An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

The Facts of North Korea Nuclear and WMD Program

Professionals at Los Alamos and Oak Ridge Laboratories estimate it would take up to ten years to dismantle all programs and operations in North Korea. Further, Tehran, Moscow and Beijing will work hard to delay what they can due to eliminating evidence of their respective involvement for decades in North Korea.

NYT’s: The vast scope of North Korea’s atomic program means ending it would be the most challenging case of nuclear disarmament in history. Here’s what has to be done to achieve — and verify — the removal of the nuclear arms, the dismantlement of the atomic complex and the elimination of the North’s other weapons of mass destruction.

Nuclear Capabilities

  • Dismantle and remove
    nuclear weapons

    Take apart every nuclear weapon in the North’s arsenal and ship the parts out of the country.

  • Halt uranium enrichment

    Dismantle the plants where centrifuges make fuel for nuclear reactors and atom bombs.

  • Disable reactors

    Shutter the nuclear reactors that turn uranium into plutonium, a second bomb fuel.

  • Close nuclear test sites

    Confirm that the North’s recent, staged explosions actually destroyed the complex.

  • End H-bomb fuel production

    Close exotic fuel plants that can make atom bombs hundreds of times more destructive.

  • Inspect anywhere, forever

    Give international inspectors the freedom to roam and inspect anywhere.

Non-Nuclear Capabilities

  • Destroy germ weapons

    Eliminate anthrax and other deadly biological arms, under constant inspection.

  • Destroy chemical weapons

    Eliminate sarin, VX and other lethal agents the North has used on enemies.

  • Curb missile program

    Eliminate missile threats to the U.S., Japan and South Korea.

President Trump says he is meeting Kim Jong-un in Singapore because the North Korean leader has signaled a willingness to “denuclearize.’’

But that word means very different things in Pyongyang and Washington, and in recent weeks Mr. Trump has appeared to back away from his earlier insistence on a rapid dismantlement of all things nuclear — weapons and production facilities — before the North receives any sanctions relief.

Whether it happens quickly or slowly, the task of “complete, verifiable, irreversible denuclearization’’ — the phrase that Secretary of State Mike Pompeo keeps repeating — will be enormous. Since 1992, the country has repeatedly vowed never to test, manufacture, produce, store or deploy nuclear arms. It has broken all those promises and built a sprawling nuclear complex.

North Korea has 141 sites devoted to the production and use of weapons of mass destruction, according to a 2014 Rand Corporation report. Just one of them — Yongbyon, the nation’s main atomic complex — covers more than three square miles. Recently, the Institute for Science and International Security, a private group in Washington, inspected satellite images of Yongbyon and counted 663 buildings.

North Korea is the size of Pennsylvania. The disarmament challenge is made worse by uncertainty about how many nuclear weapons the North possesses — estimates range from 20 to 60 — and whether tunnels deep inside the North’s mountains hide plants and mobile missiles.

The process of unwinding more than 50 years of North Korean open and covert developments, therefore, would need to start with the North’s declaration of all its facilities and weapons, which intelligence agencies would then compare with their own lists and information.

***

Nuclear experts like David A. Kay, who led the largely futile American hunt for weapons of mass destruction in Iraq, argue that the North Korean arms complex is too large for outsiders to dismantle. The best approach, he contends, is for Western inspectors to monitor North Korean disarmament. The time estimates range from a few years to a decade and a half — long after Mr. Trump leaves office.

The magnitude of the North Korean challenge becomes clearer when compared with past efforts to disarm other nations. For instance, Libya’s nuclear program was so undeveloped that the centrifuges it turned over had never been unpacked from their original shipping crates. Infrastructure in Syria, Iraq, Iran and South Africa was much smaller. Even so, Israel saw the stakes as so high that it bombed an Iraqi reactor in 1981, and a Syrian reactor in 2007.

Undoing weapons of mass destruction

Full elimination Partial elimination
Steps North Korea Libya Syria Iraq Iran South Africa
Dismantle nuclear arms X X
Halt uranium enrichment X X X / X
Disable reactors X X X X
Close nuclear test sites X X
End H-bomb fuel production X
Destroy germ arms X X
Destroy chemical arms X X / X
Curb missile program X X

Here’s what is involved in each of the major disarmament steps:

Dismantle and remove
nuclear weapons

Under the eye of a declared nuclear state — like
the United States, China or Russia — take apart
every nuclear weapon in the North Korean arsenal
and safely ship the components out of the country.

missile_nkorea.jpg

North Korea released a photograph of the country’s leader, Kim Jong-un, center, inspecting what it said was a hydrogen bomb that could be fitted atop a long-range missile. Korean Central News Agency

John R. Bolton, Mr. Trump’s hawkish national security adviser, has argued that before any sanctions are lifted, the North should deliver all its nuclear arms to the United States, shipping them to the Oak Ridge National Laboratory in Tennessee, where inspectors sent Libya’s uranium gear.

It’s almost unimaginable that the North would simply ship out its weapons — or that the rest of the world would be convinced that it had turned over all of them.

