Tag Archive for: building

Exclusive: Five Eyes alliance fabricating evidence, building rumors of China infiltration: source


The Five Eyes Alliance Photo: VCG

The Five Eyes Alliance Photo: VCG

The Five Eyes Alliance is collecting and fabricating evidence that intends to show China is “infiltrating politically into Western countries,” with the aim of tarnishing China’s image in the world, the Global Times learned from a source close to the matter. 

Analysts said this is not the first time that the Five Eyes have conspired to target China and other countries. As an alliance designed for intelligence sharing, it has been conducting covert or overt operations like theft, interference, infiltration, subversion and coercion. The Five Eyes alliance is not so much as an intelligence-sharing group but an anti-China club.

The Global Times learned that intelligence agencies in the Five Eyes willfully interrogate and harass Chinese students and scholars on questionable or no grounds at all. Some even approach Chinese communities and pressure them to become agents for the Eyes. Although the Eyes are not so sharp at telling the truth from falsehood, they are adept at meddling in the internal affairs of China, among other countries in the world.

In Hong Kong, the consulates of these countries have become the headquarters and command of interference and subversion where their consular officials reached out to anti-China forces and separatists to incite violence by providing financial support and training, the source said. 

The alliance has been obsessed with making up cases of China’s “espionage” and “infiltration” merely based on shoddy intelligence. In 2020, Australian spy authorities raided New South Wales state legislator Shaoquett Moselmane’s home for alleged links with China. But the cited political influence in Australia on behalf of China was never proven by evidence. 

In recent years, Five Eyes alliance is also stepping up its efforts to steal and attack other countries in the area of cybersecurity. 

A latest report from Anzer, a cybersecurity information platform, showed that the US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other “Five Eyes” countries.

The…

Source…

China launches empire building exercise in Pacific theatre


President Panuelo: ‘Chinese control over our security space, aside from impacts on our sovereignty, increases the chances of China getting into conflict with Australia, Japan, US and New Zealand, on the day when Beijing decides to invade Taiwan.’

Time to head to the map room. We’ll open the long, wide, top drawer, pull out the map of World War II’s Pacific Theatre, and set it aside on the chart table for now. We’ll get back to it. But first we’ll pull out an exclusive economic zone (EEZ) map of the region.

Under the UN Convention on the Law of the Sea, every island can get up to 200 nautical miles off its coast as an EEZ in which it controls resources, say, fisheries. That means, for example, Pacific Island Country (PIC) Kiribati may have a population of around 120,000, but, with its EEZ, it covers as much of the planet as India.

Now let’s colour in the EEZs of the countries being visited at the moment by China’s Foreign Minister Wang Yi and his large delegation. What we see is a large, contiguous band—Papua New Guinea, Solomon Islands, Vanuatu, Fiji, Tonga and Samoa—off the northeast coast of Australia, backed against Kiribati. And off to the northwest of Australia, almost embedded into Indonesia, strategically located Timor-Leste.

What are we looking at? Well, China helpfully tells us.

CHINA’S ‘VISION’ AND ‘FIVE-YEAR ACTION PLAN’ FOR PACIFIC ISLAND COUNTRIES

Wang is hoping the PICs who recognize China will sign on to two prewritten documents. We know what’s in them because they have been leaked by Pacific Islanders worried about the implications.

The first one is “China-Pacific Island Countries Common Development Vision”. The second is “China-Pacific Island Countries Five-Year Action Plan on Common Development (2022-2026)”. The “Action Plan” describes how China plans to achieve its “Vision”.

“Vision” talks about: law enforcement cooperation, including “immediate and high-level police training”; “cooperation on network governance and cyber security”, including a “shared future in cyberspace”; the “possibility of establishing China-Pacific Island Countries Free Trade Area”;…

Source…

Q&A: How the National Security Agency is Building the Next Generation of Cyber Stars


EDTECH: What is your background, and how did you get involved with GenCyber?

Greeley: I have 15 years of classroom experience, including teaching Advanced Placement U.S. history and U.S. government, and I spent about 20 years coaching basketball. GenCyber launched in 2014 as a pilot, and I started working with them in a support role in 2015.

I love teaching, and I wasn’t looking to leave the classroom, but I grew to love cybersecurity education. Since 2018, I’ve worked at the National Cryptologic School at the NSA.

EDTECH: What is the goal of GenCyber?

Greeley: GenCyber is a federally supported program that gives grants to postsecondary institutions to host student, teacher or student/teacher programs in cybersecurity. We’re looking at a shortfall of about half a million cybersecurity positions in the United States. So, this program works to make better cybersecurity citizens and, hopefully, teach students who are interested in cybersecurity that there is a career out there for them.

One of the greatest things about cybersecurity is that it is multidisciplinary. It’s for STEM students, but also for liberal arts-minded students. A lot of times, GenCyber is the first touchpoint for students and teachers in cybersecurity.

FIND OUT MORE: How can OpSec benefit K–12 schools and district leaders?

EDTECH: What is the format of the camp?

Greeley: My favorite part of GenCyber is that every program looks different because it is based on the local K–12 ecosystem. A GenCyber program in Northern Virginia is going to look a lot different than a GenCyber program in Iowa.

Each institution must have certain pillars. We require that they base their curriculum on six principles: confidentiality, integrity, availability, defense in depth, thinking like an adversary and keeping it simple. We also require that they teach cyber ethics, and they must have at least one unit on careers.

EDTECH: How long are the camp sessions?

Greeley: Historically, they’ve been weeklong summer camps. We now require institutions to also host pre-camp and post-camp events. We’re trying to build more year-round engagement, particularly since we know that K–12 cybersecurity opportunities for students…

Source…

The Singaporean Startup Expimont Building the Future of Website Security


In a report by positive technologies, as much as 85 percent of the web applications had vulnerabilities that allow attacks against users. This is the figure that Singaporean startup Expimont wishes to combat.

“The internet has been expanding at an extraordinarily quick pace; however, cyber security has not managed to keep up,” says Expimont CEO Ivan Persson. He explains that the majority of web applications today were not designed with cyberthreats in mind and proceeds to state that this is a significant issue and is a threat to both companies and users alike.

Expimont has developed a SaaS solution that significantly reduces the chance of data theft and other cybercrime by identifying malicious requests and taking appropriate action before they reach their customers’ servers. In combination with this, they’ve developed a dashboard that allows its users to adjust security settings and view statistics regarding their protected websites.

Although there are undoubtedly many websites that were designed and secured against the threats of the time, Ivan says, most do not keep a dedicated security team in perpetuity. As a result, they will be susceptible to zero-day exploits and other new cyberthreats that pop up all the time.

“Using Expimont is more scalable, cost-effective, and reliable than on-premise solutions,” he says. “We’ve secured and accelerated dozens of web applications to date, and we’ve received great feedback.”

Today, companies are not left with many choices — they can opt for a dedicated security team, ignore the topic altogether, or go for a solution like that which Expimont provides. He explains that opting for a dedicated security team may allow for more specialized solutions though they’re in most cases extraordinarily costly and are not as reliable in the long term.

“To embrace the future, we will start accepting cryptocurrency as a payment method, and we stand behind the principle of privacy,” he concludes with.

Source…