<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Intelligence records &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/intelligence-records/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Mon, 07 Jun 2021 19:25:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Two Wuhan experts are criticized for being careless when studying bats</title>
		<link>https://en.spress.net/two-wuhan-experts-are-criticized-for-being-careless-when-studying-bats/</link>
		
		<dc:creator><![CDATA[Quốc Đạt]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 19:25:22 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[Accumulation]]></category>
		<category><![CDATA[Batman]]></category>
		<category><![CDATA[Bats]]></category>
		<category><![CDATA[careless]]></category>
		<category><![CDATA[Carelessness]]></category>
		<category><![CDATA[Cave]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[criticized]]></category>
		<category><![CDATA[Experts]]></category>
		<category><![CDATA[Hypothesis]]></category>
		<category><![CDATA[Intelligence records]]></category>
		<category><![CDATA[Laboratory]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[revive]]></category>
		<category><![CDATA[Studying]]></category>
		<category><![CDATA[Thach Chinh Le]]></category>
		<category><![CDATA[Vien Chi Minh]]></category>
		<category><![CDATA[WHO]]></category>
		<category><![CDATA[WIV]]></category>
		<category><![CDATA[Wuhan]]></category>
		<category><![CDATA[Wuhan CDC]]></category>
		<category><![CDATA[Wuhan Institute of Virology]]></category>
		<guid isPermaLink="false">https://en.spress.net/two-wuhan-experts-are-criticized-for-being-careless-when-studying-bats/</guid>

					<description><![CDATA[Suspicion is pouring on two experts on bat diseases in China, while the theory that the corona virus leaked from the laboratory &#8216;suddenly came back to life&#8217;. Until now, scientists are constantly searching for an answer to the question: where did the SARS-CoV-2 virus originate? The report released by the WHO expert group at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Suspicion is pouring on two experts on bat diseases in China, while the theory that the corona virus leaked from the laboratory &#8216;suddenly came back to life&#8217;.</strong><br />
<span id="more-21352"></span> Until now, scientists are constantly searching for an answer to the question: where did the SARS-CoV-2 virus originate? The report released by the WHO expert group at the end of March after a trip to Wuhan, China did not bring the world any closer to the answer.</p>
<p> The lack of information raises more questions. Recently, 24 scientists sent a letter to the World Health Organization (WHO) asking for an independent and rigorous investigation because they thought that the international investigation to China in early February was not deep enough. US President Joe Biden on May 26 also ordered intelligence forces to &#8220;double efforts&#8221; to investigate the origin of the Covid-19 pandemic, including the possibility of a leak &#8220;from a laboratory accident&#8221;. While the theory that the corona virus leaked from the laboratory was &#8220;resurrected&#8221;, two competing groups of experts in the study of bat diseases in Wuhan became the target of criticism. The reason is that they are willing to ignore safety measures during research. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_119_39084316/9106c440d6023f5c6613.jpg" width="625" height="416"> <em> Many new diseases in the past originated in bats. Photo: SCMP. </em> <strong> &#8220;Batwoman&#8221; and Wuhan Institute of Virology</strong> Nicknamed &#8220;bat woman&#8221;, Dr. Shi Zhengli is a famous Chinese corona virus researcher. She has identified many strains of the virus similar to SARS (severe acute respiratory distress syndrome) over the years and forewarned of new pandemic risks. Thach&#8217;s laboratory at the Wuhan Institute of Virology (WIV) also discovered and studied viruses that are closely related to corona virus. However, the scientists point out that the two viruses are still decades apart in natural evolution. According to the report of the WHO expert team, Ms. Thach said that all field activities were carried out with full protective clothing, including N95 masks, overalls, visors, and gloves. However, in a speech in June 2018, Ms. Thach said that is not the case. &#8220;Most of the time, we&#8217;ll wear simpler protective gear, and that&#8217;s fine,&#8221; Thach said in her speech. That&#8217;s because most diseases in bats can&#8217;t be directly transmitted to humans, but can only be through intermediate animals, Ms. Thach explained. To illustrate, Ms. Thach showed the audience during the presentation a photo of her team casting nets to catch bats in the cave and sorting the samples. Some people on the team only wore medical masks and thin rubber gloves, while others used their bare hands and did not wear masks. “When are we going to strengthen the protective gear? For example, when there are too many bats in the cave or when there is a lot of dust when entering the cave,&#8221; Thach said. When the pandemic hit, Ms. Thach became quiet and appeared only occasionally. On February 2, 2020, she posted to friends on the social network WeChat and &#8220;swore on her life&#8221; that her lab was not related to the pandemic. Three months later, Ms. Thach continued to post denying rumors that she had brought intelligence files to the West, according to <em> Global Times</em> . <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_119_39084316/c87f9339817b6825316a.jpg" width="625" height="416"> <em> Chinese