Huge Marriott hack reportedly done by Chinese state hackers - We Are The Mighty
MIGHTY TRENDING

Huge Marriott hack reportedly done by Chinese state hackers

US investigators have reportedly traced the massive data breach on Marriott customer data to Chinese hackers, a move that will likely exacerbate ongoing US-China economic tensions.

The hackers are suspected of working for the Ministry of State Security, the country’s intelligence agency, The New York Times and the Washington Post reported Dec. 11, 2018.


The Post’s sources warned against making definitive conclusions on the attack, as the investigation was still ongoing, but said the methods of the hack suggested it was state-sponsored. Private investigators also identified the techniques as those previously used in attacks attributed to Chinese hackers, Reuters reported.

Marriott, which operates more than 5,800 properties in more than 110 countries, says it is the top hotel provider to the US government and military personnel.

Huge Marriott hack reportedly done by Chinese state hackers

Marriott is the top hotel provider to the US government and military personnel.

The hotel chain announced in late November 2018 that about 500 million customers had their personal data breached in the attack, which began four years ago.

About 327 million of them had information like their name, phone number, and passport number taken, while an unspecified number had their credit card details taken.

The Trump administration has been planning to declassify US intelligence reports that show China’s efforts to build a database with the names of US government officials with security clearances, the Times reported.

People involved in the company’s private investigation into the breach also said the hackers may have been trying to collect information for China’s spy agencies, rather than for financial gain, Reuters reported.

Passport numbers, which are not usually collected in data breaches, may have been a particularly valuable discovery for the hackers, the Post said.

Beijing has denied responsibility for the attack.

Geng Shuang, a spokesman for the country’s foreign ministry, told reporters: “China firmly opposes all forms of cyber attack and cracks down on it in accordance with the law. If offered evidence, the relevant Chinese departments will carry out investigations according to the law. We firmly object to making groundless accusations on the issue of cyber security.”

Huge Marriott hack reportedly done by Chinese state hackers

US-China tensions over trade and cyber policies are mounting. Here, Chinese President Xi Jinping and US President Donald Trump in 2017.

(Official White House Photo by Shealah Craighead)

Reports of Beijing’s involvement in the Marriott breach comes amid mounting tensions between the US and China over trade tariffs and cyber policies.

Washington has been planning to issue a series of measures that include indictments and possible sanctions against Chinese hackers, The Times and Post both reported.

Beijing is currently reeling over the arrest of Meng Wanzhou, the CFO of Chinese telecom giant Huawei and the daughter of the company’s founder, over her alleged involvement in Iran sanction violations.

She was granted bail at .4 million while she awaits a hearing for extradition to the US. December 2018, Beijing summoned the US ambassador to China and warned of “grave consequences” if Meng was not released.

This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.

MIGHTY GAMING

How these guys make the weapons from our favorite video games

Video games are known for over-the-top weaponry. In the universe of games, a seemingly tiny blonde dude can easily swing around the giant Buster Sword (see: Final Fantasy VII) and a kid with a mask is given free reign to swing around a ridiculously shaped, dual-bladed sword (see: The Legend of Zelda: Majora’s Mask).

In real life, getting your hands on these incredible weapons is a much more painstaking endeavor than simply showing up at a store and dropping a few rupees or a couple hundred gil. Tony Swatton of Burbank, California’s Sword and Stone and the crew over at Baltimore Knife and Sword take pride in forging authentic, legitimate versions of pop-culture’s finest weaponry. Together, they formed the web series, Man at Arms: Reforged, which you can find on YouTube.

Let’s set the bar extremely high right off the bat with a look at their work on a Warhammer 40K Chainsword:

Swatton is a self-taught blacksmith who got his start working on Steven Spielberg’s Hook and has been creating weapons and armor for film and television ever since. His work can also be seen on the official World of Warcraft channel in a series called Azeroth Armory.


The show expanded to Maryland and added Baltimore’s Knife and Sword crew at the start of the second season. Since then, the channel has achieved internet stardom by bringing the viewers along for the ride as they create some of the most interesting weapons from film, television, and gaming. Behind each weapon is a very long, methodical process. Each weapon takes as long as 200 hours to forge, which is distilled down into a single 10-minute video segment.

They’re also not afraid to take on historical recreations, such as a 400-year old Chinese Dandao:

Each project requires a unique approach but, in general, they employ plasma cutting to get the desired shape out of steel, mold the intricate details out of clay for a bronze cast, spend days perfecting every minute detail, and then finally assemble, sharpen, and test their new weapon.

They create content based off of YouTube comments, so if you can think of an awesome weapon that isn’t in their nearly 150-video-long catalog, leave a suggestion!

MIGHTY TRENDING

‘Were the builders morons?’ Russia’s first theme park leaves few amused

Rising above a sea of asphalt parking are the stubby turrets of Russia’s first-ever foray into the theme-park business. At first glance, the complex in Moscow bears a slight resemblance to Disneyland, the American amusement park that Soviet leader Nikita Khrushchev was not allowed to visit in 1959, but hoped one day to reproduce at home. Now, after several false starts, Russia finally has its own amusement park: Dream Island.


With none other than Russian President Vladimir Putin on hand, joining Moscow Mayor Sergei Sobyanin, the park was opened to the public on February 29.

