Why a New Vaccine for the Delta COVID Variant May Be Needed - Newsweek

Why a New Vaccine for the Delta COVID Variant May Be Needed - Newsweek | Post Link

  1. Why a New Vaccine for the Delta COVID Variant May Be Needed  Newsweek
  2. Protect Against the COVID-19 Delta Variant  Southeast AgNet
  3. Delta variant and hospitalization rates: Study investigates  Medical News Today
  4. Mu COVID variant spread recorded in US, delta remains dominant  The Denver Channel
  5. Delta variant or original COVID-19? Expert says treat them the same  The Star Press
  6. View Full Coverage on Google News
Hospitalizations of Children with Delta Variant Soar in US  Greek Reporter
As they entered Afghanistan following 9/11, CIA officers on team JAWBREAKER brought many different skills with them, including fluency in Russian, Dari,...
After buying 400 bitcoin yesterday, President Nayib Bukele announces they bought the recent price dip and now own 550 BTC.
Remembering 9/11: A Legacy of Homeland Security  Newswise

Stavros Atlamazoglou

Espionage,

To effectively challenge and surpass the U.S., China needs a robust economy, leadership in technology, and global legitimacy for its political system and policies. Key to achieving these goals is the Chinese intelligence apparatus.

Here's What You Need to Remember: Chinese espionage costs the U.S. between $200 to $600 billion a year in stolen intellectual property. And this is something that has been happening for the past two decades, which would mean a loss of $4 trillion, on the low end, to $12 trillion, on the high end; an astounding loss either way.

The US faces myriad conventional and unconventional threats: Russia, North Korea, Iran, terrorist organizations, climate change, and pandemics are just some of them. Yet, China unquestionably rises to the top as the primary danger to U.S. national security.

Earlier in 2021, Director of National Intelligence Avril Haines stated in Congress that Beijing has become an unparalleled priority for the U.S. Intelligence Community. Indeed, China has become a near-peer competitor that is increasingly challenging the U.S. in multiple domains, all the while trying to revise international norms and adjust them to the Chinese Communist Party’s authoritarian capitalistic system.

According to FBI Director Christopher Wray, the Bureau opens a new counterintelligence investigation related to China every 10 hours, with more than 2,000 current active cases. The majority of these cases relate to economic espionage, which has seen a 1,300% increase in the last few years.

To effectively challenge and surpass the U.S., China needs a robust economy, leadership in technology, and global legitimacy for its political system and policies. Key to achieving these goals is the Chinese intelligence apparatus.

Chinese Espionage: The Dragon’s Eyes and Ears

The Ministry of State Security (MSS) is responsible for the majority of Chinese intelligence operations, with the Chinese military standing in at times, especially in cyber espionage operations.

Chinese intelligence operations are diverse and multi-layered, encompassing all available tools and sectors. State-owned companies, private firms (legitimate and non-), think tanks, non-governmental organizations, researchers, and students, in addition to the increasingly more prevalent cyber operations, are all used in this multi-prong intelligence collection approach. Beijing certainly has the capabilities and the numbers to pursue such a strategy. The Chinese military alone fields approximately 40,000 cyber troops, compared to the just 6,000 that the U.S. Cyber Command can deploy.

China seeks to become the world’s next superpower, dethroning the U.S. and tearing apart the rules-based international system that American and its allies have built since the end of World War Two. To achieve this goal, Beijing primarily goes after economic, industrial, and technological targets that will offer a competitive advantage to the Chinese economic and technological sector. Whether it’s stolen blueprints of American (and foreign, including Russian) aircraft, such as the F-35 or F-22, or missile technology, China is using espionage to fuel its economic furnaces.

These intelligence operations pose a grave threat to U.S. national security and economic prosperity. In a recent interview Mike Orlando, the Acting Director of the National Counterintelligence and Security Center, stated that Chinese espionage costs the U.S. between $200 to $600 billion a year in stolen intellectual property. And this is something that has been happening for the past two decades, which would mean a loss of $4 trillion, on the low end, to $12 trillion, on the high end; an astounding loss either way.

“The holistic and comprehensive threat to the United States, posed by the Communist Party of China is an existential threat. And it is the most complex, pernicious, aggressive, and strategic threat our nation has ever faced,” Bill Evanina, the former director of the National Counterintelligence and Security Center, recently told the Senate Select Committee on Intelligence.

Both China and Russia take a whole-of-government or whole-of-nation approach to national security. Everything is on the table and nothing is off-limits. Businesses, universities, and individuals are expected to assist the government. In China, under the National Security Law, every business and citizen is required to cooperate with the military and intelligence services and assist the regime in any way possible.