Siegfried S. Hecker, a Stanford professor who formerly headed the Los Alamos weapons laboratory in New Mexico, argues that the only safe way to dismantle the North’s nuclear arsenal is to put the job, under inspection, in the hands of the same North Korean engineers who built the weapons. Otherwise, he said, outsiders unfamiliar with the intricacies might accidently detonate the nuclear arms.

Halt uranium enrichment

Dismantle the plants where centrifuges
spin at supersonic speeds to make fuel
for nuclear reactors and atom bombs.

Factories holding hundreds of centrifuges spin gaseous uranium until it is enriched in a rare form of the element that can fuel reactors — or, with more enrichment, nuclear arms.

It’s easy to shut down such plants and dismantle them. The problem is that they’re relatively simple to hide underground. North Korea has shown off one such plant, at Yongbyon, but intelligence agencies say there must be others. The 2014 Rand report put the number of enrichment plants at five.

Because uranium can be used to fuel reactors that make electricity, North Korea is almost certain to argue it needs to keep some enrichment plants open for peaceful purposes. That poses a dilemma for the Trump administration.

In the case of Iran, it has insisted that all such plants be shut down permanently. After arguing that the Obama administration made a “terrible deal” by allowing modest enrichment to continue in Iran, it is hard to imagine how Mr. Trump could insist on less than a total shutdown in North Korea.

Disable reactors

Shutter nuclear reactors that turn uranium
into plutonium, a second bomb fuel.

Inside a reactor, some of the uranium in the fuel rods is turned into plutonium, which makes a very attractive bomb fuel. Pound for pound, plutonium produces far more powerful nuclear blasts than does uranium. In 1986, at Yongbyon, North Korea began operating a five-megawatt reactor, which analysts say produced the plutonium fuel for the nation’s first atom bombs. Today, the North is commissioning a second reactor that is much larger.

Jan. 17, 2018 image from DigitalGlobe via Institute for Science and International Security

Reactors are hard to hide: They generate vast amounts of heat, making them extremely easy to identify by satellite.

But reactors that produce large amounts of electricity — such as the new one being readied in North Korea — pose a dilemma, because the North can legitimately argue it needs electric power. It seems likely that the Trump administration will come down hard on the North’s new reactor, but might ultimately permit its operation if the North agrees for the bomb-usable waste products to be shipped out of the country.

Close nuclear test sites

Confirm that the North’s recent, staged
explosions actually destroyed the deep
tunnels and infrastructure, or take additional
steps to make the complex unusable.

Atom and hydrogen bombs need repeated testing to check their performance. Since 2006, the North has detonated nuclear devices at least six times in tunnels dug deep inside Mount Mantap, a mile-high peak in the North’s mountainous wilds.

Last month, the North blew up test-tunnel portals at Mount Mantap as a conciliatory gesture before the planned denuclearization talks. Experts say the thick clouds of rising smoke and debris, while impressive for television cameras, leave open the question of whether the damage is irreversible. Presumably, the North could also dig new test sites beneath other mountains. The Trump administration has called for an end to all explosive testing.

End H-bomb fuel production

Close exotic fuel plants that can make atom
bombs hundreds of times more destructive.

At the heart of a missile warhead, an exploding atom bomb can act as a superhot match that ignites thermonuclear fuel, also known as hydrogen fuel. The resulting blast can be 1,000 times more powerful than the Hiroshima bomb. North Korea is suspected of having at least two sites for different aspects of H-bomb fuel production — one at Yongbyon, and one near Hamhung, on the country’s east coast.

The exotic fuels also have civilian uses for the manufacture of glow-in-the-dark lighting, exit signs and runway lights. The Trump administration stance is unclear. Atomic experts say the military threat can be reduced by shuttering large plants, building smaller factories and carefully regulating their products.

Inspect anywhere, forever

In a mountainous country, give
international inspectors the freedom
to roam and inspect anywhere — with
automated monitoring of key sites.

Under past nuclear agreements, inspectors from the International Atomic Energy Agency have lived in North Korea, but their movements were limited to small parts of the giant Yongbyon facility, where the nation’s nuclear reactors are located. For inspections to be effective, they must cover the whole country — including military facilities. (One of Mr. Trump’s complaints about the Iran agreement was that inspectors were inhibited from going anywhere.)

But inspecting all of North Korea — land of underground tunnels — would be an enormous job. American intelligence agencies have spent billions of dollars watching missiles move, mapping likely facilities, and using spy satellites and cyber reconnaissance to track the arms. But they have surely made mistakes, and missed some facilities. The problem gets larger if the inspectors are seeking out underground bunkers that hide missiles for quick strikes.

Destroy germ weapons

Eliminate anthrax and other deadly biological
weapons, under constant inspection.

Biological weapons can be more destructive than nuclear arms. A single gallon of concentrated anthrax is said to have enough spores to kill every person on Earth. The challenge is how to deliver the living weapons. The anthrax attacks of 2001 relied on letters, killing five people, sickening 17 others and frightening the nation.

North Korea is suspected of having a large complex for making germ weapons. The problem is learning its true dimensions, and verifying its dismantlement. While nuclear and missile tests advertise their developmental strides openly, the production and testing of deadly pathogens can be done behind closed doors.

