Russia-Ukraine conflict continues, the situation at the Zaporozhye nuclear power plant is complicated by artillery fire

As one of the focuses of the Russian-Ukrainian conflict, the Zaporozhye nuclear power plant in Ukraine has attracted global attention. This week, a working group led by the Director General of the International Atomic Energy Agency, Grossi, arrived at the Zaporozhye nuclear power plant despite the artillery fire to carry out assessment and safeguard activities, giving the outside world some confidence in the safety of the nuclear power plant. But at the same time, the Ukrainian side announced a high-profile “counter-offensive”, and the battlefield situation became more complicated.

On August 31, a team of experts sent by the International Atomic Energy Agency arrived in Zaporozhye, the capital of Ukraine’s Zaporozhye state.

According to the TASS news agency, the working group was led by the director general of the International Atomic Energy Agency, Grossi, and 13 experts from 10 countries, including Albania, China, France, Italy, Jordan, Lithuania, Mexico, Poland, Serbia and North Macedonia. Republic, etc., without the participation of Russian and Ukrainian experts, and without representatives of the United States and Britain.

This is the first time the International Atomic Energy Agency has sent a working group deep into the Ukrainian theater, escorted by staff from the United Nations logistics and security fields.

Djarric, spokesman for the UN Secretary-General, stressed that all parties to the conflict have a responsibility to protect the safety of the team of experts.

IAEA Director General Grossi: The IAEA is moving into the Zaporozhye nuclear power plant, where, as you know, we have a very important task of assessing what is actually happening there and doing what we can to help stabilize the situation.

The Zaporozhye Nuclear Power Plant, located in Energodar, Zaporozhye Oblast, Ukraine, is the largest nuclear power plant in Ukraine and one of the largest in Europe, accounting for 25% of Ukraine’s total power generation.

After the outbreak of the Russian-Ukrainian conflict, in March this year, the Russian side took control of the city of Ener Godard. The Russian Foreign Ministry said that in order to prevent the leakage of nuclear and radioactive materials, it is necessary to send Russian soldiers to guard the nuclear power plant. At the same time, the Russian side agreed to continue the operation and management of the nuclear power plant by the employees of the Ukrainian State Nuclear Power Company. But many Western media reported that the Russian army occupied the nuclear power plant.

Since mid-July, the nuclear power plant and its surroundings have been frequently attacked by artillery and drones. The Russian side claimed that it was the Ukrainian staff in the nuclear power plant who leaked the location information of personnel and equipment in the nuclear power plant area to the Ukrainian army, and the Ukrainian army made the attack accordingly.

Russian soldier: The radioisotope is stored there, about 20 to 30 meters away. Decades later, the haze of nuclear leaks still hangs over Chernobyl. The international community is also deeply aware that “playing with fire” on the safety issue of the Zaporozhye nuclear power plant is extremely dangerous and may lead to another nuclear disaster. ICRC director-general Mardini: There should be no firefights in and around facilities like the Zaporozhye nuclear power plant because we know what the consequences will be and in the event of an unfortunate disaster, there can be no humanitarian response measure. According to Ukrainian nuclear energy experts, once a catastrophic accident occurs at the Zaporozhye nuclear power plant, the severity may be 10 times that of the Chernobyl nuclear accident. Local residents: We survived the Chernobyl nuclear accident, it was a catastrophe, but we survived. In my opinion, the threat right now is 100%. The Zaporozhye nuclear power plant has six reactors, not one.

Russian soldier: The radioisotope is stored there, about 20 to 30 meters away. Decades later, the haze of nuclear leaks still hangs over Chernobyl. The international community is also deeply aware that “playing with fire” on the safety issue of the Zaporozhye nuclear power plant is extremely dangerous and may lead to another nuclear disaster. ICRC director-general Mardini: There should be no firefights in and around facilities like the Zaporozhye nuclear power plant because we know what the consequences will be and in the event of an unfortunate disaster, there can be no humanitarian response measure. According to Ukrainian nuclear energy experts, once a catastrophic accident occurs at the Zaporozhye nuclear power plant, the severity may be 10 times that of the Chernobyl nuclear accident. Local residents: We survived the Chernobyl nuclear accident, it was a catastrophe, but we survived. In my opinion, the threat right now is 100%. The Zaporozhye nuclear power plant has six reactors, not one. EU High Representative for Foreign Affairs and Security Policy Borrell: There is currently a nuclear gamble at the Zaporozhye nuclear power plant, which is very dangerous.

