Yandex, a Russian tech company is on 250 US University Campuses

It is no wonder they are hacking America to death…

Do we really know what is inside these machines?

Forbes:

Yandex, a Russian tech company working on self-driving systems, is partnering with GrubHub to deploy a fleet of delivery robots on selected college campuses in the United States later this year.

Yandex NV Tests Autonomous Delivery Robots on Russian Streets

© 2020 Bloomberg Finance LP

Financial terms of the partnership were not disclosed.

Yandex often compares itself to Google. It offers arange of services, including a search engine, ride-hailing and food delivery. The company began operating food delivery robots, called Rovers, in 2019 in Moscow, Tel Aviv and Ann Arbor, Michigan.

“We chose to partner with GrubHub for campus delivery because of GrubHub’s unparalleled reach into college campuses across the United States, as well as the flexibility and strength of their ordering platform,” said Dmitry Polishchuk, CEO of Yandex Self-Driving Group. “We are delighted to deploy dozens of our rovers, taking the next step in actively commercializing our self-driving technology in different markets across the globe.’’

The partnership plans to launch the Rovers on 250 campuses.

“While college campuses are notoriously difficult for cars to navigate, specifically as it relates to food delivery, Yandex robots easily access parts of campuses that vehicles cannot,” Brian Madigan, GrubHub vice president of corporate and campus partners, said in a statement.

Yandex robot fleets have logged seven million autonomous miles since the team was founded in 2017, second only to Alphabet’s Waymo. That’s up from two million miles in February 2020.

MORE FOR YOU

Elon Musk Is On The Hook For Billions If He Loses Lawsuit Over Tesla’s SolarCity Deal

A Hydrogen-Powered Boat Is Sailing The World. If Not In Cars, Do Boats Make Sense?

Yandex employs about 400 engineers, plus operational and support staff.

Artem Fokin, Yandex’s head of business development, told Forbes.com that the company has spent only $100 million dollars on development in the four years since inception. That’s relatively frugal compared to Silicon Valley teams, which have raised billions toward the same goal.

The company’s Rovers deliver take-out meals, groceries, and retail consumer goods. Yandex has increased the dimensions and carrying capacity of the Rovers over time, to accommodate larger loads.

“We’ve worked to make the cost of Rover delivery extremely economical,” spokesman Yulia Shveyko, told Forbes.com contributor David Silver in May. “In Russia, human delivery is very price-competitive, and we have to be even more affordable than that.”

Unlike public roads, where vehicles travel in lanes and their travel patterns are predictable, Yandex vehicles must navigate sidewalks and other pedestrian paths where people’s movements are less orderly.

They can operate in broad daylight and in the dark of night, in moderate snowfall and rain, as well as in controlled and uncontrolled pedestrian crossing scenarios. But they can only travel at speeds up to 5 miles per hour.

Yandex owns 73% of its Self-Driving Group, while Uber owns 19% and a group of Yandex employees own the remaining 8%.

 

Biden Gives Putin a List of Entities to not Hack

Yup…16 of them. All the other parts of infrastructure is okay or not as important? Does the same list apply to hackers from China, Iran or North Korea? Do they get a copy too?

Primer:

Remember MH17? Just for what context on Russian operatives, it is not just the United States.

Russian hackers compromised the computer systems of the Dutch national police while the latter were conducting a criminal probe into the downing of Malaysia Airlines Flight 17 (MH17), according to a new report. MH17 was a scheduled passenger flight from Amsterdam to Kuala Lumpur, which was shot down over eastern Ukraine on July 17, 2014. All 283 passengers and 15 crew on board, 196 of them Dutch citizens, were killed.

Dutch newspaper De Volkskrant, which revealed this new information last week, said the compromise of the Dutch national police’s computer systems was not detected by Dutch police themselves, but by the Dutch General Intelligence and Security Service (AIVD). The paper said that neither the police nor the AIVD were willing to confirm the breach, but added that it had confirmed the breach took place through multiple anonymous sources.

