Send Link mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."
Today's Topics:
1. Military AI detects secret radar links between South China
Sea, Alaska and Guam (Stephen Loosley)
2. Using work laptops for personal use (Stephen Loosley)
3. Vehicle-to-everything .. or V2X technology (Stephen Loosley)
----------------------------------------------------------------------
Message: 1
Date: Sun, 18 Aug 2024 15:12:06 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Military AI detects secret radar links between South
China Sea, Alaska and Guam
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"
`
Chinese military AI detects secret radar links between South China Sea, Alaska
and Guam
Scientists say electromagnetic signals suggest tactical coordination among
radars deployed across Pacific Ocean
By Stephen Chen in Beijing Published: 10:00am, 16 Aug 2024
https://www.scmp.com/news/china/science/article/3274610/chinas-military-ai-detects-secret-radar-links-between-south-china-sea-alaska-and-guam
Chinese electronic warfare AI has detected mysterious signals that repeatedly
show up in the South China Sea, Guam, the Marshall Islands and the Aleutian
Islands near Alaska ? and they appear to be coordinated.
Scientists involved in the investigation say that the characteristics of these
electromagnetic signals suggest the existence of tactical coordination among
military radars deployed in these areas across the Pacific Ocean.
This is the first time the People?s Liberation Army has publicly showed its
ability to gather electronic warfare intelligence around the globe based on
specific targets and actual reconnaissance data, according to the researchers.
The operational range of China?s naval and air forces in the Pacific has
expanded from the South China Sea to Alaska and the US territory of Guam ? a
key spot on the second island chain under Washington?s strategy to contain
China.
Meanwhile, the Marshall Islands, in the central Pacific, are home to the US
military?s most powerful space surveillance radar.
China and its competitors engaged in electronic confrontation every day around
the globe, said the research team led by Zhou Changlin of the Strategic Support
Forces Information Engineering University. They published their findings in a
peer-reviewed paper in the Journal of Terahertz Science and Electronic
Information Technology in May.
https://m.researching.cn/Thz
These events generate a large amount of signal data, including information on
time, frequency, location, and electromagnetic parameters, Zhou and his
colleagues wrote.
This data, which can be collected by warships, aircraft and satellites, has
grown rapidly in terms of volume and complexity in recent years.
Traditional analysis methods have not been fast or accurate enough to meet the
Chinese military?s intelligence data mining needs, according to the researchers.
Zhou and team have built a data processing platform, based on artificial
intelligence algorithms, that enables massive data analysis and intelligence
extraction to provide precise and customised services for combat units.
The AI system can analyse historical signals filled with noise and uncertainty
to identify patterns of electronic tactical coordination among different types
of radars belonging to different countries at various locations.
The paper lists some events that the AI considers to be correlated and provides
their geographical coordinates.
This information helps the Chinese military better plan electronic warfare
tasks such as electromagnetic suppression, deception, and jamming.
Zhous team says that the AI could also identify unknown types of radars,
accurately guess their confidential operating parameters and even predict the
future deployment of foreign naval fleets.
The electronic warfare AI works with other intelligence platforms, such as
imaging satellites, to cross-check its findings.
Human experts have also played an important role in fine-tuning the AI model
parameters, according to the Zhou team.
PLA electronic warfare equipment has made rapid progress in recent years, and
its electronic warfare strategy has become proactive, while the United States
sometimes finds itself on the defensive.
Last month, Chinese and Russian warships, along with strategic bombers,
appeared in the waters near Alaska, while another set of Chinese and Russian
vessels reportedly approached Guam, home to the largest US military base in the
western Pacific.
The US Navy destroyer USS Rafael Peralta said on its official Facebook page
that the ship (quote) protected Guam during the Chinese and Russian deployment.
However, the US Navy subsequently deleted the statement and described its
interaction with Chinese and Russian warships as safe and professional,
according to a Newsweek report on Monday.
Conversations
Comments will close in 11 days
All Comments (22)
Li
The propaganda machinery has to be settled by an trusted advance AI network.
How? I know the fake main media objectives in promoting their deep Dark agenda.
1d ago
ReplyShare
Join the conversation...
User since Jan 2023
Subscriber
Robert S.
Peacefull Negotiation In The South China Seas Disagreements Between ASEAN
NATIONS & China Without Interferences From Other EVIL MINDED Nations Must Be
Promoted Everyday.
1d ago
4 likes
ReplyShare
Join the conversation...
User since May 2021
Michael L.
China is capable of sinking any US submissions without warnings, that is a good
thing.
1d ago
3 likes
ReplyShare
Join the conversation...
User since Apr 2016
Shaun K.
