Russia-Ukraine conflict continues, the situation at the Zaporozhye nuclear power plant is complicated by artillery fire

As one of the focuses of the Russian-Ukrainian conflict, the Zaporozhye nuclear power plant in Ukraine has attracted global attention. This week, a working group led by the Director General of the International Atomic Energy Agency, Grossi, arrived at the Zaporozhye nuclear power plant despite the artillery fire to carry out assessment and safeguard activities, giving the outside world some confidence in the safety of the nuclear power plant. But at the same time, the Ukrainian side announced a high-profile “counter-offensive”, and the battlefield situation became more complicated.

On August 31, a team of experts sent by the International Atomic Energy Agency arrived in Zaporozhye, the capital of Ukraine’s Zaporozhye state.

According to the TASS news agency, the working group was led by the director general of the International Atomic Energy Agency, Grossi, and 13 experts from 10 countries, including Albania, China, France, Italy, Jordan, Lithuania, Mexico, Poland, Serbia and North Macedonia. Republic, etc., without the participation of Russian and Ukrainian experts, and without representatives of the United States and Britain.

This is the first time the International Atomic Energy Agency has sent a working group deep into the Ukrainian theater, escorted by staff from the United Nations logistics and security fields.

Djarric, spokesman for the UN Secretary-General, stressed that all parties to the conflict have a responsibility to protect the safety of the team of experts.

IAEA Director General Grossi: The IAEA is moving into the Zaporozhye nuclear power plant, where, as you know, we have a very important task of assessing what is actually happening there and doing what we can to help stabilize the situation.

The Zaporozhye Nuclear Power Plant, located in Energodar, Zaporozhye Oblast, Ukraine, is the largest nuclear power plant in Ukraine and one of the largest in Europe, accounting for 25% of Ukraine’s total power generation.

After the outbreak of the Russian-Ukrainian conflict, in March this year, the Russian side took control of the city of Ener Godard. The Russian Foreign Ministry said that in order to prevent the leakage of nuclear and radioactive materials, it is necessary to send Russian soldiers to guard the nuclear power plant. At the same time, the Russian side agreed to continue the operation and management of the nuclear power plant by the employees of the Ukrainian State Nuclear Power Company. But many Western media reported that the Russian army occupied the nuclear power plant.

Since mid-July, the nuclear power plant and its surroundings have been frequently attacked by artillery and drones. The Russian side claimed that it was the Ukrainian staff in the nuclear power plant who leaked the location information of personnel and equipment in the nuclear power plant area to the Ukrainian army, and the Ukrainian army made the attack accordingly.

Russian soldier: The radioisotope is stored there, about 20 to 30 meters away. Decades later, the haze of nuclear leaks still hangs over Chernobyl. The international community is also deeply aware that “playing with fire” on the safety issue of the Zaporozhye nuclear power plant is extremely dangerous and may lead to another nuclear disaster. ICRC director-general Mardini: There should be no firefights in and around facilities like the Zaporozhye nuclear power plant because we know what the consequences will be and in the event of an unfortunate disaster, there can be no humanitarian response measure. According to Ukrainian nuclear energy experts, once a catastrophic accident occurs at the Zaporozhye nuclear power plant, the severity may be 10 times that of the Chernobyl nuclear accident. Local residents: We survived the Chernobyl nuclear accident, it was a catastrophe, but we survived. In my opinion, the threat right now is 100%. The Zaporozhye nuclear power plant has six reactors, not one.

Russian soldier: The radioisotope is stored there, about 20 to 30 meters away. Decades later, the haze of nuclear leaks still hangs over Chernobyl. The international community is also deeply aware that “playing with fire” on the safety issue of the Zaporozhye nuclear power plant is extremely dangerous and may lead to another nuclear disaster. ICRC director-general Mardini: There should be no firefights in and around facilities like the Zaporozhye nuclear power plant because we know what the consequences will be and in the event of an unfortunate disaster, there can be no humanitarian response measure. According to Ukrainian nuclear energy experts, once a catastrophic accident occurs at the Zaporozhye nuclear power plant, the severity may be 10 times that of the Chernobyl nuclear accident. Local residents: We survived the Chernobyl nuclear accident, it was a catastrophe, but we survived. In my opinion, the threat right now is 100%. The Zaporozhye nuclear power plant has six reactors, not one. EU High Representative for Foreign Affairs and Security Policy Borrell: There is currently a nuclear gamble at the Zaporozhye nuclear power plant, which is very dangerous.

French President Emmanuel Macron: The situation around the Zaporozhye nuclear power plant is obviously what worries us the most.

On August 21, the leaders of the United States, Britain, France, and Germany held telephone talks, calling on Russia and Ukraine to maintain military restraint.

However, in response to the belated attention and attention of the West, the Russian side has continuously exposed and criticized the United States as the initiator and behind the nuclear power plant crisis.

 On August 28, a drone was shot down by Russia over the Zaporozhye nuclear power plant, and its flight trajectory showed that it targeted a warehouse storing nuclear waste. Russian Defense Ministry spokesman Konashenkov: The Ukrainian attack drone shot down by the Russian army landed on the roof of the No. 1 special facility. No one was injured and no serious damage to the building was caused. The Russian Satellite News Agency quoted Russian military sources as saying that this was an American-made drone. On August 29, the Zaporozhye nuclear power plant was shelled again, and a large hole was blown out of the roof of the nuclear fuel storage facility. Vladimir Rogov, an official of the Zaporozhye State Military and Civil Administration Agency, pointed out that the fire was provided to Ukraine by the United States. The M777 howitzer. Russian political analysts pointed out that Ukraine’s attack on the nuclear power plant has two main purposes: one is to intimidate Zaporozhye residents and force them to flee; the other is to obstruct the IAEA’s inspection.

