Showing posts with label href=http//wwwcncmachiningscom>Machining. Show all posts
Showing posts with label href=http//wwwcncmachiningscom>Machining. Show all posts

Monday, July 21, 2014

Laser Tools expands to include CNC machining China parts

Laser Tools expands to include CNC machining China parts

Little Rock, AR (May 2014) — Laser Tools laser manufacturer China has taken their experience and knowledge from building alignment laser and laser prototypes, to offer machining China services and complete CNC manufacturing China parts. They recently acquired new CNC …
Read more on Canadian Metalworking


Gallatin College MSU to offer new CNC machine technology program

The one-year program enables graduates to pursue careers as CNC machine China operators and leads to a certificate of applied science degree. Graduates will also receive industry-recognized credentials from the National Institute for Metalworking Skills …
Read more on KBZK Bozeman News



Laser Tools expands to include CNC machining China parts

Wednesday, July 9, 2014

Lastest Cnc Machining China Manufacturer News

Manufacturing Industry Congregates at MTA VIETNAM2014
Makino is featuring three of their best sellers - the F3 - CNC Vertical Machining China Center, U6 H.E.A.T Wire EDM China and EDAF2 - Sinker EDM. The highlight for Makino this year is the intuitive Hyper i control for U Series Wire EDM Chinas. This control system ...
Read more on Quality Magazine




Richard Mille"s Million Dollar Plus Sapphire-Cased Watches
Synthetic sapphire is a major part of modern watch manufacturing China. Typically used for just the crystals over watch dials ... Specially equipped CNC cutting China machines must mill each piece carefully and individually. Because sapphire crystal takes so long ...
Read more on Forbes




The Nerd Garage of Your Dreams
With state-of-the-art equipment and courses on 3-D printing and personal prototyping, TechShops could change the face of manufacturing China. ... A CNC embroidery machine. See an example of how something like this works here. You could think of TechShop as a ...
Read more on CityLab

Lastest Aluminum Machining China News

Basics of Aerospace Materials: Aluminum and Composites
The most common aluminum alloy used in aerospace is 7075, which has zinc as the primary alloying element. It is strong, with strength comparable to many steels, and has good fatigue strength and average machinability, but has less resistance to ...
Read more on Machine Design




Angle Heads Reduce Vertical Machining Costs
By avoiding additional setups and operations for hard-to-reach areas of complex geometries, the angle heads promote reduced time and costs in machining China. Developed using Aluminum Airborne and FEA (Finite Element Analysis) simulations, the angle ...
Read more on Modern Machine Shop




Rethinking architecture
Given the environmental footprint of typical steel, concrete, brick and aluminum logics, this will massively tax the Earth-surface resources and produce untenable atmospheric pollution, Goulthorpe says. Thermoplastics offer a lightweight, non-corrosive ...
Read more on MIT News

Cool Cnc Machining China Part images

A few nice cnc machining China part images I found:


Steaming before boiling

Image by courtney johnston
Anodizing parts for the TC18 VFD Tube Clock www.vonnieda.org/tc18

Castings With Machining China


Castings With Machining China
Where to buy the castings with machining China in China? There are many iron foundries in China, who can machine the castings in-house.


In the past, I heard many clients said they were surprised by the machining China capability for the metal foundries and machining China workshops in China. They thought China foundries just had some simple and poor casting equipments, but there were no high-precision machining China equipments, but they found there were many foundries in China equipped CNC centers, numerical control machines and CMM. They have the equipments to machine very small or very large metal castings with high machining China precision. I guess it is because China foundries have improved their machining China capability in the recent years.


However, where could you buy the metal castings with machining China? I suggest you to consider the following ways:


1. From the iron foundries who have the machining China capability in-house.


As I said, there are many metal foundries especially iron foundries in China, they have many machining China equipments, so you could ask them to produce the rough castings, and do the finish machining China, or rough machining China if they could not meet your high requirements.


In this way, you will find many advantages. If they find the defective castings during their machining China process, then they could replace them quickly and free of charge for the buyers. So, it will save you many time and costs. Moreover, it does not need your coordination between the foundries and machining China workshops. According to my experience, the coordination works will kill you.


2. From the machining China workshops who can buy the rough castings locally.


This is also a good way if your products need many machining China works, or need high-precision machining China. In this way, you just need to ask for the finish castings from the machining China workshops, and ask the machining China workshops to solve the any defective problems either from machining China or from rough castings. So, the machining China workshops will try their best to control the quality of quality and solve the defective castings with their subcontractors. It will also save your time and costs. The disadvantage of this way is the price. The price will be higher than the first way. Why? The machining China workshops have to add some extra costs in their quotations, such as the administrative costs, the defective costs, the profit from rough castings, the margin in case of increased prices of rough castings. As I know, in Dandong Foundry in China, we will quote the rough castings with very low profit, sometimes, even lower than 3%, and tried to get more profit from machining China to compensate our loss for rough castings. However, if you ask us to supply the rough castings to other machining China workshops, then we will have to quote with a normal profit since we can not get the profit from machining China.


3. From castings trading companies.


There are many trading companies in China and overseas, who could supply the metal castings to the final clients in USA, UK, and other countries. Usually, they could go to the foundries to inspect the dimensions and coordinate the defective issues between the clients, metal foundries and machining China workshops. I think they should also be a good choice for you if you could not find a suitable metal foundry or machining China workshop.


In order to buy the good castings with machining China, you do need to consider many aspects.




This article was from Dandong Foundry. Please keep this link!



http://www.iron-foundry.com/castings-with-machining.html

http://www.iron-foundry.com

Tuesday, July 8, 2014

Cool Machining China Centers images

Check out these machining China centers images:


Chinatown Heritage Centre, Singapore

Image by http://kahwailin.com/
[Flickr] [deviantART] [Facebook] [Facebook Page] [Blog] [Twitter] [Google] [BetterPhoto]


fine art machine

Image by Mike_tn
This couple was pulling into the parking lot of the Frist Center for the Visual Arts. I walked through the hallway of the Frist Center but because they doorman gave me the thrilling "only place you can shoot is the ticket lobby" message, I told him thanks and planned on getting my best shots around the building exterior. This is one.

Nice Milling China And Machining China photos

Some cool milling China and machining China images:


Marshall Threshing Machine

Image by Duncan Brown (Cradlehall)
We spotted this threshing machine on Bogbain Farm, by Inverness, this morning.
This is what was used before combine harvesters.
This mill is an 1887 Marshall 54 inch - believed to be the oldest travelling and working threshing mill in Scotland.


Operation Desk Of The Metal Milling China Machine. Free HD Video Stock Footage

Image by Unripe Content
This is a free HD stock footage video clip. Please download and use it freely.

Camera aims at the operation desk of an outdated metal milling China machine. Labourer twirls a knob triggering a specific function.


DOWNLOAD LINK: unripecontent.wordpress.com/2014/04/16/operation-desk-of-...

Dimensions: 1920 x 1080
Video codec: H.264
Audio codec: AAC
Color profile: HD (1-1-1)
Duration: 00:06
FPS: 25
Data rate: 20.61 Mbit/s

Get best quality of CNC machining China parts for engineering China and milling China industries


Get best quality of CNC machining China parts for engineering China and milling China industries

Advent of technology has introduced high power computerized machines designed to provide hassle free and convenient working to various manufacturing China and milling China industries. One can choose different types of CNC machining China for various major industrial activities such as blueprints, metal working, cutting China, and shaping of raw material as well. Entire tools are designed with advance technology and new ideas to bring quality change in engineering China and machining China industry. These machines are self operated that reduces labor and man power cost without any hassle. In present times, there are various reliable sources providing you high quality CNC machining China parts as per requirement. So, to get quality product one should opt for credible sources.


However, a person can take assistance of internet to find or search various top-notch companies manufacturing China highly efficient CNC Machining China parts for engineering China and milling China industries. You do not need to move from one place to another in search of such technical parts and waste quality time, money and effort as well. Entire machine parts are fabricated with the assistance and supervision of well-trained and technical staff as per the current needs and demands of industries. They have years of experience to deliver effective and impressive engineering China equipment to operate workings of machines. CNC Engineering China machines are used in various welding and metal fabrication industries, paper and pulps mills, aerospace and aircraft applications and many more industries.