I saw on YouTube shorts that China had a laser canon, is what it is called,
used for chopping down tree branches in about 2 seconds, you just need to aim
the laser and fire. Off comes the branch falling towards the ground. The cut
was really sharp just as if a worker climbed a ladder and chopped the branch
off with an axe except that in this case the branch on one end was clearly
charred. About 5 inches in diameter. Just as if the light beam went through the
branch in about 1 second. Such a weapon can easily defeat multiple drones. The
beam was over 20 feet long. From the ground to the spot on branch about 25
feet. Anyway it seemed alright to keep the beam on without losing energy. You
just wiggle the handle it would have chopped all nearby obstructions
1d ago ? Edited
6likes
ReplyShare
Join the conversation...
User since Jul 2024
Ti P.
Cant wait to defeat xiand his minions
1d ago
3 likes
ReplyShare
Join the conversation...
User since Feb 2024
Ron A.
@Ti P. And just who is going to do that?
1d ago
10 likes
ReplyShare
Join the conversation...
User since Apr 2024
Clarity :.
In 2007 shocked the military world - especially the US - by shooting down one
of its own satellites which showed a capability no one thought it had. What was
even more shocking for the US was that the satellite in question was about the
size of a fridge. Basically, China was sending the message that if it can hit
one of its own satellites with such ease...
2d ago
27 likes
ReplyShare
Join the conversation...
User since Jul 2018
Subscriber
Skar**@******
@Clarity :. And at a higher altitude than anyone had done yet
3h ago
ReplyShare
Join the conversation...
User since Feb 2024
Subscriber
Michael F.
When I first started reading this article I had flashbacks to Godzilla and The
Transformers.
2d ago
3 likes
ReplyShare
Join the conversation...
User since Mar 2021
Subscriber
Egay N.
The world now has a chance at lasting peace with China able to see and hear
what the other side is doing. Its not good to have jut one dominant force.
there should always be a balancing force.
2d ago
47 likes
ReplyShare
Join the conversation...
Egay N.
replied - 4 replies
User since Mar 2021
Subscriber
Egay N.
@Ti P. Im sure as the sun sets in the west that you don't even know the meaning
of autocrat.
2d ago
28
ReplyShare
Join the conversation...
User since Jul 2024
Ti P.
@Egay N. Is that an another quote from xi redbook?
1d ago ? Edited
6
ReplyShare
Join the conversation...
User since Feb 2024
Ron A.
@Ti P. <<<<< Nobody wants another autocrat xi in the picture we have had enough
with Russia ....<<<<< No one except the people of China and Russia. And that's
all that matters really.
1d ago
5
User since Dec 2022
Kenny J.
detection buoys to alert PACOM no doubt.
2d ago
2 likes
ReplyShare
Join the conversation...
User since May 2014
Subscriber
Emkay T.
China must counter the bullying tactics of the hegemon US to ensure peace and
prosperity in this globalized world.
2d ago
52 likes
ReplyShare
Join the conversation...
W C.
replied - 4 replies
Load More
View previous comments
User since Aug 2024
W C.
@Juancho Y. Dont try to change history - Japan invaded China in 1937 - USA
didnt attack Japan until it was attacked during Pearl Harbour in 1941! Nobody
helped China against Japan until they themselves were harmed! Should Nvidia
thank its investors for buying its stocks or should investors be thankful they
got a nice return from their investment? I certainly didnt get any thanks from
Huang.
2d ago ? Edited
31
ReplyShare
Join the conversation...
This comment(s) was removed because it contravened SCMP's commenting policy.
User since Nov 2020
Subscriber
Seow P.
@Juancho Y. If you want to bring up the history of China , I can share with you
how China was torned into pieces and made to compensate an amounts equivalent
to few years of GDP when it lost the wars to 8 invaders and colonisers in the
last 150 years. China was impoverished by these huge and unfair compensations
.This 150 years of humiliation will not be forgotten. China learned a big
lesson. When you are too weak, the big powers including USA, Japan, Britain ,
Russia , France, Italy and Belgium will bully and take advantages of you. China
has to strengthen its economy and military further to avoid a repeat of such
humiliation.
2d ago ? Edited
30
ReplyShare
Join the conversation...
------------------------------
Message: 2
Date: Sun, 18 Aug 2024 23:55:24 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Using work laptops for personal use
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"
`
You really need to stop using work laptops for personal use ? here's why
By Craig Hale, published yesterday
https://www.techradar.com/pro/security/you-really-need-to-stop-using-their-work-laptops-for-personal-use-heres-why
Your work laptop should be for work only, experts warn
New research has revealed an overwhelming majority (90%) of workers use their
company-provided laptops for personal activities, potentially posing a serious
cybersecurity risk.
The study by ESET highlighted a substantial portion of employees also engage in
risky activities using their business hardware, including viewing adult
content, gambling, accessing the dark web and streaming sports illegally.
ESET blames the shift to hybrid and remote work on the added strain for
security teams, adding companies should consider adding more robust security
measures to manage corporate devices remotely, while also educating employees.
The survey found that two-thirds (63%) of respondents accessed the so-called
dark-web on their work laptops weekly, with 17% doing so daily.
