Category Archives: covert action

What is the Sea Train? DARPA

DARPA’s The Sea Train program aims to demonstrate long range deployment capabilities for a distributed fleet of tactical unmanned surface vessels. The program seeks to enable extended transoceanic transit and long-range naval operations by exploiting the efficiencies of a system of connected vessels (Sea Train). The goal is to develop and demonstrate approaches that exploit wave-making resistance reductions to overcome the range limitations inherent in medium unmanned surface vessels. DARPA envisions sea trains formed by physically connecting vessels with various degrees of freedom between the vessels, or vessels sailing in collaborative formations at various distances between the vessels. The weak of October 5, 2020, DARPA awarded Gibbs & Cox a separate $9.5 million contract to develop a “Connectorless Sea Train” concept. 

Dr. Andrew Nuss, Sea Train

The Nuclear Waste Buried in the Sahara Desert

France should take initiative to solve the problem of the nuclear waste buried in the Algerian Sahara in the early 1960s, as no one knows its exact location, which is a classified military secret…In an interview with Radio France Internationale, Patrice Bouvre (head of the Paris-based Observatory for Armaments) said: “When France suspended its nuclear tests in 1966, it simply buried the waste of the 17 experiments it conducted over the years.” He added that Paris classified the location or locations of the buried nuclear waste and the documents related to the affair as “a military secret”, which remains to date.

As a result, there is no information available about the exact location of the nuclear waste buried in the Algerian desert. He called on the French authorities to reveal the truth about this file and to cooperate with Algeria to clean up the areas contaminated by the nuclear waste that still exposes these regions to serious environmental damages.

France conducted 17 nuclear tests between 1960 and 1966 in the Algerian Sahara, and the waste from these experiments is buried in an unknown location in the area, hindering attempts to remove the radioactive materials and protect the population and the environment

Calls for France to reveal location of nuclear waste dumped in Algeria, MiddleEastMonitor, Oct. 13, 2020

Government Intervention is Great: What China is Learning from the United States

A study published by the China Aerospace Studies Institute in September 2020′China’s Space Narrative: Examining the Portrayal of the US-China Space Relationship in Chinese Sources‘ used publicly available Chinese language resources to draw insights on how the Chinese view the U.S.-China space relationship. According to the study:

“Chinese sources weave a space narrative that portrays China as a modernizing nation
committed to the peaceful uses of space and serving the broader interests of advancing humankind through international space cooperation, economic development, and scientific discovery. Chinese sources minimize the military role of China’s space program.

In contrast, the same sources portray the United States as the leading
space power bent on dominating space, restricting access to space, and limiting international space cooperation to countries with similar political systems and level of economic development.

The report concludes that the United States and China are in a long-term competition in space in which China is attempting to become a global power, in part, through the use of space. China’s primary motivation for developing space technologies is national security…China’s space program is one element of its efforts to transition the current U.S.-dominated international system to a multipolar world….

Many Chinese writings on commercial space analyze the experiences of U.S. companies, with a particular focus on SpaceX. Chinese space experts call SpaceX the “major representative company” for commercial space worldwide. A report from Hong Kong media claims that Chinese investors view SpaceX as the “benchmark company” for emerging commercial space companies in the mainland. Chinese authors also follow developments in other U.S. commercial space companies, such as Digital Globe
and Rocket Lab.

Chinese authors also pay attention to the ways in which the U.S. government uses various policies and incentives to create a favorable ecosystem for the growth of new commercial space companies. Chinese writings analyze ways in which NASA has supported private companies with funding, technology transfer, consulting, and infrastructure leasing. Although their specific recommendations vary, Chinese authors view strong government oversight and intervention as crucial toward the success of the domestic commercial space industry.”

Tracking the Enemy: U.S. Space Force in Qatar

The newly formed U.S. Space Force is deploying troops to a vast new frontier: the Arabian Peninsula. Space Force now has a squadron of 20 airmen stationed at Qatar’s Al-Udeid Air Base in its first foreign deployment. The force, pushed by President Donald Trump, represents the sixth branch of the U.S. military and the first new military service since the creation of the Air Force in 1947.   Concerns over the weaponization of outer space are decades old. But as space becomes increasingly contested, military experts have cited the need for a space corps devoted to defending American interests…

In the spring of 2020, Iran’s paramilitary Revolutionary Guard launched its first satellite into space, revealing what experts describe as a secret military space program. The Trump administration has imposed sanctions on Iran’s space agency, accusing it of developing ballistic missiles under the cover of a civilian program to set satellites into orbit.

“The military is very reliant on satellite communications, navigation and global missile warning,” said Capt. Ryan Vickers, a newly inducted Space Force member at Al-Udeid. American troops, he added, use GPS coordinates to track ships passing through strategic Gulf passageways…

Isabel Debre, US Space Force deploys to vast new frontier: Arabian Desert, Associated Press, Sept. 21, 2020

Conquering Space: China’s X-37B and the United States

Ever since China claimed success in the secretive launch of an experimental spacecraft, experts have been pondering over what it could be and what it did in space.The spacecraft – mounted on a Long March 2F rocket – was launched from the Jiuquan Satellite Launch Centre in northern China on Sept. 4, 2020 and safely returned to Earth after two days in orbit…Unlike recent Chinese high-profile space missions, very few details have emerged about the vehicle and no visuals have been released. Chinese authorities have been tight-lipped about the nature of the short-duration excursion and what technologies were tested. The exact launch and landing times were not revealed, nor was the landing site although it is thought to be the Taklamakan Desert, which is in northwest China.

Three years ago, China said it would launch a space vessel in 2020 that “will fly into the sky like an aircraft” and be reusable. A reusable spacecraft – as the name implies can undertake multiple trips to space – thereby potentially lowering the overall cost of launch activity. A traditional one-off spacecraft – costing tens of millions of dollars – is practically rendered useless after a single mission.

The experimental vessel reached an altitude of about 350km, which is in line with China’s previous crewed flights. The spacecraft also released an unknown object into the orbit before returning to Earth…Once the testing is complete, such a vehicle could be used to launch and repair satellites, survey the Earth, as well as take astronauts and goods to and from orbit, possibly to a planned future Chinese space station.

The Chinese craft’s size and shape remain unclear but it is widely believed to be some sort of uncrewed space plane similar to the X-37B Orbital Test Vehicle operated by the US Air Force. The recent mission could be linked to the Shenlong – or divine dragon – space plane project, which has been in development for some time, according to reports. A second Chinese reusable space plane called Tengyun, or cloud climber, is also in the works. If confirmed as a space plane, China would become only the third country to have successfully launched such a vehicle into orbit after the US and the former Soviet Union. The European Space Agency is working on its own reusable orbital vehicle called Space Rider, while India is also said to be developing a space shuttle-like craft.

The X-37B, resembling a miniature space shuttle, has been in orbit since late May 2020 following its launch on its sixth assignment. Very little is known about the X-37B’s missions, prompting speculation that the planes could be used for spying activity or testing space weapons.

x-37b

According to Bleddyn Bowen, China’s spacecraft launch is “just another part of China becoming a comprehensive space power that utilizes space technology for the purposes of war, development, and prestige like all others”.

Pratik Jakhar, China claims ‘important breakthrough’ in space mission shrouded in mystery, BBC, Sept. 9, 2020

How to Fight: Laugh, Bleed, Kill

The U.S. response to the 9/11 attacks launched an Air Force special operations unit into more than 6,900 days, or nearly two decades, of continuous deployments and combat operations in the Middle East, officials said. Within weeks of the terrorist attacks on the U.S., the 17th Special Tactics Squadron deployed with Army Rangers on raids into southern Afghanistan on Oct. 19, 2001. Since then, the squadron has had no breaks in deployment. “We fight, bleed and laugh beside [the Rangers],” said Staff Sgt. Ryan Duhon, a tactical air control party operator quoted in last month’s statement. “We win as a team or fail as a team.”….

The Special Tactics community, whose airmen conduct personnel recovery, precision strike missions and battlefield surgery, is the most highly decorated in the Air Force since the Vietnam War. 

Excerpt from CHAD GARLAND, Air Force special ops members ‘fight, bleed and laugh’ on nearly 7,000 days of deployments, Stars and Stripes, Sept. 10, 2020

China’s Nuclear Triad: Land, Sumbarines and Bombers

Based on United States Report released in 2020 “Military and Security Developments Involving the People’s Republic of China” by the Secretary of Defense, China’s progress in upgrading its strategic bombers to carry nuclear payloads puts it on the cusp of achieving a “triad” of delivery systems ((1) land-launched nuclear missiles, (2) nuclear-armed submarines, and (3) aircraft delivered nuclear bombs).  The development of a nuclear triad raises the long-term stakes in the complex relationship between Beijing and Washington. …The heavy emphasis on China’s nuclear improvements will probably be used by the Pentagon to press lawmakers and the public to support the massive reinvestment already underway in modernized nuclear weapons. This includes the B-21 bomber, an $85 billion Ground Based Strategic Deterrent ICBM program and the $128 billion Columbia-class ballistic missile submarine.

China’s defense ministry denounced the report as a document created with a “zero-sum-game mindset and Cold War mentality,” saying that the U.S. had “misinterpreted” the country’s nuclear policy and stirred up confrontation with Taiwan. “It’s extremely wrong and China firmly rejects it.”  As part of President Xi Jinping’s efforts to build a “world class” military by 2049, the Defense Department report said the People’s Liberation Army has already achieved parity with or exceeded the U.S. in at least three key areas: shipbuilding, land-based conventional ballistic and cruise missiles and integrated air defense systems.

While the country has one overseas military base, in the East African nation of Djibouti, China’s government “is very likely already considering and planning for additional overseas military logistics facilities to support naval, air and ground forces…”.  China’s current nuclear arsenal includes 100 silo or road-mobile intercontinental ballistic missiles, as many as six Jin-class nuclear missile submarines capable of carrying 12 missiles each and a new air-refuelable H-6N long-range bomber. The bomber is an upgrade on a previous model and comes with a modified fuselage “that allows it to carry either a drone or an air-launched ballistic missile that may be nuclear-capable. 

Excerpts from Anthony Capaccio, Pentagon Warns China Is Nearing a Milestone in Nuclear Weapons Buildup, Bloomberg, Sept. 1, 2020

China denounced the Pentagon report. According to Xinhua, the Pentagon report is crowded with anti-China hogwash. Fear-mongering over China has always been the Pentagon’s trick to demand more appropriations from the U.S. Congress. A fabricated grave threat to world peace can also help Washington sell more weapons to its allies, and serves as an excuse for America’s pursuit of global domination…While Washington is selling its latest “China-scare” fiction to the world, it is hard to overlook such facts that the United States spent more on military than 144 countries combined in 2018 and maintains nearly 800 military bases in over 70 countries.

Excerpt from Commentary: Lies, conspiracies behind Pentagon’s China military report, Xinhua, Sept. 5, 2020


Under Zero Trust: the U.S. Chip Resurgence

The Defense Advanced Research Projects Agency launched its Electronic Resurgence Initiative (ERI)  to help reboot a domestic chip industry that has been moving steadily offshore for decades…. Program officials and chip industry executives foresee the emergence of a “5th generation of computing” based on current cloud infrastructure while combining AI, the Internet of Things (IoT) and 5G wireless networks to deliver big data.

“The U.S. microelectronics industry is at an inflection point,” Ellen Lord, undersecretary of defense for acquisition and sustainment, told the virtual ERI summit. After decades of offshoring of chip fabrication, packaging and testing capabilities, “How do we reverse this trend?”  The Defense Department is expanding its technology base efforts by implementing a “step-by-step process for reconstituting the microelectronics supply chain,” focusing on various segments of the semiconductor ecosystem, including memory devices, logic, ICs and advanced packaging along with testing and assembly.

“While DoD does not drive the electronics market,” constituting only about 1 percent of demand, “we can drive significant R&D,” ERI is advancing public-private partnerships that provide a framework for commercial innovation. The result would be “pathfinder projects” geared toward a renewal of U.S. chip manufacturing. As trade frictions with China grow, ERI is placing greater focus on ensuring the pedigree of U.S. electronics supply chain. “We need to find a path to domestic sources,” said Lord.

While nurturing government-industry partnerships as part of an emerging next-generation U.S. industrial policy, this year’s DARPA summit also emphasized chip standards and processes for securing fabs, foundry services, devices and foundational microelectronics. In that vein, U.S. officials stressed new chips metrics like “quantifiable assurance” to secure dual-use devices that could end up in weapons or an IoT device.

“Our interests to protect both the confidentiality and the integrity of our supply chain are aligned with commercial interests, and we will continue to work across government and industry to develop and implement our quantitative assurance strategy based on zero trust,” said Nicole Petta, principal director of DoD’s microelectronics office. The “zero trust” approach assumes no device is safe, and that all microelectronics components must be validated before deployment. The framework marks a philosophical departure from DoD’s “trusted foundry” approach instituted in the 1990s, largely because “perimeter defenses” failed to account for insider threats…

DARPA Chip Efforts Pivots to Securing US Supply Chain, https://www.hpcwire.com, Aug. 24, 2020

Everything Moving in Space Is a Weapon? Yes.

Kosmos 2542, a Russian satellite that was launched in November 2019, was “like Russian nesting dolls”. Eleven days after its launch it disgorged another satellite, labelled Kosmos 2543. Then, on July 15th, Kosmos 2543 itself spat out another object, which sped off into the void.  Merely a “small space vehicle” to inspect other satellites, said the Russians. Nonsense, said the Americans; it was a projectile. The intentl.. was to signal Russia’s ability to destroy other nations’ satellites….In January 2020, America complained that Kosmos 2542 and 2543 had tailed a spy satellite in an “unusual and disturbing” way (American satellites have also sidled up to others in the past). 

Anti-satellite weapons are not new. During the cold war, America and the Soviet Union developed several ways to blow up, ram, dazzle and even nuke each other’s satellites. The countries conducted two-dozen anti-satellite tests between them. Ten were “kinetic”, involving a projectile physically striking a target. But new competitors, and new technologies, mean anti-satellite warfare is a hot topic once again. China has conducted ten tests over the past 15 years, including a kinetic one in 2007 that created a great deal of space debris. India conducted its first kinetic test in 2019. America, Russia and China have all manoeuvred their satellites close to others, sometimes provocatively so. New methods of attack are being tested, including lasers and cyber-attacks.

Some satellites, such as America’s GPS constellation, blur the distinction between military and civilian assets. Over the past decade, America’s armed forces have put payloads on three commercial satellites, and plan to pay Japan to host others on its own navigation satellites….Then there is the question of what counts as an attack. Michael Schmitt, a law scholar, and Kieran Tinkler, a professor at the us Naval War College, say it is unclear whether jamming a civilian satellite would violate the general prohibition on attacking civilian objects. Blowing up a military one, meanwhile, might or might not constitute an indiscriminate (and hence illegal) attack, depending on whether it could have been disabled by other means and how much debris was produced.

Perhaps the biggest difference between space war and terrestrial war is how long the consequences can last. Much of the debris from China’s 2007 test, for instance, will still be in space at the turn of the next century. The more debris, the greater the likelihood of accidental collisions with other satellites, which generates more debris in turn. Enough debris could lead to a chain reaction known as Kessler syndrome, which could render entire swathes of near-Earth space unusable for decades…

Space Junk

The Outer Space Treaty of 1967 requires states to consult each other on actions that “would cause potentially harmful interference”, though the rule has rarely been heeded. Most countries accept that, in wartime, a body of existing laws known as international humanitarian law would apply, as on Earth—something America confirmed in its “Spacepower” doctrine, published on August 10, 2020. International humanitarian law is based on principles such as distinction (between combatants and civilians) and proportionality (between civilian harm and military advantage). But how to apply such ideas in a place with few humans is not always obvious.

The Manual on International Law Applicable to Military Uses of Outer Space (MILAMOS) is being spearheaded by McGill University, in Montreal, and a separate Woomera Manual by the University of Adelaide. Both hope to publish their documents 2020…

Russia and China would like a formal treaty banning all weapons in space. Both are keen to prevent America from deploying space-based anti-missile systems which might threaten their own nuclear forces. America and its allies resist this. They argue that it is impossible to define a space weapon—anything that manoeuvres in orbit could serve as one—and that it would be easy to cheat. The European Union has instead proposed a voluntary code of conduct. Many non-Western countries would prefer a binding treaty…. Though most are not space powers, many are likely to become so in the future, so their buy-in is important.

Excerpts from Satellite warfare: An arms race is brewing in orbit, Economist, Aug. 15, 2020

The Worst Murderer: Jihadists or Governments?