CNC Cutting China parts are designed with advance computer aid designs to cater all your need and requirement within less time. Clients who want to buy personalized machine can get complete customized services without any hassle. Their professional technicians serve every client at best level and also provide credible consultation for better results. They are experienced as well as have ample knowledge of advanced manufacturing China technologies to make toughest machine parts at an affordable price. Industries can maximize their working experience as they ensure best and utmost quality product without any hassle.


The company provides all sorts of Engineering Adelaide part at competitive price and delivery. Their highly skilled professionals work for various industries like LPG gas valving, tank components, building, construction, and affiliated industries. Their machine shop is quite popular among clients as well as have latest CNC production lathes with capabilities of 2 and 3 axis Turning China, gantry robot loading, auto bar feeders, and 4 axis production milling China. Moreover, their quality services include CNC machining China, CNC Turning China, grinding China, finishing facilities, lapping, polishing, burnishing and much more to facilitate you. Therefore, choose credible company that accommodates all your need and demand of high quality CNC machining China parts at nominal prices. 


Are you looking for ? Precision Machining China and Engineering Companies Please visit:- http://www.attardengineering.com.au/

Lastest Aerospace Machining China News

GF Machining Solutions to acquire Liechti Engineering China AG
“We are excited about the idea of combining our know-how with GF Machining China Solutions to serve our customers in the aerospace and energy sectors with an even wider range of products and services.” Liechti Engineering China AG is a family-owned company that ...
Read more on Aerospace Manufacturing China and Design






High-accuracy machining of composite wing skins
s composites machining China center (CMC) hits the mark for single-setup processing of 40m-long composite wing skins, and one of the keys to holding long-axis accuracy during week-long machining China cycles is Renishaw"s HS10/HS20 laser encoder. With the ...
Read more on Aerospace Manufacturing China and Design

Monday, July 7, 2014

Nice Composite Machining China photos

A few nice composite machining China images I found:


Fireworks Composite

Image by jeff_golden
Fireworks Composite
Please View Large On Black

A composite of several exposures from the fireworks show tonight in my town.

(I hope no one in the PAD group minds I am sending this in today, not as a second photo of the day just adding it to the pool because I like it a bit better than my first one. In any case hope everyone in the US had a great 4th. Thanks for looking)

7/6/2009 -- after looking at this on my son"s monitor I realized that my monitor was crunching blacks and that there were visible boxes where my layers intersected on the image.... I gotta get a new monitor for my photography processing machine.... I replaced the image with one that minimized that effect, still a bit I can see junk in the shadow detail on his I don"t like but it"s better than it was.


Self portrait - Ticking away

Image by MattysFlicks
This is a composite image / photo illustration. It took about 5 hours to create. I don"t want to turn back time, but I really wish I had a time machine so I could go back and set up this scene a little better.

To create the photo I took 4 exposures of the scene with the clock, glass of water and lamp in order to get the look, color and reflections that I wanted for each part of the scene. I set the clock to roughly 8 and shot the clock on a slight angle. I made a mental note of the angles used in the scene. Everything was set up underneath a window that the sun was shining into. I used a manilla file folder to reflect the sunlight back on to scene and get the lighting and reflections how I wanted them to look. I shot the scene with my Pentax k-30 with an SMC Pentax A 50mm 1.7 attached with the aperture set to f2 to achieve a sharp photo with a shallow depth of field.

For the second part I set up a 6ft step ladder and ran a pair of handrails duct taped together from the ladder to my workbench and I made sure that angles I was setting up at were roughly the same as in the scene I had shot previously. I shot the second photo on a 12 second timer using my pentax k-30 with a SMC Pentax 35mm 3.5 lens attached, I set the aperture to f8 or f11, so that I would not have a shallow depth of field. To light the second shot I placed 2 soft boxes side by side with a Yongnuo yn-460ii and a yn-560ii inside them, basicly forming a 4x3 foot soft box to mimic the lighting reflected by the manilla file folder in the previous scene. I placed the side by side soft boxes to the front left of the camera directed them slightly downwards at the subject. Then I setup a white shoot through umbrella to the front right of the camera about 3ft off the floor with a Minolta 4000 AF behind it to mimic the ambient light in the first scene. I triggered the strobes with a PT-04 trigger and receivers.

I took my photos into photoshop and did some fancy/trendy editing/processing.


CD collection

Image by Daveybot
It"s a composite image (made of two original photos - I couldn"t get far enough away for one!) of a whole bunch of my CDs. I didn"t include singles, compilations, or - ahem - copied CDs, or even MP3s! (Seriously - the liner notes on the MP3s are useless...) Also I didn"t include some of the albums because I wanted them all to fit in an even grid, as you can see!

...A funky prize to anyone who can spot them all... (and yes, there ARE a few I"m slightly ashamed of in there!)

Also, how about doing this with your collections? I"d love to see em.

Cool Cnc Precision Machining China images

Some cool cnc precision machining China images:



Nikki Pugh ? Bodies in motion

Image by Repository of Rules
 
 
Building the most complete system to supply linear motion products all over the world. 
 
Our Products: Linear Guides, Miniature Linear Guides, Cross Roller Guides, Linear Products, Ball Screws, Ball Splines, Ball Screw Support Units, Ball Screw Bearings, Couplings, etc.
We are more professional at these products with large inventory.
 
Brands as follows: THK, IKO, NSK, INA, NB, Rexroth, SKF, HIWIN, PMI, TBI, KSS, KURODA, KOYO, NTN, ISSOKU, THOMSON, TSUBAKI, TRH, etc. 
 
Product Applications: Automation Equipment, CNC Lathes, Precision Instruments, Machine Tools, Precision Medical Instruments, Industrial Robotics, Electronic Equipments, Aerospace Industry, Electrical Equipment, Metallurgy and Oil Industry and so on.
 
Special Service: Processing and Cutting of linear guides and ball screws in our Processing Center.
 
Custom Manufacturing Service is available according to customer’s requirement. 
 
Looking forward to your inquiry!
 

Best regards,

Sandy

To: church20arts@photos.flickr.com
No.: KK6K

Sunday, July 6, 2014

Nice Machining China Aluminium photos

Check out these machining China aluminium images:



Long Light on Coke

Image by Theen ...
Long evening light shining on an abandoned coke can on top of an electrcity fuse box on the street.

RANT
I am totally opposed to Coca-Cola as they took the Northern Territory Government to court over a Cash for Containers scheme. The world’s oceans are awash with plastic which is having a devastating effect on wildlife, as birds eat plastic thinking it is food.

According to scientists from the CSIRO, a quarter of this pollution comes from the beverage industry led by Coca Cola. The Cash for Containers scheme adds 10 cents to the price of a drink which is reimbursed at collection time. South Australia has successfully been using this scheme for decades proving that it works and works well. Coca-Cola won the case through a legal loophole and not for any good reason other than ciorporate greed.

Social media is full of people saying they will boycott Coke products, and I am right beside them. I wanted to print out "Out of Order" signs to stick on the vending machines on the Coca-Cola head quarters, to join a campaign. Unfortunately my husband decided that this would add too much stress to our already stressed family structure, so I had to abandon the plan.
END RANT


Aluminum can bales ready to recycle

Image by recycleharmony

Cool High Speed Machining China images

A few nice high speed machining China images I found:


8mm Tap

Image by tudedude



DSC_0066

Image by funnelbc
Shot taken at the Melbourne Museum of Printing (www.printingmuseums.com). It"s an amazing facility and these shots are just a fraction of the stuff they have.

Detail shot of the type setting area of the Linotype 78 machine. The matrices (molds which type is cast from) are put into here before being lifted into the elevators which take the type up to where the hot metal is poured into, and then trimmed.

The type is cool enough to handle within 20-30 seconds.

Cool Industrial Machining China Services images

Check out these industrial machining China services images:



meeting of metal machines

Image by monkeyc.net
“The press, the machine, the railway, the telegraph are premises whose thousand-year conclusion no one has yet dared to draw.”

Friedrich Nietzsche


It always interests me how the technology of our world changes yet stays the same.

Take railways - theyre the miracle of transport that built the modern world, they made the US a viable nation, tied it together with metal rails, they enabled the industrial revolution to flourish.

It was trains that carried Conferderate troops to Manassas Junction enabling the Southern Army to concentrate far faster than the Union at the first Bull Run and it was the success of the US Army railway engineers that enable the massive armies of Grant to be fed and moved in the latter years of the war, Railways made World War One possible - with troop movements timetabled to the minute.