French President Emmanuel Macron: The situation around the Zaporozhye nuclear power plant is obviously what worries us the most.

On August 21, the leaders of the United States, Britain, France, and Germany held telephone talks, calling on Russia and Ukraine to maintain military restraint.

However, in response to the belated attention and attention of the West, the Russian side has continuously exposed and criticized the United States as the initiator and behind the nuclear power plant crisis.

 On August 28, a drone was shot down by Russia over the Zaporozhye nuclear power plant, and its flight trajectory showed that it targeted a warehouse storing nuclear waste. Russian Defense Ministry spokesman Konashenkov: The Ukrainian attack drone shot down by the Russian army landed on the roof of the No. 1 special facility. No one was injured and no serious damage to the building was caused. The Russian Satellite News Agency quoted Russian military sources as saying that this was an American-made drone. On August 29, the Zaporozhye nuclear power plant was shelled again, and a large hole was blown out of the roof of the nuclear fuel storage facility. Vladimir Rogov, an official of the Zaporozhye State Military and Civil Administration Agency, pointed out that the fire was provided to Ukraine by the United States. The M777 howitzer. Russian political analysts pointed out that Ukraine’s attack on the nuclear power plant has two main purposes: one is to intimidate Zaporozhye residents and force them to flee; the other is to obstruct the IAEA’s inspection.

Russian Defense Minister Shoigu: Yesterday, the Ukrainian armed forces opened fire not only on the Zaporozhye nuclear power plant, but also on the line of action of the IAEA team of experts. The spent fuel storage facility at the Zaporozhye nuclear power plant contains 4,000 spent fuel rods, which contain a huge amount of radioactive material. Russian nuclear expert Alexei Ampirogov pointed out that spent fuel is the ideal raw material for making nuclear dirty bombs. Once the IAEA personnel enter the nuclear power plant for inspection, they will find that the actual situation does not match the information previously reported by the Uzbek side. . In the early morning of September 1, it was quiet near the gate of the Zaporozhye nuclear power plant, waiting for the visit of the International Atomic Energy Agency. However, shortly after, the vicinity of the Zaporozhye nuclear power plant was shelled again, and the nuclear power plant was urgently switched to emergency mode.

IAEA Director General Grossi: We are moving. Based on what we know so far, there has been an increase in military activity, including this morning and in the last few minutes. But after weighing the pros and cons, we have not stopped so far, we are now heading to (the nuclear power plant). At 6 o’clock in the evening on September 1, Director General Grossi and most members of the expert group walked out of the Zaporozhye nuclear power plant, completed the first inspection, and made a preliminary assessment.

IAEA Director General Grossi: Even though I was only in there for 4 or 5 hours, I saw a lot, and my colleagues were still in there, I did a full walk, went into the various units, visited the emergency system generators and other different areas. The team of experts inspected multiple damages at the plant, including the remains of an unexploded shell, and Grossi announced that the IAEA would send several experts to stay at the Zaporozhye nuclear power plant on a permanent basis.

Analysts believe that the task of the IAEA expert group is limited to “professional technical assessment”, and it does not have the authority to clarify the responsibility for military operations, so it is unlikely to play the role of “mediator” in the conflict, but the experts are stationed in nuclear power plants to a certain extent. Tensions can be de-escalated, and even nuclear power plants are expected to become safe zones. IAEA Director General Grossi: There are two teams of technicians, and one of them will be at the plant until Sunday or next Monday.

