Latest news with #DOD


The Hill
5 hours ago
- Politics
- The Hill
Iran's foreign minister: US strikes ‘destroyed' nuclear facilities
Iranian Foreign Minister Abbas Araghchi said during a recent interview that the U.S.'s strikes last month 'destroyed' Tehran's nuclear facilities and that the country will not refrain from continuing to enrich uranium. 'It is stopped because, yes, damages are serious and severe. But obviously we cannot give up [on] enrichment because it is an achievement of our own scientists. And now, more than that, it is a question of national pride,' Araghchi told Fox News's Bret Baier. Araghchi later added that the 'facilities have been destroyed.' Iran's foreign minister, in an interview on 'Special Report with Bret Baier,' said Iran will be able to rebuild the facilities, insisting that Tehran would not pause enriching uranium. 'If the goal is to make sure that Iran will never have nuclear weapons, that is achievable,' Araghchi said. President Trump and other administration officials have claimed that U.S. military strikes on June 21 'completely destroyed' Iran's three nuclear sites — at Fordow, Natanz and Isfahan. A recent intelligence assessment, which was reported by multiple news outlets last week, said that the nuclear facility in Fordow was mostly destroyed, but the ones in Natanz and Isfahan were not and could potentially resume uranium enrichment. Apart from the White House, the Defense Department (DOD) has also pushed back against the intelligence report, saying that the June attacks, carried out by B-2 bombers and Tomahawk cruise missiles, obliterated all three sites. DOD's chief spokesman Sean Parnell said to reporters earlier in July that the Pentagon's assessments indicated that Iran's nuclear program was set back by 'one to two years.' Israel initially attacked Iran on June 13, which led to a 12-day war between the two countries. A ceasefire was reached on June 24. Prior to the conflict, the U.S. and Iran completed five rounds of nuclear talks, although the two countries did not reach a deal. Trump pulled out of a former President Obama-negotiated deal in 2018. 'It is developed by ourselves. It is an achievement by ourselves. The technology is there. The scientists are there, the people who have run these facilities are there. Buildings can be rebuilt. Facilities can be rebuilt. Machines can be replaced,' Araghchi said. 'I think the recent attack proved that there is no military option for our nuclear program,' the foreign minister added.


AllAfrica
2 days ago
- Politics
- AllAfrica
The digital escort fraud: another major Pentagon security failure
Microsoft was caught with its pants down in a brilliant exposé by ProPublica that said that a major part of the Defense Department's Cloud Computer system was run by Chinese engineers and monitored by so-called digital escorts who supposedly looked out for any compromise of DOD information. Now, when Senator Tom Cotton called Defense Secretary Hegseth's attention to the mess, Microsoft withdrew the Chinese engineers and pretended everything was fixed. Nothing could be farther from the truth. Back in April, 2018 I participated at the Hudson Institute in a special panel review of the then-Pentagon plan to transition all its heritage computer databases to a single computer cloud. (Watch the full video here.) The Pentagon plan was to shut down the old computer systems after the cloud was up and running. DOD claimed that the cloud would be easier to maintain than a number of separate computers, and more secure. DOD's problem is that it has done a poor job on cyber security for years – and DOD contractors and sub-contractors, operating under weak departmental guidance, have been even worse. There have been many scandals as the so-called 'advanced persistent Cyber threat' has continued to get worse. A persistent cyber threat is one that operates in the shadows for long periods of time and steals vast quantities of sensitive information. At the time of the DOD cloud proposal, government and contractor computers were under constant attack from hackers. Some of these hackers were teams of Chinese and Russian operators, others came from domestic and international hackers who could sell the acquired information to different bidders, including terrorists. Still others were from rogue countries who are still engaged deeply in hacking, including from North Korea and Iran. Around the same time DOD determined that around 50 gigabytes or more F-35 stealth fighter jet data had disappeared. We know where it went: China. And we know the result: China was able to field a stealth fighter jet in record time. Chengdu J-20. F-35 stealth fighter jet data had disappeared. We know where it went: China. And we know the result: China was able to field a stealth fighter jet in record time. Of course it was not only the design information and other details that enabled China to be successful: China also conducts industrial espionage in depth, so its agents can penetrate US contractors and subcontractors and infiltrate their supplier networks. The US classifies some sensitive information, but actually quite a lot less than one might think. This enables contractors to work without the burden of cleared workers. We have seen numerous cases of people caught working in critical companies