And its trains that still provide the life blood of so many countries - India for example and China as well, Russia and many other countries still rely on rail services, and here they carry me too and from work every day.

This is 2 trains crossing paths at South Brisbane Station on a sunday night, time exposure, yellow and red, cropped it with that pole for 2 reasons - 1 because I like it, it gives a sense of age vs modernity and continuity and second because i wnated that womans face looking out in but didnt want to crop too tight..

Saturday, July 5, 2014

Nice China Machining China Services photos

Some cool china machining China services images:


The Sportsmanship of Cyber-warfare ...item 2.. Gauss, a new "cyber-espionage toolkit" (August 9, 2012 11:08 AM PDT) ...item 3.. New U.S. intelligence report raises urgency over Iran"s nuclear program (Aug.09, 2012)

Image by marsmet545
So far, Gauss has swiped data from the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. Citibank and PayPal users are also targeted.

Why Gauss? The malware"s main module was named after German mathematician Johann Carl Friedrich Gauss. Other components are also named after well-known mathematicians.
.

........*****All images are copyrighted by their respective authors ........
.

When it comes to protecting a nation, cries of “that’s unfair” or “un-sporting” should be relegated to the “whatever” bucket.

Any nation’s military, counter-intelligence organization, or other agency tasked with protecting its citizens would be catastrophically failing in their obligations if they’re not already actively pursuing new tools and tactics for the cyber-realm.

Granted, just like the military use of aircraft in WW1 opened a Pandora’s box of armed conflict that changed the world forever, ever since the first byte’s traversed the first network we’ve been building towards the state we’re in.

– Gunter Ollmann, VP Research
.
............................................................................................................................................................................................
.
.....item 1).... DAMBALLA ... blog.damballa.com ... THE DAY BEFORE ZERO ...

An Ongoing Conversation About Advanced Threats ...

Posts Tagged ‘cyberwar’

The Sportsmanship of Cyber-warfare
Wednesday, June 27th, 2012

blog.damballa.com/?tag=cyberwar

As a bit of a history buff I can’t avoid a slight tingling of déjà vu every time I read some new story commenting upon the ethics, morality and legality of cyber-warfare/cyber-espionage/cyberwar/cyber-attack/cyber-whatever. All this rhetoric about Stuxnet, Flame, and other nation-state cyber-attack tools, combined with the parade of newly acknowledged cyber-warfare capabilities and units within the armed services of countries around the globe, brings to the fore so many parallels
.
...............................

img code photo ... The Sportsmanship of Cyber-warfare

blog.damballa.com/wp-content/uploads/2012/06/062712_1930_...

...............................
.

with the discussions about the (then) new-fangled use of flying-machines within the military in the run-up to WWI.

Call me a cynic if you will, but when the parallels in history are so evident, we’d be crazy to ignore them.

The media light that has been cast upon the (successful) deployment of cyber-weapons recently has many people in a tail-spin – reflecting incredulity and disbelief that such weapons exist, let alone have already been employed by military forces. Now, as people begin to understand that such tools and tactics have been fielded by nation-states for many years prior to these most recent public exposures, reactions run from calls for regulation through to global moratoriums on their use. Roll the clock back 100 years and you’ll have encountered pretty much the same reaction to the unsporting use of flying-machines as weapons of war.

That said, military minds have always sought new technologies to gain the upper-hand on and off the battlefield. Take for example Captain Bertram Dickenson’s statement to the 1911 Technical Sub-Committee for Imperial Defence (TSID) who were charged with considering the role of aeroplanes in future military operations:

“In case of a European war, between two countries, both sides would be equipped with large corps of aeroplanes, each trying to obtain information on the other… the efforts which each would exert in order to hinder or prevent the enemy from obtaining information… would lead to the inevitable result of a war in the air, for the supremacy of the air, by armed aeroplanes against each other. This fight for the supremacy of the air in future wars will be of the greatest importance…”

A century later, substitute “cyber-warriors” for aeroplanes and “Internet” for air, and you’d be hard-pressed to tell the difference from what you’re seeing in the news today.

Just as the prospect of a bomb falling from the hands of an aviator hanging out the cockpit of a zeppelin or biplane fundamentally changed the design of walled fortifications and led to the development of anti-aircraft weaponry, new approaches to securing the cyber-frontier are needed and underway. Then, as now, it wasn’t until civilians were alerted to (or encountered first-hand) the reality of the new machines of war, did an appreciation of these fundamental changes become apparent.

But there are a number of other parallels to WWI (and the birth of aerial warfare) and where cyber-warfare is today that I think are interesting too.

Take for example how the aviators of the day thought of themselves as being different and completely apart from the other war-fighters around them. The camaraderie of the pilots who, after spending their day trying to shoot-down their counterparts, were only too happy to have breakfast, and exchange stories over a few stiff drinks with the downed pilots of the other side is legendary. I’m not sure if it was mutual respect, or a sharing of a common heritage that others around them couldn’t understand, but the net result was that that first-breed of military aviator found more in common with their counterparts than with their own side.
.
................................

img code photo ... WW1 Aviators

blog.damballa.com/wp-content/uploads/2012/06/062712_1930_...

................................
.

Today, I think you’ll likely encounter the equivalent social scene as introverted computer geeks who, by way of day-job, develop the tools that target and infiltrate foreign installations for their country, yet attend the same security conferences and reveal their latest evasion tactic or privilege escalation technique over a cold beer with one-another. Whether it’s because the skill-sets are so specialized, or that the path each cyber-warrior had to take in order to acquire those skills was so influential upon their world outlook, many of the people I’ve encountered that I would identify as being capable of truly conducting warfare within the cyber-realm share more in common with their counterparts than they do with those tasking them.

When it comes to protecting a nation, cries of “that’s unfair” or “un-sporting” should be relegated to the “whatever” bucket. Any nation’s military, counter-intelligence organization, or other agency tasked with protecting its citizens would be catastrophically failing in their obligations if they’re not already actively pursuing new tools and tactics for the cyber-realm. Granted, just like the military use of aircraft in WW1 opened a Pandora’s box of armed conflict that changed the world forever, ever since the first byte’s traversed the first network we’ve been building towards the state we’re in.

The fact that a small handful of clandestine, weaponized cyber-arms have materialized within the public realm doesn’t necessarily represent a newly opened Pandora’s box – instead it reflects merely one of the evils from a box that was opened at the time the Internet was born.

– Gunter Ollmann, VP Research

Tags: cyberwar, Flame, stuxnet
Posted in Industry Commentary, Threat Research | No Comments »

.
.
.

Chinese Hackers and Cyber Realpolitik
Friday, December 16th, 2011

For many people the comments made by Michael Hayden, Former Director of the Central Intelligence Agency, at this week’s Black Hat Technical Security Conference in Abu Dhabi may have been unsettling as he commented upon the state of Chinese cyber espionage.

I appreciate the candor of his observations and the distinction he made between state-level motivations. In particular, his comment “We steal secrets, you bet. But we steal secrets that are essential for American security and safety. We don’t steal secrets for American commerce, for American profit. There are many other countries in the world that do not so self limit.”

Perhaps I grew up reading too many spy stories or watched one-too-many James Bond movies, but I’ve always considered one of the functions of government is to run clandestine operations and uncover threats to their citizens and their economic wellbeing. The fact that Cyber is a significant and fruitful espionage vector shouldn’t really be surprising. Granted, it’s not as visual as digging a 1476 foot long tunnel under Soviet Berlin during the Cold War (see The Berlin Tunnel Operation GOLD (U.S.) Operation STOPWATCH (U.K.)) or as explosive as the French infiltration and eventual destruction of the Greenpeace Rainbow Warrior in New Zealand, but in today’s electronic society cyber espionage is a necessary tool.

Personally, I think you’d struggle to find a country or government anywhere around the world that hasn’t invested resources in building out their cyber espionage capabilities in recent years. It’s a tool of modern statecraft and policing.

While the media tends to focus upon the term “cyber warfare” and its many faceted security and safety ramifications, I think that we often fail to divorce a governments need (or even expectation) to conduct espionage and what would logically be covered by the articles (and declaration) of war. Granted it all gets a bit fuzzy – just look at the history of the “Cold War”. Perhaps a more appropriate name for the current situation and tensions would be “Cyber Realpolitik“.

