NoGoolag
4.53K subscribers
14.3K photos
7.46K videos
600 files
14.9K links
Download Telegram
Forwarded from MessageInABottle
Forwarded from MessageInABottle
Media is too big
VIEW IN TELEGRAM
Economic Hitman John #Perkins:

How the
#USA Used #Debt and Economic #Sabotage to Control the World


Author of the best-selling ‘Confessions of an Economic Hitman’ John Perkins, discusses his past as an ‘economic hitman’ where he would work in the US National Security Agency (#NSA) to sabotage economies and burden them with debt, resulting in these countries being controlled by the US via debt.

He also discusses:

• why he believes #China now has its own set of ‘economic hitmen’ and ‘jackals’ following the same strategy as the US, the shift of global power away from the US with the rise of the global south, China and the other #BRICS countries,

• why economic sabotage has become harder for the US to apply in the Middle East,

• threats to his life for blowing the whistle on the US deliberate impoverishing of millions

and much more.....
Economics of #Imperialism https://web.archive.org/web/20230506114907/https://economicsofimperialism.blogspot.com/

#Russia, #China, #BRICS, World Economy
Rich countries run the world economy. The #G7 – the #US, #UK, #Germany, #France, #Italy, #Japan and #Canada – directly manage all major international bodies or greatly influence how these work. In the process, they set the terms for international trade and investment. Any country that disobeys their US-led ‘rules-based order’ is faced with sanctions, economic isolation and military threats
.

The US Tech War Against Chinahttps://nocoldwar.org/news/briefing-us-tech-war-against-china

On 8 April, Chairman of the US House Foreign Affairs Committee Michael McCaul was asked to explain ‘why Americans… should be willing to spill American blood and treasure to defend Taiwan’. His answer was telling: ‘TSMC [Taiwan Semiconductor Manufacturing Company] manufactures 90% of the global supply of advanced semiconductor chips’.
Remember when the US military was collecting Russian #DNA / #RNA? [Video from 2018 Valdai forum].

Now, #China says #Pentagon has developed weapons that will only target specific races.

@inessas1992
Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives - Check Point Research – June 2023

In early 2023, the Check Point Incident Response Team (CPIRT) team investigated a malware incident at a European healthcare institution involving a set of tools mentioned in the Avast report in late 2022. The incident was attributed to Camaro Dragon, a Chinese-based espionage threat actor whose activities overlap with activities tracked by different researchers as Mustang Panda and LuminousMoth, whose focus is primarily on Southeast Asian countries and their close peers.


#CamaroDragon #USB #Flashdrive #MustangPanda #LuminousMoth #espionage #malware #China #Asia
Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks – TheHackerNews - June 2023

The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since at least mid-2020, with the hacking crew linked to never-before-seen tradecraft to retain remote access to targets of interest.

The findings come from CrowdStrike, which is tracking the adversary under the name Vanguard Panda.

"The adversary consistently employed ManageEngine Self-service Plus exploits to gain initial access, followed by custom web shells for persistent access, and living-off-the-land (LotL) techniques for lateral movement,"


Falcon Complete MDR Thwarts VANGUARD PANDA Tradecraft – CrowdStrike - June 2023

#VoltTyphoon #VanguarPanda #China #espionage #spyware #malware
ooni@mastodon.social - Starting June 22nd, OONI data from China shows the blocking of F-Droid by means of DNS injection, where an unrelated IP address (e.g., DropBox) is returned to the client.

This technique is commonly used in China to restrict access to services.
OONI data showing the block of F-Droid on at least 4 networks can be found here


#FDroid #China #censorship #DNS #DNSinjection
How a cloud flaw gave Chinese spies a key to Microsoft’s kingdom

For most IT professionals, the move to the cloud has been a godsend. Instead of protecting your data yourself, let the security experts at Google or Microsoft protect it instead. But when a single stolen key can let hackers access cloud data from dozens of organizations, that trade-off starts to sound far more risky.

Late Tuesday evening, Microsoft revealed that a China-based hacker group, dubbed Storm-0558, had done exactly that. The group, which is focused on espionage against Western European governments, had accessed the cloud-based Outlook email systems of 25 organizations, including multiple government agencies.

This latest attack uses a unique trick: Microsoft says hackers stole a cryptographic key that let them generate their own authentication “tokens”—strings of information meant to prove a user’s identity—giving them free rein across dozens of Microsoft customer accounts.


#Storm0558 #China #Infosec
#espionage