virologist Shi Zhengli at the Wuhan Institute of Virology. Photo: AFP. </em> When suspicions fell on the WIV, Ms. Thach sent a statement to the scientific journal Science in July. She said the corona virus could not have come from the WIV because her team did not encounter this strain during research. In addition, every employee here has tested negative for corona virus antibodies. According to Ms. Thach, before the pandemic, her team &#8220;never exposed or studied this virus, and did not know of its existence&#8221;. But she also admitted that her lab has not yet sequenced the genes of every sample due to financial and human constraints. She declined to say how many samples remain unsequenced. In January, Thach&#8217;s laboratory was questioned even more after the US State Department announced that there were &#8220;reasons to believe&#8221; that some WIV researchers showed symptoms similar to Covid-19 in the fall of 2019. May, <em> Wall Street Journal</em> also cited intelligence reports that three WIV researchers had been so sick that they needed to be examined. Vien Chi Minh, WIV&#8217;s laboratory director, called this a &#8220;blatant lie&#8221; in response to state media. <strong> Bat explorer and Wuhan CDC CDC</strong> During this time, the Wuhan Center for Disease Control and Prevention (CDC) lab was less visible than the WIV. The WHO expert team&#8217;s report on the trip to the Wuhan CDC did not include notes on research safety measures. According to the report, the laboratory moved on December 2, 2019 to a location near the Huanan market &#8211; the market that was linked to the first cases of corona virus infection. &#8220;Such activity can disrupt the operation of any laboratory,&#8221; the WHO expert team said. However, the Wuhan CDC laboratory did not record any interruptions, according to the WHO expert. The Wuhan CDC is the place to monitor China&#8217;s initial response to the pandemic. At the Wuhan CDC, there is also a person who regularly works with bats &#8211; Dien Tuan Hoa. According to the <em> Washington Post</em> , in terms of position, Dien Tuan Hoa is a deputy technician in the pest control department of the Wuhan CDC. But Mr. Dien is known for being an aggressive adventurer when it comes to working with bats and insects. “He often goes to places that other people cannot find to get the necessary specimens,” a colleague said of Mr. Dien on a local TV station in January 2020. &#8220;He can confidently say that he can catch what others can&#8217;t.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_119_39084316/91f0c9b6dbf432aa6be5.jpg" width="625" height="416"> <em> Tian Junhua on a field trip to collect insects in Hubei province. Photo: China Daily. </em> Using nets and traps, Mr. Dien&#8217;s team caught 155 bats in his home province of Hubei, and hundreds of bats in other areas for research in 2013. Mr. Dien was also a member of the team. discovered 1,445 new vertebrate RNA virus species. This result was published in a famous scientific journal <em> Nature </em> in 2016. Once, Wuhan CDC held an internal meeting with the theme &#8220;Learning from the achievements of Dien Tuan Hoa&#8221;. &#8220;No one can remember how many mountains he climbed, how many rivers he waded, how many bat caves he explored, how many stables he crawled, and how many landfills he had to search,&#8221; the CDC wrote of the event. However, Mr. Dien also admitted that sometimes he did not comply with research safety rules. In 2017, Mr. Dien told the state newspaper <em> Wuhan Evening News</em> that he once forgot his personal protective equipment, so he had to be isolated at home for 2 weeks after being shot in the body by bat urine. On several other occasions, he got bat blood on his skin while trying to control the animal with forceps, Mr. Dien said. On February 3, 2020, Mr. Dien&#8217;s team continued to appear in the journal Nature with early-stage clinical descriptions of a corona virus patient in Wuhan. The team&#8217;s research indicates that bats can be a host for pathogens. But when Covid-19 spread, Mr. Dien became quiet. March 2020, the state newspaper <em> Health Times</em> An anonymous source said Mr. Dien was not infected with corona virus. According to the article, Mr. Dien was in a bad mood because of rumors about whether he was patient zero. According to a report at the end of March by the WHO expert team, the Wuhan CDC denied storing or experimenting with bat viruses before the pandemic took place. However, in a video, Mr. Dien said he had been to dozens of bat caves and studied 300 types of virus vectors. Also from March, Mr. Dien no longer spoke in public. This highlights the challenge of an independent investigation into the origins of Covid-19: Many of the people who might have had key information in Wuhan are now silent. Mr. Dien continued to research during this time. In August 2020, Mr. Dien was a co-author on a study on ticks. Another of his November 2020 studies focused on antibiotic resistance genes in fish. Mr. Dien no longer speaks or publishes research on bats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21352</post-id>	</item>
		<item>
		<title>Intelligence records of the headquarters of the US Central Command</title>
		<link>https://en.spress.net/intelligence-records-of-the-headquarters-of-the-us-central-command/</link>
		
		<dc:creator><![CDATA[Nguyễn Thanh Hải (tổng hợp)]]></dc:creator>
		<pubDate>Tue, 04 May 2021 18:33:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[American intelligence community]]></category>