Officials are hoping millions of visitors from Russia and abroad will pass through the turnstiles annually, lured by Dream Island’s attractions scattered over its 30 hectares, all enclosed under glass domes to keep out the Russian capital’s notoriously harsh weather.

Russian officials are quick to note that the id=”listicle-2645441716″.5-billion theme park is the largest in Europe and Asia and to predict it will be a key part of the legacy Sobyanin leaves behind. The opening was delayed twice: once in 2018 and again in December 2019.

Many Russians, not least those active on social media, are skeptical to say the least with many lampooning what they see as a boondoggle and a poor imitation of the Disney original. Many lament the forest that was chopped down to make way for the park and the enormous expanse of parking. Others note the shady background of those involved with the project.

Perhaps more than anything, ticket prices at the park have been a lightning rod for criticism.

Tickets on the weekend cost 11,000 rubles (3) for a family of four. The average monthly wage in Russia last year was just over 46,000 rubles (3). And inflation continues to take bites of that. Overall, in 2019, about 14 percent of Russians lived on less than 0 per month, the official poverty line.

“According to the official site of the new Moscow park: ‘Dream Island is a socially significant site for the Moscow region.’ An entrance ticket for anyone over 10 years old costs 2,900 rubles []. That means, it costs at least 8,700 [rubles, or 1] for a family [during the week]. The mayor’s office has a strange idea of ‘social significance,'” lawyer and moderator for the nationalist Tsargrad television channel Stalina Gurevich wrote on Twitter.

Others have taken issue with the id=”listicle-2645441716″.5 billion price tag. Twitter user Sakt points out that the Burj Khalifa, the needle-shaped, 830-meter skyscraper that dominates the skyline in Dubai, cost roughly the same, suggesting the United Arab Emirates got more bang for its buck.

Some are aesthetically appalled with what they consider a poor rip-off of the American theme-park icon.

Vasily Oblomov, also on Twitter, juxtaposed Dream Island and Disneyland.

“Today in Moscow the amusement park Dream Island is opening. One photo shows the pathetic foreign version. The other, the unique, Russian original. I think it won’t be difficult to figure out which is which.”

Another Twitter user, identified as Kolya Shvab, also was less than impressed with Dream Island’s castle: “What a mess. One look is enough to know that the person who designed this blindingly ugly barn with turrets, never in his life saw a real castle.”

Another Twitter user gave builders credit for taking a bad idea and making it worse.

“It was horrible from the beginning, but the builders managed to screw it up even more. All the rounded elements were made square. It’s not a ‘Dream Island’ but an island of shame,” he writes.

That message of disgust with the design of Dream Island was echoed by Twitter user, Sofiya, who identifies herself as an “architect” and “designer.”

“Dream Island is the ugliest thing I’ve ever seen in my architectural life. This is hell for an architect. But my son is 13 years old. That means I’ll probably go there soon as a loving mother, and while my son enjoys the attractions, I’ll be suffering.”

Others were perplexed by the massive parking lot stretching out for acres in front of the park entrance, wondering why it couldn’t have taken up less space by being built underground or as a multilevel complex.

“Are we correct in thinking that for the Moscow authorities Dream Island is parking in front and beautiful scenery in the background so that parking wouldn’t be so boring?” asked Twitter user Gorodskie Proekty.

“Parking in front of the park. Were the builders morons?” Katyusha Mironova asked on Twitter.

Even before its opening, the theme park was targeted for criticism, not least from those living near the site, who were among the loudest complaining after a forest was chopped down to make way for the project.

Twitter user Interesting Moscow posted what appears to be satellite imagery of the area before and after the park was built.

Others couldn’t help but notice the opening just happened to coincide with a demonstration in the Russian capital to commemorate Boris Nemtsov, the Putin critic who was shot dead near the Kremlin five years ago. Many used the event to protest proposed amendments to the country’s constitution. Critics say the planned changes are aimed at extending Putin’s grip on power after his current presidential term ends in 2024.

Twitter user Borrelia persica said half of Moscow was at the Nemtsov march, the other at the opening of Dream Island.

The owners of the complex are Amiran Mutsoyev and his brother, Alikhan. The two are the sons of Zelimkhan Mutsoyev, a shady businessman and former State Duma deputy from the ruling United Russia party with alleged ties to organized crime figures.

Whether any of that will matter to Russians considering a visit to Dream Island remains to be seen.

This article originally appeared on Radio Free Europe/Radio Liberty. Follow @RFERL on Twitter.

Articles

This is how China plans to ‘defend the world’

Chinese President Xi Jinping on July 30 presided over a massive military parade from an open-topped jeep, declaring, “The world is not peaceful, and peace needs to be defended.”


And as China’s show of force demonstrates, Beijing may have the will and the strength to replace the US as the world’s defender of peace.

“Our heroic military has the confidence and capabilities to preserve national sovereignty, security, and interests … and to contribute more to maintaining world peace,” Xi said at the parade, one day after US President Donald Trump lashed out at Beijing for its inaction regarding North Korea’s nuclear and ballistic missile programs.

Huge Marriott hack reportedly done by Chinese state hackers
Chinese President Xi Jinping. Photo from Moscow Kremlin.

China’s massive military modernization and increasing assertiveness have irked many of its neighbors in the region, and even as the US attempts to reassure its allies that US power still rules the day, that military edge is eroding.

