http://www.washingtontimes.com/news/2017/may/3/china-superco
mputers-threaten-us-security/
Inside the Ring: China supercomputers threaten U.S. security

China is eclipsing the United States in developing high-speed
supercomputers used to build advanced weapons, and the loss of American
leadership in the field poses a threat to U.S. national security.

That’s the conclusion of a recent joint National Security Agency-Energy
Department study, based on an assessment of China’s new supercomputer
called the TaihuLight.

“National security requires the best computing available, and loss of
leadership in [high-performance computing] will severely compromise our
national security,” the report warns.

Supercomputers play a “vital role” in the design, development and analysis
of almost all modern weapons systems, including nuclear weapons,
cyberwarfare capabilities, ships, aircraft, communications security,
missile defense, precision-strike capabilities and hypersonic weapons, the
report said.

China is rapidly developing hypersonic strike missiles that can deliver
conventional and nuclear payloads by maneuvering past advanced missile
defenses.

“Loss of leadership in [high-performance computing] could significantly
reduce the U.S. nuclear deterrence and the sophistication of our future
weapons systems,” the report says.

“Conversely, if China fields a weapons system with new capabilities based
on superior [high-performance computing], and the U.S. cannot accurately
estimate its true capabilities, there is a serious possibility of over- or
underestimating the threat.”

A copy of the 18-page report, “U.S. Leadership in High Performance
Computing (HPC): A Report from the NSA-DOE Technical Meeting on High
Performance Computing,” dated Dec. 1, has been obtained by Inside the Ring.

Chinese supremacy in computer capabilities also could produce distortions
in allocating defense funds for U.S. research and development, and
strategic policymaking and result in “incorrect responses to world events,”
the report said.

Currently, the United States has a cost-effective supercomputer capability.
But loss of U.S. leadership in the field would result in acquisition of
supercomputers in ways similar to Pentagon acquisition of aircraft carriers
— at vastly increased costs.

For industrial applications, if the United States were to become reliant on
Chinese supercomputers, it “could threaten the loss of intellectual
property and competitive edge.”

“Personal email and private information, social networks and the emerging
Internet of Things are all subject to even greater privacy risks if
offshore entities have superior HPC analytics or control the
data/information markets,” the report said.

The report called for a surge in U.S. government investment and action in
supercomputing, including the priorities outlined in the 2016 National
Strategic Computing Initiative Plan.

Energy Department national laboratories and the Intelligence Advanced
Research Projects Activity are working on cutting-edge supercomputers.

The study was based on a two-day conference in September of some 60
experts, including 40 from U.S. government agencies, 10 from the technology
industry and 10 from academia and other organizations.

*PENTAGON LATE WITH HYBRID WARFARE STUDY*

The Pentagon is two years late in supplying Congress with a study on new
strategies for countering unconventional warfare threats posed by Russia,
China, Iran and North Korea.

Rep. *Elise M. Stefanik*, chairwoman of the House Armed Services
subcommittee on emerging threats, pressed a senior Pentagon official on the
subject during a hearing Tuesday. The study was required in 2015
legislation.

“This strategy, which is now almost two years late, ultimately can help
provide a way to ensure that our ends, ways and means are aligned to help
counter these unconventional threats,” said Ms. Stefanik, New York
Republican.

Unconventional warfare is the use of nonkinetic warfare capabilities
ranging from cyber and electronic attacks to “influence operations” using
political, media and legal means.

In response, *Theresa Whelan*, assistant defense secretary for special
operations and low-intensity conflict, said unconventional warfare is an
emerging threat and the Pentagon is studying the issue. Ms. Whelan noted
that the military’s counterterrorism mission has been the main focus of
low-intensity conflict.

“We have, as a consequence, had to shift resources to focus on this and
develop capabilities and knowledge bases that had, to certain extent,
atrophied over the years,” she said.

“But also, because the nature of UW has fundamentally changed because of
21st-century technologies and techniques, we really in many ways have been
starting from scratch. And that has been one of the challenges that we’ve
faced as we dug into this over the last 18 to 24 months.”

Russia used hybrid warfare to take over Ukraine’s Crimean Peninsula in 2014
and its cyber-enabled influence operation targeting the 2016 U.S.
presidential election. China has been using similar information operations
in its bid to gradually take control of the South China Sea.