What this means in practice is that when a Chinese student comes to the U.S. to study, he or she will be required to share their research or any information and technology that they might have access to with the Chinese intelligence services. They will also be required to observe and gauge their countrymen also studying at the same institution and report any dissident behavior.

Conversely, there is not such a whole-of-government or whole-of-nation approach in the U.S. For example, Apple won’t create vulnerabilities in its devices and software so the NSA or FBI can access them more easily to conduct surveillance against foreign (in the case of the NSA) or domestic (in the case of the FBI) targets. Indeed, American businesses have the option to work with the military or Intelligence Community but aren’t required to. That’s a strategic disadvantage—but also an institutional and moral advantage.

Economic Espionage: Stealing Ideas and Tech

In order to surpass the U.S., China needs to continue its economic growth and technologically outmatch the U.S. and the rest of the West. However, instead of relying on innovation and invention, China prefers to steal technology and then copy it.

China is targeting and stealing “transport technologies,” such as quantum computing, autonomous vehicles, artificial intelligence, biotechnology, and 5G. Although there is a military application for all of these technologies, the commercial and economic value is equally important to Beijing in its bid to become a superpower.

The Chinese also use talent acquisition programs to attract top talent to China, not unlike any other nation. But while innocuous at the face of it, these programs often require the stealing of technology from the previous company to provide to the hiring Chinese one as a part of that process.

“So if you look back 20 years ago, what we were most concerned about was intelligence services targeting the U.S. government for classified information or targeting DOD technologies. And what we’ve seen over the last 20 years is the shift to private sector intellectual property research and development, particularly by China, who has been the most egregious one in stealing those technologies. And we’ve also seen their capabilities of China and Russia move from not only the human operations, but to cyber operations and to technical collection that has made it a difficult target to work,” Orlando added.

It’s worth noting that the U.S. Intelligence Community collects foreign intelligence just like the Chinese MSS. However, it’s the issue of how this intelligence is used that differentiates the two. Beijing won’t—and doesn’t— hesitate from collecting intelligence and stealing secrets to advance its economic purposes, including Chinese corporations, in addition to its national security.

The majority of countries employ their intelligence services in a similar manner. The French, for example, are historically notorious for their industrial and economic espionage, even against the U.S. Conversely, the U.S. collects foreign intelligence for national security purposes, rather than to share it with American corporations so that they can have a competitive advantage over their international competitors.

A Shift in Intelligence Collection

To further complicate matters, U.S. counterintelligence officers have seen a shift from more traditional espionage operations to non-traditional ones. Historically, countries have used two methods of human intelligence espionage: official cover and non-official cover.

Official cover is when an intelligence officer is assigned to an embassy or consulate abroad under a diplomatic role, for instance, as political officers or consular officers. In addition to their diplomatic duties, these officers perform their intelligence duties during the day or at night. Although they are known to the local country—and other countries—and are restricted by their secondary diplomatic tasks, they do enjoy diplomatic immunity if they are caught.

Non-official cover is when an intelligence officer deploys under a fake name and backstory, pretending to be someone he or she isn’t. This approach offers more flexibility to the intelligence officer as local counterintelligence officials and security services are less likely to suspect and thus monitor him or her. The use of non-official cover, or “Illegals,” as some countries call them, came into public view rather dramatically in 2010 with the arrest of 10 Russian intelligence officers who had been operating inside the U.S. for decades.

Illegals in action: the 10 Russian intelligence officers caught by the FBI in 2010 (FBI).

Now there seems to be a third category that, although it has always existed, never used to surpass those standard approaches in volume of use. Non-traditional collectors aren’t trained intelligence officers of the SVR, GRU, or MSS but rather businessmen, researchers, and students who have legitimate jobs or conduct genuine research. They use their innocuous-looking credentials to act as surrogates or proxies for their intelligence services.

The case of Maria Butina, who was arrested and convicted for being a Russian agent in 2018, is a great example of this approach. Under the genuine guise of a graduate student at the American University, Butina infiltrated conservative and NRA circles seeking to assess and develop targets.

As the above examples show, the Chinese intelligence efforts are formidable and worth taking very seriously.

This article was first published by Sandboxx.

