Category Archives: covert action

How Binance Hijacked the Central Bank of Nigeria

Tigran Gambaryan, Binance’s head of financial-crime compliance, flew to Nigeria’s capital to solve a problem: The government had blamed the world’s largest crypto exchange for crashing the currency… He hasn’t come back. Nigerian authorities detained Gambaryan and a colleague, Nadeem Anjarwalla, a U.K. and Kenyan national and Binance’s regional manager for Africa, according to the men’s families. The Binance employees, who are being held in a guarded house, haven’t been charged with any crimes. The government, which invited them to Nigeria for meetings, hasn’t publicly discussed the detentions. 

Nigeria, Africa’s largest economy with a population of more than 220 million, has faced many currency crises before. This is the first time that crypto has played a starring role.
Nigerians flocked to cryptocurrencies in recent years to shelter their savings from a soaring inflation rate, which hit nearly 30% in January, and a plunging currency, one of the worst-performing in the world this year. Two-thirds of the population lives in poverty.  The country has the second-highest adoption of crypto in the world, after India, according to an index compiled by Chainalysis, a data provider. Nigerians received about $60 billion worth of crypto transactions in the 12 months through June 2023, according to Chainalysis. 

Because the government rationed who could exchange the local currency for the dollar and at what exchange rate, many sought refuge in digital currencies pegged to the U.S. dollar, known as stablecoins.  The stablecoin trade in essence became a black market, displaying an unofficial exchange rate between the local currency, the naira, and the dollar that was much weaker than the government’s rates. Binance, the most popular exchange, became the go-to place to check that black-market rate, according to currency traders. Bayo Onanuga, a special adviser to the Nigerian president, accused Binance of setting the exchange rate for Nigeria and hijacking the role of the central bank…A persistent gap between what the government thought the currency was worth, and the rate on Binance’s website, proved intolerable.  Onanuga told The Wall Street Journal that Binance was cooperating with authorities and compensation to Nigeria was being discussed.

Binance said it would stop any services involving the naira, dealing a blow to its efforts to rebuild its business in fast-growing emerging markets. The Nigerian Communications Commission ordered telecommunications companies to restrict access to the websites of Binance and other crypto platforms.  Olayemi Cardoso, the head of Nigeria’s central bank, suggested that crypto platforms were being used to manipulate the market. In the case of Binance, he said, $26 billion had passed through its platform in Nigeria in 2023 from sources and users whom the central bank couldn’t adequately identify. He didn’t say where the figure came from…

Founded in 2017 in China, Binance has a history of drawing the ire of governments. It has long operated without a headquarters and under the radar of regulators, offering unlicensed trading through its global website. In November 2023, Binance founder Changpeng Zhao stepped down as chief executive and pleaded guilty to violating U.S. anti-money-laundering requirements. The company agreed to pay $4.3 billion in fines, the largest ever levied on a crypto firm. Zhao is currently awaiting sentencing in the U.S. 

The use of cryptocurrencies tied to the U.S. dollar has ballooned in countries across the developing world. In economies under financial stress where actual dollars are scarce, such as Turkey, Argentina and Russia, locals have turned to crypto exchanges and the dollar-like digital currencies they offer as an alternative.

Excerpts from Patricia Kowsmann et al., Crypto Gets Blamed for a Real-Life Currency Crisis, WSJ, Mar. 12, 2024

How Russia Invaded Microsoft

Microsoft  said in March 2024 a Russian state-sponsored hacking group that stole information from its senior leadership team is still using that information to gain unauthorized access to its internal systems. The technology company disclosed in January  2024 that the group, which it has identified as Midnight Blizzard, had extracted information from a small percentage of employee email accounts, including members of its senior leadership team and employees in its cybersecurity and legal teams. Since that disclosure, the group has used that information to gain access to Microsoft’s source code repositories and internal systems. The volume of some aspects of the attack, including password sprays, jumped 10-fold in February compared with the already large volume Microsoft encountered in January, it said.

“Midnight Blizzard’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination, and focus,” Microsoft said. The company said that its investigations of Midnight Blizzard activities are continuing and that it is coordinating efforts with federal law enforcement. In a blog post last August 2023, Microsoft said it had detected Midnight Blizzard, previously known as Nobelium, launching targeted social-engineering attacks that used Microsoft Teams chats to phish for credentials. The former Nobelium group has been linked by U.S. authorities to the Foreign Intelligence Service of the Russian Federation and is known for its involvement in the massive SolarWinds hack of 2020.

Excerpts from Dean Seal, Microsoft Says Russian-Sponsored Hackers Still Using Stolen Information, WSJ, Mar. 9, 2024

If the United States is a Surveillance State How Does it Differ from China?

In November 2023, Michael Morell, a former deputy director of the Central Intelligence Agency (CIA), hinted at a big change in how the agency now operates. “The information that is available commercially would kind of knock your socks off…if we collected it using traditional intelligence methods, it would be top secret-sensitive. And you wouldn’t put it in a database, you’d keep it in a safe.”

In recent years, U.S. intelligence agencies, the military and even local police departments have gained access to enormous amounts of data through shadowy arrangements with brokers and aggregators. Everything from basic biographical information to consumer preferences to precise hour-by-hour movements can be obtained by government agencies without a warrant.

Most of this data is first collected by commercial entities as part of doing business. Companies acquire consumer names and addresses to ship goods and sell services. They acquire consumer preference data from loyalty programs, purchase history or online search queries. They get geolocation data when they build mobile apps or install roadside safety systems in cars. But once consumers agree to share information with a corporation, they have no way to monitor what happens to it after it is collected. Many corporations have relationships with data brokers and sell or trade information about their customers. And governments have come to realize that such corporate data not only offers a rich trove of valuable information but is available for sale in bulk.

Earlier generations of data brokers vacuumed up information from public records like driver’s licenses and marriage certificates. But today’s internet-enabled consumer technology makes it possible to acquire previously unimaginable kinds of data. Phone apps scan the signal environment around your phone and report back, hourly, about the cell towers, wireless earbuds, Bluetooth speakers and Wi-Fi routers that it encounters….The National Security Agency recently acknowledged buying internet browsing data from private brokers, and several sources have told me about programs allowing the U.S. to buy access to foreign cell phone networks. Those arrangements are cloaked in secrecy, but the data would allow the U.S. to see who hundreds of millions of people around the world are calling.

Car companies, roadside assistance services and satellite radio companies also collect geolocation data and sell it to brokers, who then resell it to government entities. Even tires can be a vector for surveillance. That little computer readout on your car that tells you the tire pressure is 42 PSI? It operates through a wireless signal from a tiny sensor, and government agencies and private companies have figured out how to use such signals to track people…

It’s legal for the government to use commercial data in intelligence programs because data brokers have either gotten the consent of consumers to collect their information or have stripped the data of any details that could be traced back to an individual. Much commercially available data doesn’t contain explicit personal information. But the truth is that there are ways to identify people in nearly all anonymized data sets. If you can associate a phone, a computer or a car tire with a daily pattern of behavior or a residential address, it can usually be associated with an individual.

And while consumers have technically consented to the acquisition of their personal data by large corporations, most aren’t aware that their data is also flowing to the government, which disguises its purchases of data by working with contractors. One giant defense contractor, Sierra Nevada, set up a marketing company called nContext which is acquiring huge amounts of advertising data from commercial providers. Big data brokers that have reams of consumer information, like LexisNexis and  Thomson Reuters, market products to government entities, as do smaller niche players. Companies like Babel Street, Shadowdragon, Flashpoint and Cobwebs have sprung up to sell insights into what happens on social media or other web forums. Location data brokers like Venntel and Safegraph have provided data on the movement of mobile phones…

A group of U.S. lawmakers is trying to stop the government from buying commercial data without court authorization by inserting a provision to that effect in a spy law, FISA Section 702, that Congress needs to reauthorize by April 19. The proposal would ban U.S. government agencies from buying data on Americans but would allow law-enforcement agencies and the intelligence community to continue buying data on foreigners…But many in the national security establishment think that it makes no sense to ban the government from acquiring data that everyone from the Chinese government to Home Depot can buy on the open market. The data is valuable—in some cases, so valuable that the government won’t even discuss what it’s buying. “Picture getting a suspect’s phone, then in the extraction [of data] being able to see everyplace they’d been in the last 18 months plotted on a map you filter by date ranges,” wrote one Maryland state trooper in an email obtained under public records laws. “The success lies in the secrecy.”

For spies and police officers alike, it is better for people to remain in the dark about what happens to the data generated by their daily activities—because if it were widely known how much data is collected and who buys it, it wouldn’t be such a powerful tool. Criminals might change their behavior. Foreign officials might realize they’re being surveilled. Consumers might be more reluctant to uncritically click “I accept” on the terms of service when downloading free apps. And the American public might finally demand that, after decades of inaction, their lawmakers finally do something about unrestrained data collection.

Excerpts from Byron Tau, US Spy Agencies Know Your Secrets. They Bought Them, WSJ, Mar. 8, 2024

See also Means of Control: How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State by Byron Tau (published 2024).

Chinese Gangs, Crypto Scams and the Deaths of 100,000 Americans

Chinese crime syndicates are using cryptocurrencies to launder billions of dollars, including money raised from helping supply drugs to the U.S. or scamming American victims…They are using crypto to launder the profits of drug dealing and illegal gambling, and have made huge amounts from investment scams that promise easy returns in the cryptocurrency markets. Crypto addresses linked to a group of suspected chemical traders based in China have received more than $37.8 million worth of assets since 2018 in exchange for shipping a key ingredient of fentanyl, the research firm Chainalysis said in a report in 2023. These shipments are often sent to Central America and Mexico, where drug cartels use them to manufacture the drug, which is then shipped to the U.S.

In October 2024, the U.S.’s Office of Foreign Assets Control sanctioned a network of individuals and companies based in China over the manufacturing and distribution of ingredients used in fentanyl and other drugs. Some of those individuals held cryptocurrency wallets to send and receive funds, the Treasury Department said. Fentanyl use by Americans has become a major public health issue, contributing to more than 100,000 deaths a year, according to the latest figures from the Centers for Disease Control and Prevention.

Scammers in China and Florida shared the same two crypto wallet addresses, implying they are likely parts of the same group, according to a joint investigation published in January 2024 by ChainArgos, a Singapore-based blockchain data platform, and Bitrace, a China-based blockchain research group…Chinese law-enforcement agencies across the country have investigated more than 800 cases, shut down five underground banks used to help process payments, and uncovered about $4 billion worth of funds based on blockchain data…Chinese prosecutors also have charged well-known crypto executives. Zhao Dong, founder of a major over-the-counter crypto platform in China called RenrenBit, was sentenced to seven years in prison in 2022 after providing crypto-exchange services to an illicit business involved in overseas gambling and so-called pig-butchering scams.

Tether, a stablecoin pegged to the U.S. dollar, has been used as a way for these groups to switch between different fiat currencies.

Excerpts from Weilun Soon, Chinese Gangs Use Cryptocurrencies to Launder Billions, WSJ, Mar. 2, 2024

Delete America: China’s Document 79

A 2022 Chinese government directive aims to get US technology out of China—an effort some refer to as “Delete A,” for Delete America.  Document 79 was so sensitive that high-ranking officials and executives were only shown the order and weren’t allowed to make copies… It requires state-owned companies in finance, energy and other sectors to replace foreign software in their IT systems by 2027. 

American tech giants had long thrived in China as they hot-wired the country’s meteoric industrial rise with computers, operating systems and software. Chinese leaders want to sever that relationship, driven by a push for self-sufficiency and concerns over the country’s long-term security…Document 79, named for the numbering on the paper, targets companies that provide software—enabling daily business operations from basic office tools to supply-chain management. The likes of  Microsoft  and Oracle are losing ground in China

Excerpts from Liza Lin, China Intensifies Push to ‘Delete America’ From Its Technology, Mar. 7, 2024

Darfur Forever: when a country is not a country

Iran unsuccessfully pressed Sudan to let it build a permanent naval base on the African country’s Red Sea coast, something that would have allowed Tehran to monitor maritime traffic to and from the Suez Canal and Israel, according to a senior Sudanese intelligence official. Iran has supplied Sudan’s military with explosive drones to use in its fight with a rebel warlord and offered to provide a helicopter-carrying warship if Sudan had granted permission for the base…

Sudan had close ties with Iran and its Palestinian ally Hamas under longtime strongman Omar al-Bashir. After Bashir’s ouster in a 2019 coup, the leader of the country’s military junta, Gen. Abdel Fattah al-Burhan, initiated a rapprochement with the U.S. in an effort to end international sanctions. He also moved to normalize relations with Israel. Iran’s request to build a base highlights how regional powers are seeking to take advantage of Sudan’s 10-month-old civil war to gain a foothold in the country, a strategic crossroads between the Middle East and sub-Saharan Africa with a 400-mile Red Sea coastline.  Sudan’s military has been fighting the paramilitary Rapid Support Forces (RSF), led by Burhan’s former second-in-command, Lt. Gen. Mohamed Hamdan Dagalo, since mid-April 2023. The conflict has killed tens of thousands of people, displaced millions and triggered one of the world’s worst humanitarian crises The Biden administration has accused both the Sudanese military and the RSF of committing war crimes. The U.S. alleges the RSF also has committed crimes against humanity, including murder, rape and ethnic cleansing in the Darfur region in western Sudan.  U.N. officials have criticized Sudan for aerial bombing of civilian neighborhoods and depriving Sudanese civilians of desperately needed humanitarian aid. U.N. agencies have also accused the RSF of atrocities, including ethnically motivated attacks in Darfur…

The Wall Street Journal reported in October 2023 that Egypt has supplied drones to the Sudanese military and trained Sudanese troops in how to use them. The United Arab Emirates, meanwhile, has been sending weapons to the RSF, the Journal reported in August 2023…Dubai is the biggest importer of Sudanese gold and in 2022 a U.A.E.-based consortium signed a $6 billion deal to build a new port facility on Sudan’s Red Sea coast.

Excerpts from Nicholas Bariyo, Iran Tried to Persuade Sudan to Allow Naval Base on Its Red Sea Coast, WSJ, Mar. 3, 2024

What Do You Do When You Are Up for Sale?

Under an executive order issued on February 28, 2024, specific classes of Americans’ sensitive data, including genomic, biometric, personal health, geolocation, financial and certain types of personal identifiers, will generally be barred from being sold or transferred in vast tranches to “countries of concern” or vendors known to supply data to them. The countries of concern are China, Russia, North Korea, Iran, Cuba and Venezuela, and have a record of misusing data on Americans, an official said.

In 2023, the U.S. intelligence community issued a groundbreaking report acknowledging that the vast amount of Americans’ personal data available for sale, which are often bought and repackaged by data brokers and then resold through a labyrinthine ecosystem of vendors and resellers, has provided a valuable stream of intelligence for the U.S. government and adversaries alike. The report, commissioned by Director of National Intelligence Avril Haines, admitted that such streams created significant threats to privacy, and had rapidly grown in scale such that they had begun to replicate the results of intrusive surveillance techniques, such as hacking, that are typically more targeted.

The executive order is notably silent on the purchasing of commercially available data sets by the U.S. government.

Excerpts from Dustin Volz, U.S. Limits Sales of Americans’ Personal Data to China, Other Adversaries, WSJ, Feb. 129, 2024

Cars as a National Security Risk: Tesla v. BYD

In February 2024, President Biden ordered the Commerce Department to open an investigation into foreign-made software in cars, citing Chinese technology as a potential national-security risk. Chinese efforts to dominate the global auto industry posed clear security risks to the U.S. “Connected vehicles from China could collect sensitive data about our citizens and our infrastructure and send this data back to the People’s Republic of China,” Biden said in a statement. “These vehicles could be remotely accessed or disabled.”

The Biden administration has been trying to reduce the U.S. auto industry’s reliance on China, including using tax credits to boost electric-vehicle sales and pushing automakers away from Chinese suppliers. China became the world’s biggest auto exporter, shipping an estimated 5.26 million domestically made vehicles overseas, according to the China Passenger Car Association. Part of that growth came in the electric-vehicle market, where the country sold more than one million China-made EVs overseas.

Tesla Chief Executive Elon Musk has said Chinese car companies have already had much success outside of China and that they are now the “most competitive” globally.  “If there are not trade barriers established, they will pretty much demolish most other car companies in the world,” Musk said during Tesla’s earnings call in January 2024.

The Chinese government has also raised national-security concerns about Western-designed cars sold to its own citizens, saying they could be used for gathering data and information. In 2021, China restricted the use of Tesla vehicles by military staff and employees of key state-owned companies, saying the car’s cameras record images constantly and obtain data, including when, how and where the vehicles are used.

Excerpts from Gareth Vipers, Chinese Automakers Pose U.S. National-Security Threat, Biden Says, WSJ, Feb. 29, 2024

Underground Empires: Hamas v. Israel

Senior members of Hamas’s leadership in exile met in Doha, Qatar, earlier in February 2024 amid concerns that its fighters were getting mauled by an Israeli offensive in the Gaza Strip. Enemy troops were killing dozens of militants each day as they methodically overran Hamas strongholds. Then a courier arrived with a message from Yahya Sinwar, the head of Hamas in Gaza, saying, in effect: Don’t worry, we have the Israelis right where we want them.  Hamas’s fighters, the Al-Qassam Brigades, were doing fine, the upbeat message said. The militants were ready for Israel’s expected assault on Rafah, a city on Gaza’s southern edge. High civilian casualties would add to the worldwide pressure on Israel to stop the war, Sinwar’s message said, according to people informed about the meeting… 

Hamas fighters are now trying to avoid large firefights and instead use small-scale ambushes—using tools ranging from rocket-propelled grenades to recorded voices of hostages to lure Israeli troops into traps.  The ambushes have little chance of holding territory against Israel’s armored maneuvers. But they’re tailored to Hamas’s limited capabilities…Many in Israel’s military, from senior commanders to ordinary soldiers who spoke to The Wall Street Journal, worry that their accumulation of tactical wins on the battlefield might not add up to a lasting strategic victory. After nearly five months of intense fighting, Israel is still far from its declared war aim of eliminating Hamas as a significant military and political entity. “Fighting the enemy is like a game of whack-a-mole,” said an Israeli reservist in Khan Younis with the 98th Division….

Degrading Hamas’s capabilities is a realistic goal for Israel’s military, said Hussein Ibish, a scholar at the Arab Gulf States Institute, a think tank in Washington. But sustaining it would require fully occupying Gaza, which would give Hamas a target for a never-ending insurgency, he said. “Recent history shows that you can be an effective insurgency on a shoestring,” said Ibish. “Anyone can make an IED,” or homemade bomb, he said. “It’s easy to get a pistol. If you’re willing to die, you can kill soldiers.” 

Hamas… has shifted to hit-and-run attacks by tiny groups of two or three men, sometimes just one individual….Other Hamas ambushes use so-called sticky bombs, improvised explosives that attach themselves to Israeli armored vehicles with magnets or duct tape.…Hamas also tries to kill Israeli troops by putting booby traps in buildings throughout Gaza, many Israeli soldiers say. Booby traps have been widely found in the homes of Hamas operatives, but also in many civilians’ homes, Israeli soldiers said. Early on the explosives were placed around the buildings’ entrances. The Israelis soon stopped using the front door, instead blasting or bulldozing their way through the walls of a house. Hamas has adapted, placing explosive traps in items inside buildings, from gas storage balloons to children’s’ toys, Israeli soldiers said….In other cases, Hamas used voice recordings of hostages begging for help in Hebrew to try to draw soldiers into an ambush…

The Israelis have made only partial progress in finding and destroying Hamas’s vast tunnel network. Israeli officials now estimate that Hamas built around 350 miles of tunnels under Gaza, which is less than 30 miles long and up to 8 miles wide. There are thought to be several hundred tunnels under Khan Younis alone, which occupies an area roughly the size of the Bronx in New York…Hamas uses the tunnels as military headquarters, to maneuver across the enclave’s cities, protect its leaders, hide Israeli and other hostages, manufacture weapons and conduct hit-and-run attacks. The tunnels also contain a fixed-line phone system that Hamas used to communicate earlier in the war, along with walkie-talkies, burner SIMs and satellite phones. But with Israel hacking into those systems, the militants have increasingly shifted to using runners to convey verbal or written messages. 

The Israeli army has found no systematic solution for finding and destroying Hamas’s tunnels, many soldiers said. Tunnel entrances have been found in homes, schools, mosques, courtyards, streets and farm fields. Some are covered by steel doors, others by mattresses in a home. Israeli forces have mostly relied on drones and robots to search tunnels, only sending soldiers in later to avoid firefights in the narrow passages.

Excepts from Marcus Walker, Why Hamas Thinks it Still Could Win the War, WSJ, Feb.29, 2024

Sinophobia or Rational Paranoia: the Cranes

The Biden administration plans to invest billions in 2024 in the domestic manufacturing of cargo cranes, seeking to counter fears that the prevalent use of China-built cranes with advanced software at many U.S. ports poses a potential national-security risk. The move is part of a set of actions taken by the administration that is intended to improve maritime cybersecurity….Administration officials said more than $20 billion would be invested in port security, including domestic cargo-crane production, over the next five years. The money, tapped from the $1 trillion bipartisan infrastructure bill passed in 2021, would support a U.S. subsidiary of  Mitsui, a Japanese company, to produce the cranes, which officials said would be the first time in 30 years that they would be built domestically.

Cranes at some ports used by the U.S. military were flagged as surveillance threats. Officials also raised the concern that the software on the cranes could be manipulated by China to impede American shipping or, worse, temporarily disrupt the operation of the crane.  “By design these cranes may be controlled, serviced and programmed from remote locations,” said Rear Adm. John Vann, who leads the Coast Guard cyber command, during a press briefing….

The U.S. military has been concerned about the cranes for years and has made efforts to skirt ports with the China-made cranes as best as possible, according to the senior U.S. military commander who oversees the military’s logistics operations.The Chinese can track the origin, destination and other data of the U.S. military’s containerized materiel to determine exactly where the military is shipping it, Cranes made by China-based ZPMC contain sensors that can register and track the origin and destination of containers…

China’s military doctrine gives priority to targeting “systems that move enemy troops,” including harbors and airports, Craig Singleton, a senior fellow at the Foundation for Defense of Democracies, a Washington think tank, said during congressional testimony in February 2023…“Increasingly, the Chinese are not merely seeking access to our networks; they are pre-emptively positioning to compromise and control them,” Singleton said in his testimony. “As a result, China is poised to impede the mobilization of American military forces, foment a state of disarray, and redirect national attention and resources in both war and short-of-war scenarios.”

Excerpts from Dustin Volz, U.S. to Invest Billions to Replace China-Made Cranes at Nation’s Ports, WSJ, Feb. 21, 2024

Guess Who Benefits from the Russo-Ukrainian War?

In the two years since Russia invaded Ukraine, the U.S. defense industry has experienced a boom in orders for weapons and munitions. Business is coming from European allies trying to build out their military capabilities as well as from the Pentagon, which is both buying new equipment from defense manufacturers and replenishing military stocks depleted by deliveries to Ukraine. Industrial production in the U.S. defense and space sector has increased 17.5% since Russia launched its full-scale invasion of Ukraine two years ago, according to Federal Reserve data.  Biden administration officials say that of the $60.7 billion earmarked for Ukraine in a $95 billion supplemental defense bill, 64% will actually flow back to the U.S. defense industrial base.  Recent spending by European governments on U.S. jet fighters and other military hardware represents “a generational-type investment. The past few years are equal to the prior 20 years,” said Myles Walton, a military industry analyst at Wolfe Research….Poland has placed orders worth about $30 billion for Apache helicopters, High Mobility Artillery Rocket Systems, or Himars, M1A1 Abrams tanks and other hardware, the department said. Germany spent $8.5 billion on Chinook helicopters and related equipment, while the Czech Republic bought $5.6 billion of F-35 jets and munitions.

The boost to the U.S. defense industry is just one way the fragmentation of the world economy along geopolitical lines is tightening U.S.-European relations, often to the benefit of the U.S. The U.S. became the world’s largest LNG exporter in 2023, and its LNG exports are expected to almost double by 2030 on already-approved projects. Around two-thirds of those exports go to Europe….

 The Ukraine war served as a warning for American defense strategists, said Cynthia Cook, a defense industry expert at the Center for Strategic and International Studies, a Washington-based think tank. “What Russia’s war pointed out relatively quickly is the constraints in the U.S. defense industrial base especially in terms of surging production rapidly. The good news is that this lesson has been learned when the U.S. is not directly at war.”

Excerpts from Tom Fairless, How War in Europe Boosts the U.S. Economy, WSJ, Feb. 20, 2024

The Future of Political Assassination

The Pentagon killed a Kataib Hezbollah leader in downtown Baghdad in February 2024 using a weapon that employs six long blades to shred its target and minimize civilian casualties, defense officials said. The modified Hellfire missile, which inside the military is referred to colloquially as “the flying Ginsu,” recalling the popular knives sold on TV infomercials in the 1970s, was used to target Abu Baqr al-Saadi, the leader of Kataib Hezbollah in Syria. The U.S. use of the Ginsu in the Baghdad strike hasn’t been previously disclosed. …The weapon, formally known as the R9X and sometimes referred to as the Ninja bomb, is an inert Hellfire missile designed by the Pentagon and the CIA to kill terrorist leaders. It was employed, in part, because of concerns that killing innocent bystanders could inflame an already tense political situation in Iraq, which hosts roughly 2,500 American troops, the officials said. 

Imagery of the strike on al-Saadi, showing the remnants of a burning but largely intact vehicle, was reminiscent of others involving the Ginsu. A weapon with an explosive warhead, like the traditional Hellfire missile, would have likely destroyed the vehicle.  The U.S. has developed a variant of the Hellfire missile that replaces an explosive warhead with a ring of blades.

Excerpts from Pentagon Used Six-Bladed ‘Ginsu’ Weapon to Kill Iraqi Militia Leader, WSJ, Feb. 14, 2024

The Secret Fight over the Atlantic

In August 2023, Ali Bongo, then-president of the Central African nation of Gabon, made a startling revelation to a top White House aide: During a meeting at his presidential palace, Bongo admitted he had secretly promised Chinese leader Xi Jinping that Beijing could station military forces on Gabon’s Atlantic Ocean coast. Alarmed, U.S. principal deputy national security adviser Jon Finer urged Bongo to retract the offer, according to an American national security official. The U.S. considers the Atlantic its strategic front yard and sees a permanent Chinese military presence there—particularly a naval base, where Beijing could rearm and repair warships—as a serious threat to American security. “Any time the Chinese start nosing around a coastal African country, we get anxious,” a senior U.S. official said…

 China is conducting a backroom campaign to secure a naval base on the continent’s western shores, American officials say. And, for more than two years, the U.S. has been running a parallel effort to persuade African leaders to deny the People’s Liberation Army Navy a port in Atlantic waters. It’s a battle American officials say they are winning. So far, no African country with an Atlantic coastline has signed a deal with China, U.S. officials say. Authorities in Equatorial Guinea, a repressive, family-run oil state, have “consistently assured us that they will not have the P.R.C. construct a base,” the official said…

Only one African port, however, serves as a permanent base for Chinese ships and troops: The P.L.A.’s seven-year-old facility in Djibouti, which overlooks the strategic Red Sea where the U.S. and its allies are currently defending shipping routes against attacks from Iran-backed Houthi rebels from Yemen. The Chinese base, capable of docking an aircraft carrier or nuclear submarines, sits a short drive from the largest American base in Africa, Camp Lemonnier, a hub for the U.S. campaign against al-Shabaab, the virulent al Qaeda affiliate operating in Somalia.

Excerpt from Michael M. Phillips, U.S.-China Tensions Have a New Front: A Naval Base in Africa, WSJ, Feb. 10, 2024

Your Car Leaks Information about You: Who Benefits?

The California Privacy Protection Agency—created under a ballot initiative in 2020 and the only regulator in the nation solely dedicated to privacy issues—will examine the growing amalgamation of data collected by smart vehicles and whether the business practices of the companies collecting that data comply with state law. “Modern vehicles are effectively connected computers on wheels. They’re able to collect a wealth of information via built in apps, sensors, and cameras, which can monitor people both inside and near the vehicle,” Ashkan Soltani, the agency’s executive director, said in a statement in July 2023.

Regulators in Europe also have opened investigations into how the auto industry uses personal information from cars such as location data. In February 2023, Tesla agreed to offer a software update in Europe to change camera settings in cars after the Dutch privacy regulator investigated the company. Tesla disabled vehicles’ external security cameras by default until a driver turns on the function to record activity outside a car and changed the camera settings so they only save the last 10 minutes of footage recorded from outside the cars, compared with one hour of footage they previously had saved.  The Dutch regulator also said it was a privacy violation for the cameras to extensively record people outside of cars without their knowledge. The Tesla update also included features to warn people inside and outside of cars that the external cameras are recording. Headlights blink if the cameras are recording and a message is displayed on a touch screen inside the cars.

Automobiles represent the latest frontier for regulators, raising fresh questions about who will control the data generated by vehicles as they move through the world. Numerous companies are in a position to access the data—including the automakers themselves, companies that make or run in-car navigation or infotainment systems, satellite radio companies and in-vehicle security and emergency services providers. Insurance companies have also been encouraging consumers to share information about their driving behavior, sometimes in exchange for a discount.  

All the data has commercial potential. In some cases, it can be used by insurers in determining how to set rates, evaluate risk and gauge safe driving behavior…In some cases, data brokers make vehicle data available for sale—stripping it of personal information such as names. People’s movement patterns are often unique, however, and their real-world identities can be inferred in large-scale location data sets even when the data is stripped of personal information.

Law-enforcement agencies also can now obtain the historical location of suspects, usually with a warrant. The sensors on modern cars have raised national-security concerns as well. China in 2021 banned certain officials from owning or driving Tesla vehicles citing concerns that data the cars gather could be a source of national-security leaks.

Byron Tau, California Opens Privacy Probe Into Who Controls, Shares the Data Your Car Is Collecting, WSJ, July 31, 2023

Unstoppable: How the FBI Mines Personal Information

The Federal Bureau of Investigation’s access to a controversial intelligence trove of intercepted emails, texts, and other electronic data should be curtailed following serial missteps that have damaged public and congressional trust in the surveillance tool, a White House panel of intelligence advisers has concluded. in July 2023. The recommendation and others made by the panel come as a challenge to the Biden administration, which has spent months aggressively lobbying lawmakers to preserve the spying program, which is set to expire at the end of 2023. At issue is the FBI’s access to a cache of data collected under what is known as Section 702 of the Foreign Intelligence Surveillance Act.(FISA)..Top Biden administration officials have said the program—classified details of which were revealed 10 years ago by former intelligence contractor Edward Snowden—is among the most vital national security tools in their possession, critical to preventing terrorism, thwarting cyberattacks and understanding the aims of adversaries such as China and Russia. It allows the National Security Agency to siphon streams of electronic data from U.S. technology providers such as Meta and Apple. The data, collected in intelligence repositories, can then be searched without a warrant by spy agencies including the FBI, which has a robust counterintelligence mission.

The board was critical of the FBI’s history of wrongfully plumbing American data in the Section 702 trove, which have included improper searches of George Floyd protesters and sitting lawmakers, and said reforms needed to be adopted and codified in law.

Excerpts from Dustin Volz, FBI Access to Spying Tool Should Be Restricted, Panel Advises, WSJ, July 31, 2023
See also pdf

Great Fear and Uphill Struggle: US, Japan and China

In Japan’s glory days of the the late 1980s, the country accounted for about half of the global semiconductor industry, and the U.S. was left to beg, plead and threaten as it tried to get a small slice of the Japanese market. A bestselling book in Japan during the Cold War’s waning days called “The Japan That Can Say No” suggested that Tokyo could leverage its dominance in semiconductors to control the world’s military balance—and perhaps help the Soviet Union instead of the U.S.

Today, the great fear driving chip investments in both U.S. and Japan is China. The U.S. policy calls for helping allies such as Japan build a supply chain that is less exposed to risks posed by a hostile Beijing. While the U.S. is expanding its own chip production through the Chips and Science Act, which includes some $53 billion of spending, people involved in the Rapidus project (between U.S. and Japan) said the U.S. needed further global diversification. ..The Rapidus project aims to get Japan back into the heart of the business of chip making by building facilities on the northern island of Hokkaido, known for its ski resorts. Rapidus says it wants to begin pilot production in 2025 and full-scale production in 2027. Some 6,000 workers are being drafted to put up the factory.

Japan’s Ministry of Economy, Trade and Industry has said that it intends to help Rapidus achieve its goals, and that it wants the Japanese semiconductor industry to have revenue of some $100 billion in 2030, triple the 2020 figure. The ministry is pitching in billions of dollars for additional projects in Japan. TSMC is building an $8.6 billion factory on the southern island of Kyushu and is in talks about a second. Assuming it gets the money, Rapidus still has to master a level of manufacturing technology attained so far by only two companies, TSMC and South Korea’s Samsung Electronics. Both are projected to have the ability to mass-produce 2-nanometer chips by 2025.

Excerpts from Peter Landers and  Yang Jie, Japan’s Plan to Become a Chipmaking Champ Hinges on This Football-Loving Engineer, WSJ, July 6, 2023

Whoever Controls Space Controls Everything

The U.S. military wants allies to train and plan together for space operations, in the same way that they already do in ground, air and naval combat, Gen. Chance Saltzman, chief of space operations, said in an interview in July 2023. The move comes amid concerns about China and Russia’s ability to disrupt the West’s satellites and new technology the two countries have developed, including satellites that can grab others

Russia, for instance, has conducted operations to disrupt Ukraine’s space-enabled communications. Saltzman said that Russia has been sending satellites “irresponsibly close” to those of other nations to shadow them. Moscow has “nesting doll” satellites, which can release an object that can be used to attack other objects in space, while China has tested robotic arms that can be used to grab other satellites. Both countries have demonstrated missiles that can destroy orbiting satellites…

“Quantity is a quality in itself,” he said, using an expression often employed in the military. For example, the satellites of a large coalition would be harder to target than those of one nation, he added.

Excerpt from Alistair MacDonald, U.S. Pushes Military Cooperation in Space, WSJ, July 18, 2023

Mass-Market Brain Manipulation and Human Rights

Scientific advances are rapidly making science-fiction concepts such as mind-reading a reality — and raising thorny questions for ethicists, who are considering how to regulate brain-reading techniques to protect human rights such as privacy.

On 13 July, 2023 neuroscientists, ethicists and government ministers discussed the topic at a Paris meeting organized by UNESCO, the United Nations scientific and cultural agency. Delegates plotted the next steps in governing such ‘neurotechnologies’ — techniques and devices that directly interact with the brain to monitor or change its activity. The technologies often use electrical or imaging techniques, and run the gamut from medically approved devices, such as brain implants for treating Parkinson’s disease, to commercial products such as wearables used in virtual reality (VR) to gather brain data or to allow users to control software… Neurotechnology is now a US$33 billion industry.
One area in need of regulation is the potential for neurotechnologies to be used for profiling individuals and the Orwellian idea of manipulating people’s thoughts and behaviour. Mass-market brain-monitoring devices would be a powerful addition to a digital world in which corporate and political actors already use personal data for political or commercial gain.

Commercial devices are of more pressing concern to ethicists. Companies from start-ups to tech giants are developing wearable devices for widespread use that include headsets, earbuds and wristbands that record different forms of neural activity — and will give manufacturers access to that information.

The privacy of this data is a key issue. Rafael Yuste, a neuroscientist at Columbia University in New York City, told the meeting that an unpublished analysis by the Neurorights Foundation, which he co-founded, found that 18 companies offering consumer neurotechnologies have terms and conditions that require users to give the company ownership of their brain data. All but one of those firms reserve the right to share that data with third parties. “I would describe this as predatory,” Yuste says. “It reflects the lack of regulation.”…Another theme at the meeting was how the ability to record and manipulate neural activity challenges existing human rights. Some speakers argued that existing human rights — such as the right to privacy — cover this innovation, whereas others think changes are needed.

Yuste and his colleagues propose five main neurorights: the right to mental privacy; protection against personality-changing manipulations; protected free will and decision-making; fair access to mental augmentation; and protection from biases in the algorithms that are central to neurotechnology.

Excerpt from Liam Drew, Mind-reading machines are coming — how can we keep them in check?, Nature, July 24, 2023

Planning for the Invasion: Taiwan

If China were to invade Taiwan, it might start by severing the 14 undersea internet cables that keep the island connected to the world. Taiwan is adding cables and planning how to defend their landing points. But it is also testing antennae in 700 locations, including some outside Taiwan. These would be able to send and receive signals by means of satellites in low orbit, like the ones Starlink uses. The goal is to make the antennae “as mobile as possible” to survive an attack…China has the capability to shoot down satellites. But Starlink developed by SpaceX (Elon Musk) is made up of over 4,000 of them and aims eventually to have tens of thousands…Unsurprisingly, Taiwan is looking to reduce its dependence on others including Starlink. Its space agency is developing its own low-orbit communication satellites. The first is expected to be launched in 2025.

China’s low-orbit ambitions are much larger. In 2020 the government filed papers with the International Telecommunication Union, a UN body, for a 12,992-satellite constellation. A year later the government established China Satellite Networks Group Limited and tasked it with developing satellite internet. At least seven state-owned and private Chinese companies are building satellite factories, with the expectation that they will soon be able to produce several hundred small communications satellites per year.

Officials in Beijing have developed a space-race mentality. Specific orbits and radio frequencies are “rare strategic resources” that Starlink wants to “monopolize”, warned the Liberation Army Daily in 2022….The Liberation Army Daily complains that there is only room for 50,000 satellites in low-Earth orbit and that Starlink may eventually take up more than 80% of that space. But the calculation is not that straightforward, says Juliana Suess of the Royal United Services Institute, a think-tank in Britain. Imagine low orbit as a highway, she says. What needs to be calculated is how many moving cars that highway can safely accommodate. Much will depend on the size of satellites and their trajectories.” But at this moment, there is lack of norms surrounding traffic in low orbit.

Spacex has an important advantage. Satellites in low orbit don’t last very long, so the company replaces them on a regular basis. That entails a large number of rocket launches. Spacex has the world’s best system for that, the partially reusable Falcon 9 rocket. Now it is working on a much larger, fully reusable spacecraft called Starship which could launch hundreds of satellites at a time. Some Chinese companies appear to be trying to build knock-offs.

Excerpts from China in Space: A New Mandate in the Heavens, Economist, May 20, 2023


Who is Ready for the Future Global War?