On July 5, 2017, the Netherlands, Ukraine, Belgium, Australia and Malaysia announced the establishment of the Joint Investigation Team (JIT) into the downing of flight MH-17. The multinational group stipulated that possible suspects of the downing of flight MH17 would be tried in the Netherlands. In September 2017, the AIVD said it possessed information about Russian targets in the Netherlands, which included an IP address of a police academy system. That system turned out to have been compromised, which allowed the attackers to access police systems. According to four anonymous sources, evidence of the attack was detected in several different places.

The police academy is part of the Dutch national police, and non-academy police personnel can access the network using their log-in credentials. Some sources suggest that the Russian Foreign Intelligence Service (SVR) carried out the attack through a Russian hacker group known as APT29, or Cozy Bear. However, a growing number of sources claim the attack was perpetrated by the Main Directorate of the Russian Armed Forces’ General Staff, known commonly as GRU, through a hacker group known as APT28, or Fancy Bear. SVR attackers are often involved in prolonged espionage operations and are careful to stay below the radar, whereas the GRU is believed to be more heavy-handed and faster. The SVR is believed to be partly responsible for the compromise of United States government agencies and companies through the supply chain attack known as the SolarWinds cyber attack, which came to light in late 2020. source

Live blog: Biden, Putin finish Geneva summit, confirms ... source

(notice Victoria Nuland at the table?)

FNC:

President Biden told reporters Wednesday he gave President Vladimir Putin a list of 16 critical infrastructure entities that are “off limits” to a Russian cyberattack.

Those entities include energy, water, health care, emergency, chemical, nuclear, communications, government, defense, food, commercial facilities, IT, transportation, dams, manufacturing and financial services.

“We’ll find out whether we have a cybersecurity arrangement that begins to bring some order,” Biden said. Putin, for his part, denied any involvement in a recent spate of cyberattacks that have hit major industries across the U.S.

“I looked at him. I said, ‘How would you feel if ransomware took on the pipelines from your oil fields?’ He said, ‘It would matter.’ This is not about just our self-interest.” the president said.

Biden refused to say if military action was on the table if Russia was found to be responsible for a ransomware attack.

“In terms of the red line you laid down is military response an option for a ransomware attack?” a reporter asked.

“Thank you very much,” Biden said as he abruptly tried to end the shorter-than-expected conference. “No, we didn’t talk about military response,” he said when pressed again.

Biden in another moment had said he didn’t make any threats but rather “simple assertions.”

Biden stressed the need for both nation “to take action against criminals that conduct ransomware activities on their territory.”

Putin, in his own press conference after the meeting, claimed that American sources say that a “majority” of the cyberattacks in the world come from within the U.S.

The number of organizations affected by ransomware has jumped 102% compared to the beginning of 2020 and “shows no sign of slowing down,” according to a research note last month from IT security firm Check Point.

Both Colonial Pipeline and JBS Holdings, a meat-processing company, have been subject to major cyberattacks, where against the guidance of the FBI they paid millions of dollars in ransom to resume operation. The Colonial Pipeline attack was linked back to a Russian hacking group.

 

 

America First Must Build a New Shipping Canal for the Supply Chain

Since 2020 up to now, we in America have suffered through supply chain shortages adding in the matter of ransomware of the Colonial pipeline and now the largest meat processor.

A cyberattack on JBS, the largest meat producer in the world, forced the shutdown of American slaughterhouses, and the closures may be spreading. JBS’s five biggest beef plants in the U.S. halted processing following the weekend attack, equal to one-fifth of all of America’s meat production. Slaughter operations across Australia were also down and one of Canada’s largest beef plants was idled. The prospect of more extensive shutdowns is upending agricultural markets and raising concern about food security as hackers increasingly target critical infrastructure. Livestock futures slumped while pork prices rose. JBS told the White House that the cyberattack, like several previous ransomware assaults, probably originated in Russia.

There are shortages of chicken, chlorine, flour, lumber, computer chips, rare earth minerals like cobalt, rental cars, palm oil, truck drivers, diapers and appliances to list a few. Just imagine the impact of pharmaceuticals via China.

