8/31/18: 間諜 CYBER CHINESE LAUNDRY

間諜

CYBER CHINESE LAUNDRY

MONOLOGUE WRITTEN BY CLYDE LEWIS

When I was 17, I met a Linguistics Professor at BYU. At the time, I was taking German in high school and he asked why. I told him it was because of my heritage. I explained that my family migrated to Zurich from Germany to flee the Nazis. My aunt at one time lived in Munich and I wanted to impress her by speaking German. He said “A word of advice? Drop your German classes and learn Spanish – once you have mastered that language, learn to speak Mandarin Chinese.”

I asked him why and he told me that in the future he believed that Spanish would be the language of labor and that Chinese would be the language of future business.

Well, since then I have learned Spanish, lived in a Spanish speaking country, and now I am realizing that perhaps I should have learned Chinese when I had the chance.

I am not understanding what he was telling me; however, I do not believe that he realized that not only would Chinese be the language of business, but it would also be the language of government and e-commerce.

Analysts are saying the Chinese are looking at a window of about five years to 10 years to achieve world domination before they collapse under the weight of their own aging population.

However, what they cannot do in the real world they will do in the cyber world. It is very telling as to what their moves are with regard to the Internet of Things and quite simply they are outsmarting us at every move, from our economy to our elections.

And the media still is obsessed with Russia.

The media seems to ignore the fact that Soviet Russian communism fell with the Berlin Wall.

They obviously are forgetting to report that the biggest and soon to be the most powerful country on earth, remains unabashedly communist apart from its commitment to capitalism.

The only part missing is the democracy.

When analyzing the move of our adversaries, the media has failed to report on how the Chinese have now been able to successfully show the technocrats the most foolproof ways of using the forces of censorship to curtail freedom of expression.

The country’s government appears to have launched a new offensive, closing the social media accounts of some influential opponents.

Now keep in mind we are still talking about China; however, if you were half listening to what I was saying you would think I was talking about the United States and the efforts of tech platforms to run their operations in the same way China is running theirs.

The fact is that technocrats are very interested in implementing operations based on Chinese models and AI dependency.

With a $14 trillion GDP, China is predicted to account for over 35 percent of global economic growth from 2017 to 2019 — nearly double the US GDP’s predicted 18 percent.

And AI is responsible for a big chunk of that.

It may or may not alarm you that within 5 years, the Internet of Things may be operated by Chinese companies and regulated by Chinese technocrats.

By 2030, they will dominate the industries of AI.

Already, Chinese investments in AI, chips, and electric vehicles have reached an estimated $300 billion. Meanwhile, AI giant, Alibaba, has unveiled plans to invest $15 billion in international research labs from the US to Israel, with others following suit.

Beijing has now mobilized local government officials around AI entrepreneurship and research, led by billions in guiding funds and Venture Capital investments. And behind the scenes, a growing force of driven AI entrepreneurs trains cutting-edge algorithms on some of the largest datasets available to date.

As the tectonic plates of global politics shift, it is worth asking if we want the world to be led by a nation whose guiding principle is:

“We should not just mechanically copy the political systems of other countries. The CPC stresses the unity of Party leadership, the people running the country, and law-based governance. Party leadership is the fundamental guarantee for ensuring that the people run the country and governance in China is law-based; that the people run the country is an essential feature of socialist democracy, and law-based governance is the basic way for the Party to lead the people in governing the country. The system of people’s congresses must be upheld and improved to ensure the people’s exercise of state power.”

Or, do we want to live and defend our philosophy:

“We hold these truths to be self-evident: that all men are created equal; that they are endowed by their creator with certain unalienable rights; that among these are life, liberty and the pursuit of happiness.”

Well, call me old fashioned but life liberty and the pursuit of happiness is pretty stable and when applied can be quite palatable; however, it needs to be said that as we are failing in our educational systems and as we see the growing endorsement of communist and anarchist groups like Antifa – I worry that we are preparing for the ideological takeover of a new communism – one that has been put through the Chinese Laundry.

Perhaps China’s biggest advantage is the sheer quantity of its data. Tencent’s WeChat platform (their version of Facebook) alone has over one billion monthly active users. That’s more than the entire population of Europe. Take mobile payments spending: China outstrips the US by a ratio of 50 to 1.

Chinese e-commerce purchases are almost double US totals.

But China’s data advantage involves more than just quantity. As China witnesses an explosion of online-to-offline startups, their data is creating a new intelligence layer unparalleled in the West.

This should raise some concern.

After Facebook and Twitter have led efforts to purge what they call uncomfortable speech according to community standards – they also claim that they wish to also shut down what they deem to be “Russian agent” accounts that are said to be pushing Russian propaganda hell bent on meddling with our election process.

However, a bombshell new report states that China is using LinkedIn to attempt mass recruiting of Americans with access to government and commercial secrets.

Evanina, who heads the U.S. National Counter-Intelligence and Security Center, has further called on LinkedIn to follow the lead of other online companies: “I recently saw that Twitter is canceling, I don’t know, millions of fake accounts, and our request would be maybe LinkedIn could go ahead and be part of that.”

LinkedIn has something approaching 600 million users on its site around the globe, including about 150 million members in the US.

Meanwhile, LinkedIn has responded to the allegations of US intelligence by noting it is increasingly aware of such threats and says it’s cooperating with authorities.

It has been confirmed that Chinese intelligence did use LinkedIn to successfully recruit a retired CIA officer who is reported to have been facing financial hardship at the moment he was contacted by what he thought was a Shanghai think tank looking for fluent Mandarin speaker.

