in the field of BCI. “China is not lagging behind foreign countries in terms of the design aspects for core BCI gear,” he wrote in a June article published on Chinese state media. He called on the country to step up resource allocation to accelerate BCI development, given the risk that the US might block BCI exports to China.</p>
<p><strong>Ethical Risks </strong>China has a unique advantage to help it gain a leg up in the race: its vast bank of non-human primates, according to a key research figure spearheading China’s brain research at CAS. China has been the world’s top supplier for test monkeys but stopped shipping them once the pandemic began. Chinese research which in 2008 switched to monkeys from mice as the test animal at his neuroscience institute at CAS, had long wanted to utilize the country’s test animal resources to boost China’s brain research standing, according to state media reports. His team in 2017 cloned the world’s first pair of monkeys using the same method that produced Dolly the Sheep—a crucial step forward for China’s brain-related research.<a href="#_ftn3">[3]</a> With the same cloning technology, Chinese scientists could mass produce, and experiment on, identical monkeys, eliminating interferences to experiments resulting from individual differences in test animals, as presented in a newspaper under CAS, in October 2021.</p>
<p><a href="{{#staticFileLink}}9982053493,RESIZE_930x{{/staticFileLink}}"><img class="align-full" src="{{#staticFileLink}}9982053493,RESIZE_400x{{/staticFileLink}}" width="250" alt="9982053493?profile=RESIZE_400x" /></a>Figure 5. Five cloned macaques at a research institution in Shanghai are shown in a picture taken on Nov. 27, 2018, and released on Jan. 24, 2019 by the Chinese Academy of Sciences Institute of Neuroscience. Chinese scientists said the five monkeys were cloned from a single animal that was genetically engineered to have a sleep disorder, saying it could aid research into human psychological problems. (STR/AFP via Getty Images)</p>
<p>The AMMS has also proposed studies into building a database for an “aggressive consciousness control weapon” that targets specific spiritual or ethnic groups. Such a project was first mentioned as early as 2012 by the Institute of Radiation Medicine under AMMS. The database aimed to establish a collection of images and videos that could trigger aggressive behavior. Its proposed targets include “spiritual leaders, organizations and extreme religious groups who share the common belief, and ethnic groups who share similar traits in locations and lifestyle habits.”</p>
<p>China’s more lenient ethical bar compared to the West has provided it with more leeway to gain a foothold with their BCI-related experiments that would “greatly empower them and streamline their innovations,” according to ethics experts. In China, such experiments have “less red tape preventing them from using questionable testing practices. That makes all the difference in a world where one’s edge in technology and intelligence can depend greatly on how they manage their ability to stay ahead of the curve,” they emphasized. </p>
<p>Of note, when asked by a journalist in China to the head of BCI research, if BCI technologies may one day “enslave” humans, the Chinese scientist appeared undisturbed. “If we have the confidence that our society will be able to develop mechanisms to control the use of technologies for our benefits, then we need not worry about AI,” he told the National Science Review, a peer-reviewed journal under the auspices of CAS, in 2017. “Since the 1950s, many people have been worrying about the build-up of nuclear bombs and thought that we will soon be destroyed by a nuclear holocaust. But we still live quite well now, aren’t we?” he added. Ethically, a chilling response. </p>
<p>Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. We have long reported on the Chinese Communist Party (CCP) and its many facets of globalization. Having an strong military is a key to their successes. We thank Eva Fu, who researches and writes on US/China relations for the Epoch Times. This technology makes you think hard about the future. For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or <a href="mailto:feedback@wapacklabs.com">feedback@wapacklabs.com</a> </p>
<p>Weekly Cyber Intelligence Briefings:</p>
<ul>
<li>Reporting: <a href="https://www.redskyalliance.org/">https://www.redskyalliance.org/</a></li>
<li>Website: <a href="https://www.wapacklabs.com/">https://www.wapacklabs.com/</a></li>
<li>LinkedIn: <a href="https://www.linkedin.com/company/64265941">https://www.linkedin.com/company/64265941</a> </li>
</ul>
<p>Weekly Cyber Intelligence Briefings:</p>
<p>REDSHORTS - Weekly Cyber Intelligence Briefings</p>
<p><a href="https://attendee.gotowebinar.com/register/3702558539639477516">https://attendee.gotowebinar.com/register/3702558539639477516</a></p>
<p><a href="#_ftnref1">[1]</a> <a href="https://www.theepochtimes.com/china-pursues-brain-control-weaponry-in-bid-to-command-future-of-warfare_4186003.html/">https://www.theepochtimes.com/china-pursues-brain-control-weaponry-in-bid-to-command-future-of-warfare_4186003.html/</a></p>
<p><a href="#_ftnref2">[2]</a> <a href="https://www.theepochtimes.com/us-blacklist-dozens-of-chinese-biotech-firms-that-aid-military-including-for-brain-control-weaponry_4161999.html">https://www.theepochtimes.com/us-blacklist-dozens-of-chinese-biotech-firms-that-aid-military-including-for-brain-control-weaponry_4161999.html</a></p>
<p><a href="#_ftnref3">[3]</a> <a href="https://www.theepochtimes.com/china-cloning-the-message-in-the-monkeys_2425658.html">https://www.theepochtimes.com/china-cloning-the-message-in-the-monkeys_2425658.html</a></p></div>