Consider the supply chain dangers if sea shipping was slowed or stopped. Consider the Panama Canal. Why worry?

China is the short answer. And China hates the United States.

In part:

Beijing is currently the second or third largest trading partner with the countries of Central America.  Chinese investment in Central America is present in infrastructure projects in Honduras, Nicaragua, Costa Rica, and Panama, and there are plans for further investment in El Salvador and Guatemala.  Excluding a contemplated US $50 billion dollars in a canal project in Nicaragua, Chinese investment in Central American infrastructure has totaled approximately US $2 billion thus far.

In a further demonstration of growing ties between the PRC and the countries of Central America, Costa Rica, Panama, and El Salvador have each broken relations with Taiwan to establish diplomatic ties with China.  Other countries in the region could soon follow suit.

Panamanian “Panda Bonds”

Sino-Central American investment is being actively pursued in Panama.  The country is one of the nations in Latin America that is part of an ambitious program that Beijing has undertaken in the region.

The PRC’s “Silk Road” initiative is a trading and infrastructure plan that aims to connect Asia, Europe, Africa, and Latin America in the same way that the trade route existed during ancient times.  In addition to this initiative, further Chinese investment in Central America will result from the Panamanian government’s issuance of US $500 million of “Panda Bonds” in 2018.  Panda Bonds are Chinese renminbi-denominated bonds from a non-Chinese issuer that are sold into the Chinese market.  Panama issued them in order to take advantage of China’s lower borrowing costs.

***

China’s advancement in Central America dates back to 2007, when Costa Rica became the first Central American country to establish diplomatic relations with Beijing. Since then, economic relations between both countries have developed, helping to promote China’s regional brand. Economically, China has presented itself as an attractive partner. In 2008, China purchased Costa Rican bonds in excess of $300m, offered the country aid worth $130m, and funded the $105m construction of the Estadio Nacional. Meanwhile, on March 2 Chinese state media claimed that China will finance the expansion of a highway connecting Costa Rica and the Caribbean.

Chinese activity in Costa Rica is not limited to finance. In terms of culture, students at the University of Costa Rica can study Chinese and enrol in Chinese cultural programmes. The Chinese government has also promoted the development of Chinatown in San José, Costa Rica’s capital.

What is the solution?

America First should consider mobilizing a real infrastructure operation that would build a new shipping canal that would be technologically more advances and handle larger ships. Where to put it? Nicaragua.

Really? Yes, beat China at their own game and do it fast. The Nicaragua Canal was proposed and backed by Chinese investors and was to be completed in 2020 at an estimated cost of $50 billion.

Nicaragua Canal Proposed Routes

Can you see the natural location for such a shipping canal?

This would also stabilized Latin American countries with economic space and stem the immigration chaos. This time, don’t give the canal away either. The cost? Perhaps a mere $15 billion and these days that is much less than the Biden administration budget has proposed to spend…that pesky $6 trillion.

Has China placed some military operatives in Latin America to protect Chinese investments otherwise known as debt trapping? Seems a legit question especially when the left-leaning think tank Foreign Policy Magazine explains the context just as recently in June of 2020.

Furthermore, Iranian warships are headed to Venezuela with 7 high speed missile boats on board. Additionally, China continues to make plays in the energy sector in Cuba. More debt trapping? Yes.

The America First Policy Institute needs to do some immediate forecasts for national security reasons. The AFPI, which holds a stellar staff list has one particular section called ‘Center for New Frontiers’.

America was not founded to restore an imagined past, but to move its people into a bright and brilliant future. In this first half of the twenty-first century, the United States stands on the precipice of an array of extraordinary possibilities. Dreams from our yesterdays — interplanetary travel, autonomous vehicles, subterranean transit systems, artificial intelligence, 3D printing, organ regeneration, extraordinary new power sources, and beyond — are poised to enter our tomorrows. The America First Policy Institute (AFPI) will research and develop policies that nurture America’s experimental spirit.

A new infrastructure plan such as a shipping canal is just the cure for future supply chain protections and stabilizing countries in our own hemisphere when other key industries and manufacturing must relocate to either or both Central America and back to the United States.

Fauci Lands Book Deal, What about Wuhan?

Dr. Anthony Fauci landed a book deal and will be the subject of a documentary featuring his work during the COVID-19 pandemic despite his constant flip-flopping on virus-related topics such as prolonged lockdowns, school reopenings, and the origins of the coronavirus.

“Expect the Unexpected: Ten Lessons on Truth, Service, and the Way Forward,” the National Institute of Allergy and Infectious Diseases (NIAID) director’s book, will be published by National Geographic Books and available to the public by as early as November 2.

“In his own words, world-renowned infectious disease specialist Anthony Fauci shares the lessons that have shaped his life philosophy, offering an intimate view of one of the world’s greatest medical minds as well as universal advice to live by,” the book description on Amazon reads. More book details here.

Dr. Fauci is the highest paid government employee and frankly should be prosecuted that is before he is fired.

*** Fauci said he tested negative for coronavirus Saturday ...

Related reading:

In a newly resurfaced paper from 2012, Dr. Anthony Fauci argued that the benefits of gain-of-function research are worth the increased risk of a potential pandemic-causing lab accident.

The Weekend Australian unearthed a paper Fauci wrote for the American Society for Microbiology in October 2012 in which he argued in support of gain-of-function research. Such research involves making viruses more infectious and/or deadly. Experts have raised the possibility that the COVID-19 pandemic could have originated from a potential lab leak at the Wuhan Institute of Virology in Wuhan, China, where gain-of-function experiments on bat coronaviruses have been conducted.

***

Here is a tip sheet for the gigantic number of questions that still need to be asked about the China virus.

Since we don’t trust U.S. media sources and rightly so, it is prudent to go elsewhere in the world and learn what other experts know. Additionally, it is important to add in other U.S. agencies that have a conduit to all things China virus.

Consider the following below:

  1. How about USAID?

    PREDICT is enabling global surveillance for pathogens that can spillover from animal hosts to people by building capacities to detect and discover viruses of pandemic potential. The project is part of USAID’s Emerging Pandemic Threats program and is led by the UC Davis One Health Intitute.

    PREDICT was initiated in 2009 to strengthen global capacity for detection and discovery of viruses with pandemic potential that can move between animals and people. Those include coronaviruses, the family to which SARS and MERS belong; paramyxoviruses, like Nipah virus; influenza viruses; and filoviruses, like the ebolavirus.

    Working with partners in over 30 countries, the project is investigating the behaviors, practices and ecological and biological factors driving disease emergence, transmission and spread using the One Health approach.

    Through these efforts, PREDICT has improved global disease recognition and has developed strategies and policy recommendations to minimize pandemic risk. Read more here.

  2. From a media source in India in part:This research paper has been published by a newspaper in Australia. It has been said that the discussion of using the coronavirus as a biological weapon started in China in 2015 itself. At that time, scientists of China’s People’s Liberation Army (PLA) and senior health officials in China had prepared a research paper, titled “The Unnatural Origin of SARS and New Species of Man-Made Viruses as Genetic Bio-weapons”.

    This means that in the year 2019, when the first case of coronavirus came to light in the city of Wuhan, China, a research paper was already prepared 4 years before that and it was prepared by the Chinese army scientists and senior health officers. More details here.

  3. How about a media source from Taiwan?TAIPEI (Taiwan News) — Amid concerns about the safety and efficacy of Sinopharm’s COVID-19 vaccine, the history of the company’s lab in Wuhan has raised suspicions among biowarfare experts, the U.S. government, and the Taiwanese military over whether it continues to serve as a dual-use biological warfare (BW) facility for the People’s Liberation Army (PLA).