Sahel: West Africa’s most populous countries, along the Atlantic coast, have become vulnerable to the predations of jihadists spilling out of failing states farther north in the Sahel on the borders of the Sahara desert. Jihadists seized control of chunks of Mali in 2012 and were stopped from overrunning Bamako, its capital, only after thousands of French troops were hurriedly flown in. The insurgents have since pushed across the border into Niger and Burkina Faso. In those three countries alone, 4,800 people lost their lives in the conflict last year. Fully 1.7m people have been forced to flee their homes. Now the war is beginning to jump borders again, putting at risk some of Africa’s fastest-growing economies, including Benin, Ghana and Ivory Coast.


This war in the Sahel has been growing rapidly. Ten times more people were killed last year than in 2014 (excluding deaths in north-eastern Nigeria, which faces its own jihadist insurgents). Two main jihadist groups are behind most of the fighting: the Islamic State in the Greater Sahara (ISGS) and Jama’at Nasr al-Islam wal Muslimin (JNIM), which is linked to al-Qaeda. These groups have extended their reach, even though thousands of international peacekeepers and local and Western soldiers have been deployed to stop them. France has sent some 5,100 troops to the Sahel, while the United States has provided another 1,200. In addition, the un has 15,000 blue helmets there, including about 350 Germans, plus 250 British soldiers who are soon to arrive. With American forces leaving Afghanistan, the Sahel will soon be the West’s biggest combat zone.

Worse, the jihadists are expanding in three directions at once. To the south they threaten Benin, Ghana, Ivory Coast and Togo. To the west there has been a spate of attacks in Mali close to its border with Senegal; and to the east with Nigeria’s insurgent groups. The jihadists already have a “de facto safe haven in northern Mali”, says General Dagvin Anderson, in charge of America’s commandos in Africa. He frets that as they expand they will have more scope to plan attacks on American soil.

The weakness of governments and the feebleness of their public services are helping the jihadists. In the neglected hinterlands of the Sahel the rebels offer themselves as an alternate state, serving up sharia and medical aid. Moreover, the jihadists have been adept at exploiting ethnic faultlines, for instance between largely Muslim and seminomadic Fulani herders and more settled farming communities, which have their own armed groups of traditional hunters known as Dozos. =

Trade and commerce also provide an incentive for the jihadists to expand their reach. The migration corridor between Burkina Faso and Ivory Coast is the busiest in Africa. Jihadists cash in by taxing traders and smuggling stolen livestock, drugs and guns. The gold mines in Burkina Faso have become a target. Much of the gold is smuggled out through Togo, which officially exported seven tonnes of the metal to the United Arab Emirates in 2018, despite mining very little itself. Gold is also pulling jihadists towards Senegal…

But in 2020, more civilians in the Sahel have been killed by government soldiers than by jihadists, says José Luengo-Cabrera of the International Crisis Group (icg), a Brussels-based ngo. “When soldiers kill the head of the family, they almost throw his sons and nephews into the arms of bearded men in shorts hiding in the bush,” one villager told Human Rights Watch, a global monitor. It says in the town of Djibo alone, in Burkina Faso, evidence suggests government forces have murdered 180 men—many of them were blindfolded and had their hands bound before they were shot. In Burkina Faso… citizens may feel safer living among terrorists than with their own country’s security forces.

Governments in the region and some Western forces have made matters worse by supporting militias. In 2018 the French army allied itself with Tuareg militias from Mali to fight against ISGS. They clobbered the jihadists but also killed scores of civilians, aggravating ethnic tensions and fuelling recruitment by the insurgents….Above all, governments need to regain legitimacy by providing services and holding themselves to account. “It is not possible to win the war if there is not trust from the population,” says Niagale Bagayoko of the African Security Sector Network…But good governance and decent services in the region are scarce. At a meeting of Sahelian leaders with Mr hard. In Burkina Faso alone, the jihadists have forced about 2,500 schools to close.

Excerpts from Jihad in the Sahel: Fighting a Spreading Insurgency, Economist, July 11, 2020

Leave No Oil Under-Ground: OPEC against US Frackers

In 2014-16, the OPEC waged a failed price war to wipe out American frackers. Since then the cartel and its partners, led by Russia, have propped up oil prices enough to sustain shale, but not enough to support many members’ domestic budgets. In March 2020 Saudi Arabia urged Russia to slash output; Russia refused, loth to let Americans free-ride on OPEC-supported prices. The ensuing price war was spectacularly ill-timed, as it coincided with the biggest drop in oil demand on record.  The desire to chasten American frackers remains, though. OPEC controls about 70% of the world’s oil reserves, more than its 40% market share would suggest… If the world’s appetite for oil shrinks due to changing habits, cleaner technology or greener regulations, countries with vast reserves risk having to leave oil below ground. 

Excerpts from Crude Oil: After the Fall, Economist, June, 13, 2020

The Nuclear Option: Chopping off Hong Kong from the Dollar System

China and America have begun the fraught business of disentangling their financial systems. Chinese firms with shares listed in New York have rushed to float in Hong Kong, too, after the White House signalled they are not welcome on Wall Street….But now Hong Kong itself, the world’s third-biggest international financial centre, has become a geopolitical flashpoint. Its unique role as the conduit between global capital markets and China’s inward-looking financial system means that both sides must tread carefully.

On May 28, 2020 China said it would enact a new national-security law for Hong Kong, undermining the formulation of “one country, two systems” in place since 1997, under which the territory is supposed to be governed until 2047. In response, America has said it may downgrade the legal privileges it grants Hong Kong, which treat it as autonomous from China

Hong Kong’s place in the world depends on having the rule of law, a trusted reputation and seamless access to Western financial markets. Other Chinese cities have big stock exchanges: shares listed in Shanghai and Shenzhen are together worth a lot more than those in Hong Kong. But neither has fair courts, an independent central bank, free movement of capital or a mix of Western and Chinese firms. These foundations are the basis for $9.7trn of cross-border financial claims, such as loans, that are booked in the territory. Hong Kong is also where mainland Chinese firms and banks go to deal in the dollar, the world’s dominant currency. Some $10trn of dollar transactions flowed through Hong Kong’s bank-to-bank payments system last year.

Until recently, conventional wisdom held that Hong Kong’s position would be assured for 20-30 years, because it would take that long for China either to upgrade its markets to Western standards or to become so powerful that it could impose mainland practices, and the yuan, on the rest of the world. But the trade war, a year of street protests and China’s iron-fisted response to them raise new questions about Hong Kong’s durability. Bullying from Beijing erodes the sense that it is autonomous. And there is an outside chance that America could impose sanctions or other restrictions that would stop some Hong Kong officials, firms or banks from using dollars….. America’s might bring into question whether money parked in Hong Kong is still fully fungible with money in the global financial system. If these worries spread, they could destabilise Hong Kong and cause a financial shock in China and well beyond it.

The good news is that so far there is no sign of capital flight. Hong Kong’s vast deposit base has been stable in recent weeks, say its bankers. Investors are reassured by its $440bn or so mountain of foreign reserves and a long record of capable financial management. The rush of Chinese listings will bring in new cash and drum up business in the city….Nonetheless, for China the prudent policy is to try to speed up the development of the mainland’s financial capabilities so that it is less exposed to potential American punishment…Italso means another big push to boost the global role of the yuan and reduce China’s dependence on the dollar…

Excerpts from Hong Kong: Conduit’s End, Economist, June 6, 2020

Selling War Services: the Mercenaries

Despite a UN treaty banning mercenaries, their day is far from over. Some analysts think there are now more of them in Africa than ever. But can they ever be a force for good?  ….In the years after most African countries gained independence, mercenaries were notorious for supporting secessionist movements and mounting coups. 

Western governments have in the past winked at mercenary activity that served their commercial interests. But nowadays Russia is seen as the leading country egging on mercenaries to help it wield influence. It does so mainly through Wagner, ***whose founder, Yevgeny Prigozhin, is close to President Vladimir Putin.

Wagner has been hired to prop up a number of shaky African regimes. In Sudan it tried to sustain the blood-drenched dictatorship of Omar al-Bashir. He was ousted last year after big protests. In 2018 hundreds of Wagner men arrived in the Central African Republic to guard diamond mines, train the army and provide bodyguards for an embattled president, Faustin-Archange Touadéra. In Guinea, where Rusal, a Russian aluminium giant, has a big stake, Wagner has cosied up to President Alpha Condé, who has bloodily faced down protests against a new constitution that lets him have a third term in office. In Libya, despite a un arms embargo, Wagner is reported to have deployed 800-1,200 operatives in support of a rebel general, Khalifar Haftar, who has been trying to defeat the UN-recognised government….

Mercenaries have three main advantages over regular armies. First, they give plausible deniability. Using them, a government such as Russia’s can sponsor military action abroad while pretending not to. Second, they tend to be efficient, experienced, nimble and flexible. Third, they are cheaper than regular armies. Whereas soldiers receive lifelong contracts and pensions, mercenaries are often paid by the job..

***Other firms include Dyke Advisory Group (DAG) , OAM Middle East

See also The UN Working Group on the Use of Mercenaries

Excerpts from Soldiers of misfortune: Why African governments still hire mercenaries, Economist, May 30, 2020

Strangling China with Hong Kong: the Politics of Fear

The U.S. determination  that Hong Kong is no longer autonomous from mainland China, under the Hong Kong Policy Act of 1992, will have significant implications for the city’s exporters and businesses.  Sensitive U.S. technologies could no longer be imported into Hong Kong, and the city’s exports might be hit with the same tariffs levied on Chinese trade.

But the act doesn’t cover the far more extensive role Hong Kong plays as China’s main point of access to global finance.  As of 2019, mainland Chinese banks held 8,816 trillion Hong Kong dollars ($1.137 trillion) in assets in the semiautonomous city, an amount that has risen 373% in the last decade…. China’s banks do much of their international business, mostly conducted in U.S. dollars, from Hong Kong. With Shanghai inside China’s walled garden of capital controls, there is no obvious replacement.

While the U.S. doesn’t directly control Hong Kong’s status as a financial center, Washington has demonstrated its extensive reach over the dollar system, with penalties against Korean, French and Lebanese financiers for dealing with sanctioned parties. The U.S. recently threatened Iraq’s access to the New York Federal Reserve, demonstrating a growing willingness to use financial infrastructure as a tool of foreign policy.  Even though the U.S. can’t legislate Hong Kong’s ability to support Chinese banks out of existence, the role of an international funding hub is greatly reduced if your counterparties are too fearful to do business with you.

Putting the ability of Chinese banks to conduct dollar-denominated activities at risk would be deleterious to China’s ability to operate financially overseas, posing a challenge for the largely dollar-denominated Belt and Road global infrastructure initiative. It would also put the more financially fragile parts of the country, like its debt-laden property developers, under strain.  China’s hope to develop yuan into an influential currency also centers on Hong Kong’s remaining a viable global financial center—more than 70% of international trade in the yuan is done in the city.

Excerpts from Mike Bird, How the US Could Really Hurt China, WSJ, May 290, 2020

Mining the Moon: The First Mover Advantage

The US government is starting to lay down the groundwork for diplomacy on the moon. On 15 May, 2020 NASA administrator Jim Bridenstine released a set of principles that will govern the Artemis Accords on the exploration of the moon. The accords are named after NASA’s Artemis programme, the US initiative to explore the moon, with a planned launch of astronauts to the lunar surface in 2024. Other countries are also increasingly turning towards the moon, which is concerning when a landing on the moon can send up clouds of potentially hazardous dust that travel a long way across the surface and even into orbit…

At the moment, there is little practical international law governing activities on the moon. The Outer Space Treaty of 1967 deals with general space exploration, while the more specific Moon Agreement of 1984 states that “the moon and its natural resources are the common heritage of all mankind”, prohibiting the ownership of any part of the moon or any resources from the moon….However, no nation capable of human space flight has signed the Moon Agreement, effectively rendering it moot. In fact, in April 2020, US president Donald Trump issued an executive order supporting moon mining and taking advantage of the natural resources of space.

The Artemis Accords aim to protect historic locations like the Apollo landing sites but encourage mining in other areas. They also promote transparency and communication between nations, requiring signatories to share their lunar plans, register any spacecraft sent to or around the moon and release scientific data to the public.  That transparency requirement might be a stumbling block for potential parties to the accords, says Forczyk. “I really don’t know how much countries are going to be willing to share some of their more delicate, sensitive information,” she says. “

The rest of the stipulations of the Artemis Accords are about safety: nations will be able to set “safety zones” to protect their activities on the moon, they will have to work to mitigate the effects of debris in orbit around the moon and they will agree to provide emergency assistance to any astronauts in distress.

Rather than attempting to put together an international treaty, which could be difficult to negotiate before NASA’s next crewed launch to the moon, the US will sign bilateral agreements with individual countries.

Excerpts from Leah Crane, NASA’s Artemis Accords aim to lay down the law of the land on the moon, New Scientist, May 20, 2020

The Game of Chicken in the Melting Arctic

In 2018 the NATO alliance, joined by Sweden and Finland, held Trident Juncture, its largest exercise since the end of the cold war, in Norway. That involved the first deployment of an American aircraft-carrier in the Arctic Circle for three decades. Western warships have been frequent visitors since. On May 1, 2020 a “surface action group” of two American destroyers, a nuclear submarine, support ship and long-range maritime patrol aircraft, plus a British frigate, practised their submarine hunting skills in the Norwegian Sea.

Such drills are not unusual. But on May 4, 2020 some of those ships broke off and sailed further north into the Barents Sea, along with a third destroyer. Although American and British submarines routinely skulk around the area, to spy on Russian facilities and exercises covertly, surface ships have not done so in a generation. On May 7, 2020 Russia’s navy greeted the unwelcome visitors by announcing that it too would be conducting exercises in the Barents Sea—live-fire ones, in fact. On May 8, 2020… the NATO vessels departed.

It is a significant move. The deployment of destroyers which carry missile-defence systems and land-attack cruise missiles is especially assertive. After all, the area is the heart of Russian naval power, including the country’s submarine-based nuclear weapons. Russia’s Northern Fleet is based at Severomorsk on the Kola peninsula, to the east of Norway’s uppermost fringes.

Western navies are eager to show that covid-19 has not blunted their swords, at a time when America and France have each lost an aircraft-carrier to the virus. But their interest in the high north predates the pandemic. One purpose of the foray into the Barents Sea was “to assert freedom of navigation”, said America’s navy. Russia has been imposing rules on ships that wish to transit the Northern Sea Route (NSR), an Arctic passage between the Atlantic and Pacific that is becoming increasingly navigable as global warming melts ice-sheets . America scoffs at these demands, insisting that foreign warships have the right to pass innocently through territorial waters under the law of the sea. Although last week’s exercise did not enter the NSR, it may hint at a willingness to do so in the future.

On top of that, the Arctic is a growing factor in NATO defence policy. Russia has beefed up its Northern Fleet in recent years…Russian submarine activity is at its highest level since the cold war…Ten subs reportedly surged into the north Atlantic in October 2019  to test whether they could elude detection….Russia’s new subs are quiet and well-armed. As a result, NATO’s “acoustic edge”—its ability to detect subs at longer ranges than Russia—“has narrowed dramatically.”

Russia primarily uses its attack submarines to defend a “bastion”, the area in the Barents Sea and Sea of Okhotsk where its own nuclear-armed ballistic-missile submarines patrol.  A separate Russian naval force known as the Main Directorate of Deep-Sea Research (GUGI, in its Russian acronym) might also target the thicket of cables that cross the Atlantic.

The challenge is a familiar one. For much of the cold war, NATO allies sought to bottle up the Soviet fleet in the Arctic by establishing a picket across the so-called GIUK gap, a transit route between Greenland, Iceland and Britain that was strung with undersea listening posts….The gap is now back in fashion and NATO is reinvesting in anti-submarine capabilities after decades of neglect. America has stepped up flights of P8 submarine hunting aircraft from Iceland, and Britain and Norway are establishing P8 squadrons of their own. The aim is to track and hold at risk Russian nuclear subs as early as possible, because even a single one in the Atlantic could cause problems across a large swathe of ocean.

GIUK (Greenland, Iceland, UK) gap. Image from wikipedia.

But a defensive perimeter may not be enough. A new generation of Russian ship-based missiles could strike NATO ships or territory from far north of the GIUK gap, perhaps even from the safety of home ports. “This technological development represents a dramatically new and challenging threat to NATO forces…. Similar concerns led the Reagan administration to adopt a more offensive naval posture, sending forces above the gap and into the maritime bastion of the Soviet Union. 

Excerpts from Naval Strategy: Northern Fights, Economist, May 16, 2020

Our Cold War Roots: Weaponizing China’s One Child Policy

The elite US special operations forces are ill-equipped for high-tech warfare with China and Russia, experts warn, as the Trump administration pivots from the “war on terror” to a struggle with geopolitical rivals. Special operations, known for kicking down doors and eliminating high-value targets, number 70,000 personnel, cost $13bn a year and have carried much of the burden of the war on terror. But it is unclear what role they will play as the Pentagon moves to redeploy troops from Afghanistan to the Indo-Pacific to counter China’s regional ambitions.

