Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. Military AI detects secret radar links between South China
      Sea, Alaska and Guam (Stephen Loosley)
   2. Using work laptops for personal use (Stephen Loosley)
   3. Vehicle-to-everything .. or V2X technology (Stephen Loosley)


----------------------------------------------------------------------

Message: 1
Date: Sun, 18 Aug 2024 15:12:06 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Military AI detects secret radar links between South
        China Sea, Alaska and Guam
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

`

Chinese military AI detects secret radar links between South China Sea, Alaska 
and Guam

Scientists say electromagnetic signals suggest tactical coordination among 
radars deployed across Pacific Ocean


By Stephen Chen in Beijing  Published: 10:00am, 16 Aug 2024  
https://www.scmp.com/news/china/science/article/3274610/chinas-military-ai-detects-secret-radar-links-between-south-china-sea-alaska-and-guam


Chinese electronic warfare AI has detected mysterious signals that repeatedly 
show up in the South China Sea, Guam, the Marshall Islands and the Aleutian 
Islands near Alaska ? and they appear to be coordinated.

Scientists involved in the investigation say that the characteristics of these 
electromagnetic signals suggest the existence of tactical coordination among 
military radars deployed in these areas across the Pacific Ocean.

This is the first time the People?s Liberation Army has publicly showed its 
ability to gather electronic warfare intelligence around the globe based on 
specific targets and actual reconnaissance data, according to the researchers.

The operational range of China?s naval and air forces in the Pacific has 
expanded from the South China Sea to Alaska and the US territory of Guam ? a 
key spot on the second island chain under Washington?s strategy to contain 
China.

Meanwhile, the Marshall Islands, in the central Pacific, are home to the US 
military?s most powerful space surveillance radar.

China and its competitors engaged in electronic confrontation every day around 
the globe, said the research team led by Zhou Changlin of the Strategic Support 
Forces Information Engineering University. They published their findings in a 
peer-reviewed paper in the Journal of Terahertz Science and Electronic 
Information Technology in May.  

https://m.researching.cn/Thz  

These events generate a large amount of signal data, including information on 
time, frequency, location, and electromagnetic parameters, Zhou and his 
colleagues wrote.

This data, which can be collected by warships, aircraft and satellites, has 
grown rapidly in terms of volume and complexity in recent years.

Traditional analysis methods have not been fast or accurate enough to meet the 
Chinese military?s intelligence data mining needs, according to the researchers.

Zhou and team have built a data processing platform, based on artificial 
intelligence algorithms, that enables massive data analysis and intelligence 
extraction to provide precise and customised services for combat units.

The AI system can analyse historical signals filled with noise and uncertainty 
to identify patterns of electronic tactical coordination among different types 
of radars belonging to different countries at various locations.

The paper lists some events that the AI considers to be correlated and provides 
their geographical coordinates.

This information helps the Chinese military better plan electronic warfare 
tasks such as electromagnetic suppression, deception, and jamming.

Zhous team says that the AI could also identify unknown types of radars, 
accurately guess their confidential operating parameters and even predict the 
future deployment of foreign naval fleets.

The electronic warfare AI works with other intelligence platforms, such as 
imaging satellites, to cross-check its findings.

Human experts have also played an important role in fine-tuning the AI model 
parameters, according to the Zhou team.

PLA electronic warfare equipment has made rapid progress in recent years, and 
its electronic warfare strategy has become proactive, while the United States 
sometimes finds itself on the defensive.

Last month, Chinese and Russian warships, along with strategic bombers, 
appeared in the waters near Alaska, while another set of Chinese and Russian 
vessels reportedly approached Guam, home to the largest US military base in the 
western Pacific.

The US Navy destroyer USS Rafael Peralta said on its official Facebook page 
that the ship (quote) protected Guam during the Chinese and Russian deployment.

However, the US Navy subsequently deleted the statement and described its 
interaction with Chinese and Russian warships as safe and professional, 
according to a Newsweek report on Monday.


Conversations
Comments will close in 11 days

All Comments (22) 

Li
The propaganda machinery has to be settled by an trusted advance AI network. 
How? I know the fake main media objectives in promoting their deep Dark agenda.
1d ago
ReplyShare
Join the conversation...


User since Jan 2023
Subscriber
Robert S.
Peacefull Negotiation In The South China Seas Disagreements Between ASEAN 
NATIONS & China Without Interferences From Other EVIL MINDED Nations Must Be 
Promoted Everyday.
1d ago
4 likes
ReplyShare
Join the conversation...


User since May 2021
Michael L.
China is capable of sinking any US submissions without warnings, that is a good 
thing.
1d ago
3 likes
ReplyShare
Join the conversation...