		<category><![CDATA[Central]]></category>
		<category><![CDATA[Command]]></category>
		<category><![CDATA[CRA]]></category>
		<category><![CDATA[Dia]]></category>
		<category><![CDATA[DTE]]></category>
		<category><![CDATA[General McKenzie]]></category>
		<category><![CDATA[Headquarters]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence records]]></category>
		<category><![CDATA[JWICS]]></category>
		<category><![CDATA[MacDill Air Base]]></category>
		<category><![CDATA[NRT]]></category>
		<category><![CDATA[OEF]]></category>
		<category><![CDATA[Operation room]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[SCIF]]></category>
		<category><![CDATA[SIPRNET]]></category>
		<category><![CDATA[Smart card]]></category>
		<category><![CDATA[State of Florida]]></category>
		<category><![CDATA[USCENTCOM]]></category>
		<category><![CDATA[Use for]]></category>
		<guid isPermaLink="false">https://en.spress.net/intelligence-records-of-the-headquarters-of-the-us-central-command/</guid>

					<description><![CDATA[The files published in the television program &#8217;60 Minutes&#8217; (60 Minutes) revealed the secrets of the headquarters of the US Central Command (USCentcom) located in Tampa (state of Florida &#8211; USA), where there are very special types of military equipment used by the commander when he has access to the virtual reality computing environment used [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The files published in the television program &#8217;60 Minutes&#8217; (60 Minutes) revealed the secrets of the headquarters of the US Central Command (USCentcom) located in Tampa (state of Florida &#8211; USA), where there are very special types of military equipment used by the commander when he has access to the virtual reality computing environment used by US intelligence services.</strong><br />
<span id="more-11538"></span> <strong> Preliminary equipment at USCentcom</strong> </p>
<p> USCentcom was established in 1983 and is one of the 11 armed forces&#8217; command posts. USCentcom&#8217;s Area of ​​Responsibility (AOR) includes the Middle East, Egypt, Central Asia, and parts of South Asia. The USCentcom headquarters is not in its operational area, but within the MacDill Air Force Base in Tampa (Florida), a new and 26,217 square meter building completed in the year. 2012. The new building will include key spaces for specialized tasks such as the Joint Command Operations Center, the General Planning and Operations Division, the Network Operations Center, and the Operations Center. operation safety information command. The new headquarters building also includes a 10,126 square meter (SCIF) Sensitive Zone Information Facility (SCIF), as well as sound transmission layered (STC) 45 and 50 spaces to support safe operations. . Relevant anti-terrorism standards include advanced collapse mitigation by force-bound means, which are also integrated into the new headquarters. Military communications equipment currently in use at USCentcom headquarters can also be seen in the 60 Minutes program, which shows footage taken in two large-scale operations rooms. small and large. In the large operation room there are sizable TV screens hung on the walls and several rows of work stations, each with 2 sets of communication devices, 1 for access to classified telephones, and computer networks, and other sets of equipment for networks that have not been classified. According to the US grading system color codes, the phone and smart card reader will have a green label for the unsorted Systems, and a red label for the Crypto Systems. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/f7f985aaa3e84ab613f9.jpg" width="625" height="327"> <em> Major operations / operations center at USCentcom headquarters. photo taken January 2021. Photo source: 60 Minutes. </em> Some computers display a bright red lock screen with the words &#8220;Confidential&#8221; meaning only applicable for authorized purposes, and that means they are part of SIPRNet: the primary classified secure network of The US military is used for tactical and operational information. The US military&#8217;s unsecured unsecured computer network is also known as NIPRNet. Identification of users authorized to mine NIPRNet will be done through a Common Access Card (CAC), which is the standard of identification for active US defense personnel. Accessing the SIPRNET requires a SIPRNet token, which is also a smart tag but does not have a clear identification information. In addition to the NIPRNet and SIPRNet networks, USCentcom also has other separate computer networks for coordination with overseas partners. For members of bilateral and multinational alliances, the US has provided a network architecture called Integrated Enterprise Area Information Interchange Systems (Centrixs), which operates at a decentralized level. Type Confidential / Notified for (national identifier). The first Centrixs networks were established in late 2001 by USCentcom to support coalition activities within the framework of the Campaign for Sustainable Freedom (OEF). This has resulted in a new alliance called Centrixs-Isaf for operations in Afghanistan, and Centrixs-Gctf (Global Counterterrorism Forces). Meanwhile, both systems are integrated in the USCentcom Partner Network (CPN). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/1d936ec04882a1dcf893.jpg" width="625" height="351"> <em> General McKenzie&#8217;s communication device in his command room. Photo source: 60 Minutes. </em> The Centrixs network consists of servers and provides users with at least the applications that will give them the same basic capabilities as US systems users, such as: Microsoft Office; Command and control personal computer (C2PC); Integrated imaging and intelligence (I3). These applications allow access to real-time warfare (NRT) commands from MIDB databases and image databases to display data on a map basis. They can also access other browser-based products, or send emails with attachments and conduct collaborative sessions. For US military users, the system is part of the Global Command and Control System (GCCS), which includes more than 200 tools and applications to combine data from multiple sensors. and intelligence sources intended to create a kind of graphic representation of battle spaces. There is also mention of the telephone systems used at USCentcom. The major operations / operations center at USCentcom headquarters also has a range of Cisco IP phones, the 7975, or more recently, 8841. The Cisco 8841 IP phone generation looks like a commercial phone, but in fact it is a modified version of the small-scale telecom security firm CIS Secure Computing Inc. These modified phones are authorized for use in SCIF (Sensitive Subdivision Information Base) and SAPF (Special Access Program Facilities) environments, and provide security features. plugin that can perform &#8220;hold&#8221; and &#8220;mute&#8221; operations while on a phone call. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/faf18aa2ace045be1cf1.jpg" width="625" height="432"> <em> Personal control and command computer interface (C2PC). </em> <strong> Communication equipment of the USCentcom commander</strong> The reporter met with General Frank McKenzie in a small room outside his main operations center at USCentcom headquarters. In this small room, Commander McKenzie had additional communications equipment that did not appear to be available to personnel at the large operations center. For example, the Cisco DX 70 video monitor with video camera is probably the Secure Video Remote Conferencing System (SVTS) which is part of the Crisis Management System (CMS) to enable the high level video meeting. There is also a Cisco IP 8841 phone with a special yellow border for highly secure operating networks through a secure IP, which is also part of the Crisis Management System (CMS) and connection to General system, National Security Council, Cabinet members, Joint Chiefs of Staff, various intelligence agency surveillance centers, headquarters, and Continuity of Operations (COOPs). ); Touch screen operator phone (TXP) with 2 units of Touch Screen Line Extension consisting of 50 buttons (TLE), this device is manufactured by small-scale telecom security firm Telecore, Inc. It also invented Integrated Service Phone (IST-2), which used to be on the Oval Office desk during the two generations of President Bush and Obama. These devices are specifically designed for the Defense Red Switch Network (DRSN), as well as provide conference, command, and control capabilities for top-secret / SCI military commanders. It was revealed in the 60 Minute Program that in that small room during the attack on the Al Asad base, Commander McKenzie spoke directly to the Secretary of Defense and the President. There are also two computer screens in General McKenzie&#8217;s small room. Right at the top of the desktop background is a yellow bar signifying JWICS. Unlike NIPRNet and SIPRNet networks, access to JWICS does not require a smart card, but a software certificate is required: military users must confirm themselves with the Department of Defense PKI certificate, but Others require IC PKI certificate. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/668917da3198d8c68189.jpg" width="625" height="351"> <em> General McKenzie&#8217;s touchscreen phone. Photo source: 60 Minutes. </em> A very interesting device in the USCentcom command room is the IC Desktop Environment. The phrase &#8220;Community Intelligence Community Desktop Environment&#8221; (IC DTE) was founded in 2012 as a single and identical platform for the US Intelligence Community. In fact, this is the focus of a giant modernization project called the Information Community Intelligence Technology Enterprise (IC ITE), whereby the data will be stored in a Commercial Cloud Service ( C2S) is managed by the CIA, and handled at IC GovCloud managed by the NSA. DTE deployments are managed by the Office of Joint Program Management (JPMO) led by DIA and NGA, while the software system is built by BAE Systems under a five-year contract worth $ 300 million. . With DTE, analysts at DIA, NGA, and other US intelligence agencies can go anywhere within these organizations, sit at any top secret workstation, log in, authenticate, and track. access to e-mail, work folders, shared files &#8230; In addition to virtual desktops, DTE has desktop applications and access to popular services including Unified Service Communication. The NSA is responsible for the so-called App Marketplaces, which are the app stores of various intelligence agencies. As early as 2014, there were 4,000 DTE users at DIA and NGA. By 2018, Mr. John Sherman, Chief Information Officer of the US Intelligence Community wants to take the DTE even further by creating the Collaborative Reference Architecture (CRA). Now US intelligence agencies can create applications that match their needs as long as they comply with the standards set by the CRA to ensure compatibility across different systems.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11538</post-id>	</item>
	</channel>
</rss>