Moreover, experts argue that the gear for producing germ weapons is often identical or similar to that of medicine and agriculture, making it extremely hard if not impossible for outsiders to verify that germ-weapon work has ended. The Trump administration’s stance is unknown other than it wants the North to end all work on biological weapons.

Destroy chemical weapons

Eliminate sarin, VX and other lethal
agents the North has used on enemies.

Last year, the deadly nerve agent VX was used to assassinate Kim Jong-nam, the estranged half brother of the North’s leader. The killing cast light on the North’s long pursuit of chemical weapons. Although the North denies having any, experts rank the nation as among the world’s top possessors, saying it harbors thousands of tons of the banned armaments.

The Trump administration’s negotiating list with the North includes chemical disarmament. Syria is a reminder of the difficulty. President Barack Obama cut a deal with Damascus to destroy its chemical arsenal. This year, the United States accused the Syrian government of using the banned weapons at least 50 times since the civil war began, topping previous official estimates. The attacks have maimed and killed hundreds of Syrians, including many children.

Curb missile program

Eliminate the long-range threat to the U.S. and
mid-range missile threat to Japan and South Korea.

In November, the North tested a greatly improved intercontinental ballistic missile that flew farther than any other — far enough to threaten all of the United States. It was a remarkable achievement that brought the current, long-escalating crisis to a head. While experts say the North still needs to do more testing to ensure that the missile’s warheads can survive fiery re-entry, the test flight showed that Mr. Kim had come remarkably close to perfecting a weapon that could threaten American cities.

Curbing the North’s missile program is high on the Trump administration’s negotiation list. A simple precaution is to limit the range of test flights — a fairly easily thing to monitor. A key question is whether arms negotiators will also try to redirect the North’s large corps of rocket designers and engineers into peaceful activities, such as making and lofting civilian satellites.

Is a Chinese Hack on our Naval Weapons an Act of War?

It is long been a question of the point that a foreign hack for espionage and theft is an act of war with emphasis on our naval weapons programs or those of the Army or Air Force.

Cyber warfare is an issue few care about or have control over because data resides outside of our individual control but that is NOT the case when it comes to government. They are accountable for safeguarding networks and data.

After a hiatus of several years, Chinese state hackers are once again penetrating networks at a range of U.S. corporations in a campaign to steal secrets and leapfrog ahead in a race for global technology supremacy, cyber researchers say.

Companies in fields such as biomedicine, robotics, cloud computing and artificial intelligence have all been hit by cyber intrusions originating in China, the researchers say.

“It’s definitely accelerating. The trend is up,” said Dmitri Alperovitch, cofounder and chief technology officer at CrowdStrike, a threat intelligence firm based in Sunnyvale, Calif.,

Chinese state hacking teams linked to the People’s Liberation Army and the Ministry of State Security are becoming visible on U.S. networks again, although they are using new methods to remain undetected, researchers said.

“In the last few months, we’ve definitely seen … a reemergence of groups that had appeared to have gone dormant for a while,” said Cristiana Brafman Kittner, principal analyst at FireEye, a cybersecurity firm that has tracked China hacking extensively.

The activity comes after a sharp drop in Chinese hacking that began in September 2015, when former President Barack Obama and Chinese leader Xi Jinping reached an agreement to end the hacking theft of commercial secrets. The agreement quelled U.S. anger over its charge that China is the “world’s most active and persistent perpetrator of economic espionage.”

U.S. prosecutors in 2014 indicted five PLA officers for economic espionage for hacking into firms like Westinghouse, U.S. Steel and Alcoa. The 56-page indictment said the five men worked for Unit 61398 of the PLA’s Third Department in Shanghai. The highly detailed complaint entered into details that U.S. officials later said were meant to “name and shame” China for commercial hacking.

Why China’s hackers may be getting back into the game is not readily clear. Renewed trade tensions may be a reason. President Donald Trump has threatened to impose $50 billion of tariffs on China-made products to cut the U.S. trade deficit of $375 billion with China.

Another factor may be the conclusion of a massive reorganization of China’s military, which began in late 2015 and under which various signals intelligence and cyber hacking units “were dissolved and absorbed into this one mega organization, called the Strategic Support Force,” said Priscilla Moriuchi, an expert on East Asia at Recorded Future, a cyber-threat intelligence firm based in Somerville, Mass.

China’s Xi has laid out ambitious goal of catching up with the United States and Europe in 10 key sectors, including aerospace, semiconductors and robotics, under its “Made in China 2025” program.

Moriuchi, who spent 12 years in the U.S. intelligence community, eventually leading the National Security Agency’s East Asia and Pacific cyber threats office, said China’s hackers are broadening tactics, burrowing into telecommunications networks even as they steal secrets to help party leaders achieve “Made in China 2025” goals.

“The sectors that they are going after are things like cloud computing, (Internet of Things), artificial intelligence, biomedicines, civilian space, alternative energy, robotics, rail, agricultural machinery, high-end medical devices,” Moriuchi said.

“There are companies in all of these sectors that have experienced intrusions over the past year from actors who are believed to be China state-sponsored,” she said.

