Last night we reported that China had made its giant leap to the far side of the moon. It appeared to be an exciting moment for the world and has become a motivator for other countries to take part in the new space race. However, there may be a darker side to this moon venture that has to do with full spectrum control over everything electronic on the earth.

As many people may or may not know anything that winds up on the far side of the moon has a hard time sending signals back to earth. When China landed the rover on the Moon and sent back signals there were many people that were calling it a hoax because of the signal loss.

Signals to and from the rover are being relayed through a satellite called Magpie Bridge or Queqiao in Chinese. It is in a “halo orbit” on the other side of the moon, from where it can communicate with both Chang’e and the Earth.

In a speculative culture, it can be surmised that the rover is on the far side of the moon because there are plenty of things the rover can do in the dark and there are plenty of ways that a relayed signal can be blocked by curious eyes.

This is why the obviously speculative analysis by Richard Hoagland was that Change-4’s secret mission is to send back images of structures on the moon that would prove that at one time extraterrestrial settlements were established on the moon in antiquity.

It would also be amazing if we found out that there are aliens that are now occupying the area and that secret communications are being beamed to a relay satellite and back down the Chinese listening post in Patagonia, Argentina.

Last August, The New York Times sounded the alarm about a space mission control center in South America.

Ground Zero listeners knew of that base in 2016 as we received information about a deal that was made in 2012 between Beijing and Buenos Aires to build the so-called “Deep Space Station.” the facility was to be completed by the end of 2016.

While Argentina and China claimed that “the ground station in the Southern Hemisphere was being built to support the program for moon exploration and other space activities.”

There was a concern among some that the Chinese facility may have a more military purpose.

The Chinese moon mission could have a more diabolical agenda and it is far more cloak and dagger that any conspiracy dealing with Alien artifacts.

It has been leaked that a division of the Chinese People’s Liberation Army, dedicated to intercepting communications of other world powers has also set up operations there and it may be that having a position from above can give the advantage of being able to intercept internet transmissions and shut down areas of operations anywhere on earth.

The issue is whether the station is part of a Chinese network similar to the global surveillance program known as the ECHELON Network, which uses similar technology to intercept communications. Using relay satellites from the moon to Patagonia gives them an advantage. China now has the capacity, and since there is no oversight, there’s no way to ensure that they’re not using their space dominance to move forward with operations that can disrupt communications on earth.

It is also important to note that Beijing seeks to level with other world powers and stop relying on the GPS system. The U.S. Department of Defense developed the navigation satellite system, operational since 1995, in the 1970s.

Since then, Europe developed the Galileo system, while Russia built its global navigation satellite system GLONASS. China currently develops BeiDou, also known as Compass.

To gain independence from the GPS system requires a significant geostationary presence.

Now, why would China or Russia want an independent system?

Well, it does not take much to figure out why.

Hacking the U.S. Military’s GPS system would cripple the military and leave them with having to work with rudimentary equipment.

This gives the Chinese an opportunity to make up for the dark side of the planet they haven’t covered… it sends a very dark message that can be compared to what Sputnik meant to the space race in the 1950s.

This time the entire grid and other communication sources can be hijacked from the moon.

China knows that they need to triangulate satellite signals, so they could install similar antennas in other parts of the world to make their system complete. Similar stations are Africa and another in Asia.

For now, the Chinese military will at least use the station in Argentina as a base for their satellite positioning system. We know that GPS is basically geared toward military use, then civil use. So it’s ridiculous to think that the Chinese military won’t use their own GPS system and it is also evident that once they become independent they can do whatever they want with other GPS systems during a war scenario.

China would also have the power to spy on oil activities and intercept messages from fishing and military ships in the South Atlantic. We need to remember that information isn’t always sent by cable, but by satellite. And no matter how encrypted it is, we know the Chinese aren’t bad at hacking communications and with quantum technology the power to break inscription is immeasurable.

A lot of spooky things are actually happening on the moon but prior to the Chinese so-called success, we may have had a taste of what it would be like if the Internet of things just suddenly became inert and that things are brought to a halt by hackers with advanced untraceable tools.

A nationwide outage for CenturyLink customers, including those trying to reach 911 emergency service, dragged on and on December 27th.

The outage hit customers of CenturyLink, which provides phone, internet and TV service in areas including Idaho, New Mexico, and Minnesota. The company’s site lists residential services in 35 states.

It also affected 911 services across the country, prompting nationwide alerts to cell phones. The FCC has since launched an investigation into the matter, however, it has been put on hold because of the government shut down.

It was also was eerily coupled with the two explosions at a substation in New York and Louisiana.

CenturyLink is headquartered in Monroe, Louisiana.

It is the third-largest telecommunications company in the United States in terms of lines served, behind AT&T and Verizon.