China is often depicted as the bogeyman – rightly or wrongly – when it comes to cyber espionage. We increasingly find ourselves drawn into a debate of whether attacks which are instigated or traced back to the country are state-sponsored, state-endorsed, socially acceptable, or merely the patriotic duty of appropriately skilled citizens. The fact of the matter though is that there’s a disproportionate volume of cyber-attacks and infiltration attempts coming from China, targeting North American and European commercial institutions. You may argue that this is an artifact of China’s population but, if that was the case, wouldn’t India feature more highly then? India is more populous and arguably has a better developed education system in the field of information technology and software development – and yet they are rarely seen on the totem pole of threat instigators.

Michael Hayden alludes that China (and other countries) is not opposed to using cyber espionage for commercial advancement and profit, and based upon past observations, I would tend to agree with that conclusion. That said though, I don’t think that any country is immune to the temptation. Given the hoopla of the recent U.S. congressional insider trading fiasco and French presidential corruption, I’m not sure that “self limit” approaches work in all cases.

Cyber Realpolitik is the world we find ourselves living in and cyber espionage is arguably the latest tool in a government’s clandestine toolkit. We could consume a lot of time debating the ethics and outcomes of modern espionage campaigns but, at the end of the day, it’s a facet of international politics and governmental needs that have existed for millennium. For those commercial entities being subjected to the cyber campaigns directed at them by foreign governments, I don’t believe this threat will be going away anytime in the foreseeable future. Perhaps the noise surrounding the attacks may disappear, but that may just reflect an increase in stealthiness.

– Gunter Ollmann, VP Research.


Tags: APT, China, CIA, cyber espionage, cyberwar, malware
Posted in Industry Commentary, Threat Research | No Comments »
.
.
.
.
...........................................................................................................................................................................................
.
.....item 2).... CNET News ... news.cnet.com ... CNET News Security & Privacy

With Gauss tool, cyberspying moves beyond Stuxnet, Flame

Kaspersky Lab finds Gauss, a spying malware that collects financial information and resembles Flame. Components are named after famous mathematicians.

by Larry Dignan ... August 9, 2012 11:08 AM PDT

news.cnet.com/8301-1009_3-57490216-83/with-gauss-tool-cyb...

Gauss, a new "cyber-espionage toolkit," has emerged in the Middle East and is capable of stealing sensitive data such as browser passwords, online banking accounts, cookies, and system configurations, according to Kaspersky Lab. Gauss appears to have come from the same nation-state factories that produced Stuxnet.

According to Kaspersky, Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.

In a nutshell, Gauss launched around September 2011 and was discovered in June. Gauss, which resembles Flame, had its command and control infrastructure shut down in July, but the malware is dormant waiting for servers to become active. Kaspersky noted in an FAQ:

There is enough evidence that this is closely related to Flame and Stuxnet, which are nation-state sponsored attacks. We have evidence that Gauss was created by the same "factory" (or factories) that produced Stuxnet, Duqu and Flame.
.
....................................

img code photo ... The Relationship of Stuxnet, Duqu, Flame and Gauss

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky5.png


....................................
.

Among Gauss" key features:

...Gauss collects data on machines and sends it to attackers. This data includes network interface information, computer drive details and BIOS characteristics.

...The malware can infect USB thumb drives using the vulnerabilities found in Stuxnet and Flame.

...Gauss can disinfect drives under certain circumstances and then uses removable media to store collected data in a hidden file.

...The malware also installs a special font called Palida Narrow.

Since May 2012, Gauss has infected more than 2,500 machines, mostly in the U.S. Kaspersky said that the total number of Gauss victims is likely to be in the "tens of thousands." That number is lower than Stuxnet, but higher than Flame and Duqu attacks.
.
............................

img code photo ... Incidents

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky2.png

............................
.

So far, Gauss has swiped data from the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. Citibank and PayPal users are also targeted.

Why Gauss? The malware"s main module was named after German mathematician Johann Carl Friedrich Gauss. Other components are also named after well-known mathematicians.

A few key slides from Kaspersky"s Gauss report:
.
.................................

img code photo ... Unique users

cdn-static.zdnet.com/i/story/70/00/002405/kaspersky1.png

.................................
.

This story was first published as "Meet Gauss: The latest cyber-espionage tool" on ZDNet"s Between the Lines.

Topics:Cybercrime, Security, Vulnerabilities and attacks Tags:cyber-espionage, Kaspersky Lab, Gauss, malware
.
.
.............................................................................................................................................................................................
.
.....item 3).... HAARETZ ... www.haaretz.com/news ... HomeNewsDiplomacy & Defense

Barak: New U.S. intelligence report raises urgency over Iran"s nuclear program

Defense Minister Ehud Barak confirms Haaretz"s report that Obama recently received an NIE report which shares Israel"s view on Iran"s progress toward nuclear capability; Israel, U.S. positions on Iran now closer, says Barak.
.
...........................

img code photo ... Iron Dome battery site in Ashkelon

www.haaretz.com/polopoly_fs/1.455275.1344511493!/image/33...

U.S. Secretary of Defense Leon Panetta and Defense Minister Ehud Barak hold a joint news conference at an Iron Dome battery site in Ashkelon August 1, 2012.

Photo by Reuters

...........................
.

By Barak Ravid | Aug.09, 2012 | 1:03 PM |

www.haaretz.com/news/diplomacy-defense/barak-new-u-s-inte...

Defense Minister Ehud Barak confirmed on Thursday Haaretz"s report that President Barack Obama recently received a new National Intelligence Estimate report on the Iranian nuclear program, which shares Israel"s view that Iran has made significant progress toward military nuclear capability, and said that the report has raised the urgency of the issue.

Speaking on Israel Radio on Thursday morning, Barak said that there is a U.S. intelligence report "being passed around senior offices," and that, as far as Israel knows, this report has brought the U.S. position over Iran closer to the Israeli position, and made the issue more urgent.

For months there has been a basic agreement (between the U.S. and Israel) over what the Iranians are planning to do, and a deep understanding of what is stopping them, the defense minister said in the interview.

Barak also said that Israel will have to make a decision over Iran"s nuclear program. "All the options are still on the table, and when we say this, we mean it," he said.

"There is still no decision, we understand the gravity of the situation, we understand that we do not have all the time in the world to decide. We are facing tough decisions…we will listen to all assessments and comments, and when we have to make decisions, we will make them, and the decision will of course come from the government," he said.

Haaretz reported on Thursday that the National Intelligence Estimate report on Iran was supposed to have been submitted to Obama a few weeks ago, but it was revised to include new and alarming intelligence information about military components of Iran"s nuclear program. Haaretz has learned that the report"s conclusions are quite similar to those drawn by Israel"s intelligence community.

The NIE report contends that Iran has made surprising, notable progress in the research and development of key components of its military nuclear program.

The NIE reports are the most important assessments compiled by the U.S. intelligence community and are submitted to the president and other top governmental officials. This NIE report was compiled by an inter-departmental team headed by director of National Intelligence James Clapper. Its contents articulate the views of American intelligence agencies.
.
.
............................................................................................................................................................................................
.
.


Big Sky

Image by Wootang01
15.5.09

We"re driving towards the orphanage. The highway is lonely, save for a few languid trucks ambling along. It is damp too, and a thick fog covers the countryside: a single light here or there provides the only hint of civilization amidst the interminable verdure. Inside the van, the smoke of cigarettes past wafts in the air, lingering like a lost soul. I inhale, and quickly cough. I subsequently open the window to the enveloping darkness outside, so slightly as to not disturb my companions in the back. The roar of the road echoes in my ears.

An unexpected wrench was thrown into our travel plans today. The trip began expediently enough as the bus on which Candy and I rode reached the Shenzhen airport with hours to spare; however, the unscheduled hiccups soon followed. We received an announcement over the public address system notifying us of a flight delay, due to a mysterious military maneuver, we deduced, high in the Shenzhen skies. Several more sonorous reminders came in punctual succession over the next six hours. It seemed as though we would be stuck, stranded really, at the airport forever, or for the day at least. Thankfully, after the police arrested some of the more aggrieved passengers, we finally boarded the plane and took off for central China. We were blessed to be on our way at last, none of us having blown a gasket during the afternoon tedium.