Russian Defense Minister Shoigu: Yesterday, the Ukrainian armed forces opened fire not only on the Zaporozhye nuclear power plant, but also on the line of action of the IAEA team of experts. The spent fuel storage facility at the Zaporozhye nuclear power plant contains 4,000 spent fuel rods, which contain a huge amount of radioactive material. Russian nuclear expert Alexei Ampirogov pointed out that spent fuel is the ideal raw material for making nuclear dirty bombs. Once the IAEA personnel enter the nuclear power plant for inspection, they will find that the actual situation does not match the information previously reported by the Uzbek side. . In the early morning of September 1, it was quiet near the gate of the Zaporozhye nuclear power plant, waiting for the visit of the International Atomic Energy Agency. However, shortly after, the vicinity of the Zaporozhye nuclear power plant was shelled again, and the nuclear power plant was urgently switched to emergency mode.

IAEA Director General Grossi: We are moving. Based on what we know so far, there has been an increase in military activity, including this morning and in the last few minutes. But after weighing the pros and cons, we have not stopped so far, we are now heading to (the nuclear power plant). At 6 o’clock in the evening on September 1, Director General Grossi and most members of the expert group walked out of the Zaporozhye nuclear power plant, completed the first inspection, and made a preliminary assessment.

IAEA Director General Grossi: Even though I was only in there for 4 or 5 hours, I saw a lot, and my colleagues were still in there, I did a full walk, went into the various units, visited the emergency system generators and other different areas. The team of experts inspected multiple damages at the plant, including the remains of an unexploded shell, and Grossi announced that the IAEA would send several experts to stay at the Zaporozhye nuclear power plant on a permanent basis.

Analysts believe that the task of the IAEA expert group is limited to “professional technical assessment”, and it does not have the authority to clarify the responsibility for military operations, so it is unlikely to play the role of “mediator” in the conflict, but the experts are stationed in nuclear power plants to a certain extent. Tensions can be de-escalated, and even nuclear power plants are expected to become safe zones. IAEA Director General Grossi: There are two teams of technicians, and one of them will be at the plant until Sunday or next Monday.

Reuters noted that during the visit of the IAEA expert team, a large number of Russian soldiers were protecting the perimeter. According to the Russian Defense Ministry, Ukrainian soldiers tried to conduct an airborne landing in the Ener Godar region, where the nuclear power plant is located, but were suppressed by Russian fire and were unsuccessful. There are also two Ukrainian teams of about 60 people who tried to land on the coast of the Kakhovka Reservoir, 3 kilometers northeast of the nuclear power plant. With the arrival and stay of experts from the International Atomic Energy Agency, confidence in the safety of the Zaporozhye nuclear power plant has increased. But at the same time, in southern Ukraine, a more tragic head-to-head confrontation has begun.

 

 

 

 

 

A certain naval detachment in the Southern Theater Command: Offensive and defensive confrontation

A certain detachment of the navy in the Southern Theater—— Offensive and defensive confrontation

PLA Daily reporter Chen Dianhong Correspondent Cai Shengqiu

Deep in the South China Sea, undercurrents are surging. As the battle alarm suddenly sounded, the officers and soldiers of the Mianyang ship and Luoyang ship of a certain naval detachment in the southern theater moved quickly and entered a state of battle.

Shortly after entering the battle position, Mianyang ship technician Wang Zhixun reported the special situation in the air, and deputy captain Feng Hongbo decisively ordered the launch of jamming bombs.

“Actual combat training is the most fundamental and effective way to realize the coupling of combat training.” The leader of the detachment told reporters that “enemy” situations may appear anytime and anywhere, which puts higher requirements on the commander’s ability to deal with the situation on the fly.

Warning signals continued to appear, and in the combat command room of the Mianyang ship, various combat units cooperated with each other, and all the weapon systems on the deck were on standby.

The reporter noticed that in this confrontation, the ships searched, made independent decisions, and attacked independently throughout the entire process.

After synthesizing the battlefield situation information, Liu Weichao, the acting captain of the Luoyang ship, was ready to issue an attack order, but the steering team interspersed with special situations such as “missile platform fires after being fired”. In the face of the sudden “dangerous situation”, the damage control and rescue teams came forward in time and dealt with them quickly.

The urgent battle alarm sounded again, and the officers and soldiers immediately threw themselves into the tense ship-submarine confrontation. From ship-to-aircraft confrontation, ship-to-ship confrontation to ship-to-submarine confrontation, officers and soldiers practice command and coordination in the state of battle, and many tactics have been effectively tested.

 

“When I saw ‘Kunpeng’, I burst into tears” – a side note of our Yun-20 crew participating in the Austrian “Airpower-2022” air show

We took two trains to come here, and we made a special trip to see ‘Kunpeng’. “I was very kind and excited to see the bright five-star red flag on the fuselage…” On September 3, local time, the two-day Austrian “Airpower-2022” air show came to an end. The -20 aircraft has received widespread attention, and many Chinese and overseas Chinese have made a special trip to watch the exhibition, and their excitement is beyond words.

“This time I was invited to participate in the Austrian Air Show, which enhanced the learning and exchanges with the air force of various countries, and showed the Chinese spirit to the world and spread the air and space culture.” Wang Tianfeng, a Chinese Air Force super pilot and captain of the Y-20, introduced that the crew did a good job In preparation for the exhibition, the Yun-20 took off from an airport in central China, flew for more than 10 hours, and flew nearly 10,000 kilometers one way to Zeltweg Airport.