The Economist magazine estimates that the new defense commitments of all countries …will generate over $200bn-$700bn in extra defense spending globally each year…
China’s defense budget has grown by about 75% in real terms in the past ten years. It wants to “basically complete modernization” of its forces by 2035, and become a “world class” military power by 2049. America thinks China wants the capability to invade Taiwan as early as 2027… Overall America’s advantage over its rivals has eroded in the past century…During the first, second and cold wars America’s adversaries had much smaller economies than America did. No longer. Today China’s GDP alone is nearly 80% of America’s.

In the decades after the cold war, the thinking was that to spend less on armies meant to spend more on infrastructure and public services and to lower debt or taxes. Since the 1960s the world has “released” about $4trn a year of spending at current prices in this way, equivalent to the global government budget for education. Now the peace dividend is turning into a “war tax”. How heavy will it be?…

America, by far the world’s largest defense spender, is devoting growing sums to research and development of future weapons. This includes hypersonic missiles, to catch up with China and Russia; “directed energy” such as powerful lasers to shoot down drones and missiles; and artificial intelligence and robotics. It is also buying as many munitions as its factories can produce—from 155mm artillery shells to anti-ship missiles. The war in Ukraine has exposed the extraordinary quantities of munitions needed in a conflict, as well as the inability of peacetime production lines to meet such demand.

America, Russia and China are investing in their nuclear arsenals, too. America is upgrading all legs of its “triad” of ground-, air- and submarine-launched nukes. Russia is working on esoteric weapons, such as the long-distance, nuclear-powered Poseidon torpedo designed to set off an underwater nuclear explosion that, propagandists boast, can cause destructive tidal waves. China is quickly expanding its arsenal, from several hundred warheads to 1,500 by 2035, according to the Pentagon…

Cyber-security, drones and satellite technology straddle both the civilian and military worlds. SpaceX, founded by Elon Musk, has launched American military satellites. Ukrainian warriors make extensive use of his Starlink constellation of satellites. It all amounts to a change of cultural mindset from tech firms that once shunned defense as morally tainted. A defense-tech ecosystem has sprung up in America…

One way or another, a new era of rearmament beckons. As General Mark Milley, chairman of America’s joint chiefs of staff, told the Senate recently: “Preventing great-power war through readiness and deterrence is very expensive, but not as expensive as fighting a war.” And the only thing more costly than that, as he explained, is losing one.

Excerpts from Farewell peace dividend: The Cost of the Global Arms Race, Economist, May 27, 2023 

Squeezing the U.S.–China’s Foothold in Latin America

China has gone from from hardly trading with Latin America at the turn of the century to overtaking the United States to become the top trading partner for South America, and the second almost everywhere else in Latin America. Annual goods trade between China and Latin America rose to $445bn in 2021, up from $12bn in 2000…. Latin America is increasingly useful to China in geopolitical terms, too.

On June 8th, 2023 the Wall Street Journal reported that the Communist government of Cuba had secretly agreed to allow China to set up an electronic-spying facility in the country. At first American and Cuban officials denied the story. Two days later the White House admitted that a base has existed for some time…China has long been thought to have a small military presence in Cuba and access to listening stations. It has several satellite ground-stations in Latin America, which are believed to also have spying purposes. A space observatory in Argentina is run by the Chinese army and its activities are opaque.

Deepening geopolitical ties follow closer economic ones. China is a big source of cash for the region. Between 2005 and 2021 Chinese state-owned banks loaned $139bn to Latin American governments. It has invested billions of dollars in the region, mainly in energy and mining. Some 21 countries in Latin America and the Caribbean have signed up to China’s Belt and Road Initiative, a massive global infrastructure-building spree.

Latin American countries are also turning to the yuan for trade and to include in their central-bank reserves. On June 2nd, 2023 Argentina doubled its currency-swap line with China, meaning that around a third of its central-bank reserves, which stand at $32bn, will effectively be in yuan. Last year, the yuan surpassed the euro to become the second-most important foreign currency in Brazil’s central-bank vaults… In April 2023 a Chinese state-owned power company reached an agreement to purchase two power suppliers in Peru that would give China a near-monopoly over the country’s energy grid. Some fret over Chinese construction of ports in the region, such as the Chancay megaport near Lima in Peru, fearing that they could be repurposed to military ends….China…has trained police forces from countries including Argentina and Brazil, donated cars and investigative equipment to Nicaragua and Costa Rica, and sold surveillance equipment to Ecuador….

Excerpts from China and Latin America: Comrades Across Continents, Economist, June 15, 2023

Invisible CyberAttack: Volt Typhoon

Cybersecurity agencies in the U.S., the U.K., Canada, Australia and New Zealand—an intelligence-sharing group of countries known as the Five Eyes—said a Chinese state-sponsored actor is employing a tactic known as “living off the land,” which involves using built-in network administration tools to gain access to systems. The activity blends in with normal Windows system activities, allowing the actor to evade detection. The campaign is impacting communications, manufacturing, transportation, maritime and other sectors in parts of the U.S. and Guam, the American territory that hosts major military installations in the Pacific, according to a blog post from Microsoft, publisher of the Windows operating system. The tech giant said the Chinese actor, known as Volt Typhoon, is pursuing capabilities that could disrupt communication infrastructure between the U.S. and Asia in a future crisis.

China has consistently denied carrying out cyberattacks and has accused the U.S. of being the biggest culprit of such efforts…By gaining access to a system through the “living off the land” approach—and maintaining that access while remaining undetected—hackers can glean intelligence about how the system operates. It could also give them the ability to disrupt the system later with no warning—though the intent could just be information gathering…

Excerpts from Mike Cherney and Austin Ramzy, Hack Hurts Bid for Beijing Reset, WSJ, May 26, 2023

The Law of the Jungle for Personal Data: Who Benefits?

The vast amount of Americans’ personal data available for sale has provided a rich stream of intelligence for the U.S. government but created significant threats to privacy, according to a newly released report by the U.S.’s top spy agency. Commercially available information, or CAI, has grown in such scale that it has begun to replicate the results of intrusive surveillance techniques once used on a more targeted and limited basis, the report found. “In a way that far fewer Americans seem to understand, and even fewer of them can avoid, CAI includes information on nearly everyone that is of a type and level of sensitivity that historically could have been obtained” through targeted collection methods such as wiretaps, cyber espionage or physical surveillance, the report concluded. 

In recent years, data brokers’ offerings have grown from basic address history and demographic information to include the trail of information generated by smartphone devices and apps, social-media platforms, automobiles and location trackers such as fitness watches. Such detailed information can now “cause harm to an individual’s reputation, emotional well-being, or physical safety,” said the report, which urged the intelligence community to develop better policies, procedures and safeguards around its acquisition of such information.  Virtually anyone can purchase the data, and the marketplace is loosely regulated in the U.S., which has no comprehensive national privacy law. 

Much of that data is sold to the government by vendors who claim it is “anonymized”—stripped of personal information such as names or addresses. But privacy advocates and researchers say that in the case of geolocation information on phones or cars, a name can often be inferred: Individuals typically park their cars at night and set down their phones at their homes. In the case of certain internet data, browsing behavior also can reveal personal information.

“If the government can buy its way around Fourth Amendment due-process, there will be few meaningful limits on government surveillance,” Wyden said in a statement, referring to the U.S. Constitution’s protections against “unreasonable searches and seizures.”

Excerpts from Byron Tau and Dustin Volz, U.S. Spy Agencies Buy Vast Quantities of Americans’ Personal Data, WSJ,, June 13, 2023

Perpetual Attack: 25-Year Cyberattack, Russia v. US

They US Federal Bureau of Investigation (FBI)  disabled a piece of malware Russia’s intelligence agency has allegedly used for two decades (!) to steal documents from NATO-allied governments and others, in an operation that highlights the FBI’s increasing efforts to go beyond arresting hackers and find new ways to disrupt cyberattacks.

In an affidavit filed in federal court in Brooklyn, a Federal Bureau of Investigation agent said the bureau had identified a long-running cyber-espionage campaign by officers in a unit of Russia’s Federal Security Service, or FSB, to take documents from other governments’ defense and foreign ministries, journalists and others, and route them through infected computers in the U.S. to cover their tracks. Security researchers have sometimes referred to the group of hackers as “Turla,” who are known to use a malware called “Snake.”

FBI agents identified U.S. computers infiltrated with the Snake malware, including in Oregon, South Carolina and Connecticut, and obtained court approval to issue commands to the malware to permanently disable it on those computers, officials said. The operation is the latest example of the FBI using an obscure legal authority to proactively disrupt Russian or Chinese cyberattacks by essentially infiltrating their systems. Investigators tracked the group’s daily activities to an FSB facility in Ryazan, outside Moscow.

Cybersecurity experts and U.S. officials said that Turla’s espionage activities can be traced back more than 25 years, though with rare exception the group’s hackers are adept at infiltrating systems without being noticed. For example, the group was linked to a major breach of U.S. classified systems in the late 1990s that compromised the Pentagon, other government agencies and defense contractors and was considered a watershed cyberattack that demonstrated the national security threat posed by Russian government hackers. In that case, it took years before the U.S. discovered the campaign (!).

Aruna Viswanatha and Dustin Volz, FBI Disables Malware Russia Allegedly Used to Steal Documents from NATO Allies, WSJ, May 9, 2023

The Problem with Military Efficiency

United States military suppliers consolidated at the Cold War’s end, under pressure to reduce defense costs and streamline the nation’s industrial base. Over the past three decades, the number of fixed wing aircraft suppliers in the U.S. has declined from eight to three. During the same period, major surface ship producers fell from eight to two, and today, only three American companies supply over 90% of the Pentagon’s missile stockpile. 

Lower-tier defense firms are often the sole maker of vital parts—such as black powder—and a single crisis can bring production to a standstill. Today that’s emerging as a gnawing problem for the U.S., whether in supplying weapons and ammunition to Ukraine or in restocking reserves to prepare for a potential confrontation with China in the new era of great-power competition…The Pentagon describes this vulnerability  as the “single source” problem. Only one foundry in the U.S. makes the titanium castings used in howitzers, and only one company makes the rocket motor used in the Javelin antitank weapon widely used in Ukraine…

U.S. defense contractors’ inability to quickly replenish weaponry such as missiles and munitions for Ukraine has led Pentagon officials to argue that industry consolidation has gone too far and raised questions about how prepared America is for conflict. 

Excerpts from Gordon Lubold, US Military Has Explosive Problem, WSJ, Apr. 27, 202

How to Track 1,000 People at the Same Time

DARPA is striving to help the military keep track of up to 1,000 targets on earth through the development of new satellite software–a program called ‘Oversight.’

From the DARPA website: DARPA, the U.S. Space Force, and the Space Development Agency (SDA) are developing new satellite constellations to increase the tactical capabilities of U.S. space systems…’Oversight’ seeks software solutions to enable autonomous constant custody, or knowledge of target location within accuracies necessary for mission needs, of up to 1,000 targets from space assets through management of available satellite hardware resources. The project aims to support both peacetime and wartime monitoring of high value targets in contested environments where resources and targets may be highly dynamic.

Current practices require human operators for exquisite satellite solutions. This arrangement does not scale well for the numbers of targets that Oversight is considering. Reliance on individual ground station operators significantly increases latency and minimizes tactical utility of satellite sensor data. Oversight will develop the autonomy necessary to track targets with the operator overseeing at an aggregate level. It will also leverage existing and/or state-of-the-art networks to provide collaboration between satellite and ground resources.

Why China Lags Behind in Artificial Intelligence

China is two or three years behind America in building foundation models of AI. There are three reasons for this underperformance. The first concerns data. A centralized autocracy should be able to marshal lots of it—the government was, for instance, able to hand over troves of surveillance information on Chinese citizens to firms such as SenseTime or Megvii that, with the help of China’s leading computer-vision labs, then used it to develop top-notch facial-recognition systems.

That advantage has proved less formidable in the context of generative AIs, because foundation models are trained on the voluminous unstructured data of the web. American model-builders benefit from the fact that 56% of all websites are in English, whereas just 1.5% are written in Chinese, according to data from w3Techs, an internet-research site. As Yiqin Fu of Stanford University points out, the Chinese interact with the internet primarily through mobile super-apps like WeChat and Weibo. These are “walled gardens”, so much of their content is not indexed on search engines. This makes that content harder for ai models to suck up. Lack of data may explain why Wu Dao 2.0, a model unveiled in 2021 by the Beijing Academy of Artificial Intelligence, a state-backed outfit, failed to make a splash despite its possibly being computationally more complex than GPT-4.

The second reason for China’s lackluster generative achievements has to do with hardware. In 2022 America imposed export controls on technology that might give China a leg-up in AI. These cover the powerful microprocessors used in the cloud-computing data centrers where foundation models do their learning, and the chipmaking tools that could enable China to build such semiconductors on its own.

That hurt Chinese model-builders. An analysis of 26 big Chinese models by the Centre for the Governance of ai, a British think-tank, found that more than half depended on Nvidia, an American chip designer, for their processing power. Some reports suggest that SMIC, China’s biggest chipmaker, has produced prototypes just a generation or two behind TSMC, the Taiwanese industry leader that manufactures chips for Nvidia. But SMIC can probably mass-produce only chips which TSMC was churning out by the million three or four years ago.

Chinese AI firms are having trouble getting their hands on another American export: know-how. America remains a magnet for the world’s tech talent; two-thirds of ai experts in America who present papers at the main ai conference are foreign-born. Chinese engineers made up 27% of that select group in 2019. Many Chinese AI boffins studied or worked in America before bringing expertise back home. The covid-19 pandemic and rising Sino-American tensions are causing their numbers to dwindle. In the first half of 2022 America granted half as many visas to Chinese students as in the same period in 2019.

The triple shortage—of data, hardware and expertise—has been a hurdle for China. Whether it will hold Chinese ai ambitions back much longer is another matter.

Excerpts from Artificial Intelligence: Model Socialists, Economist,  May 13, 2023, at 49

Late Paranoia Better than None: US v. Chinese Cranes

In recent years, U.S. national-security officials have pointed to a range of equipment manufactured in China that could facilitate either surveillance or disruptions in the U.S., including baggage-screening systems and electrical transformers, as well as broader concerns about China’s growing control of ports around the world through strategic investments. China makes almost all of the world’s new shipping containers and controls a shipping-data service. In that context, the giant ship-to-shore cranes have drawn new attention. The $850 billion defense policy bill lawmakers passed in December requires the Transportation Department’s maritime administrator, in consultation with the defense secretary and others, to produce an unclassified study by the end of this year on whether foreign-manufactured cranes pose cybersecurity or national-security threats at American ports.

ZPMC cranes entered the U.S. market around two decades ago, offering what industry executives described as good-quality cranes that were significantly cheaper than Western suppliers. In recent years, ZPMC has grown into a major player in the global automated-ports industry, working with Microsoft Corp. and others to connect equipment and analyze data in real time…Today, ZPMC says it controls around 70% of the global market for cranes and has sold its equipment in more than 100 countries. A U.S. official said the company makes nearly 80% of the ship-to-shore cranes in use at U.S. ports…

The huge cranes are generally delivered to U.S. ports fully assembled on ships and are operated through Chinese-made software. In some cases, U.S. officials said, they are supported by Chinese nationals working on two-year U.S. visas, factors they described as potential avenues through which intelligence could be collected…Early in the Trump administration, officials in the National Security Council’s strategic planning office came to consider cranes as a unique point of interest, said Sean Plankey, a former cybersecurity official who was involved in those discussions. “Where would someone attack first and how would they do it?” he asked, characterizing the discussion. He said the officials determined that if Beijing’s military could access the cranes, they could potentially shut down U.S. ports without drawing on their navy.

A National Maritime Cybersecurity Plan, released in December 2020, found that no single U.S. agency had responsibility for maritime network security, leaving port directors without enforceable standards on cybersecurity and generally free to buy equipment from any vendor.

Excerpts from Aruna Viswanatha, Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools, WSJ, Mar. 6, 2023.

Fear of the Enemy Within: Unrestricted Surveillance

The Supreme Court declined to hear a constitutional challenge to a secretive government surveillance program, dealing a setback to privacy groups including the American Civil Liberties Union ahead of a looming debate in Congress over whether to renew the law that authorizes the intelligence tool.

In a brief order issued on February 2023, the high court said it wouldn’t hear arguments challenging the legality of the National Security Agency program known as “Upstream,” in which the intelligence agency collects and monitors internet communications without obtaining search warrants. Classified details about the program were among those exposed a decade ago by former intelligence contractor Edward Snowden, who has been charged with theft of government property and violating espionage laws and lives in Russia.

The legal challenge was brought by Wikimedia, the nonprofit owner of the Wikipedia online encyclopedia. Wikimedia was represented by lawyers at the ACLU, Cooley LLP and the Knight First Amendment Institute at Columbia University. Wikimedia’s lawyers urged the high court to rein in the “state secrets privilege,” a legal doctrine that allows the government to shut down lawsuits that could jeopardize sensitive national-security information. 

“The Supreme Court’s refusal to grant our petition strikes a blow against an individual’s right to privacy and freedom of expression—two cornerstones of our society and the building blocks of Wikipedia,” said James Buatti, Wikimedia’s legal director, in a statement.

Excerpts from  Jan Wolfe  and Dustin Volz, Justices Won’t Hear Challenged to NSA Surveillance, Feb. 22, 2023

Visible and Vulnerable: the Power Grid and Terrorism

Physical attacks on the U.S. power grid rose 71% last year compared with 2021 and will likely increase this year, according to a confidential industry analysis viewed by The Wall Street Journal. A division of the grid oversight body known as the North American Electric Reliability Corporation found that ballistic damage, intrusion and vandalism largely drove the increase. The analysis also determined that physical security incidents involving power outages have increased 20% since 2020, attributed to people frustrated by the onset of the pandemic, social tensions and economic challenges.

The NERC division, known as the Electricity Information Sharing and Analysis Center, or E-ISAC, recorded the sharp increase in incidents in 2022, driven in part by a series of clustered attacks on infrastructure in the Southeast, Midwest and Pacific Northwest. One of the most significant incidents occurred in early December 2022 when attackers targeted several substations in North Carolina with gunfire, leaving roughly 45,000 people in the dark…The number of politically or ideologically motivated attacks appears to be growing though it is difficult to identify the reasons for each one.  There seems to be a pattern where people are targeting critical infrastructure, probably with the intent to disrupt. In 2013, snipers targeted a large-scale transmission substation near San Jose, Calif., and raised fears that the country’s power grid was vulnerable to terrorism. The attack took out 17 transformers critical to supplying power to Silicon Valley, authorities said. A former federal regulator at the time called the event “the most significant incident of domestic terrorism involving the grid that has ever occurred.”

Excerpts from Katherine Blunt, Power-Grid Attacks Surge and Are Likely to Continue, Study Finds, WSJ, Feb. 22, 2023

Under Wraps: US-China Hostilities

The mid-air crash in 2001 between an American EP3 spy plane and a Chinese fighter jet that left the Chinese pilot dead and 24 American crew members in detention after an emergency landing in China.

China seized an American underwater drone in the South China Sea in 2016. The U.S. sent radio messages requesting that the drone be returned, but the Chinese ship merely acknowledged the messages and ignored the request. The US subsequently demanded the drone’s return.

The Military Internet: DARPA, Amazon and Space X

Satellites are crucial military infrastructure for spying and communications. They are also vulnerable to attack and disruption. In November 2021, three months before it invaded Ukraine, Russia fired a missile into a defunct satellite. Then, in October, a Russian diplomat declared even commercial satellites could be legitimate targets. Satellite systems used by Ukraine have been hacked and jammed. Ground antennae have been attacked.

In light of this sort of thing, America’s military establishment is worried that its satellite network is not up to snuff. But it has a plan. The Space-Based Adaptive Communications Node (Space-BACN, or “Space Bacon”) will, if successful, create a laser-enabled military internet in orbit around Earth by piggybacking on a number of satellites that would have been launched anyway.

Space Bacon is a brainchild of DARPA, the special-projects research arm of the Department of Defense, and is an intriguing orbiting echo of the original, terrestrial ARPNET, which evolved into the internet…The plan is to fit as many newly launched satellites as possibly with laser transceivers that will be able to communicate with counterparts as far away as 5,000km. Satellite owners will pay for these transceivers, but will then receive payments from the American government for their use.

Space Bacon promises many benefits. Unlike radio, the normal mode of communication with and between satellites, transmissions by laser beam are hard to intercept and almost impossible to jam. Indeed, adversaries might not even know when a transmission is taking place, a bonus for operational secrecy.

DARPA wants Space Bacon to cost a maximum of $100,000 a satellite, the better to encourage participation. It bodes well that Amazon, SpaceX and Viasat are all designing command-and-control architectures for Space Bacon.

Excerpts from DARPA, lasers and an internet in orbit, Economist, Feb. 11, 2023

The Economics and Conflicts of Near Space: US Balloons

American military and civilian agencies have flown balloons over the U.S. for a growing range of national-security applications, scientific research, intelligence collection and commercial uses… Less known is the extent to which the U.S. has floated balloons over foreign countries, though there are examples in history. In the 1950s during the Cold War, the U.S. flew balloons outfitted with cameras over Soviet airspace, an operation sometimes referred to as Project Moby Dick, before later switching to U-2 spy planes…

The diplomatic confrontation with China over the alleged spy balloon the U.S. shot down off the South Carolina coast in February 2022 is likely to fuel greater interest from government and the private sector in surveillance balloon manufacturing and detection, analysts said. “We’re seeing the exploitation of near space,” said retired Gen. John Jumper…

World View Enterprises Inc., a Tucson, Arizona company that says it has launched more than 120 high-altitude balloon missions in the last decade, rigs balloons with cameras to inspect natural-gas and oil pipelines and sensors to sniff the atmosphere for traces of gases like methane. Balloons hover far closer to earth than satellites’ orbits, enabling them to gather higher quality data…The company says it has provided its remote sensing services to civilian and government agencies and private companies…

Twice a day, meteorologists across the world launch weather balloons to collect information about the atmosphere’s temperature, pressure and humidity to feed short-term weather forecasts as well as longer-term seasonal climate predictions. These simple latex balloons carry a device called a radiosonde that weighs a few ounces and transmits the data back to ground stations as they float up to 115,000 feet before popping after a two-hour flight… 

NASA and research agencies from several other Western nations also operate massive research balloons that spend several weeks circling the globe in the stratosphere at altitudes of up to 120,000 feet. Since these balloons travel beyond the limit of a traditional commercial aircraft—which travel generally between 30,000 and 40,000 feet—they can give vital information about atmospheric conditions and chemistry, as well as astronomical observations, that drones or high-altitude aircraft can’t obtain… 

The Pentagon’s Defense Innovation Unit has contracted Aerostar to explore military applications. Aerostar has said its balloons can loiter for weeks or even months in position, using solar panels to recharge onboard batteries.

“Now the stratosphere is very clearly a new and contested domain,” says Mr. Hartman, referring to the region of the atmosphere that runs roughly from four to 30 miles in altitude. “We call it the stratosphere economy.”

Excerpts from Dustin Volz et al., What Does the U.S. Do With Its Own Balloons?, WSJ, Feb. 14, 2023

How Countries Dissolve: the Conquest of Africa

As Wagner fighters, a Russian mercenary group, play a central role in Russia’s war in Ukraine, the group is quietly expanding its alliances in Africa, penetrating new mineral-rich areas, exploiting the exit of Western powers and creating alliances with local fighters. Wagner fighters and instructors are working with the government of the Central African Republic in a bid to seize areas rich with precious minerals that could be exported through Sudan, say Western security officials. Wagner is also looking to expand its influence in Burkina Faso and Ivory Coast, while consolidating its relationship with the military junta in Mali

With an estimated 5,000 men stationed across Africa, Wagner’s footprint is now almost as large as the U.S.’s 6,000 troops and support personnel on the continent. ..The push aims to create a corridor from Wagner-controlled mines in the Central African Republic through Sudan, where the group works closely with a local strongman, and onto the mineral trading hub of Dubai.

In January 2023,  Mr. Prigozhin, head of Wagner, stressed that sending fighters to Africa was “absolutely necessary.” “There are presidents to whom I gave my word that I would defend them,” he said on his Telegram channel. “If I now withdraw one hundred, two hundred or five hundred fighters from there, then this country will simply cease to exist.”  

Excerpts from Benoit Faucon & Joe Parkinson, Wagner Group Aims to Bolster Putin’s Influence in Africa, WSJ, Feb. 14, 2023

The Chinese Balloon and the American Psyche

The U.S. blacklisted six Chinese companies on February 10, 2023  that it said were involved in Beijing’s surveillance-balloon program, in a move taken in retaliation for the suspected spy balloon that traversed the U.S. The companies blacklisted are Beijing Nanjiang Aerospace Technology; China Electronics Technology Group Corporation 48th Research Institute; Dongguan Lingkong Remote Sensing Technology; Eagles Men Aviation Science & Technology Group; Guangzhou Tian-Hai-Xiang Aviation Technology; and Shanxi Eagles Men Aviation Science & Technology Group.

The Commerce Department’s Bureau of Industry and Security said the Chinese entities were added over their support for the People’s Liberation Army’s aerospace programs, including airships and balloons and related materials and components.  “The PLA is utilizing High Altitude Balloons (HAB) for intelligence and reconnaissance activities,” it said….  While many national-security analysts have been sounding the alarm about China’s surveillance practices in recent years, the balloon offered the American public a visible picture of the Chinese threat as it crossed much of the nation.

The newly formed House Select Committee on the Strategic Competition Between the U.S. and the Chinese Communist Party is likely to press for tougher U.S. measures to slow China’s advance, said Emily Benson, a senior fellow at the Center for Strategic and International Studies. “This is a really concrete example of an issue that Washington has so far not succeeded in penetrating the American public’s mind,” Ms. Benson said. “This could be kind of a pivotal moment for the American psyche to really start to realize that China is important and that this is a policy area they should be tuning in to.”

Excerpts from Ian Talley and Vivian Salama, U.S. Blacklists Chinese Companies It Links to Balloon Program, WSJ, Feb. 11, 2023

Money and Power: First Spaceport in Africa Built by China in Djibouti

When China began building its first overseas military outpost—a naval base in Djibouti—America and its allies were alarmed. The facility, which opened in 2017, sits just 13km (eight miles) from America’s largest base in Africa. France, Japan and Italy have bases there, too. Before long the Americans accused China’s forces of shining lasers at their pilots. China complained that Western aircraft were overflying its outpost to photograph it.

That friction has since lapsed into grudging coexistence in the former French colony, which is not much bigger than New Jersey. But a new threat to this uneasy balance has emerged with the announcement on January 9, 2023 that a Hong Kong-based company with links to Huawei, a Chinese telecoms giant, will build and operate a spaceport covering at least ten square kilometers (four square miles) in Djibouti.

The facility will include seven launch-pads and three rocket-testing pads, says Hong Kong Aerospace Technology Group Ltd (HKATG), which signed a memorandum of understanding on the project with Djibouti’s government and a Chinese company that operates a special economic zone there. In March they will sign a contract for the deal, which allows construction of power stations, water plants, roads and seaports.

Ismail Omar Guelleh, Djibouti’s president, said on Twitter that the $1bn spaceport will take five years to build and be transferred to the government after 30 years. If completed, the spaceport offers Djibouti a chance to claim a piece of the multi-billion-dollar global space industry. There are about two dozen active spaceports worldwide. Africa has none…Djibouti has much to offer. It is not far from the equator, where the Earth rotates fastest, giving rockets a boost. Access to the sea would enable clients to import rockets and other bulky equipment by ship. They could also launch eastwards over the ocean, minimizing risks for people in surrounding areas while taking advantage of the Earth’s rotation.

For China, which hopes to develop a private space industry to rival America’s, Djibouti could provide an alternative to the four launch sites on its own soil. These are operating at capacity…

Excerpts from China, Africa and Space: Preparing for Launch, Economist, Jan. 21, 2023

Space Control in the Future of War: Ukraine

The Starlink constellation of SpaceX currently consists of 3,335 active satellites and has become an integral part of Ukraine’s military and civil response to Russia’s invasion…Appropriately enough, the story started with a tweet, one sent by Mykhailo Fedorov, Ukraine’s minister of digital transformation, two days after the invasion:

@elonmusk, while you try to colonize Mars —Russia try to occupy Ukraine! While your rockets successfully land from space—Russian rockets attack Ukrainian civil people! We ask you to provide Ukraine with Starlink stations and to address sane Russians to stand.

Mr Musk replied to him within hours, saying that the Starlink service had been turned on over Ukraine and that the hardware would follow. Within days lorries full of the pizza-sized flat dishes used to access the satellites began to arrive in Ukraine.

By May 2022 around 150,000 people were using the system every day. The government quickly grew to rely on it for various communication needs, including, on occasion, the transmission of the nightly broadcast by Volodymyr Zelensky, Ukraine’s president. Because the dishes and their associated terminals are easily portable and can be rigged to run off a car battery, they are ideal for use in a country where the electricity and communication networks are regularly pounded by Russian missiles. When Kherson was liberated in November 2022 Starlink allowed phone and internet services to resume within days.

Crucially, Starlink has become the linchpin of what military types call C4ISR (command, control, communications, computers, intelligence, surveillance and reconnaissance). Armies have long relied on satellite links for such things…But Most satellite communications make use of big satellites which orbit up at 36,000km. Perched at such a height a satellite seems to sit still in the sky, and that vantage allows it to serve users spread across very large areas. But even if such a satellite is big, the amount of bandwidth it can allocate to each user is often quite limited.

The orbits used by Starlink’s much smaller satellites are far lower: around 550km. This means that the time between a given satellite rising above the horizon and setting again is just minutes. To make sure coverage is continuous thus requires a great many satellites, which is a hassle. But because each satellite is serving only a small area the bandwidth per user can be high. And the system’s latency—the time taken for signals to get up to a satellite and back down to Earth—is much lower than for high-flying satellites. 

Franz-Stefan Gady, of the International Institute for Strategic Studies, a think-tank, recently visited the Ukrainian front lines and saw an example of what cheap, ubiquitous connectivity makes possible: a sort of Uber for howitzers. .. “Ukrainian military operations are hugely dependent on having access to the internet,” says Mr Gady, “so Starlink is a most critical capability.” A Ukrainian soldier puts it more starkly. “Starlink is our oxygen,” he says. Were it to disappear “Our army would collapse into chaos.”…

Starlink signals are strong compared with those from higher flying satellites, which makes jamming them harder. And the way that the dishes use sophisticated electronics to create narrow, tightly focused beams that follow satellites through the sky like invisible searchlights provides further resistance to interference…

If its signals cannot be jammed, the system itself could be attacked instead….Cyber-attacks like the one aimed at Ukraine’s legacy satellite system on February 24, 2022 are one possibility. So far, though, similar sallies against Starlink appear to have been ineffective, in part thanks to SpaceX’s ability to quickly update the system’s software. Dave Tremper, director of electronic warfare for the Office of the Secretary of Defense, has said the speed of the software response he witnessed to one attack was “eye-watering”.

And then there are the satellites themselves. America, China, India and Russia have missiles that can shoot satellites out of the sky. Again, though, using them would seem a severe escalation. It would also be a lot less useful against a constellation like Starlink than against older systems. Knocking out a single Starlink would achieve more or less nothing. If you want to damage the space-based bit of the system, you need to get rid of lots of them…

In 2020 China filed documents with the International Telecommunication Union, a UN body, for a 13,000-satellite constellation of its own.

Excerpts from The Satellites that Saved Ukraine, Economist, Jan. 7, 2023

Banning Anti-Satellite Missiles

The UN General Assembly has overwhelmingly approved the US-proposed resolution calling on states to commit to a moratorium on testing of destructive anti-satellite missiles, with 155 countries voting yes, nine voting no including Russia, China and Iran, and nine nations abstaining including India.  The UN vote to support the resolution does not commit individual nations to the moratorium, but signals that there is widespread support for the concept. Canada, New Zealand, Germany, Japan, the United Kingdom, South Korea, Switzerland, Australia and, France have now made such pledges…

France and Germany are Europe’s two biggest European space players, but Italy is also a major space operator of both civil and military satellites, and so far Rome has remained uncommitted. Luxembourg also is emerging as a European space hub and has yet to sign up.

Excerpts from THERESA HITCHENS, US call for halting kinetic anti-satellite tests gets boost from UN vote, Reuters, Dec. 9, 2022 

Geo-engineering Wars and Termination Shock

What if a country experiencing the bad effects of climate change—crop failures, perhaps, or serious flooding—were to begin, unilaterally and perhaps quietly, to try to modify the climate? Such a project, reckons DARPA, a research arm of America’s defence department, is possible. But it could trigger chaos, and not just of the meteorological sort. The agency, the overall objectives of which include preventing “strategic surprise”, has therefore recently begun to pay for research into how such an event might happen, and how to react to it.

DARPA’s assumption is that any attempt at unilateral geoengineering would use a technique called stratospheric aerosol injection (SAI). This would employ aircraft to disperse sulfuric acid, or its precursor sulfur dioxide, into the upper atmosphere, to form tiny sulfate particles that would reflect sunlight back into space. This would probably work (big volcanic eruptions, which do something similar, have a measurable effect on global temperatures). The costs, though, could be considerable—and not just directly in dollars.

A poorly designed SAI program might break down ozone, a form of oxygen that shields organisms, people included, from harmful ultraviolet radiation. Patterns of precipitation would also change, for cooler air absorbs less moisture, and these effects would undoubtedly vary from region to region. Another problem is the acid rain that would result.

Perhaps most pertinent, though, is that SAI would serve only to mask the effects of greenhouse gases rather than ending them. That brings the risk of “termination shock”, for the injected sulfate is constantly washed out of the atmosphere in rain and snow. The closure of and SAI program, particularly a long-lasting one, might thus cause a sudden heat jolt more difficult to deal with than the existing, gradual, warming.

That is one reason why Joshua Elliott, head of DARPA’s AI-assisted Climate Tipping-point Modelling (ACTM) program, says “we do not want to be caught flat-footed”. Modelling how Earth’s various climactic subsystems might react to SAI is no easy matter. Dr Elliott, however, reckons that better computer simulations would help. They might even, he says, eventually highlight “signatures” in climate data that would suggest that such geoengineering is afoot.

Nor is the risk of someone doing something stupid a fantasy. In 2019 Massimo Tavoni, a game theorist at Milan Polytechnic who is unaffiliated with DARPA organized six games played by 144 students. Participants were given a variety of ideal climate outcomes and allowed to spend toy money they were given on geoengineering projects to achieve them…Some players tried to counter efforts at cooling which they deemed excessive with attempts to warm the planet, resulting in a chaotic outcome that Dr Tavoni calls “geoengineering wars”. In the end, he says, “everybody loses.”…

DARPA is also developing “early warning” code to detect people undertaking geoengineering mischief on the sly, and testing it by running pairs of parallel simulations, one of which has been tweaked to reflect an SAI program being under way…SAI could even, conceivably, be undertaken by “self-authorizing” billionaires.

Areas which suffer most from rising temperatures would have greater incentives to take the plunge…including Algeria, Australia, Bangladesh, Egypt, India, Indonesia, Libya, Pakistan, Saudi Arabia and Thailand.

Excerpts from America’s defense department is looking for rogue geoengineers, Economist, Nov. 5, 2022

The Act of Successful Sabotage: cables and pipelines

On October 12, 2022 Vladimir Putin, Russia’s president, gave an ominous warning. Energy infrastructure around the world was now “at risk”, he said. Mr Putin’s warning came a month after explosions tore through Nord Stream 1 and 2, a pair of gas pipelines running from Russia to Europe under the Baltic Sea. The pipes were not in use at the time. But the ruptures left plumes of methane bubbling to the surface for days…

Subsea pipelines and cables have proliferated since the first one was laid, in 1850…There are more than 530 active or planned submarine telecoms cables around the world. Spanning over 1.3m kilometers they carry 95% of the world’s internet traffic. In November 2021, cables serving underwater acoustic sensors off the coast of northern Norway—an area frequented by Russian submarines—were cut.

Western officials say that a particular source of concern is Russia’s Main Directorate of Deep-Sea Research, known by its Russian acronym GUGI. It has a variety of spy ships and specialist submarines—most notably the Belgorod, the world’s biggest submarine, commissioned in July 2022—which can work in unusually deep water. They can deploy divers, mini-submarines or underwater drones, which could be used to cut cables. 

Cable chicanery, though, is not a Russian invention. One of Britain’s first acts during the first world war was to tear up German telecoms cables laid across the Atlantic. Germany responded with attacks on Allied cables in the Pacific and Indian Oceans.

More recently, espionage has been the order of the day..I.n 2013 Edward Snowden, a contractor for the National Security Agency (NSA), America’s signals intelligence agency, revealed an Anglo-American project had tapped at least 200 fiber-optic cables around the world. Yet the seabed is not amenable to control. A paper published in 2021 noted that Estonia and other Baltic states had only a limited grasp of what was going on under the Baltic because of quirks of hydrology, scarce surveillance platforms and limited information-sharing between countries. It concluded, perhaps presciently: “It would be difficult to prevent Russian [drones] deployed in international waters from damaging critical undersea infrastructure.”…

The first step in a sabotage mission is finding the target. With big, heavy pipelines, which are typically made from concrete-lined metal sections, that is relatively easy. Older communication cables, being smaller and lighter, can shift with the currents. Newer ones are often buried, It is also increasingly possible for operators to detect tampering, through  “distributed fiber-optic sensing”, which can detect vibrations in the cable or changes in its temperature. But that will not reveal whether the problem is a geological event or an inquisitive drone—or which country might have sent it. Underwater attribution is slow and difficult.

Determined attackers, in other words, are likely to get through. The effects of a successful attack will differ. Pipelines and subsea electricity cables are few in number. If one is blown up, gas, oil or electricity cannot easily be rerouted through another. Communication cables are different. The internet was designed to allow data to flow through alternative paths if one is blocked. And at least when it comes to connections between big countries, plenty of alternatives exist. At least 18 communication cables link America and Europe…There is significant redundancy on these routes. But  “There’s no collective institution that records all the incidents that are going on, and what is behind them—we don’t have any statistics behind it.” according to  Elisabeth Braw of the American Enterprise Institute.

Excerpts from Sabotage at Sea: Underwater Infrastructure, Economist, Oct. 22, 2022

Unbeatable Fusion: Big Tech and US Armed Forces

Big tech equips the armed forces and United States law enforcement with cloud storage, databases, app support, admin tools and logistics. Now it is moving closer to the battlefield. Alphabet, Amazon, Microsoft and Oracle are expected to divvy up the $9bn five-year contract to operate the Pentagon’s Joint Warfighting Cloud Capability (JWCC). In 2021 Microsoft was awarded a $22bn contract to supply its HoloLens augmented-reality headset to simulate battles for army training for up to ten years. It is also helping develop the air force’s battle-management system, which aims to integrate data sources from across the battlefield. In June 2022 Alphabet launched a new unit, Google Public Sector, which will compete for the DOD’s battle-networks contracts. In a departure from Google’s earlier wariness of the Pentagon, its cloud chief, Thomas Kurian, has insisted: “We wouldn’t be working on a programme like JWCC purely to do back-office work.”

Except from  Defense Technology: Can Tech Reshape the Pentagon, Economist, Aug. 13, 2022

Military Uses of Dolphins

The U.S. NAVY MARINE MAMMAL PROGRAM: Since 1959, the U.S. Navy has trained dolphins and sea lions  to help guard against threats underwater….Dolphins naturally possess the most sophisticated sonar known to science. Mines and other potentially dangerous objects on the ocean floor that are difficult to detect with electronic sonar, especially in coastal shallows or cluttered harbors, are easily found by the dolphins. Both dolphins and sea lions have excellent low light vision and underwater directional hearing that allow them to detect and track undersea targets, even in dark or murky waters. They can also dive hundreds of feet below the surface, without risk of decompression sickness or “the bends” like human divers. Someday it may be possible to complete these missions with underwater drones, but for now technology is no match for the animals…Dolphins are trained to search for and mark the location of undersea mines that could threaten the safety of those on board military or civilian ships..
How do the animals travel to remote work sites? By airplanes and helicopters (yes!)

Excerpt from US Naval Information Warfare Center

God’s Channels: How to Hear Whales and Bomb Explosions

About 1 kilometer under the sea lies a sound tunnel that carries the cries of whales and the clamor of submarines across great distances. Ever since scientists discovered this Sound Fixing and Ranging (SOFAR) channel in the 1940s, they’ve suspected a similar conduit exists in the atmosphere. But few have bothered to look for it, aside from one top-secret Cold War operation.

Today by listening to distant rocket launches with solar-powered balloons, researchers say they have finally detected hints of an aerial sound channel, although it does not seem to function as simply or reliably as the ocean SOFAR. If confirmed, the atmospheric SOFAR may pave the way for a network of aerial receivers that could help researchers detect remote explosions from volcanoes, bombs, and other sources that emit infrasound—acoustic waves below the frequency of human hearing.

After geophysicist Maurice Ewing discovered the SOFAR channel in 1944, he set out to find an analogous layer in the sky. At an altitude of between 10 and 20 kilometers is the tropopause, the boundary between the troposphere, the lowest layer of the atmosphere (where weather occurs), and the stratosphere. Like the marine SOFAR, the tropopause represents a cold region, where sound waves should travel slower and farther. An acoustic waveguide in the atmosphere, Ewing reasoned, would allow the U.S. Air Force to listen for nuclear weapon tests detonated by the Soviet Union. He instigated a top-secret experiment, code-named Project Mogul, that sent up hot air balloons equipped with infrasound microphones. The instruments often malfunctioned in the high winds, and in 1947, debris from one balloon crashed just outside of Roswell, New Mexico; that crash sparked one of the most famous UFO conspiracy theories in history. Soon after, the military disbanded the project. But the mission wasn’t declassified for nearly 50 years…

[Today] researchers plan to listen to launches of rockets with multiple solar-powered balloons staggered at different altitudes to figure out where the channel’s effects are strongest. They also plan to test the range of the signals and investigate the mysterious background noise. Understanding how the channel functions could help lay the groundwork for a future aerial infrasound network, which would monitor Earth constantly for major explosions and eruptions.

Excerpts from Zack Savisky, Balloon Detects First Signs of a ‘Sound Tunnel’ in the Sky, Science, Apr. 27, 2022

Everybody and their Watch Box: State Surveillance

Aerial surveillance can reach backwards in time, by the expedient of indiscriminately recording everything that is going on in a particular neighborhood, and then looking for useful patterns in the resulting footage. This technique, called wide-area motion imagery (Wami), has been around since 2006. But improvements in both the recording equipment used and the means by which the images are analysed are making it more and more valuable.

Wami was first employed by American forces in Iraq to track down those placing roadside bombs. When such a bomb went off, it was possible to run the relevant footage in reverse and trace the events that led up to the explosion. That often allowed the bombers to be identified and dealt with…Wami began with an aircraft-borne system called Constant Hawk, which was developed by Lawrence Livermore National Laboratory, in California. Constant Hawk’s success in Iraq begat more powerful versions. Gorgon Stare, carried by drone, was designed by the armed forces themselves…

But there is a problem. Explosions are easy to see. For many tasks, however, an awful lot of staring at screens looking for things that are out-of-the-ordinary is involved. People are bad at this…So AI is here to help…. Chips called graphic-processing units, borrowed from the video-game industry, are helping. So is machine learning, the basis of much modern artificial intelligence. .

l3Harris, a company in Florida, sells Wami sensors for use as automatic sentries. Their software monitors the coming and going of vehicles and pedestrians into and out of so-called watch boxes. These are protected areas surrounded by virtual trip wires, the triggering of which will cause a vehicle or individual of interest to be tracked…This approach can detect immediate threats. It can also, working over a longer period, carry out “pattern of life” analysis by building up a picture of what normal daily traffic looks like in an area. That permits the identification of anomalies which might signal hostile agents whose movements would otherwise be masked by the hurly-burly around them.

The sensors themselves are getting better, too….The latest version includes a so-called hyperspectral sensor, which sees simultaneously across many different wavelengths, including infrared and ultraviolet. It is thus able to distinguish things which the naked eye cannot, such as the difference between camouflage and vegetation. This approach’s real power, however, lies in software which automatically passes data between sensors…Future multi-sensor pods may include other instruments, such as signals-intelligence receivers. These are bits of equipment which can detect radio-frequency communicators like mobile phones and walkie-talkies, enabling particular devices to be identified and located. That would permit the individual carrying the phone, and also those he or she came into contact with, to be tracked and photographed. 

So far, the costs and complexity of Wami have kept it as a predominantly military technology. But that is starting to change. Smaller and more affordable versions are now within the reach of police, fire services and other non-military users…The most famous examples were in Baltimore, where the local cops experimented with the idea twice—first in 2016 and then in 2020. The second time around they made the mistake of monitoring a political protest as well as looking for crimes such as vehicle theft. 

Excerpts from Aerial Surveillance: The Spies in the Sky that See Backwards in Time, Economist, May 7, 2022

Why China Fears Elon Musk More than the U.S.

Chinese military observers have been increasingly concerned about the potential of SpaceX’s Starlink satellite network in helping the US military dominate space, especially so, in the wake of the Ukraine war, where Elon Musk activated Starlink satellites to restore communications that had stopped because of shelling by the Russian troops…. 

“SpaceX has decided to increase the number of Starlink satellites from 12,000 to 42,000 – the program’s unchecked expansion and the company’s ambition to use it for military purposes should put the international community on high alert,” said the article on China Military Online, the official news website affiliated with the Central Military Commission (CMC), China’s highest national defense organization headed by President Xi Jinping himself.

The article notes the SpaceX Starlink’s role during the Russia-Ukraine war, where Elon Musk provided Starlink terminals to restore communications…However, there have also been reports of Starlink aiding the Ukrainian armed forces in precision strikes against Russian tanks and positions, which has not been unnoticed by Chinese military observers.

“In addition to supporting communication, Starlink, as experts estimated, could also interact with UAVs [Unmanned Aerial Vehicles] and, using big data and facial recognition technology, might have already played a part in Ukraine’s military operations against Russia,” said the China Military Online article…..Another remarkable event was SpaceX’s swift response to a Russian jamming effort targeting its Starlink Satellite service which was appreciated by the Pentagon’s Director for Electromagnetic Warfare. Elon Musk had claimed that Russia had jammed Starlink terminals in Ukraine for hours at a time, following which he also said that after a software update, Starlink was operating normally….“And suddenly that [Russian jamming attack] was not effective anymore. From [the] EW technologist’s perspective, that is fantastic … and how they did that was eye-watering to me,” said Dave Tremper, the Director of electronic warfare  (EW)for the Office of the Secretary of Defense.

The China Military Online commentary listed the numerous instances since 2019 when Starlink has cooperated with the US military, which also included the successful data transmission test conducted by the US Air Force (USAF) on March 3, 2022…It also raised a possibility that Starlink could form a second and independent internet that threatened states’ cyberspace sovereignty.

Another concern for Chinese military analysts has been the scarcity of frequency bands and orbital slots for satellites to operate, which they believe are being quickly acquired by other countries. “Orbital position and frequency are rare strategic resources in space,” said the article, while noting, “The LEO can accommodate about 50,000 satellites, over 80% of which would be taken by Starlink if the program were to launch 42,000 satellites as it has planned.” “SpaceX is undertaking an enclosure movement in space to take a vantage position and monopolize strategic resources,” the article further added.

Excerpts from Tanmay Kadam, China ‘Deeply Alarmed’ By SpaceX’s Starlink Capabilities That Is Helping US Military Achieve Total Space Dominance, EurAsian Times, May 9, 2022

How Artificial Intelligence Can Help Produce Better Chemical Weapons

An international security conference convened by the Swiss Federal Institute for NBC (nuclear, biological and chemical) Protection —Spiez Laboratory explored how artificial intelligence (AI) technologies for drug discovery could be misused for de novo design of biochemical weapons.  According to the researchers, discussion of societal impacts of AI has principally focused on aspects such as safety, privacy, discrimination and potential criminal misuse, but not on national and international security. When we think of drug discovery, we normally do not consider technology misuse potential. We are not trained to consider it, and it is not even required for machine learning research.

According to the scientists, this should serve as a wake-up call for our colleagues in the ‘AI in drug discovery’ community. Although some expertise in chemistry or toxicology is still required to generate toxic substances or biological agents that can cause significant harm, when these fields intersect with machine learning models, where all you need is the ability to code and to understand the output of the models themselves, they dramatically lower technical thresholds. Open-source machine learning software is the primary route for learning and creating new models like ours, and toxicity datasets that provide a baseline model for predictions for a range of targets related to human health are readily available.

The genie is out of the medicine bottle when it comes to repurposing our machine learning. We must now ask: what are the implications? Our own commercial tools, as well as open-source software tools and many datasets that populate public databases, are available with no oversight. If the threat of harm, or actual harm, occurs with ties back to machine learning, what impact will this have on how this technology is perceived? Will hype in the press on AI-designed drugs suddenly flip to concern about AI-designed toxins, public shaming and decreased investment in these technologies? As a field, we should open a conversation on this topic. The reputational risk is substantial: it only takes one bad apple, such as an adversarial state or other actor looking for a technological edge, to cause actual harm by taking what we have vaguely described to the next logical step. How do we prevent this? Can we lock away all the tools and throw away the key? Do we monitor software downloads or restrict sales to certain groups?

Excerpts from Fabio Urbina et al, Dual use of artificial-intelligence-powered drug discovery, Nature Machine Intelligence (2022)

Who Cares? Clicking Away Privacy Rights

The latest developments in a high-profile criminal probe by  US special counsel John Durham show the extent to which the world’s internet traffic is being monitored by a coterie of network researchers and security experts inside and outside the US government. The monitoring is made possible by little-scrutinized partnerships, both informal and formal, among cybersecurity companies, telecommunications providers and government agencies.

The U.S. government is obtaining bulk data about network usage, according to federal contracting documents and people familiar with the matter, and has fought disclosure about such activities. Academic and independent researchers are sometimes tapped to look at data and share any findings with the government without warrants or judicial authorization…

Unlike the disclosures by former intelligence contractor Edward Snowden from nearly a decade ago, which revealed U.S. intelligence programs that relied on covert access to private data streams, the sharing of internet records highlighted by Mr. Durham’s probe concerns commercial information that is often being shared with or sold to the government in bulk. Such data sets can possess enormous intelligence value, according to current and former government officials and cybersecurity experts, especially as the power of computers to derive insights from massive data sets has grown in recent years.

Such network data can help governments and companies detect and counter cyberattacks. But that capability also has privacy implications, despite assurances from researchers that most of the data can’t be traced back to individuals or organizations.

At issue are several kinds of internet logs showing the connections between computers, typically collected on networking devices such as switches or routers. They are the rough internet equivalent of logs of phone calls—showing which computers are connecting and when, but not necessarily revealing anything about the content of the transmissions. Modern smartphones and computers generate thousands of such logs a day just by browsing the web or using consumer apps…

“A question worth asking is: Who has access to large pools of telecommunications metadata, such as DNS records, and under what circumstances can those be shared with the government?…Surveillance takes the path of least resistance…,” according to Julian Sanchez, a senior fellow at the Cato Institute.

Excerpts from Byron Tau et al., Probe Reveals Unregulated Access to Data Streams, WSJ, Feb.. 28, 2022

Living in the Russian Digital Bubble

Vladimir Putin, Russia’s president, has portrayed his aggression on the Ukrainian border as pushing back against Western advances. For some time he has been doing much the same online. He has long referred to the internet as a “CIA project”. His deep belief that the enemy within and the enemy without are in effect one and the same… Faced with such “aggression”, Mr Putin wants a Russian internet that is secure against external threat and internal opposition. He is trying to bring that about on a variety of fronts: through companies, the courts and technology itself.

In December 2021, VK, one of Russia’s online conglomerates, was taken over by two subsidiaries of Gazprom, the state-owned gas giant. In the same month a court in Moscow fined Alphabet, which owns Google, a record $98m for its repeated failure to delete content the state deems illegal. And Mr Putin’s regime began using hardware it has required internet service providers (ISPS) to install to block Tor, a tool widely used in Russia to mask online activity. All three actions were part of the country’s effort to assure itself of online independence by building what some scholars of geopolitics, borrowing from Silicon Valley, have begun calling a “stack”.

In technology, the stack is the sum of all the technologies and services on which a particular application relies, from silicon to operating system to network. In politics it means much the same, at the level of the state. The national stack is a sovereign digital space made up not only of software and hardware (increasingly in the form of computing clouds) but also infrastructure for payments, establishing online identities and controlling the flow of information

China built its sovereign digital space with censorship in mind. The Great Firewall, a deep-rooted collection of sophisticated digital checkpoints, allows traffic to be filtered with comparative ease. The size of the Chinese market means that indigenous companies, which are open to various forms of control, can successfully fulfil all of their users’ needs. And the state has the resources for a lot of both censorship and surveillance. Mr Putin and other autocrats covet such power. But they cannot get it. It is not just that they lack China’s combination of rigid state control, economic size, technological savoir-faire and stability of regime. They also failed to start 25 years ago. So they need ways to achieve what goals they can piecemeal, by retrofitting new controls, incentives and structures to an internet that has matured unsupervised and open to its Western begetters.

Russia’s efforts, which began as purely reactive attempts to lessen perceived harm, are becoming more systematic. Three stand out: (1) creating domestic technology, (2) controlling the information that flows across it and, perhaps most important, (3) building the foundational services that underpin the entire edifice.

Russian Technology

The government has made moves to restart a chipmaking plant in Zelenograd near Moscow, the site of a failed Soviet attempt to create a Silicon Valley. But it will not operate at the cutting edge. So although an increasing number of chips are being designed in Russia, they are almost all made by Samsung and TSMC, a South Korean and a Taiwanese contract manufacturer. This could make the designs vulnerable to sanctions….

For crucial applications such as mobile-phone networks Russia remains highly reliant on Western suppliers, such as Cisco, Ericsson and Nokia. Because this is seen as leaving Russia open to attacks from abroad, the industry ministry, supported by Rostec, a state-owned arms-and-technology giant, is pushing for next-generation 5g networks to be built with Russian-made equipment only. The country’s telecoms industry does not seem up to the task. And there are internecine impediments. Russia’s security elites, the siloviki, do not want to give up the wavelength bands best suited for 5g. But the only firm that could deliver cheap gear that works on alternative frequencies is Huawei, an allegedly state-linked Chinese electronics group which the siloviki distrust just as much as security hawks in the West do.

It is at the hardware level that Russia’s stack is most vulnerable. Sanctions imposed may treat the country, as a whole,  like Huawei is now treated by America’s government. Any chipmaker around the world that uses technology developed in America to design or make chips for Huawei needs an export license from the Commerce Department in Washington—which is usually not forthcoming. If the same rules are applied to Russian firms, anyone selling to them without a license could themselves risk becoming the target of sanctions. That would see the flow of chips into Russia slow to a trickle.

When it comes to software the Russian state is using its procurement power to amp up demand. Government institutions, from schools to ministries, have been encouraged to dump their American software, including Microsoft’s Office package and Oracle’s databases. It is also encouraging the creation of alternatives to foreign services for consumers, including TikTok, Wikipedia and YouTube. Here the push for indigenization has a sturdier base on which to build. Yandex, a Russian firm which splits the country’s search market with Alphabet’s Google, and VK, a social-media giant, together earned $1.8bn from advertising last year, more than half of the overall market. VK’s vKontakte and Odnoklassniki trade places with American apps (Facebook, Instagram) and Chinese ones (Likee, TikTok) on the top-ten downloads list.

This diverse system is obviously less vulnerable to sanctions—which are nothing like as appealing a source of leverage here as they are elsewhere in the stack. Making Alphabet and Meta stop offering YouTube and WhatsApp, respectively, in Russia would make it much harder for America to launch its own sorties into Russian cyberspace. So would disabling Russia’s internet at the deeper level of protocols and connectivity. All this may push Russians to use domestic offerings more, which would suit Mr Putin well.

As in China, Russia is seeing the rise of “super-apps”, bundles of digital services where being local makes sense. Yandex is not just a search engine. It offers ride-hailing, food delivery, music-streaming, a digital assistant, cloud computing and, someday, self-driving cars. Sber, Russia’s biggest lender, is eyeing a similar “ecosystem” of services, trying to turn the bank into a tech conglomerate. In the first half of 2021 alone it invested $1bn in the effort, on the order of what biggish European banks spend on information technology (IT). Structural changes in the IT industry are making some of this Russification easier. Take the cloud. Its data centres use cheap servers made of off-the-shelf parts and other easily procured commodity kit. Much of its software is open-source. Six of the ten biggest cloud-service providers in Russia are now Russian…The most successful ones are “moving away from proprietary technology” sold by Western firms (with the exception of chips)…

Information Flow

If technology is the first part of Russia’s stack, the “sovereign internet” is the second. It is code for how a state controls the flow of information online. In 2019 the government amended several laws to gain more control of the domestic data flow. In particular, these require ISPS to install “technical equipment for counteracting threats to stability, security and functional integrity”. This allows Roskomnadzor, Russia’s internet watchdog, to have “middle boxes” slipped into the gap between the public internet and an ISPS’ customers. Using “deep packet inspection” (DPI), a technology used at some Western ISPS to clamp down on pornography, these devices are able to throttle or block traffic from specific sources (and have been deployed in the campaign against Tor). DPI kit sits in rooms with restricted access within the ISPS’ facilities and is controlled directly from a command center at Roskomnadzor. This is a cheap but imperfect version of China’s Great Firewall.

Complementing the firewall are rules that make life tougher for firms. In the past five years Google has fielded 20,000-30,000 content-removal requests annually from the government in Russia, more than in any other country. From this year 13 leading firms—including Apple, TikTok and Twitter—must employ at least some content moderators inside Russia. This gives the authorities bodies to bully should firms prove recalcitrant. The ultimate goal may be to push foreign social media out of Russia altogether, creating a web of local content… But this Chinese level of control would be technically tricky. And it would make life more difficult for Russian influence operations, such as those of the Internet Research Agency, to use Western sites to spread propaganda, both domestically and abroad.

Infrastructure

Russia’s homegrown stack would still be incomplete without a third tier: the services that form the operating system of a digital state and thus provide its power. In its provision of both e-government and payment systems, Russia puts some Western countries to shame. Gosuslugi (“state services”) is one of the most-visited websites and most-downloaded apps in Russia. It hosts a shockingly comprehensive list of offerings, from passport application to weapons registration. Even critics of the Kremlin are impressed, not least because Russia’s offline bureaucracy is hopelessly inefficient and corrupt. The desire for control also motivated Russia’s leap in payment systems. In the wake of its annexation of Crimea, sanctions required MasterCard and Visa, which used to process most payments in Russia, to ban several banks close to the regime. In response, Mr Putin decreed the creation of a “National Payment Card System”, which was subsequently made mandatory for many transactions. Today it is considered one of the world’s most advanced such schemes. Russian banks use it to exchange funds. The “Mir” card which piggybacks on it has a market share of more than 25%, says GlobalData, an analytics firm.

Other moves are less visible. A national version of the internet’s domain name system, currently under construction, allows Russia’s network to function if cut off from the rest of the world (and gives the authorities a new way to render some sites inaccessible). Some are still at early stages. A biometric identity system, much like India’s Aadhaar, aims to make it easier for the state to keep track of citizens and collect data about them while offering new services. (Muscovites can now pay to take the city’s metro just by showing their face.) A national data platform would collect all sorts of information, from tax to health records—and could boost Russia’s efforts to catch up in artificial intelligence (AI).

Excerpt from Digital geopolitics: Russia is trying to build its own great firewall, Economist, Feb. 19, 2022

Q-Day: the Behind-The-Scenes Internet

In cybersecurity circles, they call it Q-day: the day when quantum computers will break the Internet. Almost everything we do online is made possible by the quiet, relentless hum of cryptographic algorithms. These are the systems that scramble data to protect our privacy, establish our identity and secure our payments. And they work well: even with the best supercomputers available today, breaking the codes that the online world currently runs on would be an almost hopeless task.

But machines that will exploit the quirks of quantum physics threaten that entire deal. If they reach their full scale, quantum computers would crack current encryption algorithms exponentially faster than even the best non-quantum machines can. “A real quantum computer would be extremely dangerous,” says Eric Rescorla, chief technology officer of the Firefox browser team at Mozilla in San Francisco, California.

As in a cheesy time-travel trope, the machines that don’t yet exist endanger not only our future communications, but also our current and past ones. Data thieves who eavesdrop on Internet traffic could already be accumulating encrypted data, which they could unlock once quantum computers become available, potentially viewing everything from our medical histories to our old banking records. “Let’s say that a quantum computer is deployed in 2024,” says Rescorla. “Everything you’ve done on the Internet before 2024 will be open for discussion.”

But the risk is real enough that the Internet is being readied for a makeover, to limit the damage if Q-day happens. That means switching to stronger cryptographic systems, or cryptosystems. Fortunately, decades of research in theoretical computer science has turned up plenty of candidates. These post-quantum algorithms seem impervious to attack: even using mathematical approaches that take quantum computing into account, programmers have not yet found ways to defeat them in a reasonable time.

Which of these algorithms will become standard could depend in large part on a decision soon to be announced by the US National Institute of Standards and Technology (NIST) in Gaithersburg, Maryland. In 2015, the US National Security Agency (NSA) announced that it considered current cryptosystems vulnerable, and advised US businesses and the government to replace them. The following year, NIST invited computer scientists globally to submit candidate post-quantum algorithms to a process in which the agency would test their quality, with the help of the entire crypto community. It has since winnowed down its list from 65 to 15. In the next couple of months, it will select a few winners, and then publish official versions of those algorithms. Similar organizations in other countries, from France to China, will make their own announcements…

Although NIST is a US government agency, the broader crypto community has been pitching in. “It is a worldwide effort,” says Philip Lafrance, a mathematician at computer-security firm ISARA Corporation in Waterloo, Canada. This means that, at the end of the process, the surviving algorithms will have gained wide acceptance. “The world is going to basically accept the NIST standards,” he says. He is part of a working group that is monitoring the NIST selection on behalf of the European Telecommunications Standards Institute, an umbrella organization for groups worldwide. “We do expect to see a lot of international adoption of the standard that we’ll create,” says Moody…

China is said to be planning its own selection process, to be managed by the Office of State Commercial Cryptography Administration... “The consensus among researchers in China seems to be that this competition will be an open international competition, so that the Chinese [post-quantum cryptography] standards will be of the highest international standards,” says Jintai Ding, a mathematician at Tsinghua University in Beijing. Meanwhile, an organization called the Chinese Association for Cryptologic Research has already run its own competition for post-quantum algorithms. Its results were announced in 2020, leading some researchers in other countries to mistakenly conclude that the Chinese government had already made an official choice…

Fully transitioning all technology to be quantum resistant will take a minimum of five years and whenever Q-day happens, there are likely to be gadgets hidden somewhere that will still be vulnerable, he says. “Even if we were to do the best we possibly can, a real quantum computer will be incredibly disruptive.”

Excerpts from Davide Castelvecchi, The race to save the Internet from quantum hackers, Nature, Feb. 8, 20202

Sustainability or Lethality: Space

The United States SPACEWERX is the innovation arm of the U.S. Space Force and a part of AFWERX (the Air Force technology accelerator) whose purpose is to increase lethality at a lower cost.

The SPACEWERX has launched Orbital Prime whose purpose is to invigorate the On-orbit Servicing, Assembly, and Manufacturing (OSAM) market using Active Debris Remediation (ADR) as a use case for the foundational technologies. As the congestion of the space domain and  space debris threaten the long-term sustainability of the space domain, Orbital Prime will transition agile, affordable, and accelerated OSAM space capabilities to build the foundation for space logistics while preserving the global commons.

Excerpt from Space Prime

Alas! Computers that Really Get You

 Artificial intelligence (AI) software can already identify people by their voices or handwriting. Now, an AI has shown it can tag people based on their chess-playing behavior, an advance in the field of “stylometrics” that could help computers be better chess teachers or more humanlike in their game play. Alarmingly, the system could also be used to help identify and track people who think their online behavior is anonymous

The researchers are aware of the privacy risks posed by the system, which could be used to unmask anonymous chess players online…In theory, given the right data sets, such systems could identify people based on the quirks of their driving or the timing and location of their cellphone use.

Excerpt from  Matthew Hutson, AI unmasks anonymous chess players, posing privacy risks, Science, Jan. 14, 2022

Nuclear Power Invades Space

The Defense Advanced Research Projects Agency (DARPA) is testing a technology known as “nuclear thermal propulsion”… DARPA spacecraft will carry a small nuclear reactor. Inside, uranium atoms will be split to generate tremendous heat…to produce thrust. Such a spacecraft could climb to a geostationary orbit above the Earth, nearly 36,000km up, in mere hours. Satellites that burn normal rocket fuel need several days for the same trip. Nuclear-powered satellites with abundant power would also be hard to destroy—their trajectories could be changed often enough to become unpredictable. DARPA  wants to test its spacecraft, dubbed DRACO  (Demonstration Rocket for Agile Cislunar Operations), in orbit in 2025.

Other proposals are for radioisotope thermoelectric generators (RTGs). These kinds of “nuclear batteries” have long been used to power probes sent into deep space, where solar power is especially feeble. Instead of building a nuclear reactor, an RTG uses devices called thermocouples to produce a modest wattage from heat released by the decay of radioactive isotopes. Plutonium-238, which is a by-product of weapons development, has been used by NASA to power both the Voyager probes, launched in the 1970s and still functioning, as well as the Curiosity rover currently trundling around Mars. Plutonium-238, however, is heavily regulated and in short suppl..Cobalt-60, with a half-life of 5.3 years, is a promising alternative and available commercially.

DARPA Draco Image https://www.youtube.com/watch?v=h3ubR9F55nk

How safe is it, however, to send nuclear devices, especially reactors, into space?…A danger is accidental atmospheric re-entry. The Soviet Union flew at least 33 spy satellites with nuclear reactors for onboard power (but not propulsion). In one accident, the reactor in a satellite named Kosmos 954 failed to ascend into a high-enough “disposal orbit” at the end of its mission. In 1978 it ended up spraying radioactive debris over a swathe of Canada’s Northwest Territories…The fuel for the Soviet Kosmos 954…was 90% uranium-235, similar to the material used in the atom bomb detonated over Hiroshima in 1945…

America is not alone in its nuclear quest. China and Russia are also developing nuclear power for space. China’s wish list includes a fleet of nuclear-powered space shuttles. Russia is designing an electric-propulsion cargo spacecraft called Zeus, which will be powered by a nuclear reactor. Roscosmos, Russia’s space agency, hopes to launch it in 2030. The prospect of more capable satellites will, no doubt, raise suspicions among spacefaring nations. Nuclear spacecraft with abundant electrical energy could be used to jam satellite communications…..

And not all of the interest in nuclear power comes from the armed forces. NASA…wants a nuclear plant to power a base on the Moon

Excerpt from Faster, higher, stronger: Why space is about to enter its nuclear age, Economist, Feb. 5, 2022

How to Microwave People

An international studies professor in Beijing has claimed China used microwave weapons against Indian soldiers during a standoff along the disputed Himalayan border. Jin Canrong, professor of international relations at Renmin University, told his students Chinese forces forced the Indian soldiers to retreat by turning “the mountain tops into a microwave oven”, according to The Times. Microwave weapons work much the same as regular microwaves. The device heats the water in the human target’s skin, causing immense pain and nausea. The weapon is meant to incapacitate enemies through severe pain but isn’t meant to cause lasting damage. Professor Jin claimed the weapon worked “beautifully” on the Indian soldiers, without violating the “no gunfire” agreement between the parties.

“In 15 minutes, those occupying the hilltops all began to vomit,”reportedly told his students during a lecture. “They couldn’t stand up, so they fled. This was how we retook the ground.” Professor Jin said the reason China didn’t publicize the event was because it was so successful, adding that India also kept the incident under wraps because “they lost so miserably”..

Similar microwave technology aimed at incapacitating but not killing targets have been developed by other militaries. The US used the same technology to develop the Active Denial System, which was designed to be used for area denial, perimeter security and crowd control…Recently, Russia was accused of using its own secret microwave weapon to attack two CIA agents in Australia. It comes after American officials in Cuba fell in with what was dubbed “Havana Syndrome”, with victims often hearing strange sounds, before becoming dizzy, suffering headaches, experiencing memory loss and hearing loss.

Excerpts from Ally Foster,  China allegedly used a secret ‘microwave weapon’ on enemy troops, news.com.au, Nov. 19, 2021

The Space Internet: Space Bacon-DARPA

DARPA’s  Space-Based Adaptive Communications Node (Space-BACN) would allow seamless communication between various constellations of satellites that currently cannot talk to each other.

“There could be tens of thousands of small satellites launched into Low Earth Orbit over the next decade as the demand around the world for affordable space-based capabilities grows,” said Greg Kuperman, Space-BACN program manager in DARPA’s Strategic Technology Office. “The problem with this growth is that optical communications links are currently engineered to only connect satellites within a given constellation – they can’t dynamically adapt waveforms to communicate with satellites in other constellations. This lack of standardization results in a fragmented, stove-piped ‘Wild West’ space domain with new satellite constellations that can’t interoperate, government satellites that can’t communicate between one another, and government satellites unable to take advantage of emerging commercial communications capabilities.”

Space-BACN envisions an adaptable communications terminal that could be reconfigured on-orbit to talk across different standards, presenting a leap in technology from the current state of the art. Space-BACN will involve inter alia a novel cross-constellation command and control approach to automate interactions between government and commercial satellites

Space-BACN has significant military and civilian uses.

Excerpts from Adaptable Optical Communications to Facilitate Future Low-Earth Orbit Networks

See also DARPA solicitation Nov. 2021a

Companies and institutions that are working on this are: Analog Photonics, Arizona State University; CACI; II-VI Aerospace & Defense; Intel Federal; L3 Harris and Northrop Grumman.

The New Alliance: SaudiChina

Saudi Arabia has imported sensitive missile technology from the Chinese military and is manufacturing its own ballistic missiles…The Saudi government has sought help from the missile branch of the Chinese military, the People’s Liberation Army Rocket Force…Ballistic missiles are powered by rockets that propel them in an arch-shaped trajectory upward before descending toward their target on the surface of the earth. They can be used to deploy both conventional and nuclear weapons.

The U.S. has long refused to sell ballistic missiles to Riyadh over proliferation concerns. The kingdom obtained Dong Feng-3 missiles in the 1980s from China and displayed them publicly in 2014. The Chinese military has also transferred multiple batches of finished Dong Feng-series missiles since around 2018 up to as recently as the spring of 2021….China also has helped Saudi Arabia construct a facility to fabricate uranium yellowcake, an early step along the path to a civil nuclear energy program or a nuclear arms capability, the Journal reported last year.

Excerpt from Jared Malsin et al, Saudis Begin Making Ballistic Missiles With Chinese Help, WSJ, Dec. 24, 2021

The Stealth Burial of Nuclear Waste

The U.S. government’s underground nuclear waste repository received more than 200 shipments from federal laboratories and other sites around the nation in 2021.
Officials with the U.S. Energy Department announced the number in December 2021, noting that total shipments to the Waste Isolation Pilot Plant have topped 13 000 since opening in 1999. Over more than 20 years, tons of Cold War-era waste have been stashed deep in the salt caverns that make up the repository. The shipments have included special boxes and barrels packed with lab coats, rubber gloves, tools and debris contaminated with plutonium and other radioactive elements.

The majority of shipments come from the decommissioning of legacy nuclear waste sites at the Idaho National Laboratory. More nuclear waste will be heading to the WIPP as the Biden Administration has approved a Trump rule that has redefined high-level nuclear waste. According to the new rule, what constitutes high-level radioactive waste  will be based on the waste’s radioactivity rather than how it was produced.

U.S. nuclear repository marks more than 200 shipments of waste in 2021, Associated Press, Dec. 30, 2021

Israel’s Preemptive Attacks on Chemical Weapons, Syria

Israel twice struck chemical weapons facilities in Syria between 2020 and 2021 in a campaign to prevent Syria from renewing chemical weapons production…Syria’s government denies using chemical arms. In 2013 it promised to surrender its chemical weapons, which it says it has done.

On June 8, 2021, Israeli jets hit three military targets near the cities of Damascus and Homs, all linked to Syria’s former chemical weapons program. In March 2020, Israel targeted a villa and compound tied with the procurement of a chemical that can be used in nerve agents. Whether Israel’s attacks were fully successful in disrupting Syria’s plans is unclear. Israeli officials intended the strikes to be preemptive, knocking out the country’s production capabilities before actual weapons could be made…

Excerpts from Israel hit chemical weapons facilities in Syria over past two years, Reuters, Dec. 13, 2021

To Save the Congo Rainforest, We Must Save the People First

The Special Representative of the Secretary-General in the Democratic Republic of the Congo told the Security Council in December 2021  that “a lasting solution” to the violence” in Congo requires a broader political commitment to address the root causes of conflict.”  Bintou Keita argued that, for stability to return to eastern Congo, “the State must succeed in restoring and maintaining the confidence of the people in state’s ability to protect, administer, deliver justice and meet their basic needs.” 

Starting on November 30, 2021  the Congolese Armed Forces initiated joint military operations with the Ugandan army against the rebel Allied Democratic Forces (ADF) in the east.  In May 2021, the Congolese authorities declared a state of siege in the provinces of Ituri and North Kivu, whose duration has just been extended for the 13th time

But the challenges facing the Government in implementing the state of siege highlight “the limits of a strictly military approach to the protection of civilians and the neutralization of armed groups.”  In fact, the period of the state of siege saw a 10 per cent increase in the number of violations and abuses of human rights in the country.  


According to the Special Representative, the humanitarian situation continues to deteriorate in the restive east, due to insecurity, epidemics, and limited access to basic services.  The number of internally displaced people stands at nearly 6 million, of which 51 per cent are women. This is the highest number of internally displaced people in Africa.  

The Special Representative pointed out the illegal exploitation of natural resources as “a major driver of conflict”, saying it must be addressed, and commended President Tshisekedi’s intervention at the COP26 Summit, where he committed to combat deforestation in the Congo Basin rainforest and reduce greenhouse gas emissions by 21 per cent, by 2030….  

Excerpts from DR Congo: Limitations to ‘strictly military approach’ to stem violence, mission chief warns, UN News, Dec. 6, 2021

The Neck and Neck Race in Africa

Classified American intelligence reports suggest China intends to establish its first permanent military presence on the Atlantic Ocean in the tiny Central African country of Equatorial Guinea. The officials…said the reports raise the prospect that Chinese warships would be able to rearm and refit opposite the East Coast of the U.S.—a threat that is setting off alarm bells at the White House and Pentagon. Principal deputy U.S. national security adviser Jon Finer visited Equatorial Guinea in October 2021 on a mission to persuade President Teodoro Obiang Nguema Mbasogo and his son and heir apparent, Vice President Teodoro “Teodorin” Nguema Obiang Mangue, to reject China’s overtures…

In Equatorial Guinea, the Chinese likely have an eye on Bata, according to a U.S. official. Bata already has a Chinese-built deep-water commercial port on the Gulf of Guinea, and excellent highways link the city to Gabon and the interior of Central Africa….

Equatorial Guinea, a former Spanish colony with a population of 1.4 million, secured independence in 1968. The capital, Malabo, is on the island of Bioko, while Bata is the largest city on the mainland section of the country, which is wedged between Gabon and Cameroon. Mr. Obiang has ruled the country since 1979. The discovery of huge offshore gas and oil reserves in 1996 allegedly allowed members of his family to spend lavishly on exotic cars, mansions and other luxuries…The State Department has accused the Obiang regime of extrajudicial killings, forced disappearances, torture and other abuses. A U.S. Senate committee issued a report in 2004 criticizing Washington-based Riggs Bank for turning “a blind eye to evidence suggesting the bank was handling the proceeds of foreign corruption” in accepting hundreds of millions of dollars in deposits controlled by Mr. Obiang, his wife and other relatives……

Equatorial Guinea relies on American oil companies to extract offshore resources that have made the country the richest on the sub-Saharan mainland, as measured by per capita annual gross domestic product….Chinese state-owned companies have built 100 commercial ports around Africa in the past two decades, according to Chinese government data….

The State Department recently raised Equatorial Guinea’s ranking in the annual assessment of how diligently countries combat human trafficking. The upgrade could allow the Biden administration to offer maritime-security assistance to help win Equatorial Guinea’s cooperation.

Excerpts from MICHAEL M. PHILLIPS, China Seeks First Military Base on Africa’s Atlantic Coast, U.S. Intelligence Finds, WSJ, Dec. 5, 2021

How to Lift Nuclear Submarines from Arctic Seabed

Projects aimed to improve nuclear safety are some of the few successful arenas for cooperation still going strong between the European Union and Russia…especially wiht regard to the two old Soviet submarines K-159 and K-27, both rusting on the Arctic seabed with highly radioactive spent nuclear fuel elements in their reactors…

“The sunken submarines K-27 and K-159 are the potential source of contamination of the Arctic, the riskiest ones,” Ambassador Jari Vilén of Filand explains. “Assessments made by the European Union together with Rosatom show that in 20-30 years’ time the metals will start corroding and there is a genuine risk of leakage. Therefore, lifting them in the coming decade is extremely important.”

“I’m very happy we are making progress and that a decision to make a technical review has been decided by the European Bank for Reconstruction and Development (EBRD) through the Northern Dimension Environmental Partnership. Hopefully, when these technical reviews are done, we will come to a phase where we can make decisions on a lifting operation,” Vilén says with enthusiasm.

Lifting a nuclear submarine from the seabed is nothing new. It is difficult, but doable. In 2002, the Dutch salvage company Mammoet managed to raise the ill-fated “Kursk” submarine from the Barents Sea. A special barge was built with wires attached underneath. The wreak of “Kursk” was safely brought in and placed in a dry-dock where the decommissioning took place.

K-159 is a November-class that sank in late August 2003 while being towed in bad weather from the closed naval base of Gremikha on the eastern shores of the Kola Peninsula towards the Nerpa shipyard north of Murmansk. The two onboard reactors contain about 800 kilograms of spent nuclear fuel, with an estimated 5,3 GBq of radionuclides. A modeling study by the Norwegian Institute of Marine Research said that a pulse discharge of the entire Cesium-137 inventory from the two reactors could increase concentrations in cod in the eastern part of the Barents Sea up to 100 times current levels for a two-year period after the discharge. While a Cs-137 increase of 100 times in cod sounds dramatic, the levels would still be below international guidelines. But that increase could still make it difficult to market the affected fish.

K-27, the other submarine in urgency to lift, was on purpose dumped in the Kara Sea in 1982….

Lifting the dumped reactors from the Kara Sea, a price tag of nearly €300 million has been mentioned. The sum includes K-27 and K-159, but also the other dumped reactors from K-11, K-19 and K-140, as well as spent nuclear fuel from an older reactor serving icebreaker “Lenin”. “The value of the fishing stocks in the area is ruffly €1.4 billion annually,” he says.

Excerpts from Thomas Nilsen, EU willing to co-fund lifting of sunken nuclear subs from Arctic seabed, The Barents Observer, Nov. 22, 2021

A Humane Bombing Campaign? the Baghuz Strike

In the last days of the battle against the Islamic State in Syria, when members of the once-fierce caliphate were cornered in a dirt field next to a town called Baghuz, a U.S. military drone circled high overhead, hunting for military targets. But it saw only a large crowd of women and children huddled against a river bank. Without warning, an American F-15E attack jet streaked across the drone’s high-definition field of vision and dropped a 500-pound bomb on the crowd, swallowing it in a shuddering blast. As the smoke cleared, a few people stumbled away in search of cover. Then a jet tracking them dropped one 2,000-pound bomb, then another, killing most of the survivors.

It was March 18, 2019. At the U.S. military’s busy Combined Air Operations Center at Al Udeid Air Base in Qatar, uniformed personnel watching the live drone footage looked on in stunned disbelief, according to one officer who was there. “Who dropped that?” a confused analyst typed on a secure chat system being used by those monitoring the drone, two people who reviewed the chat log recalled. Another responded, “We just dropped on 50 women and children.”

The Baghuz strike was one of the largest civilian casualty incidents of the war against the Islamic State, but it has never been publicly acknowledged by the U.S. military. The details, reported by the New York Times on November 13, 2021, show that the death toll was almost immediately apparent to military officials. A legal officer flagged the strike as a possible war crime that required an investigation. But at nearly every step, the military made moves that concealed the catastrophic strike. The death toll was downplayed. Reports were delayed, sanitized and classified. United States-led coalition forces bulldozed the blast site. And top leaders were not notified.

The Defense Department’s independent inspector general began an inquiry, but the report containing its findings was stalled and stripped of any mention of the strike. “Leadership just seemed so set on burying this. No one wanted anything to do with it,” said Gene Tate,  a former Navy officer who had worked for years as a civilian analyst with the Defense Intelligence Agency and the National Counterterrorism Center before moving to the inspector general’s office….

The details of the strikes were pieced together by The New York Times over months from confidential documents and descriptions of classified reports, as well as interviews with personnel directly involved, and officials with top secret security clearances who discussed the incident on the condition that they not be named. The Times investigation found that the bombing had been called in by a classified American special operations unit, Task Force 9, which was in charge of ground operations in Syria. The task force operated in such secrecy that at times it did not inform even its own military partners of its actions. In the case of the Baghuz bombing, the American Air Force command in Qatar had no idea the strike was coming, an officer who served at the command center said.

The only assessment done immediately after the strike was performed by the same ground unit that ordered the strike. It determined that the bombing was lawful because it killed only a small number of civilians while targeting Islamic State fighters in an attempt to protect coalition forces, the command said. Therefore no formal war crime notification, criminal investigation or disciplinary action was warranted, it said, adding that the other deaths were accidental.

But the Air Force lawyer, Lt. Col. Dean W. Korsak, believed he had witnessed possible war crimes and repeatedly pressed his leadership and Air Force criminal investigators to act. When they did not, he alerted the Defense Department’s independent inspector general. Two years after the strike, seeing no evidence that the watchdog agency was taking action, Colonel Korsak emailed the Senate Armed Services Committee, telling its staff that he had top secret material to discuss and adding, “I’m putting myself at great risk of military retaliation for sending this.”..

The United States portrayed the air war against the Islamic State as the most precise and humane bombing campaign in its history. The military said every report of civilian casualties was investigated and the findings reported publicly, creating what the military called a model of accountability. The details suggest that while the military put strict rules in place to protect civilians, the Special Operations task force 9 repeatedly used other rules to skirt them. The military teams counting casualties rarely had the time, resources or incentive to do accurate work. And troops rarely faced repercussions when they caused civilian deaths.

On the ground, Task Force 9 coordinated offensives and airstrikes. The unit included soldiers from the 5th Special Forces Group and the Army’s elite commando team Delta Force, several officials said. Over time, some officials overseeing the air campaign began to believe that the task force was systematically circumventing the safeguards created to limit civilian deaths. The process was supposed to run through several checks and balances. Drones with high-definition cameras studied potential targets, sometimes for days or weeks. Analysts pored over intelligence data to differentiate combatants from civilians. And military lawyers were embedded with strike teams to ensure that targeting complied with the law of armed conflict.  But there was a quick and easy way to skip much of that oversight: claiming imminent danger….By late 2018, about 80 percent of all airstrikes Task Force 9 was calling in claimed self-defense, according to an Air Force officer who reviewed the strikes. The rules allowed U.S. troops and local allies to invoke it when facing not just direct enemy fire, but anyone displaying “hostile intent,”… Under that definition, something as mundane as a car driving miles from friendly forces could in some cases be targeted…..

The aftermath of that approach was plain to see. A number of Syrian towns, including the regional capital, Raqqa, were reduced to little more than rubble. Human rights organizations reported that the coalition caused thousands of civilian deaths during the war. Hundreds of military assessment reports examined by The Times show the task force was implicated in nearly one in five coalition civilian casualty incidents in the region…Publicly, the coalition insisted the numbers were much lower. Privately, it became overwhelmed by the volume of civilian casualty claims reported by locals, humanitarian groups and the news media, and a backlog of civilian casualty assessment reports sat unexamined for months, two people who compiled the reports said…..

Excerpts from How the U.S. Hid an Airstrike That Killed Dozens of Civilians in Syria, NY Times, Nov. 13, 2021

How to Buy the Global Yes-Men

China will finance the construction of an outpost for a special forces unit of Tajikistan’s police near the Tajik-Afghan border. The post will be located in Tajikistan’s eastern Gorno-Badakhshan Autonomous Province in the Pamir mountains, which border China’s Xinjiang province as well as the northeastern Afghan province of Badakhshan. No Chinese troops will be stationed at the facility.

The plan to build the post comes amid tension between the Dushanbe government and Afghanistan’s new Taliban rulers. Tajik President Emomali Rakhmon has refused to recognise the Taliban government, calling for a broader representation of Afghanistan’s ethnic groups – of which Tajiks are the second-biggest. Kabul, in turn, has warned Dushanbe against meddling in its domestic affairs. According to Russian media, the Taliban have struck an alliance with an ethnic Tajik militant group based in northern Afghanistan which seeks to overthrow Tajikistan’s current government.

China is a major investor in Tajikistan and Beijing has also acted as a donor on several occasions, handing over, for example, a new parliament building free of charge.

Excerpts from China to build outpost for Tajikistan special forces near Afghan border, Reuters, Oct. 28, 2021

Surveillance by the Masses for the Masses

New sensors, from dashboard cameras to satellites that can see across the electromagnetic spectrum, are examining the planet and its people as never before. The information they collect is becoming cheaper. Satellite images cost several thousand dollars 20 years ago, today they are often provided free and are of incomparably higher quality….

Human Rights Watch has analysed satellite imagery to document ethnic cleansing in Myanmar. Nanosatellites tag the automatic identification system of vessels that are fishing illegally. Amateur sleuths have helped Europol, the European Union’s policing agency, investigate child sexual exploitation by identifying geographical clues in the background of photographs. Even hedge funds routinely track the movements of company executives in private jets, monitored by a web of amateurs around the world, to predict mergers and acquisitions. OSINT (open-source intelligence) thus bolsters civil society, strengthens law enforcement and makes markets more efficient. It can also humble some of the world’s most powerful countries.

In the face of vehement denials from the Kremlin, Bellingcat, an investigative group, meticulously demonstrated Russia’s role in the downing of Malaysian Airlines Flight mh17 over Ukraine in 2014, using little more than a handful of photographs, satellite images and elementary geometry. It went on to identify the Russian agents who attempted to assassinate Sergei Skripal, a former Russian spy, in England in 2018. Amateur analysts and journalists used OSINT to piece together the full extent of Uyghur internment camps in Xinjiang. In recent weeks researchers poring over satellite imagery have spotted China constructing hundreds of nuclear-missile silos in the desert.

Such an emancipation of information promises to have profound effects. The decentralised and egalitarian nature of OSINT erodes the power of traditional arbiters of truth and falsehood, in particular governments and their spies and soldiers. The likelihood that the truth will be uncovered raises the cost of wrongdoing for governments. Although osint might not prevent Russia from invading Ukraine or China from building its gulag, it exposes the flimsiness of their lies

Liberal democracies will also be kept more honest. Citizens will no longer have to take their governments on trust. News outlets will have new ways of holding them to account. Today’s open sources and methods would have shone a brighter light on the Bush administration’s accusation in 2003 that Iraq was developing chemical, biological and nuclear weapons. That would have subjected America’s invasion of the country to greater scrutiny. It might even have prevented it.,,

The greatest worry is that the explosion of data behind open-source investigations also threatens individual privacy. The data generated by phones and sold by brokers let Bellingcat identify the Russian spies who last year poisoned Alexei Navalny, an opposition leader. Similar data were exploited to pick out a senior Catholic priest in America, who resigned last month after his location was linked to his use of Grindr, a gay dating app.

Excerpts from The people’s panopticon: The promise of open-source intelligence, Economist, Aug. 7, 2021

When the Cat’s Away the Mice Pollute

Police don’t share schedules of planned raids. Yet America’s Environmental Protection Agency (EPA) does not seem convinced of the value of surprise in deterring bad behavior. Every year it publishes a list of dates, spaced at six-day intervals, on which it will require state and local agencies to provide data on concentrations of harmful fine particulate matter (pm2.5), such as soot or cement dust…

A new paper by Eric Zou of the University of Oregon makes use of satellite images to spy on polluters at times when they think no one is watching. NASA, America’s space agency, publishes data on the concentration of aerosol particles—ranging from natural dust to man-made toxins—all around the world, as seen from space. For every day in 2001-13, Mr Zou compiled these readings in the vicinity of each of America’s 1,200 air-monitoring sites.

Although some stations provided data continuously, 30-50% of them sent reports only once every six days. For these sites, Mr Zou studied how aerosol levels varied based on whether data would be reported. Sure enough, the air was consistently cleaner in these areas on monitoring days than it was the rest of the time, by a margin of 1.6%. Reporting schedules were almost certainly the cause….The size of this “pollution gap” differed by region. It was biggest in parts of Appalachia and the Midwest with lots of mining, and in the northern Mountain West, where paper and lumber mills are common.

The magnitude of the gap also depended on the cost of being caught. Every year, the EPA produces a list of counties whose average air quality falls below minimum standards. The punishments for inclusion are costly: factories become subject to burdensome clean-technology requirements, and local governments can be fined. When firms risked facing sanctions, they seemed to game the system more aggressively. In counties that exceeded the pm2.5 limit in a given month, the pollution gap in the following month swelled to 7%. In all other cases, it was just 1.2%….

Excerpts from Poorly devised regulation lets firms pollute with abandon: We Were Expecting you, Economist, Sept. 4, 2021

How to Exclude China from the Global Technology Base: the Role of IMEC

The Interuniversity Microelectronics Centre (IMEC) located in Leuven, Belgium, does not design chips (like America’s Intel), manufacture them (like TSMC of Taiwan) or make any of the complicated gear (like ASML, a Dutch firm). Instead, it creates knowledge used by everyone in the $550bn chip business. Given chips’ centrality to the modern economy and increasingly to modern geopolitics, too, that makes it one of the most essential industrial research-and-development (R&D) center on the planet. Luc Van den hove, IMEC’s boss, calls it the “Switzerland of semiconductors”.

IMEC was founded in 1984 by a group of electronics engineers from the Catholic University of Leuven who wanted to focus on microprocessor research. In the early days it was bankrolled by the local Flemish government. Today IMEC maintains its neutrality thanks to a financial model in which no single firm or state controls a big share of its budget. The largest chunk comes from the Belgian government, which chips in some 16%. The top corporate contributors provide no more than 4% each. Keeping revenue sources diverse (partners span the length and breadth of the chip industry) and finite (its standard research contracts last three to five years) gives IMEC the incentive to focus on ideas that help advance chipmaking as a whole rather than any firm in particular.

A case in point is the development of extreme ultraviolet lithography (EUV)…It took 20 years of R&D to turn the idea into manufacturing reality. IMEC acted as a conduit in that process… Advanced toolmakers want a way to circulate their intellectual property (IP) without the large companies gaining sway over it. The large companies, meanwhile, do not want to place all their bets on any one experimental idea that is expensive (as chipmaking processes are) and could become obsolete.

IMEC’s neutrality allows both sides to get around this problem. It collects all the necessary gear in one place, allowing producers to develop their technology in tandem with others. And everyone gets rights to the IP the institute generates. Mr Van den hove says that progress in the chip industry has been driven by the free exchange of knowledge, with IMEC acting as a “funnel” for ideas from all over the world…IMEC’s revenues, which come from the research contracts and from prototyping and design services, doubled between 2010 and 2020, to €678m ($773m).

The deepening rift between America, home to some of the industry’s biggest firms, and China, which imported $378bn-worth of chips last year, threatens IMEC’s spirit of global comity. China’s chip industry is increasingly shielded by an overbearing Communist Party striving for self-sufficiency, and ever more ostracized by outsiders as a result of American and European export controls. All this limits the extent to which IMEC can work with Chinese semiconductor companies…IMEC would not comment on individual partnerships but says it has “a few engagements with Chinese companies, however not on the most sensitive technologies, and always fully compliant with current European and US export regulations and directives”.

Excerpts from Neutral but not idle: IMEC offers neutral ground amid chip rivalries, Economist, Sept. 25, 2021

The Transparency of Oceans and Nuclear Submarines

There are warnings that different technologies will render the ocean “transparent”, so even the stealthiest submarines could be spotted by an enemy force… China has already developed submarine-spotting lasers. CSIRO is working with a Chinese marine science institute that has separately developed satellite technology that can find submarines at depths of up to 500 meters.   But others say submarines are just a base platform for a range of new and evolving technologies. The Australian Strategic Policy Institute’s outgoing head, Peter Jennings, said the nuclear-propelled submarines that Australia will get as part of the Aukus alliance have more space and energy for being “motherships” than conventional submarines.

“They’re significantly bigger and the reactors give you the energy not just for the propulsion but for everything else inside the boat,” he said. “You then have a huge amount of space for weapons, for vertical launch tubes for cruise missiles and for autonomous systems that can be stored on board. Not only is it a fighting unit but you might have half a dozen remote systems fanned out at quite a distance. They’ll be operating a long distance away from potential targets, potentially hundreds of kilometers. According to the taskforce set up under Aukus, the new submarines will have “superior characteristics of stealth, speed, manoeuvrability, survivability, and almost limitless endurance”, with better weapons, the ability to deploy drones and “a lower risk of detection”.

Excerpts from Tory Shepherd, Will all submarines, even nuclear ones, be obsolete and ‘visible’ by 2040?, Oct. 4, 2021

Conquering Virgin Digital Lands a Cable at a Time

Facebook  said it would back two new underwater cable projects—one in Africa and another in Asia in collaboration with Alphabet — that aim to give the Silicon Valley giants greater control of the global internet infrastructure that their businesses rely on.

The 2Africa project, a partnership between Facebook and several international telecom operators, said that it would add four new branches: the Seychelles, Comoro Islands, Angola and Nigeria. The project’s overall plan calls for 35 landings in 26 countries, with the goal of building an underwater ring of fiber-optic cables around Africa. It aims to begin operating in 2023… Separately, Facebook that it would participate in a 7,500-mile-long underwater cable system in Asia, called Apricot, that would connect Japan, Taiwan, Guam, the Philippines, Indonesia and Singapore. Google said that it would also join the initiative, which is scheduled to go live in 2024.

Driving the investments are costs and control. More than 400 commercially operated underwater cables, also known as submarine cables, carry almost all international voice and data traffic, making them critical for the economies and national security of most countries…Telecom companies own and operate many of these cables, charging fees to businesses that use them to ferry data. Facebook and Google used so much bandwidth that they decided about a decade ago that it would make sense to cut out the middleman and own some infrastructure directly.

Excerpts from Stu Woo, Facebook Backs Underwater Cable Projects to Boost Internet Connectivity, WSJ, Aug. 17, 2021

To Know the Truth Even if it Harms You

Distributed Denial of Secrets, or DDoSecrets, an NGO, had been a thorn in the side of secretive governments, corrupt corporations, and powerful law firms since its founding in late 2018. In June 2020, in a release known as BlueLeaks, the group published 269 gigabytes of law enforcement data, which exposed police malfeasance and surveillance overreach across the United States.

DDoSecrets also published incriminating records from overseas tax shelters, from the social media site Gab, and from a Christian crowdfunding site often used by the far right. The group has affected autocrats as well, exposing the Russian government’s plans in Ukraine and mapping out the Myanmar junta’s business dealings. These revelations have spawned numerous news stories in the public interest, making DDoSecrets a valuable source for journalists, but also rendering it a target: In July 2020, German authorities seized one of the organization’s servers. August of 2020 brought ominous news of a Department of Homeland Security bulletin labeling DDoSecrets a “criminal hacker group.” ..

Avowedly nonpartisan, DDoSecrets nonetheless exhibits an ethos that seems to fuse anarchist politics, a hacker’s curiosity about forbidden knowledge, and a general sympathy for the oppressed. Its barbed Latin slogan, Veritatem cognoscere ruat caelum et pereat mundus, roughly translates to, “To know the truth, even if the heavens fall and the world perishes.” Call it a bolder, more transformative version of “information wants to be free.”

Emma Best…launched DDoSecrets in December 2018 with someone known only by the pseudonym “The Architect.” Together, they set out to distinguish their group from WikiLeaks, which they felt had morphed into a vehicle for Julian Assange’s ego…”Truth has an impact, regardless of the respectability politics some people choose to engage in when it comes to the alleged sources,” Best wrote after Swiss law enforcement, at the request of U.S. authorities, arrested Tillie Kottmann, a hacker who alerted journalists to security vulnerabilities in a vast commercial network of surveillance cameras. “The world can no longer be rid of hacktivists or leaktivists. Not as long as people are willing.”

Excerpts from Jacob Silverman, The New WikiLeaks, The New Republic, Aug. 18, 2021

The Uses and Abuses of Alexa

Excerpts from the Interview with Robert Lewis Shayon author of “The Voice Catchers: How Marketers Listen In to Exploit Your Feelings, Your Privacy, and Your Wallet” published  at the Pennsylvania Gazette July 2021

There is  emerging industry that is deploying immense resources and breakthrough technologies based on the idea that voice is biometric—a part of your body that those in the industry believe can be used to identify and evaluate you instantly and permanently. Most of the focus in voice profiling technology today is on emotion, sentiment, and personality. But experts tell me it is scientifically possible to tell the height of a person, the weight, the race, and even some diseases. There are actually companies now trying to assess, for example, whether you have Alzheimer’s based upon your voice…

The issue is that this new voice intelligence industry—run by companies you know, such as Amazon and Google, and some you don’t, such as NICE and Verint—is sweeping across society, yet there is little public discussion about the implications. The need for this conversation becomes especially urgent when we consider the long-term harms that could result if voice profiling and surveillance technologies are used not only for commercial marketing purposes, but also by political marketers and governments, to say nothing of hackers stealing data.

There are hundreds of millions of smart speakers out there, and far more phones with assistants, listening to you and capturing your voice. Voice technology already permeates virtually every important area of personal interaction—as assistants on your phone and in your car, in smart speakers at home, in hotels, schools, even stores instead of salespeople. 

Amazon and Google have several patents centering around voice profiling that describe a rich future for the practice…But consider the downside: we could be denied loans, have to pay much more for insurance, or be turned away from jobs, all on the basis of physiological characteristics and linguistic patterns that may not reflect what marketers believe they reflect.

The first thing to realize is that voice assistants are not our friends no matter how friendly they sound. I argue, in fact, that voice profiling marks a red line for society that shouldn’t be crossed.

From Pegasus to Pariah: Israeli Spying is Not Sexy

When international news organizations revealed that at least ten governments had used Pegasus, a powerful software tool created by Israel’s NSO Group, to hack into the smartphones of thousands of people around the world, including politicians, human-rights activists and journalists, the Israeli government shrugged. None of its ministers has publicly commented….Israeli defence exporters privately expressed ridicule. “Arms companies can’t keep track of every rifle and bullet they sell to legitimate customers,” said one. “Why should we have higher expectations when it comes to software?…Israeli spying is a sexy subject and these reports are the price for doing business.”

Countries that have received Pegasus software include Brazil, Hungary and India, along with Sunni Arab regimes with whom Israel recently established diplomatic relations: Bahrain, Morocco and the United Arab Emirates. Saudi Arabia, a fellow enemy of Iran, is listed, too. “Deals on cyber-surveillance are the kind of sweetener you can throw into a diplomatic package with a foreign leader,” says a former NSO consultant.

Excerpts from Let Pegasus fly: Israel is loth to regulate its spyware exports, Economist, July 31, 2021

How Does it Feel? Watching People Die from the Cold Comfort of a Computer Chair

A former intelligence analyst was sentenced on July 27, 2021 to nearly four years in prison after pleading guilty to giving classified information about the U.S. drone program to a reporter. Daniel Hale, a former airman in the U.S. Air Force assigned to intelligence operations and a onetime employee of the defense contractor Leidos, was given a 45-month sentence as well as three years supervised release by a Virginia federal judge. Mr. Hale was accused of giving numerous documents marked “Secret” and “Top Secret” to a journalist in 2014…

Mr. Hale has said he leaked the material because the public needed to know the full details about the U.S. drone program, which he believed led to unjustified civilian casualties and wasn’t being described forthrightly by political leaders…In a letter filed with the court  in advance of his sentencing, Mr. Hale recalled the first drone strike he witnessed against a handful of men drinking tea in Paktika province, Afghanistan—a group that included one suspected combatant and his companions.

“I could only look on as I sat by and watched through a computer monitor when a sudden, terrifying flurry of Hellfire missiles came crashing down,” Mr. Hale wrote. “Since that time and to this day, I continue to recall several such scenes of graphic violence carried out from the cold comfort of a computer chair. Not a day goes by that I don’t question the justification of my actions.”

Excerpts from Ex-Military Analyst Gets 45-Month Sentence for Leaking Classified Drone Information, WSJ, July 28, 2021

How to Detect Humans Under-the-Ground: Surveillance Best

Tunnel-digging in times of conflict has a long history. These days, secret tunnels are used to move weapons and people between Gaza and Egypt, and by Kurdish militia operating on the frontier between Syria and Turkey. But the same principle applies. What happens underground is hard for the enemy to observe. Digging for victory is therefore often a good idea…

That, though, may be about to change. Real-time Subsurface Event Assessment and Detection (RESEAD), a project being undertaken at Sandia National Laboratories in New Mexico, uses novel sensors to make accurate maps of what is happening underground. This will, no doubt, have many civilian applications. But Sandia is principally a weapons lab…The sensors themselves are a mixture of accelerometers, which pick up vibrations, current detectors, which measure the electrical-resistance of rocks and soil, and subsurface radar…

Exactly how RESEAD sensors would be put in place in a zone of active conflict remains to be seen. But the system could certainly be useful for other sorts of security. In particular, America has a problem with tunnels under its border with Mexico being used to smuggle drugs and migrants into the country. RESEAD would be able to detect existing tunnels and nip new ones in the bud. 

Excerpts from Tunnel Vision: How to detect the enemy when they are underground, Economist, June 24, 2021

How to Spy on Your Own Country for $1.25 per day

San Francisco-based Premise Data Corp. pays users, many of them in the developing world, to complete basic tasks for small payments. Typical assignments involve snapping photos, filling out surveys or doing other basic data collection or observational reporting such as counting ATMs or reporting on the price of consumer goods like food.

About half of the company’s clients are private businesses seeking commercial information, Premise says. That can involve assignments like gathering market information on the footprint of competitors, scouting locations and other basic, public observational tasks. Premise in recent years has also started working with the U.S. military and foreign governments, marketing the capability of its flexible, global, gig-based workforce to do basic reconnaissance and gauge public opinion.

Premise is one of a growing number of companies that straddle the divide between consumer services and government surveillance and rely on the proliferation of mobile phones as a way to turn billions of devices into sensors that gather open-source information useful to government security services around the world.

Premise launched in 2013,, As of 2019, the company’s marketing materials said it has 600,000 contributors operating in 43 countries, including global hot spots such as Iraq, Afghanistan, Syria and Yemen. According to federal spending records, Premise has received at least $5 million since 2017 on military projects—including from contracts with the Air Force and the Army and as a subcontractor to other defense entities. In one pitch on its technology, prepared in 2019 for Combined Joint Special Operations Task Force-Afghanistan, Premise proposed three potential uses that could be carried out in a way that is “responsive to commander’s information requirements”: gauge the effectiveness of U.S. information operations; scout and map out key social structures such as mosques, banks and internet cafes; and covertly monitor cell-tower and Wi-Fi signals in a 100-square-kilometer area. The presentation said tasks needed to be designed to “safeguard true intent”—meaning contributors wouldn’t necessarily be aware they were participating in a government operation…

 Another Premise document says the company can design “proxy activities” such as counting bus stops, electricity lines or ATMs to provide incentives for contributors to move around as background data is gathered. Data from Wi-Fi networks, cell towers and mobile devices can be valuable to the military for situational awareness, target tracking and other intelligence purposes. There is also tracking potential in having a distributed network of phones acting as sensors, and knowing the signal strength of nearby cell towers and Wi-Fi access points can be useful when trying to jam communications during military operations. Nearby wireless-network names can also help identify where a device is, even if the GPS is off, communications experts say.

Mr. Blackman said gathering open-source data of that nature doesn’t constitute intelligence work. “Such data is available to anyone who has a cellphone,” he said. “It is not unique or secret.” Premise submitted a document last July to the British government describing its capabilities, saying it can capture more than 100 types of metadata from its contributors’ phones and provide them to paying customers—including the phone’s location, type, battery level and installed apps. 

Users of the Premise app aren’t told which entity has contracted with the company for the information they are tasked with gathering. The company’s privacy policy discloses that some clients may be governments and that it may collect certain types of data from the phone, according to a spokesman…Currently the app assigns about five tasks a day to its users in Afghanistan, according to interviews with users there, including taking photos of ATMs, money-exchange shops, supermarkets and hospitals. One user in Afghanistan said he and others there are typically paid 20 Afghani per task, or about 25 cents—income for phone and internet services. A few months ago, some of the tasks on the site struck him as potentially concerning. He said the app posted several tasks of identifying and photographing Shiite mosques in a part of western Kabul populated largely by members of the ethnic Hazara Shiite minority. The neighborhood was attacked several times by Islamic State over the past five years…. Because of the nature and location of the tasks in a hot spot for terrorism, the user said he thought those tasks could involve spying and didn’t take them on.

Excerpt from Byron Tau, App Users Unwittingly Collect Intelligence, WSJ,  June 25, 2010

The Reckless Gambles that Changed the World: darpa

Using messenger RNA to make vaccines was an unproven idea. But if it worked, the technique would revolutionize medicine, not least by providing protection against infectious diseases and biological weapons. So in 2013 America’s Defense Advanced Research Projects Agency (DARPA) gambled. It awarded a small, new firm called Moderna $25m to develop the idea. Eight years, and more than 175m doses later, Moderna’s covid-19 vaccine sits alongside weather satellites, GPS, drones, stealth technology, voice interfaces, the personal computer and the internet on the list of innovations for which DARPA can claim at least partial credit.

It is the agency that shaped the modern world, and this success has spurred imitators. In America there are ARPAS for homeland security, intelligence and energy, as well as the original defense one…Germany has recently established two such agencies: one civilian (the Federal Agency for Disruptive Innovation, or SPRIN-d) and another military (the Cybersecurity Innovation Agency). Japan’s interpretation is called Moonshot R&D. 

As governments across the rich world begin, after a four-decade lull, to spend more on research and development, the idea of an agency to invent the future (and, in so doing, generate vast industries) is alluring and, the success of DARPA suggests, no mere fantasy. In many countries there is displeasure with the web of bureaucracy that entangles funding systems, and hope that the DARPA model can provide a way of getting around it. But as some have discovered, and others soon will, copying DARPA requires more than just copying the name. It also needs commitment to the principles which made the original agency so successful—principles that are often uncomfortable for politicians.

On paper, the approach is straightforward. Take enormous, reckless gambles on things so beneficial that only a handful need work to make the whole venture a success. As Arun Majumdar, founding director of ARPA-e, America’s energy agency, puts it: “If every project is succeeding, you’re not trying hard enough.” Current (unclassified) DAROA projects include mimicking insects’ nervous systems in order to reduce the computation required for artificial intelligence and working out how to protect soldiers from the enemy’s use of genome-editing technologies.

The result is a mirror image of normal R&D agencies. Whereas most focus on basic research, DARPA builds things. Whereas most use peer review and carefully selected measurements of progress, DARPA strips bureaucracy to the bones (the conversation in 1965 which led the agency to give out $1m for the first cross-country computer network, a forerunner to the internet, took just 15 minutes). All work is contracted out. DARPA has a boss, a small number of office directors and fewer than 100 program managers, hired on fixed short-term contracts, who act in a manner akin to venture capitalists, albeit with the aim of generating specific outcomes rather than private returns.

Excerpt from Inventing the future: A growing number of governments hope to clone America’s DARPA, Economist, June 5, 2021

The Wild West Mentality of Companies Running the U.S. Oil and Gas Infrastructure — and Who Pays for It

The ransomware attack on Colonial Pipeline Co. in May 2021 has hit an industry that largely lacks federal cybersecurity oversight, leading to uneven digital defenses against such hacks.

The temporary shutdown of Colonial’s pipeline, the largest conduit for gasoline and diesel to the East Coast, follows warnings by U.S. officials in recent months of the danger of cyberattacks against privately held infrastructure. It also highlights the need for additional protections to help shield the oil-and-gas companies that power much of the country’s economic activity, cyber experts and lawmakers say. “The pipeline sector is a bit of the Wild West,” said John Cusimano, vice president of cybersecurity at aeSolutions, a consulting firm that works with energy companies and other industrial firms on cybersecurity. Mr. Cusimano called for rules similar to the U.S. Coast Guard’s 2020 regulations for the maritime sector that required companies operating ports and terminals to put together cybersecurity assessments and plans for incidents.

 More than two-thirds of executives at companies that transport or store oil and gas said their organizations are ready to respond to a breach, according to a 2020 survey by the law firm Jones Walker LLP. But many don’t take basic precautions such as encrypting data or conducting dry runs of attacks, said Andy Lee, who chairs the firm’s privacy and security team. “The overconfidence issue is a serious phenomenon,” Mr. Lee said.

Electric utilities are governed by rules enforced by the North American Electric Reliability Corp., a nonprofit that reviews companies’ security measures and has the power to impose million-dollar fines if they don’t meet standards. There is no such regulatory body enforcing standards for oil-and-gas companies, said Tobias Whitney, vice president of energy security solutions at Fortress Information Security. “There aren’t any million-dollar-a-day potential fines associated with oil-and-gas infrastructure at this point,” he said. “There’s no annual audit.”

Excerpt from David Uberti and Catherine Stupp, Colonial Pipeline Hack Sparks Questions About Oversight, WSJ, May 11, 2021

A War Like No Other: the Covert Invasion of Iran

Within hours of Iran proudly announcing the launch of its latest centrifuges, on April 10, 2021, a power blackout damaged some of the precious machines at its site in Natanz…One thing reports seem to agree on is that an “incident” affected the power distribution network at Natanz.

Natanz is critical to Iran’s nuclear program. The heavily secured site is protected by anti-aircraft guns and has two large centrifuge halls buried more than 50 feet underground to protect them from airstrikes. Despite the conflicting reports, it appears the facility’s main power distribution equipment — Natanz has its own grid — was taken out with explosives. Backup emergency electricity also was taken down, and power cut out across the multibuilding compound, Behrouz Kamalvandi, spokesperson for Iran’s Atomic Energy Organization, told Iran’s state-run TV.

A blackout may not sound that serious, but it can be at an enrichment plant. Centrifuges are slender machines linked up in what are called cascades which enrich uranium gas by spinning it at incredibly high speeds using rotors. The stress on the advanced materials involved is intense and the process is technically immensely challenging. A small problem can send a centrifuge spinning out of control, with parts smashing into each other and damaging a whole cascade.

The question is: what caused the blackout – a cyber-attack or a physical act of sabotage, like a bomb?

Israel has a long history of sabotaging nuclear facilities in Iraq, Syria, and Iran, both through cyber means — including the sophisticated Stuxnet attack against Iran, which Israel conducted with U.S. and Dutch intelligence agencies — and with conventional bombs and explosives. Israel is also reportedly behind a number of assassinations of Iranian nuclear scientists and officials over the last decade. The Stuxnet attack was particularly significant because it launched the era of cyberwarfare, as it was the first cyberattack known to use a digital weapon that could leap into the physical realm to cause actual destruction of equipment. The highly skilled covert operation was conducted in lieu of a kinetic attack to avoid attribution and an escalation in hostilities with Iran; it remained undetected for three years..

Excerpts from Gordon Corera, Iran nuclear attack: Mystery surrounds nuclear sabotage at Natanz, BBC, Apr. 12, 2021, Kim Zetter, Israel may have Destroyed Iran Centrifuges Simply by Cutting Power, Intercept, Apr. 13, 2021

Nuking Tahiti: the Moruroa Files

From 1966 to 1974, France blew up 41 nuclear weapons in above-ground tests in French Polynesia, the collection of 118 islands and atolls that is part of France. The French government has long contended that the testing was done safely. But a new analysis of hundreds of documents declassified in 2013 suggests the tests exposed 90% of the 125,000 people living in French Polynesia to radioactive fallout—roughly 10

The findings come from a 2-year collaboration, dubbed the Moruroa Files, between Disclose, a French nonprofit that supports investigative journalism; Interprt, a collective of researchers, architects, and spatial designers affiliated with the Norwegian University of Science and Technology who focus on environmental issues; and the Science & Global Security program at Princeton. The findings were presented on 9 March on the project’s website, in a book, and in a technical paper posted to the arXiv preprint server.

The abandoned testing facility at the Moruroa Atoll. The atoll is at the risk of collapsing due to nuclear blasts

Declassified documents suggest actual exposures were between two and 20 times higher than France’s Atomic Energy Commission (CEA) estimates… Reasons for the discrepancies vary from test to test, he says. For example, CEA acknowledged that the first test, dubbed Aldébaran, exposed residents of the Gambier Islands to relatively high levels of fallout. But actual exposures were likely higher still… Although CEA noted that contaminated rainwater fell on the island, he says, it failed to consider that many residents likely drank the contaminated water, collected in household cisterns, for days.

Most important, the documents suggest a single test in 1974, called Centaure, exposed the entire population of Tahiti—87,500 people at the time—to fallout. French authorities set off a relatively tiny atom bomb with an explosive yield equal to 4 kilotons of TNT, and weather forecasts predicted that winds should carry fallout to the north. Instead, the wind blew to the west, carrying the plume directly over Tahiti. A new simulation based on data in the documents shows how the plume of radiation wafted over the island. CEA estimated that people on the island received a dose of about 0.6 mSv.  However, Phillipe and colleagues argue that CEA underestimated the total amount of radiation that accumulated on the ground over several days, didn’t account for radiation lingering in vegetables consumed later…

The new analysis moves the vast majority of French Polynesians past the exposure threshold to qualify for compensation. Philippe and Schoenberger would like to see France do away with the exposure standard and compensate anyone who lived through the tests and developed a qualifying cancer. “Our hope is to demonstrate that this kind of threshold can be prejudicial to claimants just because of the difficulties of proving exposure,” Schoenberger says.

Philippe estimates that, assuming a cancer rate of 0.2% per year, roughly 10,000 cancer patients or their families would qualify retroactively and that compensating them would cost about €700 million. Future cancers would cost about €24 million per year, he estimates. However, Hughes says it remains to be seen whether the French government will even acknowledge the analysis. “My fear is that they will simply ignore it,” Hughes says.

The declassified documents also show the French government routinely failed to warn Polynesians about the radiation risks, Philippe says. In the Centaure test, authorities could have warned Tahitians about the approaching fallout 2 days in advance, but did not. Ironically, Philippe notes, the United States, the Soviet Union, and other countries were monitoring the tests remotely. “Everybody knew what was going on,” he says, “except the Polynesians.”

Excerpt from Adrian Cho, France grossly underestimated radioactive fallout from atom bomb tests, study finds, Science, Mar. 11, 2021

It’s Easy: How to Make a Radioactive Dirty Bomb

A truck carrying highly radioactive materials has been stolen by armed criminals in central Mexico the Independent reported on April 12, 2012. The Mexican government is now warning that anybody who comes in close contact with its deadly payload could be risking their lives. The individuals got away with an industrial inspection equipment truck during an armed heist on April 11, 2021 in the town of Teoloyucan. Included in the bounty is a QSA Delta 800 gamma ray projector that holds radioactive iridium-192, selenium-75 and ytterbium-169 isotopes — a highly unusual bounty for any hijacker.

It’s still unclear why they targeted the truck in question, but during a previous robbery involving radioactive waste, Mexican authorities feared the ingredients may be used to build a dirty bomb. Contact with the contents of the truck, authorities emphasized, can be fatal. “At 10am today, there was a robbery of radiographic equipment reported,” reads a warning issued by the National Commission for Nuclear Security and Safeguarding, as quoted by the Independent. “If the radioactive material is extracted from the container, is moved, or makes direct contact with any persons handling it, permanent injury can occur in minutes.” “In case of making direct contact with the source over the course of hours or days, the effects can prove fatal,” the warning reads. Even just being 30 meters away could cause radiation poisoning, according to the Commission.

Members of the Commission for National Civil Protection (CNPC) have been dispatched across the central region of Mexico. Authorities have not ruled out the possibility that the truck may now be in Mexico City….This is not the first time radioactive material has been stolen in Mexico.

Excerpt ‘Extremely dangerous’ radioactive material stolen in Mexico truck hijacking, Independent, Apr. 12, 2021

The Nightmare of Keeping the Lights On

Some 330 million Americans rely on the nation’s critical infrastructure to keep the country humming. Disruptions to electrical grids, communications systems, and supply chains can be catastrophic, yet all of these are vulnerable to cyberattack. According to the government’s 2019 World Wide Threats Hearing, certain adversaries are capable of launching cyberattacks that can disrupt the nation’s critical infrastructure – including electrical distribution networks.

In recognition of the disruptions cyberattacks can cause, DARPA in 2016 established the Rapid Attack Detection, Isolation and Characterization Systems (RADICS) program. The goal of RADICS has been to enable black-start recovery during a cyberattack. Black start is the process of restoring power to an electric substation or part of the grid that has experienced a total or partial shutdown without relying on an external power transmission network to get things back online…

“Cyberattacks on the grid can essentially do two things – make the grid not tell you the truth, and make the grid operate in an unexpected way,” said Walter Weiss, the program manager responsible for RADICS. “For example, the grid could show you that a substation has power when in reality it does not. This could unintentionally prevent power restoration to an entire area since no one thinks there is a need to bring power back online. The technologies developed under RADICS help provide ground truth around grid status, giving responders the ability to quickly detect anomalies and then chart a path towards recovery.”…

 The RADICS testbed is comprised of miniaturized substations that were designed to operate as they do in the real world, but with safeguards to protect the system and those operating the substations. The substations are connected via power lines, forming a multi-utility crank path. With a crank path, power is generated to black start one utility that then powers the next utility and the next until the grid is fully restored.

DARPA substation, Plum island NY

Technologies to Rapidly Restore the Electrical Grid after Cyberattack Come Online, DARPA Website, Feb. 23, 2021

Hearing the Naked Truth: Earth Observation

In the middle of last year, Ecuadorians watched with concern as 340 foreign boats, most of them Chinese, fished just outside the Exclusive Economic Zone (EEZ) around their country’s westernmost province, the Galapagos Islands. The law of the sea requires such vessels to carry GPS-based automatic identification systems (AIS) that broadcast where they are, and to keep those systems switched on. Some boats, however, failed to comply. There were more than 550 instances of vessels not transmitting their locations for over a day. This regular radio silence stoked fears that the boats concerned were sneaking into Ecuador’s waters to plunder its fish.

Both local officials and China’s ambassador to Ecuador denied this, and said all the boats were sticking to the rules. In October 2020, however, HawkEye 360, a satellite operator based in Virginia, announced it had detected vessels inside Ecuador’s EEZ on 14 occasions when the boats in question were not transmitting AIS. HawkEye’s satellites could pinpoint these renegades by listening for faint signals emanating from their navigation radars and radio communications.

HawkEye’s satellites are so-called smallsats, about the size of a large microwave oven. They are therefore cheap to build and launch. HawkEye deployed its first cluster, of three of them, in 2018. They are now in an orbit that takes them over both of Earth’s poles. This means that, as the planet revolves beneath them, every point on its surface can be monitored at regular intervals…Unlike spy satellites fitted with optical cameras, RF satellites can see through clouds. Their receivers are not sensitive enough to detect standard mobile phones. But they can pick up satellite phones, walkie-talkies and all manner of radar. And, while vessels can and do illicitly disable their AIS, switching off their communications gear and the radar they use for navigation and collision-avoidance is another matter entirely. “Even pirates don’t turn those things off,” says John Beckner, boss of Horizon Technologies….

RF data are also cheap to collect. Satellites fitted with robotic high-resolution cameras are costly. Flying microwave ovens that capture and timestamp radio signals are not. America’s National Geospatial-Intelligence Agency (NGA), one of that country’s numerous spying operations, is a big user of RF intelligence. It employs HawkEye’s data to find guerrilla camps and mobile missile-launchers, and to track both conventional warships and unconventional ones, like the weaponised speedboats sometimes deployed by Iran. Robert Cardillo, a former director of the agency who now advises HawkEye, says dozens of navies, Russia’s included, spoof AIS signals to make warships appear to be in places which they are not. RF intelligence is not fooled by this. Mr Cardillo says, too, that the tininess of RF satellites makes them hard for an enemy to destroy.

Beside matters military, the NGA also uses RFdata to unearth illicit economic activity—of which unauthorised fishing is merely one instance. Outright piracy is another. And the technique also works on land. In 2019, for example, it led to the discovery of an illegal gold mine being run by a Chinese company in a jungle in Gabon. And in 2020 the managers of Garamba National Park in the Democratic Republic of Congo began using HawkEye data to spot elephant poachers and dispatch rangers to deal with them…

Horizon also plans to compile a library of unique radar-pulse “fingerprints” of the world’s vessels, for the tiny differences in componentry that exist even between examples of the same make and model of equipment mean that signals can often be linked to a specific device. It will thus be able to determine not merely that a vessel of some sort is in a certain place, but which vessel it is, and where else it has been…

Excerpt from Espionage: Ears in the Sky, Economist, Mar. 20, 2021

The Horrors of Bombing: 50 Years After

 In Cambodia, however, fertile land often signifies danger rather than abundance. When America dropped an estimated 1.8m tonnes of explosives on the country during the Vietnam war, those falling on hard ground generally detonated, whereas many landing on softer earth did not. No one knows how many bombs remain in rich soil. But a paper by four academics at Ohio State University who studied satellite images and reports by landmine-removal groups from a single village, found that perhaps half of the munitions have not exploded.

These wartime remnants have given the United States’ bombing campaign of 1965-73—which ostensibly targeted Viet Cong supply lines, but caused perhaps 150,000 deaths—an enduringly lethal legacy. Since 1979, unexploded ordnance has killed at least 19,000 people in Cambodia (though some may have been blown up by landmines from subsequent wars, rather than by American bombs). Cambodia now has the world’s highest rate of amputees.

A recent study by Erin Lin shows that America’s bombardment injured not just Cambodia’s people but its economy as well. She first interviewed farmers in the country, who said they thought that richer, darker soil presented an unusually high risk of hidden ordnance—especially in heavily bombed areas. They work in constant fear of explosions. Some said that they only planted crops in parts of their farms that they were confident contained no bombs, or that they used hand tools instead of machines to reduce the risk of detonation.

Excerpt from Blood and Soil: American Bombing 50 Years Ago Still Shapes Cambodian Agriculture, Mar. 20, 2021

The Techno-spheres: Westerners against the Chinese

Lithuania’s government on Feb. 17 prohibited Chinese security-scanner maker Nuctech Co. from supplying equipment to the country’s two airports, saying a proposed deal was “not in line with national-security interests.” State-controlled Nuctech, which the U.S. government in December 2020 listed among Chinese entities banned from certain transactions with U.S. parties, had won a tender launched a year ago by state-owned Lithuanian Airports.

Canada last year also abandoned a plan to buy Nuctech scanners for its embassies following controversy around the announced deal. Norway, Croatia and an EU directorate in recent months have also stopped scanner tenders involving Nuctech, although none publicly linked the cancellations to security, as Lithuania did. Lithuania banned China’s Nuctech from supplying security-scanning equipment to its two airports.

“We are choosing the Western technosphere. We are not choosing the Chinese technosphere,” said Laurynas Kasciunas, chairman of the Lithuanian parliament’s national-security and defense committee, which oversees a national-security review board that had recommended banning Nuctech. Such policy reversals remain a minority amid extensive Chinese business activity across the EU. 

Excerpt from Daniel Michaels and Valentina Pop, China Faces European Obstacles as Some Countries Heed U.S. Pressure, WSJ, Feb. 23, 2021

Genomic Surveillance

The use of DNA profiling for individual cases of law enforcement has helped to identify suspects and to exonerate the innocent. But retaining genetic materials in the form of national DNA databases, which have proliferated globally in the past two decades, raises important human rights questions.

Privacy rights are fundamental human rights. Around the world, the unregulated collection, use, and retention of DNA has become a form of genomic surveillance. Kuwait passed a now-repealed law mandating the DNA profiling of the entire population. In China, the police systematically collected blood samples from the Xinjiang population under the guise of a health program, and the authorities are working to establish a Y-chromosome DNA database covering the country’s male population. Thailand authorities are establishing a targeted genetic database of Muslim minorities. Under policies set by the previous administration, the U.S. government has been indiscriminately collecting the genetic materials of migrants, including refugees, at the Mexican border.

Governments should reform surveillance laws and draft comprehensive privacy protections that tightly regulate the collection, use, and retention of DNA and other biometric identifiers .They should ban such activities when they do not meet international human rights standards of lawfulness, proportionality, and necessity.

Excerpts from Yves Moreau and Maya Wong, Risks of Genomic Surveillance and How to Stop it, Science, Feb. 2021

Building Factories in Space: DARPA

DARPA announced on February 5, 2021  its Novel Orbital and Moon Manufacturing, Materials and Mass-efficient Design (NOM4D) program. The effort, pronounced “NOMAD,” seeks to pioneer technologies for adaptive, off-earth manufacturing to produce large space and lunar structures,  “NOM4D’s vision is to develop foundational materials, processes, and designs needed to realize in-space manufacturing of large, precise, and resilient Defense Department systems,” said Bill Carter, program manager in DARPA’s Defense Sciences Office. “We will also explore the unique features of in-situ resources obtained from the moon’s surface as they apply to future defense missions.” 

Concerning mass-efficient designs, the vision is for completely new concepts that could only be manufactured in space….In order to take the next step, we’ve got to go about materials, manufacturing, and design in a completely new way.

Excerpts from Orbital Construction: DARPA Pursues Plan for Robust Manufacturing in Space, DARPA Website, Feb. 5, 2021

A Worldwide Web that Kills with Success

Doubts are growing about the satellites, warships and other big pieces of hardware involved in the command and control of America’s military might. For the past couple of decades the country’s generals and admirals have focused their attention on defeating various forms of irregular warfare. For this, these castles in the sky and at sea have worked well. In the meantime, however, America’s rivals have been upgrading their regular forces—including weapons that can destroy such nodes of power. Both China and Russia have successfully blown up orbiting satellites. And both have developed, or are developing, sophisticated long-range anti-aircraft and anti-ship missiles.

As a result, America is trying to devise a different approach to C2, as command and control is known in military jargon. The Department of Defense has dubbed this idea “Joint All-Domain Command and Control”, or JADC2. It aims to eliminate vulnerable nodes in the system (e.g., satellites) by multiplying the number of peer-to-peer data links that connect pieces of military hardware directly to one another, rather than via a control center that might be eliminated by a single, well-aimed missile.

The goal, officials say, is to create a network that links “every sensor and every shooter”. When complete, this will encompass sensors as small as soldiers’ night-vision gear and sonar buoys drifting at sea, and shooters as potent as ground-based artillery and aerial drones armed with Hellfire missiles.

One likely beneficiary of the jadc2 approach is Anduril Industries, a Californian firm…Its products include small spy helicopter drones; radar, infrared and optical systems constructed as solar-powered towers; and paperback-sized ground sensors that can be disguised as rocks

Sensors come in still-more-diverse forms than Anduril’s, though. An autonomous doglike robot made by Ghost Robotics of Philadelphia offers a hint of things to come. In addition to infrared and video systems, this quadruped, dubbed v60 q-ugv, can be equipped with acoustic sensors (to recognise, among other things, animal and human footsteps), a millimetre-wave scanner (to see through walls) and “sniffers” that identify radiation, chemicals and electromagnetic signals. Thanks to navigation systems developed for self-driving cars, v60 q-ugv can scamper across rough terrain, climb stairs and hide from people. In a test by the air force this robot was able to spot a mobile missile launcher and pass its location on directly to an artillery team…

Applying Artificial Intelligence (AI) to more C2 processes should cut the time required to hit a target. In a demonstration in September 2020, army artillery controlled by AI and fed instructions by air-force sensors shot down a cruise missile in a response described as “blistering”…

There are, however, numerous obstacles to the success of all this. For a start, developing unhackable software for the purpose will be hard. Legions of machines containing proprietary and classified technologies, new and old, will have to be connected seamlessly, often without adding antennae or other equipment that would spoil their stealthiness…America’s technologists must, then, link the country’s military equipment into a “kill web” so robust that attempts to cripple it will amount to “trying to pop a balloon with one finger”, as Timothy Grayson, head of strategic technologies at DARPA, the defense department’s main research agency, puts it…

Excerpts from The future of armed conflict: Warfare’s worldwide web, Economist,  Jan. 9, 2021

Are Hypersonic Weapons Hyped Propaganda?

The United States, Russia, and China are developing an array of hypersonic weapons—maneuverable vehicles that carry warheads through the atmosphere at more than five times the speed of sound. The countries and their defense agencies, such as DARPA, claim that these weapons outperform existing missiles in terms of delivery time and evasion of early warning systems. New research, however, shows that these weapons travel intercontinental distances more slowly than comparable ballistic missiles flying depressed trajectories, and that they remain visible to existing space-based
sensors for the majority of flight. Fundamental physical limitations imposed by low-altitude atmospheric flight render hypersonic missiles an evolutionary—not revolutionary— development relative to established ballistic missile technologies.

Misperceptions of hypersonic weapon performance have arisen from social processes by which the organizations developing these weapons construct erroneous technical facts favoring continued investment in such weapons.

Excerpt from from Cameron L. Tracy and David Wright, Modeling the Performance of Hypersonic Boost-Glide Missiles, SCIENCE & GLOBAL SECURITY, 2021

Above-the-Speed-of Sound: US Hypersonic Weapons

From the DARPA Website: DARPA’s Operational Fires (OpFires) program, which is developing a ground-launched intermediate-range hypersonic weapons system, is advancing to a new phase. This new phase involves full-scale missile fabrication, assembly, and flight testing from a launch vehicle. It will be  be produced by Lockheed Martin Missiles and Fire Control…OpFires aims to demonstrate a novel system enabling hypersonic boost glide weapons to rapidly and precisely hit critical, time-sensitive targets while penetrating modern enemy air defenses. 

DARPA’s Operational Fires Ground-Launched Hypersonics Program Enters New Phase, Jan. 11, 2021

How to Denude a Country: Military Invasions Dressed Up As Revolutions

“In wartime, truth is so precious that she should always be attended by a bodyguard of lies.”said Winston Churchill…Deception is still practiced in war.

In its conflict with Azerbaijan, Armenia has bamboozled drones with dummy missiles. During a stand-off with India, China published images of missile launchers that, on closer inspection, turned out to be wobbly inflatables. Indian and Chinese forces alike covered equipment with multispectral nets, which block visible light and other electromagnetic emissions. Engineers keep working on new gadgets. BAE Systems, a defense firm, boasts that its Adaptiv camouflage—a set of thermoelectric tiles that change temperature to match their surroundings—amounts to a “cloak of invisibility”.

European and American military officials describe Russian and Chinese practices with a mixture of distaste and envy. Whereas America’s use of decoys “is currently at a low after two decades of neglect”, notes Walker Mills, an officer in the us Marine Corps, China has invested in them, including a 35kg tank that fits in a backpack and inflates in four minutes. One report by America’s army says that Chinese forces “have the highest fidelity decoys seen to date”.

The laws of armed conflict are fairly clear about battlefield deception. Whereas “perfidy” (such as faking surrender to lure an enemy into an ambush, or disguising a tank as a Red Cross ambulance) is forbidden, “ruses” like decoys, feints and ambushes are fair game. But other laws can be bent or bypassed. Russia snatched Crimea from Ukraine in 2014 by cleverly using unmarked personnel—the so-called little green men—and a synchronized blitz of disinformation. The entire campaign was a deception: an invasion masquerading as a nationalist uprising.

Western armies want to catch up, in some ways at least. “We’ll re-learn deception,” promises General David Berger, head of America’s Marine Corps, who is reforming his force to better evade Chinese sensors in the Pacific. But this cuts against the grain. “There’s a cultural problem here,” says a veteran cia officer who specialized in deception. “I do think you’ll find generals who would feel that it’s fundamentally not a very respectable activity.”

Excerpt from Military Deception: Bodyguard of Lies, Economist, Dec. 19, 2020

The Extra-Ordinary Killing of 2020

A satellite-controlled machine gun with “artificial intelligence” was used to kill in November 2020, Iran’s top nuclear scientist. According to Iran, Mohsen Fakhrizadeh was driving on a highway outside Iran’s capital Tehran with a security detail of 11 guards on November 27, 2020 when the machine gun “zoomed in” on his face and fired 13 rounds. The machine gun was mounted on a Nissan pickup and focused only on Fakhrizadeh’s face in a way that his wife, despite being only 25 centimetres away, was not shot…According to Iran, the machine gun was being “controlled online” via a satellite and used an “advanced camera and artificial intelligence” to make the target.

Excerpt from Nuclear scientist killed by satellite-controlled machine gun that “zoomed in” on his face, Iran says, CBS News, Dec. 7, 2020

Your Phone Is Listening: smart-phones as sniffers

U. S. government agencies from the military to law enforcement have been buying up mobile-phone data from the private sector to use in gathering intelligence, monitoring adversaries and apprehending criminals. Now, the U.S. Air Force is experimenting with the next step.

The Air Force Research Laboratory is testing a commercial software platform that taps mobile phones as a window onto usage of hundreds of millions of computers, routers, fitness trackers, modern automobiles and other networked devices, known collectively as the “Internet of Things.” SignalFrame, a Washington, D.C.-based wireless technology company, has developed the capability to tap software embedded on as many as five million cellphones to determine the real-world location and identity of more than half a billion peripheral devices. The company has been telling the military its product could contribute to digital intelligence efforts that weave classified and unclassified data using machine learning and artificial intelligence.

The Air Force’s research arm bought the pitch, and has awarded a $50,000 grant to SignalFrame as part of a research and development program to explore whether the data has potential military applications, according to documents reviewed by The Wall Street Journal. Under the program, the Air Force could provide additional funds should the technology prove useful.

SignalFrame has largely operated in the commercial space, but the documents reviewed by the Journal show the company has also been gunning for government business. A major investor is Razor’s Edge, a national-security-focused venture-capital firm. SignalFrame hired a former military officer to drum up business and featured its products at military exhibitions, including a “pitch day” sponsored by a technology incubator affiliated with U.S. Special Operations command in Tampa, Fla.

SignalFrame’s product can turn civilian smartphones into listening devices—also known as sniffers—that detect wireless signals from any device that happens to be nearby. The company, in its marketing materials, claims to be able to distinguish a Fitbit from a Tesla from a home-security device, recording when and where those devices appear in the physical world. Using the SignalFrame technology, “one device can walk into a bar and see all other devices in that place,” said one person who heard a pitch for the SignalFrame product at a marketing industry event…

“The capturing and tracking of unique identifiers related to mobile devices, wearables, connected cars—basically anything that has a Bluetooth radio in it—is one of the most significant emerging privacy issues,” said Alan Butler, the interim executive director and general counsel of the Electronic Privacy Information Center, a group that advocates for stronger privacy protections. “Increasingly these radios are embedded in many, many things we wear, use and buy,” Mr. Butler said, saying that consumers remain unaware that those devices are constantly broadcasting a fixed and unique identifier to any device in range.

Byron Tau,  Military Tests New Way of Tracking, WSJ, Nov. 28, 2020

Who is the Boss? Cyber-War

A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability…That America stands at the top of the list is not surprising. Its cyber-security budget for fiscal year 2020 stood at over $17bn and the National Security Agency (NSA) probably gets well over $10bn. The awesome scale of America’s digital espionage was laid bare in leaks by Edward Snowden, a former NSA contractor, in 2013, which showed the agency hoovering up vast amounts of the world’s internet traffic and trying to weaken encryption standards.

China, in second place, has demonstrated a voracious appetite for commercial cyber-espionage abroad and an iron grip on the internet at home. Britain, whose National Cyber Security Centre has parried over 1,800 cyber-attacks since its creation in 2016, is third. Russia, whose spies interfered with America’s last election, is in fourth place. The big surprise is the Netherlands in fifth place, ahead of France, Germany and Canada. Dutch expertise in analyzing malware is particularly sharp…

Many countries outsource the dirtiest work to deniable proxies, like “hacktivists” and criminals….But while stealing things and disrupting networks is important, what matters most over the longer term is control of digital infrastructure, such as the hardware that runs mobile telecommunications and key apps. Dominance there will be crucial to economic strength and national security.

Excerpt from Digital dominance: A new global ranking of cyber-power throws up some surprises, Economist, Sept. 19, 2020

What is the Sea Train? DARPA

DARPA’s The Sea Train program aims to demonstrate long range deployment capabilities for a distributed fleet of tactical unmanned surface vessels. The program seeks to enable extended transoceanic transit and long-range naval operations by exploiting the efficiencies of a system of connected vessels (Sea Train). The goal is to develop and demonstrate approaches that exploit wave-making resistance reductions to overcome the range limitations inherent in medium unmanned surface vessels. DARPA envisions sea trains formed by physically connecting vessels with various degrees of freedom between the vessels, or vessels sailing in collaborative formations at various distances between the vessels. The weak of October 5, 2020, DARPA awarded Gibbs & Cox a separate $9.5 million contract to develop a “Connectorless Sea Train” concept. 

Dr. Andrew Nuss, Sea Train

The Nuclear Waste Buried in the Sahara Desert

France should take initiative to solve the problem of the nuclear waste buried in the Algerian Sahara in the early 1960s, as no one knows its exact location, which is a classified military secret…In an interview with Radio France Internationale, Patrice Bouvre (head of the Paris-based Observatory for Armaments) said: “When France suspended its nuclear tests in 1966, it simply buried the waste of the 17 experiments it conducted over the years.” He added that Paris classified the location or locations of the buried nuclear waste and the documents related to the affair as “a military secret”, which remains to date.

As a result, there is no information available about the exact location of the nuclear waste buried in the Algerian desert. He called on the French authorities to reveal the truth about this file and to cooperate with Algeria to clean up the areas contaminated by the nuclear waste that still exposes these regions to serious environmental damages.

France conducted 17 nuclear tests between 1960 and 1966 in the Algerian Sahara, and the waste from these experiments is buried in an unknown location in the area, hindering attempts to remove the radioactive materials and protect the population and the environment

Calls for France to reveal location of nuclear waste dumped in Algeria, MiddleEastMonitor, Oct. 13, 2020

Government Intervention is Great: What China is Learning from the United States

A study published by the China Aerospace Studies Institute in September 2020′China’s Space Narrative: Examining the Portrayal of the US-China Space Relationship in Chinese Sources‘ used publicly available Chinese language resources to draw insights on how the Chinese view the U.S.-China space relationship. According to the study:

“Chinese sources weave a space narrative that portrays China as a modernizing nation
committed to the peaceful uses of space and serving the broader interests of advancing humankind through international space cooperation, economic development, and scientific discovery. Chinese sources minimize the military role of China’s space program.

In contrast, the same sources portray the United States as the leading
space power bent on dominating space, restricting access to space, and limiting international space cooperation to countries with similar political systems and level of economic development.

The report concludes that the United States and China are in a long-term competition in space in which China is attempting to become a global power, in part, through the use of space. China’s primary motivation for developing space technologies is national security…China’s space program is one element of its efforts to transition the current U.S.-dominated international system to a multipolar world….

Many Chinese writings on commercial space analyze the experiences of U.S. companies, with a particular focus on SpaceX. Chinese space experts call SpaceX the “major representative company” for commercial space worldwide. A report from Hong Kong media claims that Chinese investors view SpaceX as the “benchmark company” for emerging commercial space companies in the mainland. Chinese authors also follow developments in other U.S. commercial space companies, such as Digital Globe
and Rocket Lab.

Chinese authors also pay attention to the ways in which the U.S. government uses various policies and incentives to create a favorable ecosystem for the growth of new commercial space companies. Chinese writings analyze ways in which NASA has supported private companies with funding, technology transfer, consulting, and infrastructure leasing. Although their specific recommendations vary, Chinese authors view strong government oversight and intervention as crucial toward the success of the domestic commercial space industry.”

Tracking the Enemy: U.S. Space Force in Qatar

The newly formed U.S. Space Force is deploying troops to a vast new frontier: the Arabian Peninsula. Space Force now has a squadron of 20 airmen stationed at Qatar’s Al-Udeid Air Base in its first foreign deployment. The force, pushed by President Donald Trump, represents the sixth branch of the U.S. military and the first new military service since the creation of the Air Force in 1947.   Concerns over the weaponization of outer space are decades old. But as space becomes increasingly contested, military experts have cited the need for a space corps devoted to defending American interests…

In the spring of 2020, Iran’s paramilitary Revolutionary Guard launched its first satellite into space, revealing what experts describe as a secret military space program. The Trump administration has imposed sanctions on Iran’s space agency, accusing it of developing ballistic missiles under the cover of a civilian program to set satellites into orbit.

“The military is very reliant on satellite communications, navigation and global missile warning,” said Capt. Ryan Vickers, a newly inducted Space Force member at Al-Udeid. American troops, he added, use GPS coordinates to track ships passing through strategic Gulf passageways…

Isabel Debre, US Space Force deploys to vast new frontier: Arabian Desert, Associated Press, Sept. 21, 2020

Conquering Space: China’s X-37B and the United States

Ever since China claimed success in the secretive launch of an experimental spacecraft, experts have been pondering over what it could be and what it did in space.The spacecraft – mounted on a Long March 2F rocket – was launched from the Jiuquan Satellite Launch Centre in northern China on Sept. 4, 2020 and safely returned to Earth after two days in orbit…Unlike recent Chinese high-profile space missions, very few details have emerged about the vehicle and no visuals have been released. Chinese authorities have been tight-lipped about the nature of the short-duration excursion and what technologies were tested. The exact launch and landing times were not revealed, nor was the landing site although it is thought to be the Taklamakan Desert, which is in northwest China.

Three years ago, China said it would launch a space vessel in 2020 that “will fly into the sky like an aircraft” and be reusable. A reusable spacecraft – as the name implies can undertake multiple trips to space – thereby potentially lowering the overall cost of launch activity. A traditional one-off spacecraft – costing tens of millions of dollars – is practically rendered useless after a single mission.

The experimental vessel reached an altitude of about 350km, which is in line with China’s previous crewed flights. The spacecraft also released an unknown object into the orbit before returning to Earth…Once the testing is complete, such a vehicle could be used to launch and repair satellites, survey the Earth, as well as take astronauts and goods to and from orbit, possibly to a planned future Chinese space station.

The Chinese craft’s size and shape remain unclear but it is widely believed to be some sort of uncrewed space plane similar to the X-37B Orbital Test Vehicle operated by the US Air Force. The recent mission could be linked to the Shenlong – or divine dragon – space plane project, which has been in development for some time, according to reports. A second Chinese reusable space plane called Tengyun, or cloud climber, is also in the works. If confirmed as a space plane, China would become only the third country to have successfully launched such a vehicle into orbit after the US and the former Soviet Union. The European Space Agency is working on its own reusable orbital vehicle called Space Rider, while India is also said to be developing a space shuttle-like craft.

The X-37B, resembling a miniature space shuttle, has been in orbit since late May 2020 following its launch on its sixth assignment. Very little is known about the X-37B’s missions, prompting speculation that the planes could be used for spying activity or testing space weapons.

x-37b

According to Bleddyn Bowen, China’s spacecraft launch is “just another part of China becoming a comprehensive space power that utilizes space technology for the purposes of war, development, and prestige like all others”.

Pratik Jakhar, China claims ‘important breakthrough’ in space mission shrouded in mystery, BBC, Sept. 9, 2020

How to Fight: Laugh, Bleed, Kill

The U.S. response to the 9/11 attacks launched an Air Force special operations unit into more than 6,900 days, or nearly two decades, of continuous deployments and combat operations in the Middle East, officials said. Within weeks of the terrorist attacks on the U.S., the 17th Special Tactics Squadron deployed with Army Rangers on raids into southern Afghanistan on Oct. 19, 2001. Since then, the squadron has had no breaks in deployment. “We fight, bleed and laugh beside [the Rangers],” said Staff Sgt. Ryan Duhon, a tactical air control party operator quoted in last month’s statement. “We win as a team or fail as a team.”….

The Special Tactics community, whose airmen conduct personnel recovery, precision strike missions and battlefield surgery, is the most highly decorated in the Air Force since the Vietnam War. 

Excerpt from CHAD GARLAND, Air Force special ops members ‘fight, bleed and laugh’ on nearly 7,000 days of deployments, Stars and Stripes, Sept. 10, 2020

China’s Nuclear Triad: Land, Sumbarines and Bombers

Based on United States Report released in 2020 “Military and Security Developments Involving the People’s Republic of China” by the Secretary of Defense, China’s progress in upgrading its strategic bombers to carry nuclear payloads puts it on the cusp of achieving a “triad” of delivery systems ((1) land-launched nuclear missiles, (2) nuclear-armed submarines, and (3) aircraft delivered nuclear bombs).  The development of a nuclear triad raises the long-term stakes in the complex relationship between Beijing and Washington. …The heavy emphasis on China’s nuclear improvements will probably be used by the Pentagon to press lawmakers and the public to support the massive reinvestment already underway in modernized nuclear weapons. This includes the B-21 bomber, an $85 billion Ground Based Strategic Deterrent ICBM program and the $128 billion Columbia-class ballistic missile submarine.

China’s defense ministry denounced the report as a document created with a “zero-sum-game mindset and Cold War mentality,” saying that the U.S. had “misinterpreted” the country’s nuclear policy and stirred up confrontation with Taiwan. “It’s extremely wrong and China firmly rejects it.”  As part of President Xi Jinping’s efforts to build a “world class” military by 2049, the Defense Department report said the People’s Liberation Army has already achieved parity with or exceeded the U.S. in at least three key areas: shipbuilding, land-based conventional ballistic and cruise missiles and integrated air defense systems.

While the country has one overseas military base, in the East African nation of Djibouti, China’s government “is very likely already considering and planning for additional overseas military logistics facilities to support naval, air and ground forces…”.  China’s current nuclear arsenal includes 100 silo or road-mobile intercontinental ballistic missiles, as many as six Jin-class nuclear missile submarines capable of carrying 12 missiles each and a new air-refuelable H-6N long-range bomber. The bomber is an upgrade on a previous model and comes with a modified fuselage “that allows it to carry either a drone or an air-launched ballistic missile that may be nuclear-capable. 

Excerpts from Anthony Capaccio, Pentagon Warns China Is Nearing a Milestone in Nuclear Weapons Buildup, Bloomberg, Sept. 1, 2020

China denounced the Pentagon report. According to Xinhua, the Pentagon report is crowded with anti-China hogwash. Fear-mongering over China has always been the Pentagon’s trick to demand more appropriations from the U.S. Congress. A fabricated grave threat to world peace can also help Washington sell more weapons to its allies, and serves as an excuse for America’s pursuit of global domination…While Washington is selling its latest “China-scare” fiction to the world, it is hard to overlook such facts that the United States spent more on military than 144 countries combined in 2018 and maintains nearly 800 military bases in over 70 countries.

Excerpt from Commentary: Lies, conspiracies behind Pentagon’s China military report, Xinhua, Sept. 5, 2020


Under Zero Trust: the U.S. Chip Resurgence

The Defense Advanced Research Projects Agency launched its Electronic Resurgence Initiative (ERI)  to help reboot a domestic chip industry that has been moving steadily offshore for decades…. Program officials and chip industry executives foresee the emergence of a “5th generation of computing” based on current cloud infrastructure while combining AI, the Internet of Things (IoT) and 5G wireless networks to deliver big data.

“The U.S. microelectronics industry is at an inflection point,” Ellen Lord, undersecretary of defense for acquisition and sustainment, told the virtual ERI summit. After decades of offshoring of chip fabrication, packaging and testing capabilities, “How do we reverse this trend?”  The Defense Department is expanding its technology base efforts by implementing a “step-by-step process for reconstituting the microelectronics supply chain,” focusing on various segments of the semiconductor ecosystem, including memory devices, logic, ICs and advanced packaging along with testing and assembly.

“While DoD does not drive the electronics market,” constituting only about 1 percent of demand, “we can drive significant R&D,” ERI is advancing public-private partnerships that provide a framework for commercial innovation. The result would be “pathfinder projects” geared toward a renewal of U.S. chip manufacturing. As trade frictions with China grow, ERI is placing greater focus on ensuring the pedigree of U.S. electronics supply chain. “We need to find a path to domestic sources,” said Lord.

While nurturing government-industry partnerships as part of an emerging next-generation U.S. industrial policy, this year’s DARPA summit also emphasized chip standards and processes for securing fabs, foundry services, devices and foundational microelectronics. In that vein, U.S. officials stressed new chips metrics like “quantifiable assurance” to secure dual-use devices that could end up in weapons or an IoT device.

“Our interests to protect both the confidentiality and the integrity of our supply chain are aligned with commercial interests, and we will continue to work across government and industry to develop and implement our quantitative assurance strategy based on zero trust,” said Nicole Petta, principal director of DoD’s microelectronics office. The “zero trust” approach assumes no device is safe, and that all microelectronics components must be validated before deployment. The framework marks a philosophical departure from DoD’s “trusted foundry” approach instituted in the 1990s, largely because “perimeter defenses” failed to account for insider threats…

DARPA Chip Efforts Pivots to Securing US Supply Chain, https://www.hpcwire.com, Aug. 24, 2020

Everything Moving in Space Is a Weapon? Yes.

Kosmos 2542, a Russian satellite that was launched in November 2019, was “like Russian nesting dolls”. Eleven days after its launch it disgorged another satellite, labelled Kosmos 2543. Then, on July 15th, Kosmos 2543 itself spat out another object, which sped off into the void.  Merely a “small space vehicle” to inspect other satellites, said the Russians. Nonsense, said the Americans; it was a projectile. The intentl.. was to signal Russia’s ability to destroy other nations’ satellites….In January 2020, America complained that Kosmos 2542 and 2543 had tailed a spy satellite in an “unusual and disturbing” way (American satellites have also sidled up to others in the past). 

Anti-satellite weapons are not new. During the cold war, America and the Soviet Union developed several ways to blow up, ram, dazzle and even nuke each other’s satellites. The countries conducted two-dozen anti-satellite tests between them. Ten were “kinetic”, involving a projectile physically striking a target. But new competitors, and new technologies, mean anti-satellite warfare is a hot topic once again. China has conducted ten tests over the past 15 years, including a kinetic one in 2007 that created a great deal of space debris. India conducted its first kinetic test in 2019. America, Russia and China have all manoeuvred their satellites close to others, sometimes provocatively so. New methods of attack are being tested, including lasers and cyber-attacks.

Some satellites, such as America’s GPS constellation, blur the distinction between military and civilian assets. Over the past decade, America’s armed forces have put payloads on three commercial satellites, and plan to pay Japan to host others on its own navigation satellites….Then there is the question of what counts as an attack. Michael Schmitt, a law scholar, and Kieran Tinkler, a professor at the us Naval War College, say it is unclear whether jamming a civilian satellite would violate the general prohibition on attacking civilian objects. Blowing up a military one, meanwhile, might or might not constitute an indiscriminate (and hence illegal) attack, depending on whether it could have been disabled by other means and how much debris was produced.

Perhaps the biggest difference between space war and terrestrial war is how long the consequences can last. Much of the debris from China’s 2007 test, for instance, will still be in space at the turn of the next century. The more debris, the greater the likelihood of accidental collisions with other satellites, which generates more debris in turn. Enough debris could lead to a chain reaction known as Kessler syndrome, which could render entire swathes of near-Earth space unusable for decades…

Space Junk

The Outer Space Treaty of 1967 requires states to consult each other on actions that “would cause potentially harmful interference”, though the rule has rarely been heeded. Most countries accept that, in wartime, a body of existing laws known as international humanitarian law would apply, as on Earth—something America confirmed in its “Spacepower” doctrine, published on August 10, 2020. International humanitarian law is based on principles such as distinction (between combatants and civilians) and proportionality (between civilian harm and military advantage). But how to apply such ideas in a place with few humans is not always obvious.

The Manual on International Law Applicable to Military Uses of Outer Space (MILAMOS) is being spearheaded by McGill University, in Montreal, and a separate Woomera Manual by the University of Adelaide. Both hope to publish their documents 2020…

Russia and China would like a formal treaty banning all weapons in space. Both are keen to prevent America from deploying space-based anti-missile systems which might threaten their own nuclear forces. America and its allies resist this. They argue that it is impossible to define a space weapon—anything that manoeuvres in orbit could serve as one—and that it would be easy to cheat. The European Union has instead proposed a voluntary code of conduct. Many non-Western countries would prefer a binding treaty…. Though most are not space powers, many are likely to become so in the future, so their buy-in is important.

Excerpts from Satellite warfare: An arms race is brewing in orbit, Economist, Aug. 15, 2020

The Worst Murderer: Jihadists or Governments?

Sahel: West Africa’s most populous countries, along the Atlantic coast, have become vulnerable to the predations of jihadists spilling out of failing states farther north in the Sahel on the borders of the Sahara desert. Jihadists seized control of chunks of Mali in 2012 and were stopped from overrunning Bamako, its capital, only after thousands of French troops were hurriedly flown in. The insurgents have since pushed across the border into Niger and Burkina Faso. In those three countries alone, 4,800 people lost their lives in the conflict last year. Fully 1.7m people have been forced to flee their homes. Now the war is beginning to jump borders again, putting at risk some of Africa’s fastest-growing economies, including Benin, Ghana and Ivory Coast.


This war in the Sahel has been growing rapidly. Ten times more people were killed last year than in 2014 (excluding deaths in north-eastern Nigeria, which faces its own jihadist insurgents). Two main jihadist groups are behind most of the fighting: the Islamic State in the Greater Sahara (ISGS) and Jama’at Nasr al-Islam wal Muslimin (JNIM), which is linked to al-Qaeda. These groups have extended their reach, even though thousands of international peacekeepers and local and Western soldiers have been deployed to stop them. France has sent some 5,100 troops to the Sahel, while the United States has provided another 1,200. In addition, the un has 15,000 blue helmets there, including about 350 Germans, plus 250 British soldiers who are soon to arrive. With American forces leaving Afghanistan, the Sahel will soon be the West’s biggest combat zone.

Worse, the jihadists are expanding in three directions at once. To the south they threaten Benin, Ghana, Ivory Coast and Togo. To the west there has been a spate of attacks in Mali close to its border with Senegal; and to the east with Nigeria’s insurgent groups. The jihadists already have a “de facto safe haven in northern Mali”, says General Dagvin Anderson, in charge of America’s commandos in Africa. He frets that as they expand they will have more scope to plan attacks on American soil.

The weakness of governments and the feebleness of their public services are helping the jihadists. In the neglected hinterlands of the Sahel the rebels offer themselves as an alternate state, serving up sharia and medical aid. Moreover, the jihadists have been adept at exploiting ethnic faultlines, for instance between largely Muslim and seminomadic Fulani herders and more settled farming communities, which have their own armed groups of traditional hunters known as Dozos. =

Trade and commerce also provide an incentive for the jihadists to expand their reach. The migration corridor between Burkina Faso and Ivory Coast is the busiest in Africa. Jihadists cash in by taxing traders and smuggling stolen livestock, drugs and guns. The gold mines in Burkina Faso have become a target. Much of the gold is smuggled out through Togo, which officially exported seven tonnes of the metal to the United Arab Emirates in 2018, despite mining very little itself. Gold is also pulling jihadists towards Senegal…

But in 2020, more civilians in the Sahel have been killed by government soldiers than by jihadists, says José Luengo-Cabrera of the International Crisis Group (icg), a Brussels-based ngo. “When soldiers kill the head of the family, they almost throw his sons and nephews into the arms of bearded men in shorts hiding in the bush,” one villager told Human Rights Watch, a global monitor. It says in the town of Djibo alone, in Burkina Faso, evidence suggests government forces have murdered 180 men—many of them were blindfolded and had their hands bound before they were shot. In Burkina Faso… citizens may feel safer living among terrorists than with their own country’s security forces.

Governments in the region and some Western forces have made matters worse by supporting militias. In 2018 the French army allied itself with Tuareg militias from Mali to fight against ISGS. They clobbered the jihadists but also killed scores of civilians, aggravating ethnic tensions and fuelling recruitment by the insurgents….Above all, governments need to regain legitimacy by providing services and holding themselves to account. “It is not possible to win the war if there is not trust from the population,” says Niagale Bagayoko of the African Security Sector Network…But good governance and decent services in the region are scarce. At a meeting of Sahelian leaders with Mr hard. In Burkina Faso alone, the jihadists have forced about 2,500 schools to close.

Excerpts from Jihad in the Sahel: Fighting a Spreading Insurgency, Economist, July 11, 2020

Leave No Oil Under-Ground: OPEC against US Frackers

In 2014-16, the OPEC waged a failed price war to wipe out American frackers. Since then the cartel and its partners, led by Russia, have propped up oil prices enough to sustain shale, but not enough to support many members’ domestic budgets. In March 2020 Saudi Arabia urged Russia to slash output; Russia refused, loth to let Americans free-ride on OPEC-supported prices. The ensuing price war was spectacularly ill-timed, as it coincided with the biggest drop in oil demand on record.  The desire to chasten American frackers remains, though. OPEC controls about 70% of the world’s oil reserves, more than its 40% market share would suggest… If the world’s appetite for oil shrinks due to changing habits, cleaner technology or greener regulations, countries with vast reserves risk having to leave oil below ground. 

Excerpts from Crude Oil: After the Fall, Economist, June, 13, 2020

The Nuclear Option: Chopping off Hong Kong from the Dollar System

China and America have begun the fraught business of disentangling their financial systems. Chinese firms with shares listed in New York have rushed to float in Hong Kong, too, after the White House signalled they are not welcome on Wall Street….But now Hong Kong itself, the world’s third-biggest international financial centre, has become a geopolitical flashpoint. Its unique role as the conduit between global capital markets and China’s inward-looking financial system means that both sides must tread carefully.

On May 28, 2020 China said it would enact a new national-security law for Hong Kong, undermining the formulation of “one country, two systems” in place since 1997, under which the territory is supposed to be governed until 2047. In response, America has said it may downgrade the legal privileges it grants Hong Kong, which treat it as autonomous from China

Hong Kong’s place in the world depends on having the rule of law, a trusted reputation and seamless access to Western financial markets. Other Chinese cities have big stock exchanges: shares listed in Shanghai and Shenzhen are together worth a lot more than those in Hong Kong. But neither has fair courts, an independent central bank, free movement of capital or a mix of Western and Chinese firms. These foundations are the basis for $9.7trn of cross-border financial claims, such as loans, that are booked in the territory. Hong Kong is also where mainland Chinese firms and banks go to deal in the dollar, the world’s dominant currency. Some $10trn of dollar transactions flowed through Hong Kong’s bank-to-bank payments system last year.

Until recently, conventional wisdom held that Hong Kong’s position would be assured for 20-30 years, because it would take that long for China either to upgrade its markets to Western standards or to become so powerful that it could impose mainland practices, and the yuan, on the rest of the world. But the trade war, a year of street protests and China’s iron-fisted response to them raise new questions about Hong Kong’s durability. Bullying from Beijing erodes the sense that it is autonomous. And there is an outside chance that America could impose sanctions or other restrictions that would stop some Hong Kong officials, firms or banks from using dollars….. America’s might bring into question whether money parked in Hong Kong is still fully fungible with money in the global financial system. If these worries spread, they could destabilise Hong Kong and cause a financial shock in China and well beyond it.

The good news is that so far there is no sign of capital flight. Hong Kong’s vast deposit base has been stable in recent weeks, say its bankers. Investors are reassured by its $440bn or so mountain of foreign reserves and a long record of capable financial management. The rush of Chinese listings will bring in new cash and drum up business in the city….Nonetheless, for China the prudent policy is to try to speed up the development of the mainland’s financial capabilities so that it is less exposed to potential American punishment…Italso means another big push to boost the global role of the yuan and reduce China’s dependence on the dollar…

Excerpts from Hong Kong: Conduit’s End, Economist, June 6, 2020

Selling War Services: the Mercenaries

Despite a UN treaty banning mercenaries, their day is far from over. Some analysts think there are now more of them in Africa than ever. But can they ever be a force for good?  ….In the years after most African countries gained independence, mercenaries were notorious for supporting secessionist movements and mounting coups. 

Western governments have in the past winked at mercenary activity that served their commercial interests. But nowadays Russia is seen as the leading country egging on mercenaries to help it wield influence. It does so mainly through Wagner, ***whose founder, Yevgeny Prigozhin, is close to President Vladimir Putin.

Wagner has been hired to prop up a number of shaky African regimes. In Sudan it tried to sustain the blood-drenched dictatorship of Omar al-Bashir. He was ousted last year after big protests. In 2018 hundreds of Wagner men arrived in the Central African Republic to guard diamond mines, train the army and provide bodyguards for an embattled president, Faustin-Archange Touadéra. In Guinea, where Rusal, a Russian aluminium giant, has a big stake, Wagner has cosied up to President Alpha Condé, who has bloodily faced down protests against a new constitution that lets him have a third term in office. In Libya, despite a un arms embargo, Wagner is reported to have deployed 800-1,200 operatives in support of a rebel general, Khalifar Haftar, who has been trying to defeat the UN-recognised government….

Mercenaries have three main advantages over regular armies. First, they give plausible deniability. Using them, a government such as Russia’s can sponsor military action abroad while pretending not to. Second, they tend to be efficient, experienced, nimble and flexible. Third, they are cheaper than regular armies. Whereas soldiers receive lifelong contracts and pensions, mercenaries are often paid by the job..

***Other firms include Dyke Advisory Group (DAG) , OAM Middle East

See also The UN Working Group on the Use of Mercenaries

Excerpts from Soldiers of misfortune: Why African governments still hire mercenaries, Economist, May 30, 2020

Strangling China with Hong Kong: the Politics of Fear

The U.S. determination  that Hong Kong is no longer autonomous from mainland China, under the Hong Kong Policy Act of 1992, will have significant implications for the city’s exporters and businesses.  Sensitive U.S. technologies could no longer be imported into Hong Kong, and the city’s exports might be hit with the same tariffs levied on Chinese trade.

But the act doesn’t cover the far more extensive role Hong Kong plays as China’s main point of access to global finance.  As of 2019, mainland Chinese banks held 8,816 trillion Hong Kong dollars ($1.137 trillion) in assets in the semiautonomous city, an amount that has risen 373% in the last decade…. China’s banks do much of their international business, mostly conducted in U.S. dollars, from Hong Kong. With Shanghai inside China’s walled garden of capital controls, there is no obvious replacement.

While the U.S. doesn’t directly control Hong Kong’s status as a financial center, Washington has demonstrated its extensive reach over the dollar system, with penalties against Korean, French and Lebanese financiers for dealing with sanctioned parties. The U.S. recently threatened Iraq’s access to the New York Federal Reserve, demonstrating a growing willingness to use financial infrastructure as a tool of foreign policy.  Even though the U.S. can’t legislate Hong Kong’s ability to support Chinese banks out of existence, the role of an international funding hub is greatly reduced if your counterparties are too fearful to do business with you.

Putting the ability of Chinese banks to conduct dollar-denominated activities at risk would be deleterious to China’s ability to operate financially overseas, posing a challenge for the largely dollar-denominated Belt and Road global infrastructure initiative. It would also put the more financially fragile parts of the country, like its debt-laden property developers, under strain.  China’s hope to develop yuan into an influential currency also centers on Hong Kong’s remaining a viable global financial center—more than 70% of international trade in the yuan is done in the city.

Excerpts from Mike Bird, How the US Could Really Hurt China, WSJ, May 290, 2020

Mining the Moon: The First Mover Advantage

The US government is starting to lay down the groundwork for diplomacy on the moon. On 15 May, 2020 NASA administrator Jim Bridenstine released a set of principles that will govern the Artemis Accords on the exploration of the moon. The accords are named after NASA’s Artemis programme, the US initiative to explore the moon, with a planned launch of astronauts to the lunar surface in 2024. Other countries are also increasingly turning towards the moon, which is concerning when a landing on the moon can send up clouds of potentially hazardous dust that travel a long way across the surface and even into orbit…

At the moment, there is little practical international law governing activities on the moon. The Outer Space Treaty of 1967 deals with general space exploration, while the more specific Moon Agreement of 1984 states that “the moon and its natural resources are the common heritage of all mankind”, prohibiting the ownership of any part of the moon or any resources from the moon….However, no nation capable of human space flight has signed the Moon Agreement, effectively rendering it moot. In fact, in April 2020, US president Donald Trump issued an executive order supporting moon mining and taking advantage of the natural resources of space.

The Artemis Accords aim to protect historic locations like the Apollo landing sites but encourage mining in other areas. They also promote transparency and communication between nations, requiring signatories to share their lunar plans, register any spacecraft sent to or around the moon and release scientific data to the public.  That transparency requirement might be a stumbling block for potential parties to the accords, says Forczyk. “I really don’t know how much countries are going to be willing to share some of their more delicate, sensitive information,” she says. “

The rest of the stipulations of the Artemis Accords are about safety: nations will be able to set “safety zones” to protect their activities on the moon, they will have to work to mitigate the effects of debris in orbit around the moon and they will agree to provide emergency assistance to any astronauts in distress.

Rather than attempting to put together an international treaty, which could be difficult to negotiate before NASA’s next crewed launch to the moon, the US will sign bilateral agreements with individual countries.

Excerpts from Leah Crane, NASA’s Artemis Accords aim to lay down the law of the land on the moon, New Scientist, May 20, 2020

The Game of Chicken in the Melting Arctic

In 2018 the NATO alliance, joined by Sweden and Finland, held Trident Juncture, its largest exercise since the end of the cold war, in Norway. That involved the first deployment of an American aircraft-carrier in the Arctic Circle for three decades. Western warships have been frequent visitors since. On May 1, 2020 a “surface action group” of two American destroyers, a nuclear submarine, support ship and long-range maritime patrol aircraft, plus a British frigate, practised their submarine hunting skills in the Norwegian Sea.

Such drills are not unusual. But on May 4, 2020 some of those ships broke off and sailed further north into the Barents Sea, along with a third destroyer. Although American and British submarines routinely skulk around the area, to spy on Russian facilities and exercises covertly, surface ships have not done so in a generation. On May 7, 2020 Russia’s navy greeted the unwelcome visitors by announcing that it too would be conducting exercises in the Barents Sea—live-fire ones, in fact. On May 8, 2020… the NATO vessels departed.

It is a significant move. The deployment of destroyers which carry missile-defence systems and land-attack cruise missiles is especially assertive. After all, the area is the heart of Russian naval power, including the country’s submarine-based nuclear weapons. Russia’s Northern Fleet is based at Severomorsk on the Kola peninsula, to the east of Norway’s uppermost fringes.

Western navies are eager to show that covid-19 has not blunted their swords, at a time when America and France have each lost an aircraft-carrier to the virus. But their interest in the high north predates the pandemic. One purpose of the foray into the Barents Sea was “to assert freedom of navigation”, said America’s navy. Russia has been imposing rules on ships that wish to transit the Northern Sea Route (NSR), an Arctic passage between the Atlantic and Pacific that is becoming increasingly navigable as global warming melts ice-sheets . America scoffs at these demands, insisting that foreign warships have the right to pass innocently through territorial waters under the law of the sea. Although last week’s exercise did not enter the NSR, it may hint at a willingness to do so in the future.

On top of that, the Arctic is a growing factor in NATO defence policy. Russia has beefed up its Northern Fleet in recent years…Russian submarine activity is at its highest level since the cold war…Ten subs reportedly surged into the north Atlantic in October 2019  to test whether they could elude detection….Russia’s new subs are quiet and well-armed. As a result, NATO’s “acoustic edge”—its ability to detect subs at longer ranges than Russia—“has narrowed dramatically.”

Russia primarily uses its attack submarines to defend a “bastion”, the area in the Barents Sea and Sea of Okhotsk where its own nuclear-armed ballistic-missile submarines patrol.  A separate Russian naval force known as the Main Directorate of Deep-Sea Research (GUGI, in its Russian acronym) might also target the thicket of cables that cross the Atlantic.

The challenge is a familiar one. For much of the cold war, NATO allies sought to bottle up the Soviet fleet in the Arctic by establishing a picket across the so-called GIUK gap, a transit route between Greenland, Iceland and Britain that was strung with undersea listening posts….The gap is now back in fashion and NATO is reinvesting in anti-submarine capabilities after decades of neglect. America has stepped up flights of P8 submarine hunting aircraft from Iceland, and Britain and Norway are establishing P8 squadrons of their own. The aim is to track and hold at risk Russian nuclear subs as early as possible, because even a single one in the Atlantic could cause problems across a large swathe of ocean.

GIUK (Greenland, Iceland, UK) gap. Image from wikipedia.

But a defensive perimeter may not be enough. A new generation of Russian ship-based missiles could strike NATO ships or territory from far north of the GIUK gap, perhaps even from the safety of home ports. “This technological development represents a dramatically new and challenging threat to NATO forces…. Similar concerns led the Reagan administration to adopt a more offensive naval posture, sending forces above the gap and into the maritime bastion of the Soviet Union. 

Excerpts from Naval Strategy: Northern Fights, Economist, May 16, 2020

Our Cold War Roots: Weaponizing China’s One Child Policy

The elite US special operations forces are ill-equipped for high-tech warfare with China and Russia, experts warn, as the Trump administration pivots from the “war on terror” to a struggle with geopolitical rivals. Special operations, known for kicking down doors and eliminating high-value targets, number 70,000 personnel, cost $13bn a year and have carried much of the burden of the war on terror. But it is unclear what role they will play as the Pentagon moves to redeploy troops from Afghanistan to the Indo-Pacific to counter China’s regional ambitions.

General Richard Clarke, commander of special operations command (Socom), told an industry conference this week that the US needed to develop new capabilities to “compete and win” with Russia and China. He added that Socom must develop cyber skills and focus on influence campaigns rather than “the kill-capture missions” that characterised his own time in Afghanistan after the September 11 2001 attacks. Socom’s fighters include US Navy Seals, Army Green Berets and Marine Corps Raiders. Defence officials say China has raised military spending and research with the aim of exploiting American vulnerabilities, while Russia has tested out new technology during combat in Syria. “Maybe we are further behind than we know,” Colonel Michael McGuire told the annual Special Operations Industry Conference

McGuire highlighted US vulnerabilities in cyber security, and soft-power tactics by America’s enemies that could “drive fissures through some of our alliances”. He proposed shifting focus to defence over attack.   “You could have hundreds and thousands of engagements every single day in a fight against China. We are just not fast enough, dynamic enough or scaleable enough to handle that challenge,” said Chris Brose, chief strategy officer at Anduril…. He added “Most of the US-China competition is not going to be fighting world war three,” he said. “It’s going to be kicking each other under the table.”….

US special operators have for years had the run of the battlefield. But they face very different conditions in any fight against China, which has developed an arsenal of missiles, fighter jets, spy planes and other eavesdropping and jamming techniques that would make it hard for America to conceal troops, transport and communications. Special operations forces are not ready for operations against a near-peer foe, such as China, in a direct engagement… He called for a return to their cold war roots. “Vintage special operations forces is about stealth, cunning and being able to blend in — they were triathletes rather than muscle-bound infantrymen with tattoos,” said the former officer. 

David Maxwell, a former Green Beret and military analyst, is among those who favour a shift towards political warfare.One such idea of his would involve a popular writer being commissioned to pen fictionalised war stories based in Taiwan intended to discourage Beijing from invading the self-governing island. He told a gathering of Pacific special forces operators in February 2020 that fictional losses could “tell the stories of the demise of Chinese soldiers who are the end of their parents’ bloodline”. He argued that Beijing’s former one-child policy could be weaponised to convince China that war would be too costly. But Mr Maxwell said such ideas have yet to catch on. He added that psyops officers lamented to him that it was “easier to get permission to put a hellfire missile on the forehead of a terrorist than it is to get permission to put an idea between his ears”.

Excerpts from Katrina Manson , US elite forces ill-equipped for cold war with China, FT, May 16, 2020

Our Biggest Weakness: Weak Biodefenses + Malicious Viruses

The coronavirus that has killed over 180,000 people worldwide was not created with malice. Analysis of its genome suggests that, like many new pathogens, it originated by natural selection rather than human design. But …“Covid-19 has demonstrated the vulnerability of the US and global economy to biological threats, which exponentially increases the potential impact of an attack,” says Richard Pilch of the Middlebury Institute of International Studies. In theory, bioweapons are banned. Most countries in the world are party to the Biological Weapons Convention (BWC) of 1975, which outlaws making or stockpiling biological agents for anything other than peaceful purposes. But some countries probably make them secretly, or keep the option close at hand. America accuses North Korea of maintaining an offensive biological-weapons programme, and alleges that China, Iran and Russia dabble in dual-use biolgical research (for peaceful and military usage) research. Toxins like ricin have also been bought and sold on shady recesses of the internet known as the dark web.

Germ warfare briefly rose to prominence in September 2001, when letters laced with anthrax spores were mailed to American news organisations and senators, killing five people. That was a wake-up call. Public health became part of national security. BioWatch, a network of aerosol sensors, was installed in more than 30 cities across America. But in recent years threats from chemical weapons, like the sarin dropped by Syria’s air force and the Novichok smeared on door handles by Russian assassins, took priority.

Though the Trump administration published a national biodefence strategy in 2018, it shut down the National Security Council’s relevant directorate and proposed cuts to the laboratories that would test for biological threats. Funding for civilian biosecurity fell 27% between fiscal years 2015 and 2019, down to $1.61bn—less than was spent on buying Black Hawk helicopters.

Yet many pathogens used as weapons tend to differ from respiratory viruses in important ways. Those like anthrax, caused by bacteria which form rugged and sprayable spores, but do not spread from human to human, have the advantage of minimising the risk of rebound to the attacker. With the notable exception of smallpox—a highly contagious and lethal virus that was eradicated in 1979 but preserved by the Soviet Union for use against America (but not Europe), and now exists only in two laboratories, in America and Russia—most biological weapons would therefore have more localised effects than the new coronavirus.

Even so, the slow and stuttering response to the pandemic has exposed great weaknesses in how governments would cope…demonstrating that every part of public-health infrastructure is either broken or stretched to the max. The centrepiece of America’s biosurveillance programme, a network of laboratories designed for rapid testing, failed, says Mr Koblentz, while the national stockpile of face masks had not been substantially replenished in over a decade. Would-be attackers will take note.

In 2016 American intelligence agencies singled out genome editing as a national-security threat for the first time. Two years later a major study by the National Academies of Sciences, Engineering, and Medicine warned that synthetic biology, a potent set of methods for tinkering with or creating organisms, could, in time, be used to re-create viruses like smallpox or make existing pathogens more dangerous, such as resistant to antibiotics. In 2011 Dutch and Japanese scientists said that they had created a version of bird flu that could be transmitted between mammals by the respiratory route—an announcement that prompted the Netherlands to treat the relevant academic papers as sensitive goods subject to export controls.

In January 2020 Canadian scientists funded by an American biotech company used synthetic DNA from Germany to synthesise a microbe closely related to smallpox, indicating the ease with which it could be done. “If a potential bad actor pursues a weapons capability using sars-cov-2, the virus is now attainable in laboratories all around the world, and blueprints for assembling it from scratch have been published in the scientific literature.”

 The trouble is that biodefence has evolved slowly, says Dan Kaszeta, a former biological weapons adviser to the White House. Compact devices that can detect chemical threats and warn soldiers to don a gas mask have long been available. “That doesn’t exist for anthrax or any of the other aerosol pathogens,” says Mr Kaszeta. “Telling the difference between an anthrax spore and a bit of tree pollen is not something you can do in a couple of seconds.”

Excertps from Biodefence: Spore Wars, Economist, Apr. 25, at 19

Even the Oceans are not Free: Swarming the Seas

The Ocean of Things of Defence Advanced Research Projects Agency (DARPA) aims to  wire up the high seas with swarms of floating, connected sensors.  Such devices are not in themselves new. There are around 6,000 floating sensors deployed around the world’s oceans, run by navies and research institutes. What is unprecedented is the scale of  DARPA’s ambition. Over the next few years it hopes to deploy 50,000 sensors across 1m square kilometres of sea, an area considerably larger than Texas. The eventual goal—much more distant—is to enable the continuous monitoring and analysis of a significant fraction of the world’s oceans.

Existing “floating instrument packages”, known as floats or drifters, are often custom-built, and usually contain the highest-quality instruments available. They therefore tend to be expensive, and are bought only in small numbers. A typical existing float, designed for scientific research, is the Argo. It costs around $20,000, and can measure water temperature and salinity.  The Ocean of Things takes the opposite approach. The aim is to cram as many cheap, off-the-shelf components as possible into a single low-cost package. Current float prototypes cost around $750…That would allow tens of thousands to be deployed without breaking the bank. Large numbers are crucial for coverage. They also help compensate for inaccuracies in individual instruments.

The project’s researchers are evaluating three designs from different manufacturers, ranging in size from about six to 18 litres. One, proposed by Xerox’s Palo Alto Research Centre, is made of glass, like a traditional Japanese fishing float. A second, from a firm called Areté Associates, has an aluminium shell, and uses wood for buoyancy. Both models feature solar panels. The third, made by a company called Numurus, is made of lacquered cardboard, and relies entirely on its batteries. All three are designed to last for a year or so and are made to be as environmentally friendly as possible, with minimal use of plastics. That is important because, at the end of their mission, the floats are designed to scuttle themselves

With 361m square kilometres of ocean on the planet, a true Ocean of Things, monitoring everything on and under the water, would require about 18m floats.

Excerpts from Big Wet Data: The Ocean of Things, Economist, Mar. 14, 2020

Ethical Killing: Landmines

During the Gulf war of 1991, no fewer than 117,000 landmines were showered over Kuwait and Iraq by American planes. This barely dented the Pentagon’s vast stockpile of 19m. Just under a quarter of the devices scattered in the path of Saddam Hussein’s army were anti-personnel landmines (APLs), the sort that would soon be banned by the Anti-Personnel Mine Ban Convention of 1997, widely known as the Ottawa treaty. The Ottawa treaty has 164 parties, all of which ban the production and use of APL (anti-vehicle mines, among others, are still allowed). America is not among them. When the treaty was finalised, America declined to join (other holdouts include China, Cuba, Iran, Russia and Syria).

Landmines have a number of military uses. They are typically used to channel opposing armies away from particular areas and into others. A minefield can force an enemy to turn, which exposes their flank and makes them especially vulnerable, says Vincent Brooks, a retired general who commanded American forces in South Korea in 2016-18. They can also be used to “canalise” the enemy, channelling attackers into unfavourable terrain, where they may be more exposed to concentrated artillery fire. …But landmines are reviled weapons, and not without good reason. “They’re indiscriminate,”… Landmine casualties have fallen sharply over the years, but at least 2,000 people were killed or wounded by manufactured or improvised APLS in 2018, according to data collected by the Landmine and Cluster Munition Monitor, a research group. Laying a mine can cost a few dollars; clearing one can require $1,000.

The Pentagon has an answer to this. It says that it only possesses, would only produce and would only use “non-persistent” landmines with the capacity to self-destruct or, failing that, to self-deactivate, with a battery losing its charge, within 30 days (some models can blow themselves up in as little as a few hours). It claims that such features are remarkably reliable. …“When the technology is brought into the battlefield, we see that the actual data doesn’t match with the promises,” says Erik Tollefsen, head of Weapons Contamination for the International Committee of the Red Cross. He says that impressive reliability rates are usually derived from tests in sterile conditions, and prove wildly exaggerated in practice. In 2002 a report by the Government Accountability Office, an agency that audits the federal government, noted that during the Gulf war one in 10,000 mines were expected to remain active, which would have produced 12 duds. The actual figure was almost 2,000.

Others argue that there are perfectly viable alternatives to APLs….In particular, remotely activated mines (rather than victim-activated ones) are allowed under the treaty if the person triggering the device has the would-be victim in sight, although this makes them harder to use at range and hostage to a breakdown of communications. In 2018 Finland—a late and reluctant signatory to Ottawa, given its long border with Russia—said it was developing a new, remote-controlled variety of anti-personnel “bounding” mine that leaps into the air and fires metal bullets downward.

Excerpts from Ethical Landmines: Watch Your Step, Economist, Feb. 15, 2020

Breath and Sweat: the Biometrics of All Private Things

It is not just DNA that people scatter to the wind as they go about their business. They shed a whole range of other chemicals as well, in their breath, their urine, their faeces and their sweat. Collectively, these molecules are referred to as metabolites….

The most common way of analysing metabolite content is gas chromatography-mass spectrometry. This technique sorts molecules by their weight, producing a pattern of peaks that correspond to different substances….There are, however, a lot of information sources out there, in the form of publicly available metabolite databases. The databases themselves are getting better, too…. A study just published by Feliciano Priego-Capote at University of Cordoba, in Spain, for example, shows it is possible to extract much meaningful information from even a dried-up drop of sweat. “The day is coming soon”, observes Cecil Lewis, a molecular anthropologist at University of Oklahoma, who is studying the matter, “when it will be possible to swab a person’s desk, steering wheel or phone and determine a wide range of incredibly private things about them….


The police may be tempted to push the boundaries as well. The fourth amendment to America’s constitution protects against unwarranted searches and seizure of evidence. This means it is hard to force someone to give a sample. But if obtaining such merely requires taking a swab of a surface in a public place—perhaps a keyboard someone has just used—the 4th amendment is unlikely to apply.

That is not necessarily wrong, if it means more criminals are caught and convicted. But it needs to be thought about carefully, because many metabolites are sticky. Cocaine is a case in point. Studies have shown that as many as two-thirds of the dollar bills in circulation in America carry traces of this substance, which might thus end up on the fingertips of the innocent, as well as the guilty.

Excerpts from Metabolites and You, Economist, Feb. 15, 2019

Biometrics Run Amok: Your Heartbeat ID, please

Before pulling the trigger, a sniper planning to assassinate an enemy operative must be sure the right person is in the cross-hairs. Western forces commonly use software that compares a suspect’s facial features or gait with those recorded in libraries of biometric data compiled by police and intelligence agencies. Such technology can, however, be foiled by a disguise, head-covering or even an affected limp. For this reason America’s Special Operations Command (SOC), which oversees the units responsible for such operations in the various arms of America’s forces, has long wanted extra ways to confirm a potential target’s identity. Responding to a request from soc, the Combating Terrorism Technical Support Office (CTTSO), an agency of the defence department, has now developed a new tool for the job.

This system, dubbed Jetson, is able to measure, from up to 200 metres away, the minute vibrations induced in clothing by someone’s heartbeat. Since hearts differ in both shape and contraction pattern, the details of heartbeats differ, too. The effect of this on the fabric of garments produces what Ideal Innovations, a firm involved in the Jetson project, calls a “heartprint”—a pattern reckoned sufficiently distinctive to confirm someone’s identity.

To measure heartprints remotely Jetson employs gadgets called laser vibrometers. These work by detecting minute variations in a laser beam that has been reflected off an object of interest. They have been used for decades to study things like bridges, aircraft bodies, warship cannons and wind turbines—searching for otherwise-invisible cracks, air pockets and other dangerous defects in materials. However, only in the past five years or so has laser vibrometry become good enough to distinguish the vibrations induced in fabric by heartprints….

Candice Tresch, a spokeswoman for the cttso…. cannot discuss the process by which heartprint libraries might be built up in the first place. One starting point, presumably, would be to catalogue the heartbeats of detainees in the way that fingerprints and dna samples are now taken routinely.

Excerpts from Personal identificationPeople can now be identified at a distance by their heartbeat, Economist, Jan 23, 2020

A Hypersonic Death: The Race to Develop Hypersonic Weapons

For decades, the U.S. military—and its adversaries—have coveted missiles that travel at hypersonic speed, generally defined as Mach 5 (5 times the speed of sound) or greater . Intercontinental ballistic missiles (ICBMs) meet that definition when they re-enter the atmosphere from space. But because they arc along a predictable ballistic path, like a bullet, they lack the element of surprise. In contrast, hypersonic weapons such as China’s waverider maneuver aerodynamically, enabling them to dodge defenses and keep an adversary guessing about the target.

The US Department of Defense (DOD) is leading a new charge, pouring more than $1 billion annually into hypersonic research. Competition from ambitious programs in China and Russia is a key motivator. Although hype and secrecy muddy the picture, all three nations appear to have made substantial progress in overcoming key obstacles, such as protecting hypersonic craft from savage frictional heating. Russia recently unveiled a weapon called the Kinzhal, said to reach Mach 10 under its own power, and another called Avangard that is boosted by a rocket to an astonishing Mach 27. China showed off a rocket-boosted hypersonic glide vehicle (HGV) of its own, the Dongfeng-17, in a recent military parade. The United States, meanwhile, is testing several hypersonic weapons. “It’s a race to the Moon sort of thing,” says Iain Boyd, an aerospace engineer at the University of Colorado, Boulder. “National pride is at stake.”

China’s military sees hypersonic weapons (as well as cyberwarfare and electromagnetic pulse strikes) as an “assassin’s mace”: a folklore term for a weapon that gives an advantage against a better-armed foe. If tensions were to spike over Taiwan or the South China Sea, for instance, China might be tempted to launch preemptive strikes with conventional hypersonic weapons that could cripple U.S. forces in the Pacific Ocean.For now, maneuverability at hypersonic speeds makes the weapons nearly impossible to shoot down—unstoppable…

At hypersonic speeds,  “You’re flying under extraordinary conditions”—extreme velocities, forces, and temperatures.  At hypersonic  speeds “temperatures start to get high enough to worry about… A vehicle’s survival requires resilient superalloys and ultra–high-temperature ceramics. And perhaps novel coolants…

Other nations are chasing the trio of leaders—or teaming up with them. Australia is collaborating with the United States on a Mach 8 HGV, and India with Russia on a Mach 7 Hypersonic Cruise Missile (HCM). France intends to field an HCM by 2022, and Japan is aiming for an HGV in 2026.

THE United States is largely defenseless against such weapons, at least for now, in part because it can’t track them…To remedy that shortcoming, the Pentagon plans to launch hundreds of small satellites with sensors capable of tracking heat sources an order of magnitude cooler than rocket boosters. The full Hypersonic and Ballistic Tracking Space Sensor network could be up and running by 2030, he adds. (The satellites would also be used to help guide U.S. hypersonic weapons.)  Once you have such sensors, “we can find a way to build the interceptors…Interceptors could destroy a hypersonic vehicle either by colliding with it or by detonating a warhead nearby. But Missile Defense Agency (MDA) is also exploring using directed energy: lasers, neutral particle beams, and microwaves or radio waves.

Richard StoneJan, National pride is at stake.’ Russia, China, United States race to build hypersonic weapons, Science, Jan 10, 2020

Stasi Reborn: Democratizing Internet Censorship

The internet is the “spiritual home” of hundreds of millions of Chinese people. So China’s leader, Xi Jinping, described it in 2016. He said he expected citizens to help keep the place tidy. Many have taken up the challenge. In December 2019 netizens reported 12.2m pieces of “inappropriate” content to the authorities—four times as many as in the same month of 2015. The surge does not indicate that the internet in China is becoming more unruly. Rather, censorship is becoming more bottom-up

Officials have been mobilising people to join the fight in this “drawn-out war”, as a magazine editor called it in a speech in September to Shanghai’s first group of city-appointed volunteer censors. “Internet governance requires that every netizen take part,” an official told the gathering. It was arranged by the city’s cyber-administration during its first “propaganda month” promoting citizen censorship. The 140 people there swore to report any online “disorder”…

 Information-technology rules, which took effect on December 1st, 2019 oblige new subscribers to mobile-phone services not only to prove their identities, as has long been required, but also to have their faces scanned. That, presumably, will make it easier for police to catch the people who post the bad stuff online.

Excerpt from  The Year of the Rat-fink: Online Censorship, Economist, Jan 18, 2020

Algorithms as Weapons –Tracking,Targeting Nuclear Weapons

 
New and unproved technologies—this time computer systems capable of performing superhuman tasks using machine learning and other forms of artificial intelligence (AI)—threaten to destabilise the global “strategic balance”, by seeming to offer ways to launch a knockout blow against a nuclear-armed adversary, without triggering an all-out war.

A report issued in November by America’s National Security Commission on Artificial Intelligence, a body created by Congress and chaired by Eric Schmidt, a former boss of Google, and Robert Work, who was deputy defence secretary from 2014-17, ponders how AI systems may reshape global balances of power, as dramatically as electricity changed warfare and society in the 19th century. Notably, it focuses on the ability of AI to “find the needle in the haystack”, by spotting patterns and anomalies in vast pools of data…In a military context, it may one day find the stealthiest nuclear-armed submarines, wherever they lurk. The commission is blunt. Nuclear deterrence could be undermined if AI-equipped systems succeed in tracking and targeting previously invulnerable military assets. That in turn could increase incentives for states, in a crisis, to launch a devastating pre-emptive strike. China’s rise as an AI power represents the most complex strategic challenge that America faces, the commission adds, because the two rivals’ tech sectors are so entangled by commercial, academic and investment ties.

Some Chinese officials sound gung-ho about AI as a path to prosperity and development, with few qualms about privacy or lost jobs. Still, other Chinese fret about AI that might put winning a war ahead of global stability, like some game-playing doomsday machine. Chinese officials have studied initiatives such as the “Digital Geneva Convention” drafted by Microsoft, a technology giant. This would require states to forswear cyber-attacks on such critical infrastructure as power grids, hospitals and international financial systems.  AI would make it easier to locate and exploit vulnerabilities in these…

One obstacle is physical. Warheads or missile defences can be counted by weapons inspectors. In contrast, rival powers cannot safely show off their most potent algorithms, or even describe AI capabilities in a verifiable way….Westerners worry especially about so-called “black box” algorithms, powerful systems that generate seemingly accurate results but whose reasoning is a mystery even to their designers.

Excerpts from Chaguan: The Digital Divide, Economist, Jan 18, 2019

Assassinations and Top Secret Chemicals: the case of Novichok Nerve Agent

In 2018, one of the Novichok nerve agents was used in an attempt to assassinate a former Russian spy on U.K. soil—spurring the United States and allies to lift the veil of secrecy and mount a drive to outlaw the obscure class of nerve agents, concocted in a Soviet weapons lab during the height of the Cold War. Now, their effort to amend the Chemical Weapons Convention (CWC) is about to pay off.

On 9 October, the Executive Council of the Organisation for the Prohibition of Chemical Weapons (OPCW), the body that administers the treaty, reviewed a revised proposal from Russia that would bring Novichoks under the treaty’s verification regime, along with a class of potential weapons known as carbamates. If the Russian proposal and a similar one from the United States, Canada, and the Netherlands are approved at a treaty review meeting in December 2019.

The newfound glasnost on Novichoks, also known as fourth-generation nerve agents, should spur research on their mechanism of action and on countermeasures and treatments.   Chemical weapons experts had been whispering about Novichoks for decades.   Treaty nations have long resisted adding Novichoks to the CWC’s so-called Schedule 1 list of chemical weapons, which compels signatories to declare and destroy any stockpiles. “People were worried about a Pandora’s box,” fearing such a listing would force them to regulate ingredients of the weapons, Koblentz says. That could hamper the chemical industry and might clue in enemies on how to cook them up. (Who has the agents now is anyone’s guess.) Indeed, the U.S. government for years classified the Novichok agents as top secret. “There was a desire among Western countries to keep the information as limited as possible to avoid proliferation issues,” Koblentz says.

The 2018 assassination attempt against former Russian spy Sergei Skripal in Salisbury, U.K., thrust the Novichok agents into the spotlight. The botched attack gravely sickened Skripal, his daughter Yulia, two police officers who investigated the crime scene, and a couple—Charlie Rowley and Dawn Sturgess—who a few months later happened on a perfume bottle containing the agent. After long hospitalizations, the Skripals, the officers, and Rowley recovered; Sturgess died. The United Kingdom charged two Russian men, reportedly military intelligence officers, as the alleged assailants, and obtained a European warrant for their arrest; they remain at large in Russia.

Excerpts from Richard Stone, Obscure Cold War nerve agents set to be banned, Science, Oct. 25, 2019

How to Engineer Bacteria to Search for Underground Chemical Weapons: DARPA

U.S. military researchers asked in 2019 two companies to develop new kinds of biological sensors that can detect underground disturbances or the presence of buried chemicals or weapons.

Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., are looking to Raytheon BBN Technologies, and Signature Science, for the BioReporters for Subterranean Surveillance program.  This project seeks to use indigenous and engineered organisms to sense changes of interest to military commanders in natural and built environments. Raytheon BBN and Signature Science won separate $1.6 million contracts for the Subterranean Surveillance progam.

The two companies will perform laboratory research and proof-of-concept demonstrations of biological sensing systems in well- controlled field tests that take advantage of recent advances in microbial science and synthetic biology to develop biological sensors, signal transducers, and reporters that can reveal subterranean phenomena at a distance.  Bio Reporters should be able to sense a phenomenon at least one meter below the surface, propagate a signal to the surface within seven days, and be continuously detectable on the surface at a distance of 10 meters over the subsequent seven days.

DARPA researchers want Raytheon BBN and Signature Science experts to take advantage of the extensive biological networks that exist underground to monitor large areas to increase the military’s ability to detect subterranean events without the need for precise coordinates.

Excerpts from John Keller, Researchers eye new biological sensors to to detect underground objects like buried chemicals and weapons, https://www.militaryaerospace.com,  Nov. 6, 2019

In more detail  Signature Science and its partner, the Texas A&M University Center for Phage Technology, aim to leverage modern and synthetic phage biology and the straightforward molecular genetics of the harmless soil bacterium Bacillus subtilis to generate a new platform to recognize and report on specific chemical threats underground. The Spore-Phage Amplified Detection (SPADe) method, potentially extensible to explosives, radiation or physical disturbance sensing, seeks to substantially advance currently used techniques which rely heavily on manual soil testing. 

Cyber-Attacking Nuclear Plants: the 3 000 cyber bugs

In the first half of 2019 , no country endured more cyber-attacks on its Internet of Things—the web of internet-connected devices and infrastructure—than India did. So asserts Subex, an Indian telecommunications firm, which produces regular reports on cyber-security. Between April and June of 2019, it said, recorded cyber-attacks jumped by 22%, with 2,550 unique samples of malware discovered. Some of that malicious code is turning up in hair-raising places.

On October 28, 2019 reports indicated that malware had been found on the computer systems of Kudankulam Nuclear Power Plant in Tamil Nadu, the newest and largest such power station in India. Pukhraj Singh, a cybersecurity researcher who formerly worked for the National Technical Research Organisation (NTRO), India’s signals-intelligence agency, says he was informed of the malware by an undisclosed third party in September, and notified the government.The attackers, he said, had acquired high-level access and struck “extremely mission-critical targets”…. On October 30, 2019 the body that operates nuclear power plants acknowledged, sheepishly, that a computer had indeed been infected, but it was only an “administrative” one.

Sensitive sites such as power plants typically isolate the industrial-control systems (those that control the workings of a plant) from those connected to the wider internet. They do so using air-gaps (which involve disconnecting the system from the wider world), firewalls (which monitor data-flows for suspicious traffic) or data diodes (which allow information to flow out but not in).

But breaching a computer on the outside of these digital moats is nevertheless troubling. It could have given the attackers access to sensitive emails, personnel records and other details which would, in turn, make it easier to gain access to the more isolated operational part of the plant. America and Israel are thought to have sneaked the devastating Stuxnet virus into Iran’s air-gapped uranium-enrichment plant at Natanz around 2007 by planting a USB stick on a worker, who carried it inside and plugged it in.

The culprit behind the Kudankulam attack is unknown, but left some clues. The malware in question is from a family known as DTrack, which gives attackers an intimate look at what victims are doing—down to their keystrokes. It is typically used to monitor a target, making it easier to deliver further malware. DTrack was originally developed by a group of hackers known as the Lazarus Group, who are widely assumed to be controlled or directed by North Korea.

Excerpts from On the DTrack: A cyber-attack on an Indian nuclear plant raises worrying questions, Economist, Nov. 1, 2019

How to Fool your Enemy: Artificial Intelligence in Conflict

The contest between China and America, the world’s two superpowers, has many dimensions… One of the most alarming and least understood is the race towards artificial-intelligence-enabled warfare. Both countries are investing large sums in militarised artificial intelligence  (AI), from autonomous robots to software that gives generals rapid tactical advice in the heat of battle….As Jack Shanahan, a general who is the Pentagon’s point man for AI, put it last month, “What I don’t want to see is a future where our potential adversaries have a fully ai-enabled force and we do not.”

AI-enabled weapons may offer superhuman speed and precision.  In order to gain a military advantage, the temptation for armies will be to allow them not only to recommend decisions but also to give orders. That could have worrying consequences. Able to think faster than humans, an AI-enabled command system might cue up missile strikes on aircraft carriers and airbases at a pace that leaves no time for diplomacy and in ways that are not fully understood by its operators. On top of that, ai systems can be hacked, and tricked with manipulated data.

AI in war might aid surprise attacks or confound them, and the death toll could range from none to millions.  Unlike missile silos, software cannot be spied on from satellites. And whereas warheads can be inspected by enemies without reducing their potency, showing the outside world an algorithm could compromise its effectiveness. The incentive may be for both sides to mislead the other. “Adversaries’ ignorance of AI-developed configurations will become a strategic advantage,” suggests Henry Kissinger, who led America’s cold-war arms-control efforts with the Soviet Union…Amid a confrontation between the world’s two big powers, the temptation will be to cut corners for temporary advantage. 

Excerpts from Mind control: Artificial intelligence and war, Economist,  Sept. 7, 2019

Example of the Use of AI in Warfare: The Real-time Adversarial Intelligence and Decision-making (RAID) program under the auspices of The Defense Advanced Research Projects Agency’s (DARPA) Information Exploitation Office (IXO)  focuses on the challenge of anticipating enemy actions in a military operation. In the US Air Force community, the term, predictive battlespace awareness, refers to capabilities that would help the commander and staff to characterize and predict likely enemy courses of action…Today’s practices of military intelligence and decision-making do include a number of processes specifically aimed at predicting enemy actions. Currently, these processes are largely manual as well as mental, and do not involve any significant use of technical means. Even when computerized wargaming is used (albeit rarely in field conditions), it relies either on human guidance of the simulated enemy units or on simple reactive behaviors of such simulated units; in neither case is there a computerized prediction of intelligent and forward-looking enemy actions….

[The deception reasoning of the adversary is very important in this context.]  Deception reasoning refers to an important aspect of predicting enemy actions: the fact that military operations are historically, crucially dependent on the ability to use various forms of concealment and deception for friendly purposes while detecting and counteracting the enemy’s concealment and deception. Therefore, adversarial reasoning must include deception reasoning.

The RAID Program will develop a real-time adversarial predictive analysis tool that operates as an automated enemy predictor providing a continuously updated picture of probable enemy actions in tactical ground operations. The RAID Program will strive to: prove that adversarial reasoning can be automated; prove that automated adversarial reasoning can include deception….

Excerpts from Real-time Adversarial Intelligence and Decision-making (RAID), US Federal Grants

Dodging the Camera: How to Beat the Surveillance State in its Own Game

Powered by advances in artificial intelligence (AI), face-recognition systems are spreading like knotweed. Facebook, a social network, uses the technology to label people in uploaded photographs. Modern smartphones can be unlocked with it… America’s Department of Homeland Security reckons face recognition will scrutinise 97% of outbound airline passengers by 2023. Networks of face-recognition cameras are part of the police state China has built in Xinjiang, in the country’s far west. And a number of British police forces have tested the technology as a tool of mass surveillance in trials designed to spot criminals on the street.  A backlash, though, is brewing.

Refuseniks can also take matters into their own hands by trying to hide their faces from the cameras or, as has happened recently during protests in Hong Kong, by pointing hand-held lasers at cctv cameras. to dazzle them. Meanwhile, a small but growing group of privacy campaigners and academics are looking at ways to subvert the underlying technology directly…

Laser Pointers Used to Blind CCTV cameras during the Hong Kong Protests 2019

In 2010… an American researcher and artist named Adam Harvey created “cv [computer vision] Dazzle”, a style of make-up designed to fool face recognisers. It uses bright colours, high contrast, graded shading and asymmetric stylings to confound an algorithm’s assumptions about what a face looks like. To a human being, the result is still clearly a face. But a computer—or, at least, the specific algorithm Mr Harvey was aiming at—is baffled….

Modern Make-Up to Hide from CCTV cameras

HyperFace is a newer project of Mr Harvey’s. Where cv Dazzle aims to alter faces, HyperFace aims to hide them among dozens of fakes. It uses blocky, semi-abstract and comparatively innocent-looking patterns that are designed to appeal as strongly as possible to face classifiers. The idea is to disguise the real thing among a sea of false positives. Clothes with the pattern, which features lines and sets of dark spots vaguely reminiscent of mouths and pairs of eyes are available…

Hyperface Clothing for Camouflage

 Even in China, says Mr Harvey, only a fraction of cctv cameras collect pictures sharp enough for face recognition to work. Low-tech approaches can help, too. “Even small things like wearing turtlenecks, wearing sunglasses, looking at your phone [and therefore not at the cameras]—together these have some protective effect”. 

Excerpts from As face-recognition technology spreads, so do ideas for subverting it: Fooling Big Brother,  Economist, Aug. 17, 2019

Who Owns Your Voice? Grabbing Biometric Data

Increasingly sophisticated technology that detects nuances in sound inaudible to humans is capturing clues about people’s likely locations, medical conditions and even physical features.Law-enforcement agencies are turning to those clues from the human voice to help sketch the faces of suspects. Banks are using them to catch scammers trying to imitate their customers on the phone, and doctors are using such data to detect the onset of dementia or depression.  That has… raised fresh privacy concerns, as consumers’ biometric data is harnessed in novel ways.

“People have known that voice carries information for centuries,” said Rita Singh, a voice and machine-learning researcher at Carnegie Mellon University who receives funding from the Department of Homeland Security…Ms. Singh measures dozens of voice-quality features—such as raspiness or tremor—that relate to the inside of a person’s vocal tract and how an individual voice is produced. She detects so-called microvolumes of air that help create the sound waves that make up the human voice. The way they resonate in the vocal tract, along with other voice characteristics, provides clues on a person’s skull structure, height, weight and physical surroundings, she said.

Nuance’s voice-biometric and recognition software is designed to detect the gender, age and linguistic background of callers and whether a voice is synthetic or recorded. It helped one bank determine that a single person was responsible for tens of millions of dollars of theft, or 18% of the fraud the firm encountered in a year, said Brett Beranek, general manager of Nuance’s security and biometrics business.

Audio data from customer-service calls is also combined with information on how consumers typically interact with mobile apps and devices, said Howard Edelstein, chairman of behavioral biometric company Biocatch. The company can detect the cadence and pressure of swipes and taps on a smartphone.  How a person holds a smartphone gives clues about their age, for example, allowing a financial firm to compare the age of the normal account user to the age of the caller…

If such data collected by a company were improperly sold or hacked, some fear recovering from identity theft could be even harder because physical features are innate and irreplaceable.

Sarah Krouse, What Your Voice Reveals About You, WSJ, Aug. 13, 2019

Who is Afraid of Shamoon? How to Wipe a Country Off the Face of the Earth

Suspected Iranian hackers infiltrated critical infrastructure and government computers in the Persian Gulf nation of Bahrain in July-August  2019, raising fears among leaders in the region that Tehran is stepping up its cyberattacks amid growing tensions…Hackers broke into the systems of Bahrain’s National Security Agency—the country’s main criminal investigative authority—as well as the Ministry of Interior and the first deputy prime minister’s office, according to one of the people familiar with the matter.

On July 25, 2019 Bahrain authorities identified intrusions into its Electricity and Water Authority. The hackers shut down several systems in what the authorities believed was a test run of Iran’s capability to disrupt the country, the person said. “They had command and control of some of the systems,” the person said.  The breaches appeared broadly similar to two hacks in 2012 that knocked Qatar’s natural-gas firm RasGas offline and wiped data from computer hard drives belonging to Saudi Arabia’s Aramco national oil company, a devastating attack that relied on a powerful virus known as Shamoon.  Bahrain is the smallest country in the Persian Gulf, but it is strategically important because it’s the permanent home of the U.S. Navy’s Fifth Fleet and Navy Central Command. It is closely allied with its much larger neighbor, Saudi Arabia, a regional rival of Iran.

The Bahrain authorities haven’t definitively attributed the attack to Iran, but they have been provided intelligence by the U.S. and others suggesting Iran is behind it, the people familiar with the matter said….“In the first half of 2019, the Information & eGovernment Authority successfully intercepted over 6 million attacks and over 830,000 malicious emails. The attempted attacks did not result in downtime or disruption of government services,” 

Excerpt from High-Level Cyber Intrusions Hit Bahrain Amid Tensions With Iran, WSJ, Aug. 7, 2019

How to Prepare for Deadly Flu and Nuclear Fallout

Breakthroughs in the science of programmable gene expression inspired DARPA to establish the PReemptive Expression of Protective Alleles and Response Elements (PREPARE) program with the goal of delivering powerful new defenses against public health and national security threats. DARPA has now selected five teams to develop a range of new medical interventions that temporarily and reversibly modulate the expression of protective genes to guard against acute threats from influenza and ionizing radiation, which could be encountered naturally, occupationally, or through a national security event.

The program builds from the understanding that the human body has innate defenses against many types of health threats, but that the body does not always activate these defenses quickly or robustly enough to block the worst damage. To augment existing physiological responses, PREPARE technologies would provide a programmable capability to up- or down-regulate gene expression on demand, providing timely, scalable defenses that are proportional to anticipated threats. Service members and first responders could administer these interventions prior to threat exposure or therapeutically after exposure to mitigate the risk of harm or death.

Influenza: “Researchers working within the PREPARE program seek to improve rates of survival and recovery in catastrophic scenarios for which reliable and scalable countermeasures don’t currently exist,” said Dr. Renee Wegrzyn, the PREPARE program manager….Three PREPARE teams are pursuing multi-pronged approaches to influenza defense and treatment that use programmable gene modulators to boost the human body’s natural defenses against influenza and also weaken the virus’ ability to cause harm by directly neutralizing the viral genomes. If successful, their approaches would potentially protect against virtually all influenza strains — regardless of whether a virus is newly emergent or has developed drug resistance — and would provide near instantaneous immunity, in contrast to traditional vaccines. Additionally, the teams are designing their countermeasures so that they are simple to deliver — for example, as intranasal sprays — reducing the logistical challenge of protecting large numbers of people.A team led by DNARx LLC, under principal investigator Dr. Robert Debs, aims to develop a new DNA-encoded gene therapy that helps patients fight influenza by boosting the natural immune response and other protective functions of their nasal passages and lungs.

Radiation Hazard Symbol

Ionizing Gamma Radiation: Other PREPARE teams are pursuing treatments to protect the body from the effects of ionizing gamma radiation. In humans, radiation poisoning primarily affects stem cells in the blood and gut, yet existing treatments only help to regenerate blood cells, and only with limited effect. There is no possibility for prophylactic administration of these drugs, and most must be delivered immediately following radiation exposure to provide any benefit. There are no existing medical countermeasures for radiation damage to the gut
A team led by the University of California, San Francisco, under principal investigator Dr. Jonathan Weissman, also aims to develop gene therapies to enhance resilience against ionizing radiation. The team’s approach should result in an intravenous or orally available treatment that activates innate defenses in gut and blood stem cells for a period of several weeks.

A Dose of Inner Strength to Survive and Recover from Potentially Lethal Health Threats
New tools for programmable modulation of gene expression could yield enhanced resilience against influenza and ionizing radiation for service members and first responders, DARPA Press Release, June 27, 2019

Nuclear Submarines on Fire (2)

Vladimir Putin has confirmed  on July 4, 2019  that the top-secret submarine that suffered a deadly fire was nuclear-powered, but Russia’s defence minister said the nuclear unit had been sealed off and was in “working order.”  The incident, which left 14 Russian sailors dead,  The Russian government has been slow to reveal information about the incident because the submersible, thought to be a deep-diving vessel used for research and reconnaissance, is among Russia’s most secret military projects.  The fire aboard the “Losharik” AS-31 submersible began in the battery compartment and spread through the vessel…The vessel is thought to be made of a series of orb-like compartments, which increase the submersible’s resilience and allow it to dive to the ocean floor. Once there, it can perform topographical research and participate in rescue missions. It may even be able to tap and sever communications cables on the seabed.

Officials claim the submariners sealed themselves in one of the compartments to battle the blaze and toxic fumes…A Norwegian official told Reuters there had been no “formal communication” from Russia about an incident aboard a nuclear-powered vessel, but “we would have been happy to have been informed of such incidents”….Accidents aboard submarines invariably evoke comparisons to Putin’s clumsy handling of the sinking of the Kursk nuclear submarine in 2000, which left 118 dead and families desperate for information about their loved ones.

Excerpt Putin confirms fire-hit Russian submarine was nuclear-powerered, Guardian, July 4, 2019

Black Operations are Getting Blacker: US Military

Heterogeneous Collaborative Unmanned Systems (HCUS), as these drones will be known, would be dropped off by either a manned submarine or one of the navy’s big new Orca robot submersibles.

Logo for Orca Submarine by Lockheed Martin

They could be delivered individually, but will more often be part of a collective system called an encapsulated payload. Such a system will then release small underwater vehicles able to identify ships and submarines by their acoustic signatures, and also aerial drones similar to the BlackWing reconnaissance drones already flown from certain naval vessels.

BlackWing

Once the initial intelligence these drones collect has been analysed, a payload’s operators will be in a position to relay further orders. They could, for example, send aerial drones ashore to drop off solar-powered ground sensors at specified points. These sensors, typically disguised as rocks, will send back the data they collect via drones of the sort that dropped them off. Some will have cameras or microphones, others seismometers which detect the vibrations of ground vehicles, while others still intercept radio traffic or Wi-Fi.

Lockheed Martin Ground Sensor Disguised as Rock

HCUS will also be capable of what are described as “limited offensive effects”. Small drones like BlackWing can be fitted with warheads powerful enough to destroy an SUV or a pickup truck. Such drones are already used to assassinate the leaders of enemy forces. They might be deployed against fuel and ammunition stores, too.

Unmanned systems such as HCUS thus promise greatly to expand the scope of submarine-based spying and special operations. Drones are cheap, expendable and can be deployed with no risk of loss of personnel. They are also “deniable”. Even when a spy drone is captured it is hard to prove where it came from. Teams of robot spies and saboteurs launched from submarines, both manned and unmanned, could thus become an important feature of the black-ops of 21st-century warfare.

Excerpts from Submarine-launched drone platoons will soon be emerging from the sea: Clandestine Warfare, Economist, June 22, 2019

If You Control Space, You Control Everything: Space as War Domain

The North Atlantic Treaty Organization (NATO) is looking to classify space as a domain for warfare in an attempt to deter China’s growing military power.  If NATO’s proposal succeeds, the international alliance could move forward with the development and use of space weapons.  According to NATO diplomats, the international organization is preparing to release an agreement that will officially declare space as a war domain. This means that aside from land, air and sea, space could also be used for military operations during times of war.

Although NATO’s partner countries currently own 65% of the satellites in space, China is reportedly preparing to launch a massive project that involves releasing constellations of satellites in low Earth orbit.  China Aerospace Science and Industry Corp (CASIC)  is planning to put in orbit 150 or more Hongyun satellites by 2023. Some of these satellites will provide commercial services like high-speed internet while others would be controlled by the Chinese military. These militarized satellites can be used to coordinate ground forces and to track approaching missiles.

“You can have warfare exclusively in space, but whoever controls space also controls what happens on land, on the sea and in the air,” according to Jamie Shea, a former NATO official. “If you don’t control space, you don’t control the other domains either.”

Excerpts from Inigo Monzon , NATO Prepares For Space Warfare By Militarizing Low Earth Orbit, International Business Times, June 24, 2019

How Companies Buy Social License: the ExxonMobil Example

The Mobil Foundation sought to use its tax-exempt grants to shape American laws and regulations on issues ranging from the climate crisis to toxic chemicals – with the explicit goal of benefiting Mobil, documents obtained by the Guardian newspaper show.  Recipients of Mobil Foundation grants included Ivy League universities, branches of the National Academies and well-known civic organizations and environmental researchers.  Benefits for Mobil included – in the foundation’s words – funding “a counterpoint to so-called ‘public interest’ groups”, helping Mobil obtain “early access” to scientific research, and offering the oil giant’s executives a forum to “challenge the US Environmental Protection Agency (EPA) behind-the-scenes”….

A third page reveals Mobil Foundation’s efforts to expand its audience inside environmental circles via a grant for the Environmental Law Institute, a half-century-old organization offering environmental law research and education to lawyers and judges.  “Institute publications are widely read in the environmental community and are helpful in communicating industry’s concerns to such organizations,” the entry says. “Mobil Foundation grants will enhance environmental organizations’ views of Mobil, enable us to reach through ELI activities many groups that we do not communicate with, and enable Mobil to participate in their dialogue groups.”

The documents also show Mobil Foundation closely examining the work of individual researchers at dozens of colleges and universities as they made their funding decisions, listing ways that foundation grants would help shape research interests to benefit Mobil, help the company recruit future employees, or help combat environmental and safety regulations that Mobil considered costly.  “It should be a wake-up call for university leaders, because what it says is that fossil fuel funding is not free,” said Geoffrey Supran, a postdoctoral researcher at Harvard and MIT.  “When you take it, you pay with your university’s social license,” Supran said. “You pay by helping facilitate these companies’ political and public relations tactics.”

In some cases, the foundation described how volunteer-staffed not-for-profits had saved Mobil money by doing work that would have otherwise been performed by Mobil’s paid staff, like cleaning birds coated in oil following a Mobil spill.  In 1987, the International Bird Rescue Research Center’s “rapid response and assistance to Mobil’s West Coast pipeline at a spill in Lebec, CA not only defused a potential public relations problem”, Mobil Foundation said, “but saved substantial costs by not requiring our department to fly cross country to respond”.d of trustees at the Woods Hole Oceanographic Institution (recipient of listed donations totalling over $200,000 from Mobil) and a part of UN efforts to study climate change.

Wise ultimately co-authored two UN Intergovernmental Panel on Climate Change reports, serving as a lead author on one. One report chapter Wise co-authored prominently recommended, among other things, burning natural gas (an ExxonMobil product) instead of coal as a way to combat climate change.

Excerpts from How Mobil pushed its oil agenda through ‘charitable giving’, Guardian, June 12, 2019

Your Typing Discloses Who You Are: Behavioral Biometrics

Behavioural biometrics make it possible to identify an individual’s “unique motion fingerprint”,… With the right software, data from a phone’s sensors can reveal details as personal as which part of someone’s foot strikes the pavement first, and how hard; the length of a walker’s stride; the number of strides per minute; and the swing and spring in the walker’s hips and step. It can also work out whether the phone in question is in a handbag, a pocket or held in a hand.

Using these variables, Unifyid, a private company, sorts gaits into about 50,000 distinct types. When coupled with information about a user’s finger pressure and speed on the touchscreen, as well as a device’s regular places of use—as revealed by its gps unit—that user’s identity can be pretty well determined, ction….Behavioural biometrics can, moreover, go beyond verifying a user’s identity. It can also detect circumstances in which it is likely that a fraud is being committed. On a device with a keyboard, for instance, a warning sign is when the typing takes on a staccato style, with a longer-than-usual finger “flight time” between keystrokes. This, according to Aleksander Kijek, head of product at Nethone, a firm in Warsaw that works out behavioural biometrics for companies that sell things online, is an indication that the device has been hijacked and is under the remote control of a computer program rather than a human typist…

Used wisely, behavioural biometrics could be a boon…Used unwisely, however, the system could become yet another electronic spy on people’s privacy, permitting complete strangers to monitor your every action, from the moment you reach for your phone in the morning, to when you fling it on the floor at night.

Excerpts from Behavioural biometrics: Online identification is getting more and more intrusive, Economist, May 23, 2019

Who is Afraid of the United States?

In 2018 America imposed sanctions on about 1,500 people, firms, vessels and other entities, nearly triple the number in 2016. The past six months of 2019 have been particularly eventful. America began imposing sanctions on Iran in November, and in January on Venezuela, another big oil exporter. On May 9th 2019, for the first time, it seized a ship accused of transporting banned North Korean coal.

Second, blackballed countries and unscrupulous middlemen are getting better at evasion. In March 2019advisers to the un, relying in part on Windward data, and American Treasury officials published separate reports that described common ways of doing it. Boats turn off their transmissions systems to avoid detection. Oil is transferred from one ship to another in the middle of the ocean—ships trading on behalf of North Korea find each other in the East China Sea using WeChat, a popular Chinese messaging service. Captains disguise a ship’s identity by manipulating transponder data to transmit false locations and identity numbers of different vessels.

Such methods have helped Iran and Russia transport oil to Syria, American officials say. In 2018 North Korea managed to import refined petroleum far in excess of the level allowed by multilateral sanctions. The situation in Venezuela is different—technically, America’s sanctions still allow foreigners to do business with the country. But fear that sanctions will expand mean that traditional trading partners are scarce. Nicolás Maduro’s regime this month found a shipowner to transport crude to India, according to a shipbroker familiar with the deal, but Venezuela had to pay twice the going rate.

Businesses keen to understand such shenanigans can be roughly divided into two categories. The first includes those who can profit from grasping sanctions’ impact on energy markets, such as hedge funds, analysts and traders. A squadron of firms is ready to assist them, combing through ship transmission data, commercial satellite imagery and other public and semi-public information. They do not specialise in sanctions, but sanctions are boosting demand for their tracking and data-crunching expertise.

A main determinant of Venezuela’s output, for instance, is access to the diluent it needs to blend with its heavy crude. A firm called Clipper Data has noted Russian ships delivering diluent to vessels near Malta, which then transport it to Venezuela. Kpler, a French rival, uses satellite images of shadows on lids of storage tanks to help estimate the volume of oil inside. Using transmissions data, images, port records and more, Kpler produces estimates of Iran’s exports for customers such as the International Energy Agency and Bernstein, a research firm—including a recent uptick in Iranian exports without a specific destination (see chart).

The second category of companies are wary of violating sanctions themselves. They need assistance of a different sort. Latham & Watkins, a firm that advised the chairman of EN+, which controls a Russian aluminium giant, as he successfully removed the company from America’s sanctions list this year, has seen a surge in sanctions-related business. Refinitiv, a data company, offers software which permits clients to screen partners and customers against lists of embargoed entities. Windward uses machine learning to pore over data such as ships’ travel patterns, transmissions gaps (some of which may be legitimate) and name changes to help firms identify suspicious activity. Kharon, founded last year by former United States Treasury officials, offers detailed analysis of anyone or anything on sanctions lists.

HIde and Seek: Sanctions Inc, Economist, May 18, 2019

US v. China: The Slow and Sure Conquest of Internet Infrastructure


A new front has opened in the battle between the U.S. and China over control of global networks that deliver the internet. This one is beneath the ocean. While the U.S. wages a high-profile campaign to exclude China’s Huawei Technologies Co. from next-generation mobile networks over fears of espionage, the company is embedding itself into undersea cable networks that ferry nearly all of the world’s internet data.

About 380 active submarine cables—bundles of fiber-optic lines that travel oceans on the seabed—carry about 95% of intercontinental voice and data traffic, making them critical for the economies and national security of most countries. 

The Huawei Marine’s Undersea Cable Network majority owned by Huawei Technologies, has worked on some 90 projects to build or upgrade submarine cables around the world…US o fficials say the company’s knowledge of and access to undersea cables could allow China to attach devices that divert or monitor data traffic—or, in a conflict, to sever links to entire nations.  Such interference could be done remotely, via Huawei network management software and other equipment at coastal landing stations, where submarine cables join land-based networks, these officials say.

Huawei Marine said in an email that no customer, industry player or government has directly raised security concerns about its products and operations.Joe Kelly, a Huawei spokesman, said the company is privately owned and has never been asked by any government to do anything that would jeopardize its customers or business. “If asked to do so,” he said, “we would refuse.”

The U.S. has sought to block Huawei from its own telecom infrastructure, including undersea cables, since at least 2012. American concerns about subsea links have since deepened—and spread to allies—as China moves to erode U.S. dominance of the world’s internet infrastructure…..Undersea cables are owned mainly by telecom operators and, in recent years, by such content providers as Facebook and Google. Smaller players rent bandwidth.Most users can’t control which cable systems carry their data between continents. A handful of switches typically route traffic along the path considered best, based on available capacity and agreements between cable operators.

In June 2017, Nick Warner, then head of Australia’s Secret Intelligence Service, traveled to the Solomon Islands, a strategically located South Pacific archipelago. His mission, according to people familiar with the visit, was to block a 2016 deal with Huawei Marine to build a 2,500-mile cable connecting Sydney to the Solomons.  Mr. Warner told the Solomons’ prime minister the deal would give China a connection to Australia’s internet grid through a Sydney landing point, creating a cyber risk, these people said. Australia later announced it would finance the cable link and steered the contract to an Australian company.  In another recent clash, the U.S., Australia and Japan tried unsuccessfully in September 2018 to quash an undersea-cable deal between Huawei Marine and Papua New Guinea.

U.S. and allied officials point to China’s record of cyber intrusions, growing Communist Party influence inside Chinese firms and a recent Chinese law requiring companies to assist intelligence operations. Landing stations are more exposed in poorer countries where cyber defenses tend to be weakest, U.S. and allied officials said. And network management systems are generally operated using computer servers at risk of cyber intrusion. Undersea cables are vulnerable, officials said, because large segments lie in international waters, where physical tampering can go undetected. At least one U.S. submarine can hack into seabed cables, defense experts said. In 2013, former National Security Agency contractor Edward Snowden alleged that Britain and the U.S. monitored submarine cable data. The U.S. and its allies now fear such tactics could be used against them. American and British military commanders warned recently that Russian submarines were operating near undersea cables. In 2018, the U.S. sanctioned a Russian company for supplying Russian spies with diving equipment to help tap seabed cables.


The Ionian Sea Submarine Cable Project (Greece) 

China seeks to build a Digital Silk Road, including undersea cables, terrestrial and satellite links, as part of its Belt and Road plan to finance a new global infrastructure network. Chinese government strategy papers on the Digital Silk Road cite the importance of undersea cables, as well as Huawei’s role in them. A research institute attached to China’s Ministry of Industry and Information Technology, in a paper published in September, praised Huawei’s technical prowess in undersea cable transmission and said China was poised to become “one of the world’s most important international submarine cable communication centers within a decade or two.” China’s foreign and technology ministries didn’t respond to requests for comment…

Huawei Marine Networks

Bjarni Thorvardarson, then chief executive of the cable’s Ireland-based operator, said U.S. authorities raised no objections until 2012, when a congressional report declared Huawei Technologies a national security threat. Mr. Thorvardarson wasn’t convinced. “It was camouflaged as a security risk, but it was mostly about a preference for using U.S. technology,” he said. Under pressure, Mr. Thorvardarson dropped Huawei Marine from Project Express in 2013. The older cable network continued to use Huawei equipment.

The company is now the fourth-biggest player in an industry long dominated by U.S.-based SubCom and Finnish-owned Alcatel Submarine Networks. Japan’s NEC Corp is in third place.Huawei Marine is expected to complete 28 cables between 2015 and 2020—nearly a quarter of all those built globally—and it has upgraded many more, according to TeleGeography, a research company.

Excerpts from America’s Undersea Battle With China for Control of the Global Internet Grid , WSJ, Mar. 12, 2019

Who Has the Right to Free Speech? Let Credit Cards Decide The Wikileaks Saga from 2010 to 2019

Visa and Mastercard’s partner company in Iceland, Valitor was found guilty by the Reykjavik District Court for illegally blocking payments to the controversial international nonprofit WikiLeaks – a media outlet that publishes classified documents provided by anonymous sources The case against Valitor began sometime in 2010 when a data hosting company named DataCell was given the responsibility to handle donations sent to WikiLeaks.The year 2010 was a particularly important one for the publishing company as its famous Chelsea Manning leaks made rounds in media houses across the world. However, soon after the leaks, Valitor blocked transactions from Visa card holders in Iceland to WikiLeaks, thus starting a legal tug-of-war that would last for years.

Fast forward to 2019, DataCell has finally won the legal battle against Valitor which has now been ordered to pay approximately $9.85 million to both DataCell and Wikileaks’ publishing firm, Sunshine Press Productions.

Excerpts from Iceland: Debit Card Company Fined $9.85 Million for Blocking WikiLeaks Payment, April 30, 2019

An Affordable and Risk Free Way to Kill: Drones

Armed drones have become ubiquitous in the Middle East, say Aniseh Bassiri Tabrizi and Justin Bronk of the Royal United Services Institute, a British think-tank, in a recent report. America has jealously guarded the export of such aircraft for fear that they might fall out of government hands, be turned on protesters or used against Israel. America has also been constrained by the Missile Technology Control Regime, an arms-control agreement signed by 35 countries, including Russia, that restricts the transfer of particularly capable missiles and drones (both rely on the same underlying technology).

China…has sold missile-toting drones to Egypt, Jordan, Iraq, Saudi Arabia and the United Arab Emirates (UAE). All are American security partners…. Other countries, such as Israel, Turkey and Iran, have filled the gap with their own models.  America wants to muscle its way back into the market. In April 2018 the Trump administration began loosening export rules to let countries buy armed drones directly from defence companies rather than through official channels. Drones with “strike-enabling technology”, such as lasers to guide bombs to their targets, were reclassified as unarmed. American drones are costlier and require more paperwork than Chinese models, but are more capable. ..The flood of drones into the market is already making an impact—sometimes literally. Ms Tabrizi and Mr Bronk say some Middle Eastern customers see drones as an “affordable and risk-free” way to strike across borders… 

Drone Bayraktar made by Turkey

Non-state actors are unwilling to be left out of the party. The jihadists of Islamic State often used drones in Iraq and Syria. Hizbullah used drones when it hit 23 fighters linked to al-Qaeda in Syria in 2014. The Houthi drone that bombed Al-Anad looked a lot like an Iranian model. Last year the Houthis sent a similar one more than 100km (60 miles) into Saudi Arabia before it was shot down. ..

Excerpts from Predator Pricing: Weapon Sales, Economist,  Mar. 9, 2019

The Secret Powers of Saudi Arabia — Murder not Included

In 2016 Muhammad bin Salman, Saudi Arabia’s crown prince and de facto ruler, announced the latest stage of “Saudisation”—the replacement of foreign workers with Saudi ones. It now appears the policy does not stop at swapping out bankers and bakers, but extends to ballistic missiles.  Satellite photos analysed by researchers from the Middlebury Institute of International Studies, and reported by the Washington Post, appear to show that Saudi Arabia has been building a factory for rocket engines, at an existing missile base in al-Watah, south-west of Riyadh. It seems to be configured for solid-fuel rockets, which can be launched more quickly than liquid-fuelled ones….he rocket factory was “designed, equipped and constructed by an outside entity”. Saudi Arabia has “no capacity” for such a project. The facility, he notes, closely resembles a Chinese one in Lantian.

Saudi Arabia is no newcomer to missiles. Having watched Iran and Iraq fling them at each other during the 1980s, it bought a few dozen df-3 missiles from China in 1987. It came close to unleashing them after being struck by Iraqi Scud missiles during the Gulf war in 1991. In the 2000s it probably picked up a batch of newer, more accurate Chinese df-21s.

Iran, the kingdom’s arch-rival, has been honing its missile force despite Western opposition and un rebukes, conducting 135 test launches since 1990. On December 1st, 2018  it tested one thought capable of comfortably reaching any corner of Saudi soil….Nor is Iran the only concern. Hizbullah, a Lebanese militant group nurtured and armed by Iran, has a growing arsenal of missiles; some can already reach the north-western parts of Saudi Arabia. Israel is also armed to the teeth. Though Prince Muhammad is on good terms with the Jewish state, satellite images published in 2013 reportedly showed that one of the Saudi df-3 launching pads at al-Watah was set in the direction of Tel Aviv.

Because missiles are ideal delivery systems for nuclear weapons, news of the plant has also revived worries about Saudi Arabia’s atomic intentions…Without a doubt if Iran developed a nuclear bomb,” warned Prince Muhammad last March, “we will follow suit

So the Saudis may turn to other nuclear friends. Western diplomats and spooks have long been concerned that Pakistan, whose own nuclear programme was bankrolled by Saudi Arabia, might be a ready supplier of know-how, fuel or bombs. In 1999 Saudi Arabia’s then defence minister horrified American officials by touring Pakistan’s nuclear facilities and meeting A.Q. Khan, the scientist who sold nuclear technology to North Korea, Iran and Libya. Ties remain close. Prince Muhammad was due to agree on $14bn of investment in Pakistan during a visit to the country on February 16th.  2019. ….

Excerpts from Protection rocket Saudi Arabia’s missile race, Economist, Feb. 16, 2019

How Iranian Oil Escapes US Sanctions

 At least two tankers have ferried Iranian fuel oil to Asia in February 2019 despite U.S. sanctions against such shipments, according to a Reuters analysis of ship-tracking data and port information, as well as interviews with brokers and traders.  The shipments were loaded onto tankers with documents showing the fuel oil was Iraqi. But three Iraqi oil industry sources and Prakash Vakkayil, a manager at United Arab Emirates (UAE) shipping services firm Yacht International Co, said the papers were forged.  The people said they did not know who forged the documents, nor when.

“Some buyers…will want Iranian oil regardless of U.S. strategic objectives to deny Tehran oil revenue, and Iran will find a way to keep some volumes flowing,” said Peter Kiernan, lead energy analyst at the Economist Intelligence Unit.  While the United States has granted eight countries temporary waivers allowing limited purchases of Iranian crude oil, these exemptions do not cover products refined from crude, including fuel oil, mainly used to power the engines of large ships. Documents forwarded to Reuters by ship owners say a 300,000 tonne-supertanker, the Grace 1, took on fuel oil at Basra, Iraq, between Dec. 10 and 12, 2018. But Basra port loading schedules reviewed by Reuters do not list the Grace 1 as being in port during those dates.  One Iraqi industry source with knowledge of the port’s operations confirmed there were no records of the Grace 1 at Basra during this period. 

Grace 1 oil tanker

Reuters examined data from four ship-tracking information providers – Refinitiv, Kpler, IHS Markit and Vessel Finder – to locate the Grace 1 during that time. All four showed that the Grace 1 had its Automatic Identification System (AIS), or transponder, switched off between Nov. 30 and Dec. 14, 2018, meaning its location could not be tracked.  The Grace 1 then re-appeared in waters near Iran’s port of Bandar Assaluyeh, fully loaded, data showed. The cargo was transferred onto two smaller ships in UAE waters in January, from where one ship delivered fuel oil to Singapore in February 2019.  Shipping documents showed about 284,000 tonnes of fuel oil were transferred in the cargoes tracked by Reuters, worth about $120 million at current prices…

One of those vessels, the 130,000 tonne-capacity Kriti Island, offloaded fuel oil into a storage terminal in Singapore around Feb. 5 to 7. Reuters was unable to determine who purchased the fuel oil for storage in Singapore.  The Kriti Island is managed by Greece’s Avin International SA… Avin International’s Chief Executive Officer George Mylonas told Reuters. Mylonas confirmed the Kriti Island took on fuel oil from the Grace 1.There is no indication that Avin International knowingly shipped Iranian fuel oil. Mylonas said his firm had conducted all necessary due diligence to ensure the cargo’s legitimate origin….

Kriti Island oil tanker

Excerpts from Roslan Khasawneh et al, Exclusive: How Iran fuel oil exports beat U.S. sanctions in tanker odyssey to Asia, Reuters, Mar. 20, 2019

How to Save the Rhino? Torture and Kill Civilians

In national parks across Asia and Africa, the beloved nonprofit WWF  with the cuddly panda logo funds, equips, and works directly with paramilitary forces that have been accused of beating, torturing, sexually assaulting, and murdering scores of people…WWF has provided high-tech enforcement equipment, cash, and weapons to forces implicated in atrocities against indigenous communities…Villagers have been whipped with belts, attacked with machetes, beaten unconscious with bamboo sticks, sexually assaulted, shot, and murdered by WWF-supported anti-poaching units, according to reports and document

 WWF has provided paramilitary forces with salaries, training, and supplies — including knives, night vision binoculars, riot gear, and batons — and funded raids on villages…The charity has operated like a global spymaster, organizing, financing, and running dangerous and secretive networks of informants motivated by “fear” and “revenge,” including within indigenous communities, to provide park officials with intelligence — all while publicly denying working with informants.

The charity funnels large sums of cash to its field offices in the developing world where staff work alongside national governments — including brutal dictatorships — to help maintain and police vast national parks that shelter endangered species. But many parks are magnets for poachers, and WWF expends much of its energy — and money — in a global battle against the organized criminal gangs that prey on the endangered species the charity was founded to protect.  It’s a crusade that WWF refers to in the hardened terms of war. Public statements speak of “boots on the ground,” partnerships with “elite military forces,” the creation of a “Jungle Brigade,” and the deployment of “conservation drones.”  WWF is not alone in its embrace of militarization: Other conservation charities have enlisted in the war on poaching in growing numbers over the past decade, recruiting veterans from the wars in Afghanistan and Iraq to teach forest rangers counterinsurgency techniques

The enemy is real, and dangerous. Poaching is a billion-dollar industry that terrorizes animals and threatens some species’ very existence. Poachers take advantage of regions ravaged by poverty and violence. And the work of forest rangers is indeed perilous: By one 2018 estimate, poachers killed nearly 50 rangers around the world in the previous year. But like any conflict, WWF’s war on poaching has civilian casualties.

Indigenous people living near one park in southeast Cameroon described a litany of horrors incuding dead-of-night break-ins by men wielding machetes, rifle butt bludgeonings, burn torture involving chilis ground into paste, and homes and camps torched to the ground. Their tormentors in these accounts were not poachers, but the park officials who police them. Although governments employ the rangers, they often rely on WWF to bankroll their work.  …Documents reveal WWF’s own staffers on the ground are often deeply entwined with the rangers’ work — coordinating their operations, jointly directing their raids and patrols alongside government officials, and turning a blind eye to their misdeeds.

Iindigenous groups — both small-fry hunters and innocent bystanders — say they suffer at the hands of the rangers.  Nepal’s park officials were given this free rein decades ago, shortly after WWF first arrived in Chitwan in 1967 to launch a rhinoceros conservation project in a lush lowland forest at the foot of the Himalayas. To clear the way, tens of thousands of indigenous people were evicted from their homes and moved to areas outside the park’s boundaries..

The park’s creation radically changed their way of life: Now they must scrape together money to buy tin for their roofs, pay hospital bills, and farm new crops. They also live in fear of the park’s wild animals, which, while rising in number thanks to anti-poaching efforts, have destroyed crops and mauled people to death.  Rhinoceros horns can sell for hundreds of thousands of dollars on the black market. Professional poachers offer a tiny portion to locals who assist them, which can be hard for impoverished residents of villages to turn down.

Chitwan’s forest rangers work alongside over 1,000 soldiers from the park’s army battalion. Nepalese law gives them special power to investigate wildlife-related crimes, make arrests without a warrant, and retain immunity in cases where an officer has “no alternative” but to shoot the offender, even if the suspect dies….. Indigenous groups living near Chitwan have long detailed a host of abuses by these forces. Villagers have reported beatings, torture, sexual assaults, and killings by the park’s guards. They’ve accused park officials of confiscating their firewood and vegetables, and forcing them into unpaid labor.

WWF’s work with violent partners spans the globe. In Central Africa, internal documents show the charity’s close involvement in military-style operations with both a repressive dictatorship and a notoriously fierce army. …The park’s management plan says WWF will help organize raids, known as “coup de poings,” on local villages suspected of harboring poachers. A confidential internal report found that such missions, frequently conducted in the dead of night with the help of police units, were often violent.

Excerpts from WWF Funds Guards Who Have Tortured And Killed People, BuzzFeed News

US Special Forces in Africa: the G-5 Sahel

The number of attacks in Burkina Faso  have increased as al Qaeda- and ISIS-linked groups have established a presence there, attacking remote gendarmerie outposts and expanding their reach from Mali and Niger in attempt to take advantage of what they see as a permissible environment.  The number of violent incidents in Burkina Faso linked to the local affiliates of al Qaeda JNIM* and ISIS (Greater Sahara) rose from 24 in 2017 to 136 in 2018, according to a report by the Africa Center for Strategic Studies. 

 US Special Forces that train the Burkina Faso military told CNN in March 2019 that the US was considering deploying surveillance drones to Burkina Faso in order to help the country better monitor threats…The Burkina Faso, Mali, Niger, Mauritania and Chad, make up the G-5 Sahel, a multinational task force charged with combating transnational terrorists….A Burkinabe officer told CNN on Monday that terror groups had managed to recruit locals in the north of the country by exploiting the economic situation in the region, where many live in povert

**the local branch of al Qaeda, Jama’at Nasr al-Islam wal Muslimin (JNIM), commands over 800 fighters while ISIS in the Greater Sahara has approximately 300 members.

Excerpts from US Forces Train in African Nation Facing Twin Terror Threat, CNN, Mar. 2, 2019

US Military Leaves but CIA Remains: Syria

Is there a way for the United States and its allies to remain in northeastern Syria, even after President Trump pledged in December 2018 to withdraw U.S. military forces there? Officials are struggling to devise such a “workaround” strategy…One possibility, according to U.S. and foreign officials, would be to have paramilitary officers from the Central Intelligence Agency take over the training and advising of the Kurdish-led Syrian Democratic Forces (SDF). Since 2015, those duties have been carried out by U.S. Special Operations forces.  This approach, still in the discussion stage, would allow Trump to claim he is delivering on his pledge to withdraw troops from Syria, without creating a vacuum in the northeast that would be exploited by Turkey, Iran, Russia and the Syrian regime…

This new option, in the language of government lawyers, would mix Title 10 overt military operations and Title 50 covert action. Reduced military activity could continue under Title 10 authority, to provide air cover and logistical support for U.S. and allied troops on the ground, but the SDF’s advisers might be CIA officers. The CIA operatives, like existing Special Forces personnel, wouldn’t be involved directly in ground combat…

A paramilitary advisory force, operating under Title 50, would have some significant disadvantages…. Current U.S. military forces in Syria can deter adversaries because they carry the U.S. flag, literally and figuratively. A paramilitary force wouldn’t have that same deterrent capability, or the ability to deconflict operations with other forces in the area, such as Russia and Turkey. ..

Given the U.S. and European policy muddle, SDF commanders must weigh whether to make their own accommodation with Russia and the Syrian regime. The United Arab Emirates is said to favor such an approach, and some longtime SDF supporters say a deal with the regime would be safer for the Kurds than depending on a fickle United States and a gun-shy Europe.

Excerpts from David Ignatius, How the U.S. might stay in Syria, and leave at the same time, Washington Post, Feb. 16, 2019

The Nine and their Nuclear Weapons

Nine nationst control the roughly 14,200 nuclear weapons in the world… But What makes a good nuclear arsenal?  First, a good nuclear doctrine. Will a country strike first, or only in response?  Second, safety. Are the nukes secure? Does the country participate in nonproliferation treaties?
Third, do the nukes work as intended? Is the arsenal sufficient? Can the nukes survive an initial attack?…Business Insider has weighed these questions with the help of Hans Kristensen, the director of the Nuclear Information Project at the Federation of American Scientists, to rank the world’s nuclear arsenals.

9. North Korea: North Korea fails by virtually every metric used to measure nuclear arsenals… Because Pyongyang can never hope to defeat any of its enemies in conventional fighting, it turned to nukes as a guarantor of its security.  Weapons count: estimated 60. North Korea has a number of short- to intercontinental-range ballistic-missile systems thought to operate off the backs of mobile missile launchers.  One analyst has warned that North Korea’s mobile launchers may simply distract from the real threat of hidden nuclear silos, but no evidence of such silos has ever appeared in US intelligence reports made public.  It’s completely unknown if North Korea keeps its nuclear weapons mated or with the warhead affixed to the missile.

8. Pakistan: Pakistan built nuclear weapons in response to its bitter regional rival, India, testing and proceeding with a relatively simple nuclear mission: deter or defeat India….Pakistan has links to Islamic extremists with connections to global terror networks. Experts have long feared not enough has been done to secure Islamabad’s nukes against these threats.  Additionally, “Pakistan has lowered the threshold for nuclear weapons use,” by building smaller, tactical nuclear weaponsWeapons count: 150.  Pakistan has ballistic missiles with ranges just long enough to hit anywhere in the country of India….The US has specifically given Pakistan permission to modify its F-16 fighters to drop nuclear weapons…Pakistan is thought to keep its nuclear warheads separate from its missiles and delivery systems.

7. India: “India is still a nuclear posture that’s still in vivid development,” Just as Pakistan fears India’s greater strength and numbers, India has come to fear China’s growing and modernizing conventional forces.  But unlike Pakistan, India has sworn off nuclear first strikes and not looked into tactical nuclear weapons. ..But India’s submarine fleet remains a dream at the moment, lowering its overall score.  Weapons count: 140 (stored)  India recently launched its first nuclear-powered submarine..As it stands, the missiles and submarine India has picked out for its underwater nuclear deterrent can’t range China’s vital points or most of Pakistan.

6. Russia: “Russia seems to sort of be driven by a frantic exploitation of different options,”   Weapons count: 6,850 (1,600 deployed; 2,750 stored; 2,500 retired).  Russia has the full nuclear triad with constantly modernized bombers, land-based missiles, and submarines. The triad is a true 24/7/365 force with submarines on deterrence patrols at all times.  Additionally, Russia has a high number of tactical nuclear weapons with shorter-range and smaller-explosive yield…Russia’s Poseidon underwater 100 to 200 megaton nuclear torpedo is the biggest nuclear explosive device ever built…The weapon would essentially set off tidal waves so large and an explosion so radioactive and punishing that continents, not countries, would pay the price for decades.  The US has not found it useful to respond to these doomsday-type devices.  Russia stores its nuclear warheads mated to missiles and ready to fire. Additionally, it has surrounded Moscow with 68 nuclear-tipped missile interceptors meant to protect the city from a US strike.

5. Israel:   “Israel is interesting because it’s a semi-dormant nuclear program, but it’s not dormant,” …Israel’s conventional military, with its top-of-the-line air force and close coordination with the US, easily overpowers its regional foes in traditional fighting.  Instead of reaching for nuclear weapons to threaten a more powerful foe, Israel has a “very relaxed nuclear posture, truly what you could call a last resort posture,”  Weapons count: estimated 80..Truly, nobody knows what weapons Israel has or doesn’t have, and that’s the way they like it.

4. UK:   Weapons count: 215 (120 deployed; 95 stored)  During the Cold War, the UK labored to create its own nuclear weapons and delivery systems, but since the collapse of the Soviet Union, the UK has withdrawn from that posture and essentially become a client of the US.  The UK operates four nuclear submarines that fire can fire 16 Trident missiles made by the US. That’s it. The UK won’t get an “arsenal” page for this reason. The warheads on these patrols are mated to missiles.

3. France:  France has a long history with nuclear weapons, like the UK, but has maintained more independence and control over its stockpile and doctrine.  Weapons count: 300 (290 deployed; 10 stored)..France has four nuclear-powered submarines, one of which stays on a constant deterrence patrol ready to fire mated nuclear missiles.  While it’s not a nuclear weapon outright, outside of the US, only France operates a nuclear-powered aircraft carrier, the Charles de Gaulle.

2. US: Weapons count: 6,450 (1,750 deployed; 2,050 stored; 2,650 retiredd)Today the US’s nuclear arsenal has narrowed down to a triad in constant stages of modernization.  The US operates two nuclear-capable bombers, the B-2 Spirit stealth bomber and the B-52 Stratofortress, originally built in the 1950s and slated to fly for 100 years.  The US operates a fleet of nuclear submarines, which it keeps on constant deterrence patrols.  The US also has nearly 400 intercontinental-range missiles in silos around the country, mostly aimed at Russia’s nuclear weapons for an imagined “mutual destruction” scenario.  Recently, the US has come under intense criticism for President Donald Trump’s proposal to build more smaller or tactical nuclear weapons. Experts say these weapons make nuclear war more likely.  The US has tactical nuclear weapons stored around Europe and Turkey, which, like the bigger strategic weapons, are stored mated.


1. China:   China has just 280 nuclear warheads, and none of them are mated to delivery systems. China flies bombers and sails submarines that it calls nuclear-capable, but none of them have ever actually flown with nuclear weapons.  China’s nuclear doctrine forbids first strikes and centers around the idea that China would survive a nuclear strike, dig its bombs out of deep underground storage, and send a salvo of missiles back in days, months, or years.  This essentially nails the idea of “credible minimum deterrence.” Everyone knows China has nuclear weapons, that they work, and nobody doubts China would use them if it first received a nuclear attack.  China has nuclear-capable submarines and bombers, but they do not ever travel with nuclear weapons on board.  China relies on a growing and modernizing conventional military to assert its will on other countries and virtually never mentions its nuclear arsenal.

Excerpts from Alex Lockie,  We ranked the world’s nuclear arsenals — here’s why China’s came out on top, Business Insider, Jan. 25, 2019

After Khashoggi: the Saudi Missiles

Satellite images suggest that Saudi Arabia has constructed its first known ballistic missile factory, according to weapons experts and image analysts, a development that raises questions about the kingdom’s increasing military and nuclear ambitions under its 33-year-old crown prince.  If operational, the suspected factory at a missile base in al-Watah, southwest of Riyadh, would allow Saudi Arabia to manufacture its own ballistic missiles, fueling fears of an arms race against its regional rival Iran.  Saudi Arabia currently does not possess nuclear weapons, so any missiles produced at the apparent factory are likely to be conventionally armed. But a missile-making facility would be a critical component of any eventual Saudi nuclear weapons program, hypothetically giving the kingdom capability to produce the preferred delivery systems for nuclear warheads.

Two additional missile experts who reviewed the satellite images for The Washington Post… agreed that the high-resolution photographs of the al-Watah site appear to depict a ­rocket-engine production and test facility, probably using solid fuel…The complex…highlights the nation’s intention to make its own advanced missiles after years of seeking to purchase them abroad, at times successfully….

Saudi Arabia has been pursuing a nuclear power-plant deal with the United States that would potentially include allowing it to produce nuclear fuel. The kingdom’s insistence on domestic fuel production has raised worries among U.S. officials that the kingdom wants the atomic power project not only for civil use but also for covert weapon-making purposes. ..

How the Saudis obtained the technological expertise necessary to build the facility is unclear. One potential supplier: China…China has sold ballistic missiles to Saudi Arabia in the past and has helped supply ballistic missile production capabilities to other nations. In the 1990s, Pakistan secretly built a plant for medium-range missiles using blueprints and equipment supplied by China. The factory in Pakistan has long drawn the attention of top Saudi officials. ..

The main way the United States seeks to prevent the spread of drone and missile technology is through the Missile Technology Control Regime, or the MTCR, an informal multicountry pact designed to prevent the transfer of certain missile technologies. China is not a member but has agreed to abide by some of its stipulations.   While the United States sells an array of weaponry to Saudi Arabia, Washington has not sold ballistic missiles to Riyadh, in part because such missiles traditionally have been seen as destabilizing for the region. Saudi Arabia has turned to China in the past when met with refusals from the United States for certain weapons requests.

For example, the United States declined repeated Saudi requests to purchase what are known as category-one American drones, including Predators and Reapers, partly because of MTCR’s regulations. Instead, the kingdom turned to China, first purchasing drones and later striking a deal in which China will build a drone factory that will produce a Chinese copycat of the Predator in Saudi Arabia.

Excerpts Paul Sonne, Can Saudi Arabia produce ballistic missiles? Satellite imagery raises suspicions, Washington Post, Jan. 22, 2019

HyperSonic Gliders: Arms Race at the Speed of Sound

Hypersonics are like missiles that travel at over five times the speed of sound, but are able to manoeuvre in mid-flight, making them much harder to track and intercept than traditional projectiles.  France is the fourth of the five permanent UN Security Council members to join the so-called “stealth by speed” contest, after China, Russia and the United States.  “We have decided to issue a contract for a hypersonic glider”–V-MaX (Experimental Manoeuvering Vehicle)–that can travel at over 6,000 kilometres per hour, Defence Minister Florence Parly said last week, promising a test flight by the end of 2021.

In March 2018, Russian President Vladimir Putin stunned Western military analysts – and many in Russia – by unveiling plans for a new arsenal of hypersonic weapons which he said would render missile defence systems obsolete….A few months later US President Donald Trump threatened to walk away from a key arms control treaty with Moscow.

Hypersonic gliders would be carried to the end of the earth’s atmosphere by a launch vehicle and would then “glide” back to a target on the ground. “The goal is high-speed manoeuvrability. That’s how it differs from a ballistic trajectory,” the French government’s defence procurement and technology agency (DGA) said.  “Once the initial speed is reached, we can play with speed and altitude to move up and down, to the left and to the right, creating a trajectory that is more difficult to intercept,” it said…

In December 2018, the Kremlin touted the capabilities of its new hypersonic glider, aptly named “Avanguard”.  The Kremlin said that in tests, the intercontinental projectile reached 27 times the speed of sound – 33,000 kilometres per hour, or Mach 27.  “At this speed, not a single intercepter missile can shoot it down,” Deputy Prime Minister Yury Borisov boasted.  China has also reportedly carried out several successful tests since 2014 of a glider that can reach speeds of between Mach 5 and Mach 10.

Excerpts from Race for ‘hypersonic’ weapons heats up as France joins fray, Agence France Presse, Jan. 29, 2019

Shut-out, Cut-off and Suicidal: Aliens v. America

The United States leads the world in punishing corruption, money-laundering and sanctions violations. In the past decade it has increasingly punished foreign firms for misconduct that happens outside America. Scores of banks have paid tens of billions of dollars in fines. In the past 12 months several multinationals, including Glencore and ZTE, have been put through the legal wringer. The diplomatic row over Huawei, a Chinese telecoms-equipment firm, centres on the legitimacy of America’s extraterritorial reach.

America has taken it upon itself to become the business world’s policeman, judge and jury. It can do this because of its privileged role in the world economy. Companies that refuse to yield to its global jurisdiction can find themselves shut out of its giant domestic market, or cut off from using the dollar payments system and by extension from using mainstream banks. For most big companies that would be suicidal.

But as the full extent of extraterritorial legal activity has become clearer, so have three glaring problems.  First, the process is disturbingly improvised and opaque. Cases rarely go to court and, when they are settled instead, executives are hit with gagging orders. Facing little scrutiny, prosecutors have applied ever more expansive interpretations of what counts as the sort of link to America that makes an alleged crime punishable there; indirect contact with foreign banks with branches in America, or using Gmail, now seems to be enough. Imagine if China fined Amazon $5bn and jailed its executives for conducting business in Africa that did not break American law, but did offend Chinese rules and was discussed on WeChat.

Second, the punishments can be disproportionate. In 2014 bnp Paribas, a French bank, was hit with a sanctions-related fine of $8.9bn, enough to threaten its stability. In April ZTE, a Chinese tech firm with 80,000 employees, was banned by the Trump administration from dealing with American firms; it almost went out of business. The ban has since been reversed, underlining the impression that the rules are being applied on the hoof.

Third, America’s legal actions can often become intertwined with its commercial interests. As our investigation this week explains, a protracted bribery probe into Alstom, a French champion, helped push it into the arms of General Electric, an American industrial icon. American banks have picked up business from European rivals left punch-drunk by fines. Sometimes American firms are in the line of fire—Goldman Sachs is being investigated by the doj for its role in the 1mdb scandal in Malaysia. But many foreign executives suspect that American firms get special treatment and are wilier about navigating the rules.

America has much to be proud of as a corruption-fighter. But, for its own good as well as that of others, it needs to find an approach that is more transparent, more proportionate and more respectful of borders. If it does not, its escalating use of extraterritorial legal actions will ultimately backfire. It will discourage foreign firms from tapping American capital markets. It will encourage China and Europe to promote their currencies as rivals to the dollar and to develop global payments systems that bypass Uncle Sam…. Far from expressing geopolitical might, America’s legal overreach would then end up diminishing American power.

Excerpts from Tackling Corruption: Judge Dread, Economist, Jan. 19, 2019

The Space Rat Race

India, Japan and other space-faring countries are waking up to a harsh reality: Earth’s orbit is becoming a more dangerous place as the U.S., China and Russia compete for control of the final frontier…New Delhi is nervous because China has made no secret of its desire for influence in the Indian Ocean. China set up a naval base in Djibouti, a gateway to the ocean at the Horn of Africa. It secured a 99-year lease to the port of Hambantota in Sri Lanka. It is deeply involved in development projects in Maldives.

India has established itself as a player in the budget satellite business. It even put a probe into orbit around Mars in 2014, in a U.S.-assisted project that cost just $76 million. But it is scurrying to enhance its ability to monitor China’s activities, and the partnership with Japan is part of this.  Another sign that space is becoming a defense focus for India came on Dec. 19, when the country launched its third military communications satellite, the GSAT-7A. The satellite will connect with ground-based radar, bases and military aircraft, along with drone control networks.

China’s success in landing a craft on the far side of the moon on Jan. 3, 2019 came as a fresh reminder of its growing prowess. In late December, China also achieved global coverage with its BeiDou Navigation Satellite System. Only the U.S., Russia and the European Union had that capability.China aims to launch a Mars explorer in 2020 and complete its own Earth-orbiting space station around 2022.  In the back of Indian and Japanese officials’ minds is likely a stunning test China conducted in 2007. Beijing successfully destroyed one of its own weather satellites with a weapon, becoming only the third nation to pull off such a feat, after the Soviet Union and the U.S.

In December 2018, President Donald Trump ordered the Department of Defense to create a Space Command, widely seen as a precursor to a full-fledged Space Force.  There were 1,957 active satellites orbiting Earth as of Nov. 30, 2018 according to the Union of Concerned Scientists, a nonprofit U.S. advocacy group. America had the most by far, with 849, or 43% of the total. China was No. 2, with 284, followed by Russia with 152.  Japan and India had a combined 132 — 75 for the former and 57 for the latter.

Excerpts fromNUPUR SHAW India and Japan awaken to risks of superpower space race, Nikkei Asian Review, Jan. 8, 2019

Devil’s Idea for Tokyo’s End: Fukushima

By late March 2011… after tsunami struck the Fukushima Daiichi plant—it was far from obvious that the accident was under control and the worst was over. Chief Cabinet Secretary Yukio Edano feared that radioactive material releases from the Fukushima Daiichi plant and its sister plant (Fukushima Daini) located some 12 km south could threaten the entire population of eastern Japan: “That was the devil’s scenario that was on my mind. Common sense dictated that, if that came to pass, then it was the end of Tokyo.”

Prime Minister Naoto Kan asked Dr. Shunsuke Kondo, then-chairman of the Japanese Atomic Energy Commission, to prepare a report on worst-case scenarios from the accidenta .  Dr. Kondo led a 3-day study involving other Japanese experts and submitted his report (Kondo, 2011) to the prime minister on March 25, 2011. The existence of the report was initially kept secret because of the frightening nature of the scenarios it described. An article in the Japan Times quoted a senior government official as saying, “The content [of the report] was so shocking that we decided to treat it as if it didn’t exist.” …

One of the scenarios involved a self-sustaining zirconium cladding fire in the Unit 4 spent fuel pool. Radioactive material releases from the fire were estimated to cause extensive contamination of a 50- to 70-km region around the Fukushima Daiichi plant with hotspots significant enough to require evacuations up to 110 km from the plant. Voluntary evacuations were envisioned out to 200 km because of elevated dose levels. If release from other spent fuel pools occurred, then contamination could extend as far as Tokyo,…There was particular concern that the zirconium cladding fire could produce enough heat to melt the stored fuel, allowing it to flow to the bottom of the pool, melt through the pool liner and concrete bottom, and flow into the reactor building.

Lessons Learned from the Fukushima Daiichi Accident for Spent Fuel Storage: The U.S. nuclear industry and its regulator should give additional attention to improving the ability of plant operators to measure real-time conditions in spent fuel pools and maintain adequate cooling of stored spent fuel during severe accidents and terrorist attacks. These improvements should include hardened and redundant physical surveillance systems (e.g., cameras), radiation monitors, pool temperature monitors, pool water-level monitors, and means to deliver pool makeup water or sprays even when physical access to the pools is limited by facility damage or high radiation levels….

[At nuclear power plants there must be…adequate separation of plant safety and  security systems so that security systems can continue to function independently if safety systems are damaged. In particular, security systems need to have independent, redundant, and protected power sources…]

Excerpts from Lessons Learned from the Fukushima Accident for Improving
Safety and Security of U.S. Nuclear Plants: Phase 2, US National Academies, 2016

Killing Machines: Tiny Spy Satellites

As long as we’ve been launching spy satellites into space, we’ve been trying to find ways to hide them from the enemy. Now, thanks to the small satellite revolution—and a growing amount of space junk—America has a new way to mask its spying in orbit…

The National Reconnaissance Office, the operator of many of the U.S.’s spy sats, refused to answer any questions about ways to hide small satellites in orbit.  In 2014, Russia launched a trio of communications satellites. Like any other launch, spent stages and space debris were left behind in space. Air Force Space Command dutifully catalogued them, including a nondescript piece of debris called Object 2014-28E.  Nondescript until it started to move around in space, that is. One thing about orbits; they are supposed to be predictable. When something moves in an unexpected way, the debris is not debris but a spacecraft. And this object was flying close to the spent stages, maneuvering to get closer.  This fueled speculation that the object could be a prototype kamikaze-style sat killer. Other less frantic speculation postulated that it could be used to examine other sats in orbit, either Russia’s or those operated by geopolitical foes. Either way, the lesson was learned…

Modern tracking radar is supposed to map space junk better than ever before. But small spy satellites that will hide in the cloud of space debris may go undetected, even by the most sophisticated new radar or Earth-based electronic signals snooping.

Excerpts from Joe Pappalardo, Space Junk Could Provide a Perfect Hiding Spot for Tiny Spy Satellites, Popular Mechanics, Nov. 30, 2018

Killing US Enemies: Covert Operations

The U.S. has some of the best special operations units in the world, but they can’t do everything on their own. The American military relies on allied special operators from places like Britain, Iraq, and Israel to collect intelligence and kill enemy insurgents and soldiers. Here are 6 of those special operations commands.

1. SAS and SBS (UK)
These could obviously be two separate entries, but we’re combining them here because they’re both British units that often operate side-by-side with U.S. forces, just with different missions and pedigrees. The Special Air Service (SAS) pulls from the British Army and focuses on counter-terrorism and reconnaissance. The Special Boat Service (SBS) does maritime counter-terrorism and amphibious warfare (but will absolutely stack bodies on land, too).

2. Sayeret Matkal (Israel)
Israel’s Sayeret Matkal has generated rumors and conjecture for decades, and it’s easy to see why when you look at their few public successes…. The commandos in the unit are skilled in deception, direct action, and intelligence gathering…One of their most public recent successes came when they led a daring mission to install listening devices in ISIS buildings, learning of a plan to hide bombs in the battery wells of laptops.

3. French Special Operations Command
French special operations units are even more close-mouthed than the overall specops community…

4. Kommando Spezialkräfte (Germany)
The commandos have reportedly deployed to Syria in recent years to fight ISIS.

5. Iraqi Counter Terrorism Service

6. Afghan National Army Commando Corps
It’s even capable of the rapid nighttime raids that U.S. forces became famous for when they were in the lead in that country…Afghanistan also has the Ktah Khas, a counter-terrorism unit known for daring raids like their 2016 rescue of 59 prisoners in a Taliban hideout.

Logan Nye, We Are The Mighty: 6 foreign special operations units the US relies on to collect intelligence and kill enemy insurgents, Business Insider, Nov. 30, 2018

 

Undersea Drones: Military

Currently, manipulation operations on the seabed are conducted by Remotely Operated Vehicles (ROVs) tethered to a manned surface platform and tele-operated by a human pilot. Exclusive use of ROVs, tethered to manned ships and their operators, severely limits the potential utility of robots in the marine domain, due to the limitations of ROV tether length and the impracticality of wireless communications at the bandwidths necessary to tele-operate an underwater vehicle at such distances and depths. To address these limitations, the Angler program will develop and demonstrate an underwater robotic system capable of physically manipulating objects on the sea floor for long-duration missions in restricted environments, while deprived of both GPS and human intervention

The Angler program seeks to migrate advancements from terrestrial and space-based robotics, terrestrial autonomous manipulation, and underwater sensing technologies into the realm of undersea manipulation, with specific focus on long-distance, seabed-based missions. Specifically, the program aims to discover innovative autonomous robotic solutions capable of navigating unstructured ocean depths, surveying expansive underwater regions, and physically manipulating manmade objects of interest.

Excerpts DARPA Angle Program Nov. 2018

Under Greenland’s Ice: Nuclear Waste

In 1959 the U.S. Army Corps of Engineers built Camp Century beneath the surface of the northwestern Greenland Ice Sheet. There they studied the feasibility of deploying ballistic missiles within the ice sheet. The base and its wastes were abandoned with minimal decommissioning in 1967, under the assumption they would be preserved for eternity by perpetually accumulating snowfall.

In 2016 scientists showed that global warming could release the radioactive waste stored in the ice if Greenland’s ice continues to melt…

The general existence of Camp Century was understood by both the Danish and U.S. governments, which together signed the 1951 Defense of Greenland Agreement under the auspices of the North Atlantic Treaty Organization (NATO)….Reports, for example, suggest Danish permission for the operational disposal of radiological waste in the ice sheet. However, it is unclear whether Denmark was sufficiently consulted regarding the specific decommissioning of Camp Century, and thus whether the abandoned wastes there remain U.S. property. Article XI of the 1951 treaty states that “All property provided by the Government of the United States of America and located in Greenland shall remain the property of the Government of the United States of America. … [it] may be removed from Greenland free of any restriction, or disposed of in Greenland by the Government of the United States of America after consultation with the Danish authorities…”

Given the multinational origin and multigenerational legacy of Camp Century, there appears to be substantial ambiguity surrounding the political and legal liability associated with mitigating the potential remobilization of its pollutants. Interests likely differ across NATO members, particularly Denmark, the U.S. and Canada, partly because of their distinct levels of historical participation and their future potential for pollutant exposure.

Excerpts from  William Colgan et al, The abandoned ice sheet base at Camp Century, Greenland, in a warming climate, , Aug. 4, 2016

Overly Militarized Military: United States

Gray zone security challenges…that fall between the traditional war and peace duality, are characterized by ambiguity about the nature of the conflict, opacity of the parties involved, or uncertainty about the relevant policy and legal frameworks….

The U.S. already possesses the right mix of tools to prevail in the gray zone, but it must think, organize and act differently. Gray zone challenges are not new. Monikers such as irregular warfare, low-intensity conflict, asymmetric warfare, military operations other than war and small wars were employed to describe this phenomenon in the past. …

America spends roughly $600 billion every year on defense, and it is the dominant global power by every objective measure. Yet state and non-state actors (e.g., Russia and Daesh) are increasingly undeterred from acting in ways inimical to the global common good.
State actors like Russia and China reasonably believe we will not use nuclear or conventional military force to thwart their ambitions if they craft their aggressive actions to avoid clear-cut military triggers. Despite their inherent ambiguity, the United States should not be  frustrated by gray zone challenges. Rather, we should aim to achieve favorable outcomes by taking some practical steps to improve our ability to address them.

Our responses to gray zone challenges display several clear deficiencies. As separate U.S. government agencies strive to achieve their individual organizational goals, they seldom act in integrated ways to support wider government objectives….We also need to grow our non-military capabilities. Our gray zone actions are often overly militarized because the Department of Defense has the most capability and resources, and thus is often the default U.S. government answer…. Our counter-Daesh campaign is a perfect example. Thousands of airstrikes helped to check their rapid expansion, but the decisive effort against them will require discrediting their narrative and connecting the people to legitimate governing structures — areas where DoD should not have primacy.

Root Causes: Prudent strategies recognize root causes and address them. Daesh, for example, is merely symptomatic of the much larger problems of massive populations of disaffected Sunnis estranged from legitimate governance and a breakdown in the social order across much of Africa and the Middle East, which will worsen in coming years by economic and demographic trends. Daesh is also a prime example of gray zone challenges, since the legal and policy framework of how to attack a proto-state is highly ambiguous. Coalition aircraft started bombing Daesh in August of 2014, although the authorization for use of military force is still under debate a year later, highlighting the confusion on how to proceed.

[Develop and Nurture Surrogates to Fight China]

For example, China is both antagonistically asserting its questionable claims to specific islands  and atolls in the South China Sea while simultaneously expanding its import of raw materials from Africa. Instead of confronting China in the South China Sea directly, surrogates could, theoretically, be used to hold China’s African interests at risk in order to compel a more  favorable outcome of South China Sea disputes. Thus, the point of action (e.g., Africa) might be far removed from the point of effect (e.g., Asia), but the intent would be to alter the decision-making calculus regardless of geography. To be credible, such an approach requires  prep work every bit as important as the infrastructure behind our nuclear and conventional capabilities. Capable and trustworthy surrogates are the result of years of purposeful relationship nurturing,and the vast majority of the work should take place pre-crisis….

Changing our vocabulary could help yield better decisions in the gray zone. Adopting a business vocabulary and a “SWOT” model (strength, weakness, opportunity and threat) would open other opportunities not available in military decision-making models. Similar to the way businesses decide how to allocate capital, we would necessarily distinguish between opportunities and threats and have at least an estimate of our expected return on investment. Talking and thinking differently about national security in the gray zone would help us measure the oft-ignored opportunity costs and come up with some metric, however imperfect initially, to measure our expected return on investment for defense dollars.

Cost should be a significant up front consideration. For example, we famously refused to provide a cost estimate for Operation Iraqi Freedom, other than to know that $200 billion was ar too high. Assuming we established $200 billion as the top end to “invest” in
Iraq, it would at least force us to review our actions and evaluate our return on investment as we blew through initial estimates on our way to spending in excess of $2 trillion.

Excerpts from the Gray Zone, Special Warfare, Oct-Dec. 2015, Volume 28, Issue 4

New Cold War over the Pacific

Australia said it would establish a development fund and offer Pacific island nations more than $2 billion for infrastructure projects while bolstering military cooperation, as U.S. allies take a more assertive stance against China in the region. Also Thursday, Australia said it would open new diplomatic posts across the Pacific, while New Zealand announced new funding to boost cultural engagement with small Pacific states.

The U.S. and its allies are increasingly coordinating to counter what officials in Washington and elsewhere see as Beijing’s attempts to gain influence over smaller nations through infrastructure loans under its Belt and Road initiative. Last month President Trump signed the Build Act, which expands American development financing for private companies to up to $60 billion….

Beijing, which says its goal is to help Pacific countries achieve peace, stability and prosperity, has urged other countries to “discard the Cold War mentality” and view its relations with Pacific states in an objective way.But old Western allies are concerned about its intentions toward impoverished island nations whose strategic value outstrips their size and wealth.  The U.K. recently announced three new diplomatic posts in the Pacific, while France gained a de facto seat in a key regional group—the Pacific Islands Forum—when its Pacific territories joined…

In September 2018, a senior U.S. official said the U.S., along with Japan and Australia, is vying to build an internet network in Papua New Guinea to block a Chinese telecom company.

Exceprts from U.S. Allies Vie With China to Make Pacific Island Friends, WSJ, Nov. 8, 2018 Continue reading