China showed off new, mobile intercontinental ballistic missiles that it says can reach the US in 30 minutes, along with its J-20 stealth interceptor jets. And Xi inspected thousands of troops drawn from the 2 million-strong People’s Liberation Army on its 90th anniversary.

The historian Alfred McCoy estimates that by 2030, China, a nation of 1.3 billion, will surpass the US in both economic and military strength, essentially ending the American empire and Pax Americana the world has known since the close of World War II.

Huge Marriott hack reportedly done by Chinese state hackers
Sailors aboard the Chinese Navy destroyer Qingdao. Navy photo by Chief Mass Communication Specialist David Rush.

But China could achieve this goal patiently and without a violent struggle. China has employed a “salami-slicing” method of slowly but surely militarizing the South China Sea in incremental steps that have not prompted a strong military response from the US. However, the result is China’s de facto control over a shipping lane that sees $5 trillion in annual traffic.

“The American Century, proclaimed so triumphantly at the start of World War II, may already be tattered and fading by 2025 and, except for the finger pointing, could be over by 2030,” McCoy wrote in his new book, “In the Shadows of the American Century: The Rise and Decline of US Global Power.”

China’s J-20 jet also most likely borrows from stealth secrets stolen from the US through a sophisticated hacking regime. Though China hasn’t mastered stealth technology in the way the US has, the jet still poses a real threat to US forces.

Huge Marriott hack reportedly done by Chinese state hackers
Flypast of the Chengdu J-20. Wikimedia Commons photo by Alert5.

Meanwhile, the US is stretched thin. It has had been at war in Afghanistan for 16 years and in Iraq for 14, and it has been scrambling to curtail Iranian and Russian influence in Syria while reassuring its Baltic NATO allies that it’s committed to their protection against an aggressive Russia.

Under Xi, who pushes an ambitious foreign policy, China’s eventual supremacy over the US seems inevitable.

MIGHTY TRENDING

The F-35 just made its combat debut in Syria

The F-35 Joint Strike Fighter has made its combat debut in the Middle East.

Israeli Air Force commander Maj. Gen. Amikam Norkin announced that its F-35 aircraft, known as Adir, “are already operational and flying in operational missions.”


“We are the first in the world to use the F-35 in operational activity,” Norkin said via the official Israel Defense Forces’ Twitter account on May 22, 2018.

In an interview with the Haaretz newspaper, Norkin said F-35s had been used in two recent strikes, but it was unclear if the aircraft supported the missions by providing intelligence, surveillance and reconnaissance or conducted the strikes.

Early May 2018, Iranian forces “fired 32 rockets, we intercepted 4 of them & the rest fell outside Israeli territory,” Norkin tweeted, referring to a counterattack in the Golan Heights.

Israel responded by attacking multiple Iranian weapons and logistics sites in Syria. “In our response attack, more than 100 ground-to-air missiles were fired at our planes,” he said.

Israel declared initial operating capability of its Lockheed Martin-made F-35I in December 2017. Middle Eastern outlets have said the fifth-generation stealth aircraft has likely made flights before for reconnaissance missions over or near Syrian territory, but those reports are unconfirmed.

In February 2018, Israel launched a counterattack on Iranian targets in Syria in response to an Iranian drone’s intrusion into its airspace. During the mission, an Israeli F-16 was targeted and crash landed back in Israeli territory.

Huge Marriott hack reportedly done by Chinese state hackers
F-16 Fighting Falcon

Critics at the time wondered why the F-35 wasn’t used, since the aircraft would have been better able to evade enemy radar. But pilots and former members of the Israeli Air Force said use of the F-35 would have been risky so early in its operational lifespan.

“If they thought that the targets were so strategically important, I’m sure they’d consider using them. But they weren’t. So why risk use of the F-35s at such an early point in their operational maturity?” retired Israeli Air Force Brig. Gen. Abraham Assael told Defense News at the time.

Israel in August 2017, signed a new contract with Lockheed for its next batch of 17 aircraft, following two previous contracts for 33 aircraft.

IAF officials have expressed interest in buying up to 30 additional aircraft.

Israel’s declaration comes a few short months after the U.S. Marine Corps F-35B short takeoff/vertical landing fighter embarked on its first deployment aboard the amphibious assault ship Wasp for patrols in the Pacific.

The U.S. Air Force similarly deployed its F-35A variant to Asia in November 2017.

This article originally appeared on Military.com. Follow @military.com on Twitter.

MIGHTY MONEY

Gary Johnson speaks out on California Guard repayment scandal

Huge Marriott hack reportedly done by Chinese state hackers
Maj. Gen. William H. Wade, the adjutant general for the California National Guard administers the oath of enlistment to Soldiers of Bravo Battery, 1st Battalion, 143rd Field Artillery during a recent visit Victory Base Complex, Iraq in 2007.


Libertarian presidential candidate Gary Johnson had strong words for the National Guard and the Pentagon after allegations emerged that the DoD is forcing California Guard troops to reimburse the government for enlistment bonuses it paid in error.

“It is beyond the bounds of decency to go after our veterans and their families a decade later,” he said in a statement obtained by We Are the Mighty. “These are rounding errors to the Pentagon, but these demands for repayment are ruining lives and causing severe hardships for service members whose sacrifices for the nation can frankly never be adequately be repaid.”