User since Apr 2016
Shaun K.
I saw on YouTube shorts that China had a laser canon, is what it is called, 
used for chopping down tree branches in about 2 seconds, you just need to aim 
the laser and fire. Off comes the branch falling towards the ground. The cut 
was really sharp just as if a worker climbed a ladder and chopped the branch 
off with an axe except that in this case the branch on one end was clearly 
charred. About 5 inches in diameter. Just as if the light beam went through the 
branch in about 1 second. Such a weapon can easily defeat multiple drones. The 
beam was over 20 feet long. From the ground to the spot on branch about 25 
feet. Anyway it seemed alright to keep the beam on without losing energy. You 
just wiggle the handle it would have chopped all nearby obstructions
1d ago ? Edited
6likes
ReplyShare
Join the conversation...


User since Jul 2024
Ti P.
Cant wait to defeat xiand his minions
1d ago
3 likes
ReplyShare
Join the conversation...


User since Feb 2024
Ron A.
@Ti P. And just who is going to do that?
1d ago
10 likes
ReplyShare
Join the conversation...


User since Apr 2024
Clarity :.
In 2007 shocked the military world - especially the US - by shooting down one 
of its own satellites which showed a capability no one thought it had. What was 
even more shocking for the US was that the satellite in question was about the 
size of a fridge. Basically, China was sending the message that if it can hit 
one of its own satellites with such ease...
2d ago
27 likes
ReplyShare
Join the conversation...


User since Jul 2018
Subscriber
Skar**@******
@Clarity :. And at a higher altitude than anyone had done yet
3h ago
ReplyShare
Join the conversation...


User since Feb 2024
Subscriber
Michael F.
When I first started reading this article I had flashbacks to Godzilla and The 
Transformers.
2d ago
3 likes
ReplyShare
Join the conversation...


User since Mar 2021
Subscriber
Egay N.
The world now has a chance at lasting peace with China able to see and hear 
what the other side is doing.  Its not good to have jut one dominant force.  
there should always be a balancing force.
2d ago
47 likes
ReplyShare
Join the conversation...

Egay N.
replied - 4 replies

User since Mar 2021
Subscriber
Egay N.
@Ti P. Im sure as the sun sets in the west that you don't even know the meaning 
of autocrat.
2d ago
28
ReplyShare
Join the conversation...


User since Jul 2024
Ti P.
@Egay N. Is that an another quote from xi redbook?
1d ago ? Edited
6
ReplyShare
Join the conversation...


User since Feb 2024
Ron A.
@Ti P. <<<<< Nobody wants another autocrat xi in the picture we have had enough 
with Russia ....<<<<< No one except the people of  China and Russia. And that's 
all that matters really.
1d ago
5

User since Dec 2022
Kenny J.
detection buoys to alert PACOM no doubt.
2d ago
2 likes
ReplyShare
Join the conversation...


User since May 2014
Subscriber
Emkay T.
China must counter the bullying tactics of the hegemon US to ensure peace and 
prosperity in this globalized world.
2d ago
52 likes
ReplyShare
Join the conversation...


W C.
replied - 4 replies
Load More

View previous comments

User since Aug 2024
W C.
@Juancho Y. Dont try to change history - Japan invaded China in 1937 - USA 
didnt attack Japan until it was attacked during Pearl Harbour in 1941! Nobody 
helped China against Japan until they themselves were harmed! Should Nvidia 
thank its investors for buying its stocks or should investors be thankful they 
got a nice return from their investment? I certainly didnt get any thanks from 
Huang.
2d ago ? Edited
31
ReplyShare
Join the conversation...


This comment(s) was removed because it contravened SCMP's commenting policy.

User since Nov 2020
Subscriber
Seow P.
@Juancho Y. If you want to bring up the history of China , I can share with you 
how China was torned into pieces and made to compensate an amounts equivalent 
to few years of GDP when it lost the wars to 8 invaders and colonisers in the 
last 150 years. China was impoverished by these huge and unfair compensations 
.This 150 years of humiliation will not be forgotten. China learned a big 
lesson. When you are too weak, the big powers including USA, Japan, Britain , 
Russia , France, Italy and Belgium will bully and take advantages of you. China 
has to strengthen its economy and military further to avoid a repeat of such 
humiliation.
2d ago ? Edited
30
ReplyShare
Join the conversation...





------------------------------

Message: 2
Date: Sun, 18 Aug 2024 23:55:24 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Using work laptops for personal use
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

`

You really need to stop using work laptops for personal use ? here's why

By Craig Hale, published yesterday  
https://www.techradar.com/pro/security/you-really-need-to-stop-using-their-work-laptops-for-personal-use-heres-why


Your work laptop should be for work only, experts warn

New research has revealed an overwhelming majority (90%) of workers use their 
company-provided laptops for personal activities, potentially posing a serious 
cybersecurity risk.

The study by ESET highlighted a substantial portion of employees also engage in 
risky activities using their business hardware, including viewing adult 
content, gambling, accessing the dark web and streaming sports illegally.

ESET blames the shift to hybrid and remote work on the added strain for 
security teams, adding companies should consider adding more robust security 
measures to manage corporate devices remotely, while also educating employees.

The survey found that two-thirds (63%) of respondents accessed the so-called 
dark-web on their work laptops weekly, with 17% doing so daily. 

