Skip to main content

Home/ Yadkin Docs/ Group items tagged ALCOA

Rss Feed Group items tagged

Yadkin River

China vs USA - 'The Battle for Oil' Part 1of 2. - YouTube - 0 views

  •  
    "Today, China is the second largest consumer of oil, just after the United States. The Documentary investigates the new world geopolitics that is emerging around the needs of both the world's leading superpower and the world's fastest growing economy to secure future supplies of oil. Oil Conspiracy?? Quite Interesting."
Yadkin River

Mitt Romney: China cheats - YouTube - 0 views

  •  
    China Cheats
Yadkin River

BBC Documentary - The Chinese Are Coming - YouTube - 1 views

  • ustin Rowlatt investigates the spread of Chinese influence around the planet and asks what the world will be like if China overtakes America as the world's economic superpower. In the first of two films, he embarks on a journey across Southern Africa to chart the extraordinary phenomenon of Chinese migration to Africa, and the huge influence of China on the development of the continent. While many in the West view Africa as a land of poverty, to the Chinese it is seen as an almost limitless business opportunity. From Angola to Tanzania, Justin meets the fearless Chinese entrepreneurs who have travelled thousands of miles to set up businesses.
Yadkin River

China's cyberwar against U.S. is too vital to ignore | CharlotteObserver.com & The Char... - 0 views

  • China's cyberwar against U.S. is too vital to ignore
  • China is waging a quiet, mostly invisible but massive cyberwar against the United States
  • obtaining the ability to sabotage vital infrastructure.
  • ...5 more annotations...
  • stealing its most sensitive military and economic secrets
  • The Chinese offensive - and the economic and national security threats it poses - is simply too important to ignore.
  • guard domestic civilian targets
  • utilities such as power and water companies - not to mention the private e-mail accounts of thousands of Americans
  • This is the future of war. Sending armies to "invade" a country is too risky and fraught with diplomatic minefields. But covert strikes on sensitive and vulnerable technological targets? That is relatively easy, hard to trace, and capable of reaping significant rewards or causing large amounts of confusion and damage. A Like Reply
  •  
    Alcoa's relationship with China Power is too hard to Ignore
Yadkin River

China Reportedly Hacked Chamber Of Commerce : NPR - 0 views

  • That's called social engineering and it's a widely used technique, especially by Chinese hackers.
  • ou say Chinese hackers and there's been a lot of reports about cyber espionage stemming from China. What's going on here? GJELTEN: You know, Lynn, all the cyber security people we talked to say there's just a ton of cyber espionage coming out of China these days. Hackers are stealing technological secrets, trade secrets, computer code, design plans, you name it. The security people say it's like a vacuum cleaner approach. They just suck up everything they find.
  • But what's behind this is that China wants to catch up to the west. Now, they don't have the business environment to support innovation. You don't see the Chinese equivalent of companies like IBM or Google or Apple popping up there, so rather than develop their own ideas and technology, they just steal it. That's the background here. At least, that's what we hear from U.S. intelligence officials and security people. NEARY: And the Chinese government's not acknowledging any role in this attack on the chamber of commerce? GJELTEN: They say there's no evidence, but cyber security people who have investigated other intrusions blamed on China say it's pretty easy to tie them back there and it's hard to see how the government would not be involved in some way, given the way China works. Chamber officials say they have no doubt that this intrusion did come from China.
Yadkin River

Secret Cable: China Said To Coordinate Google Attack : NPR - 0 views

  • Google reported in January 2010 that its computer infrastructure in China had been hit by a "highly sophisticated" attack that resulted in the theft of company secrets. Google also said it had evidence that a goal of the attackers was to gain access to the Gmail accounts of Chinese human-rights activists.
  • At the time, the company did not blame the Chinese government for the intrusion. But shortly thereafter, a U.S. diplomat in Beijing confidentially cabled Washington that "a well placed contact" was claiming the Google attack had been "coordinated" by the Chinese government "at the Politburo Standing Committee level."
Yadkin River

China's Cyber Threat A High-Stakes Spy Game : NPR - 0 views

  • The cloak-and-dagger world of corporate espionage is alive and well, and China seems to have the advantage. Their cyber-espionage program is becoming more and more effective at swiping information from America's public and private sectors. The U.S. government has even blamed
  • China publicly for hacking American industries
  • but Chinese hackers have even broken into and stolen plans from American furniture manufacturers.
  • ...2 more annotations...
  • "You can see the immediate economic benefit: You don't have to pay for the design, you can build it cheaper, and you can offer the same product at a lower price," he says. "That hurts our economy."
  • "Those are 10,000 jobs that would be in this economy, that would employ Americans, that are gone because of Chinese economic espionage," he says.
Yadkin River