Johnson was referring to a Los Angeles Times story that alleges the National Guard is forcing nearly 10,000 guardsmen from California to repay reenlistment bonuses they were awarded 10 years ago.

According to the paper, more than 14,000 California Guardsmen were awarded the reenlistment bonuses as a result of the Army’s incentive program to retain soldiers during the height of the Iraq war.

The U.S. government investigated the California Guard reenlistment bonuses and found a majority of the requests had been approved despite the soldiers’ not qualifying for the bonus. There has been no suggestion that any of the Guardsmen who received the reenlistment bonuses were aware that they did not qualify for them.

The Los Angeles Times reports that Army Master Sgt. Toni Jaffe was the California Guard’s incentive manager at the time, and that after the Pentagon discovered the overpayments 6 years ago, Jaffe pleaded guilty to fraud. She was sentenced to 30 months in federal prison. Three other officers associated with the fraud also pled guilty, receiving probation after being forced to pay restitution.

Major Gen. Matthew Beevers, the deputy commander of the California Guard, accused the nearly 10,000 soldiers of owing a debt to the Army.

In his statement to The Los Angeles Times, Beevers claimed that the soldiers were at fault and that the Guard couldn’t forgive them. “We just can’t do it. We’d be breaking the law,” he said, not addressing whether the Guard was breaking the law by reneging on the contracts.

Several of the Guardsmen went on to deploy to Iraq and Afghanistan, many of whom sustained injuries as a result.

Military Times reports that the Pentagon is searching for ways to overcome the issue. “This has the attention of our leadership, and we are looking at this to see what we can do to assist,” Pentagon spokesman Captain Jeff Davis said Monday.

A host of lawmakers have stepped forward to condemn the Pentagon for harassing the Guardsmen who received the reenlistment bonuses, calling for congressional investigations into the matter. Though as of publication, no presidential candidate other than Johnson had addressed it.

Calling on President Obama and Congress to act immediately on the impacted Guardsmen, Johnson said, “The Pentagon needs a good dose of common sense far more than it needs these dollars, and making our service members pay for the government’s incompetence is beyond the pale.”

Huge Marriott hack reportedly done by Chinese state hackers
In a statement obtained by We Are the Mighty, Governor Johnson called for immediate action to be taken to keep the faith with California National Guardsmen.

MIGHTY CULTURE

How this operation is guarding the nation’s skies

Following the events of the 9/11 terrorist attacks, the Department of Defense identified flaws in its security procedures within the airspace surrounding the National Capital Region. In response, Operation Noble Eagle was created to protect the skies of North America.

An important training element of Noble Eagle, Fertile Keynote exercises utilize the Air Force’s civilian auxiliary, Civil Air Patrol.

With the combined support of the Air National Guard’s 113th Wing at Joint Base Andrews, Maryland, the CAP’s Congressional Squadron, 1st Air Force and North American Aerospace Defense Command, Fertile Keynote missions simulate responses to unauthorized aircraft intruding into the restricted airspace surrounding the U.S. capital.

Other Fertile Keynote exercises take place every week across the country, with aerospace control alert fighter units and CAP squadrons participating.


Each component is vital to the exercise’s goal of rapidly intercepting low- or high-speed aircraft that show signs of distress or those not in compliance with air traffic control instructions.

Once the mission is initiated, fighter pilots, on 24-hour standby, scramble to practice their ability to get airborne quickly in response to a potential threat.

After establishing communication with NORAD and 1st AF, the pilots intercept the CAP aircraft, which simulate the intruder, or track of interest. After initial assessment, the pilots relay information about the TOI’s condition and intent, which ground personnel are not able to determine.

The aircraft is then either assisted, escorted out of the restricted airspace, or, if the intruder is determined to be a threat, the aircraft is eliminated.

Using aircraft from the Air Force Auxiliary as targets has two advantages; it provides participants with a realistic simulation of intercepting slower aircraft, at significantly reduced operational and maintenance cost to the Air Force. If another Air Force F-16 was used as a target for this exercise, it would cost approximately ,000, but operating the CAP aircraft, with volunteer pilots, costs approximately id=”listicle-2639898032″,000.

Exercises like these are conducted throughout the United States, giving pilots, controllers and NORAD personnel an opportunity to practice air defense capabilities against different airframes. In 2018, CAP aircraft flew 251 Air Defense Intercept training missions, including Fertile Keynote, in the National Capital Region, logging 1,635 flight hours on 861 sorties across the country.

This article originally appeared on Airman Magazine. Follow @AirmanMagazine on Twitter.

popular

Chances are the hot model that added you to her social feed is a Russian spy

It happens all the time. You open your Facebook and find a new friend request; zero mutual friends, no information, but a smoking hot profile picture.


Don’t flatter yourself. According to an Oxford University study, it’s more than likely not a “her” but is instead a bot account created to get fake pro-Putin news into your  feed.

Huge Marriott hack reportedly done by Chinese state hackers

The Computational Propaganda Project, the team behind the study, says the political actors use bots to manipulate conversations, demobilize opposition, and generate false support on popular social media sites.