During the air show, in the static exhibition area of ​​the Chinese Air Force Yun-20, the audience took pictures with the “Kunpeng”. “Thank you Chinese Air Force pilots! The badge is really beautiful, and I will keep it well.” After taking a group photo with the Y-20, a pair of father and daughter who came to visit carefully listened to Zhang Lizhi’s explanation on the relevant information of the Y-20, the The little girl was overjoyed holding the two Yun-20 badges she was given.

“‘Kunpeng’ appeared in Europe, and I felt the power of the five-star red flag even more.” Liu Wenli, the commander of the exhibition mission, introduced that the Yun-20 exhibition area was always surrounded by audiences in the past two days, and local Chinese and overseas Chinese came to watch with the five-star red flag. Exhibition to express patriotism. On social media, photos of Yun-20 were swiped, and they were praised as the “lovable and lovely Eagle of Peace”.

The Yun-20 is a military large-scale multi-purpose transport aircraft independently developed and produced by my country. In recent years, the Y-20 has traveled all over Asia, Africa, Europe and Oceania, carrying out missions such as international humanitarian relief and transnational delivery of COVID-19 vaccines. This is the first time the Y-20 went to Europe to participate in an international air show.

“When I saw ‘Kunpeng’, I burst into tears! This is our own big plane, a symbol of China’s power, and a transmission of the Chinese spirit.” An overseas Chinese who came to the exhibition couldn’t hold back his excitement and returned. Then send a message to the crew.

 

NSA cyber-attacks on China tens of thousands of times, stealing over 140GB of data

Northwestern Polytechnical University was attacked by the US NSA network attack report (Part 1)

On June 22, 2022, Northwestern Polytechnical University issued a “Public Statement” stating that the school suffered an overseas cyber attack. The Beilin Branch of the Public Security Bureau of Xi’an City, Shaanxi Province immediately issued the “Police Information Bulletin”, confirming that a number of Trojan samples originating from abroad were found in the information network of Northwestern Polytechnical University, and the Xi’an police have officially opened an investigation.

The National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team (hereinafter referred to as the “technical team”), which participated in the technical analysis of the case throughout the process. The technical team has successively extracted a variety of Trojan samples from multiple information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used the existing domestic data resources and analysis methods, and obtained the full support of partners in some countries in Europe and South Asia to fully restore The overall overview, technical characteristics, attack weapons, attack paths and attack sources of the relevant attack events are preliminarily determined, and it is preliminarily determined that the relevant attack activities originated from the “Office of Tailored Access Operation” (hereinafter referred to as the “Special Intrusion Operation”) of the National Security Agency (NSA). TAO).

1. Overview of the attack incident

This investigation found that in recent years, TAO, a subordinate of the US NSA, has carried out tens of thousands of malicious network attacks on network targets in China, and controlled tens of thousands of network devices (network servers, Internet terminals, network switches, telephone switches) , routers, firewalls, etc.), stealing over 140GB of high-value data. TAO continues to expand the scope and scope of cyber attacks by leveraging its cyber attack weapon platform, “zero-day vulnerabilities” (0days) and the network devices it controls, etc. After technical analysis and source tracing, the technical team has now clarified the network attack infrastructure, special weapons and equipment, and techniques and tactics used in the TAO attack activities, restored the attack process and stolen documents, and mastered the information of the US NSA and its subordinate TAO on China. Evidence related to cyber attacks and data theft on the Internet, involving 13 people who directly launched cyber attacks against China in the United States, as well as more than 60 contracts signed by the NSA with U.S. telecom operators to build a cyber attack environment through cover companies. More than 170 documents.

  1. Analysis of attack events

In the cyberattack against Northwestern Polytechnical University, TAO used more than 40 different NSA-specific cyberattack weapons to continuously attack Northwestern Polytechnical University to steal its key network equipment configuration, network management data, operation and maintenance data and other core technologies data. Through forensic analysis, the technical team found that the attacker penetrated more than 1,100 attack links and operated more than 90 instruction sequences inside Northwestern Polytechnical University, and located several stolen network devices from the intruded network equipment. Device configuration files, sniffed network traffic data and passwords, other types of logs and key files, and other key details related to the attack activity. The specific analysis is as follows:

(1) Related network attack infrastructure

In order to cover its attack operations, TAO will conduct a long period of preparation before starting operations, mainly to build anonymized attack infrastructure. TAO used two “zero-day vulnerability” exploiting tools for SunOS operating system it mastered, and selected servers with a lot of network application traffic such as educational institutions and commercial companies in China’s neighboring countries as the attack target; after the attack was successful, the NOPEN Trojan was installed. Program (see related research report for details), which controls a large number of springboards.

TAO has successively used 54 springboards and proxy servers in the cyber-attack against Northwestern Polytechnical University, mainly distributed in 17 countries including Japan, South Korea, Sweden, Poland, Ukraine, etc. 70% of which are located in China’s neighboring countries, such as Japan, Korea etc.

The function of these springboard machines is limited to command relaying, that is, forwarding the springboard commands of the upper level to the target system, and thereby masking the real IP of the NSA launching the network attack. At present, at least four IP addresses of TAO’s control jumper from its access environment (US domestic telecom operator) have been mastered, which are 209.59.36.*, 69.165.54.*, 207.195.240.* and 209.118.143. *. At the same time, in order to further conceal the relationship between the springboard and the proxy server and the NSA, the NSA used the anonymity protection service of the US Register company to anonymize the traceable information such as related domain names, certificates and registrants, which cannot be accessed through public channels. make an inquiry.

Through the correlation analysis of threat intelligence data, the technical team found that the network resources used for the attack platform of Northwestern Polytechnical University involved a total of 5 proxy servers. IP addresses in places like the Netherlands and Colombia, and lease a batch of servers. The two companies are Jackson Smith Consultants and Mueller Diversified Systems. At the same time, the technical team also found that the TAO Infrastructure Technology Office (MIT) staff used the name “Amanda Ramirez” to anonymously purchase a domain name and a generic SSL certificate (ID: e42d3bea0a16111e67ef79f9cc2**). Subsequently, the above-mentioned domain names and certificates were deployed on the US-based man-in-the-middle attack platform “Foxacid” to attack a large number of network targets in China. In particular, TAO has launched multiple rounds of continuous attacks and stealing operations on Chinese information network targets such as Northwestern Polytechnical University.

(2) Related cyber attack weapons

TAO has successively used 41 kinds of NSA’s special network attack weapons and equipment in the network attack on Northwestern Polytechnical University. And during the attack process, TAO will flexibly configure the same cyber weapon according to the target environment. For example, among the cyber weapons used in the cyber attack on Northwestern Polytechnical University, only the backdoor tool “Cunning Heresy” (named by NSA) has 14 different versions. The technical team divided the categories of tools used by TAO in this attack into four categories, including:

1. Vulnerability attack breakthrough weapons TAO relies on such weapons to carry out attack breakthroughs on Northwestern Polytechnical University’s border network equipment, gateway servers, and office intranet hosts. It is also used to attack and control overseas springboards to build an anonymous network as a cover for action. There are 3 types of weapons:

① “Razor” This weapon can carry out remote vulnerability attacks on Solarise systems with X86 and SPARC architectures that open specified RPC services. When attacking, it can automatically detect the open status of the target system services and intelligently select the appropriate version of the exploit code to directly obtain the complete information on the target host. Control. This weapon was used to attack the springboards in Japan, South Korea and other countries, and the controlled springboards were used in the network attack on Northwestern Polytechnical University.

② “Island” This weapon can also implement remote overflow attacks on Solaris systems that have opened specified RPC services, and directly gain complete control over the target host. The difference from “Razor” is that this tool does not have the ability to autonomously detect the opening of the target service, and the user needs to manually configure the target and related parameters. The NSA used this weapon to attack a border server at Northwestern Polytechnical University.

③ “Sour Fox” weapon platform This weapon platform is deployed in Colombia and can be used in combination with the “second date” man-in-the-middle attack weapon. It can intelligently configure vulnerability payloads to conduct remote overflow attacks against mainstream browsers on multiple platforms such as IE, FireFox, Safari, and Android Webkit, and obtain the target system. (see: National Computer Virus Emergency Response Center “National Security Agency (NSA) “Acid Fox” Vulnerability Attack Weapon Platform Technical Analysis Report”). TAO mainly used this weapon platform to intrude the host of the office intranet of Northwestern Polytechnical University.

  1. Persistent control weapons

TAO relies on such weapons to covertly and persistently control the Northwestern Polytechnical University network. The TAO action team can send control commands through encrypted channels to operate such weapons to infiltrate, control, and steal the Northwestern Polytechnical University network. There are 6 types of weapons in this category:

①”Second date” This weapon resides on network edge devices and servers such as gateway servers and border routers for a long time, and can perform precise filtering and automatic hijacking of massive data traffic to achieve man-in-the-middle attack functions. TAO installed the weapon on the border equipment of Northwestern Polytechnical University, hijacked the traffic flowing through the equipment and directed it to the “Sour Fox” platform to carry out the vulnerability attack.

②“NOPEN” This weapon is a remote control Trojan that supports multiple operating systems and different architectures. It can receive commands through encrypted tunnels to perform file management, process management, system command execution and other operations. For details, please refer to: “NOPEN” Remote Control Trojan Analysis Report of the National Computer Virus Emergency Response Center). TAO mainly uses this weapon to implement persistent control over the core business servers and key network equipment inside the Northwestern Polytechnical University network.

③ “Rage Jet” This weapon is a Windows-based remote control Trojan that supports multiple operating systems and different architectures. It can be customized to generate different types of Trojan servers according to the target system environment. The server itself has strong anti-analysis and anti-debugging capabilities. ability. TAO mainly uses this weapon to cooperate with the “Sour Fox” platform to implement persistent control over the personal hosts within the office network of Northwestern Polytechnical University.

④ “Cunning Heresy” This weapon is a lightweight backdoor implantation tool that deletes itself after running. It has the ability to escalate privileges. It persists on the target device and can be started with the system. TAO mainly uses this weapon to achieve permanent residency, so as to establish an encrypted channel to upload the NOPEN Trojan at the right time, and ensure long-term control of the information network of Northwestern Polytechnical University.

⑤ “Stoic surgeon” This weapon is a backdoor for 4 types of operating systems, including Linux, Solaris, JunOS, and FreeBSD. The weapon can run persistently on the target device and hide the specified files, directories, processes, etc. on the target device according to the instructions. TAO mainly uses this weapon to hide the files and processes of the NOPEN Trojan and prevent it from being discovered by monitoring. A technical analysis found that TAO used a total of 12 different versions of the weapon in its cyberattack on Northwestern Polytechnical University.

3. Sniffing secret weapons

TAO relies on such weapons to sniff the account passwords and command line operation records used by Northwestern Polytechnical University staff to operate and maintain the network, and steal sensitive information and operation and maintenance data within the Northwestern Polytechnical University network. There are two types of weapons:

①”Drinking tea” This weapon can reside in a 32-bit or 64-bit Solaris system for a long time, and obtain account passwords exposed by various remote login methods such as ssh, telnet, and rlogin by sniffing inter-process communication. TAO mainly uses this weapon to sniff account passwords, command line operation records, log files, etc. generated by business personnel of Northwestern Polytechnical University when they perform operation and maintenance work, and compress and encrypt them for download by NOPEN Trojan.