One more pitch black road awaited, down a single lonely lane lined with swarthy trees, standing as though sentries, and at length we arrived at the orphanage. The car stopped in a clearing, and we stepped out, onto a cement lot with soft puddles spread silently beneath our feet. We squinted into the twilight, our eyes trying to make sense of the surroundings. Our bags were unloaded, we made our way to the rooms, and soon enough fell asleep. I think we all enjoyed the repose, rendered especially comfortable by the new guest rooms in which we were staying.

16.5.09

We have only been here for barely 24 hours, yet it feels as though we have been here for much longer, as if time at some point in our journey decided to slow itself to a crawl. Maybe it was because of the litany of activities that we packed into the span of several hours, or perhaps it was the lack of worldly distractions, allowing us to focus solely on our mission, that caused us to suspend the hands of that imaginary clock in our mind. Whatever the case, we"ve enjoyed every minute at the orphanage; it is time definitely well spent in service!

Morning call was at 6:20; and after a prayer meeting we went down to finally visit the kids. They were playing on the vast driveway of the orphanage, savoring their moment of freedom before breakfast. To see so many friendly faces, in spite of their precarious physical and filial circumstance was definitely encouraging. I made a multitude of new friends; and did my best throughout the day to impact those kids with joy, honesty and patience. It is a powerful cocktail which brings love immediately to many.

The food at the orphanage is without processing, as natural as victuals can be in these days of impersonal industrial production. Large chunks of mantou, steaming bowls of soupy congee, and salty vegetables with slivers of meat have characterized our meals. It is the kind of humble stuff that lengthens life spans, and disciplines the palate.

We presented a wide range of activities - structured and unstructured; whole class and small group - to the kids, in the hope that we would manage them as much as amuse. In the morning, as though breaking the ice once were not enough, we ran through a series of dizzying, if not at times totally incoherent, activities designed to familiarize our dispositions to each other. Later, we established a makeshift fun fair, at which we ushered the children to rooms filled with (board) games, and puzzles, and other, more colorful activities such as face painting and balloon making. The kids couldn"t at length contain their enthusiasm, busting into and out of rooms with impunity, soaking in the rapturous atmosphere. In the afternoon, our team attempted to tire them out: running topped the agenda, and by leaps and bounds, the activities, whether straightforward relays or schoolyard classics like duck duck goose and red light, green light, indeed began to tucker our charges out. We, too, were pretty beat by the time night began to creep over the horizon!

17.5.09

Yesterday evening, we surprised the students with a musical performance, followed by forty minutes of bubble-blowing madness; to be sure, the students could not appreciate our somewhat accurate rendition of Amazing Grace so much as the innocent madness of dipping one"s hands in a solution of dish detergent and corn syrup and then whispering a bubble to life; and indeed, the moment the Disney branded bubble-making machines churned the first batch of bubbles into the air, with much rapidity weaving their frenetic pattern of fun, chaos erupted in the room. The students stormed the soap basin, and almost overwhelmed my teammates who valiantly held the Snitch and Pooh high above the heads of the clamoring kids.

During the evening"s festivities, I grew progressively ill, until at last I dashed out of the room to sneeze. Outside, in the cool of the night, under a cloud of stars beaming so far away in the deep of space, I exploded in a rancor of sneezing. The fit lasted for five minutes, an inexorable depression in my system which sent both my body and my esteem tumbling down. I felt bad, not only for my exceedingly rickety health, but for my teammates and the children who may have been exposed to my sickness as it incubated within me; furthermore, everyone in the classroom was saying goodbye and all I could do was rid myself of a sniffle here and there, in between rounds of bursting from nostrils and sinuses. I was impotent, as though one of my insignificant droplets on the floor!

18.5.09

We are in a car heading towards a famous historical site in Henan. The driver"s drawl slips slowly from his mouth, and what he says resonates intelligibly in our ears. Candy, Tanya and the driver are discussing Chinese mythology, and history, which, for better or for worse seem to be inextricably intertwined. We narrowly just now missed hitting an idle biker in the middle of the road; in dodging our human obstacle, the car swerved into the oncoming traffic, sending us flying inside the cabin. Reciting a verse from a worship song calmed our frazzled nerves.

How to describe the children? Many of them smiled freely, and were so polite when greeted that undoubtedly they had been trained well at some point in the tumult of their life education. Precociousness was also a common characteristic shared by the kids, whose stunted bodies belied the mature, perspicacious thoughts hiding just underneath the skin. Of course, in our time together we were more merry than serious, that quality being best left for the adults working silently in their rooms; and to that effect, the kids brought out their funny bones and jangled them in the air to stir up the excitement and to destroy by a jocular clamor any hint of a dull moment – we really laughed a lot. At last, although not all of them seemed interested in our staged activities – rather than feign enthusiasm and eagerness, some skipped our events altogether – those who did participate, most of them in fact, enjoyed themselves with abandon, helping to create that delightful atmosphere where the many sounds of elation reign.

Of the students whom I had the opportunity to know personally, several still stick out in my mind, not the least for my having christened a few of them with English names! David was bold, and courageous, willing to soothe crying babes as much as reprimand them when their capricious actions led them astray; he had a caring heart not unlike a shepherd who tends to his young charges. Edward, who at 13 was the same age as David, definitely grew emotionally, not to mention physically attached to me. He was by my side for much of the weekend, grabbing onto my hand and not letting go, to the point where I in my arrogance would detach my fingers within his, ever so slightly, as if to suggest that a second more would lead to a clean break - I know now that with the cruel hands of time motoring away during the mission, I shouldn"t have lapsed into such an independent, selfish state; he should have been my son. Another child who became so attached to the team as to intimate annoyance was the boy we deemed John"s son, because the boy, it seemed, had handcuffed himself to our teammate, and would only free himself to cause insidious mischief, which would invariably result in an explosion of hysterics, his eyes bursting with tears and his mouth, as wide as canyon, unleashing a sonorous wail when something went wrong. On the other hand, Alice remained in the distance, content to smile and shyly wave her hand at our team while hiding behind her sisters. And last but not least, of our precious goonies, Sunny undoubtedly was the photographer extraordinaire, always in charge of the school"s camera, snapping away liberally, never allowing any passing moment to escape his shot.

That I learned on this trip so much about my teammates verily surprised me, as I thought the relationships that we had established were already mature, not hiding any new bump, any sharp edge to surprise us from our friendly stupor. So, consider myself delightfully amazed at how a few slight changes in the personality mix can bring out the best, the most creative and the strangest in the group dynamic: admittedly, Candy and Tanya were the ideal foils for John, they eliciting the most humorous observations and reactions from my house church leader, they expertly constructing a depth of character that even last week, in the wake of the Guangdong biking trip, I never knew existed! Most of all, I"m glad to have been a part of such a harmonious fellowship, for the fact that we could prayer together as one, and encourage each other too, and all the more as we saw the day approaching.

Cool China Machining China Services images

Some cool china machining China services images:


NSA (1971) ... NSA reveals its OWN embarrassing secrets (14 June 2013) ...item 2.. New York Times - VENONA AND THE COLD WAR (1999)

Image by marsmet472
The agency ran the the VENONA project - a long-running secret collaboration betwqeen the U.S and the U.K involving cryptanalysis of messages sent by intelligence agencies of the Soviet Union.
.

.........*****All images are copyrighted by their respective authors .........
.

... marsmet473a photo ... Wired !! ...item 2.. Radiohead - OK Computer (Full Album) -- Electioneering ...item 3.. FSU News - Life advice from the outside looking in (Oct. 27, 2013) -- Work with what you’ve got. ...

www.flickr.com/photos/104178037@N08/10069702514/in/photos...
.

... marsmet473a photostream ... Page 1

www.flickr.com/photos/104178037@N08/?details=1
.

... marsmet473a photostream ... Page 2

www.flickr.com/photos/104178037@N08/page2/?details=1
.
.

..............................................................................................................................................................................................
.
.....item 1).... NSA reveals its OWN embarrassing secrets: Fascinating archive photos show how spy agency held "Miss NSA" pageants and committed shocking crimes against fashion (just don"t tell Edward Snowden).

... Mail Online - Daily Mail ... www.dailymail.co.uk/news/ ...