While the bots target both politically left and right leaning users, the study finds that it’s higher and more successful among Twitter users than Facebook. The bot would follow trending hashtags within the veteran community, such as #GoArmy and #Iraq, to find their target.

The account would have a generic name and a profile picture of an attractive person to lure users in. Once they’ve accepted or followed back, then it’s on.

John D. Gallacher, Oxford Professor of Cognitive Health, explains in his study that they analyzed data from subgroups of Twitter and Facebook users to target U.S. military personnel and veterans with junk news about military affairs, misinformation, and conspiracy theories.

Huge Marriott hack reportedly done by Chinese state hackers
Besides, Russian Operatives can’t be that attractive… Oh… Damn it. (Image via Donna Moderna)

To explain how this all would play out Barney-style: Something happens and it’s in the Kremlin’s best interest that Americans think of it a certain way. A programmer would create thousands of fake accounts that search for U.S. troops and veterans.

If they are successful in luring the troop or veteran in, they are barraged with a mix of fake news and legitimate content until the seed of doubt blooms.

Virginia Democrat Sen. Mark Warner told CNN that the epidemic of fake social media accounts is far larger than it appears. He told CNN the the 470 accounts Facebook identified as pro-Kremlin bots “doesn’t pass the smell test.” He further explained that prior to the recent French presidential election, Facebook took down over 30,000 bot accounts.

It should be noted however, that Russian journalists and activists are reportedly trying to take down the “troll farms” that spread misinformation across Europe and the United States.

MIGHTY TACTICAL

Marines experiment with new tech during island attacks

For the last three years, engineers and project officers from Marine Corps Systems Command have descended on the island of Oahu to put new technology to the test.

In the fall, MCSC — along with Marines from the 3rd Marine Regiment and partner organizations from the requirements community — conducted the “Island Marauder” technology demonstration to integrate and evaluate emerging technologies with existing Marine Corps gear to help inform future capability decisions for the Corps.


“We conducted the Island Marauder technology demo to see if mature but leading edge command and control technologies work when we integrate them with our fielded systems,” said Basil Moncrief, Networking-on-the-Move team leader at MCSC. “We also wanted to see what fleet Marines thought about the emerging technology. [Island Marauder] helps Headquarters Marine Corps and the Marine Corps Tactics and Operations Group validate that the emerging technology supports or enhances the latest warfighting tactics and strategies they want to pursue.”

Huge Marriott hack reportedly done by Chinese state hackers

Marines use an armored vehicle equipped with the Networking-on-the-Move satellite communication system during the Island Marauder Technology Demonstration.

(U.S. Marine Corps photo)

The demonstration included one week of intensive, hands-on field engineering and system integration, and a second week of VIP demonstrations. Most of the tactical command and control — or C2 — capability was integrated into a battlefield network controlled through the 3rd Marines’ Networking-on-the-Move Systems. NOTM is a vehicle-mounted satellite communication system that extends C2 for commanders and their staffs while on the move and beyond line of site at the tactical edge.

Developed by MCSC, NOTM has been fielded to all three Marine Expeditionary Forces.

“One of the powerful elements of the Island Marauder demonstration is a challenging tactical scenario that requires insertion of new technology and warfighting approaches while using currently-fielded equipment and fleet Marine operators,” Moncrief said. “The 3rd Marine Regiment gives us extremely useful information during Island Marauder that influences engineering, sustainment and user interface. This, in turn, assists HQMC with advanced concepts and out-year planning.”

During one demo, Marines on the ground used NOTM to simulate calling in air strikes and a medical evacuation — a feat that had not been successfully performed with live aircraft in past demonstrations.

Island Marauder also enables MCSC to perform integration engineering, troubleshoot any related issues and train Marines on how to use new equipment, Moncrief said.

“This year, we brought in some other MCSC programs that have a direct relationship with NOTM,” he said. “For example, the project officer for Identity Dominance Systems-Marine Corps recognized early on that NOTM could be a game changer for that program.”

“When Marines downrange encounter a person of interest, they use IDS-MC to collect biometric data,” said Teresa Sedlacek, lead engineer for Identity Operations at MCSC.

Huge Marriott hack reportedly done by Chinese state hackers

A Marine from the 3rd Marine Regiment uses a Marine Air-Ground Task Force Common Handheld to call for simulated casualty evacuation during the Island Marauder Technology Demonstration.

(U.S. Marine Corps photo by Sgt. Jesus Sepulveda Torres)

Typically, Marines then have to get to a forward operating base or Combat Operations Center to download the information to receive feedback on submissions, she said. During Island Marauder, the demonstration team successfully connected IDS-MC wirelessly with NOTM, which enabled them to receive data retrieval and feedback almost immediately.

“That’s the kind of thing that’s important to us on the Island Marauder Team because it improves combat capability for other programs and for the Marine operating forces,” Moncrief said.

The command also demonstrated the ability to integrate the Marine Air-Ground Task Force Common Handheld — or MCH — with NOTM, the Joint Tactical Common Operating Picture Workstation and Target Handoff System II. The MCH is a handheld C2 program that enables dismounted Marines to use tactical software applications on commercial handheld computing devices while securely accessing higher-level C2 systems for data, services and tactical sharing.