② “Operation behind enemy lines” series of weapons This series of weapons is specially designed for the specific business systems of telecom operators. According to the different types of business equipment being charged, “operation behind enemy lines” will be used in conjunction with different analytical tools. TAO used three types of hacking tools against telecom operators, including “Magic School”, “Clown Food” and “Cursed Fire” in the cyber attack on Northwestern Polytechnical University.

  1. Concealed weapons

TAO relies on such weapons to eliminate traces of its behavior within the Northwestern Polytechnical University network, hide and cover up its malicious operations and stealing behaviors, and at the same time provide protection for the above three types of weapons. 1 such weapon has been found:

“Toast Bread”, this weapon can be used to view and modify log files such as utmp, wtmp, lastlog, etc. to remove traces of operations. TAO mainly used this weapon to remove and replace various log files on the alleged Northwestern Polytechnical University’s Internet access device, to hide its malicious behavior. TAO’s cyber attack on Northwestern Polytechnical University used 3 different versions of “toast”.

  1. Attack source tracing

Based on the above technical analysis results and traceability investigations, the technical team preliminarily determined that the cyber attack on Northwestern Polytechnical University was carried out by TAO (code S32) under the Data Reconnaissance Office (code S3) of the Information Intelligence Department (code S) of the National Security Agency (NSA). )department. The department was established in 1998, and its force deployment mainly relies on the encryption centers of the US National Security Agency (NSA) in the United States and Europe. The six crypto centers that have been announced so far are:

1. NSA headquarters in Fort Meade, Maryland, USA;

2. NSA Hawaii Crypto Center (NSAH), Oahu, Hawaii, USA;

3. NSA Crypto Center Georgia (NSAG), Fort Gordon, Georgia, USA;

4. NSA Crypto Center of Texas (NSAT) in San Antonio, Texas, USA;

5. NSA Coloraroo Crypto Center (NSAC) at Macley Air Force Base, Denver, Colorado, USA;

6. The NSA European Crypto Center (NSAE) at the US military base in Darmstadt, Germany. TAO is a tactical implementation unit of the U.S. government specializing in conducting large-scale cyber attacks on other countries and stealing secrets. It consists of more than 2,000 military and civilian personnel. Its internal institutions include:

The first: Remote Operations Center (ROC, code S321), mainly responsible for operating weapon platforms and tools to enter and control the target system or network.

Second Division: Advanced/Access Network Technology Division (ANT, code S322), responsible for researching related hardware technologies and providing hardware-related technologies and weapons and equipment support for TAO network attack operations.

Third Division: Data Network Technology Division (DNT, code S323), responsible for developing complex computer software tools to support TAO operators in carrying out cyber attack missions.

Fourth Division: Telecommunications Network Technology Division (TNT, code S324), responsible for researching telecommunications-related technologies and providing support for TAO operators to covertly penetrate telecommunications networks.

Fifth Division: Mission Infrastructure Technology Division (MIT, code-named S325), responsible for developing and establishing network infrastructure and security monitoring platforms for building attack action network environments and anonymous networks.

The sixth place: The Access Operations Office (ATO, code S326) is responsible for the backdoor installation of the products to be delivered to the target through the supply chain.

The seventh place: Requirement and Positioning Division (R&T, code S327), receives the tasks of various relevant units, determines the reconnaissance target, and analyzes and evaluates the intelligence value. S32P: Project Planning Integration Office (PPI, code S32P), responsible for overall planning and project management. NWT: Network Warfare Team (NWT), responsible for liaison with the Network Warfare Team.

The US National Security Agency (NSA) attack on Northwestern Polytechnical University is code-named “Stop XXXX” (shotXXXX). The operation is directly commanded by the person in charge of TAO, and MIT (S325) is responsible for building a reconnaissance environment and renting attack resources; R&T (S327) is responsible for determining the attack strategy and intelligence assessment; ANT (S322), DNT (S323), TNT ( S324) is responsible for providing technical support; ROC (S321) is responsible for organizing attack and reconnaissance operations. It can be seen that those directly involved in command and operations mainly include the head of TAO, S321 and S325 units.

The TAO director during the NSA attack on Northwestern Polytechnical University was Robert Edward Joyce. Born on September 13, 1967, this person attended Hannibal High School, graduated from Clarkson University with a bachelor’s degree in 1989, and graduated from Johns Hopkins University with a master’s degree in 1993. He joined the National Security Agency in 1989. He once served as the deputy director of TAO, and served as the director of TAO from 2013 to 2017. Beginning in October 2017 as Acting U.S. Homeland Security Advisor. From April to May 2018, he served as the White House State Security Adviser, and then returned to the NSA as a senior adviser on cybersecurity strategy to the Director of the National Security Agency. He is currently the director of NSA cybersecurity.

4. Summary

Based on the analysis results of the National Computer Virus Emergency Response Center and the joint technical team of 360 Company, this report reveals the truth that the US NSA has long been conducting cyber espionage activities against Chinese information network users and important units, including Northwestern Polytechnical University. The follow-up technical team will also release more technical details of the relevant incident investigation in succession.

More than 1,000 troops and rescue forces rushed to the earthquake-stricken area in Luding, Sichuan

Stay Strong, SICHUAN!