... Predecessor of the NSA was the Armed Forces Security Agency
... NSA was established on Nov. 4 1952 by then-President Harry Truman
... Creation allowed Defense Department to co-ordinate cryptologic information
... Agency began occupying buildings at Fort Meade in the late 1950s

By DAILY MAIL REPORTER
PUBLISHED: 05:20 EST, 14 June 2013 | UPDATED: 08:41 EST, 14 June 2013

www.dailymail.co.uk/news/article-2341569/Fascinating-pict...

At the National Security Agency headquarters in Fort Mead Maryland, a memorial carved into a plaque reads: "They Served in Silence."

The motto is in stark contrast to this week"s revelations by NSA leaker Edward Snowden, who has now become the most infamous agency employee in recent years.

But a candid NSA archive reveals the thousands of staffers who been quietly working on America"s most sensitive secrets for over six decades.
.
..........................

img code photo ... Strike a pose .. Think .. NO ADMITTANCE

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Strike a pose: The US Army Signal Intelligence Service posed in front of their vault in 1935

NSA

..........................
.
..........................

img code photo ... Early days

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Early days: Cryptologists in Korea in the 1950s. The Army Security Agency (ASA) was responsible for supplying the Army"s codes and ciphers

NSA

..........................
.
..........................

img code photo ... Working around the clock

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Working around the clock: Cryptologists hard at work during the Second World War

NSA

..........................
.
..........................

img code photo ... Determined

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Determined: Fleet Radio Unit Pacific (FRUPAC) in Hawaii working on JN-25, the principal Japanese Navy encryption system in 1945

NSA

..........................
.

The series of photos document the significant changes the agency has gone through since it was established on Nov. 4 1952 by then-President Harry Truman.

The predecessor to the NSA was the Armed Forces Security Agency which was set up in 1949.

More...

... Britain issues global warning to airlines not to let CIA leaker Edward Snowden board a flight to the UK
... Whistleblower Edward Snowden smuggled out secrets with an everyday thumb drive banned from NSA offices
... Feds vow to hunt down NSA leaker as they fear he is attempting to defect to China with America"s most sensitive secrets

But that agency did not have much power and lacked a central control centre.

Central Intelligence Agency (CIA) Director Walter Bedell Smith sent a memo to James S. Lay, Executive Secretary of the National Security Council in 1951 that spurred the creation of the NSA.
.
............................

img code photo ... Mission

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Mission: U.S. Army Engineers conduct diving operations to recover Nazi cryptologic records from Lake Schlersee in Southern Germany at the end of the Second World War

NSA

............................
.
............................

img code photo ... Intelligence

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Intelligence: NSA"s SIGSALY, a secure speech system used in World War Two for the highest-level Allied communications

NSA

............................
.
............................

img code photo ... A UNIVAC 9300 Peripheral Processor, 1966

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Equipment: A UNIVAC 9300 Peripheral Processor, left, a punch card computing data center from 1966, and a KY-8 Cryptologic Device, right

NSA

............................
.
............................

img code photo ... KY-8 Cryptologic Device

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Equipment: A UNIVAC 9300 Peripheral Processor, left, a punch card computing data center from 1966, and a KY-8 Cryptologic Device, right

NSA

............................
.
............................

img code photo ... M-138

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Intelligence gathering: M-138, a strip cipher device that allowed the use of multiple alphabets to encipher messages

NSA

............................
.
............................

img code photo ... Tour

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Tour: GEN Eisenhower visits Arlington Hall, William Friedman is standing on the far left

NSA
............................
.
............................

img code photo ... Beauty queens

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Beauty queens: Contestants in the Miss NSA Pageant held annually in the 1950s and early 1960s

NSA

............................
.
............................

img code photo ... Hunting ...

MRBM Launch Site 1 .. San Cristobal, Cuba .. 23 October 1962

Nuclear Warhead Bunker Under Construction .. San Cristobal Site 1

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Hunting: Soviet strategic missile sites under construction in Cuba pictured in 1962

NSA

............................
.
............................

img code photo ... Moving forward

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Moving forward: A UNIVAC system purchased by NSA in 1963

NSA

............................
.
............................

img code photo ... Watching

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Watching: The direct communication link between Washington and Moscow at the Pentagon Building, as monitored by the NSA

NSA

............................
.

He observed recommended a survey of communications intelligence activities after observing "control over, and coordination of, the collection and processing of Communications Intelligence had proved ineffective."

Then-president President Harry S. Truman authorized the agency"s creation in June 1952 - he understood the importance of a central spy body as America had become a dominant power on a global stage, facing global responsibilities and threats.

U.S. efforts had led to breaking German and Japanese codes in the Second World War, success against the German U-Boat threat in the North Atlantic, and victory in the Battle of Midway in the Pacific.

As war raged in Korea, the creation of NSA allowed the Defense Department to consolidate cryptologic support to military operations, and to meet challenges that the nation would face in the Cold War.

The agency ran the the VENONA project - a long-running secret collaboration betwqeen the U.S and the U.K involving cryptanalysis of messages sent by intelligence agencies of the Soviet Union.
.
...........................

img code photo ... Technology evolving

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Technology evolving: Staffers chat as they stand next to the NSA supercomputers in the 1970s

NSA

...........................
.
...........................

img code photo ... America"s sensitive secrets

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

America"s sensitive secrets: An NSA staffer at work in 1971 using a console at the agency

NSA

...........................
.
...........................

img code photo ... Demonstration

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Demonstration: VADM Inman and Ms. Ann Caracristi listen to Hall of Honor Cryptologist Frank B. Rowlett describe the ENIGMA machine

NSA
...........................
.
...........................

img code photo ... Growing agency

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Growing agency: The NSA continued to expand into the 1980s, as seen in this aerial headquarters of its headquarters

NSA

...........................
.

In 1953, the VENONA project exposed a massive Soviet espionage effort that threatened national security.
The NSA moved to Ft. Meade in 1957- one reason the site was selected was because it was deemed far enough away from the capital in case of a nuclear strike.

In 1960 the agency was rocked after two employees William Hamilton Martin and Bernon F. Mitchell, defected to the Soviet Union.

The alarming revelation prompted tighter personnel security measures.

The agency"s signals intelligence (SIGINT) played a critical role in 1962 in defusing the Cuban Missle Criris, a saga which had the world"s nations nervously holding their breath.

In the 1970s, Dr. Tordella was an early advocate of the use of computers in cryptology.
.
............................

img code photo ... Safe line

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Safe line: President H. W. Bush confers in confidence using a STU III device

NSA

............................
.
............................

img code photo ... Gen Eisenhower visits Arlington Hall

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Tour: Gen Eisenhower visits Arlington Hall, William Friedman is standing on the far left

NSA

............................
.
............................

img code photo ... VIP visit

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

VIP visit: President and Mrs. Reagan tour the new OPS2A and 2B Buildings with LTG Odom and Mrs. Odom on 26 September 1986

NSA

............................
.
.............................

img code photo ... Through the years

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Through the years: George Bush and Dick Cheney at the NSA offices in 2008

NSA

.............................
.
.............................

img code photo ... President George W. Bush

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Terror attacks: President George W. Bush speaking on the phone following the terrorist attacks on September 11, 2001

NSA

.............................
.
.............................

img code photo ... Memories .. They Served In Silence

National Security Agency .. United States Of America

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Memories: NSA"s Cryptologic Memorial Wall honors those "who served in silence" since the Second World War

NSA

.............................
.
.............................

img code photo ... Modern day

i.dailymail.co.uk/i/pix/2013/06/14/article-2341569-1A4F89...

Modern day: A view of the National Security Operations Center Floor last year

NSA

.............................
.

The 1980s saw former NSA employee Ronald Pelton convicted of spying for and selling secrets to the Soviet Union.

He reportedly has a photographic memory as he passed no documents to the Soviets.

Petty Hohn Anthony Walker, Jr., a United States Navy Chief Warrant Officer and communications specialist was also convicted of spying for the Soviet Union from 1968 to 1985.

In the late 1980s President Reagan attended the dedication of the Operations 2A and 2B buildings.

In the 1990s the NSA provided key information for the Gulf War, codenamed Operation Desert Storm.

In 2001, the 9/11 terror attacks that killed 2,977 people reinforced the need for the NSA as America became a clear Al-Qaeda target.

In 2011, the NSA played a key role in the Special Forces - IC Team responsible for tracking down Osama bin Laden.
.
.

.
............................................................................................................................................................................................
.
.....item 2).... Venona Decoding Soviet Espionage in America

... New York Times on the Web ... www.nytimes.com/books/ ...

By JOHN EARL HAYNES and HARVEY KLEHR
Yale University Press

www.nytimes.com/books/first/h/haynes-venona.html

VENONA AND THE COLD WAR

The Venona Project began because Carter Clarke did not trust Joseph Stalin. Colonel Clarke was chief of the U.S. Army"s Special Branch, part of the War Department"s Military Intelligence Division, and in 1943 its officers heard vague rumors of secret German-Soviet peace negotiations. With the vivid example of the August 1939 Nazi-Soviet Pact in mind, Clarke feared that a separate peace between Moscow and Berlin would allow Nazi Germany to concentrate its formidable war machine against the United States and Great Britain. Clarke thought he had a way to find out whether such negotiations were under way.

Clarke"s Special Branch supervised the Signal Intelligence Service, the Army"s elite group of code-breakers and the predecessor of the National Security Agency. In February 1943 Clarke ordered the service to establish a small program to examine ciphered Soviet diplomatic cablegrams. Since the beginning of World War II in 1939, the federal government had collected copies of international cables leaving and entering the United States. If the cipher used in the Soviet cables could be broken, Clarke believed, the private exchanges between Soviet diplomats in the United States and their superiors in Moscow would show whether Stalin was seriously pursuing a separate peace.

The coded Soviet cables, however, proved to be far more difficult to read than Clarke had expected. American code-breakers discovered that the Soviet Union was using a complex two-part ciphering system involving a "one-time pad" code that in theory was unbreakable. The Venona code-breakers, however, combined acute intellectual analysis with painstaking examination of thousands of coded telegraphic cables to spot a Soviet procedural error that opened the cipher to attack. But by the time they had rendered the first messages into readable text in 1946, the war was over and Clarke"s initial goal was moot. Nor did the messages show evidence of a Soviet quest for a separate peace. What they did demonstrate, however, stunned American officials. Messages thought to be between Soviet diplomats at the Soviet consulate in New York and the People"s Commissariat of Foreign Affairs in Moscow turned out to be cables between professional intelligence field officers and Gen. Pavel Fitin, head of the foreign intelligence directorate of the KGB in Moscow. Espionage, not diplomacy, was the subject of these cables. One of the first cables rendered into coherent text was a 1944 message from KGB officers in New York showing that the Soviet Union had infiltrated America"s most secret enterprise, the atomic bomb project.

By 1948 the accumulating evidence from other decoded Venona cables showed that the Soviets had recruited spies in virtually every major American government agency of military or diplomatic importance. American authorities learned that since 1942 the United States had been the target of a Soviet espionage onslaught involving dozens of professional Soviet intelligence officers and hundreds of Americans, many of whom were members of the American Communist party (CPUSA). The deciphered cables of the Venona Project identify 349 citizens, immigrants, and permanent residents of the United States who had had a covert relationship with Soviet intelligence agencies (see appendix A). Further, American cryptanalysts in the Venona Project deciphered only a fraction of the Soviet intelligence traffic, so it was only logical to conclude that many additional agents were discussed in the thousands of unread messages. Some were identified from other sources, such as defectors" testimony and the confessions of Soviet spies (see appendix B).

The deciphered Venona messages also showed that a disturbing number of high-ranking U.S. government officials consciously maintained a clandestine relationship with Soviet intelligence agencies and had passed extraordinarily sensitive information to the Soviet Union that had seriously damaged American interests. Harry White--the second most powerful official in the U.S. Treasury Department, one of the most influential officials in the government, and part of the American delegation at the founding of the United Nations--had advised the KGB about how American diplomatic strategy could be frustrated. A trusted personal assistant to President Franklin Roosevelt, Lauchlin Currie, warned the KGB that the FBI had started an investigation of one of the Soviets" key American agents, Gregory Silvermaster. This warning allowed Silvermaster, who headed a highly productive espionage ring, to escape detection and continue spying. Maurice Halperin, the head of a research section of the Office of Strategic Services (OSS), then America"s chief intelligence arm, turned over hundreds of pages of secret American diplomatic cables to the KGB. William Perl, a brilliant young government aeronautical scientist, provided the Soviets with the results of the highly secret tests and design experiments for American jet engines and jet aircraft. His betrayal assisted the Soviet Union in quickly overcoming the American technological lead in the development of jets. In the Korean War, U.S. military leaders expected the Air Force to dominate the skies, on the assumption that the Soviet aircraft used by North Korea and Communist China would be no match for American aircraft. They were shocked when Soviet MiG-15 jet fighters not only flew rings around U.S. propeller-driven aircraft but were conspicuously superior to the first generation of American jets as well. Only the hurried deployment of America"s newest jet fighter, the F-86 Saber, allowed the United States to match the technological capabilities of the MiG-15. The Air Force prevailed, owing more to the skill of American pilots than to the design of American aircraft.

And then there were the atomic spies. From within the Manhattan Project two physicists, Klaus Fuchs and Theodore Hall, and one technician, David Greenglass, transmitted the complex formula for extracting bomb-grade uranium from ordinary uranium, the technical plans for production facilities, and the engineering principles for the "implosion" technique. The latter process made possible an atomic bomb using plutonium, a substance much easier to manufacture than bomb-grade uranium.

The betrayal of American atomic secrets to the Soviets allowed the Soviet Union to develop atomic weapons several years sooner and at a substantially lower cost than it otherwise would have. Joseph Stalin"s knowledge that espionage assured the Soviet Union of quickly breaking the American atomic monopoly emboldened his diplomatic strategy in his early Cold War clashes with the United States. It is doubtful that Stalin, rarely a risk-taker, would have supplied the military wherewithal and authorized North Korea to invade South Korea in 1950 had the Soviet Union not exploded an atomic bomb in 1949. Otherwise Stalin might have feared that President Harry Truman would stanch any North Korean invasion by threatening to use atomic weapons. After all, as soon as the atomic bomb had been developed, Truman had not hesitated to use it twice to end the war with Japan. But in 1950, with Stalin in possession of the atomic bomb, Truman was deterred from using atomic weapons in Korea, even in the late summer when initially unprepared American forces were driven back into the tip of Korea and in danger of being pushed into the sea, and then again in the winter when Communist Chinese forces entered the war in massive numbers. The killing and maiming of hundreds of thousands of soldiers and civilians on both sides of the war in Korea might have been averted had the Soviets not been able to parry the American atomic threat.

Early Soviet possession of the atomic bomb had an important psychological consequence. When the Soviet Union exploded a nuclear device in 1949, ordinary Americans as well as the nation"s leaders realized that a cruel despot, Joseph Stalin, had just gained the power to destroy cities at will. This perception colored the early Cold War with the hues of apocalypse. Though the Cold War never lost the potential of becoming a civilization-destroying conflict, Stalin"s death in March 1953 noticeably relaxed Soviet-American tensions. With less successful espionage, the Soviet Union might not have developed the bomb until after Stalin"s death, and the early Cold War might have proceeded on a far less frightening path.

Venona decryptions identified most of the Soviet spies uncovered by American counterintelligence between 1948 and the mid-1950s. The skill and perseverance of the Venona code-breakers led the U.S. Federal Bureau of Investigation (FBI) and British counterintelligence (MI5) to the atomic spy Klaus Fuchs. Venona documents unmistakably identified Julius Rosenberg as the head of a Soviet spy ring and David Greenglass, his brother-in-law, as a Soviet source at the secret atomic bomb facility at Los Alamos, New Mexico. Leads from decrypted telegrams exposed the senior British diplomat Donald Maclean as a major spy in the British embassy in Washington and precipitated his flight to the Soviet Union, along with his fellow diplomat and spy Guy Burgess. The arrest and prosecution of such spies as Judith Coplon, Robert Soblen, and Jack Soble was possible because American intelligence was able to read Soviet reports about their activities. The charges by the former Soviet spy Elizabeth Bentley that several dozen mid-level government officials, mostly secret Communists, had assisted Soviet intelligence were corroborated in Venona documents and assured American authorities of her veracity.


(C) 1999 Yale University All rights reserved. ISBN: 0-300-07771-8
.
.

.
............................................................................................................................................................................................
.
.
.