Since early in the past decade, U.S. officials have alleged that Chinese state hackers were tasked with obtaining commercial secrets from Western corporations to help Chinese firms, many of them state-owned, overtake competitors to the global forefront in technology.

In a renewed warning alert for China, a March 22 report from the Office of the U.S. Trade Representative on China’s trade actions said, “Beijing’s cyber espionage against U.S. companies persists and continues to evolve.

So as you read about the stolen data from the Navy by China consider this: Should the NSA get inside the Chinese networks now and infect and or re-steal our intelligence?

Unmanned underwater vehicles take advantage of advanced ... photo

(Note: according to the Washington Post item below, the contractor is not named, however ‘Inside Defense’ in September of 2016 published an item that GD Electric Boat was awarded the $105.5 million contract modification moving it into the second phase.)

electric boat « Breaking Defense - Defense industry news ... photo

WaPo: Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials.

The breaches occurred in January and February, the officials said, speaking on the condition of anonymity to discuss an ongoing investigation. The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.

The officials did not identify the contractor.

Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library.

The Washington Post agreed to withhold certain details about the compromised missile project at the request of the Navy, which argued that their release could harm national security.

The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network. The officials said the material, when aggregated, could be considered classified, a fact that raises concerns about the Navy’s ability to oversee contractors tasked with developing cutting-edge weapons.

The breach is part of China’s long-running effort to blunt the U.S. advantage in military technology and become the preeminent power in east Asia. The news comes as the Trump administration is seeking to secure Beijing’s support in persuading North Korea to give up nuclear weapons, even as tensions persist between the United States and China over trade and defense matters.

The Navy is leading the investigation into the breach with the assistance of the FBI, officials said. The FBI declined to comment.

On Friday, the Pentagon inspector general’s office said that Defense Secretary Jim Mattis had asked it to review contractor cybersecurity issues arising from The Post’s story.
Navy spokesman Cmdr. Bill Speaks said, “There are measures in place that require companies to notify the government when a ‘cyber incident’ has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.”

Speaks said “it would be inappropriate to discuss further details at this time.”

Altogether, details on hundreds of mechanical and software systems were compromised — a significant breach in a critical area of warfare that China has identified as a priority, both for building its own capabilities and challenging those of the United States.

“It’s very disturbing,” said former Sen. Jim Talent (R-Mo.,) who is a member of the U.S. China Economic and Security Review Commission. “But it’s a of a piece with what the Chinese have been doing. They are completely focused on getting advanced weapons technology through all kinds of means. That includes stealing secrets from our defense contractors.” Talent had no independent knowledge of the breach.
Undersea priority

The Sea Dragon project is an initiative of a special Pentagon office stood up in 2012 to adapt existing U.S. military technologies to new applications. The Defense Department, citing classification levels, has released little information about Sea Dragon other than to say that it will introduce a “disruptive offensive capability” by “integrating an existing weapon system with an existing Navy platform.” The Pentagon has requested or used more than $300 million for the project since late 2015 and has said it plans to start underwater testing by September.

Military experts fear that China has developed capabilities that could complicate the Navy’s ability to defend U.S. allies in Asia in the event of a conflict with China.

The Chinese are investing in a range of platforms, including quieter submarines armed with increasingly sophisticated weapons and new sensors, Adm. Philip S. Davidson said during his April nomination hearing to lead U.S. Indo-Pacific Command. And what they cannot develop on their own, they steal — often through cyberspace, he said.

“One of the main concerns that we have,” he told the Senate Armed Services Committee, “is cyber and penetration of the dot-com networks, exploiting technology from our defense contractors, in some instances.”

In February, Director of National Intelligence Daniel Coats testified that most of the detected Chinese cyber-operations against U.S. industry focus on defense contractors or tech firms supporting government networks.

In recent years, the United States has been scrambling to develop new weapons or systems that can counter a Chinese naval buildup that has targeted perceived weaknesses in the U.S. fleet. Key to the American advantage in any faceoff with China on the high seas in Asia will be its submarine fleet.

“U.S. naval forces are going to have a really hard time operating in that area, except for submarines, because the Chinese don’t have a lot of anti-submarine warfare capability,” said Bryan Clark, a naval analyst at the Center for Strategic and Budgetary Assessments. “The idea is that we are going to rely heavily on submarines in the early effort of any conflict with the Chinese.”

China has made closing the gap in undersea warfare one of its three top military priorities, and although the United States still leads the field, China is making a concerted effort to diminish U.S. superiority.

“So anything that degrades our comparative advantage in undersea warfare is of extreme significance if we ever had to execute our war plans for dealing with China,” said James Stavridis, dean of the Fletcher School of Law and Diplomacy at Tufts University and a retired admiral who served as supreme allied commander at NATO.

The U.S. military let its anti-ship weaponry languish after the Cold War ended because with the Soviet Union’s collapse, the Navy no longer faced a peer competitor on the seas. But the rapid modernization and buildup of the Chinese navy in recent years, as well as Russia’s resurgent forces at sea, have prompted the Pentagon to renew heavy investment in technologies to sink enemy warships.

The introduction of a supersonic anti-ship missile on U.S. Navy submarines would make it more difficult for Chinese warships to maneuver. It would also augment a suite of other anti-ship weapons that the U.S. military has been developing in recent years.
Ongoing breaches

For years, Chinese government hackers have siphoned information on the U.S. military, underscoring the challenge the Pentagon faces in safeguarding details of its technological advances. Over the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter; the advanced Patriot PAC-3 missile system; the Army system for shooting down ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s new Littoral Combat Ship, a small surface vessel designed for near-shore operations, according to previous reports prepared for the Pentagon.

In some cases, suspected Chinese breaches appear to have resulted in copycat technologies, such as the drones China has produced that mimic U.S. unmanned aircraft.

[Chinese cyberspies stole a long list of U.S. weapons designs]

Speaks, the Navy spokesman, said: “We treat the broader issue of cyber intrusion against our contractors very seriously. If such an intrusion were to occur, the appropriate parties would be looking at the specific incident, taking measures to protect current information, and mitigating the impacts that might result from any information that might have been compromised.”

The Pentagon’s Damage Assessment Management Office has conducted an assessment of the damage, according to the U.S. officials. The Office of the Secretary of Defense declined to comment.

Theft of an electronic warfare library, Stavridis said, could give the Chinese “a reasonable idea of what level of knowledge we have about their specific [radar] platforms, electronically and potentially acoustically, and that deeply reduces our level of comfort if we were in a close undersea combat situation with China.”

Signals and sensor data is also valuable in that it presents China with the opportunity to “know when we would know at what distance we would be able to detect their submarines” — again a key factor in undersea battles.

Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department.

Although the Chinese People’s Liberation Army is far better-known than the MSS when it comes to hacking, the latter’s personnel are more skilled and much better at hiding their tracks, said Peter Mattis, a former analyst in the CIA counterintelligence center. The MSS, he said, hack for all forms of intelligence: foreign, military and commercial.

In September 2015, in a bid to avert economic sanctions, Chinese President Xi Jinping pledged to President Barack Obama that China would refrain from conducting commercial cyberespionage against the United States. Following the pact, China appeared to have curtailed much, although not all, of its hacking activity against U.S. firms, including by the People’s Liberation Army.

Both China and the United States consider spying on military technology to fall outside the pact. “The distinction we’ve always made is there’s a difference between conducting espionage in order to protect national security and conduct military operations, and the theft of intellectual property for the benefit of companies inside your country,” said Michael Daniel, the White House cybersecurity coordinator under Obama.

 

AI: Machine Detection of Missile/Nuclear Launches, no Google

Primer: The U.S. holds an enviable lead in pushing artificial-intelligence technology out of labs and into real-world applications. Thank companies like Alphabet (GOOGL), Facebook (FB) and Apple (AAPL) for that.

But China’s government and technology elites aim to overtake the U.S. in AI by 2030 — or so they proclaimed in July at a Beijing political gathering.

Good luck with that.

Yes, China has many strengths as it sets out for worldwide dominance in AI technology. Its internet giants Baidu (BIDU), Alibaba Group Holdings (BABA) and Tencent Holdings (TCEHY) are also pouring money into AI research and hiring top scientists.

China’s huge population will generate massive raw data to train AI systems in how to make predictions.  So there’s good reason to think China will make breakthroughs in developing computer algorithms — the software programs that aim to replicate the human ability to learn, reason and make decisions.

China also has a major weakness: a semiconductor industry that still lags the U.S. in making high-end electronic processors. Chinese companies buy AI chips mainly from Nvidia (NVDA), based in Santa Clara, Calif. Intel (INTC), the dominant supplier of brainy chips for personal computers, is pushing fast into AI. More here.

Google Employees Quit Over Controversial Pentagon Contract Some employees even quit.

Due to Google employees signing a petition for the Pentagon’s Project Maven, the AI project which is a drone contract. Project Maven is known as Algorithmic Warfare Cross-Functional Team. Google at the time of the contract beat out other bidders including Microsoft, Amazon and IBM. More here on Google.

Google will abandon Project Maven, your project of ... photo

WASHINGTON (Reuters) – The U.S. military is increasing spending on a secret research effort to use artificial intelligence to help anticipate the launch of a nuclear-capable missile, as well as track and target mobile launchers in North Korea and elsewhere.

The effort has gone largely unreported, and the few publicly available details about it are buried under a layer of near impenetrable jargon in the latest Pentagon budget. But U.S. officials familiar with the research told Reuters there are multiple classified programs now under way to explore how to develop AI-driven systems to better protect the United States against a potential nuclear missile strike.

If the research is successful, such computer systems would be able to think for themselves, scouring huge amounts of data, including satellite imagery, with a speed and accuracy beyond the capability of humans, to look for signs of preparations for a missile launch, according to more than half a dozen sources. The sources included U.S. officials, who spoke on condition of anonymity because the research is classified.

Forewarned, the U.S. government would be able to pursue diplomatic options or, in the case of an imminent attack, the military would have more time to try to destroy the missiles before they were launched, or try to intercept them.

“We should be doing everything in our power to find that missile before they launch it and make it increasingly harder to get it off (the ground),” one of the officials said.

