XIANGQI 象棋 – CHINESE CHESS

XIANGQI 象棋 – CHINESE CHESS

XIANGQI
象棋
CHINESE CHESS

MONOLOGUE WRITTEN BY CLYDE LEWIS

I wish I could interrupt the mainstream train of thought and derail it in order to get someone to understand that it now can be declared the Russian meddling probes are a distraction from what is truly going on.

Now that we are being told by the President that Russia meddled in the 2016 elections, I am curious as what is to be done about it and how to we conclude that the Russia is an enemy and that Trump has committed an act of treason.

I want to say that the real enemy is the mainstream media who is now framing a dangerous narrative which is distracting us from what needs to be reported and investigated.

China is now moving its chess pieces as we are focusing on Russia and they are certainly being strident and no one is noticing.

When our DARPA whistleblower “Sam” called in to give us information about a possible attack on a diplomat during the Trump summit – he said that he believed the Chinese are responsible for using the secret Medusa weapon. A listener from Florida called the show to say that he was a Cuban who claimed to have been a witness to the mysterious cases of the diplomats who were victims of mind control and sonic torture.

He stated that he believed that the Chinese were involved in the Cuban, Chinese Embassy and Singapore Summit attacks.

Now new revelations again create a compelling conspiracy that needs to be addressed.

According to Patrick Tucker of Defense One, four days before U.S. and Russian leaders met in Helsinki, hackers from China launched a wave of brute-force attacks on internet-connected devices in Finland, seeking to gain control of gear that could collect audio or visual intelligence.

Traffic aimed at remote command-and-control features for Finnish internet-connected devices began to spike July 12, according to a July 19 report by Seattle-based cybersecurity company, F5.

Finland is not typically a top attacked country; it receives a small number of attacks on a regular basis,” the report says.

China generally originates the largest chunk of such attacks; in May, Chinese attacks accounted for 29 percent of the total. But as attacks began to spike on July 12, China’s share rose to 34 percent, the report said. Attacks jumped 2,800 percent.

The China-based hackers’ primary target was SSH (or Secure Shell) Port 22 — not a physical destination but a specific set of instructions for routing a message to the right destination when the message hits the server.

It’s the sort of attack that’s easier for actors with lots of human and computer power to throw at the problem, but hardly exclusive to them.

The attackers also heavily targeted Session Initiation Protocol, or SIP, Port 5060, used by teleconferencing software and internet-based phone apps.

China wasn’t alone in trying to gain access to Helsinki’s internet-connected devices in the lead-up to the July 16 summit. Attack traffic came from the U.S., France, and Italy as well, in that order. But the U.S. and French traffic was in keeping with averages. Russian attack traffic dropped considerably from third, its usual spot, to fifth. German attack traffic jumped.

Speaking at the Aspen Security Forum on Wednesday evening, FBI director Christopher Wray commented that “China from a counterintelligence perspective represents the broadest, most pervasive, most threatening challenge we face as a country.”

We are focusing on Russia meddling when we should be keeping our eyes on China, which last time I checked is a Communist country.

http://www.groundzeromedia.org/7-19-18-xiangqi-%e8%b1%a1%e6%a3%8b-chinese-chess/

http://georgiachessnews.com/2018/01/09/why-you-need-to-learn-xiangqi-for-playing-better-chess/

https://en.chessbase.com/post/why-you-need-to-learn-xiangqi-for-playing-better-chess

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.