General Richard Clarke, commander of special operations command (Socom), told an industry conference this week that the US needed to develop new capabilities to “compete and win” with Russia and China. He added that Socom must develop cyber skills and focus on influence campaigns rather than “the kill-capture missions” that characterised his own time in Afghanistan after the September 11 2001 attacks. Socom’s fighters include US Navy Seals, Army Green Berets and Marine Corps Raiders. Defence officials say China has raised military spending and research with the aim of exploiting American vulnerabilities, while Russia has tested out new technology during combat in Syria. “Maybe we are further behind than we know,” Colonel Michael McGuire told the annual Special Operations Industry Conference

McGuire highlighted US vulnerabilities in cyber security, and soft-power tactics by America’s enemies that could “drive fissures through some of our alliances”. He proposed shifting focus to defence over attack.   “You could have hundreds and thousands of engagements every single day in a fight against China. We are just not fast enough, dynamic enough or scaleable enough to handle that challenge,” said Chris Brose, chief strategy officer at Anduril…. He added “Most of the US-China competition is not going to be fighting world war three,” he said. “It’s going to be kicking each other under the table.”….

US special operators have for years had the run of the battlefield. But they face very different conditions in any fight against China, which has developed an arsenal of missiles, fighter jets, spy planes and other eavesdropping and jamming techniques that would make it hard for America to conceal troops, transport and communications. Special operations forces are not ready for operations against a near-peer foe, such as China, in a direct engagement… He called for a return to their cold war roots. “Vintage special operations forces is about stealth, cunning and being able to blend in — they were triathletes rather than muscle-bound infantrymen with tattoos,” said the former officer. 

David Maxwell, a former Green Beret and military analyst, is among those who favour a shift towards political warfare.One such idea of his would involve a popular writer being commissioned to pen fictionalised war stories based in Taiwan intended to discourage Beijing from invading the self-governing island. He told a gathering of Pacific special forces operators in February 2020 that fictional losses could “tell the stories of the demise of Chinese soldiers who are the end of their parents’ bloodline”. He argued that Beijing’s former one-child policy could be weaponised to convince China that war would be too costly. But Mr Maxwell said such ideas have yet to catch on. He added that psyops officers lamented to him that it was “easier to get permission to put a hellfire missile on the forehead of a terrorist than it is to get permission to put an idea between his ears”.

Excerpts from Katrina Manson , US elite forces ill-equipped for cold war with China, FT, May 16, 2020

Our Biggest Weakness: Weak Biodefenses + Malicious Viruses

The coronavirus that has killed over 180,000 people worldwide was not created with malice. Analysis of its genome suggests that, like many new pathogens, it originated by natural selection rather than human design. But …“Covid-19 has demonstrated the vulnerability of the US and global economy to biological threats, which exponentially increases the potential impact of an attack,” says Richard Pilch of the Middlebury Institute of International Studies. In theory, bioweapons are banned. Most countries in the world are party to the Biological Weapons Convention (BWC) of 1975, which outlaws making or stockpiling biological agents for anything other than peaceful purposes. But some countries probably make them secretly, or keep the option close at hand. America accuses North Korea of maintaining an offensive biological-weapons programme, and alleges that China, Iran and Russia dabble in dual-use biolgical research (for peaceful and military usage) research. Toxins like ricin have also been bought and sold on shady recesses of the internet known as the dark web.

Germ warfare briefly rose to prominence in September 2001, when letters laced with anthrax spores were mailed to American news organisations and senators, killing five people. That was a wake-up call. Public health became part of national security. BioWatch, a network of aerosol sensors, was installed in more than 30 cities across America. But in recent years threats from chemical weapons, like the sarin dropped by Syria’s air force and the Novichok smeared on door handles by Russian assassins, took priority.

Though the Trump administration published a national biodefence strategy in 2018, it shut down the National Security Council’s relevant directorate and proposed cuts to the laboratories that would test for biological threats. Funding for civilian biosecurity fell 27% between fiscal years 2015 and 2019, down to $1.61bn—less than was spent on buying Black Hawk helicopters.

Yet many pathogens used as weapons tend to differ from respiratory viruses in important ways. Those like anthrax, caused by bacteria which form rugged and sprayable spores, but do not spread from human to human, have the advantage of minimising the risk of rebound to the attacker. With the notable exception of smallpox—a highly contagious and lethal virus that was eradicated in 1979 but preserved by the Soviet Union for use against America (but not Europe), and now exists only in two laboratories, in America and Russia—most biological weapons would therefore have more localised effects than the new coronavirus.

Even so, the slow and stuttering response to the pandemic has exposed great weaknesses in how governments would cope…demonstrating that every part of public-health infrastructure is either broken or stretched to the max. The centrepiece of America’s biosurveillance programme, a network of laboratories designed for rapid testing, failed, says Mr Koblentz, while the national stockpile of face masks had not been substantially replenished in over a decade. Would-be attackers will take note.

In 2016 American intelligence agencies singled out genome editing as a national-security threat for the first time. Two years later a major study by the National Academies of Sciences, Engineering, and Medicine warned that synthetic biology, a potent set of methods for tinkering with or creating organisms, could, in time, be used to re-create viruses like smallpox or make existing pathogens more dangerous, such as resistant to antibiotics. In 2011 Dutch and Japanese scientists said that they had created a version of bird flu that could be transmitted between mammals by the respiratory route—an announcement that prompted the Netherlands to treat the relevant academic papers as sensitive goods subject to export controls.

In January 2020 Canadian scientists funded by an American biotech company used synthetic DNA from Germany to synthesise a microbe closely related to smallpox, indicating the ease with which it could be done. “If a potential bad actor pursues a weapons capability using sars-cov-2, the virus is now attainable in laboratories all around the world, and blueprints for assembling it from scratch have been published in the scientific literature.”

 The trouble is that biodefence has evolved slowly, says Dan Kaszeta, a former biological weapons adviser to the White House. Compact devices that can detect chemical threats and warn soldiers to don a gas mask have long been available. “That doesn’t exist for anthrax or any of the other aerosol pathogens,” says Mr Kaszeta. “Telling the difference between an anthrax spore and a bit of tree pollen is not something you can do in a couple of seconds.”

Excertps from Biodefence: Spore Wars, Economist, Apr. 25, at 19

Even the Oceans are not Free: Swarming the Seas

The Ocean of Things of Defence Advanced Research Projects Agency (DARPA) aims to  wire up the high seas with swarms of floating, connected sensors.  Such devices are not in themselves new. There are around 6,000 floating sensors deployed around the world’s oceans, run by navies and research institutes. What is unprecedented is the scale of  DARPA’s ambition. Over the next few years it hopes to deploy 50,000 sensors across 1m square kilometres of sea, an area considerably larger than Texas. The eventual goal—much more distant—is to enable the continuous monitoring and analysis of a significant fraction of the world’s oceans.

Existing “floating instrument packages”, known as floats or drifters, are often custom-built, and usually contain the highest-quality instruments available. They therefore tend to be expensive, and are bought only in small numbers. A typical existing float, designed for scientific research, is the Argo. It costs around $20,000, and can measure water temperature and salinity.  The Ocean of Things takes the opposite approach. The aim is to cram as many cheap, off-the-shelf components as possible into a single low-cost package. Current float prototypes cost around $750…That would allow tens of thousands to be deployed without breaking the bank. Large numbers are crucial for coverage. They also help compensate for inaccuracies in individual instruments.

The project’s researchers are evaluating three designs from different manufacturers, ranging in size from about six to 18 litres. One, proposed by Xerox’s Palo Alto Research Centre, is made of glass, like a traditional Japanese fishing float. A second, from a firm called Areté Associates, has an aluminium shell, and uses wood for buoyancy. Both models feature solar panels. The third, made by a company called Numurus, is made of lacquered cardboard, and relies entirely on its batteries. All three are designed to last for a year or so and are made to be as environmentally friendly as possible, with minimal use of plastics. That is important because, at the end of their mission, the floats are designed to scuttle themselves

With 361m square kilometres of ocean on the planet, a true Ocean of Things, monitoring everything on and under the water, would require about 18m floats.

Excerpts from Big Wet Data: The Ocean of Things, Economist, Mar. 14, 2020

Ethical Killing: Landmines

During the Gulf war of 1991, no fewer than 117,000 landmines were showered over Kuwait and Iraq by American planes. This barely dented the Pentagon’s vast stockpile of 19m. Just under a quarter of the devices scattered in the path of Saddam Hussein’s army were anti-personnel landmines (APLs), the sort that would soon be banned by the Anti-Personnel Mine Ban Convention of 1997, widely known as the Ottawa treaty. The Ottawa treaty has 164 parties, all of which ban the production and use of APL (anti-vehicle mines, among others, are still allowed). America is not among them. When the treaty was finalised, America declined to join (other holdouts include China, Cuba, Iran, Russia and Syria).

Landmines have a number of military uses. They are typically used to channel opposing armies away from particular areas and into others. A minefield can force an enemy to turn, which exposes their flank and makes them especially vulnerable, says Vincent Brooks, a retired general who commanded American forces in South Korea in 2016-18. They can also be used to “canalise” the enemy, channelling attackers into unfavourable terrain, where they may be more exposed to concentrated artillery fire. …But landmines are reviled weapons, and not without good reason. “They’re indiscriminate,”… Landmine casualties have fallen sharply over the years, but at least 2,000 people were killed or wounded by manufactured or improvised APLS in 2018, according to data collected by the Landmine and Cluster Munition Monitor, a research group. Laying a mine can cost a few dollars; clearing one can require $1,000.

The Pentagon has an answer to this. It says that it only possesses, would only produce and would only use “non-persistent” landmines with the capacity to self-destruct or, failing that, to self-deactivate, with a battery losing its charge, within 30 days (some models can blow themselves up in as little as a few hours). It claims that such features are remarkably reliable. …“When the technology is brought into the battlefield, we see that the actual data doesn’t match with the promises,” says Erik Tollefsen, head of Weapons Contamination for the International Committee of the Red Cross. He says that impressive reliability rates are usually derived from tests in sterile conditions, and prove wildly exaggerated in practice. In 2002 a report by the Government Accountability Office, an agency that audits the federal government, noted that during the Gulf war one in 10,000 mines were expected to remain active, which would have produced 12 duds. The actual figure was almost 2,000.

Others argue that there are perfectly viable alternatives to APLs….In particular, remotely activated mines (rather than victim-activated ones) are allowed under the treaty if the person triggering the device has the would-be victim in sight, although this makes them harder to use at range and hostage to a breakdown of communications. In 2018 Finland—a late and reluctant signatory to Ottawa, given its long border with Russia—said it was developing a new, remote-controlled variety of anti-personnel “bounding” mine that leaps into the air and fires metal bullets downward.

Excerpts from Ethical Landmines: Watch Your Step, Economist, Feb. 15, 2020

Breath and Sweat: the Biometrics of All Private Things

It is not just DNA that people scatter to the wind as they go about their business. They shed a whole range of other chemicals as well, in their breath, their urine, their faeces and their sweat. Collectively, these molecules are referred to as metabolites….

The most common way of analysing metabolite content is gas chromatography-mass spectrometry. This technique sorts molecules by their weight, producing a pattern of peaks that correspond to different substances….There are, however, a lot of information sources out there, in the form of publicly available metabolite databases. The databases themselves are getting better, too…. A study just published by Feliciano Priego-Capote at University of Cordoba, in Spain, for example, shows it is possible to extract much meaningful information from even a dried-up drop of sweat. “The day is coming soon”, observes Cecil Lewis, a molecular anthropologist at University of Oklahoma, who is studying the matter, “when it will be possible to swab a person’s desk, steering wheel or phone and determine a wide range of incredibly private things about them….


The police may be tempted to push the boundaries as well. The fourth amendment to America’s constitution protects against unwarranted searches and seizure of evidence. This means it is hard to force someone to give a sample. But if obtaining such merely requires taking a swab of a surface in a public place—perhaps a keyboard someone has just used—the 4th amendment is unlikely to apply.

That is not necessarily wrong, if it means more criminals are caught and convicted. But it needs to be thought about carefully, because many metabolites are sticky. Cocaine is a case in point. Studies have shown that as many as two-thirds of the dollar bills in circulation in America carry traces of this substance, which might thus end up on the fingertips of the innocent, as well as the guilty.

Excerpts from Metabolites and You, Economist, Feb. 15, 2019

Biometrics Run Amok: Your Heartbeat ID, please

Before pulling the trigger, a sniper planning to assassinate an enemy operative must be sure the right person is in the cross-hairs. Western forces commonly use software that compares a suspect’s facial features or gait with those recorded in libraries of biometric data compiled by police and intelligence agencies. Such technology can, however, be foiled by a disguise, head-covering or even an affected limp. For this reason America’s Special Operations Command (SOC), which oversees the units responsible for such operations in the various arms of America’s forces, has long wanted extra ways to confirm a potential target’s identity. Responding to a request from soc, the Combating Terrorism Technical Support Office (CTTSO), an agency of the defence department, has now developed a new tool for the job.

This system, dubbed Jetson, is able to measure, from up to 200 metres away, the minute vibrations induced in clothing by someone’s heartbeat. Since hearts differ in both shape and contraction pattern, the details of heartbeats differ, too. The effect of this on the fabric of garments produces what Ideal Innovations, a firm involved in the Jetson project, calls a “heartprint”—a pattern reckoned sufficiently distinctive to confirm someone’s identity.

To measure heartprints remotely Jetson employs gadgets called laser vibrometers. These work by detecting minute variations in a laser beam that has been reflected off an object of interest. They have been used for decades to study things like bridges, aircraft bodies, warship cannons and wind turbines—searching for otherwise-invisible cracks, air pockets and other dangerous defects in materials. However, only in the past five years or so has laser vibrometry become good enough to distinguish the vibrations induced in fabric by heartprints….

Candice Tresch, a spokeswoman for the cttso…. cannot discuss the process by which heartprint libraries might be built up in the first place. One starting point, presumably, would be to catalogue the heartbeats of detainees in the way that fingerprints and dna samples are now taken routinely.

Excerpts from Personal identificationPeople can now be identified at a distance by their heartbeat, Economist, Jan 23, 2020

A Hypersonic Death: The Race to Develop Hypersonic Weapons

For decades, the U.S. military—and its adversaries—have coveted missiles that travel at hypersonic speed, generally defined as Mach 5 (5 times the speed of sound) or greater . Intercontinental ballistic missiles (ICBMs) meet that definition when they re-enter the atmosphere from space. But because they arc along a predictable ballistic path, like a bullet, they lack the element of surprise. In contrast, hypersonic weapons such as China’s waverider maneuver aerodynamically, enabling them to dodge defenses and keep an adversary guessing about the target.

The US Department of Defense (DOD) is leading a new charge, pouring more than $1 billion annually into hypersonic research. Competition from ambitious programs in China and Russia is a key motivator. Although hype and secrecy muddy the picture, all three nations appear to have made substantial progress in overcoming key obstacles, such as protecting hypersonic craft from savage frictional heating. Russia recently unveiled a weapon called the Kinzhal, said to reach Mach 10 under its own power, and another called Avangard that is boosted by a rocket to an astonishing Mach 27. China showed off a rocket-boosted hypersonic glide vehicle (HGV) of its own, the Dongfeng-17, in a recent military parade. The United States, meanwhile, is testing several hypersonic weapons. “It’s a race to the Moon sort of thing,” says Iain Boyd, an aerospace engineer at the University of Colorado, Boulder. “National pride is at stake.”

China’s military sees hypersonic weapons (as well as cyberwarfare and electromagnetic pulse strikes) as an “assassin’s mace”: a folklore term for a weapon that gives an advantage against a better-armed foe. If tensions were to spike over Taiwan or the South China Sea, for instance, China might be tempted to launch preemptive strikes with conventional hypersonic weapons that could cripple U.S. forces in the Pacific Ocean.For now, maneuverability at hypersonic speeds makes the weapons nearly impossible to shoot down—unstoppable…

At hypersonic speeds,  “You’re flying under extraordinary conditions”—extreme velocities, forces, and temperatures.  At hypersonic  speeds “temperatures start to get high enough to worry about… A vehicle’s survival requires resilient superalloys and ultra–high-temperature ceramics. And perhaps novel coolants…

Other nations are chasing the trio of leaders—or teaming up with them. Australia is collaborating with the United States on a Mach 8 HGV, and India with Russia on a Mach 7 Hypersonic Cruise Missile (HCM). France intends to field an HCM by 2022, and Japan is aiming for an HGV in 2026.

THE United States is largely defenseless against such weapons, at least for now, in part because it can’t track them…To remedy that shortcoming, the Pentagon plans to launch hundreds of small satellites with sensors capable of tracking heat sources an order of magnitude cooler than rocket boosters. The full Hypersonic and Ballistic Tracking Space Sensor network could be up and running by 2030, he adds. (The satellites would also be used to help guide U.S. hypersonic weapons.)  Once you have such sensors, “we can find a way to build the interceptors…Interceptors could destroy a hypersonic vehicle either by colliding with it or by detonating a warhead nearby. But Missile Defense Agency (MDA) is also exploring using directed energy: lasers, neutral particle beams, and microwaves or radio waves.

Richard StoneJan, National pride is at stake.’ Russia, China, United States race to build hypersonic weapons, Science, Jan 10, 2020

Stasi Reborn: Democratizing Internet Censorship

The internet is the “spiritual home” of hundreds of millions of Chinese people. So China’s leader, Xi Jinping, described it in 2016. He said he expected citizens to help keep the place tidy. Many have taken up the challenge. In December 2019 netizens reported 12.2m pieces of “inappropriate” content to the authorities—four times as many as in the same month of 2015. The surge does not indicate that the internet in China is becoming more unruly. Rather, censorship is becoming more bottom-up

Officials have been mobilising people to join the fight in this “drawn-out war”, as a magazine editor called it in a speech in September to Shanghai’s first group of city-appointed volunteer censors. “Internet governance requires that every netizen take part,” an official told the gathering. It was arranged by the city’s cyber-administration during its first “propaganda month” promoting citizen censorship. The 140 people there swore to report any online “disorder”…

 Information-technology rules, which took effect on December 1st, 2019 oblige new subscribers to mobile-phone services not only to prove their identities, as has long been required, but also to have their faces scanned. That, presumably, will make it easier for police to catch the people who post the bad stuff online.

Excerpt from  The Year of the Rat-fink: Online Censorship, Economist, Jan 18, 2020

Algorithms as Weapons –Tracking,Targeting Nuclear Weapons

 
New and unproved technologies—this time computer systems capable of performing superhuman tasks using machine learning and other forms of artificial intelligence (AI)—threaten to destabilise the global “strategic balance”, by seeming to offer ways to launch a knockout blow against a nuclear-armed adversary, without triggering an all-out war.

A report issued in November by America’s National Security Commission on Artificial Intelligence, a body created by Congress and chaired by Eric Schmidt, a former boss of Google, and Robert Work, who was deputy defence secretary from 2014-17, ponders how AI systems may reshape global balances of power, as dramatically as electricity changed warfare and society in the 19th century. Notably, it focuses on the ability of AI to “find the needle in the haystack”, by spotting patterns and anomalies in vast pools of data…In a military context, it may one day find the stealthiest nuclear-armed submarines, wherever they lurk. The commission is blunt. Nuclear deterrence could be undermined if AI-equipped systems succeed in tracking and targeting previously invulnerable military assets. That in turn could increase incentives for states, in a crisis, to launch a devastating pre-emptive strike. China’s rise as an AI power represents the most complex strategic challenge that America faces, the commission adds, because the two rivals’ tech sectors are so entangled by commercial, academic and investment ties.

Some Chinese officials sound gung-ho about AI as a path to prosperity and development, with few qualms about privacy or lost jobs. Still, other Chinese fret about AI that might put winning a war ahead of global stability, like some game-playing doomsday machine. Chinese officials have studied initiatives such as the “Digital Geneva Convention” drafted by Microsoft, a technology giant. This would require states to forswear cyber-attacks on such critical infrastructure as power grids, hospitals and international financial systems.  AI would make it easier to locate and exploit vulnerabilities in these…

One obstacle is physical. Warheads or missile defences can be counted by weapons inspectors. In contrast, rival powers cannot safely show off their most potent algorithms, or even describe AI capabilities in a verifiable way….Westerners worry especially about so-called “black box” algorithms, powerful systems that generate seemingly accurate results but whose reasoning is a mystery even to their designers.

Excerpts from Chaguan: The Digital Divide, Economist, Jan 18, 2019

Assassinations and Top Secret Chemicals: the case of Novichok Nerve Agent

In 2018, one of the Novichok nerve agents was used in an attempt to assassinate a former Russian spy on U.K. soil—spurring the United States and allies to lift the veil of secrecy and mount a drive to outlaw the obscure class of nerve agents, concocted in a Soviet weapons lab during the height of the Cold War. Now, their effort to amend the Chemical Weapons Convention (CWC) is about to pay off.

On 9 October, the Executive Council of the Organisation for the Prohibition of Chemical Weapons (OPCW), the body that administers the treaty, reviewed a revised proposal from Russia that would bring Novichoks under the treaty’s verification regime, along with a class of potential weapons known as carbamates. If the Russian proposal and a similar one from the United States, Canada, and the Netherlands are approved at a treaty review meeting in December 2019.

The newfound glasnost on Novichoks, also known as fourth-generation nerve agents, should spur research on their mechanism of action and on countermeasures and treatments.   Chemical weapons experts had been whispering about Novichoks for decades.   Treaty nations have long resisted adding Novichoks to the CWC’s so-called Schedule 1 list of chemical weapons, which compels signatories to declare and destroy any stockpiles. “People were worried about a Pandora’s box,” fearing such a listing would force them to regulate ingredients of the weapons, Koblentz says. That could hamper the chemical industry and might clue in enemies on how to cook them up. (Who has the agents now is anyone’s guess.) Indeed, the U.S. government for years classified the Novichok agents as top secret. “There was a desire among Western countries to keep the information as limited as possible to avoid proliferation issues,” Koblentz says.

The 2018 assassination attempt against former Russian spy Sergei Skripal in Salisbury, U.K., thrust the Novichok agents into the spotlight. The botched attack gravely sickened Skripal, his daughter Yulia, two police officers who investigated the crime scene, and a couple—Charlie Rowley and Dawn Sturgess—who a few months later happened on a perfume bottle containing the agent. After long hospitalizations, the Skripals, the officers, and Rowley recovered; Sturgess died. The United Kingdom charged two Russian men, reportedly military intelligence officers, as the alleged assailants, and obtained a European warrant for their arrest; they remain at large in Russia.

Excerpts from Richard Stone, Obscure Cold War nerve agents set to be banned, Science, Oct. 25, 2019

How to Engineer Bacteria to Search for Underground Chemical Weapons: DARPA

U.S. military researchers asked in 2019 two companies to develop new kinds of biological sensors that can detect underground disturbances or the presence of buried chemicals or weapons.

Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., are looking to Raytheon BBN Technologies, and Signature Science, for the BioReporters for Subterranean Surveillance program.  This project seeks to use indigenous and engineered organisms to sense changes of interest to military commanders in natural and built environments. Raytheon BBN and Signature Science won separate $1.6 million contracts for the Subterranean Surveillance progam.

The two companies will perform laboratory research and proof-of-concept demonstrations of biological sensing systems in well- controlled field tests that take advantage of recent advances in microbial science and synthetic biology to develop biological sensors, signal transducers, and reporters that can reveal subterranean phenomena at a distance.  Bio Reporters should be able to sense a phenomenon at least one meter below the surface, propagate a signal to the surface within seven days, and be continuously detectable on the surface at a distance of 10 meters over the subsequent seven days.

DARPA researchers want Raytheon BBN and Signature Science experts to take advantage of the extensive biological networks that exist underground to monitor large areas to increase the military’s ability to detect subterranean events without the need for precise coordinates.

Excerpts from John Keller, Researchers eye new biological sensors to to detect underground objects like buried chemicals and weapons, https://www.militaryaerospace.com,  Nov. 6, 2019

In more detail  Signature Science and its partner, the Texas A&M University Center for Phage Technology, aim to leverage modern and synthetic phage biology and the straightforward molecular genetics of the harmless soil bacterium Bacillus subtilis to generate a new platform to recognize and report on specific chemical threats underground. The Spore-Phage Amplified Detection (SPADe) method, potentially extensible to explosives, radiation or physical disturbance sensing, seeks to substantially advance currently used techniques which rely heavily on manual soil testing. 

Cyber-Attacking Nuclear Plants: the 3 000 cyber bugs

In the first half of 2019 , no country endured more cyber-attacks on its Internet of Things—the web of internet-connected devices and infrastructure—than India did. So asserts Subex, an Indian telecommunications firm, which produces regular reports on cyber-security. Between April and June of 2019, it said, recorded cyber-attacks jumped by 22%, with 2,550 unique samples of malware discovered. Some of that malicious code is turning up in hair-raising places.

On October 28, 2019 reports indicated that malware had been found on the computer systems of Kudankulam Nuclear Power Plant in Tamil Nadu, the newest and largest such power station in India. Pukhraj Singh, a cybersecurity researcher who formerly worked for the National Technical Research Organisation (NTRO), India’s signals-intelligence agency, says he was informed of the malware by an undisclosed third party in September, and notified the government.The attackers, he said, had acquired high-level access and struck “extremely mission-critical targets”…. On October 30, 2019 the body that operates nuclear power plants acknowledged, sheepishly, that a computer had indeed been infected, but it was only an “administrative” one.

Sensitive sites such as power plants typically isolate the industrial-control systems (those that control the workings of a plant) from those connected to the wider internet. They do so using air-gaps (which involve disconnecting the system from the wider world), firewalls (which monitor data-flows for suspicious traffic) or data diodes (which allow information to flow out but not in).

But breaching a computer on the outside of these digital moats is nevertheless troubling. It could have given the attackers access to sensitive emails, personnel records and other details which would, in turn, make it easier to gain access to the more isolated operational part of the plant. America and Israel are thought to have sneaked the devastating Stuxnet virus into Iran’s air-gapped uranium-enrichment plant at Natanz around 2007 by planting a USB stick on a worker, who carried it inside and plugged it in.

The culprit behind the Kudankulam attack is unknown, but left some clues. The malware in question is from a family known as DTrack, which gives attackers an intimate look at what victims are doing—down to their keystrokes. It is typically used to monitor a target, making it easier to deliver further malware. DTrack was originally developed by a group of hackers known as the Lazarus Group, who are widely assumed to be controlled or directed by North Korea.

Excerpts from On the DTrack: A cyber-attack on an Indian nuclear plant raises worrying questions, Economist, Nov. 1, 2019

How to Fool your Enemy: Artificial Intelligence in Conflict

The contest between China and America, the world’s two superpowers, has many dimensions… One of the most alarming and least understood is the race towards artificial-intelligence-enabled warfare. Both countries are investing large sums in militarised artificial intelligence  (AI), from autonomous robots to software that gives generals rapid tactical advice in the heat of battle….As Jack Shanahan, a general who is the Pentagon’s point man for AI, put it last month, “What I don’t want to see is a future where our potential adversaries have a fully ai-enabled force and we do not.”

AI-enabled weapons may offer superhuman speed and precision.  In order to gain a military advantage, the temptation for armies will be to allow them not only to recommend decisions but also to give orders. That could have worrying consequences. Able to think faster than humans, an AI-enabled command system might cue up missile strikes on aircraft carriers and airbases at a pace that leaves no time for diplomacy and in ways that are not fully understood by its operators. On top of that, ai systems can be hacked, and tricked with manipulated data.

AI in war might aid surprise attacks or confound them, and the death toll could range from none to millions.  Unlike missile silos, software cannot be spied on from satellites. And whereas warheads can be inspected by enemies without reducing their potency, showing the outside world an algorithm could compromise its effectiveness. The incentive may be for both sides to mislead the other. “Adversaries’ ignorance of AI-developed configurations will become a strategic advantage,” suggests Henry Kissinger, who led America’s cold-war arms-control efforts with the Soviet Union…Amid a confrontation between the world’s two big powers, the temptation will be to cut corners for temporary advantage. 

Excerpts from Mind control: Artificial intelligence and war, Economist,  Sept. 7, 2019

Example of the Use of AI in Warfare: The Real-time Adversarial Intelligence and Decision-making (RAID) program under the auspices of The Defense Advanced Research Projects Agency’s (DARPA) Information Exploitation Office (IXO)  focuses on the challenge of anticipating enemy actions in a military operation. In the US Air Force community, the term, predictive battlespace awareness, refers to capabilities that would help the commander and staff to characterize and predict likely enemy courses of action…Today’s practices of military intelligence and decision-making do include a number of processes specifically aimed at predicting enemy actions. Currently, these processes are largely manual as well as mental, and do not involve any significant use of technical means. Even when computerized wargaming is used (albeit rarely in field conditions), it relies either on human guidance of the simulated enemy units or on simple reactive behaviors of such simulated units; in neither case is there a computerized prediction of intelligent and forward-looking enemy actions….

[The deception reasoning of the adversary is very important in this context.]  Deception reasoning refers to an important aspect of predicting enemy actions: the fact that military operations are historically, crucially dependent on the ability to use various forms of concealment and deception for friendly purposes while detecting and counteracting the enemy’s concealment and deception. Therefore, adversarial reasoning must include deception reasoning.

The RAID Program will develop a real-time adversarial predictive analysis tool that operates as an automated enemy predictor providing a continuously updated picture of probable enemy actions in tactical ground operations. The RAID Program will strive to: prove that adversarial reasoning can be automated; prove that automated adversarial reasoning can include deception….

Excerpts from Real-time Adversarial Intelligence and Decision-making (RAID), US Federal Grants

Dodging the Camera: How to Beat the Surveillance State in its Own Game

Powered by advances in artificial intelligence (AI), face-recognition systems are spreading like knotweed. Facebook, a social network, uses the technology to label people in uploaded photographs. Modern smartphones can be unlocked with it… America’s Department of Homeland Security reckons face recognition will scrutinise 97% of outbound airline passengers by 2023. Networks of face-recognition cameras are part of the police state China has built in Xinjiang, in the country’s far west. And a number of British police forces have tested the technology as a tool of mass surveillance in trials designed to spot criminals on the street.  A backlash, though, is brewing.

Refuseniks can also take matters into their own hands by trying to hide their faces from the cameras or, as has happened recently during protests in Hong Kong, by pointing hand-held lasers at cctv cameras. to dazzle them. Meanwhile, a small but growing group of privacy campaigners and academics are looking at ways to subvert the underlying technology directly…

Laser Pointers Used to Blind CCTV cameras during the Hong Kong Protests 2019

In 2010… an American researcher and artist named Adam Harvey created “cv [computer vision] Dazzle”, a style of make-up designed to fool face recognisers. It uses bright colours, high contrast, graded shading and asymmetric stylings to confound an algorithm’s assumptions about what a face looks like. To a human being, the result is still clearly a face. But a computer—or, at least, the specific algorithm Mr Harvey was aiming at—is baffled….

Modern Make-Up to Hide from CCTV cameras

HyperFace is a newer project of Mr Harvey’s. Where cv Dazzle aims to alter faces, HyperFace aims to hide them among dozens of fakes. It uses blocky, semi-abstract and comparatively innocent-looking patterns that are designed to appeal as strongly as possible to face classifiers. The idea is to disguise the real thing among a sea of false positives. Clothes with the pattern, which features lines and sets of dark spots vaguely reminiscent of mouths and pairs of eyes are available…

Hyperface Clothing for Camouflage

 Even in China, says Mr Harvey, only a fraction of cctv cameras collect pictures sharp enough for face recognition to work. Low-tech approaches can help, too. “Even small things like wearing turtlenecks, wearing sunglasses, looking at your phone [and therefore not at the cameras]—together these have some protective effect”. 

Excerpts from As face-recognition technology spreads, so do ideas for subverting it: Fooling Big Brother,  Economist, Aug. 17, 2019

Who Owns Your Voice? Grabbing Biometric Data

Increasingly sophisticated technology that detects nuances in sound inaudible to humans is capturing clues about people’s likely locations, medical conditions and even physical features.Law-enforcement agencies are turning to those clues from the human voice to help sketch the faces of suspects. Banks are using them to catch scammers trying to imitate their customers on the phone, and doctors are using such data to detect the onset of dementia or depression.  That has… raised fresh privacy concerns, as consumers’ biometric data is harnessed in novel ways.

“People have known that voice carries information for centuries,” said Rita Singh, a voice and machine-learning researcher at Carnegie Mellon University who receives funding from the Department of Homeland Security…Ms. Singh measures dozens of voice-quality features—such as raspiness or tremor—that relate to the inside of a person’s vocal tract and how an individual voice is produced. She detects so-called microvolumes of air that help create the sound waves that make up the human voice. The way they resonate in the vocal tract, along with other voice characteristics, provides clues on a person’s skull structure, height, weight and physical surroundings, she said.

Nuance’s voice-biometric and recognition software is designed to detect the gender, age and linguistic background of callers and whether a voice is synthetic or recorded. It helped one bank determine that a single person was responsible for tens of millions of dollars of theft, or 18% of the fraud the firm encountered in a year, said Brett Beranek, general manager of Nuance’s security and biometrics business.