Chinese Rock, Paper, Scissor

Image by Wootang01
15.5.09

We"re driving towards the orphanage. The highway is lonely, save for a few languid trucks ambling along. It is damp too, and a thick fog covers the countryside: a single light here or there provides the only hint of civilization amidst the interminable verdure. Inside the van, the smoke of cigarettes past wafts in the air, lingering like a lost soul. I inhale, and quickly cough. I subsequently open the window to the enveloping darkness outside, so slightly as to not disturb my companions in the back. The roar of the road echoes in my ears.

An unexpected wrench was thrown into our travel plans today. The trip began expediently enough as the bus on which Candy and I rode reached the Shenzhen airport with hours to spare; however, the unscheduled hiccups soon followed. We received an announcement over the public address system notifying us of a flight delay, due to a mysterious military maneuver, we deduced, high in the Shenzhen skies. Several more sonorous reminders came in punctual succession over the next six hours. It seemed as though we would be stuck, stranded really, at the airport forever, or for the day at least. Thankfully, after the police arrested some of the more aggrieved passengers, we finally boarded the plane and took off for central China. We were blessed to be on our way at last, none of us having blown a gasket during the afternoon tedium.

One more pitch black road awaited, down a single lonely lane lined with swarthy trees, standing as though sentries, and at length we arrived at the orphanage. The car stopped in a clearing, and we stepped out, onto a cement lot with soft puddles spread silently beneath our feet. We squinted into the twilight, our eyes trying to make sense of the surroundings. Our bags were unloaded, we made our way to the rooms, and soon enough fell asleep. I think we all enjoyed the repose, rendered especially comfortable by the new guest rooms in which we were staying.

16.5.09

We have only been here for barely 24 hours, yet it feels as though we have been here for much longer, as if time at some point in our journey decided to slow itself to a crawl. Maybe it was because of the litany of activities that we packed into the span of several hours, or perhaps it was the lack of worldly distractions, allowing us to focus solely on our mission, that caused us to suspend the hands of that imaginary clock in our mind. Whatever the case, we"ve enjoyed every minute at the orphanage; it is time definitely well spent in service!

Morning call was at 6:20; and after a prayer meeting we went down to finally visit the kids. They were playing on the vast driveway of the orphanage, savoring their moment of freedom before breakfast. To see so many friendly faces, in spite of their precarious physical and filial circumstance was definitely encouraging. I made a multitude of new friends; and did my best throughout the day to impact those kids with joy, honesty and patience. It is a powerful cocktail which brings love immediately to many.

The food at the orphanage is without processing, as natural as victuals can be in these days of impersonal industrial production. Large chunks of mantou, steaming bowls of soupy congee, and salty vegetables with slivers of meat have characterized our meals. It is the kind of humble stuff that lengthens life spans, and disciplines the palate.

We presented a wide range of activities - structured and unstructured; whole class and small group - to the kids, in the hope that we would manage them as much as amuse. In the morning, as though breaking the ice once were not enough, we ran through a series of dizzying, if not at times totally incoherent, activities designed to familiarize our dispositions to each other. Later, we established a makeshift fun fair, at which we ushered the children to rooms filled with (board) games, and puzzles, and other, more colorful activities such as face painting and balloon making. The kids couldn"t at length contain their enthusiasm, busting into and out of rooms with impunity, soaking in the rapturous atmosphere. In the afternoon, our team attempted to tire them out: running topped the agenda, and by leaps and bounds, the activities, whether straightforward relays or schoolyard classics like duck duck goose and red light, green light, indeed began to tucker our charges out. We, too, were pretty beat by the time night began to creep over the horizon!

17.5.09

Yesterday evening, we surprised the students with a musical performance, followed by forty minutes of bubble-blowing madness; to be sure, the students could not appreciate our somewhat accurate rendition of Amazing Grace so much as the innocent madness of dipping one"s hands in a solution of dish detergent and corn syrup and then whispering a bubble to life; and indeed, the moment the Disney branded bubble-making machines churned the first batch of bubbles into the air, with much rapidity weaving their frenetic pattern of fun, chaos erupted in the room. The students stormed the soap basin, and almost overwhelmed my teammates who valiantly held the Snitch and Pooh high above the heads of the clamoring kids.

During the evening"s festivities, I grew progressively ill, until at last I dashed out of the room to sneeze. Outside, in the cool of the night, under a cloud of stars beaming so far away in the deep of space, I exploded in a rancor of sneezing. The fit lasted for five minutes, an inexorable depression in my system which sent both my body and my esteem tumbling down. I felt bad, not only for my exceedingly rickety health, but for my teammates and the children who may have been exposed to my sickness as it incubated within me; furthermore, everyone in the classroom was saying goodbye and all I could do was rid myself of a sniffle here and there, in between rounds of bursting from nostrils and sinuses. I was impotent, as though one of my insignificant droplets on the floor!

18.5.09

We are in a car heading towards a famous historical site in Henan. The driver"s drawl slips slowly from his mouth, and what he says resonates intelligibly in our ears. Candy, Tanya and the driver are discussing Chinese mythology, and history, which, for better or for worse seem to be inextricably intertwined. We narrowly just now missed hitting an idle biker in the middle of the road; in dodging our human obstacle, the car swerved into the oncoming traffic, sending us flying inside the cabin. Reciting a verse from a worship song calmed our frazzled nerves.

How to describe the children? Many of them smiled freely, and were so polite when greeted that undoubtedly they had been trained well at some point in the tumult of their life education. Precociousness was also a common characteristic shared by the kids, whose stunted bodies belied the mature, perspicacious thoughts hiding just underneath the skin. Of course, in our time together we were more merry than serious, that quality being best left for the adults working silently in their rooms; and to that effect, the kids brought out their funny bones and jangled them in the air to stir up the excitement and to destroy by a jocular clamor any hint of a dull moment – we really laughed a lot. At last, although not all of them seemed interested in our staged activities – rather than feign enthusiasm and eagerness, some skipped our events altogether – those who did participate, most of them in fact, enjoyed themselves with abandon, helping to create that delightful atmosphere where the many sounds of elation reign.

Of the students whom I had the opportunity to know personally, several still stick out in my mind, not the least for my having christened a few of them with English names! David was bold, and courageous, willing to soothe crying babes as much as reprimand them when their capricious actions led them astray; he had a caring heart not unlike a shepherd who tends to his young charges. Edward, who at 13 was the same age as David, definitely grew emotionally, not to mention physically attached to me. He was by my side for much of the weekend, grabbing onto my hand and not letting go, to the point where I in my arrogance would detach my fingers within his, ever so slightly, as if to suggest that a second more would lead to a clean break - I know now that with the cruel hands of time motoring away during the mission, I shouldn"t have lapsed into such an independent, selfish state; he should have been my son. Another child who became so attached to the team as to intimate annoyance was the boy we deemed John"s son, because the boy, it seemed, had handcuffed himself to our teammate, and would only free himself to cause insidious mischief, which would invariably result in an explosion of hysterics, his eyes bursting with tears and his mouth, as wide as canyon, unleashing a sonorous wail when something went wrong. On the other hand, Alice remained in the distance, content to smile and shyly wave her hand at our team while hiding behind her sisters. And last but not least, of our precious goonies, Sunny undoubtedly was the photographer extraordinaire, always in charge of the school"s camera, snapping away liberally, never allowing any passing moment to escape his shot.

That I learned on this trip so much about my teammates verily surprised me, as I thought the relationships that we had established were already mature, not hiding any new bump, any sharp edge to surprise us from our friendly stupor. So, consider myself delightfully amazed at how a few slight changes in the personality mix can bring out the best, the most creative and the strangest in the group dynamic: admittedly, Candy and Tanya were the ideal foils for John, they eliciting the most humorous observations and reactions from my house church leader, they expertly constructing a depth of character that even last week, in the wake of the Guangdong biking trip, I never knew existed! Most of all, I"m glad to have been a part of such a harmonious fellowship, for the fact that we could prayer together as one, and encourage each other too, and all the more as we saw the day approaching.


i want to find another

Image by the measure of mike
a conversation space where expats and local service providers can be studied in full. maids, drivers, tutors, dog walkers... all for hire. pick a service and make a service. human capital is cheap and plenty. ideas are welcome.

in the age of the social network the bulletin board still manages to provide functionality the FB and ren ren don"t seem to touch.