Reuters noted that during the visit of the IAEA expert team, a large number of Russian soldiers were protecting the perimeter. According to the Russian Defense Ministry, Ukrainian soldiers tried to conduct an airborne landing in the Ener Godar region, where the nuclear power plant is located, but were suppressed by Russian fire and were unsuccessful. There are also two Ukrainian teams of about 60 people who tried to land on the coast of the Kakhovka Reservoir, 3 kilometers northeast of the nuclear power plant. With the arrival and stay of experts from the International Atomic Energy Agency, confidence in the safety of the Zaporozhye nuclear power plant has increased. But at the same time, in southern Ukraine, a more tragic head-to-head confrontation has begun.






A certain naval detachment in the Southern Theater Command: Offensive and defensive confrontation

A certain detachment of the navy in the Southern Theater—— Offensive and defensive confrontation

PLA Daily reporter Chen Dianhong Correspondent Cai Shengqiu

Deep in the South China Sea, undercurrents are surging. As the battle alarm suddenly sounded, the officers and soldiers of the Mianyang ship and Luoyang ship of a certain naval detachment in the southern theater moved quickly and entered a state of battle.

Shortly after entering the battle position, Mianyang ship technician Wang Zhixun reported the special situation in the air, and deputy captain Feng Hongbo decisively ordered the launch of jamming bombs.

“Actual combat training is the most fundamental and effective way to realize the coupling of combat training.” The leader of the detachment told reporters that “enemy” situations may appear anytime and anywhere, which puts higher requirements on the commander’s ability to deal with the situation on the fly.

Warning signals continued to appear, and in the combat command room of the Mianyang ship, various combat units cooperated with each other, and all the weapon systems on the deck were on standby.

The reporter noticed that in this confrontation, the ships searched, made independent decisions, and attacked independently throughout the entire process.

After synthesizing the battlefield situation information, Liu Weichao, the acting captain of the Luoyang ship, was ready to issue an attack order, but the steering team interspersed with special situations such as “missile platform fires after being fired”. In the face of the sudden “dangerous situation”, the damage control and rescue teams came forward in time and dealt with them quickly.

The urgent battle alarm sounded again, and the officers and soldiers immediately threw themselves into the tense ship-submarine confrontation. From ship-to-aircraft confrontation, ship-to-ship confrontation to ship-to-submarine confrontation, officers and soldiers practice command and coordination in the state of battle, and many tactics have been effectively tested.


“When I saw ‘Kunpeng’, I burst into tears” – a side note of our Yun-20 crew participating in the Austrian “Airpower-2022” air show

We took two trains to come here, and we made a special trip to see ‘Kunpeng’. “I was very kind and excited to see the bright five-star red flag on the fuselage…” On September 3, local time, the two-day Austrian “Airpower-2022” air show came to an end. The -20 aircraft has received widespread attention, and many Chinese and overseas Chinese have made a special trip to watch the exhibition, and their excitement is beyond words.

“This time I was invited to participate in the Austrian Air Show, which enhanced the learning and exchanges with the air force of various countries, and showed the Chinese spirit to the world and spread the air and space culture.” Wang Tianfeng, a Chinese Air Force super pilot and captain of the Y-20, introduced that the crew did a good job In preparation for the exhibition, the Yun-20 took off from an airport in central China, flew for more than 10 hours, and flew nearly 10,000 kilometers one way to Zeltweg Airport.

During the air show, in the static exhibition area of ​​the Chinese Air Force Yun-20, the audience took pictures with the “Kunpeng”. “Thank you Chinese Air Force pilots! The badge is really beautiful, and I will keep it well.” After taking a group photo with the Y-20, a pair of father and daughter who came to visit carefully listened to Zhang Lizhi’s explanation on the relevant information of the Y-20, the The little girl was overjoyed holding the two Yun-20 badges she was given.

“‘Kunpeng’ appeared in Europe, and I felt the power of the five-star red flag even more.” Liu Wenli, the commander of the exhibition mission, introduced that the Yun-20 exhibition area was always surrounded by audiences in the past two days, and local Chinese and overseas Chinese came to watch with the five-star red flag. Exhibition to express patriotism. On social media, photos of Yun-20 were swiped, and they were praised as the “lovable and lovely Eagle of Peace”.

The Yun-20 is a military large-scale multi-purpose transport aircraft independently developed and produced by my country. In recent years, the Y-20 has traveled all over Asia, Africa, Europe and Oceania, carrying out missions such as international humanitarian relief and transnational delivery of COVID-19 vaccines. This is the first time the Y-20 went to Europe to participate in an international air show.