Image: Reuters



278402 The National Interest
Biden investigating New York and New Jersey after the Ida flood  Ohionewstime.com
Bennett picks Shin Bet deputy chief 'R' to succeed Argaman  The Jerusalem Post
... concerned the rally will spill into violence after supporters of former President Donald Trump beat police officers and stormed the Capitol on Jan6.
... roles in the January 6 Capitol riot that's scheduled for September 18 at ... The chances of Proud Boys and Trump supporters roaming DC streets looking ...
German elections: Who's who in the race to replace Angela Merkel?  Euronews
Delta Overwhelms Morgues, Hospitals as U.S. Covid Cases Soar  Bloomberg
Delta COVID Wave Now Florida's Deadliest, With More Than 6,600 August Deaths  NBC 6 South Florida
After 20 years, 9/11 survivors say living through attacks 'just the first piece of the journey'  WBAL Baltimore

1999-08-25T120000Z_148714596_RP1DRILAFJA

Mullah Akhund, who is on a UN sanctions list, was the foreign minister in the previous Taliban government in the 1990s.

india-fever-outbreak-uttar-pradesh.jpg

  1. Mystery fever in India identified as 2 separate pathogens as death toll tops 100  CBS News
  2. Dengue outbreak in Firozabad: How Gambusia fish is n..Uttar Pradeshs best bet to control vector-borne menace  Firstpost
  3. Firozabad Viral Fever: Mysterious Scrub Typhus Fever Grips Uttar Pradesh | India Today Ground Report  India Today
  4. Experts from PGI, KGMU to tackle fever cases in west Uttar Pradesh districts  Times of India
  5. Uttar Pradesh CM seeks improved surveillance in districts battling dengue outbreak  The Hindu
  6. View Full Coverage on Google News

covid-us-01-gty-iwb-210903_1630680738268

COVID-19 infection after vaccination and what to do next  ABC NewsView Full Coverage on Google News
From: Euronews
Duration: 02:00

Subscribe to our channel: https://www.youtube.com/c/euronews?sub_confirmation=1
Watch our LIVE here: https://www.youtube.com/c/euronews/live

Subscribe to our thematic channels:
NoComment: https://www.youtube.com/c/nocommenttv?sub_confirmation=1
Euronews Green: http://bit.ly/2sMsaDB
Knowledge: https://www.youtube.com/c/euronewsknowledge?sub_confirmation=1:

Follow us on all platforms and on all devices: https://www.euronews.com/follow-us

Euronews is available on YouTube in 12 languages: https://www.youtube.com/user/euronewsnetwork/channels

hqdefault.jpg

1329712 Euronews's YouTube Videos
From: france24english
Duration: 03:00

Tens of thousands of #demonstrators flooded the streets in #Brazil Tuesday in a show of support on independence day for President Jair #Bolsonaro, who is locked in an all-out political battle with institutions including the Supreme Court. FRANCE 24's Tim Vickery has the details.

From: france24english
Duration: 07:00

In #Nicaragua, President #DanielOrtega has imprisoned all #opposition candidates who were set to run in the November 7 presidential polls. Meanwhile, dozens of public figures, party heads and student leaders have been arrested for "treason to the country". Ortega's critics now have only two options: exile or prison. Many are fleeing to Costa Rica, which over the past three years has seen an influx of some 100,000 Nicaraguans. Our regional correspondents report.



Comments

Popular posts from this blog

1:38 PM 10/6/2020 - Major hurricane brews in Gulf of Mexico, threatens Louisiana, Florida | Hopes of a ceasefire fading in Nagorno-Karabakh amid flare-up of violence

Ukraine threatens to break off diplomatic contact with Russia - Selected Articles Review - 8:30 AM 2/22/2022

1:43 PM 2/3/2021 - Эхо Москвы - Особое мнение : Глеб Павловский | Scientists explain why the new Covid-19 variants could be more infectious

CIA Director Gina Haspel: Trump's Behavior After Election Loss Was 'Insanity' | #TNT #News #Times #US #ODNI #CIA #DOJ #FBI #Psychology of #Politics, #Intelligence, & #SecurityServices The News And Times | The FBI News Review https://shar.es/aW6eFD

Intelligence Operations | Abwehr and Psychoanalysis - Tweets Review | US "Psychoanalysts", many of them German Jewish charlatans, SPIED ON THEIR PATIENTS to find out the roots of TOTALITARIANISM!

@SecondGentleman Are you behind the attempts to unseat Chris Wray of the FBI? Do you plot to rule America behind the scenes? What are your relations with the Intelligence Services, including the Mossad, KGB, BND, and the New Abwehr?#FBI #NEWS #KamalaHarris THE FBI NEWS REVIEW

Among Those Who Marched Into the Capitol on Jan. 6: An F.B.I. Informant - The New York Times

9:12 AM 9/21/2021 - #CI (Attention, #CounterIntelligence!!!) Clearly, this is the vicious, targeted political attack on #ChrisWray, & it is orchestrated by Kamala Harris #VPHarris to control FBI #FBI. She is the agent of "#ProgressiveLeft", & also of the #NewAbwehr-#KGB, I think.

US-American psychoanalytic community began to collaborate with the US-Intelligence Community (IC) ... psychohistorical studies on Adolf Hitler... history & consequences of this rather unexpected liaison. Psychoanalytic & the U.S. Intelligence Communities: 1940–1945