Audio data from customer-service calls is also combined with information on how consumers typically interact with mobile apps and devices, said Howard Edelstein, chairman of behavioral biometric company Biocatch. The company can detect the cadence and pressure of swipes and taps on a smartphone.  How a person holds a smartphone gives clues about their age, for example, allowing a financial firm to compare the age of the normal account user to the age of the caller…

If such data collected by a company were improperly sold or hacked, some fear recovering from identity theft could be even harder because physical features are innate and irreplaceable.

Sarah Krouse, What Your Voice Reveals About You, WSJ, Aug. 13, 2019

Who is Afraid of Shamoon? How to Wipe a Country Off the Face of the Earth

Suspected Iranian hackers infiltrated critical infrastructure and government computers in the Persian Gulf nation of Bahrain in July-August  2019, raising fears among leaders in the region that Tehran is stepping up its cyberattacks amid growing tensions…Hackers broke into the systems of Bahrain’s National Security Agency—the country’s main criminal investigative authority—as well as the Ministry of Interior and the first deputy prime minister’s office, according to one of the people familiar with the matter.

On July 25, 2019 Bahrain authorities identified intrusions into its Electricity and Water Authority. The hackers shut down several systems in what the authorities believed was a test run of Iran’s capability to disrupt the country, the person said. “They had command and control of some of the systems,” the person said.  The breaches appeared broadly similar to two hacks in 2012 that knocked Qatar’s natural-gas firm RasGas offline and wiped data from computer hard drives belonging to Saudi Arabia’s Aramco national oil company, a devastating attack that relied on a powerful virus known as Shamoon.  Bahrain is the smallest country in the Persian Gulf, but it is strategically important because it’s the permanent home of the U.S. Navy’s Fifth Fleet and Navy Central Command. It is closely allied with its much larger neighbor, Saudi Arabia, a regional rival of Iran.

The Bahrain authorities haven’t definitively attributed the attack to Iran, but they have been provided intelligence by the U.S. and others suggesting Iran is behind it, the people familiar with the matter said….“In the first half of 2019, the Information & eGovernment Authority successfully intercepted over 6 million attacks and over 830,000 malicious emails. The attempted attacks did not result in downtime or disruption of government services,” 

Excerpt from High-Level Cyber Intrusions Hit Bahrain Amid Tensions With Iran, WSJ, Aug. 7, 2019

How to Prepare for Deadly Flu and Nuclear Fallout

Breakthroughs in the science of programmable gene expression inspired DARPA to establish the PReemptive Expression of Protective Alleles and Response Elements (PREPARE) program with the goal of delivering powerful new defenses against public health and national security threats. DARPA has now selected five teams to develop a range of new medical interventions that temporarily and reversibly modulate the expression of protective genes to guard against acute threats from influenza and ionizing radiation, which could be encountered naturally, occupationally, or through a national security event.

The program builds from the understanding that the human body has innate defenses against many types of health threats, but that the body does not always activate these defenses quickly or robustly enough to block the worst damage. To augment existing physiological responses, PREPARE technologies would provide a programmable capability to up- or down-regulate gene expression on demand, providing timely, scalable defenses that are proportional to anticipated threats. Service members and first responders could administer these interventions prior to threat exposure or therapeutically after exposure to mitigate the risk of harm or death.

Influenza: “Researchers working within the PREPARE program seek to improve rates of survival and recovery in catastrophic scenarios for which reliable and scalable countermeasures don’t currently exist,” said Dr. Renee Wegrzyn, the PREPARE program manager….Three PREPARE teams are pursuing multi-pronged approaches to influenza defense and treatment that use programmable gene modulators to boost the human body’s natural defenses against influenza and also weaken the virus’ ability to cause harm by directly neutralizing the viral genomes. If successful, their approaches would potentially protect against virtually all influenza strains — regardless of whether a virus is newly emergent or has developed drug resistance — and would provide near instantaneous immunity, in contrast to traditional vaccines. Additionally, the teams are designing their countermeasures so that they are simple to deliver — for example, as intranasal sprays — reducing the logistical challenge of protecting large numbers of people.A team led by DNARx LLC, under principal investigator Dr. Robert Debs, aims to develop a new DNA-encoded gene therapy that helps patients fight influenza by boosting the natural immune response and other protective functions of their nasal passages and lungs.

Radiation Hazard Symbol

Ionizing Gamma Radiation: Other PREPARE teams are pursuing treatments to protect the body from the effects of ionizing gamma radiation. In humans, radiation poisoning primarily affects stem cells in the blood and gut, yet existing treatments only help to regenerate blood cells, and only with limited effect. There is no possibility for prophylactic administration of these drugs, and most must be delivered immediately following radiation exposure to provide any benefit. There are no existing medical countermeasures for radiation damage to the gut
A team led by the University of California, San Francisco, under principal investigator Dr. Jonathan Weissman, also aims to develop gene therapies to enhance resilience against ionizing radiation. The team’s approach should result in an intravenous or orally available treatment that activates innate defenses in gut and blood stem cells for a period of several weeks.

A Dose of Inner Strength to Survive and Recover from Potentially Lethal Health Threats
New tools for programmable modulation of gene expression could yield enhanced resilience against influenza and ionizing radiation for service members and first responders, DARPA Press Release, June 27, 2019

Nuclear Submarines on Fire (2)

Vladimir Putin has confirmed  on July 4, 2019  that the top-secret submarine that suffered a deadly fire was nuclear-powered, but Russia’s defence minister said the nuclear unit had been sealed off and was in “working order.”  The incident, which left 14 Russian sailors dead,  The Russian government has been slow to reveal information about the incident because the submersible, thought to be a deep-diving vessel used for research and reconnaissance, is among Russia’s most secret military projects.  The fire aboard the “Losharik” AS-31 submersible began in the battery compartment and spread through the vessel…The vessel is thought to be made of a series of orb-like compartments, which increase the submersible’s resilience and allow it to dive to the ocean floor. Once there, it can perform topographical research and participate in rescue missions. It may even be able to tap and sever communications cables on the seabed.

Officials claim the submariners sealed themselves in one of the compartments to battle the blaze and toxic fumes…A Norwegian official told Reuters there had been no “formal communication” from Russia about an incident aboard a nuclear-powered vessel, but “we would have been happy to have been informed of such incidents”….Accidents aboard submarines invariably evoke comparisons to Putin’s clumsy handling of the sinking of the Kursk nuclear submarine in 2000, which left 118 dead and families desperate for information about their loved ones.

Excerpt Putin confirms fire-hit Russian submarine was nuclear-powerered, Guardian, July 4, 2019

Black Operations are Getting Blacker: US Military

Heterogeneous Collaborative Unmanned Systems (HCUS), as these drones will be known, would be dropped off by either a manned submarine or one of the navy’s big new Orca robot submersibles.

Logo for Orca Submarine by Lockheed Martin

They could be delivered individually, but will more often be part of a collective system called an encapsulated payload. Such a system will then release small underwater vehicles able to identify ships and submarines by their acoustic signatures, and also aerial drones similar to the BlackWing reconnaissance drones already flown from certain naval vessels.

BlackWing

Once the initial intelligence these drones collect has been analysed, a payload’s operators will be in a position to relay further orders. They could, for example, send aerial drones ashore to drop off solar-powered ground sensors at specified points. These sensors, typically disguised as rocks, will send back the data they collect via drones of the sort that dropped them off. Some will have cameras or microphones, others seismometers which detect the vibrations of ground vehicles, while others still intercept radio traffic or Wi-Fi.

Lockheed Martin Ground Sensor Disguised as Rock

HCUS will also be capable of what are described as “limited offensive effects”. Small drones like BlackWing can be fitted with warheads powerful enough to destroy an SUV or a pickup truck. Such drones are already used to assassinate the leaders of enemy forces. They might be deployed against fuel and ammunition stores, too.

Unmanned systems such as HCUS thus promise greatly to expand the scope of submarine-based spying and special operations. Drones are cheap, expendable and can be deployed with no risk of loss of personnel. They are also “deniable”. Even when a spy drone is captured it is hard to prove where it came from. Teams of robot spies and saboteurs launched from submarines, both manned and unmanned, could thus become an important feature of the black-ops of 21st-century warfare.

Excerpts from Submarine-launched drone platoons will soon be emerging from the sea: Clandestine Warfare, Economist, June 22, 2019

If You Control Space, You Control Everything: Space as War Domain

The North Atlantic Treaty Organization (NATO) is looking to classify space as a domain for warfare in an attempt to deter China’s growing military power.  If NATO’s proposal succeeds, the international alliance could move forward with the development and use of space weapons.  According to NATO diplomats, the international organization is preparing to release an agreement that will officially declare space as a war domain. This means that aside from land, air and sea, space could also be used for military operations during times of war.

Although NATO’s partner countries currently own 65% of the satellites in space, China is reportedly preparing to launch a massive project that involves releasing constellations of satellites in low Earth orbit.  China Aerospace Science and Industry Corp (CASIC)  is planning to put in orbit 150 or more Hongyun satellites by 2023. Some of these satellites will provide commercial services like high-speed internet while others would be controlled by the Chinese military. These militarized satellites can be used to coordinate ground forces and to track approaching missiles.

“You can have warfare exclusively in space, but whoever controls space also controls what happens on land, on the sea and in the air,” according to Jamie Shea, a former NATO official. “If you don’t control space, you don’t control the other domains either.”

Excerpts from Inigo Monzon , NATO Prepares For Space Warfare By Militarizing Low Earth Orbit, International Business Times, June 24, 2019

How Companies Buy Social License: the ExxonMobil Example

The Mobil Foundation sought to use its tax-exempt grants to shape American laws and regulations on issues ranging from the climate crisis to toxic chemicals – with the explicit goal of benefiting Mobil, documents obtained by the Guardian newspaper show.  Recipients of Mobil Foundation grants included Ivy League universities, branches of the National Academies and well-known civic organizations and environmental researchers.  Benefits for Mobil included – in the foundation’s words – funding “a counterpoint to so-called ‘public interest’ groups”, helping Mobil obtain “early access” to scientific research, and offering the oil giant’s executives a forum to “challenge the US Environmental Protection Agency (EPA) behind-the-scenes”….

A third page reveals Mobil Foundation’s efforts to expand its audience inside environmental circles via a grant for the Environmental Law Institute, a half-century-old organization offering environmental law research and education to lawyers and judges.  “Institute publications are widely read in the environmental community and are helpful in communicating industry’s concerns to such organizations,” the entry says. “Mobil Foundation grants will enhance environmental organizations’ views of Mobil, enable us to reach through ELI activities many groups that we do not communicate with, and enable Mobil to participate in their dialogue groups.”

The documents also show Mobil Foundation closely examining the work of individual researchers at dozens of colleges and universities as they made their funding decisions, listing ways that foundation grants would help shape research interests to benefit Mobil, help the company recruit future employees, or help combat environmental and safety regulations that Mobil considered costly.  “It should be a wake-up call for university leaders, because what it says is that fossil fuel funding is not free,” said Geoffrey Supran, a postdoctoral researcher at Harvard and MIT.  “When you take it, you pay with your university’s social license,” Supran said. “You pay by helping facilitate these companies’ political and public relations tactics.”

In some cases, the foundation described how volunteer-staffed not-for-profits had saved Mobil money by doing work that would have otherwise been performed by Mobil’s paid staff, like cleaning birds coated in oil following a Mobil spill.  In 1987, the International Bird Rescue Research Center’s “rapid response and assistance to Mobil’s West Coast pipeline at a spill in Lebec, CA not only defused a potential public relations problem”, Mobil Foundation said, “but saved substantial costs by not requiring our department to fly cross country to respond”.d of trustees at the Woods Hole Oceanographic Institution (recipient of listed donations totalling over $200,000 from Mobil) and a part of UN efforts to study climate change.

Wise ultimately co-authored two UN Intergovernmental Panel on Climate Change reports, serving as a lead author on one. One report chapter Wise co-authored prominently recommended, among other things, burning natural gas (an ExxonMobil product) instead of coal as a way to combat climate change.

Excerpts from How Mobil pushed its oil agenda through ‘charitable giving’, Guardian, June 12, 2019

Your Typing Discloses Who You Are: Behavioral Biometrics

Behavioural biometrics make it possible to identify an individual’s “unique motion fingerprint”,… With the right software, data from a phone’s sensors can reveal details as personal as which part of someone’s foot strikes the pavement first, and how hard; the length of a walker’s stride; the number of strides per minute; and the swing and spring in the walker’s hips and step. It can also work out whether the phone in question is in a handbag, a pocket or held in a hand.

Using these variables, Unifyid, a private company, sorts gaits into about 50,000 distinct types. When coupled with information about a user’s finger pressure and speed on the touchscreen, as well as a device’s regular places of use—as revealed by its gps unit—that user’s identity can be pretty well determined, ction….Behavioural biometrics can, moreover, go beyond verifying a user’s identity. It can also detect circumstances in which it is likely that a fraud is being committed. On a device with a keyboard, for instance, a warning sign is when the typing takes on a staccato style, with a longer-than-usual finger “flight time” between keystrokes. This, according to Aleksander Kijek, head of product at Nethone, a firm in Warsaw that works out behavioural biometrics for companies that sell things online, is an indication that the device has been hijacked and is under the remote control of a computer program rather than a human typist…

Used wisely, behavioural biometrics could be a boon…Used unwisely, however, the system could become yet another electronic spy on people’s privacy, permitting complete strangers to monitor your every action, from the moment you reach for your phone in the morning, to when you fling it on the floor at night.

Excerpts from Behavioural biometrics: Online identification is getting more and more intrusive, Economist, May 23, 2019

Who is Afraid of the United States?

In 2018 America imposed sanctions on about 1,500 people, firms, vessels and other entities, nearly triple the number in 2016. The past six months of 2019 have been particularly eventful. America began imposing sanctions on Iran in November, and in January on Venezuela, another big oil exporter. On May 9th 2019, for the first time, it seized a ship accused of transporting banned North Korean coal.

Second, blackballed countries and unscrupulous middlemen are getting better at evasion. In March 2019advisers to the un, relying in part on Windward data, and American Treasury officials published separate reports that described common ways of doing it. Boats turn off their transmissions systems to avoid detection. Oil is transferred from one ship to another in the middle of the ocean—ships trading on behalf of North Korea find each other in the East China Sea using WeChat, a popular Chinese messaging service. Captains disguise a ship’s identity by manipulating transponder data to transmit false locations and identity numbers of different vessels.

Such methods have helped Iran and Russia transport oil to Syria, American officials say. In 2018 North Korea managed to import refined petroleum far in excess of the level allowed by multilateral sanctions. The situation in Venezuela is different—technically, America’s sanctions still allow foreigners to do business with the country. But fear that sanctions will expand mean that traditional trading partners are scarce. Nicolás Maduro’s regime this month found a shipowner to transport crude to India, according to a shipbroker familiar with the deal, but Venezuela had to pay twice the going rate.

Businesses keen to understand such shenanigans can be roughly divided into two categories. The first includes those who can profit from grasping sanctions’ impact on energy markets, such as hedge funds, analysts and traders. A squadron of firms is ready to assist them, combing through ship transmission data, commercial satellite imagery and other public and semi-public information. They do not specialise in sanctions, but sanctions are boosting demand for their tracking and data-crunching expertise.

A main determinant of Venezuela’s output, for instance, is access to the diluent it needs to blend with its heavy crude. A firm called Clipper Data has noted Russian ships delivering diluent to vessels near Malta, which then transport it to Venezuela. Kpler, a French rival, uses satellite images of shadows on lids of storage tanks to help estimate the volume of oil inside. Using transmissions data, images, port records and more, Kpler produces estimates of Iran’s exports for customers such as the International Energy Agency and Bernstein, a research firm—including a recent uptick in Iranian exports without a specific destination (see chart).

The second category of companies are wary of violating sanctions themselves. They need assistance of a different sort. Latham & Watkins, a firm that advised the chairman of EN+, which controls a Russian aluminium giant, as he successfully removed the company from America’s sanctions list this year, has seen a surge in sanctions-related business. Refinitiv, a data company, offers software which permits clients to screen partners and customers against lists of embargoed entities. Windward uses machine learning to pore over data such as ships’ travel patterns, transmissions gaps (some of which may be legitimate) and name changes to help firms identify suspicious activity. Kharon, founded last year by former United States Treasury officials, offers detailed analysis of anyone or anything on sanctions lists.

HIde and Seek: Sanctions Inc, Economist, May 18, 2019

US v. China: The Slow and Sure Conquest of Internet Infrastructure


A new front has opened in the battle between the U.S. and China over control of global networks that deliver the internet. This one is beneath the ocean. While the U.S. wages a high-profile campaign to exclude China’s Huawei Technologies Co. from next-generation mobile networks over fears of espionage, the company is embedding itself into undersea cable networks that ferry nearly all of the world’s internet data.