“When I saw ‘Kunpeng’, I burst into tears! This is our own big plane, a symbol of China’s power, and a transmission of the Chinese spirit.” An overseas Chinese who came to the exhibition couldn’t hold back his excitement and returned. Then send a message to the crew.


NSA cyber-attacks on China tens of thousands of times, stealing over 140GB of data

Northwestern Polytechnical University was attacked by the US NSA network attack report (Part 1)

On June 22, 2022, Northwestern Polytechnical University issued a “Public Statement” stating that the school suffered an overseas cyber attack. The Beilin Branch of the Public Security Bureau of Xi’an City, Shaanxi Province immediately issued the “Police Information Bulletin”, confirming that a number of Trojan samples originating from abroad were found in the information network of Northwestern Polytechnical University, and the Xi’an police have officially opened an investigation.

The National Computer Virus Emergency Response Center and 360 Company jointly formed a technical team (hereinafter referred to as the “technical team”), which participated in the technical analysis of the case throughout the process. The technical team has successively extracted a variety of Trojan samples from multiple information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used the existing domestic data resources and analysis methods, and obtained the full support of partners in some countries in Europe and South Asia to fully restore The overall overview, technical characteristics, attack weapons, attack paths and attack sources of the relevant attack events are preliminarily determined, and it is preliminarily determined that the relevant attack activities originated from the “Office of Tailored Access Operation” (hereinafter referred to as the “Special Intrusion Operation”) of the National Security Agency (NSA). TAO).

1. Overview of the attack incident

This investigation found that in recent years, TAO, a subordinate of the US NSA, has carried out tens of thousands of malicious network attacks on network targets in China, and controlled tens of thousands of network devices (network servers, Internet terminals, network switches, telephone switches) , routers, firewalls, etc.), stealing over 140GB of high-value data. TAO continues to expand the scope and scope of cyber attacks by leveraging its cyber attack weapon platform, “zero-day vulnerabilities” (0days) and the network devices it controls, etc. After technical analysis and source tracing, the technical team has now clarified the network attack infrastructure, special weapons and equipment, and techniques and tactics used in the TAO attack activities, restored the attack process and stolen documents, and mastered the information of the US NSA and its subordinate TAO on China. Evidence related to cyber attacks and data theft on the Internet, involving 13 people who directly launched cyber attacks against China in the United States, as well as more than 60 contracts signed by the NSA with U.S. telecom operators to build a cyber attack environment through cover companies. More than 170 documents.

  1. Analysis of attack events

In the cyberattack against Northwestern Polytechnical University, TAO used more than 40 different NSA-specific cyberattack weapons to continuously attack Northwestern Polytechnical University to steal its key network equipment configuration, network management data, operation and maintenance data and other core technologies data. Through forensic analysis, the technical team found that the attacker penetrated more than 1,100 attack links and operated more than 90 instruction sequences inside Northwestern Polytechnical University, and located several stolen network devices from the intruded network equipment. Device configuration files, sniffed network traffic data and passwords, other types of logs and key files, and other key details related to the attack activity. The specific analysis is as follows:

(1) Related network attack infrastructure

In order to cover its attack operations, TAO will conduct a long period of preparation before starting operations, mainly to build anonymized attack infrastructure. TAO used two “zero-day vulnerability” exploiting tools for SunOS operating system it mastered, and selected servers with a lot of network application traffic such as educational institutions and commercial companies in China’s neighboring countries as the attack target; after the attack was successful, the NOPEN Trojan was installed. Program (see related research report for details), which controls a large number of springboards.

TAO has successively used 54 springboards and proxy servers in the cyber-attack against Northwestern Polytechnical University, mainly distributed in 17 countries including Japan, South Korea, Sweden, Poland, Ukraine, etc. 70% of which are located in China’s neighboring countries, such as Japan, Korea etc.

The function of these springboard machines is limited to command relaying, that is, forwarding the springboard commands of the upper level to the target system, and thereby masking the real IP of the NSA launching the network attack. At present, at least four IP addresses of TAO’s control jumper from its access environment (US domestic telecom operator) have been mastered, which are 209.59.36.*, 69.165.54.*, 207.195.240.* and 209.118.143. *. At the same time, in order to further conceal the relationship between the springboard and the proxy server and the NSA, the NSA used the anonymity protection service of the US Register company to anonymize the traceable information such as related domain names, certificates and registrants, which cannot be accessed through public channels. make an inquiry.

Through the correlation analysis of threat intelligence data, the technical team found that the network resources used for the attack platform of Northwestern Polytechnical University involved a total of 5 proxy servers. IP addresses in places like the Netherlands and Colombia, and lease a batch of servers. The two companies are Jackson Smith Consultants and Mueller Diversified Systems. At the same time, the technical team also found that the TAO Infrastructure Technology Office (MIT) staff used the name “Amanda Ramirez” to anonymously purchase a domain name and a generic SSL certificate (ID: e42d3bea0a16111e67ef79f9cc2**). Subsequently, the above-mentioned domain names and certificates were deployed on the US-based man-in-the-middle attack platform “Foxacid” to attack a large number of network targets in China. In particular, TAO has launched multiple rounds of continuous attacks and stealing operations on Chinese information network targets such as Northwestern Polytechnical University.

(2) Related cyber attack weapons

TAO has successively used 41 kinds of NSA’s special network attack weapons and equipment in the network attack on Northwestern Polytechnical University. And during the attack process, TAO will flexibly configure the same cyber weapon according to the target environment. For example, among the cyber weapons used in the cyber attack on Northwestern Polytechnical University, only the backdoor tool “Cunning Heresy” (named by NSA) has 14 different versions. The technical team divided the categories of tools used by TAO in this attack into four categories, including:

1. Vulnerability attack breakthrough weapons TAO relies on such weapons to carry out attack breakthroughs on Northwestern Polytechnical University’s border network equipment, gateway servers, and office intranet hosts. It is also used to attack and control overseas springboards to build an anonymous network as a cover for action. There are 3 types of weapons:

① “Razor” This weapon can carry out remote vulnerability attacks on Solarise systems with X86 and SPARC architectures that open specified RPC services. When attacking, it can automatically detect the open status of the target system services and intelligently select the appropriate version of the exploit code to directly obtain the complete information on the target host. Control. This weapon was used to attack the springboards in Japan, South Korea and other countries, and the controlled springboards were used in the network attack on Northwestern Polytechnical University.

② “Island” This weapon can also implement remote overflow attacks on Solaris systems that have opened specified RPC services, and directly gain complete control over the target host. The difference from “Razor” is that this tool does not have the ability to autonomously detect the opening of the target service, and the user needs to manually configure the target and related parameters. The NSA used this weapon to attack a border server at Northwestern Polytechnical University.

③ “Sour Fox” weapon platform This weapon platform is deployed in Colombia and can be used in combination with the “second date” man-in-the-middle attack weapon. It can intelligently configure vulnerability payloads to conduct remote overflow attacks against mainstream browsers on multiple platforms such as IE, FireFox, Safari, and Android Webkit, and obtain the target system. (see: National Computer Virus Emergency Response Center “National Security Agency (NSA) “Acid Fox” Vulnerability Attack Weapon Platform Technical Analysis Report”). TAO mainly used this weapon platform to intrude the host of the office intranet of Northwestern Polytechnical University.

  1. Persistent control weapons

TAO relies on such weapons to covertly and persistently control the Northwestern Polytechnical University network. The TAO action team can send control commands through encrypted channels to operate such weapons to infiltrate, control, and steal the Northwestern Polytechnical University network. There are 6 types of weapons in this category:

①”Second date” This weapon resides on network edge devices and servers such as gateway servers and border routers for a long time, and can perform precise filtering and automatic hijacking of massive data traffic to achieve man-in-the-middle attack functions. TAO installed the weapon on the border equipment of Northwestern Polytechnical University, hijacked the traffic flowing through the equipment and directed it to the “Sour Fox” platform to carry out the vulnerability attack.