“Island Marauder 2018 was invaluable in generating user feedback for follow-on development and helping to inform future programmatic purchases,” said Maj. Travis Beeson, MCH project officer at MCSC. “Island Marauder continues to be MCH’s go-to event to demonstrate interoperability with other MCSC systems and to assess innovative developments in a tactical relevant environment.”

Other programs and technologies that were part of the Island Marauder demonstration included the Secure Tactical Terminal and secure wireless networking techniques.

“Since the beginning, Island Marauder has been super useful in helping us push the envelope for technology exploitation,” Moncrief said. “As C2 technology continues to accelerate and Marine warfighting strategies adapt to new challenges, we need to show decision-makers some potential match-ups demonstrated together. In this way, Island Marauder enables a better understanding of the near-term possibilities by integrating new technologies with existing capabilities.”

Planning for Island Marauder 2019 is already in progress with the focus on joint C2 and disconnected operations.

This article originally appeared on the United States Marine Corps. Follow @USMC on Twitter.

MIGHTY TRENDING

The Army created a new, safe vaccine for the Zika virus

Three Phase-1 human clinical trials evaluating an Army-developed Zika purified inactivated virus vaccine, known as a ZPIV, have shown it was safe and well-tolerated in healthy adults and induced a robust immune response. Initial findings from the trials were published early in December in the medical journal “The Lancet.”


Each of the three studies included in the paper was designed to address a unique question about background immunity, vaccine dose or vaccination schedule. A fourth trial with ZPIV is still underway in Puerto Rico, where the population has natural exposure to other viruses in the same family as Zika (flaviviruses), such as dengue.

Huge Marriott hack reportedly done by Chinese state hackers
A team of U.S. Army researchers at the Walter Reed Army Institute of Research are developing a Zika vaccine that has induced a strong immune response in early trials. (U.S. Army photo by Jonathan Thompson, WRAIR)

“It is imperative to develop a vaccine that prevents severe birth defects and other neurologic complications in babies caused by Zika virus infection during pregnancy,” said Dr. Kayvon Modjarrad, WRAIR’s Director for Emerging Infectious Diseases, the Zika program co-lead and the article’s lead author. “These results give us hope that a safe and effective vaccine will be achievable.”

Across the three trials, a total of 67 healthy adult volunteers (55 vaccine, 12 placebo) received two vaccine injections, four weeks apart. Researchers measured the immune response by monitoring levels of Zika virus-neutralizing antibodies in the blood. More than 90% of volunteers who received the vaccine developed an immune response against Zika.

Read More: Here’s what US troops should do if they’re worried about Zika

“Not only is the development of a Zika vaccine a global public health priority, but it is also necessary to protect Service Members and their families,” said Col. Nelson Michael, director of WRAIR’s Military HIV Research Program and Zika program co-lead.

The ZPIV vaccine candidate was developed as part of the U.S. Department of Defense response to the 2015 outbreak of Zika virus in the Americas. WRAIR researchers conceived the ZPIV vaccine in February 2016 and were able to advance the candidate to a Phase 1 human trial by November of the same year.

“WRAIR has previously steered to licensure a similar vaccine for Japanese encephalitis, a flavivirus in the same family as Zika, which helped speed our vaccine development effort,” said Dr. Leyi Lin, who led one of the trials at WRAIR.

Huge Marriott hack reportedly done by Chinese state hackers
A team of U.S. Army researchers at the Walter Reed Army Institute of Research are developing a Zika vaccine that has induced a strong immune response in early trials. (U.S. Army photo by Jonathan Thompson, WRAIR)

In the volunteers who received the vaccine, neutralizing antibody levels peaked two weeks after they completed the 2-dose vaccine series, and exceeded the threshold established in an earlier study needed to protect monkeys against a Zika virus challenge. Researchers also found that antibodies from vaccinated volunteers protected mice from a Zika virus challenge, providing insight into how this vaccine might prevent Zika infection.

Next steps include evaluating how long vaccine-induced immunity lasts, and the impact of dose, schedule and background immunity. Michael added that, “Army researchers are part of integrated, strategic US Government effort to develop a vaccine to protect against Zika.”

The ZPIV program is led by Col. Michael and Dr. Modjarrad. The principal investigators at each of the study sites were Dr. Leyi Lin at WRAIR, Dr. Sarah L. George at SLU and Dr. Kathryn E. Stephenson at BIDMC. The sponsor of the investigational new drug application for two of the studies (WRAIR and SLU) is the National Institute of Allergy and Infectious Diseases Division of Microbiology and Infectious Diseases, part of the National Institutes of Health. The BIDMC study is investigator-sponsored by Dr. Kathryn Stephenson.

Huge Marriott hack reportedly done by Chinese state hackers
A team of U.S. Army researchers at the Walter Reed Army Institute of Research are developing a Zika vaccine that has induced a strong immune response in early trials. (U.S. Army photo by Jonathan Thompson, WRAIR)

 

Articles

Here is the video of MOAB’s combat debut

The Department of Defense has released video of the combat debut of the GBU-43 Massive Ordnance Air Blast bomb.


FoxNews.com reported that the April 13 air strike which killed 36 members of the Afghanistan-based affiliate of the Islamic State of Iraq and Syria, also called ISIS-K or the Khorasan Group, targeted a cave and tunnel system in Nangarhar Province, Afghanistan. Heavy fighting between Afghan government forces and the terrorist group has been reported, and local residents were eager to see more bombings.