Furthermore, reports state that “the targets include experts in fields such as supercomputing, nuclear energy, nanotechnology, semiconductors, stealth technology, healthcare, hybrid grains, seeds and green energy.

Some authorities fear that this is China’s first step in conducting espionage under the cover of cyber recruitment.

According to the FBI up to 70 percent of China’s espionage efforts are aimed at the American private sector.

The National Counterintelligence and Security Center in its annual report ‘Foreign Economic Espionage in Cyber says that China is the most aggressive actor in collecting The United States most sensitive economic information, trade secrets, and technologies, particularly in cyberspace.

China, according to the report, has expansive efforts in place to acquire US technology to include sensitive trade secrets and proprietary information.

It continues to use cyber espionage to support its strategic development goals—science and technology advancement, military modernization, and economic policy objectives, the report said.

The report running into more than 15 pages said that while next-generation technologies will introduce a range of qualitative advances in data storage, analytics, and computational capacity, they also present potential vulnerabilities for which the cybersecurity community remains largely unprepared.

The solidification of cloud computing over the past decade as a global information industry standard, coupled with the deployment of technologies such as artificial intelligence and internet if things, will introduce unforeseen vulnerabilities to US networks.

Today’s companies are often faced with the complex decision of whether to use public cloud resources or build and deploy their own IT infrastructures. This decision is especially difficult in an age of mounting data requirements when so many people expect limitless access and ultra-flexibility. For these reasons, cloud computing has become an increasingly popular choice for many organizations.

With 5G on the horizon, most companies now are preparing multicloud IT infrastructures.

Cloud computing does present many drawbacks that often come back to haunt users, such as skyrocketing fees, poor performance and security concerns. The decision between using a public cloud versus owning your own infrastructure is not so different than deciding between renting and a buying a home. It is a choice between controlling your own environment versus living within someone else’s domain.

Users’ security can be automatically affected by anything that happens to their cloud provider. Additionally, anyone using a public or shared cloud can experience a data breach and information loss through no real fault of their own.

Cloud networks and Internet of Things infrastructure are rapidly expanding the global online operational space, and threat actors from China have already demonstrated how the cloud can be used as a platform for cyber exploitation.

I admit that this is not reported in the mainstream narrative frame, but this is the way China can invade the United States without even firing a shot.

China will continue to be a threat to US proprietary technology and intellectual property through cyber-enabled means or other methods, the report warned that if this threat is not addressed, it could erode America’s long-term competitive economic advantage.

The Daily Caller reported that a Chinese-owned company operating in the Washington, D.C., area hacked Hillary Clinton’s private server throughout her term as secretary of state and obtained nearly all her emails.

The Chinese firm obtained Clinton’s emails in real time as she sent and received communications and documents through her personal server, according to sources at the Daily Caller, who said the hacking was conducted as part of an intelligence operation.

The Chinese wrote code that was embedded in the server, which was kept in Clinton’s residence in upstate New York. The code generated an instant “courtesy copy” for nearly all of her emails and forwarded them to the Chinese company.

The FBI released a statement saying they had “not found any evidence” of an intrusion of Clinton’s server by the Chinese.

However, the English speaking Chinese newspaper, Epoch Times, reported a week ago that the Chinese have had plenty of practice hacking into and meddling with elections of foreign countries, including the United States.

Taiwan has accused China of meddling in their elections.

China regards Taiwan, a full-fledged democracy with its own constitution and military, as a renegade province that must be united with the mainland, by military force if necessary.

In July, the website of Taiwan’s ruling party, the Democratic Progressive Party, was hacked. Taiwanese investigators believe the cyber-attack came from China, according to a report by the Financial Times.

President Donald Trump indicated in an August 18 Twitter post that there could be cybersecurity threats from China.

“All of the fools that are so focused on looking only at Russia should start also looking in another direction, China,” he wrote.

Echoing Trump’s remark, National Security Adviser John Bolton expressed concerns about foreign influences, including China, on the 2018 U.S. midterm elections in November, during an interview with ABC that aired on August 19.

It needs to be courageously declared that an unbiased revelation needs to prevail in the United States and the dialogue needs to shift to discussing where we stand in the development of cyber infrastructure.

The threat to our way of life goes beyond the political trappings of taking sides on the push button offenses that are manufactured by political pundits in the media.

We are all far to busy looking under rocks for Russians agents that we are unaware of the crisis happening with our intelligence and communication structures.

If China were to take our mainframe down or shut down our communication satellites, we would certainly have to surrender to their technological expertise. It is also important to say at this juncture that when satellites go down or are offline – things are moved into positions that they don’t want us to see—scrambling or shutting down a signal could indicate that a malicious actor could make a move.

It would be something that could be considered a cyber Pearl Harbor.

Put simply, the Intelligence Community within CIA and NSA would deaf, dumb, and partially blind.

This would be a perfect scenario to carry out a final blow event.

SHARE

RELATED CONTENT

11/13/18: EXCELSIOR! W/ BRYCE ZABEL 11/9/18: QUANTUMPLATION W/ PAUL LEVY 11/8/18: RESPONSE EVENTS – IDENTIFYING THE NEWSPEAK CONUNDRUM 11/7/18: APOCALYPSE BY NUMBERS – PREPARING FOR THE FOURTH TURNING 11/6/18: RED DEVIL BLUE DEVIL – THE DEVIL WINS 11/5/18: THE OVERLORD EFFECT
Comments