②“NOPEN” This weapon is a remote control Trojan that supports multiple operating systems and different architectures. It can receive commands through encrypted tunnels to perform file management, process management, system command execution and other operations. For details, please refer to: “NOPEN” Remote Control Trojan Analysis Report of the National Computer Virus Emergency Response Center). TAO mainly uses this weapon to implement persistent control over the core business servers and key network equipment inside the Northwestern Polytechnical University network.

③ “Rage Jet” This weapon is a Windows-based remote control Trojan that supports multiple operating systems and different architectures. It can be customized to generate different types of Trojan servers according to the target system environment. The server itself has strong anti-analysis and anti-debugging capabilities. ability. TAO mainly uses this weapon to cooperate with the “Sour Fox” platform to implement persistent control over the personal hosts within the office network of Northwestern Polytechnical University.

④ “Cunning Heresy” This weapon is a lightweight backdoor implantation tool that deletes itself after running. It has the ability to escalate privileges. It persists on the target device and can be started with the system. TAO mainly uses this weapon to achieve permanent residency, so as to establish an encrypted channel to upload the NOPEN Trojan at the right time, and ensure long-term control of the information network of Northwestern Polytechnical University.

⑤ “Stoic surgeon” This weapon is a backdoor for 4 types of operating systems, including Linux, Solaris, JunOS, and FreeBSD. The weapon can run persistently on the target device and hide the specified files, directories, processes, etc. on the target device according to the instructions. TAO mainly uses this weapon to hide the files and processes of the NOPEN Trojan and prevent it from being discovered by monitoring. A technical analysis found that TAO used a total of 12 different versions of the weapon in its cyberattack on Northwestern Polytechnical University.

3. Sniffing secret weapons

TAO relies on such weapons to sniff the account passwords and command line operation records used by Northwestern Polytechnical University staff to operate and maintain the network, and steal sensitive information and operation and maintenance data within the Northwestern Polytechnical University network. There are two types of weapons:

①”Drinking tea” This weapon can reside in a 32-bit or 64-bit Solaris system for a long time, and obtain account passwords exposed by various remote login methods such as ssh, telnet, and rlogin by sniffing inter-process communication. TAO mainly uses this weapon to sniff account passwords, command line operation records, log files, etc. generated by business personnel of Northwestern Polytechnical University when they perform operation and maintenance work, and compress and encrypt them for download by NOPEN Trojan.

② “Operation behind enemy lines” series of weapons This series of weapons is specially designed for the specific business systems of telecom operators. According to the different types of business equipment being charged, “operation behind enemy lines” will be used in conjunction with different analytical tools. TAO used three types of hacking tools against telecom operators, including “Magic School”, “Clown Food” and “Cursed Fire” in the cyber attack on Northwestern Polytechnical University.

  1. Concealed weapons

TAO relies on such weapons to eliminate traces of its behavior within the Northwestern Polytechnical University network, hide and cover up its malicious operations and stealing behaviors, and at the same time provide protection for the above three types of weapons. 1 such weapon has been found:

“Toast Bread”, this weapon can be used to view and modify log files such as utmp, wtmp, lastlog, etc. to remove traces of operations. TAO mainly used this weapon to remove and replace various log files on the alleged Northwestern Polytechnical University’s Internet access device, to hide its malicious behavior. TAO’s cyber attack on Northwestern Polytechnical University used 3 different versions of “toast”.

  1. Attack source tracing

Based on the above technical analysis results and traceability investigations, the technical team preliminarily determined that the cyber attack on Northwestern Polytechnical University was carried out by TAO (code S32) under the Data Reconnaissance Office (code S3) of the Information Intelligence Department (code S) of the National Security Agency (NSA). )department. The department was established in 1998, and its force deployment mainly relies on the encryption centers of the US National Security Agency (NSA) in the United States and Europe. The six crypto centers that have been announced so far are:

1. NSA headquarters in Fort Meade, Maryland, USA;

2. NSA Hawaii Crypto Center (NSAH), Oahu, Hawaii, USA;

3. NSA Crypto Center Georgia (NSAG), Fort Gordon, Georgia, USA;

4. NSA Crypto Center of Texas (NSAT) in San Antonio, Texas, USA;

5. NSA Coloraroo Crypto Center (NSAC) at Macley Air Force Base, Denver, Colorado, USA;

6. The NSA European Crypto Center (NSAE) at the US military base in Darmstadt, Germany. TAO is a tactical implementation unit of the U.S. government specializing in conducting large-scale cyber attacks on other countries and stealing secrets. It consists of more than 2,000 military and civilian personnel. Its internal institutions include:

The first: Remote Operations Center (ROC, code S321), mainly responsible for operating weapon platforms and tools to enter and control the target system or network.

Second Division: Advanced/Access Network Technology Division (ANT, code S322), responsible for researching related hardware technologies and providing hardware-related technologies and weapons and equipment support for TAO network attack operations.

Third Division: Data Network Technology Division (DNT, code S323), responsible for developing complex computer software tools to support TAO operators in carrying out cyber attack missions.

Fourth Division: Telecommunications Network Technology Division (TNT, code S324), responsible for researching telecommunications-related technologies and providing support for TAO operators to covertly penetrate telecommunications networks.

Fifth Division: Mission Infrastructure Technology Division (MIT, code-named S325), responsible for developing and establishing network infrastructure and security monitoring platforms for building attack action network environments and anonymous networks.

The sixth place: The Access Operations Office (ATO, code S326) is responsible for the backdoor installation of the products to be delivered to the target through the supply chain.

The seventh place: Requirement and Positioning Division (R&T, code S327), receives the tasks of various relevant units, determines the reconnaissance target, and analyzes and evaluates the intelligence value. S32P: Project Planning Integration Office (PPI, code S32P), responsible for overall planning and project management. NWT: Network Warfare Team (NWT), responsible for liaison with the Network Warfare Team.

The US National Security Agency (NSA) attack on Northwestern Polytechnical University is code-named “Stop XXXX” (shotXXXX). The operation is directly commanded by the person in charge of TAO, and MIT (S325) is responsible for building a reconnaissance environment and renting attack resources; R&T (S327) is responsible for determining the attack strategy and intelligence assessment; ANT (S322), DNT (S323), TNT ( S324) is responsible for providing technical support; ROC (S321) is responsible for organizing attack and reconnaissance operations. It can be seen that those directly involved in command and operations mainly include the head of TAO, S321 and S325 units.

The TAO director during the NSA attack on Northwestern Polytechnical University was Robert Edward Joyce. Born on September 13, 1967, this person attended Hannibal High School, graduated from Clarkson University with a bachelor’s degree in 1989, and graduated from Johns Hopkins University with a master’s degree in 1993. He joined the National Security Agency in 1989. He once served as the deputy director of TAO, and served as the director of TAO from 2013 to 2017. Beginning in October 2017 as Acting U.S. Homeland Security Advisor. From April to May 2018, he served as the White House State Security Adviser, and then returned to the NSA as a senior adviser on cybersecurity strategy to the Director of the National Security Agency. He is currently the director of NSA cybersecurity.

4. Summary

Based on the analysis results of the National Computer Virus Emergency Response Center and the joint technical team of 360 Company, this report reveals the truth that the US NSA has long been conducting cyber espionage activities against Chinese information network users and important units, including Northwestern Polytechnical University. The follow-up technical team will also release more technical details of the relevant incident investigation in succession.

More than 1,000 troops and rescue forces rushed to the earthquake-stricken area in Luding, Sichuan

Stay Strong, SICHUAN!

Xinhua News Agency, Beijing, September 5 (Reporters Liu Xin, Jia Qilong) On September 5, a magnitude 6.8 earthquake occurred in Luding County, Ganzi Prefecture, Sichuan Province. After the disaster, the armed police force, militia and other rescue forces rushed to the disaster area.