Males were mostly to blame for accessing the dark web, while younger workers 
aged 16-24 were more likely to connect to unsecured public Wi-Fi and use 
personal USB devices.

?We often hear that employees are the weakest security link and endpoint 
security may not be the first thought on people's minds, which can cause issues 
when switching between work and personal devices," Jake Moore, Global 
Cybersecurity Advisor at ESET, commented.

Moore acknowledged the work-life balance benefits of hybrid and remote working 
setups, but stressed that companies should implement better cybersecurity 
processes.

However, despite the clear dangers of personal use and the benefits of remote 
management software, one in three (36%) would consider their boss viewing their 
personal activity as a violation of privacy.

Moreover, around one in five (18%) do not have any cybersecurity software on 
their work devices, and a further 7% were unsure if their device was adequately 
protected.

With hybrid working here to stay and boundaries between work and personal lives 
increasingly blurred, it?s clearer that companies need to impose stricter rules 
in order to protect both sensitive company information and employees.

--



------------------------------

Message: 3
Date: Mon, 19 Aug 2024 00:14:14 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Vehicle-to-everything .. or V2X technology
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

`

U.S. presses the ?reset button' on technology that lets cars talk to each other

By Joel Rose August 16, 2024  
https://www.npr.org/2024/08/16/nx-s1-5078616/cars-v2x-connected-vehicles-transportation-dot-nhtsa


WASHINGTON ? Safety advocates have been touting the potential of technology 
that allows vehicles to communicate wirelessly for years. 

So far, the rollout has been slow and uneven.

Now the U.S. Department of Transportation is releasing a roadmap it hopes will 
speed up deployment of that technology ? and save thousands of lives in the 
process.

?This is proven technology that works,? Shailen Bhatt, head of the Federal 
Highway Administration, said at an event Friday to mark the release of the 
deployment plan for vehicle-to-everything, or V2X, technology across U.S. roads 
and highways.

https://www.its.dot.gov/research_areas/emerging_tech/pdf/Accelerate_V2X_Deployment_final.pdf

V2X allows cars and trucks to exchange location information with each other, 
and potentially cyclists and pedestrians, as well as with the roadway 
infrastructure itself. Users could send and receive frequent messages to and 
from each other, continuously sharing information about speed, position, and 
road conditions ? even in situations with poor visibility, including around 
corners or in dense fog or heavy rain.

?The roadway system is safer when all the vehicles are connected, and all the 
road users are connected,? Bhatt said in an interview.

Safety advocates say V2X technology could help prevent thousands of crashes a 
year, and also mitigate damage by lowering the speed of impact when crashes do 
occur. They hope that help will bring down the number of traffic fatalities in 
the U.S., which has climbed to more than 40,000 per year.

?The plan is a vital first step towards realizing the full life-saving 
potential of this technology,? said Jennifer Homendy, the chair of the National 
Transportation Safety Board.

Vision Zero marks a milestone, but the goal of ending traffic deaths is still 
far off

Homendy joined the press event virtually from Swanton, Ohio, where the NTSB is 
investigating a series of crashes involving multiple trucks on the Ohio 
Turnpike this week. V2X technology could potentially have prevented the crashes 
that killed four people and injured several more, she said.

?V2X can help reverse the devastating public health crisis on our nation?s 
roads,? Homendy said, ?and fundamentally transform our nation?s transportation 
landscape.?

Despite enthusiasm from safety advocates and federal regulators, the technology 
has faced a bumpy rollout. During the Obama administration, the National 
Highway Traffic Safety Administration proposed making the technology mandatory 
on cars and light trucks. But the agency later dropped that idea during the 
Trump administration.

The deployment of V2X has been ?hampered by regulatory uncertainty,? said John 
Bozzella, president and CEO of the Alliance for Automotive Innovation, a trade 
group that represents automakers.

But he?s optimistic that the new plan will help.

?This is the reset button,? Bozzella said at Friday?s announcement. ?This 
deployment plan is a big deal. It is a crucial piece of this V2X puzzle.?

The plan lays out some goals and targets for the new technology. In the 
short-term, the plan aims to have V2X infrastructure in place on 20% of the 
National Highway System by 2028, and for 25% of the nation's largest metro 
areas to have V2X enabled at signalized intersections.

V2X technology still faces some daunting questions, including how to pay for 
the rollout of critical infrastructure and how to protect connected vehicles 
from cyberattack.

But safety advocates say it?s past time to find the answers.

?We know how to create safer cars using the incredible technology that has 
transformed life in America,? said Dan Langenkamp, whose wife, U.S. diplomat 
Sarah Langenkamp, was killed by a flatbed truck while riding her bicycle in 
Maryland almost two years ago.

?How can we as government officials, as manufacturers, and just as Americans, 
not push this technology forward as fast as we possibly can,? Langenkamp said, 
?knowing that we have the power to rescue ourselves from this disaster, this 
crisis on our roads.?


--



------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 381, Issue 14
*************************************

Reply via email to