smuggling components needed by China either for further exploitation or use. In regard to cloud security in 2018 I said: DoD has laid down its own standards, if you want to call them that, or guidelines, if you want to call them that, on what it expects the security of a system that it's going to procure should look like. And basically what they've done, for the most part, is two things. One, of course, is to make sure the employees that are working in the cloud environment that's being proposed are cleared American employees. That, by the way, creates a significant problem in being able to find enough cleared American employees to do the job. And I'm not sure they are so readily available. But that is definitely a challenge, let's say, that's out there. And the second is to take some of the procedures that are used to secure DoD's existing computers and servers and equipment and apply that to the cloud. We understood, in 2018, that the cloud security problem was supposedly solved by using only security-cleared American employees. It seems that the pledge was violated by the Defense Department, which permitted foreign workers to support and service the DoD cloud so long as they were 'supervised.' The supervisors are called 'digital escorts.' The workers, so far at least in Microsoft's case, turn out to be Chinese. Chinese engineers work remotely in China, and it is probably a fair assumption that digital escorts allegedly monitor the work of the Chinese engineers, also remotely. In other words, the so-called escorts are virtual, they don't sit next to the Chinese operators. We do not know anything really about the qualifications of the digital escorts, or even if they understand the Cloud network they are supposedly protecting. They would have to understand the actual cloud software and the underlying processors, and they would need to follow guidelines on what might constitute any sort of breach of the protocols or data by the Chinese. Any clever operator in China could figure out how to insert malware into the cloud, but actually since they have full time access to it anyway there is no overpowering reason for them to do so. Instead they can just suck up all the data and run it through their supercomputers, or even their latest quantum computers. China leads the world in quantum computers, and if they really do work, they can smash encryption codes in seconds. DoD information in the cloud is supposed to be encrypted, or at least we are told that. But that may just be the outside of the system to keep out random hackers. The actual information may not actually be encrypted. That would mean a potential bonanza for China and a huge risk to US security. The original DOD contract was supposed to be to a single contractor. However, complaints from industry and the public – and from security experts, as in our panel discussio – pushed the department to support more than one cloud application (and also may have allowed for some backup if a cloud operation crashed, for whatever reason, although DoD has not told us about any backup). The question arises: If Microsoft was using Chinese engineers, were the other cloud providers doing the same thing, and did they have digital escorts, or something like them? Along with Microsoft, other participants in the DoD cloud contract, initially for $9 billion, were Amazon, Google and Oracle. All of them do business in China. Oracle has offices in Beijing. Amazon has offices in Beijing, Shanghai and Wuhan. Google has offices in Beijing, Shanghai and Shenzhen. Of course we do not know if DoD granted them the same deal they allowed for Microsoft, but it is important to find out. Or maybe DOD never agreed to digital escorts and Chinese engineers? We don't really know, but it is unlikely Microsoft could have hired Chinese engineers without some Defense Department input. If DoD never approved, then it is another example of a security failure. If they did approve, of course, it is also a security failure. Either way it is a disaster. Hegseth understands the digital escort issue is a big deal, but he cannot just accept Microsoft's decision to end China's participation in the Defense Department cloud. Hegseth needs to back a full scale inquiry and investigation. We need an assessment of how much damage was done and, potentially, what programs may have possibly been compromised. Such an investigation has to assess just how long the Digital Escort system has been in place. How long has China had access to the Defense Department's computer heartland? Hegseth needs to find out what the other contractors are doing and if they are using foreign workers. Finally there is a serious question about outsourcing American security to private contractors, especially those who are not core defense contractors and who depend on foreign revenues to support their bottom line. Companies that are mainly commercial are inherently a risk because they lack a security culture and always want to expand into markets that can prove difficult and risky. Putting trust in them raises more than eyebrows. Stephen Bryen is a special correspondent to Asia Times and a former US deputy undersecretary of defense for policy. This article, which originally appeared in his Substack newsletter Weapons and Strategy, is republished with permission.