The Trump administration has proposed more than tripling funding in next year’s budget to $83 million for just one of the AI-driven missile programs, according to several U.S. officials and budget documents. The boost in funding has not been previously reported.

While the amount is still relatively small, it is one indicator of the growing importance of the research on AI-powered anti-missile systems at a time when the United States faces a more militarily assertive Russia and a significant nuclear weapons threat from long-time foe North Korea.

** https://bloximages.newyork1.vip.townnews.com/stltoday.com/content/tncms/assets/v3/editorial/c/d9/cd996bb2-06f0-51ae-ab8b-10a327dcbc19/5b166e9ca3e4c.image.jpg?resize=1200%2C902

“What AI and machine learning allows you to do is find the needle in the haystack,” said Bob Work, a champion of AI technology who was deputy defense secretary until last July, without referring to any individual projects.

One person familiar with the programs said it includes a pilot project focused on North Korea. Washington is increasingly concerned about Pyongyang’s development of mobile missiles that can be hidden in tunnels, forests and caves. The existence of a North Korea-focused project has not been previously reported.

While that project has been kept secret, the military has been clear about its interest in AI. The Pentagon, for example, has disclosed it is using AI to identify objects from video gathered in its drone program, as part of a publicly touted effort launched last year called “Project Maven.”

Still, some U.S. officials say AI spending overall on military programs remains woefully inadequate.

AI ARMS RACE

The Pentagon is in a race against China and Russia to infuse more AI into its war machine, to create more sophisticated autonomous systems that are able to learn by themselves to carry out specific tasks. The Pentagon research on using AI to identify potential missile threats and track mobile launchers is in its infancy and is just one part of that overall effort.

There are scant details on the AI missile research, but one U.S. official told Reuters that an early prototype of a system to track mobile missile launchers was already being tested within the U.S. military.

This project involves military and private researchers in the Washington D.C. area. It is pivoting off technological advances developed by commercial firms financed by In-Q-Tel, the intelligence community’s venture capital fund, officials said.

In order to carry out the research, the project is tapping into the intelligence community’s commercial cloud service, searching for patterns and anomalies in data, including from sophisticated radar that can see through storms and penetrate foliage.

Budget documents reviewed by Reuters noted plans to expand the focus of the mobile missile launcher program to “the remainder of the (Pentagon) 4+1 problem sets.” The Pentagon typically uses the 4+1 terminology to refer to China, Russia, Iran, North Korea and terrorist groups.

TURNING TURTLES INTO RIFLES

Both supporters and critics of using AI to hunt missiles agree that it carries major risks. It could accelerate decision-making in a nuclear crisis. It could increase the chances of computer-generated errors. It might also provoke an AI arms race with Russia and China that could upset the global nuclear balance.

U.S. Air Force General John Hyten, the top commander of U.S. nuclear forces, said once AI-driven systems become fully operational, the Pentagon will need to think about creating safeguards to ensure humans – not machines – control the pace of nuclear decision-making, the “escalation ladder” in Pentagon speak.

“(Artificial intelligence) could force you onto that ladder if you don’t put the safeguards in,” Hyten, head of the U.S. Strategic Command, said in an interview. “Once you’re on it, then everything starts moving.”

Experts at the Rand Corporation, a public policy research body, and elsewhere say there is a high probability that countries like China and Russia could try to trick an AI missile-hunting system, learning to hide their missiles from identification.

There is some evidence to suggest they could be successful.

An experiment by M.I.T. students showed how easy it was to dupe an advanced Google image classifier, in which a computer identifies objects. In that case, students fooled the system into concluding a plastic turtle was actually a rifle. here

Dr. Steven Walker, director of the Defense Advanced Research Projects Agency (DARPA), a pioneer in AI that initially funded what became the Internet, said the Pentagon still needs humans to review AI systems’ conclusions.

“Because these systems can be fooled,” Walker said in an interview.

DARPA is working on a project to make AI-driven systems capable of better explaining themselves to human analysts, something the agency believes will be critical for high stakes national security programs.

‘WE CAN’T BE WRONG’

Among those working to improve the effectiveness of AI is William “Buzz” Roberts, director for automation, AI and augmentation at the National Geospatial Agency. Roberts works on the front lines of the U.S. government’s efforts to develop AI to help analyze satellite imagery, a crucial source of data for missile hunters.

Last year, NGA said it used AI to scan and analyze 12 million images. So far, Roberts said, NGA researchers have made progress in getting AI to help identify the presence or absence of a target of interest, although he declined to discuss individual programs.

In trying to assess potential national security threats, the NGA researchers work under a different kind of pressure from their counterparts in the private sector.

“We can’t be wrong … A lot of the commercial advancements in AI, machine learning, computer vision – If they’re half right, they’re good,” said Roberts.

Although some officials believe elements of the AI missile program could become viable in the early 2020s, others in the U.S. government and the U.S. Congress fear research efforts are too limited.

“The Russians and the Chinese are definitely pursuing these sorts of things,” Representative Mac Thornberry, the House Armed Services Committee’s chairman, told Reuters. “Probably with greater effort in some ways than we have.”

