Russian cosmonaut Oleg Artemyev was excluded from the Crew-12 crew!

Russia: Hero Cosmonaut “Excluded” from Elon Musk Folly! (3.12.2025)

Telegram channel about cosmonautics “Yura, I’m sorry!” writes that Artemiev, who was training at the SpaceX base in Hawthorne, California, was suspended last week. The cosmonaut allegedly photographed SpaceX engines and other internal materials of SpaceX on his phone, after which he took the materials from the base.

54-year-old Oleg Artemyev, according to data from the website of the Gagarin Cosmonaut Training Center, made three flights into space and spent a total of 560 days there. Since 2019, he has been a deputy of the Moscow City Duma, a member of United Russia.

Major US Cyber-Attacked Prevented!

China: US [NSA] Planned to Sabotage “Beijing Time” to Disrupt GPS! (20.10.2025)

Besides causing severe disruptions in China, such cyberattacks could lead to international time chaos with incalculable consequences, the agency said in a post on its official WeChat account.

Wei Dong, deputy director of the general office at the centre, said a time discrepancy of just one millisecond can disrupt the sequencing of power substations, leading to widespread blackouts. A difference of one microsecond could result in fluctuations worth billions in international stock markets.

“Furthermore, a nanosecond discrepancy, which is one-billionth of a second, can reduce the positioning accuracy of the Beidou Navigation Satellite System by 30 centimetres and impact everyday communications. And a one-trillionth of a second could cause several kilometres of deviation in the positioning of lunar soil collection vehicles and the Chang’e spacecraft, potentially preventing it from returning successfully,” Wei told China Central Television.

Reds Under the Beds!

China: US Allegations [& Reports] of Cyber-Attacks – Firmly Rejected! (17.1.2025)

Shen Yi, a professor at Fudan University in Shanghai and a leading expert on cyberspace governance studies, said, “U.S. intelligence agencies have a typical behavioural pattern in hyping cybersecurity governance and national security issues, which is fabricating facts using false and inaccurate information, and fabricating so-called cyberattacks by other countries.”

The objective is to hype security threats and create anxiety, Shen added.

Earlier this month, the U.S. Department of the Treasury sanctioned a Beijing-based cybersecurity company, accusing it of helping Chinese hackers infiltrate U.S. telecommunication systems and conduct surveillance.

US Dictates Terms!

US: Population Warned to Stop “Droning” On! (18.12.2024)

As the US government instils a sense of invincibility in its people – what constitutes this “threat” often takes on a definite “other-worldly” dimension! Even before WWII (and the later US-derived “Cold War”) – the sheep-like population of the US believed it’s country was under attack from Martians! Following a radio broadcast of HG Wells’ “War of the Worlds” (narrated by Orson Wells) in 1938 – widespread panic ensued as aeroplanes, kites, clouds, stars, and tricks of the light were reported all over the US as “UFOs”! Witnesses believed 100% that the US was being invaded by Martians armed with advanced weaponry and technology. Farmers armed with shotguns mistook unfamiliar water-towers for Martians already deployed on earth – and opened-fire!

US Criminality Worldwide!

US Criminality: Global Cyberattacks & Espionage Uncovered! (15.10.2024)

The method is usually used in attack operations against other countries’ telecommunication and network operators. When the NSA gains control of the targeted telecom network operator’s system, it is able to monitor the target’s cellphone communication content. In the attack against Northwestern Polytechnical University in Xi’an, Shaanxi province, the internet service provider located in China was compromised by the NSA with the “supply chain” attack method. As a result, the telephone calls and internet activities of the victims were tracked by the NSA in real time.

Such an extensive surveillance program requires a substantial annual budget, and with the explosive growth of internet data, the demand for funding is bound to rise, the report said, adding that this is one of the main reasons that the U.S. government, in collaboration with its intelligence agencies, devised and promoted the “Volt Typhoon” operation.

US & ROK Spy Planes Violate DPRK Air Space!

DPRK: US & ROK Spy Planes Violate North Korean Air Space!! (4.6.2024)

Crystal clear is the meaning of such intensified preparatory spying on the core facilities and sites in the DPRK.

The situation obviously indicates that to bolster up the muscle for self-defence to thoroughly aim at, deter and frustrate the reckless manoeuvres of the U.S. and its vassal forces is a top priority task to be fulfilled with accelerated efforts, indispensable for safeguarding the national sovereignty, security and interests.

The Ministry of National Defence of the DPRK has already clarified the stand that it would take action immediately in case national sovereignty, security and interests are exposed to violation.

The U.S. and other hostile forces are bound to meet unforeseen disaster for their bluffing and reckless espionage.

1 2 3 5