Time of India
3 days ago
- Health
- Time of India
Why Indian farmers are chasing Matcha? Sarthak Ahuja's take on its Rs 20,000 per kg price tag goes viral
Matcha isn't just trending in your favourite cafe menu; it's also turning into green gold for Indian farmers. Recently, this was pointed out by content creator and chartered accountant for a decade, Sarthak Ahuja, who took to his Instagram and shared an insight on the same. The video has garnered over twelve thousand likes so far. In the clip, Ahuja highlighted that the popular Japanese-origin super tea is gaining ground across Indian farmlands. With the bulk of buyers, like cafes, paying between Rs 3500 and Rs 20000 per kilo, and D2C brands selling 50g packs for up to Rs 1500, matcha is quickly becoming one of the most lucrative crops on the block. But what's driving this sudden surge? And is it even sustainable? Let's understand. Why does matcha sell for Rs 20,000 per kilo in India? Matcha is an expensive tea—usually ₹20,000 per kilogram—because of the intensive labour in cultivation and processing. "While regular green tea is exposed to the sun for its entire lifetime, matcha is shaded from the sun for weeks prior to harvesting, which leads to higher chlorophyll content and a higher amino acid level of L-theanine," says Dr. Shrey Srivastava, Founder of Doctors on Duty (DOD). According to Dr. Srivastava, "Leaves are hand-harvested, steamed, dried, and finally ground into a fine powder by manual stone mills—a long, labour-intensive process. The careful manufacture produces a high-quality product containing plenty of antioxidants, flavour, and nutrients." World demand for matcha has gained momentum due to its health advantages, such as heightened metabolism, detoxification, enhanced alertness, and long-lasting energy without the crash of caffeine. It is now broadly incorporated not only in tea but also in lattes, smoothies, and sweets. Demand for Matcha cultivation has spiked in India Indian farmers have begun planting matcha owing to increased global demand and its high price in the market. 'Previously cultivated in Japan, matcha is a green tea leaf powder, which is prepared from specially cultivated green tea leaves that are high in antioxidants and health factors. Where favourable climatic conditions exist, such as in Assam, Darjeeling, and Nilgiris, Indian farmers are considering matcha as a value crop," Dr. Bhumesh Tygai, Senior Consultant-Internal Medicine, Sharda Hospital. Farming advice, better methods of cultivation, and export avenues have also contributed to this phenomenon. "Moreover, the growing consciousness of health and organic food demand domestically and abroad is prompting Indian farmers to diversify and try their hand at new crops such as matcha," he added. Why have Indian farmers also started cultivating matcha? What's the trigger? Indian farmers, particularly from states such as Assam, Nilgiris, and a portion of Himachal Pradesh, have felt the monetary value of the crop. Favourable climatic conditions and growing international demand have pushed farmers to opt for the cultivation of matcha as a high-value crop against conventional tea. "Incentives from the government, application of organic farming, and growing concern about world tea markets have also prompted Indian farmers to experiment with diversification and tap matcha's value segment," says Dr. Srivastava.
Yahoo
4 days ago
- Politics
- Yahoo
Indiana's Camp Atterbury to be used to house detained migrants
Indiana's Camp Atterbury and New Jersey's Joint Base McGuire-Dix-Lakehurst will be temporarily used to detain immigrants lacking permanent legal status, according to a directive from Defense Secretary Pete Hegseth. Hegseth announced the decision in a Tuesday letter to Rep. Herb Conaway (D-N.J.), the House Committee on Armed Services and other members of Congress outlining that both locations would be for 'temporary use by the Department of Homeland Security [DHS] to house illegal aliens.' The news surfaced widely Friday as Democrats publicly criticized the move. Hegseth in the letter also stated this will not affect military activities in the camps. 'The Secretary approved a Department of Homeland Security request for assistance to use real property at Camp Atterbury, Indiana and Joint Base McGuire-Dix-Lakehurst, New Jersey to establish temporary soft-sided holding facilities,' an official from the Department of Defense (DOD) told The Hill in a statement. The letter did not indicate how many immigrants could be detained there or when the camp would be open. 'The timeline for these facilities will depend on operational requirements and coordination with DHS,' the DOD wrote. 'Soft-sided holding facilities' mean these camps will resemble Alligator Alcatraz, a detention facility the Trump administration has opened in the Florida Everglades, with tent-like walls and fencing inside to surround the beds. In February, when the administration was turning Fort Bliss in Texas into a deportation hub, Trump touted the idea of increasingly using military sites for holding detained immigrants. Joint Base McGuire-Dix-Lakehurst was named as one of the military sites that would be upgraded after Fort Bliss, according to The New York Times. Earlier on Friday, DHS Secretary Kristi Noem suggested Alligator Alcatraz would be a blue-print for future facilities. The governors of South Carolina, Mississippi and Texas told NewsNation they would be ready to host these temporary facilities in their states. 'Texas will continue to assist the Trump administration in arresting, detaining, and deporting illegal immigrants,' said Andrew Mahaleris, a spokesperson for Texas Gov. Greg Abbott (R). Camp Atterbury is located 40 miles out of Indianapolis and is operated by the National Guard and has more than 34,000 acres, according to its website. Joint Base McGuire-Dix-Lakehurst is near Trenton, N.J., and has about 42,000 acres. Indiana Rep. André Carson (D) wrote in a statement he remains 'concerned on this use of Camp Atterbury given the deplorable and inhumane conditions at other ICE detention facilities nationwide.' 