Huge Marriott hack reportedly done by Chinese state hackers
The GBU-43 Massive Ordnance Air Blast bomb, or MOAB, moments before it detonates during a test on March 11, 2013. On April 13, 2017, it was used in combat for the first time. (USAF photo)

“I want 100 times more bombings on this group,” Hakim Khan told FoxNews.com.

On April 8, a Green Beret died of wounds suffered in a firefight with ISIS in that province. Pentagon officials denied that the use of MOAB was in retaliation for the loss.

“As ISIS-K’s losses have mounted, they are using [improvised bombs], bunkers and tunnels to thicken their defense,” Army Gen. John W. Nicholson, commander of U.S. Forces Afghanistan said in a Department of Defense release. “This is the right munition to reduce these obstacles and maintain the momentum of our offensive against ISIS-K.”

Huge Marriott hack reportedly done by Chinese state hackers
A U.S. Air Force MC-130H Combat Talon II from the 1st Special Operations Squadron flies over Kadena Air Base, Japan, shortly after takeoff May 14, 2015. (U.S. Air Force photo by Senior Airman Stephen G. Eigel)

The GBU-43 is a 21,700-pound bomb that uses GPS guidance to hit its target with over 18,000 pounds of high explosive. The bomb replaced the BLU-82, a 15,000-pound bomb used since the Vietnam War. Both bombs are dropped from the back of MC-130 cargo planes modified for use by Special Operations Forces.

Below is the 30-second video of MOAB’s combat debut.

popular

The top 007 Reasons why James Bond is the worst spy ever

James Bond has long been the most famous “secret agent” out there. Everyone knows James Bond, and it is rare to meet someone who hasn’t seen at least one of the films. Like with most films of that kind, there are a lot of issues with the character and storylines in general. Take for instance the fact that they call him a “secret agent” when he is in fact an Intelligence Officer. Add to that he doesn’t have a line manager, but instead somehow reports directly to the head of MI-6. Then there is the reality that a “license to kill” doesn’t really exist. Despite these tiny issues with details, the films are actually quite good. However, there are many reasons that James Bond truly is the worst spy ever, even if he is a fictional character. Here are the top 007 reasons:


He carries a gun on airplanes

He walks on and off commercial flights with a shoulder holster on and is never once stopped by security. He strolls through the airport fully armed and no one seems to notice or be bothered by the fact that an armed man in a suit is boarding a flight. Even if he has it in his bag instead, it is still never questioned. In reality, he probably would have received a weapon when he arrived at his destination, not carry it on an airplane with him.

He constantly destroys or loses his equipment

He is regularly issued with equipment, weapons and vehicles that are worth millions. However, he never returns any of it, at least not in the same condition he gets it. You would think when given the highest levels of technological advancements in “spy gear,” weapons and cars, one would be inclined to take extra special care of it all.

Huge Marriott hack reportedly done by Chinese state hackers
Okay, so “Q” knew this one wasn’t coming back. But still… (MGM)

He is always being captured and/or beaten up

Despite the fact that he is a highly trained intelligence officer, who is supposed to be aware of his surroundings at all times and the number one rule of intelligence is “never get caught,” Mr. Bond is constantly being captured by the baddies he is after. Even if he isn’t being captured, he is getting beaten up by any number of people associated with whichever villain he is chasing. Where is all that training he meant to have?

He never follows orders

Huge Marriott hack reportedly done by Chinese state hackers
“It’s not cute anymore, James.” (MGM)

The intelligence world does leave some wiggle room to think on your feet, but a big part of it is also following the orders you are given. James Bond never does that. It doesn’t matter what anyone says or tells him to do, he does the opposite. He always feels that he is in the right and he does his own thing at all times, no matter the consequences.

He travels under his own name

Anyone who knows anything about intelligence knows that they absolutely never travel using their own identity whilst on operations. That is part of the whole point of what they do. However, James Bond who is supposed to be one of the best, always travels under his own name and with his own documents.

He always draws attention to himself

Huge Marriott hack reportedly done by Chinese state hackers
Oh, wait… this getting very familiar all of a sudden

One of the biggest parts of intelligence training is how to never get noticed. For someone who is supposed to be a spy or secret agent or intelligence officer, depending on what you like, he draws an awful lot of attention to himself. He drives expensive cars, wears ridiculously expensive suits and stays at five-star hotels. Not to mention the fact that he is always blowing things up and firing his weapon in highly public places.

Everyone knows who he is 

The number one reason James Bond is the worst spy ever: Everyone knows exactly who he is. Every bad guy, every hotel receptionist, every bartender knows his name. He walks into a bar and is greeted with, “Good evening, Mr. Bond.” Plus, they know exactly what he drinks! Villains know his reputation and that he has a license to kill. They all know him on sight. To top it off they all know his 00 code number … His secret code number. The number of times an adversary uses 007 is absolutely astounding. This alone is enough to make James Bond the worst spy ever.

Huge Marriott hack reportedly done by Chinese state hackers
WORST…
Huge Marriott hack reportedly done by Chinese state hackers
…SPY…
Huge Marriott hack reportedly done by Chinese state hackers
…EVER.
Articles

US to arm Syria’s Kurdish fighters despite Turkish protests

The Trump administration announced May 9 it will arm Syria’s Kurdish fighters “as necessary” to recapture the key Islamic State stronghold of Raqqa, despite intense opposition from NATO ally Turkey, which sees the Kurds as terrorists.