It is important to note that the third largest telecommunications company being crippled mysteriously created this much chaos in one night.

On the same night as the CenturyLink outage, there was a server outage at the Los Angeles Times Newspaper. It was discovered to be a malware attack, which originated from outside the United States and hobbled computer systems and delayed weekend deliveries of the Los Angeles Times and other newspapers across the country.

Technology teams worked feverishly to quarantine the computer virus, but it spread through Tribune Publishing’s network and re-infected systems crucial to the news production and printing process. Multiple newspapers around the country were affected because they share a production platform.

The attack delayed distribution of Saturday editions of the Los Angeles Times and San Diego Union-Tribune. It also stymied distribution of the West Coast editions of the Wall Street Journal and New York Times, which are printed at the Los Angeles Times’ Olympic printing plant in downtown Los Angeles.

It was suspected that the attack was from China however it is difficult to pinpoint who sent the malicious attack.

Several individuals with knowledge of the Tribune situation said the attack appeared to be in the form of “Ryuk” ransomware. One company insider, who was not authorized to comment publicly, said the corrupted Tribune Publishing computer files contained the extension “.ryk,” which is believed to be a signature of a “Ryuk” attack.

Cybersecurity experts have known about “Ryuk” ransomware for months. Ryuk was actually suspected of infecting Chinese PC’s earlier in December when users of WeChat installed an app named “Account Operation V3.1,” an app for helping users manage multiple accounts at the same time.

Security experts who analyzed the infections said that besides encrypting files, the ransomware also included an information-stealing component that harvested login credentials for several Chinese online services, such as Alipay (digital wallet), Baidu Cloud (personal cloud file hosting), NetEase 163 (email service), Tencent QQ (instant messaging), and Taobao, Tmall, and Jingdong (online shopping platforms).

The highest-profile cyberattack of a media company was in late 2014 at Sony Pictures Entertainment in Culver City.

Hackers, which the FBI later determined were affiliated with the North Korean government, broke into Sony Pictures’ computer system and copied huge chunks of data, which they later posted online for the world to see.

That theft was enormous: employees’ personal information, including Social Security numbers, movie production schedules and budgets, media distribution lists and embarrassing emails sent by top executives.

Sony Pictures’ workforce learned of the attack on Nov. 24, 2014, just days before Thanksgiving. Their computer screens were overtaken by a ghoulish cartoon, then the computer systems crashed.

Yesterday January 2nd, 2018 the FBI cyber division issued a warning numbered AB-000102-MW.

In the warning it states:

“The following information was obtained through FBI investigations and is provided in accordance with the FBI’s mission and policies to prevent and protect against federal crimes and threats to the national security. The FBI is providing the following information with HIGH confidence:

The FBI obtained information regarding a group of Chinese APT cyber actors stealing high value information from commercial and governmental victims in the U.S. and abroad. This Chinese APT group is known within private sector reporting as APT10, Cloud Hopper, menuPass, Stone Panda, Red Apollo, CVNX and POTASSIUM. This group heavily targets managed service providers (MSP) who provide cloud computing services; commercial and governmental clients of MSPs; as well as defense contractors and governmental entities. APT10 uses various techniques for initial compromise including spearphishing and malware. After initial compromise, this group seeks MSP administrative credentials to pivot between MSP cloud networks and customer systems to steal data and maintain persistence. This group has also used spearphishing to deliver malicious payloads and compromise victims.”

In addition to and through cloud-computing MSPs, APT10 targets victims in the following areas:

• Agriculture
• Automotive
• Defense contractors
• Electronics
• Energy
• Financial
• Government
• Human Resources
• Manufacturing
• Medical
• Military
• Mining
• Shipping
• Technology services
• Telecommunications any activity related to APT10 detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement. The FBI is providing the following information with HIGH confidence.

China is surreptitiously laying down security and intelligence infrastructure. I don’t know if it is an overreaction to say that what China may be doing with their moon landing is an act of war or at least an act of space aggression.

An arms control official under the Obama administration, Frank A. Rose, told the New York Times, “They are deploying these capabilities to blunt American military advantages, which are in many ways derived from space,” which he identifies as sophisticated jamming techniques that could “disrupt and destroy satellites.”

China’s rapid military and advanced telecommunications and weapons modernization, undergirded by a burgeoning defense budget has been nothing short of remarkable and is set to challenge the West on several fronts.

Perhaps, in what would be a nightmare scenario for Western officials who’ve been caught off guard, China has indeed already staked out a new massive intelligence-collecting outpost south of America’s border under the guise of space exploration.

It is obvious that we are on a major alert for more cyber attacks and the world does not see what is being dealt from the dark side of the moon.