 

Fed Gov Spent $76 Billion in 2017 for Cyber Security, Fail v Success

Go here for the Forum Part One

Go here for the Forum Part Two

Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.

David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.

NSA Built Own 'Google-Like' Search Engine To Share ... photo

When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.

With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.

Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.

** NSA 'building quantum computer to crack security codes ...  photo

Beyond NSA, DHS as with other agencies have cyber divisions. The DHS cyber strategy is found here. The fact sheet has 5 pillars:

DHS CYBERSECURITY GOALS
Goal 1: Assess Evolving
Cybersecurity Risks.
We will understand the evolving
national cybersecurity risk posture
to inform and prioritize risk management activities.
Goal 2: Protect Federal Government
Information Systems.
We will reduce vulnerabilities of federal agencies to ensure they achieve
an adequate level of cybersecurity.
Goal 3: Protect Critical
Infrastructure.
We will partner with key stakeholders
to ensure that national cybersecurity
risks are adequately managed.
Goal 4: Prevent and Disrupt Criminal
Use of Cyberspace.
We will reduce cyber threats by
countering transnational criminal
organizations and sophisticated cyber
criminals.
Goal 5: Respond Effectively to Cyber
Incidents.
We will minimize consequences from
potentially significant cyber incidents
through coordinated community-wide
response efforts.
Goal 6: Strengthen the Security and
Reliability of the Cyber Ecosystem.
We will support policies and activities
that enable improved global cybersecurity risk management.
Goal 7: Improve Management of
DHS Cybersecurity Activities.
We will execute our departmental
cybersecurity efforts in an integrated
and prioritized way.

Related reading:National Protection and Programs Directorate

NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive.  NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.

Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.

The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.

The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.

Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.

By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.

Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.

“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”

Crimes or War, the Body Collectors in Mosul

Imagine the other cities in Iraq and Syria. Mosul was part of Assyria as early as the 25th century BC. Of note, in 2008, there was a sizeable exodus of Assyrian Christians. They sought sanctuary in Syria and Turkey due to threats of murder unless they converted to Islam.

Related reading: Aleppo: Tell Our Story After we are Gone

Turkish Airlines New Flight Route to Mosul photo

Iraq Mosul picture, Iraq Mosul photo, Iraq Mosul wallpaper photo

Inside the killing rooms of Mosul

Warning: Graphic images

MOSUL, Iraq — In March, VICE News returned to Mosul for the first time since the war against ISIS was declared over eight months ago.

While life may be returning to normal in the eastern half of the city, on the other side of the river — where the fighting was most intense — the scale of rebuilding that needs to be done is monumental. It’s estimated there are still 8 million tons of conflict debris that need to be moved before reconstruction can start, equivalent to three times the size of the Great Pyramid of Egypt. About 75 percent of that rubble is in West Mosul, and it’s mixed with so much unexploded ordnance that experts say this is now one of the most contaminated spots on the planet.

In the Old City, where ISIS made its last stand, residents have slowly started to come back – a few business owners hoping to repair shops, and families who have no other option but to live in their damaged homes. Some water tanks have been trucked in, and electricity cables have been temporarily patched together along some streets, but the place feels deserted, and in some ways the scene was not that different from how it looked shortly after the fighting.

Eight months on, there are hundreds or perhaps thousands of bodies still under the rubble, making life unbearable for the families who have returned.

The putrefied corpses are mainly Islamic State fighters or their families, since many of the non-ISIS civilian bodies have been dug out and reclaimed by family members or civil defense workers. The bodies that remain are a severe health hazard, but there’s little political will to deal with them, and removing them is risky given the unexploded munitions littering the area. Nevertheless, teams of citizen volunteers are going house-to-house carrying out this gruesome, dangerous work on a daily basis.

**

One volunteer team is led by Sroor al-Hosayni, a 23-year-old former nurse. Many of her group are even younger; some are medical students, but most have no formal training in handling corpses. So far, they say they’ve pulled and bagged more than 350 bodies that no one else was willing to deal with. They laid them in white plastic body bags where municipal trucks can easily collect them, labeling them for any potential explosives found with the corpse.

“We saw that there were bodies everywhere, in the alleys and inside the houses,” Hosayni said. “I took my team and started implementing this idea by going to help municipality and government workers in removing these bodies before summer comes and disease spreads in the city.”

At first the authorities complained, telling her: “‘You don’t have to move ISIS bodies. Leave them there; the dogs will eat them.”

Hosayni replied, “But one or two dogs can’t eat them; there are thousands of bodies.”

A suspected execution room inside the basement of a collapsed building Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team say there are more than 100 rotting corpses here. So far they have pulled more than 30 bodies from this room n the last few weeks. (Adam Desiderio/VICE News)

After filming Hosayni’s team at work near the destroyed Al Nuri mosque, we followed them to Al Maydan — the Old City neighborhood where ISIS made its last stand — where they had been working on one particular site for weeks.

Bulldozers have started clearing a path where Souk Al-Samak Street once ran along the river, but almost nothing else has changed since the air bombardment flattened this district.