Xinhua News Agency, Beijing, September 5 (Reporters Liu Xin, Jia Qilong) On September 5, a magnitude 6.8 earthquake occurred in Luding County, Ganzi Prefecture, Sichuan Province. After the disaster, the armed police force, militia and other rescue forces rushed to the disaster area.

The Sichuan Armed Police Corps quickly dispatched an advance command group to direct the operations of the front-line troops. Thirty officers and soldiers of the Garzi Detachment of the Armed Police went to Detuo Township, Luding County, the epicenter of the epicenter, carrying shovels and medicines, to carry out work such as situation survey, road clearance and mass transfer. The Second Mobile Detachment of the Sichuan Armed Police Corps dispatched 95 officers and soldiers, 15 rescue vehicles such as excavators and loaders, and rushed to the epicenter with professional equipment such as life detectors and demolition tools. The Sichuan Armed Police Corps Hospital dispatched emergency medical teams and ambulances, surgical cabins, anti-epidemic decontamination vehicles and other medical equipment to carry medical supplies to Luding County to carry out emergency rescue and evacuation treatment. As of 16:00, more than 1,000 armed police officers and soldiers were dispatched to the front line of emergency rescue.

After the earthquake, Ganzi Prefecture dispatched hundreds of militiamen to the disaster area. The People’s Armed Forces Department of Luding County organized the Moxi Town Militia Emergency Platoon to carry out rescue operations. 90 militiamen from the Luding County Militia Emergency Company rushed to Detuo Township, which was severely affected by the disaster, and more than 200 militiamen from other towns and towns were successively involved in the disaster relief.

The senior of a certain brigade of the PLA Rocket Army is inspired to boost the morale of the army

A Brigade of the Rocket Army

Inspiration from the ancestors to boost the morale of the army

People’s Liberation Army Daily reported that Xin Peihu and Feng Chenyang reported: In mid-August, a theatrical performance team of a certain brigade of the Rocket Army went to the field training ground of the brigade to perform a military-themed melodrama written and directed by itself. The play vividly reproduces the growth experience of some revolutionary ancestors and the classic battles they participated in, providing rich spiritual food for the officers and soldiers stationed in training.

“The heroism of the revolutionary ancestors has a strong appeal, which can boost the morale of the army and inspire the spirit of martial arts.” The leader of the brigade introduced that the current army is at a critical stage of transformation and construction. During the period of change and adjustment, morale did not drop. They cooperated with the resident Revolutionary Memorial Hall, local theaters and other units to select literary and artistic backbones to create and perform a variety of literary and artistic programs, and carried out regular education in the form of officers and soldiers, and achieved good results.

“Only by training hard and enhancing our skills can we live up to the bloodshed of our ancestors!” Yuan Youcheng, an instructor of a company of the brigade, was born in an old revolutionary base area, and the melodrama performed by the theatrical performance team deeply touched him. After the performance, Yuan Youcheng organized a series of cooperation activities in the company, which effectively stimulated the motivation of the officers and soldiers to train.

On this basis, the brigade also organized officers and soldiers to visit the red venues, recorded a series of micro-lectures on red stories, and guided the officers and soldiers to transform the motivation stimulated by the visit into the enthusiasm for training and preparing for war, and sang the song of a strong army on the training ground. fire of faith.

The spirit of the revolutionary ancestors will live forever, and inspire the younger generation to forge ahead. In the past few days, the brigade has organized a series of intensive training for newly transferred officers and soldiers.

On the way to the war, the theatrical performance team went to the front line to condolence to the officers and soldiers. After watching the performance, the newly transferred officers and soldiers were very excited, and they all said that they would stand on their posts and be strong in martial arts.

 

专家解读:人民空军远程战略投送能力初步形成

运-20彰显空军战略投送能力新提升

空军航空开放活动中进行飞行展示的诸多战机中,体形最大的非运-20莫属了。运-20飞机列装部队使我军战略投送能力大幅度提升,反应时间以“天”为单位,压缩到以“小时”为单位。此次开放活动上,运-20用一连串优美的动作,向公众展示了它优异的飞行性能。

在机场跑道的一端,准备起飞的就是我国自主研制生产的首款200吨级大型战略战术军用运输机运-20。运-20飞机,又称“鲲鹏”,被网友们亲切地称呼为“胖妞”。别看它体形巨大,但它的飞行性能却毫不逊色。从静止到离地,滑跑距离短,飞机快速爬升,体现出了它良好的“短距起降能力”性能。

对于大型飞机来说,低空急剧的状态变化对机体强度和飞机操控性、机动性都提出了较高的要求。此时,运-20在150米高度,以每小时310千米的时速,进行大坡度水滴回转,体现了它良好的操控性能。

运-20飞行员焦学浩:如果以运输机来讲的话,它的这个动作实施起来肯定时间要长,但是运-20比它体积大,它实施起来反而更灵活一些,而且用时更短,像大坡度盘旋,它比正常其他的机型做的那个坡度更要大一些,这样的话时间就短。

大坡度盘旋,然后低空小速度通场、建立小航线……一系列优美流畅的飞行动作,展现了运-20良好的升力特性、优异的低空低速性能、完美的空气动力特性和精准导航。运-20具有航程远、载重大、飞得快、性能优等特点,是实施远程战略投送和空军攻防兼备战略转型的重要装备。主要担负战略战术军用运输、空降作战、空投装备物资和执行非战争军事行动等任务。列装以来,运-20先后参与建军90周年阅兵、国庆70周年阅兵任务,赴境外多国执行联演联训。2020年2月13日,更是飞赴武汉抗击新冠疫情进行紧急空运任务,这是运-20首次参加非战争军事行动,也是空军首次成体系大规模出动现役大中型运输机执行紧急空运任务。

运-20飞行员焦学浩:运-20飞机作为国之重器,也是空军战斗力显著提升的一个重要体现。近年来,我们的任务越来越多,上高原,赴远海,出国门,融入训练体系,不仅完成了上级赋予的各类演训任务,还出色地完成了像武汉、上海、紧急空运医疗人员物资等非战争军事行动。可以说哪里有需要我们就飞向哪里,哪里最紧急我们就驰援到哪里,哪里形势最严峻我们就战斗在哪里。

美对台当局军售搞“饥饿销售”,F-16订单台湾排在东欧和中东之后

美国正在像卖期货或卖楼花一样对台湾卖武器。据美国《防务新闻》网站25日爆料,在俄乌冲突和新冠肺炎疫情影响美国军火商供货能力的背景下,对台军售实际上早已陷入“订单大量被积压”的窘境,“他们把所有武器都优先放在了乌克兰”,据报迄今积压的对台军售已经高达140亿美元。与此同时,台湾民进党当局25日通过了“史上最大规模”的防务预算,同比增幅高达13.9%,引发岛内舆论强烈质疑:“美国爸爸保护费涨价了?”“都用石头丢根本不需要那么多预算吧,我看是给纷纷来台湾打卡的政客红包费。”台湾《中国时报》26日称,8月美政府官员、国会议员、智库学者“前赴后继鱼贯登台”,让民进党政府好忙,“忙到理智断线”。“美国老大哥来就是要台湾买军火,还有要台积电先进制程芯片投资美国。”台湾政治大学国际关系研究中心兼任研究员严震生26日对香港中评社说,美国一直派团窜台,他怀疑是否“刻意制造机会让大陆军演,让台湾不断买武器”。分析人士称,不排除美国一边制造紧张气氛,一边对台“饥饿销售”武器,令台当局更积极主动地向美方掏钱。

F-16订单,台湾排在东欧和中东之后

《防务新闻》网站25日报道称,自从本月早些时候“近12枚东风弹道导弹飞越台岛上空”,解放军以“史上规模最大演习”回应佩洛西窜台之后,美国议员们就更加强调“有必要对台出口尽可能多的武器”,作为所谓“豪猪”战略的一部分,以阻止大陆的封锁或“入侵”。

然而事实是,“台湾正面临着来自美国的140亿美元军售的积压”,未交付的武器包括F-16战机、“爱国者”导弹防空系统的零组件、“毒刺”防空导弹、Mk-48重型鱼雷、“海马斯”高机动火箭炮系统、MS-110侦察吊舱等。

文章称,美国武器制造商通常在收到国防部最终合同后才开始生产武器,“多年来笨拙的对外军售过程一直存在问题,但最近国防工业基地内与疫情相关的供应链问题加剧了延迟”。

与此同时,由于美国正在“回填北约东翼”,把武器尽量地放在乌克兰和东欧等北约对阵俄罗斯的“前线国家”,台湾方面准备斥资23亿美元购买400枚陆基“鱼叉”导弹的订单就被“插了队”,还有台湾预订的“毒刺”防空导弹和高机动火箭炮系统等也是如此。

“在很多情况下,沙特阿拉伯在供货名单的排序上要领先于台湾。”威斯康星州共和党众议员加拉格尔这样告诉《防务新闻》。而在洛克希德·马丁公司 F-16 战机的生产供货序列里,几个中东和东欧国家均领先于台湾。2019年,美国国务院批准以80亿美元的价格向台湾出售 66架F-16,但台北方面预计要到2026年才能收到这些战机。

《日经亚洲评论》也称,美国可能推迟向台湾交付关键的军事装备,因为华盛顿正专注于为乌克兰提供武器。台湾预计要到2026年3月前才能收到250枚“毒刺”地对空导弹。M109A6自行火炮也遇到了类似问题,台湾原计划在2023年至2025年期间接收40门,但华盛顿通知台湾,由于美国生产“紧张”,交货将推迟到最早2026年。

《防务新闻》称,美国参议院将在今年9月份首次尝试解决售台武器的积压问题,届时美国外交关系委员会准备对所谓“台湾政策法案”进行修订。这项跨党派法案将通过外国军事融资项目向台湾方面提供45亿美元的军事援助。不过报道称,虽然这些援助将用于帮助台湾购买“更多的”美国武器,但只要积压的军售仍然存在,“增加的援助就变得没那么有意义了”。

美国9月或卖台湾新弹药

据《纽约时报》报道,台湾官员已在抱怨武器订单交货推迟和完不成的问题,而对于台湾想要的其他系统,包括先进的可以搜寻潜艇的海军直升机,美国官员则认为“没有必要”,他们说与中国大陆作战需要的是“不对称”战略,侧重于机动性和精准打击。

25日,一名接近美国对台军售政治层级官员的消息人士对路透社说:“我认为,美国试图向台湾推销的不仅是武器……可能是更多弹药等低层级的供应。”这位消息人士称,此类军售项目最快可能在9月宣布,以表明北京在佩洛西窜台后进行锁台演习“并未动摇美国对台湾的支持”,“若发生对台禁运,台湾会需要更多军需品和弹药”。

美国在9月将继续对台售武的消息并没有让岛内民众体会到美国对台的所谓“支持”,有网友留言一针见血地指出:“这么好赚,当然不会改变!”“又要卖破烂了,不卖你最新的,比诈骗集团还恶劣。”还有网友说:“看看乌克兰战场……内心已经了解。”

