Forwarded from /CIG/ Telegram | Counter Intelligence Global (ȚepeȘ)
Chinese researchers are calling for improved space situational awareness, following an assessment of U.S. capabilities and trends.
An article noscriptd “A Review of Space Situational Awareness Satellites: Silentbarker,” published in the journal ACMSR, provides an in-depth review of the development, status and future trends of space situational awareness (SSA) satellites.
It focuses in particular on four significant programs developed by the United States. These are the Midcourse Space Experiment (MSX), the Space-Based Surveillance System (SBSS), the Geosynchronous Space Situational Awareness Program (GSSAP) and Silentbarker.
In light of the assessment, the authors, many of whom are attached to the Space Engineering University in Beijing, call for expanded Chinese SSA.
“The impact of space situational awareness satellites extends far beyond the protection of space assets to a wide range of other applications,” the report states.
Space Situational Awareness refers to the ability to detect, track, catalog, and understand objects and activities in outer space.
SSA can help “monitor and maintain national space security, thereby promoting national defense security and foreign policy implementation,” the report states, while adding that SSA can support international cooperation, and, on the commercial front, optimize the location and orbit of satellites. It also outlines benefits for academic purposes.
China is already at work in this area, says Victoria Samson, chief director of space security and stability at the Secure World Foundation.
“China is developing a sophisticated network of ground-based optical telescopes and radars for detecting, tracking, and characterizing space objects,” Samson told SpaceNews.
“Like the United States and Russia, several of the Chinese SSA radars also serve missile warning functions. While China lacks an extensive network of SSA tracking assets outside its borders, it does have a fleet of tracking ships and is developing relationships with countries that may host future sensors,” Samson says.
“Since 2010, China has deployed several satellites capable of conducting RPO on orbit, which likely aids in its ability to characterize and collect intelligence on foreign satellites.”
However, the researchers are calling for greater commercial capabilities. These can assist optimizing satellite operations, improving service coverage, and managing space traffic.
The U.S. is currently leading the way, the article says. It notes that its “deployed satellites and mature technology provide many learning opportunities for other countries.”
Please open Telegram to view this post
VIEW IN TELEGRAM
SpaceNews
Chinese researchers assess U.S. space situational awareness, call for boost in China’s capabilities
HELSINKI — Chinese researchers are calling for improved space situational awareness, following an assessment of U.S. capabilities and trends. An article noscriptd “A Review of Space Situational …
➡️ 31,9% (-0,2)
31,3% (+3,8)
11,6% (NEU)
7,8% (+0,1)
5,2% (-3,4)
4,5% (-5,9)
Other:
7.7% (-6.0)
🔗 Deutschland Wählt (@Wahlen_DE)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from vx-underground
Today journalist Brian Krebs released an article about the recent (sort of) compromise of National Public Data. Previously, National Public Data was (sort of) compromised which resulted in the theft of billions of records on individuals residing in the United States.
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
The drama update:
National Public Data owns a sub-company named RecordsCheck dot net. A customer of RecordsCheck dot net (later unveiled to be a law enforcement officer) was a victim of Information Stealer malware (e.g. Redline, Formbook, Lumma, etc). The malware stole login credentials to RecordsCheck for the law enforcement officer which allowed Threat Actors access to RecordsCheck with essentially infinite credits for searches. The Threat Actor(s) then subsequently began dumping as much data as possible.
The Brian Krebs plot twist:
Brian Krebs discovered that previously RecordsCheck publicly exposed a file on their website noscriptd: "members dot zip". This zip file contained the username and password for every customer on their platform (and supposedly other entities owned by National Public Data) in a plain text file. Krebs discovered that by default, each customer is assigned a 6-character password. As of a result of this accidental exposure, RecordsCheck instructed customers to change their default 6-character password. It turns out many DID NOT change their default assigned 6-character password.
More information on the file exposure, back story, discovery, etc. Can be found on Brian Kreb's article here: https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/
Krebs on Security
National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans' Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD…
Forwarded from NetBlocks
⚠️ Confirmed: Metrics show #Brazil's leading ISPs are now enforcing the Supreme Court's order to ban X (formerly Twitter); the order follows X's refusal to censor accounts associated with the previous administration and political right, and its refusal to appoint a representative
Admin took some time to rest, be offline and disconnected from telegram a bit. From tomorrow it will be back in full force! 🙂
👍3
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Tupi Report 🇧🇷 • #FreeVenezuela
"VENEZUELA IS ABOUT TO CHANGE ITS COURSE. In a very short time, you will be able to witness and be a protagonist in the movement that will fulfill the will of the Venezuelan people. The regime's game is over: this time, it's DIFFERENT. Almost There, Venezuela."
@realErikDPrince 🖇
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Tupi Report 🇧🇷 • #FreeVenezuela
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Tupi Report 🇧🇷 • #FreeVenezuela
This media is not supported in your browser
VIEW IN TELEGRAM
@yacasivenezuela 🖇
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Geopolitics Watch
🇮🇱❌🇱🇧 — Initial reports indicate that there was an explosion of a number of communications devices among Hezbollah elements.
Large number of injuries were recorded.
Large number of injuries were recorded.
#BREAKING
🇱🇧 ⚠️ 📞 — Lebanon’s Health Ministry urges all citizens who own Pager communication devices to immediately dispose of them and throw them away after a large scale Israeli cyberattack caused hundreds of such devices to explode
Please open Telegram to view this post
VIEW IN TELEGRAM
💔2
Forwarded from Disclose.tv
NOW - Hezbollah communication devices reportedly exploding across Lebanon. Hospitals are overflowing with injured people.
@disclosetv
@disclosetv
💔2
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM