Alibaba’s Cainiao strongly refutes Belgian intelligence service’s ‘spying’ allegation

Alibaba’s Cainiao Smart Logistics has strongly refuted Belgian intelligence service VSSE’s recent accusation of engaging in “possible spying or interference activities” at the company’s European logistics center at Belgium’s Liege Airport.

“We strongly deny the allegations based on prior conjecture. Cainiao is in compliance with all laws and regulations where it operates,” the company said in a statement sent to the Global Times on Saturday.

Belgian officials are looking into “risks” involving the presence of China’s e-commerce giant Alibaba at a cargo airport in the city of Liege, Reuters reported on Friday, citing VSSE.

The security service said it was working to “detect and fight against possible spying and/or interference activities carried out by Chinese entities including Alibaba,” Reuters wrote.

Alibaba signed an agreement with the Belgian government in 2018 to establish an e-commerce trade center operated by Cainiao at Liege Airport. In 2021, Cainiao commenced operations at the Liege Digital Logistics Hub, which was its largest smart logistics hub in Europe.

It is not the first time for certain Belgian officials and media outlets hype such groundless accusations. In May 2021, The Chinese Embassy in Belgium refuted similar accusations against Alibaba, noting that such baseless allegations were a replica of the “China threat theory,” which not only misguided the Belgian public but also cast a negative impact on the image and reputation of Chinese businesses and individuals in Belgium.

The Chinese government always requires Chinese enterprises to strictly abide by local laws and regulations when doing business overseas, and will not require Chinese enterprises to engage in activities that violate local laws and regulations, the embassy said in a statement.

“Currently, Europe’s perception of and sentiment towards China have undergone complex changes due to a combination of internal and external factors. Many regular economic cooperation projects between China and Europe are being scrutinized through the lens of so-called security concerns,” Dong Yifan, a research fellow at the Institute of European Studies, China Institutes of Contemporary International Relations, told the Global Times.

Against the backdrop, various security and defense departments, including Belgium’s VSSE, are inclined to take the forefront in promoting such issues to underscore their own influence, Dong said.

“Such moves overstretching the concept of national security will undoubtedly create a negative impact on the political atmosphere and public sentiment between China and Europe, subsequently undermining the willingness and confidence of both parties to engage in cooperation,” Dong said.

Cao Zhongming, China’s ambassador to Belgium told the media in January that China retained its position as Belgium’s third-largest trading partner in 2022, while Belgium stood as China’s seventh-largest trading partner within the EU. The accomplishment is noteworthy given the backdrop of a sluggish global economic recovery.

The successful operation of Alibaba's Cainiao Liege Smart Logistics Hub in Belgium has significantly boosted cross-border e-commerce between China and Europe and helped reinforce Belgium’s position as a logistics hub in Europe, Cao said.

China’s Space seed breeding makes breakthrough, contributing to agricultural technology and food security

136 types of seeds, including crops, forest vegetation, flowers, and microorganisms will be carried on board the Shenzhou-16 manned spacecraft to start their space breeding journey. These seeds will contribute to the advancement of China's agricultural science and technology and enhance food security, the China Manned Space Engineering Office announced on Wednesday in a statement. 

The seeds were selected through a four-month application and review process and have been chosen from 53 institutions across the country. The project, conducted by manned spaceflight, is of a public welfare nature and does not charge any carrying fees.

It has been 36 years since China's first space seed breeding effort in 1987, the country has sent the seeds of hundreds of plant species into space on dozens of retrievable satellites and Shenzhou spaceships. Nearly 1,000 new species have been created, of which 200 have displayed outstanding performances, according to media reports.

Space seed breeding uses cosmic radiation to mutate the genes of seeds sent into space, in order to create new species for greater variety. 

"Space peppers and watermelons" commonly found in supermarkets in China are successful varieties of space breeding. China ranks first in the world in the number of cultivated varieties and the range of popularization and application of space breeding, read media reports.

The area under cultivation for grains, vegetables, fruits and other plants developed by space seed breeding has surpassed 4 million hectares, and generated economic benefits of over 200 billion yuan ($30.51 billion), media earlier reported.

The seeds need further improvement, especially in disease resistance, through conventional breeding methods or space breeding, the Xinhua News Agency reported.

Space breeding involves exposing seeds and strains to cosmic radiation and microgravity during a spaceflight mission to mutate their genes. 

China's space seed breeding level also reflects the nation's advancing aerospace technology, Li Guoxiang, a researcher at the Rural Development Institute of the Chinese Academy of Social Sciences, told the Global Times.

"There are only a few countries in the world with mature aerospace technology, and Chi

Exclusive: China identifies the culprits behind cyberattack on Wuhan Earthquake Monitoring Center; a secretive US global reconnaissance system to be exposed

New progress has been made on an investigation into a cyberattack incident targeting the Wuhan Earthquake Monitoring Center affiliated to the city's Emergency Management Bureau, after a joint investigation team formed by the National Computer Virus Emergency Response Center (CVERC) and Chinese cybersecurity company 360 discovered malicious backdoor software that exhibits characteristics of US intelligence agencies, the Global Times learned on Monday. Chinese authorities will publicly disclose a highly secretive global reconnaissance system of the US government, which poses a serious security threat to China's national security and world peace.

On July 26, the Wuhan Earthquake Monitoring Center reported that some front-end station collection points of the earthquake reporting data had been implanted with backdoor programs, attracting widespread attention. The CVERC and the company 360 immediately formed a joint investigation team to go to Wuhan for investigation and evidence collection.

Du Zhenhua, a senior engineer from the CVERC, told the Global Times that the team has found very complex backdoor malware in the victim's network, fitting the characteristics of US intelligence agencies, highly concealed, and aiming to steal earthquake monitoring-related data, with a clear military reconnaissance purpose.
Why target earthquake monitoring system?

Du explained that China is a country seriously affected by earthquake disasters, with multiple occurrences causing severe loss of life and property. "Therefore, China attaches great importance to earthquake monitoring and early warning. In order to improve the monitoring and early warning capability of geological disasters, earthquake monitoring data includes not only basic information like magnitude and epicenter but also rich geographical and geological data such as surface deformation and hydrological monitoring," Du said.

These data also hold high value as military intelligence. Hence, the cyberattack on the earthquake monitoring center by US intelligence agencies was a planned and premeditated cyber military reconnaissance action, the expert noted.

Xiao Xinguang, a member of the National Committee of the Chinese People's Political Consultative Conference (CPPCC) and also the chief software architect of leading anti-virus company Antiy Labs, further explained to the Global Times that although the location, magnitude, and depth are publicly released information, they are based on the calculations from multiple sensors.

"The comprehensive vibration and sound wave data collected by these sensors, especially infrasound data, have significant intelligence value for judging geological terrain, analyzing weapons system tests, and nuclear tests," Xiao said.

Furthermore, this is just one of the reasons the US targets earthquake monitoring and other systems with cyberattacks. Xiao also analyzed that the current information gathering is only one type of behaviors that have been exposed.

There are still many information theft instances targeting other fields that have not yet come to the surface. By leveraging its global comprehensive reconnaissance ability, along with various means of intrusion, theft, and other comprehensive measures to obtain all kinds of telemetry data, and combining other multi-source auxiliary data, it forms the ability to analyze, judge, attribute, and locate China's economic, social operations, and even military actions.

Causing social panic

Experts believe that cyberattacks on civil infrastructure, including earthquake monitoring systems, can lead to serious consequences.

Du underlined that if the attackers maliciously damaged earthquake monitoring system, it would become ineffective in providing accurate data during an earthquake. This would impact earthquake early warnings and disaster assessment work, leading to more severe loss of life and property.

"Even more dangerous is that if the attackers tamper with the earthquake monitoring data, triggering false alarms, it could lead to social panic and disorder, resulting in casualties among innocent people," Du said.

The remote sensing and telemetry systems and data are national strategic resources that must be given priority protection, Xiao said. "These data can display the basic operation of our country's economy and society from macro to micro levels and provide comprehensive support for integrated decision-making and emergency response. They are the supporting resources for territorial safety and national security."

"US intelligence agencies not only actively collect various signal intelligence but have also long obtained other countries' comprehensive earth system science remote sensing and telemetry data as strategic intelligence through various means. This includes sharing through allied intelligence mechanisms, coercing high-tech companies to provide it, and using academic and scientific research activities," Xiao said.

He also explained that the discovery of the cyberattack on Wuhan earthquake monitoring center was not accidental, indicating that cyberattack intrusion and theft have become the lowest-cost way for the US to obtain other countries' remote sensing and telemetry data.

The US has developed a series of signal intelligence collection, analysis, and processing systems, such as the Echelon project for electromagnetic signal spying, the Main Core project for telecommunications operators, and the PRISM project's super access interface for large IT and internet manufacturers.

"After many years of continuous tracking with relevant departments, we will soon publicly disclose a global reconnaissance system of the US government, which poses serious security threats to China's national security and world peace. We must be highly vigilant and tightly guard against this," Xiao said.

Violating international law

In fact, a plethora of internal documents from the National Security Agency (NSA) and Central Intelligence Agency (CIA) exposed in events such as Prism, Shadow Brokers and WikiLeaks reveal that the US, as a real "hacker empire" and "spying empire," targets "indiscriminately" (including its allies) in its cyber intelligence collection activities. Civil institutions and individuals worldwide are its targets for cyberattacks, fully exposing the US' double standards and hypocrisy on human rights issues.

Du further stated that the US military intelligence agencies' use of their information technology advantage to launch cyberattacks on civilian infrastructure is a criminal act in clear violation of international law, seriously infringing on China's national security and public interest.

"In fact, for a long time, the US' cyberattacks on China's key information infrastructure have been all-encompassing, with government agencies, universities, research institutions, and large corporations all being targeted by its cyberespionage activities. The US is attempting to use these unfair means to comprehensively steal China's political, economic, military, and diplomatic sensitive information, to contain China's development and progress, and to maintain the US' world hegemony," he said.

As a veteran expert in computer virus prevention technology and emergency response, Du suggested that if China's key information infrastructure is attacked with state-backed hackers, relevant units must report the cyberattack to relevant authorities immediately; build cybersecurity capabilities; strengthen supply chain security management, increase autonomous control abilities; conduct regular cybersecurity drills to improve emergency handling and recovery abilities.

Xiao believed that although China's overall cybersecurity ecosystem is still relatively small in market size, overall, it's complete in technology categories without obvious weaknesses. "In continuous confrontation with threats, especially in identifying, analyzing, and exposing advanced persistent cyberattacks, including those from the US, many excellent Chinese cybersecurity companies have demonstrated their abilities, becoming the industry's supporting force in safeguarding national security and defending the security of the cyberspace community."

China does not need to underestimate itself in terms of cybersecurity capabilities, he noted. "We can establish more ambitious goals, become a competent force in the national governance system, create a capability advantage compared to main geopolitical competitors, and not become a significant constraint and risk vulnerability, even when facing comprehensive suppression by hegemonic states or in high-intensity security conflicts.

"We can achieve an overall risk controllable state by strengthening the construction of the public service attributes of cybersecurity , and enhancing the construction of common security capabilities, resilience mechanisms, and cybersecurity infrastructure," Xiao said.

Low levels of radiation from Fukushima persist in seafood

Radiation from the 2011 disaster at the Fukushima Daiichi nuclear power plant contaminates most Japanese seafood at low levels, researchers estimate February 29 in the Proceedings of the National Academy of Sciences.

For aquatic foods, data on lingering concentrations of cesium is limited in terms of the number of species sampled and the levels that surveys can even detect. To fill in the blanks, a team of researchers in Japan drew from survey measurements from April 2011 to September 2015 and devised a way to predict cesium contamination in different aquatic species across Japan.

The analysis provides mixed news: Overall, cesium contamination is pretty low. But, some species retain higher levels than others. Larger fish near the top of the food web tended to have the highest levels of contamination. The researchers predict that such factors put some wild freshwater species like the whitespotted char (Salvelinus leucomaenis leucomaenis) and the Japanese eel (Anguilla japonica) at higher risk for contamination.

Coral larvae feed on their baby fat

For corals, baby fat is food. Coral mothers send their offspring into the world with a balanced meal of fat and algae, but baby corals mainly chew the fat, new research finds.

Adult corals of the species Pocillopora damicornis get most of their nutrition from symbiotic algae that live inside them, providing metabolic energy by photosynthesis. But coral larvae, researchers report online March 25 in Science Advances, rely instead on their “baby fat.”

The finding sheds light on corals’ metabolism during their most vulnerable developmental stage, says biological geochemist Anders Meibom of École Polytechnique Fédérale de Lausanne in Switzerland. Baby fat “is a good thing,” he says. “It gives the coral some time to find a good home without running out of juice.” Larvae’s dependence on fat may make them less sensitive to bleaching — a process in which stressed corals jettison their algal tenants and eventually starve to death. So understanding larval nutrition could help scientists better understand the effects of ocean warming and acidification on bleaching, Meibom says.
Meibom and colleagues fed isotope-tagged nutrients to larvae of P. damicornis, commonly called cauliflower coral, and tracked how the larvae’s symbiotic algae used the nutrients over time. Algae are less abundant in larvae compared with adult corals and provide very little energy, the researchers found.

The next step is to pinpoint exactly when and how larvae switch from feeding on fat to algae as they transition into adulthood, Meibom says, as well as exploring how Earth’s changing oceans might impact the process.

Hippocampus makes maps of social space, too

NEW YORK — Cells in a brain structure known as the hippocampus are known to be cartographers, drawing mental maps of physical space. But new studies show that this seahorse-shaped hook of neural tissue can also keep track of social space, auditory space and even time, deftly mapping these various types of information into their proper places.

“The hippocampus is an organizer,” says neuroscientist Howard Eichenbaum of Boston University.

Neuroscientist Rita Tavares described details of one of these new maps April 2 at the annual meeting of the Cognitive Neuroscience Society. Brain scans had previously revealed that activity in the hippocampus was linked to movement through social space. In an experiment reported last year in Neuron, people went on a virtual quest to find a house and job by interacting with a cast of characters. Through these social interactions, the participants formed opinions about how much power each character held, and how kindly they felt toward him or her. These judgments put each character in a position on a “social space” map. Activity in the hippocampus was related to this social mapmaking, Tavares and colleagues found.
It turns out that this social map depends on the traits of the person who is drawing it, says Tavares, of Icahn School of Medicine at Mount Sinai in New York City. People with more social anxiety tended to give more power to characters they interacted with. What’s more, these people’s social space maps were smaller overall, suggesting that they explored social space less, Tavares says. Tying these behavioral traits to the hippocampus may lead to a greater understanding of social behavior — and how this social mapping may go awry in psychiatric conditions, Tavares said.

The work emphasizes that the hippocampus is not just a mapper of space, Tavares says. Instead, it is a mapper of relationships. “It’s relational learning,” she says. “It’s everything in perspective.”

Other research, discussed at a meeting in February, revealed a role for the hippocampus in building a very different sort of map — a map of sounds. Stationary rats were trained to “move” through a soundscape of different tones, pushing a joystick to change the sounds to reach the sweet spot — the target tone. As the rats navigated this auditory world, nerve cells in their hippocampus were active in a way that formed a map, Princeton University neuroscientist Dmitriy Aronov reported in Salt Lake City at the annual Computational and Systems Neuroscience meeting.

Cells in the hippocampus can also map time, keeping count as seconds tick by, Eichenbaum has found (SN: 12/12/15, p. 12). All of these types of information are quite different, but Eichenbaum argues that they can all be thought of as memories — another mental arena in which the hippocampus plays an important role. Organizing these memories into a sensible structure may be the big-picture job description of the hippocampus, he says. “What’s being tapped in all of these studies is that we are looking at a framework, whether it’s a physical spatial framework, a social space framework, a pitch framework, or a time framework,” Eichenbaum says.

Readers question ocean health

Ocean outlook
Earth’s oceans are a hot mess. They absorb heat at twice the rate that they did nearly 20 years ago, Thomas Sumner reported in “Ocean heating doubles” (SN: 2/20/16, p. 18). Meanwhile, phytoplankton release more heat during photosynthesis than previously thought, Chris Samoray reported in “Ocean flora flunk photosynthesis test” (SN: 2/20/16, p. 12). And the trillions of plastic particles littering the oceans are creating new habitats for microbes with unknown consequences, Samoray wrote in “Floating fortress of microbes” (SN: 2/20/16, p. 20).
Anna Carter wondered if these findings are connected. “Is it possible that phytoplankton are contributing to ocean warming?” Carter asked. “How might the organisms now collecting on all the plastic in the ocean be related?”

Heat produced by phytoplankton doesn’t have a large impact on ocean temperature, says Sumner. “The phytoplankton are catching sunlight that otherwise could warm the water,” he wrote. “Another thing to keep in mind is that the oceans are colossal. At its deepest, the Pacific Ocean is about as deep as the cruising altitude at which most commercial airliners fly. Phytoplankton live in the top sliver of the water column, so any effect they have will be minuscule compared with the size of the ocean.” As for plastic-dwelling microbes, there is still so much to discover, Samoray says. Their contribution to ocean warming is currently unknown.

Ants on the move
Florida harvester ants may be the Frank Lloyd Wrights of the animal kingdom. They construct intricate and mysterious nests, Susan Milius reported in “Restless architects we don’t understand” (SN: 2/20/16, p. 4). Researchers investigated why ants frequently build and abandon elaborate nests, and scatter charcoal around nest openings.

Readers had their own ideas about the unusual behavior. “[Charcoal] is an effective absorber of organics. Is it possibly used for absorbing their scent as a protective measure against predators?” Mark Ayers asked.

Walter Tschinkel, the Florida State University scientist featured in the story, says that the scorched plant matter ants use may not be as effective for these purposes as commercial charcoal. Field tests found no sign that charcoal would deter attacks by other ants.

Reader Joe De Vita speculated that colonies abandon their nests because of waste buildup. Tschinkel notes that this hypothesis has yet to be tested. “Digging up the vacated nest often reveals chambers with matted, blackened floors, presumably from fungus and other microorganisms, but whether this condition has any negative (or for that matter, positive) effects on harvester ants is unknown,” he says. An experiment to test this hypothesis is possible, but “ain’t all that easy. Still, stay tuned.”

Milk for spills
Researchers have created a fibrous membrane made from milk proteins and carbon that could filter toxic heavy metals from severely polluted waters, Sarah Schwartz reported in “Altered milk protein cleans up pollution” (SN: 2/20/16, p. 14). In lab tests, the membrane removed over 99.9 percent of lead from a contaminated solution.

“It is a very exciting method,” wrote Janece Von Allmen. “Has anyone thought to test this method in the real polluted waters of Flint, Michigan?”

The filters are still in an early stage of design, Schwartz says. The membranes work in the laboratory to capture heavy metals and radioactive particles, but testing in the real world is a must. “Bodies of contaminated water are most likely chemically different from lab-made lead solutions and could change the membrane’s performance,” she says.

Whether or not these membranes would work in the Flint River is unclear because the river is not the original source of lead. The toxic heavy metal accumulates as the water passes through corroding pipes. The good news is the prototype shows signs of being efficient and is relatively cheap to produce.

Bear bone rewrites human history in Ireland

In a bit of Irish luck, archaeologists have found evidence of the Emerald Isle’s earliest known humans. A brown bear’s kneecap excavated in 1903, featuring stone tool incisions, pushes back the date that humans set foot in Ireland by as many as 2,500 years.

Radiocarbon dating at two independent labs places the bone’s age between about 12,800 and 12,600 years old, say Marion Dowd of the Institute of Technology, Sligo in Ireland and Ruth Carden of the National Museum of Ireland in Dublin. Melting glaciers and milder temperatures in northwestern Europe at that time made it easier for humans to reach Ireland by boat to hunt game, at least for several weeks at a time, the researchers propose in the May 1 Quaternary Science Reviews.
Until now, the oldest signs of people on Ireland came from a hunter-gatherer camp dating to about 10,290 years ago.

Carden discovered the brown bear’s kneecap while studying bones that had been packed away in boxes in the 1920s, after the bones’ 1903 discovery at Ireland’s Alice and Gwendoline Cave.