US Air Force B-52 Stratofortress bombers flew over the South China Sea earlier this week on a training mission, according to the American military.
The bombers took off on Tuesday from Andersen Air Force Base on the island of Guam, according to a statement from US Pacific Air Forces, which oversees air operations in the region.
The flight also involved additional training with F-15 Strike Eagle jets in the vicinity of Okinawa, Japan. The training mission was part of the US Air Force’s routine “Continuous Bomber Presence” in the region.
A US military official told CNN on Friday that the two bombers flew between two Chinese claimed features in the Spratly Islands, claims unrecognized by China’s neighbors and the US government.
China has used these geographic features in the Spratlys to build man-made islands, some of which Beijing has equipped with military facilities.
Officials told CNN that the Chinese military did not intercept the US aircraft during their mission.
Asked about the purpose of these islands, the Trump administration’s nominee to head the US military’s Pacific Command, Adm. Phillip Davidson told Congress this month that China was using these islands to exercise control over the South China Sea.
“China has long claimed the Sea as their own,” he said.
“It is my belief that they intend to establish the military structure that will help them control the air and sea lanes through that region of the world.” (IANS)
India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.
According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.
Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.
Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.
On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.
F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.
“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.
“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.
To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.
“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.
Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).
Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.