'The number of ICE detainees – and the number of deaths in detention – have grown at alarmingly high rates since the start of President Trump's term,' he continued, calling it unacceptable. 'Also unacceptable is the apprehension and detention of US citizens. The Hoosier state should not facilitate these unlawful actions.' A group of New Jersey Democrats also condemned the DOD's plan. 'This is an inappropriate use of our national defense system and militarizes a radical immigration policy that has resulted in inhumane treatment of undocumented immigrants and unlawful deportations of U.S. citizens, including children, across the country,' the group said. The Trump administration's latest move continues its mass deportation efforts. This week, Immigration and Customs Enforcement announced it would have access to the Medicaid data of 79 million people, including addresses and dates of birth, to facilitate finding immigrants lacking permanent legal status. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. Solve the daily Crossword


Fox News
4 days ago
- Business
- Fox News
Microsoft ends use of China-based computer engineers for certain Defense Dept projects amid espionage fears
Microsoft said it will cease using China-based computer engineering teams for work on Pentagon cloud systems and other classified systems after an investigation this week led to national security concerns at the highest levels over a program that Microsoft has used since 2016. A ProPublica report released Tuesday accused Microsoft of allowing China-based engineers to assist with Pentagon cloud systems with inadequate guardrails in an effort to scale up its government contracting business. The report got the attention of GOP lawmakers and the Trump administration, with Defense Secretary Pete Hegseth insisting Friday that foreign engineers from "any country … should NEVER be allowed to maintain or access DOD systems." He added that the Defense Department would be "looking into this ASAP." After Hegseth's indication that the Pentagon would be looking into the matter, Fox News Digital reached out to Microsoft, which responded that it would be ceasing its use of China-based computer engineers providing assistance to sensitive Defense Department cloud "and related" services. "In response to concerns raised earlier this week about U.S.-supervised foreign engineers, Microsoft has made changes to our support for U.S. government customers to assure that no China-based engineering teams are providing technical assistance for DOD government cloud and related services," Frank Shaw, chief communications officer at Microsoft, said. "We remain committed to providing the most secure services possible to the U.S. government, including working with our national security partners to evaluate and adjust our security protocols as needed." The ProPublica report released earlier this week, which spurred Microsoft's action, cited current and former employees and government contractors who worked on a cloud computing program deployed by Microsoft in 2016. The program, meant to meet federal contracting regulations, used a system of "digital escort" chaperones for global cybersecurity officials, such as those based in China, meant to create a security buffer so that they can work on agency computing systems. DOD guidelines require that people handling sensitive data be U.S. citizens or permanent residents. According to sources who spoke to ProPublica, including some who had intimate familiarity with the hiring process for the $18-per-hour "digital escort" positions, the tech employees being hired to do the supervising lacked the adequate tech expertise to prevent a rogue Chinese employee from hacking the system or turning over classified information to the CCP. The sources elaborated that the escorts, often former military personnel, were hired for their security clearances more than their technical abilities and often lacked the skills to evaluate code being used by the engineers they were supervising. Microsoft used its escort system to handle sensitive government information that falls below "classified," the ProPublica report indicated. That includes "data that involves the protection of life and financial ruin." At the Defense Department, the data is categorized as "Impact Level" four and five, which ProPublica reported includes materials directly supporting military operations. People in China are governed by sweeping laws compelling government cooperation with data collection efforts. Before Microsoft's announcement Friday that it would be ceasing its use of China-based engineers for sensitive Defense Department programs, the company defended its "digital escort" program, noting all personnel and contractors with privileged access must pass federally approved background checks. The company also pointed to a response from the Defense Information Systems Agency, which said that "digital escorts" are used "in select unclassified environments." "For some technical requests, Microsoft engages our team of global subject-matter experts to provide support through authorized U.S. personnel, consistent with U.S. government requirements and processes," a company spokesperson told Fox News Digital Tuesday. "In these instances, global support personnel have no direct access to customer data or customer systems." The spokesperson added at the time that Microsoft adheres to the federal security requirements outlined by the Defense Department and the Federal Risk and Authorization Management Program established in 2011 to address the risks associated with moving from entirely government-controlled servers to cloud-based computing. "We establish layers of mitigation at the platform level with security and monitoring controls to detect and prevent threats. This includes approval workflows for system changes and automated code reviews to quickly detect and prevent the introduction of vulnerabilities," the spokesperson said. "This production system support model is approved and regularly audited by the U.S. government." Fox News Digital reached out to the Pentagon to inquire whether Microsoft's action changes its planned investigation but did not receive a response by publication time.