正如台湾东森新闻所说,“真正对台湾有用的武器,美国都不卖”。“德国之声”25日的报道也称,台湾军方偏爱的是战斗机和军舰等大件商品,但美国更愿意推动的对台军售是反舰导弹和防空导弹,以及训练士兵抵御“入侵的登陆部队”。

26日,蔡英文在脸书上自夸明年“‘国防预算’史上最多”,网友一片哗然。有人问:“预算多,为什么让台军用石头丢无人机?”还有网友问:“‘国防预算’是要买石头吗?”(暗讽本月中旬驻金门台军用丢掷石头试图驱赶大陆无人机的事。)

窜台政客都是来“抢钱”的

现在美国给台湾卖点武器,经常动辄拖延好几年;另一方面,美国政客却是说窜台就窜台,而且一来就逼着台湾买这买那。25日晚,美国田纳西州共和党联邦参议员布莱克本抵台窜访。这也是民进党当局本月接待的第四个美国窜访代表团。鉴于布莱克本是参院武器和贸易委员会成员,有分析称,继续推动向台军售很有可能是她此行的主要目的。

26日,中国外交部发言人对布莱克本窜台表达强烈不满和坚决反对。

根据莆田海事局警告:26日、27日福建部分水域计划开展实弹射击训练。26日,东部战区宣布,近日在台岛周边海空域组织多军兵种联合战备警巡和实战化演练,这是根据台海形势变化组织的常态化军事行动。

《中国时报》分析称,美国中期选举即将到来,美国议员接连来台恐怕更多的是为了政治和经济利益。经济方面,之前美国汽车等产业面临芯片供应链问题,亟待与台积电等台湾大厂合作,这些议员来台,不仅可以直赴台积电等大厂参观,由企业高层亲自接待,故竞相来访。今年4月中旬,格雷厄姆等人率团访台,一再要求台湾采购波音787客机,甚至发生与蔡英文会面时,要求买飞机的发言被台当局新闻稿“消音”的情况。格雷厄姆返美后又再提“盼台湾尽快宣布购买24架”。而日本议员近日窜台期间,也极力推销日本新干线,结果有关内容亦被台当局“消音”。

严震生26日接受香港中评社采访时表示,日前美国印第安纳州州长窜台,也是为了争取岛内科技产业在其所在州设厂。曾在印第安纳州普渡大学攻读博士的严震生表示,印第安纳州主要以农业为主,但也有些工业。20世纪80年代,日本车在美国卖得很好,美国受不了,就要求日本把车厂移到美国,为美国人创造就业机会,当时印第安纳州就把丰田弄去美国设厂。

民进党前“立委”许国泰表示,美国官员或议长来台湾都是有目的性的,绝对不会平白无故支持,美国支持对象都要付出代价,“等到有一天台湾没有钱,就等着被抛弃”。《中国时报》26日发表评论称,又有美国议员来台了,而所谓“台美关系史上最好”的后果,就是台湾“国库”愈掏愈空。文章称,解放军频繁军演,“不也是跟美国硬着来有关吗?”美国若真挺台“坚若磐石”,“‘里根’号航母下次就别再逃跑”。

俄媒称一名美籍雇佣兵在乌克兰被杀,美国务院同日回应

600俄罗斯滨海边疆区行政长官奥列格·科热米亚科当地时间26日在社交平台Telegram上发文称,一名美籍雇佣兵在乌克兰被消灭。而美国媒体称,美国国务院发言人也证实有一名美国公民在乌克兰死亡。

俄《消息报》称,科热米亚科当天在Telegram上写道,“一名美籍雇佣兵在乌克兰被消灭”。他还称,消灭美国雇佣兵的是一支来自俄滨海边疆区、名为“老虎”的“志愿兵”队伍。

报道称,科热米亚科还在Telegram上发布了这名美籍雇佣兵的相关证件,显示其出生于1998年。

另据美国《新闻周刊》报道,一名美国国务院发言人当地时间26日向该媒体证实一名美国公民在乌克兰死亡,不过再未透露其他具体信息。“我们可以确认一名美国公民在乌克兰死亡”,该发言人表示,“出于对其家庭隐私的尊重,我们目前没有进一步的评论”。

美官员:两艘美军舰正通过台湾海峡 截至发稿时穿越台湾海峡行动“仍在进行中”

路透社刚刚消息,三名美国官员告诉路透社,两艘美国海军军舰正在台湾海峡内航行。路透社称,这是自美国众议院议长佩洛西窜访台湾以来,美军的首次穿越台湾海峡的行动。

执行穿越海峡任务的是两艘提康德罗加级巡洋舰,分别是“钱瑟洛斯维尔”号(CG-62)和“安提坦”号巡洋舰(CG-54) ,路透社在发稿(北京时间10点半)时表示,穿越台湾海峡行动“仍在进行中”。

“6060安提坦”号巡洋舰(CG-54)和“钱瑟洛斯维尔”号(CG-62)图源:社交媒体

此前8日,美国国防部负责政策事务的副部长科林·卡尔(Colin Kahl)声称对于解放军的军演,美方“不会上钩”。他还放话称,美军将在未来几周内穿行台湾海峡。

对于美军军舰穿越台湾海峡一事,我国防部、外交部有过多次回应。近期,我秦刚大使在华盛顿接受外媒采访时候表示,美方在这一地区做得太过了!美方2012年至今在台湾海峡进行近100次过航,加剧紧张局势,助长“台独”势力嚣张气焰。

我们注意到美国军方近日表示,他们将再次进行军事演习或过航。在此我呼吁美国同事保持克制,不要使紧张局势升级。如果美方采取任何损害中国主权和领土完整的举动,中方将作出反应。

x