Males were mostly to blame for accessing the dark web, while younger workers
aged 16-24 were more likely to connect to unsecured public Wi-Fi and use
personal USB devices.
?We often hear that employees are the weakest security link and endpoint
security may not be the first thought on people's minds, which can cause issues
when switching between work and personal devices," Jake Moore, Global
Cybersecurity Advisor at ESET, commented.
Moore acknowledged the work-life balance benefits of hybrid and remote working
setups, but stressed that companies should implement better cybersecurity
processes.
However, despite the clear dangers of personal use and the benefits of remote
management software, one in three (36%) would consider their boss viewing their
personal activity as a violation of privacy.
Moreover, around one in five (18%) do not have any cybersecurity software on
their work devices, and a further 7% were unsure if their device was adequately
protected.
With hybrid working here to stay and boundaries between work and personal lives
increasingly blurred, it?s clearer that companies need to impose stricter rules
in order to protect both sensitive company information and employees.
--
------------------------------
Message: 3
Date: Mon, 19 Aug 2024 00:14:14 +0930
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Vehicle-to-everything .. or V2X technology
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"
`
U.S. presses the ?reset button' on technology that lets cars talk to each other
By Joel Rose August 16, 2024
https://www.npr.org/2024/08/16/nx-s1-5078616/cars-v2x-connected-vehicles-transportation-dot-nhtsa
WASHINGTON ? Safety advocates have been touting the potential of technology
that allows vehicles to communicate wirelessly for years.
So far, the rollout has been slow and uneven.
Now the U.S. Department of Transportation is releasing a roadmap it hopes will
speed up deployment of that technology ? and save thousands of lives in the
process.
?This is proven technology that works,? Shailen Bhatt, head of the Federal
Highway Administration, said at an event Friday to mark the release of the
deployment plan for vehicle-to-everything, or V2X, technology across U.S. roads
and highways.
https://www.its.dot.gov/research_areas/emerging_tech/pdf/Accelerate_V2X_Deployment_final.pdf
V2X allows cars and trucks to exchange location information with each other,
and potentially cyclists and pedestrians, as well as with the roadway
infrastructure itself. Users could send and receive frequent messages to and
from each other, continuously sharing information about speed, position, and
road conditions ? even in situations with poor visibility, including around
corners or in dense fog or heavy rain.
?The roadway system is safer when all the vehicles are connected, and all the
road users are connected,? Bhatt said in an interview.
Safety advocates say V2X technology could help prevent thousands of crashes a
year, and also mitigate damage by lowering the speed of impact when crashes do
occur. They hope that help will bring down the number of traffic fatalities in
the U.S., which has climbed to more than 40,000 per year.
?The plan is a vital first step towards realizing the full life-saving
potential of this technology,? said Jennifer Homendy, the chair of the National
Transportation Safety Board.
Vision Zero marks a milestone, but the goal of ending traffic deaths is still
far off
Homendy joined the press event virtually from Swanton, Ohio, where the NTSB is
investigating a series of crashes involving multiple trucks on the Ohio
Turnpike this week. V2X technology could potentially have prevented the crashes
that killed four people and injured several more, she said.
?V2X can help reverse the devastating public health crisis on our nation?s
roads,? Homendy said, ?and fundamentally transform our nation?s transportation
landscape.?
Despite enthusiasm from safety advocates and federal regulators, the technology
has faced a bumpy rollout. During the Obama administration, the National
Highway Traffic Safety Administration proposed making the technology mandatory
on cars and light trucks. But the agency later dropped that idea during the
Trump administration.
The deployment of V2X has been ?hampered by regulatory uncertainty,? said John
Bozzella, president and CEO of the Alliance for Automotive Innovation, a trade
group that represents automakers.
But he?s optimistic that the new plan will help.
?This is the reset button,? Bozzella said at Friday?s announcement. ?This
deployment plan is a big deal. It is a crucial piece of this V2X puzzle.?
The plan lays out some goals and targets for the new technology. In the
short-term, the plan aims to have V2X infrastructure in place on 20% of the
National Highway System by 2028, and for 25% of the nation's largest metro
areas to have V2X enabled at signalized intersections.
V2X technology still faces some daunting questions, including how to pay for
the rollout of critical infrastructure and how to protect connected vehicles
from cyberattack.
But safety advocates say it?s past time to find the answers.
?We know how to create safer cars using the incredible technology that has
transformed life in America,? said Dan Langenkamp, whose wife, U.S. diplomat
Sarah Langenkamp, was killed by a flatbed truck while riding her bicycle in
Maryland almost two years ago.
?How can we as government officials, as manufacturers, and just as Americans,
not push this technology forward as fast as we possibly can,? Langenkamp said,
?knowing that we have the power to rescue ourselves from this disaster, this
crisis on our roads.?
--
------------------------------
Subject: Digest Footer
_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link
------------------------------
End of Link Digest, Vol 381, Issue 14
*************************************