About 380 active submarine cables—bundles of fiber-optic lines that travel oceans on the seabed—carry about 95% of intercontinental voice and data traffic, making them critical for the economies and national security of most countries. 

The Huawei Marine’s Undersea Cable Network majority owned by Huawei Technologies, has worked on some 90 projects to build or upgrade submarine cables around the world…US o fficials say the company’s knowledge of and access to undersea cables could allow China to attach devices that divert or monitor data traffic—or, in a conflict, to sever links to entire nations.  Such interference could be done remotely, via Huawei network management software and other equipment at coastal landing stations, where submarine cables join land-based networks, these officials say.

Huawei Marine said in an email that no customer, industry player or government has directly raised security concerns about its products and operations.Joe Kelly, a Huawei spokesman, said the company is privately owned and has never been asked by any government to do anything that would jeopardize its customers or business. “If asked to do so,” he said, “we would refuse.”

The U.S. has sought to block Huawei from its own telecom infrastructure, including undersea cables, since at least 2012. American concerns about subsea links have since deepened—and spread to allies—as China moves to erode U.S. dominance of the world’s internet infrastructure…..Undersea cables are owned mainly by telecom operators and, in recent years, by such content providers as Facebook and Google. Smaller players rent bandwidth.Most users can’t control which cable systems carry their data between continents. A handful of switches typically route traffic along the path considered best, based on available capacity and agreements between cable operators.

In June 2017, Nick Warner, then head of Australia’s Secret Intelligence Service, traveled to the Solomon Islands, a strategically located South Pacific archipelago. His mission, according to people familiar with the visit, was to block a 2016 deal with Huawei Marine to build a 2,500-mile cable connecting Sydney to the Solomons.  Mr. Warner told the Solomons’ prime minister the deal would give China a connection to Australia’s internet grid through a Sydney landing point, creating a cyber risk, these people said. Australia later announced it would finance the cable link and steered the contract to an Australian company.  In another recent clash, the U.S., Australia and Japan tried unsuccessfully in September 2018 to quash an undersea-cable deal between Huawei Marine and Papua New Guinea.

U.S. and allied officials point to China’s record of cyber intrusions, growing Communist Party influence inside Chinese firms and a recent Chinese law requiring companies to assist intelligence operations. Landing stations are more exposed in poorer countries where cyber defenses tend to be weakest, U.S. and allied officials said. And network management systems are generally operated using computer servers at risk of cyber intrusion. Undersea cables are vulnerable, officials said, because large segments lie in international waters, where physical tampering can go undetected. At least one U.S. submarine can hack into seabed cables, defense experts said. In 2013, former National Security Agency contractor Edward Snowden alleged that Britain and the U.S. monitored submarine cable data. The U.S. and its allies now fear such tactics could be used against them. American and British military commanders warned recently that Russian submarines were operating near undersea cables. In 2018, the U.S. sanctioned a Russian company for supplying Russian spies with diving equipment to help tap seabed cables.


The Ionian Sea Submarine Cable Project (Greece) 

China seeks to build a Digital Silk Road, including undersea cables, terrestrial and satellite links, as part of its Belt and Road plan to finance a new global infrastructure network. Chinese government strategy papers on the Digital Silk Road cite the importance of undersea cables, as well as Huawei’s role in them. A research institute attached to China’s Ministry of Industry and Information Technology, in a paper published in September, praised Huawei’s technical prowess in undersea cable transmission and said China was poised to become “one of the world’s most important international submarine cable communication centers within a decade or two.” China’s foreign and technology ministries didn’t respond to requests for comment…

Huawei Marine Networks

Bjarni Thorvardarson, then chief executive of the cable’s Ireland-based operator, said U.S. authorities raised no objections until 2012, when a congressional report declared Huawei Technologies a national security threat. Mr. Thorvardarson wasn’t convinced. “It was camouflaged as a security risk, but it was mostly about a preference for using U.S. technology,” he said. Under pressure, Mr. Thorvardarson dropped Huawei Marine from Project Express in 2013. The older cable network continued to use Huawei equipment.

The company is now the fourth-biggest player in an industry long dominated by U.S.-based SubCom and Finnish-owned Alcatel Submarine Networks. Japan’s NEC Corp is in third place.Huawei Marine is expected to complete 28 cables between 2015 and 2020—nearly a quarter of all those built globally—and it has upgraded many more, according to TeleGeography, a research company.

Excerpts from America’s Undersea Battle With China for Control of the Global Internet Grid , WSJ, Mar. 12, 2019

Who Has the Right to Free Speech? Let Credit Cards Decide The Wikileaks Saga from 2010 to 2019

Visa and Mastercard’s partner company in Iceland, Valitor was found guilty by the Reykjavik District Court for illegally blocking payments to the controversial international nonprofit WikiLeaks – a media outlet that publishes classified documents provided by anonymous sources The case against Valitor began sometime in 2010 when a data hosting company named DataCell was given the responsibility to handle donations sent to WikiLeaks.The year 2010 was a particularly important one for the publishing company as its famous Chelsea Manning leaks made rounds in media houses across the world. However, soon after the leaks, Valitor blocked transactions from Visa card holders in Iceland to WikiLeaks, thus starting a legal tug-of-war that would last for years.

Fast forward to 2019, DataCell has finally won the legal battle against Valitor which has now been ordered to pay approximately $9.85 million to both DataCell and Wikileaks’ publishing firm, Sunshine Press Productions.

Excerpts from Iceland: Debit Card Company Fined $9.85 Million for Blocking WikiLeaks Payment, April 30, 2019

An Affordable and Risk Free Way to Kill: Drones

Armed drones have become ubiquitous in the Middle East, say Aniseh Bassiri Tabrizi and Justin Bronk of the Royal United Services Institute, a British think-tank, in a recent report. America has jealously guarded the export of such aircraft for fear that they might fall out of government hands, be turned on protesters or used against Israel. America has also been constrained by the Missile Technology Control Regime, an arms-control agreement signed by 35 countries, including Russia, that restricts the transfer of particularly capable missiles and drones (both rely on the same underlying technology).

China…has sold missile-toting drones to Egypt, Jordan, Iraq, Saudi Arabia and the United Arab Emirates (UAE). All are American security partners…. Other countries, such as Israel, Turkey and Iran, have filled the gap with their own models.  America wants to muscle its way back into the market. In April 2018 the Trump administration began loosening export rules to let countries buy armed drones directly from defence companies rather than through official channels. Drones with “strike-enabling technology”, such as lasers to guide bombs to their targets, were reclassified as unarmed. American drones are costlier and require more paperwork than Chinese models, but are more capable. ..The flood of drones into the market is already making an impact—sometimes literally. Ms Tabrizi and Mr Bronk say some Middle Eastern customers see drones as an “affordable and risk-free” way to strike across borders… 

Drone Bayraktar made by Turkey

Non-state actors are unwilling to be left out of the party. The jihadists of Islamic State often used drones in Iraq and Syria. Hizbullah used drones when it hit 23 fighters linked to al-Qaeda in Syria in 2014. The Houthi drone that bombed Al-Anad looked a lot like an Iranian model. Last year the Houthis sent a similar one more than 100km (60 miles) into Saudi Arabia before it was shot down. ..

Excerpts from Predator Pricing: Weapon Sales, Economist,  Mar. 9, 2019

The Secret Powers of Saudi Arabia — Murder not Included

In 2016 Muhammad bin Salman, Saudi Arabia’s crown prince and de facto ruler, announced the latest stage of “Saudisation”—the replacement of foreign workers with Saudi ones. It now appears the policy does not stop at swapping out bankers and bakers, but extends to ballistic missiles.  Satellite photos analysed by researchers from the Middlebury Institute of International Studies, and reported by the Washington Post, appear to show that Saudi Arabia has been building a factory for rocket engines, at an existing missile base in al-Watah, south-west of Riyadh. It seems to be configured for solid-fuel rockets, which can be launched more quickly than liquid-fuelled ones….he rocket factory was “designed, equipped and constructed by an outside entity”. Saudi Arabia has “no capacity” for such a project. The facility, he notes, closely resembles a Chinese one in Lantian.

Saudi Arabia is no newcomer to missiles. Having watched Iran and Iraq fling them at each other during the 1980s, it bought a few dozen df-3 missiles from China in 1987. It came close to unleashing them after being struck by Iraqi Scud missiles during the Gulf war in 1991. In the 2000s it probably picked up a batch of newer, more accurate Chinese df-21s.

Iran, the kingdom’s arch-rival, has been honing its missile force despite Western opposition and un rebukes, conducting 135 test launches since 1990. On December 1st, 2018  it tested one thought capable of comfortably reaching any corner of Saudi soil….Nor is Iran the only concern. Hizbullah, a Lebanese militant group nurtured and armed by Iran, has a growing arsenal of missiles; some can already reach the north-western parts of Saudi Arabia. Israel is also armed to the teeth. Though Prince Muhammad is on good terms with the Jewish state, satellite images published in 2013 reportedly showed that one of the Saudi df-3 launching pads at al-Watah was set in the direction of Tel Aviv.

Because missiles are ideal delivery systems for nuclear weapons, news of the plant has also revived worries about Saudi Arabia’s atomic intentions…Without a doubt if Iran developed a nuclear bomb,” warned Prince Muhammad last March, “we will follow suit

So the Saudis may turn to other nuclear friends. Western diplomats and spooks have long been concerned that Pakistan, whose own nuclear programme was bankrolled by Saudi Arabia, might be a ready supplier of know-how, fuel or bombs. In 1999 Saudi Arabia’s then defence minister horrified American officials by touring Pakistan’s nuclear facilities and meeting A.Q. Khan, the scientist who sold nuclear technology to North Korea, Iran and Libya. Ties remain close. Prince Muhammad was due to agree on $14bn of investment in Pakistan during a visit to the country on February 16th.  2019. ….

Excerpts from Protection rocket Saudi Arabia’s missile race, Economist, Feb. 16, 2019

How Iranian Oil Escapes US Sanctions

 At least two tankers have ferried Iranian fuel oil to Asia in February 2019 despite U.S. sanctions against such shipments, according to a Reuters analysis of ship-tracking data and port information, as well as interviews with brokers and traders.  The shipments were loaded onto tankers with documents showing the fuel oil was Iraqi. But three Iraqi oil industry sources and Prakash Vakkayil, a manager at United Arab Emirates (UAE) shipping services firm Yacht International Co, said the papers were forged.  The people said they did not know who forged the documents, nor when.

“Some buyers…will want Iranian oil regardless of U.S. strategic objectives to deny Tehran oil revenue, and Iran will find a way to keep some volumes flowing,” said Peter Kiernan, lead energy analyst at the Economist Intelligence Unit.  While the United States has granted eight countries temporary waivers allowing limited purchases of Iranian crude oil, these exemptions do not cover products refined from crude, including fuel oil, mainly used to power the engines of large ships. Documents forwarded to Reuters by ship owners say a 300,000 tonne-supertanker, the Grace 1, took on fuel oil at Basra, Iraq, between Dec. 10 and 12, 2018. But Basra port loading schedules reviewed by Reuters do not list the Grace 1 as being in port during those dates.  One Iraqi industry source with knowledge of the port’s operations confirmed there were no records of the Grace 1 at Basra during this period. 

Grace 1 oil tanker

Reuters examined data from four ship-tracking information providers – Refinitiv, Kpler, IHS Markit and Vessel Finder – to locate the Grace 1 during that time. All four showed that the Grace 1 had its Automatic Identification System (AIS), or transponder, switched off between Nov. 30 and Dec. 14, 2018, meaning its location could not be tracked.  The Grace 1 then re-appeared in waters near Iran’s port of Bandar Assaluyeh, fully loaded, data showed. The cargo was transferred onto two smaller ships in UAE waters in January, from where one ship delivered fuel oil to Singapore in February 2019.  Shipping documents showed about 284,000 tonnes of fuel oil were transferred in the cargoes tracked by Reuters, worth about $120 million at current prices…

One of those vessels, the 130,000 tonne-capacity Kriti Island, offloaded fuel oil into a storage terminal in Singapore around Feb. 5 to 7. Reuters was unable to determine who purchased the fuel oil for storage in Singapore.  The Kriti Island is managed by Greece’s Avin International SA… Avin International’s Chief Executive Officer George Mylonas told Reuters. Mylonas confirmed the Kriti Island took on fuel oil from the Grace 1.There is no indication that Avin International knowingly shipped Iranian fuel oil. Mylonas said his firm had conducted all necessary due diligence to ensure the cargo’s legitimate origin….

Kriti Island oil tanker

Excerpts from Roslan Khasawneh et al, Exclusive: How Iran fuel oil exports beat U.S. sanctions in tanker odyssey to Asia, Reuters, Mar. 20, 2019

How to Save the Rhino? Torture and Kill Civilians

In national parks across Asia and Africa, the beloved nonprofit WWF  with the cuddly panda logo funds, equips, and works directly with paramilitary forces that have been accused of beating, torturing, sexually assaulting, and murdering scores of people…WWF has provided high-tech enforcement equipment, cash, and weapons to forces implicated in atrocities against indigenous communities…Villagers have been whipped with belts, attacked with machetes, beaten unconscious with bamboo sticks, sexually assaulted, shot, and murdered by WWF-supported anti-poaching units, according to reports and document

 WWF has provided paramilitary forces with salaries, training, and supplies — including knives, night vision binoculars, riot gear, and batons — and funded raids on villages…The charity has operated like a global spymaster, organizing, financing, and running dangerous and secretive networks of informants motivated by “fear” and “revenge,” including within indigenous communities, to provide park officials with intelligence — all while publicly denying working with informants.

The charity funnels large sums of cash to its field offices in the developing world where staff work alongside national governments — including brutal dictatorships — to help maintain and police vast national parks that shelter endangered species. But many parks are magnets for poachers, and WWF expends much of its energy — and money — in a global battle against the organized criminal gangs that prey on the endangered species the charity was founded to protect.  It’s a crusade that WWF refers to in the hardened terms of war. Public statements speak of “boots on the ground,” partnerships with “elite military forces,” the creation of a “Jungle Brigade,” and the deployment of “conservation drones.”  WWF is not alone in its embrace of militarization: Other conservation charities have enlisted in the war on poaching in growing numbers over the past decade, recruiting veterans from the wars in Afghanistan and Iraq to teach forest rangers counterinsurgency techniques

The enemy is real, and dangerous. Poaching is a billion-dollar industry that terrorizes animals and threatens some species’ very existence. Poachers take advantage of regions ravaged by poverty and violence. And the work of forest rangers is indeed perilous: By one 2018 estimate, poachers killed nearly 50 rangers around the world in the previous year. But like any conflict, WWF’s war on poaching has civilian casualties.

Indigenous people living near one park in southeast Cameroon described a litany of horrors incuding dead-of-night break-ins by men wielding machetes, rifle butt bludgeonings, burn torture involving chilis ground into paste, and homes and camps torched to the ground. Their tormentors in these accounts were not poachers, but the park officials who police them. Although governments employ the rangers, they often rely on WWF to bankroll their work.  …Documents reveal WWF’s own staffers on the ground are often deeply entwined with the rangers’ work — coordinating their operations, jointly directing their raids and patrols alongside government officials, and turning a blind eye to their misdeeds.

Iindigenous groups — both small-fry hunters and innocent bystanders — say they suffer at the hands of the rangers.  Nepal’s park officials were given this free rein decades ago, shortly after WWF first arrived in Chitwan in 1967 to launch a rhinoceros conservation project in a lush lowland forest at the foot of the Himalayas. To clear the way, tens of thousands of indigenous people were evicted from their homes and moved to areas outside the park’s boundaries..

The park’s creation radically changed their way of life: Now they must scrape together money to buy tin for their roofs, pay hospital bills, and farm new crops. They also live in fear of the park’s wild animals, which, while rising in number thanks to anti-poaching efforts, have destroyed crops and mauled people to death.  Rhinoceros horns can sell for hundreds of thousands of dollars on the black market. Professional poachers offer a tiny portion to locals who assist them, which can be hard for impoverished residents of villages to turn down.

Chitwan’s forest rangers work alongside over 1,000 soldiers from the park’s army battalion. Nepalese law gives them special power to investigate wildlife-related crimes, make arrests without a warrant, and retain immunity in cases where an officer has “no alternative” but to shoot the offender, even if the suspect dies….. Indigenous groups living near Chitwan have long detailed a host of abuses by these forces. Villagers have reported beatings, torture, sexual assaults, and killings by the park’s guards. They’ve accused park officials of confiscating their firewood and vegetables, and forcing them into unpaid labor.