The decision is meant to accelerate the Raqqa operation but undermines the Turkish government’s view that the Syrian Kurdish group known as the YPG is an extension of a Kurdish terrorist organization that operates in Turkey. Washington is eager to retake Raqqa, arguing that it is a haven for IS operatives to plan attacks on the West.

Huge Marriott hack reportedly done by Chinese state hackers
ISIS has a history of targeting Kurds and their allies. (Dept. of Defense photo)

Dana W. White, the Pentagon’s chief spokeswoman, said in a written statement that President Donald Trump authorized the arms May 8. His approval gives the Pentagon the go-ahead to “equip Kurdish elements of the Syrian Democratic Forces as necessary to ensure a clear victory over ISIS” in Raqqa, said White, who was traveling with Defense Secretary Jim Mattis in Europe.

The U.S. sees the Kurdish-led Syrian Democratic Forces, or SDF, as its most effective battlefield partner against IS in northern and eastern Syria. White said they’re “the only force on the ground that can successfully seize Raqqa in the near future.”

Also read: Turkey struck suspected Kurdish rebel positions in Iraq and Syria

While White did not mention the kinds of arms to be provided to the Kurds, other officials had indicated in recent days that 120mm mortars, machines guns, ammunition, and light armored vehicles were possibilities. They said the U.S. would not provide artillery or surface-to-air missiles.

The officials weren’t authorized to publicly discuss the matter and demanded anonymity. They described no firm timeline, with the American intention to provide the new weapons to the Syrian Kurds as soon as possible. A congressional aide said officials informed relevant members of Congress of the decision the evening of May 8.

The Obama administration had been leaning toward arming the Syrian Kurds but struggled with how that could be done without torpedoing relations with Turkey, which is a U.S. ally in NATO and a key political actor in the greater Middle East.

Huge Marriott hack reportedly done by Chinese state hackers
The Kurdish Peshmerga platoon of the Joint Iraqi Security Company marches to class, Mosul, Iraq. The U.S. trains Kurdish forces in the Middle East to help with the fight against terrorist groups in the area.

The issue has come to a head now because battlefield progress this year has put the U.S.-backed Syrian Democratic Forces nearly in position attack IS in Raqqa, although they are still attempting to isolate the city.

Even with the extra U.S. weaponry, the Kurds and their Syrian Arab partners are expected to face a difficult and perhaps lengthy fight for control of Raqqa, which has been key to the extremists’ state-building project. Raqqa is far smaller than Mosul, which is still not fully returned to Iraqi control after months of combat.

Related: Mattis warns that Syria still has chemical weapons

Senior U.S. officials including Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, have met repeatedly with Turkish officials to try to work out an arrangement for the Raqqa assault that would be acceptable to Ankara. The Turks have insisted that the Syrian Kurds be excluded from that operation, but U.S. officials insisted there was no real alternative.

In her statement, White said the U.S. prioritizes its support for the Arab elements of the SDF.

“We are keenly aware of the security concerns of our coalition partner Turkey,” she said. “We want to reassure the people and government of Turkey that the U.S. is committed to preventing additional security risks and protecting our NATO ally.”

Other officials said Trump’s authorization includes safeguards intended to reassure the Turks that the additional U.S. weaponry and equipment will not be used by the Kurds in Turkey. The intent is to restrict the distribution and use of the weaponry by permitting its use for specific battlefield missions and then requiring the Kurds to return it to U.S. control.

Turkish President Recep Tayyip Erdogan is to visit President Donald Trump in Washington in the third week of May. An Erdogan adviser, Ibrahim Kalin, met on May 9 with Thomas Shannon, the State Department No. 2 official.

Huge Marriott hack reportedly done by Chinese state hackers
Secretary of Defense Jim Mattis meets with Iraqi Minister of Defense Arfan al-Hayali at the Ministry of Defense in Baghdad, Iraq, Feb. 20, 2017. (DOD photo by U.S. Air Force Tech. Sgt. Brigitte N. Brantley)

And in Denmark earlier May 9, Defense Secretary Jim Mattis said he had useful discussions with Turkey and described the two countries as working out differences over a U.S. alliance with Syrian Kurds in fighting Islamic State militants.

“That’s not to say we all walk into the room with exactly the same appreciation of the problem or the path forward,” Mattis told reporters after meeting with officials from more than a dozen nations also fighting IS. Basat Ozturk, a senior Turkish defense official, participated.

“We’re going to sort it out,” Mattis said. “We’ll figure out how we’re going to do it.”

Tensions escalated in April when Turkey conducted airstrikes on Kurdish bases in Syria and Iraq. The Turkish military said it killed at least 90 militants and wounded scores. The Kurdish group in Syria said 20 of its fighters and media activists were killed in the strike, which was followed by cross-border clashes.

The instability has concerned Washington, which fears it will slow the effort to retake Raqqa.

“We’ve been conducting military and diplomatic dialogue with the Turks and it was a very, very useful discussion today,” Mattis said at a press conference with Danish Defense Minister Claus Hjort Frederiksen.

Do Not Sell My Personal Information