TTC News Archives-Trans Texas Corridor: "Virtually unregulated foreign ownership of Ame... - 0 views

  • demands immediate congressional attention to examine any national security implications and to clarify present and future control issues before the deal receives regulatory approval.
Yadkin River

When Foreign Countries Want to Buy into U.S. Nuclear Power Plants - What Then... - 0 views

  • For example, U.S. national policy makers have worked to make sure sensitive military and defense technology and production remain with American companies.
  • After 9/11, concerns grew that foreign ownership of U.S. infrastructure could increase our vulnerability to terrorist attacks. One example is the heated debate triggered by the 2006 purchase of a company that ran U.S. ports by the United Arab Emirates-owned company Dubai Ports World. (Dubai Ports eventually sold its interests to a U.S. company.) More recently, globalization of the nuclear industry and the weak U.S. economy have attracted significant levels of foreign investment in the U.S. nuclear industry
  • The Atomic Energy Act prohibits the NRC from issuing a license to any entity that the Commission believes is “owned, controlled or dominated by an alien, a foreign corporation or foreign government.” Broadly speaking, the foreign ownership prohibition protects the “common defense and security” of the United States, even though this may prevent some nations from participating in U.S. nuclear joint ventures.
  • ...2 more annotations...
  • mitigate foreign control issues
  • Len Skoblar March 1, 2011 at 6:53 am Actually, I think the time has come to end this dance. Energy is a strategic commodity…period. Our country’s very survival depends upon it. So let us dispense with the distraction (and risk) that “foreign investment” brings to the dance. The US government should subsidize indigenous energy production in all its manifestations and forms to eliminate the need for foreign investment. That would be tax dollars well spent. And NRC could then bring even more focus and resources to its primary mission….nuclear safety.
Yadkin River

Foreign investment in U.S. infrastructure causes security concerns | Homeland Security ... - 0 views

  • the interest of foreign companies in buying U.S. critical infrastructure assets; that interest is now growing again, and the Obama administration is grappling with how to balance the promotion of commerce with the bolstering of security
  • The issue is coming back to the fore as foreign investors once again try to buy American industrial assets. The Obama administration has thus been forced to grapple with how to protect national security while promoting economic recovery.
  • The New York Times’s Eric Lipton wrote last month that in early December, the administration had threatened to block the proposed takeover by the Chinese government of a tiny Nevada gold mining company, according to executives for the company,
  • ...1 more annotation...
  • Foreign investments in the U.S. are critical to economic growth and job creation here at home, but we have an obligation to prioritize national security,” the deputy Treasury secretary, Neal Wolin, said in a statement released in mid-December, in response to questions about the scrutiny of proposed deals.
Yadkin River

Foreign Ownership of American Roads - A Mistake and a Backlash - 0 views

  • A couple of years ago Indiana Governor Mitch Daniels signed a 75-year lease for 157 miles of the Indiana Toll Road for $3.8 billion, thus supposedly funding the State’s transportation needs for ten years
  • They saw Daniels’ move as giving away the State’s birthright
  • When the leases are to foreign organizations the backlash is particularly harsh. For example, in Texas Governor Rick Perry, who has privatized some Texas highways, was presented with a two-year moratorium upon new projects by the relatively conservative State Legislature. That throws a wrench in Perry’s plans for the Trans-Texas Highway, which is supposed to be a multi-lane facility, with high-speed trains in the middle, to carry especially trucks from Mexico all the way to Kansas City. The public is angry. They see Perry as giving away Texas sovereignty.
  • ...1 more annotation...
  • Foreign investment ought to be prohibited.
Yadkin River

Office of Investment Security - 0 views

  • Office of Investment Security   Page ContentCommittee on Foreign Investment in the United States (CFIUS) The Committee on Foreign Investment in the United States (CFIUS) CFIUS is an inter-agency committee authorized to review transactions that could result in control of a U.S. business by a foreign person (“covered transactions”), in order to determine the effect of such transactions on the national security of the United States.  CFIUS operates pursuant to section 721 of the Defense Production Act of 1950, as amended by the Foreign Investment and National Security Act of 2007 (FINSA) (section 721) and as implemented by Executive Order 11858, as amended, and regulations at 31 C.F.R. Part 800.  The CFIUS process has been the subject of significant reforms over the past several years.  These include numerous improvements in internal CFIUS procedures, enactment of FINSA in July 2007, amendment of Executive Order 11858 in January 2008, revision of the CFIUS regulations in November 2008, and publication of guidance on CFIUS’s national security considerations in December 2008. Further information about each of these reforms is available via the links to the right.
  •  
    Prior to any FERC re-license of the Yadkin. FERC policy needs to include CFIUS review in light of rapid globalization and existing known multi-national partnerships to any FERC licenseholder
« First ‹ Previous 121 - 137 of 137
Showing 20 items per page