WWF’s work with violent partners spans the globe. In Central Africa, internal documents show the charity’s close involvement in military-style operations with both a repressive dictatorship and a notoriously fierce army. …The park’s management plan says WWF will help organize raids, known as “coup de poings,” on local villages suspected of harboring poachers. A confidential internal report found that such missions, frequently conducted in the dead of night with the help of police units, were often violent.

Excerpts from WWF Funds Guards Who Have Tortured And Killed People, BuzzFeed News

US Special Forces in Africa: the G-5 Sahel

The number of attacks in Burkina Faso  have increased as al Qaeda- and ISIS-linked groups have established a presence there, attacking remote gendarmerie outposts and expanding their reach from Mali and Niger in attempt to take advantage of what they see as a permissible environment.  The number of violent incidents in Burkina Faso linked to the local affiliates of al Qaeda JNIM* and ISIS (Greater Sahara) rose from 24 in 2017 to 136 in 2018, according to a report by the Africa Center for Strategic Studies. 

 US Special Forces that train the Burkina Faso military told CNN in March 2019 that the US was considering deploying surveillance drones to Burkina Faso in order to help the country better monitor threats…The Burkina Faso, Mali, Niger, Mauritania and Chad, make up the G-5 Sahel, a multinational task force charged with combating transnational terrorists….A Burkinabe officer told CNN on Monday that terror groups had managed to recruit locals in the north of the country by exploiting the economic situation in the region, where many live in povert

**the local branch of al Qaeda, Jama’at Nasr al-Islam wal Muslimin (JNIM), commands over 800 fighters while ISIS in the Greater Sahara has approximately 300 members.

Excerpts from US Forces Train in African Nation Facing Twin Terror Threat, CNN, Mar. 2, 2019

US Military Leaves but CIA Remains: Syria

Is there a way for the United States and its allies to remain in northeastern Syria, even after President Trump pledged in December 2018 to withdraw U.S. military forces there? Officials are struggling to devise such a “workaround” strategy…One possibility, according to U.S. and foreign officials, would be to have paramilitary officers from the Central Intelligence Agency take over the training and advising of the Kurdish-led Syrian Democratic Forces (SDF). Since 2015, those duties have been carried out by U.S. Special Operations forces.  This approach, still in the discussion stage, would allow Trump to claim he is delivering on his pledge to withdraw troops from Syria, without creating a vacuum in the northeast that would be exploited by Turkey, Iran, Russia and the Syrian regime…

This new option, in the language of government lawyers, would mix Title 10 overt military operations and Title 50 covert action. Reduced military activity could continue under Title 10 authority, to provide air cover and logistical support for U.S. and allied troops on the ground, but the SDF’s advisers might be CIA officers. The CIA operatives, like existing Special Forces personnel, wouldn’t be involved directly in ground combat…

A paramilitary advisory force, operating under Title 50, would have some significant disadvantages…. Current U.S. military forces in Syria can deter adversaries because they carry the U.S. flag, literally and figuratively. A paramilitary force wouldn’t have that same deterrent capability, or the ability to deconflict operations with other forces in the area, such as Russia and Turkey. ..

Given the U.S. and European policy muddle, SDF commanders must weigh whether to make their own accommodation with Russia and the Syrian regime. The United Arab Emirates is said to favor such an approach, and some longtime SDF supporters say a deal with the regime would be safer for the Kurds than depending on a fickle United States and a gun-shy Europe.

Excerpts from David Ignatius, How the U.S. might stay in Syria, and leave at the same time, Washington Post, Feb. 16, 2019

The Nine and their Nuclear Weapons

Nine nationst control the roughly 14,200 nuclear weapons in the world… But What makes a good nuclear arsenal?  First, a good nuclear doctrine. Will a country strike first, or only in response?  Second, safety. Are the nukes secure? Does the country participate in nonproliferation treaties?
Third, do the nukes work as intended? Is the arsenal sufficient? Can the nukes survive an initial attack?…Business Insider has weighed these questions with the help of Hans Kristensen, the director of the Nuclear Information Project at the Federation of American Scientists, to rank the world’s nuclear arsenals.

9. North Korea: North Korea fails by virtually every metric used to measure nuclear arsenals… Because Pyongyang can never hope to defeat any of its enemies in conventional fighting, it turned to nukes as a guarantor of its security.  Weapons count: estimated 60. North Korea has a number of short- to intercontinental-range ballistic-missile systems thought to operate off the backs of mobile missile launchers.  One analyst has warned that North Korea’s mobile launchers may simply distract from the real threat of hidden nuclear silos, but no evidence of such silos has ever appeared in US intelligence reports made public.  It’s completely unknown if North Korea keeps its nuclear weapons mated or with the warhead affixed to the missile.

8. Pakistan: Pakistan built nuclear weapons in response to its bitter regional rival, India, testing and proceeding with a relatively simple nuclear mission: deter or defeat India….Pakistan has links to Islamic extremists with connections to global terror networks. Experts have long feared not enough has been done to secure Islamabad’s nukes against these threats.  Additionally, “Pakistan has lowered the threshold for nuclear weapons use,” by building smaller, tactical nuclear weaponsWeapons count: 150.  Pakistan has ballistic missiles with ranges just long enough to hit anywhere in the country of India….The US has specifically given Pakistan permission to modify its F-16 fighters to drop nuclear weapons…Pakistan is thought to keep its nuclear warheads separate from its missiles and delivery systems.

7. India: “India is still a nuclear posture that’s still in vivid development,” Just as Pakistan fears India’s greater strength and numbers, India has come to fear China’s growing and modernizing conventional forces.  But unlike Pakistan, India has sworn off nuclear first strikes and not looked into tactical nuclear weapons. ..But India’s submarine fleet remains a dream at the moment, lowering its overall score.  Weapons count: 140 (stored)  India recently launched its first nuclear-powered submarine..As it stands, the missiles and submarine India has picked out for its underwater nuclear deterrent can’t range China’s vital points or most of Pakistan.

6. Russia: “Russia seems to sort of be driven by a frantic exploitation of different options,”   Weapons count: 6,850 (1,600 deployed; 2,750 stored; 2,500 retired).  Russia has the full nuclear triad with constantly modernized bombers, land-based missiles, and submarines. The triad is a true 24/7/365 force with submarines on deterrence patrols at all times.  Additionally, Russia has a high number of tactical nuclear weapons with shorter-range and smaller-explosive yield…Russia’s Poseidon underwater 100 to 200 megaton nuclear torpedo is the biggest nuclear explosive device ever built…The weapon would essentially set off tidal waves so large and an explosion so radioactive and punishing that continents, not countries, would pay the price for decades.  The US has not found it useful to respond to these doomsday-type devices.  Russia stores its nuclear warheads mated to missiles and ready to fire. Additionally, it has surrounded Moscow with 68 nuclear-tipped missile interceptors meant to protect the city from a US strike.

5. Israel:   “Israel is interesting because it’s a semi-dormant nuclear program, but it’s not dormant,” …Israel’s conventional military, with its top-of-the-line air force and close coordination with the US, easily overpowers its regional foes in traditional fighting.  Instead of reaching for nuclear weapons to threaten a more powerful foe, Israel has a “very relaxed nuclear posture, truly what you could call a last resort posture,”  Weapons count: estimated 80..Truly, nobody knows what weapons Israel has or doesn’t have, and that’s the way they like it.

4. UK:   Weapons count: 215 (120 deployed; 95 stored)  During the Cold War, the UK labored to create its own nuclear weapons and delivery systems, but since the collapse of the Soviet Union, the UK has withdrawn from that posture and essentially become a client of the US.  The UK operates four nuclear submarines that fire can fire 16 Trident missiles made by the US. That’s it. The UK won’t get an “arsenal” page for this reason. The warheads on these patrols are mated to missiles.

3. France:  France has a long history with nuclear weapons, like the UK, but has maintained more independence and control over its stockpile and doctrine.  Weapons count: 300 (290 deployed; 10 stored)..France has four nuclear-powered submarines, one of which stays on a constant deterrence patrol ready to fire mated nuclear missiles.  While it’s not a nuclear weapon outright, outside of the US, only France operates a nuclear-powered aircraft carrier, the Charles de Gaulle.

2. US: Weapons count: 6,450 (1,750 deployed; 2,050 stored; 2,650 retiredd)Today the US’s nuclear arsenal has narrowed down to a triad in constant stages of modernization.  The US operates two nuclear-capable bombers, the B-2 Spirit stealth bomber and the B-52 Stratofortress, originally built in the 1950s and slated to fly for 100 years.  The US operates a fleet of nuclear submarines, which it keeps on constant deterrence patrols.  The US also has nearly 400 intercontinental-range missiles in silos around the country, mostly aimed at Russia’s nuclear weapons for an imagined “mutual destruction” scenario.  Recently, the US has come under intense criticism for President Donald Trump’s proposal to build more smaller or tactical nuclear weapons. Experts say these weapons make nuclear war more likely.  The US has tactical nuclear weapons stored around Europe and Turkey, which, like the bigger strategic weapons, are stored mated.


1. China:   China has just 280 nuclear warheads, and none of them are mated to delivery systems. China flies bombers and sails submarines that it calls nuclear-capable, but none of them have ever actually flown with nuclear weapons.  China’s nuclear doctrine forbids first strikes and centers around the idea that China would survive a nuclear strike, dig its bombs out of deep underground storage, and send a salvo of missiles back in days, months, or years.  This essentially nails the idea of “credible minimum deterrence.” Everyone knows China has nuclear weapons, that they work, and nobody doubts China would use them if it first received a nuclear attack.  China has nuclear-capable submarines and bombers, but they do not ever travel with nuclear weapons on board.  China relies on a growing and modernizing conventional military to assert its will on other countries and virtually never mentions its nuclear arsenal.

Excerpts from Alex Lockie,  We ranked the world’s nuclear arsenals — here’s why China’s came out on top, Business Insider, Jan. 25, 2019

After Khashoggi: the Saudi Missiles

Satellite images suggest that Saudi Arabia has constructed its first known ballistic missile factory, according to weapons experts and image analysts, a development that raises questions about the kingdom’s increasing military and nuclear ambitions under its 33-year-old crown prince.  If operational, the suspected factory at a missile base in al-Watah, southwest of Riyadh, would allow Saudi Arabia to manufacture its own ballistic missiles, fueling fears of an arms race against its regional rival Iran.  Saudi Arabia currently does not possess nuclear weapons, so any missiles produced at the apparent factory are likely to be conventionally armed. But a missile-making facility would be a critical component of any eventual Saudi nuclear weapons program, hypothetically giving the kingdom capability to produce the preferred delivery systems for nuclear warheads.

Two additional missile experts who reviewed the satellite images for The Washington Post… agreed that the high-resolution photographs of the al-Watah site appear to depict a ­rocket-engine production and test facility, probably using solid fuel…The complex…highlights the nation’s intention to make its own advanced missiles after years of seeking to purchase them abroad, at times successfully….

Saudi Arabia has been pursuing a nuclear power-plant deal with the United States that would potentially include allowing it to produce nuclear fuel. The kingdom’s insistence on domestic fuel production has raised worries among U.S. officials that the kingdom wants the atomic power project not only for civil use but also for covert weapon-making purposes. ..

How the Saudis obtained the technological expertise necessary to build the facility is unclear. One potential supplier: China…China has sold ballistic missiles to Saudi Arabia in the past and has helped supply ballistic missile production capabilities to other nations. In the 1990s, Pakistan secretly built a plant for medium-range missiles using blueprints and equipment supplied by China. The factory in Pakistan has long drawn the attention of top Saudi officials. ..

The main way the United States seeks to prevent the spread of drone and missile technology is through the Missile Technology Control Regime, or the MTCR, an informal multicountry pact designed to prevent the transfer of certain missile technologies. China is not a member but has agreed to abide by some of its stipulations.   While the United States sells an array of weaponry to Saudi Arabia, Washington has not sold ballistic missiles to Riyadh, in part because such missiles traditionally have been seen as destabilizing for the region. Saudi Arabia has turned to China in the past when met with refusals from the United States for certain weapons requests.

For example, the United States declined repeated Saudi requests to purchase what are known as category-one American drones, including Predators and Reapers, partly because of MTCR’s regulations. Instead, the kingdom turned to China, first purchasing drones and later striking a deal in which China will build a drone factory that will produce a Chinese copycat of the Predator in Saudi Arabia.

Excerpts Paul Sonne, Can Saudi Arabia produce ballistic missiles? Satellite imagery raises suspicions, Washington Post, Jan. 22, 2019

HyperSonic Gliders: Arms Race at the Speed of Sound

Hypersonics are like missiles that travel at over five times the speed of sound, but are able to manoeuvre in mid-flight, making them much harder to track and intercept than traditional projectiles.  France is the fourth of the five permanent UN Security Council members to join the so-called “stealth by speed” contest, after China, Russia and the United States.  “We have decided to issue a contract for a hypersonic glider”–V-MaX (Experimental Manoeuvering Vehicle)–that can travel at over 6,000 kilometres per hour, Defence Minister Florence Parly said last week, promising a test flight by the end of 2021.

In March 2018, Russian President Vladimir Putin stunned Western military analysts – and many in Russia – by unveiling plans for a new arsenal of hypersonic weapons which he said would render missile defence systems obsolete….A few months later US President Donald Trump threatened to walk away from a key arms control treaty with Moscow.

Hypersonic gliders would be carried to the end of the earth’s atmosphere by a launch vehicle and would then “glide” back to a target on the ground. “The goal is high-speed manoeuvrability. That’s how it differs from a ballistic trajectory,” the French government’s defence procurement and technology agency (DGA) said.  “Once the initial speed is reached, we can play with speed and altitude to move up and down, to the left and to the right, creating a trajectory that is more difficult to intercept,” it said…

In December 2018, the Kremlin touted the capabilities of its new hypersonic glider, aptly named “Avanguard”.  The Kremlin said that in tests, the intercontinental projectile reached 27 times the speed of sound – 33,000 kilometres per hour, or Mach 27.  “At this speed, not a single intercepter missile can shoot it down,” Deputy Prime Minister Yury Borisov boasted.  China has also reportedly carried out several successful tests since 2014 of a glider that can reach speeds of between Mach 5 and Mach 10.

Excerpts from Race for ‘hypersonic’ weapons heats up as France joins fray, Agence France Presse, Jan. 29, 2019

Shut-out, Cut-off and Suicidal: Aliens v. America

The United States leads the world in punishing corruption, money-laundering and sanctions violations. In the past decade it has increasingly punished foreign firms for misconduct that happens outside America. Scores of banks have paid tens of billions of dollars in fines. In the past 12 months several multinationals, including Glencore and ZTE, have been put through the legal wringer. The diplomatic row over Huawei, a Chinese telecoms-equipment firm, centres on the legitimacy of America’s extraterritorial reach.

America has taken it upon itself to become the business world’s policeman, judge and jury. It can do this because of its privileged role in the world economy. Companies that refuse to yield to its global jurisdiction can find themselves shut out of its giant domestic market, or cut off from using the dollar payments system and by extension from using mainstream banks. For most big companies that would be suicidal.

But as the full extent of extraterritorial legal activity has become clearer, so have three glaring problems.  First, the process is disturbingly improvised and opaque. Cases rarely go to court and, when they are settled instead, executives are hit with gagging orders. Facing little scrutiny, prosecutors have applied ever more expansive interpretations of what counts as the sort of link to America that makes an alleged crime punishable there; indirect contact with foreign banks with branches in America, or using Gmail, now seems to be enough. Imagine if China fined Amazon $5bn and jailed its executives for conducting business in Africa that did not break American law, but did offend Chinese rules and was discussed on WeChat.

Second, the punishments can be disproportionate. In 2014 bnp Paribas, a French bank, was hit with a sanctions-related fine of $8.9bn, enough to threaten its stability. In April ZTE, a Chinese tech firm with 80,000 employees, was banned by the Trump administration from dealing with American firms; it almost went out of business. The ban has since been reversed, underlining the impression that the rules are being applied on the hoof.

Third, America’s legal actions can often become intertwined with its commercial interests. As our investigation this week explains, a protracted bribery probe into Alstom, a French champion, helped push it into the arms of General Electric, an American industrial icon. American banks have picked up business from European rivals left punch-drunk by fines. Sometimes American firms are in the line of fire—Goldman Sachs is being investigated by the doj for its role in the 1mdb scandal in Malaysia. But many foreign executives suspect that American firms get special treatment and are wilier about navigating the rules.

America has much to be proud of as a corruption-fighter. But, for its own good as well as that of others, it needs to find an approach that is more transparent, more proportionate and more respectful of borders. If it does not, its escalating use of extraterritorial legal actions will ultimately backfire. It will discourage foreign firms from tapping American capital markets. It will encourage China and Europe to promote their currencies as rivals to the dollar and to develop global payments systems that bypass Uncle Sam…. Far from expressing geopolitical might, America’s legal overreach would then end up diminishing American power.