The Sichuan Armed Police Corps quickly dispatched an advance command group to direct the operations of the front-line troops. Thirty officers and soldiers of the Garzi Detachment of the Armed Police went to Detuo Township, Luding County, the epicenter of the epicenter, carrying shovels and medicines, to carry out work such as situation survey, road clearance and mass transfer. The Second Mobile Detachment of the Sichuan Armed Police Corps dispatched 95 officers and soldiers, 15 rescue vehicles such as excavators and loaders, and rushed to the epicenter with professional equipment such as life detectors and demolition tools. The Sichuan Armed Police Corps Hospital dispatched emergency medical teams and ambulances, surgical cabins, anti-epidemic decontamination vehicles and other medical equipment to carry medical supplies to Luding County to carry out emergency rescue and evacuation treatment. As of 16:00, more than 1,000 armed police officers and soldiers were dispatched to the front line of emergency rescue.

After the earthquake, Ganzi Prefecture dispatched hundreds of militiamen to the disaster area. The People’s Armed Forces Department of Luding County organized the Moxi Town Militia Emergency Platoon to carry out rescue operations. 90 militiamen from the Luding County Militia Emergency Company rushed to Detuo Township, which was severely affected by the disaster, and more than 200 militiamen from other towns and towns were successively involved in the disaster relief.

The senior of a certain brigade of the PLA Rocket Army is inspired to boost the morale of the army

A Brigade of the Rocket Army

Inspiration from the ancestors to boost the morale of the army

People’s Liberation Army Daily reported that Xin Peihu and Feng Chenyang reported: In mid-August, a theatrical performance team of a certain brigade of the Rocket Army went to the field training ground of the brigade to perform a military-themed melodrama written and directed by itself. The play vividly reproduces the growth experience of some revolutionary ancestors and the classic battles they participated in, providing rich spiritual food for the officers and soldiers stationed in training.

“The heroism of the revolutionary ancestors has a strong appeal, which can boost the morale of the army and inspire the spirit of martial arts.” The leader of the brigade introduced that the current army is at a critical stage of transformation and construction. During the period of change and adjustment, morale did not drop. They cooperated with the resident Revolutionary Memorial Hall, local theaters and other units to select literary and artistic backbones to create and perform a variety of literary and artistic programs, and carried out regular education in the form of officers and soldiers, and achieved good results.

“Only by training hard and enhancing our skills can we live up to the bloodshed of our ancestors!” Yuan Youcheng, an instructor of a company of the brigade, was born in an old revolutionary base area, and the melodrama performed by the theatrical performance team deeply touched him. After the performance, Yuan Youcheng organized a series of cooperation activities in the company, which effectively stimulated the motivation of the officers and soldiers to train.

On this basis, the brigade also organized officers and soldiers to visit the red venues, recorded a series of micro-lectures on red stories, and guided the officers and soldiers to transform the motivation stimulated by the visit into the enthusiasm for training and preparing for war, and sang the song of a strong army on the training ground. fire of faith.

The spirit of the revolutionary ancestors will live forever, and inspire the younger generation to forge ahead. In the past few days, the brigade has organized a series of intensive training for newly transferred officers and soldiers.

On the way to the war, the theatrical performance team went to the front line to condolence to the officers and soldiers. After watching the performance, the newly transferred officers and soldiers were very excited, and they all said that they would stand on their posts and be strong in martial arts.

















“在很多情况下,沙特阿拉伯在供货名单的排序上要领先于台湾。”威斯康星州共和党众议员加拉格尔这样告诉《防务新闻》。而在洛克希德·马丁公司 F-16 战机的生产供货序列里,几个中东和东欧国家均领先于台湾。2019年,美国国务院批准以80亿美元的价格向台湾出售 66架F-16,但台北方面预计要到2026年才能收到这些战机。





















美官员:两艘美军舰正通过台湾海峡 截至发稿时穿越台湾海峡行动“仍在进行中”


执行穿越海峡任务的是两艘提康德罗加级巡洋舰,分别是“钱瑟洛斯维尔”号(CG-62)和“安提坦”号巡洋舰(CG-54) ,路透社在发稿(北京时间10点半)时表示,穿越台湾海峡行动“仍在进行中”。


此前8日,美国国防部负责政策事务的副部长科林·卡尔(Colin Kahl)声称对于解放军的军演,美方“不会上钩”。他还放话称,美军将在未来几周内穿行台湾海峡。