Examples of Iranian information operations have included cyberattacks on
U.S. banks and a waterway control system in upstate New York.

North Korea has used extensive cyberattacks to achieve objectives —
including the cyberattack on Sony Picture Entertainment and cyberattacks on
banks in Asia that netted the regime in Pyongyang tens of million of
dollars.

The Pentagon is working with other U.S. government agencies to deal with
what Ms. Whalen called “multiple threats” from foreign information
operations.

Georgetown University has conducted a study for the Pentagon that found
that America’s adversaries are “focusing on the seams between our
organizational entities and trying to exploit those seams and
decision-making cycles in order to gain advantage on us in the space that
essentially is below conventional war — the space that we now refer to as
the gray zone or hybrid warfare,” Ms. Whalen said.

Two research projects are underway on the topic of unconventional warfare,
one at Johns Hopkins University on Russian hybrid warfare, and a Pentagon
research effort to develop predictive analytic technologies.

The technologies “will help us identify when countries are utilizing
unconventional warfare techniques at levels essentially below our normal
observation thresholds,” Ms. Whalen said.

After the Russia unconventional warfare strategy is completed, the Pentagon
will look at Chinese and Iranian unconventional warfare threats, she added.
“This continues to be an evolving threat.”

*REPORT CALLS FOR DEFEATING JIHADIS ONLINE*

The global Islamic terrorist movement could not function without the
internet and defeating terrorism online is possible, according to a report
by the Middle East Research Institute (MEMRI).

“Jihadi organizations used the web to recruit supporters and fighters,
provide practical instruction and manuals for terror operations including
car bomb and ramming attacks, make arch-terrorists into heroic models for
emulation, and raise funds for their activity,” the report says. “The
internet provided them with an ideal vehicle for spreading their ideas,
even to young children.”

Recently, social media companies have begun to lose advertising revenue as
a result of hateful content on their sites. Companies including Johnson &
Johnson, Toyota, General Motors, Wal-Mart, AT&T and HSBC have pulled ads to
protest terrorist videos, the report said.

Governments also are pressuring media to remove hateful speech, and
families have begun to sue internet companies for carrying content that
incited and radicalized terrorists who killed relatives.

The MEMRI report said the measures are good first steps but that more needs
to be done. The internet should be purged of jihadi propaganda and
incitement content through financial investments, and new technologies
could identify and remove jihadi material.

“Purging the internet of jihadi content can deal with terrorism at its
source, and can have an immediate impact on recruitment, indoctrination and
training of terrorists,” the report said. “This will significantly reduce
the threat which will, in turn, enable Western democracies to reduce the
degree of infringement upon our liberties, freedoms and daily life.”




------------------------------
[image: Avast logo] <https://www.avast.com/antivirus>

This email has been checked for viruses by Avast antivirus software.
www.avast.com <https://www.avast.com/antivirus>

<#m_-5181306143777655774_m_5133823592911585792_m_-6425969584440842831_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>


__._,_.___
------------------------------
Posted by: "Beowulf" <[email protected]>
------------------------------


Visit Your Group
<https://groups.yahoo.com/neo/groups/grendelreport/info;_ylc=X3oDMTJmZ2ZlajFyBF9TAzk3MzU5NzE0BGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDdnRsBHNsawN2Z2hwBHN0aW1lAzE0OTQ1NDU2ODA->


[image: Yahoo! Groups]
<https://groups.yahoo.com/neo;_ylc=X3oDMTJlcTNkcG5uBF9TAzk3NDc2NTkwBGdycElkAzIwMTk0ODA2BGdycHNwSWQDMTcwNTMyMzY2NwRzZWMDZnRyBHNsawNnZnAEc3RpbWUDMTQ5NDU0NTY4MA-->
• Privacy <https://info.yahoo.com/privacy/us/yahoo/groups/details.html> •
Unsubscribe <[email protected]?subject=Unsubscribe>
• Terms of Use <https://info.yahoo.com/legal/us/yahoo/utos/terms/>

__,_._,___

-- 
-- 
Thanks for being part of "PoliticalForum" at Google Groups.
For options & help see http://groups.google.com/group/PoliticalForum

* Visit our other community at http://www.PoliticalForum.com/  
* It's active and moderated. Register and vote in our polls. 
* Read the latest breaking news, and more.
--- 
You received this message because you are subscribed to the Google Groups 
"PoliticalForum" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to