    In 1993 and again in 1995, China declared the Wuhan Institute of Biological Products (WIBP), the hub of Sinopharm’s COVID-19 vaccine development, to be one of eight dual-use BW research facilities under its “national defensive biological warfare R&D program.” Although China has denied having an “offensive” biological warfare program since signing the Biological and Toxin Weapons Convention (BTWC), also known as the Biological Weapons Convention (BWC), in 1984, the U.S. State Department in 2005 alleged that “China maintains some elements of an offensive [biological weapon] capability in violation of its BTWC obligations” and repeated the same charges in 2010, 2012, and 2014. The .pdf summary is found here –> https://idsa.in/system/files/jds/jds_9_2_2015_DanyShoham.pdf

  4. How about British Intelligence?The former head of Britain’s Secret Intelligence Service (MI6), Sir Richard Dearlove, said that the question of a lab leak has become an “intelligence issue” in which British spies may need to “incentivise” defectors within the communist country to come forward and reveal the truth of the origin of the Wuhan virus.

    A senior Whitehall security source told the Daily Telegraph — a newspaper with close ties to the ruling Conservative government — that British intelligence investigators are working alongside their American counterparts to uncover the real origin of the pandemic.

    “We are contributing what intelligence we have on Wuhan, as well as offering to help the American to corroborate and analyse any intelligence they have that we can assist with,” said the source.

    “What is required to establish the truth behind the coronavirus outbreak is well-sourced intelligence rather than informed analysis, and that is difficult to come by.”

    Sir Richard Dearlove, who has been a vocal proponent of the idea that the virus emanated from the Wuhan laboratory, said that many scientists refrained from backing the idea out of fear of appearing to side with former President Donald Trump. source

  5. How about Ft. Detrick? That is the location for the National Biodefense Analysis and Countermeasures Center, which by the way is under the supervision of DHS…  NBACC’s 160,000 square-foot facility and 51,927 square feet of lab space includes two centers: the National Bioforensic Analysis Center (NBFAC), which conducts technical analyses in support of federal law enforcement investigations, and the National Biological Threat Characterization Center, which conducts experiments and studies to better understand biological vulnerabilities and hazards. NBACC is committed to maintaining a culture of safety. Its fully accredited, state-of-the-art lab facilities are at the biosafety levels (BSL) 2, 3, and 4, providing the highest standards of safety and experimental capability available. Its BSL-4 accreditation allows NBACC to perform R&D on pathogens for which no vaccine or treatment exists and makes it one of seven such facilities in the United States. NBACC is a partner in the National Interagency Confederation for Biological Research at Fort Detrick. This consortium includes the Centers for Disease Control and Prevention, Food and Drug Administration; National Cancer Institute; National Institute of Allergy and Infectious Diseases Integrated Research Facility; Naval Medical Research Center Biological Defense Research Directorate; U.S. Army Installation Management Command; U.S. Army Medical Research and Materiel Command; U.S. Army Medical Research Institute of Infectious Diseases; and U.S. Department of Agriculture Foreign Disease-Weed Science Research Unit. As an interagency partner, NBACC coordinates a range of scientific, technical, operational, and infrastructure-related activities that enhance scientific collaboration and productivity. The fact sheet is here.
  6. We have forgotten the Chinese scientists and other operatives working at U.S. universities or other American agencies. Harvard University Professor and Two Chinese Nationals Charged in Three Separate China Related Cases
  7. Anyone asking questions of the Rocky Mountain Laboratories in Montana? NIAID’s Rocky Mountain Laboratories (RML) in Hamilton, Montana, produced images of the novel coronavirus (SARS-CoV-2, previously known as 2019-nCoV) on its scanning and transmission electron microscopes on Tuesday, Feb. 11, 2020. SARS-CoV-2 causes COVID-19 disease, which has grown to be a global public health emergency since cases were first detected in Wuhan, China, in December 2019. RML investigator Emmie de Wit, Ph.D., provided the virus samples as part of her studies, microscopist Elizabeth Fischer produced the images, and the RML visual medical arts office digitally colorized the images.
  8. There is the University of Texas, the University of Alabama and last but not least the University of California at Irvine.

There are likely around thousands that know more but they remain silent. Why?

 

Details on the Pentagon Targeting Extremism

Image

Your task is to check out the resumes of each of these people. For further context keep reading.

*** The 17 page DARPA document is here.

Flags from the left-wing Antifa movement. Depictions of Pepe the Frog, the cartoon character that’s been misappropriated by racist groups. Iconography from the far-right Proud Boys, including the phrase “stand back and stand by” from former President Donald Trump.

They are all signs that extremists could be infiltrating the military, according to internal training materials that offer a more detailed view into the array of radical groups and ideologies the Pentagon is trying to keep out of the ranks.

“There are members of the [Department of Defense] who belong to extremist groups or actively participate in efforts to further extremist ideologies,” states a 17-page briefing obtained by POLITICO that was compiled by the DoD Insider Threat Management and Analysis Center, which is part of the Defense Counterintelligence and Security Agency.

“Be aware of symbols of far right, far left, Islamist or single issue ideologies,” it warns, stressing that members of the military and civilian personnel have “a duty and responsibility” to report extremist behavior or activity.

The materials were prepared as part of a broader Pentagon effort to crack down on extremists who may be lurking inside the military after dozens of ex-service members were arrested for their roles in the Jan. 6 attack on the U.S. Capitol to stop the certification of the presidential election.

The prevalence of extremists in the Defense Department appears to be small. For example, the 222,000-strong Marine Corps recently reported that it kicked out four members last year for extremist activity.

But the Pentagon says one is too many and the true numbers are not known because adherents who have been recruited by extremist groups or encouraged to enlist often organize and communicate in secret.

“No one truly knows,” Audrey Kurth Cronin, the director of American University’s Center for Security, Innovation and New Technology, told a House panel this week. “No serious plan can be built without defining the scope of the problem.”

The internal training materials focus on extremist behavior and symbolism — of all different stripes — and point out the risk of making false assumptions about people who do not pose any threat. This includes pointing out that religious conservatives are often mistakenly lumped together with white supremacists or other extremists.

The Department of Homeland Security has said white supremacist extremists are the most lethal terror threat facing the U.S. And while Republicans accused far-left groups such as Antifa of taking part in the insurrection, FBI Director Christopher Wray told lawmakers this month there’s “no evidence” those groups played a role.

Last month, Defense Secretary Lloyd Austin ordered a force-wide stand down requiring all units to discuss the threat of extremism within 60 days.

He called it the first step in “a concerted effort to better educate ourselves and our people about the scope of this problem and to develop sustainable ways to eliminate the corrosive effects that extremist ideology and conduct have on the workforce.”

The stand downs also include “listening sessions” to hear from Pentagon personnel about their experiences with activity, such as one held on Friday by a unit of the Army’s 101st Airborne Division.

The department published broad guidance for commanders to address address extremism, which focuses on reinforcing the military’s core principles enshrined in the oath they take to the Constitution and several case studies of military members who were prosecuted for engaging in extremist activity or plotting with radical groups.

But those materials did not identify specific threat groups, and Austin has provided wide leeway for individual units and commands to address the challenge as they see fit.

The internal briefing shared with POLITICO was compiled by the human resources office at the Defense Advanced Research Projects Agency, a small Pentagon agency of several hundred military personnel, civilian employees and contractors that manages research into breakthrough technologies.

Pentagon spokesman Jamal Brown noted that military units and individual components have been given broad authority to tailor their own approaches to addressing the extremist threat with their employees. He could not immediately say how many personnel have received this specific information and deferred questions about it to DARPA.

Jared Adams, a spokesperson for DARPA, explained in an email that “our training module was copied verbatim from the material provided by the DOD Insider Threat Management & Analysis Center of the Defense Counter Intelligence and Security Agency.

“We did not add any symbols and used all the imagery provided,” Adams said.

The briefing was sent to civilian employees as part of required training across the department for “Extremism and Insider Threat in the DoD.” Adams said it is required training to be completed by this month. Employees have to digest the material and then answer some questions.

The more detailed materials break down extremist movements into three main categories, including “Patriot” extremism, anarchist extremism, and ethnic/racial supremacy.

More here from Politico.