The ruins of arched and intricately carved stone doorways open onto inner courtyards like dioramas of the war, frozen in time: Human corpses in varying degrees of decay lying amid stray ordnance, broken china, plastic toy trucks, and discarded military apparel.

Two hundred yards up the street and on the right, the team pointed us to a building on the banks of the Tigris River. Scrambling through the collapsed masonry, we emerged into two mostly intact basement rooms with barred windows looking out onto the river. In the far room, buzzing with flies and inescapable stench, were dozens and dozens of corpses, stacked too deep to count, one on top of another. It seemed to be the remains of a mass execution.

The body collectors told us there were at least 100 bodies in here; the team had already cleared more than 30 but had barely made a dent in the mound of corpses.

23 year-old Sroor al-Hosayni, a former nurse, leads a team of volunteer body collectors pulling corpses out of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team of volunteers have been pulling bodies from what they say is an execution room in the basement of this building. (Adam Desiderio/VICE News)

We saw what appeared to be the bodies of children, though it was difficult to verify given the level of decay. We saw no weapons or military gear on the bodies. The team told us they could see bullet wounds to their heads.

There are reports that ISIS locked large numbers of people in rooms like this, using them as human shields during the final days of the conflict. Many of those families died in coalition airstrikes — but this room was intact. It’s possible they could have been executed by ISIS fighters as government forces closed in. But it’s not clear why ISIS would kill or dispose of civilians in this way.

There are also reports of Iraqi forces executing captured ISIS members in this exact neighborhood. Beards and long hair were still visible on some of the corpses, leading the body collectors to believe some could be men who may have been affiliated with ISIS. But speaking to VICE, a senior Iraqi military official rejected any notion that Iraqi forces may have been responsible for the killings and told us that the site had already been investigated, without providing further details.

One international organization that has documented instances where Iraqi security forces have been accused of carrying out executions is Human Rights Watch.

Belkis Wille, the lead Iraq investigator at Human Rights Watch, visited the site soon after we did. She told us she was unaware of any investigation having been done at this particular site, and that — whoever was responsible for the deaths — the removal of evidence was troubling given that this was potentially the site of a war crime.

**

“Sites like that need the proper forensic teams securing the site and conducting the analysis needed to determine whether this is indeed the site of a crime,” Wille told VICE News. “Despite promises by the prime minister at the end of the battle to investigate abuses, we haven’t seen any sign of that leading to teams coming in and doing the investigations necessary. And the question really is, at what point do these sites potentially lose their forensic value and lose the evidence?”

Inside the remains of Great Mosque of al-Nuri in Mosul, Iraq where ISIS leader Abu Bakr al-Baghdadi declared an Islamic State caliphate in 2014. (Adam Desiderio/VICE News)

But for the body collectors — and for many residents of Mosul — with the heat of summer approaching, the overwhelming priority right now is to clean up this city and begin rebuilding. The need to properly document and investigate potential war crimes isn’t at the top of the agenda.

“It’s time to focus on the living, not the dead,” was the mantra we heard from authorities and from many families trying to rebuild their shattered lives.

Nevertheless, the question of what happened in neighborhoods like Al Maydan and others in those final stages before victory was announced, and in the days shortly afterward, refuses to disappear.

In the ultimate stages of the battle to extinguish the last pockets of ISIS from Mosul last summer, access to the “fight zone” became increasingly restricted.

Baghdad declared the conflict officially over on July 10. The announcement, broadcast live on state television, came as a surprise to many, since there were explosions and gunfire still echoing out from the Old City where the last dregs of the Islamic State terrorist group were refusing to surrender.

Just a day before that, VICE News was one of the few outlets that managed to get past the cordon to join a general from Iraq’s elite counterterrorism brigade and an advance team of his men as they carefully picked their way across the booby-trapped rooftops of collapsed buildings in the district of Al Maydan to plant an Iraqi flag on the banks of the Tigris.

It was a journey through hell. The neighborhood had been pulverized by airstrikes and shelling throughout the campaign, but the intensity had grown as ISIS fell back to these ancient, narrow streets lined with buildings dating back to the 12th century. There was hardly a structure still intact, ordnance and bodies lined the route, some fresh, some bloated and badly decomposed from days or weeks in the sun.

Reaching the river was a symbol of having decisively broken through ISIS defensive lines, a long-awaited moment of triumph for the soldiers. But as the flag was raised and the soldiers took selfies, gunfire from a sniper still alive among the rubble sent the party scattering for cover. In those final days, as different units of Iraq’s security forces held impromptu victory celebrations after liberating neighborhoods, the question lingered of what the end of hostilities actually looks like when the enemy is hell-bent on fighting to the death.

We will likely never know who killed the people in the basement room of the house on Al-Samak Street — but as long as claims persist that extrajudicial killings by Iraqi security forces may have taken place, the stakes of not investigating those could be high. While there is little sympathy for ISIS right now in the devastated neighborhoods of Mosul, a culture of impunity for any abuses that were committed could set the stage for the same kinds of grievances that contributed to the group’s rise in the first place.

Cover image: The basement of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Volunteers have been pulling bodies from what they say is an execution room filled with more than 100 corpses in the basement of this building. (Adam Desiderio/VICE News)