Excerpts from Tackling Corruption: Judge Dread, Economist, Jan. 19, 2019

The Space Rat Race

India, Japan and other space-faring countries are waking up to a harsh reality: Earth’s orbit is becoming a more dangerous place as the U.S., China and Russia compete for control of the final frontier…New Delhi is nervous because China has made no secret of its desire for influence in the Indian Ocean. China set up a naval base in Djibouti, a gateway to the ocean at the Horn of Africa. It secured a 99-year lease to the port of Hambantota in Sri Lanka. It is deeply involved in development projects in Maldives.

India has established itself as a player in the budget satellite business. It even put a probe into orbit around Mars in 2014, in a U.S.-assisted project that cost just $76 million. But it is scurrying to enhance its ability to monitor China’s activities, and the partnership with Japan is part of this.  Another sign that space is becoming a defense focus for India came on Dec. 19, when the country launched its third military communications satellite, the GSAT-7A. The satellite will connect with ground-based radar, bases and military aircraft, along with drone control networks.

China’s success in landing a craft on the far side of the moon on Jan. 3, 2019 came as a fresh reminder of its growing prowess. In late December, China also achieved global coverage with its BeiDou Navigation Satellite System. Only the U.S., Russia and the European Union had that capability.China aims to launch a Mars explorer in 2020 and complete its own Earth-orbiting space station around 2022.  In the back of Indian and Japanese officials’ minds is likely a stunning test China conducted in 2007. Beijing successfully destroyed one of its own weather satellites with a weapon, becoming only the third nation to pull off such a feat, after the Soviet Union and the U.S.

In December 2018, President Donald Trump ordered the Department of Defense to create a Space Command, widely seen as a precursor to a full-fledged Space Force.  There were 1,957 active satellites orbiting Earth as of Nov. 30, 2018 according to the Union of Concerned Scientists, a nonprofit U.S. advocacy group. America had the most by far, with 849, or 43% of the total. China was No. 2, with 284, followed by Russia with 152.  Japan and India had a combined 132 — 75 for the former and 57 for the latter.

Excerpts fromNUPUR SHAW India and Japan awaken to risks of superpower space race, Nikkei Asian Review, Jan. 8, 2019

Devil’s Idea for Tokyo’s End: Fukushima

By late March 2011… after tsunami struck the Fukushima Daiichi plant—it was far from obvious that the accident was under control and the worst was over. Chief Cabinet Secretary Yukio Edano feared that radioactive material releases from the Fukushima Daiichi plant and its sister plant (Fukushima Daini) located some 12 km south could threaten the entire population of eastern Japan: “That was the devil’s scenario that was on my mind. Common sense dictated that, if that came to pass, then it was the end of Tokyo.”

Prime Minister Naoto Kan asked Dr. Shunsuke Kondo, then-chairman of the Japanese Atomic Energy Commission, to prepare a report on worst-case scenarios from the accidenta .  Dr. Kondo led a 3-day study involving other Japanese experts and submitted his report (Kondo, 2011) to the prime minister on March 25, 2011. The existence of the report was initially kept secret because of the frightening nature of the scenarios it described. An article in the Japan Times quoted a senior government official as saying, “The content [of the report] was so shocking that we decided to treat it as if it didn’t exist.” …

One of the scenarios involved a self-sustaining zirconium cladding fire in the Unit 4 spent fuel pool. Radioactive material releases from the fire were estimated to cause extensive contamination of a 50- to 70-km region around the Fukushima Daiichi plant with hotspots significant enough to require evacuations up to 110 km from the plant. Voluntary evacuations were envisioned out to 200 km because of elevated dose levels. If release from other spent fuel pools occurred, then contamination could extend as far as Tokyo,…There was particular concern that the zirconium cladding fire could produce enough heat to melt the stored fuel, allowing it to flow to the bottom of the pool, melt through the pool liner and concrete bottom, and flow into the reactor building.

Lessons Learned from the Fukushima Daiichi Accident for Spent Fuel Storage: The U.S. nuclear industry and its regulator should give additional attention to improving the ability of plant operators to measure real-time conditions in spent fuel pools and maintain adequate cooling of stored spent fuel during severe accidents and terrorist attacks. These improvements should include hardened and redundant physical surveillance systems (e.g., cameras), radiation monitors, pool temperature monitors, pool water-level monitors, and means to deliver pool makeup water or sprays even when physical access to the pools is limited by facility damage or high radiation levels….

[At nuclear power plants there must be…adequate separation of plant safety and  security systems so that security systems can continue to function independently if safety systems are damaged. In particular, security systems need to have independent, redundant, and protected power sources…]

Excerpts from Lessons Learned from the Fukushima Accident for Improving
Safety and Security of U.S. Nuclear Plants: Phase 2, US National Academies, 2016

Killing Machines: Tiny Spy Satellites

As long as we’ve been launching spy satellites into space, we’ve been trying to find ways to hide them from the enemy. Now, thanks to the small satellite revolution—and a growing amount of space junk—America has a new way to mask its spying in orbit…

The National Reconnaissance Office, the operator of many of the U.S.’s spy sats, refused to answer any questions about ways to hide small satellites in orbit.  In 2014, Russia launched a trio of communications satellites. Like any other launch, spent stages and space debris were left behind in space. Air Force Space Command dutifully catalogued them, including a nondescript piece of debris called Object 2014-28E.  Nondescript until it started to move around in space, that is. One thing about orbits; they are supposed to be predictable. When something moves in an unexpected way, the debris is not debris but a spacecraft. And this object was flying close to the spent stages, maneuvering to get closer.  This fueled speculation that the object could be a prototype kamikaze-style sat killer. Other less frantic speculation postulated that it could be used to examine other sats in orbit, either Russia’s or those operated by geopolitical foes. Either way, the lesson was learned…

Modern tracking radar is supposed to map space junk better than ever before. But small spy satellites that will hide in the cloud of space debris may go undetected, even by the most sophisticated new radar or Earth-based electronic signals snooping.

Excerpts from Joe Pappalardo, Space Junk Could Provide a Perfect Hiding Spot for Tiny Spy Satellites, Popular Mechanics, Nov. 30, 2018

Killing US Enemies: Covert Operations

The U.S. has some of the best special operations units in the world, but they can’t do everything on their own. The American military relies on allied special operators from places like Britain, Iraq, and Israel to collect intelligence and kill enemy insurgents and soldiers. Here are 6 of those special operations commands.

1. SAS and SBS (UK)
These could obviously be two separate entries, but we’re combining them here because they’re both British units that often operate side-by-side with U.S. forces, just with different missions and pedigrees. The Special Air Service (SAS) pulls from the British Army and focuses on counter-terrorism and reconnaissance. The Special Boat Service (SBS) does maritime counter-terrorism and amphibious warfare (but will absolutely stack bodies on land, too).

2. Sayeret Matkal (Israel)
Israel’s Sayeret Matkal has generated rumors and conjecture for decades, and it’s easy to see why when you look at their few public successes…. The commandos in the unit are skilled in deception, direct action, and intelligence gathering…One of their most public recent successes came when they led a daring mission to install listening devices in ISIS buildings, learning of a plan to hide bombs in the battery wells of laptops.

3. French Special Operations Command
French special operations units are even more close-mouthed than the overall specops community…

4. Kommando Spezialkräfte (Germany)
The commandos have reportedly deployed to Syria in recent years to fight ISIS.

5. Iraqi Counter Terrorism Service

6. Afghan National Army Commando Corps
It’s even capable of the rapid nighttime raids that U.S. forces became famous for when they were in the lead in that country…Afghanistan also has the Ktah Khas, a counter-terrorism unit known for daring raids like their 2016 rescue of 59 prisoners in a Taliban hideout.

Logan Nye, We Are The Mighty: 6 foreign special operations units the US relies on to collect intelligence and kill enemy insurgents, Business Insider, Nov. 30, 2018

 

Undersea Drones: Military

Currently, manipulation operations on the seabed are conducted by Remotely Operated Vehicles (ROVs) tethered to a manned surface platform and tele-operated by a human pilot. Exclusive use of ROVs, tethered to manned ships and their operators, severely limits the potential utility of robots in the marine domain, due to the limitations of ROV tether length and the impracticality of wireless communications at the bandwidths necessary to tele-operate an underwater vehicle at such distances and depths. To address these limitations, the Angler program will develop and demonstrate an underwater robotic system capable of physically manipulating objects on the sea floor for long-duration missions in restricted environments, while deprived of both GPS and human intervention

The Angler program seeks to migrate advancements from terrestrial and space-based robotics, terrestrial autonomous manipulation, and underwater sensing technologies into the realm of undersea manipulation, with specific focus on long-distance, seabed-based missions. Specifically, the program aims to discover innovative autonomous robotic solutions capable of navigating unstructured ocean depths, surveying expansive underwater regions, and physically manipulating manmade objects of interest.

Excerpts DARPA Angle Program Nov. 2018

Under Greenland’s Ice: Nuclear Waste

In 1959 the U.S. Army Corps of Engineers built Camp Century beneath the surface of the northwestern Greenland Ice Sheet. There they studied the feasibility of deploying ballistic missiles within the ice sheet. The base and its wastes were abandoned with minimal decommissioning in 1967, under the assumption they would be preserved for eternity by perpetually accumulating snowfall.

In 2016 scientists showed that global warming could release the radioactive waste stored in the ice if Greenland’s ice continues to melt…

The general existence of Camp Century was understood by both the Danish and U.S. governments, which together signed the 1951 Defense of Greenland Agreement under the auspices of the North Atlantic Treaty Organization (NATO)….Reports, for example, suggest Danish permission for the operational disposal of radiological waste in the ice sheet. However, it is unclear whether Denmark was sufficiently consulted regarding the specific decommissioning of Camp Century, and thus whether the abandoned wastes there remain U.S. property. Article XI of the 1951 treaty states that “All property provided by the Government of the United States of America and located in Greenland shall remain the property of the Government of the United States of America. … [it] may be removed from Greenland free of any restriction, or disposed of in Greenland by the Government of the United States of America after consultation with the Danish authorities…”

Given the multinational origin and multigenerational legacy of Camp Century, there appears to be substantial ambiguity surrounding the political and legal liability associated with mitigating the potential remobilization of its pollutants. Interests likely differ across NATO members, particularly Denmark, the U.S. and Canada, partly because of their distinct levels of historical participation and their future potential for pollutant exposure.

Excerpts from  William Colgan et al, The abandoned ice sheet base at Camp Century, Greenland, in a warming climate, , Aug. 4, 2016

Overly Militarized Military: United States

Gray zone security challenges…that fall between the traditional war and peace duality, are characterized by ambiguity about the nature of the conflict, opacity of the parties involved, or uncertainty about the relevant policy and legal frameworks….

The U.S. already possesses the right mix of tools to prevail in the gray zone, but it must think, organize and act differently. Gray zone challenges are not new. Monikers such as irregular warfare, low-intensity conflict, asymmetric warfare, military operations other than war and small wars were employed to describe this phenomenon in the past. …

America spends roughly $600 billion every year on defense, and it is the dominant global power by every objective measure. Yet state and non-state actors (e.g., Russia and Daesh) are increasingly undeterred from acting in ways inimical to the global common good.
State actors like Russia and China reasonably believe we will not use nuclear or conventional military force to thwart their ambitions if they craft their aggressive actions to avoid clear-cut military triggers. Despite their inherent ambiguity, the United States should not be  frustrated by gray zone challenges. Rather, we should aim to achieve favorable outcomes by taking some practical steps to improve our ability to address them.

Our responses to gray zone challenges display several clear deficiencies. As separate U.S. government agencies strive to achieve their individual organizational goals, they seldom act in integrated ways to support wider government objectives….We also need to grow our non-military capabilities. Our gray zone actions are often overly militarized because the Department of Defense has the most capability and resources, and thus is often the default U.S. government answer…. Our counter-Daesh campaign is a perfect example. Thousands of airstrikes helped to check their rapid expansion, but the decisive effort against them will require discrediting their narrative and connecting the people to legitimate governing structures — areas where DoD should not have primacy.

Root Causes: Prudent strategies recognize root causes and address them. Daesh, for example, is merely symptomatic of the much larger problems of massive populations of disaffected Sunnis estranged from legitimate governance and a breakdown in the social order across much of Africa and the Middle East, which will worsen in coming years by economic and demographic trends. Daesh is also a prime example of gray zone challenges, since the legal and policy framework of how to attack a proto-state is highly ambiguous. Coalition aircraft started bombing Daesh in August of 2014, although the authorization for use of military force is still under debate a year later, highlighting the confusion on how to proceed.

[Develop and Nurture Surrogates to Fight China]

For example, China is both antagonistically asserting its questionable claims to specific islands  and atolls in the South China Sea while simultaneously expanding its import of raw materials from Africa. Instead of confronting China in the South China Sea directly, surrogates could, theoretically, be used to hold China’s African interests at risk in order to compel a more  favorable outcome of South China Sea disputes. Thus, the point of action (e.g., Africa) might be far removed from the point of effect (e.g., Asia), but the intent would be to alter the decision-making calculus regardless of geography. To be credible, such an approach requires  prep work every bit as important as the infrastructure behind our nuclear and conventional capabilities. Capable and trustworthy surrogates are the result of years of purposeful relationship nurturing,and the vast majority of the work should take place pre-crisis….

Changing our vocabulary could help yield better decisions in the gray zone. Adopting a business vocabulary and a “SWOT” model (strength, weakness, opportunity and threat) would open other opportunities not available in military decision-making models. Similar to the way businesses decide how to allocate capital, we would necessarily distinguish between opportunities and threats and have at least an estimate of our expected return on investment. Talking and thinking differently about national security in the gray zone would help us measure the oft-ignored opportunity costs and come up with some metric, however imperfect initially, to measure our expected return on investment for defense dollars.

Cost should be a significant up front consideration. For example, we famously refused to provide a cost estimate for Operation Iraqi Freedom, other than to know that $200 billion was ar too high. Assuming we established $200 billion as the top end to “invest” in
Iraq, it would at least force us to review our actions and evaluate our return on investment as we blew through initial estimates on our way to spending in excess of $2 trillion.

Excerpts from the Gray Zone, Special Warfare, Oct-Dec. 2015, Volume 28, Issue 4

New Cold War over the Pacific

Australia said it would establish a development fund and offer Pacific island nations more than $2 billion for infrastructure projects while bolstering military cooperation, as U.S. allies take a more assertive stance against China in the region. Also Thursday, Australia said it would open new diplomatic posts across the Pacific, while New Zealand announced new funding to boost cultural engagement with small Pacific states.

The U.S. and its allies are increasingly coordinating to counter what officials in Washington and elsewhere see as Beijing’s attempts to gain influence over smaller nations through infrastructure loans under its Belt and Road initiative. Last month President Trump signed the Build Act, which expands American development financing for private companies to up to $60 billion….

Beijing, which says its goal is to help Pacific countries achieve peace, stability and prosperity, has urged other countries to “discard the Cold War mentality” and view its relations with Pacific states in an objective way.But old Western allies are concerned about its intentions toward impoverished island nations whose strategic value outstrips their size and wealth.  The U.K. recently announced three new diplomatic posts in the Pacific, while France gained a de facto seat in a key regional group—the Pacific Islands Forum—when its Pacific territories joined…

In September 2018, a senior U.S. official said the U.S., along with Japan and Australia, is vying to build an internet network in Papua New Guinea to block a Chinese telecom company.

Exceprts from U.S. Allies Vie With China to Make Pacific Island Friends, WSJ, Nov. 8, 2018 Continue reading

Skip Pakistan: new way into Afghanistan

A port being developed in the southern Iranian city of Chabahar underscores some of the dilemmas U.S. policy makers face in implementing sanctions against Tehran.  Strategically located on the Gulf of Oman and named for an Iranian revolutionary war hero, the Shahid Beheshti Port is exactly the sort of Iranian economic development the Trump administration wants to stop with sanctions that kick in on Nov. 5, 2018…

Once completed, the port—a small part of which started initial operations in December—could help Iran by strengthening economic ties with South and Central Asia, providing an export point for its oil beyond the Persian Gulf and functioning as a strategic military asset.   But it could also be a critical economic lifeline for Afghanistan, where the U.S. has tried for 16 years to strengthen and stabilize the government so thousands of U.S. troops can come home.

The port also could be a big boon to India, an increasingly close partner of the U.S. in Asia. India wants Chabahar port activities exempted from sanctions. Indian companies are mostly equipping and operating the facility. If the port is completed, they are expected to be among the biggest users of the port in order to participate in the reconstruction of Afghanistan—something the Trump administration has asked India to get more involved in—and establish a stronger economic presence in Central Asia.

The Chabahar port has long been seen as a potential way around Pakistan, a sworn enemy of India that believes holding sway over Afghanistan is critical to its own security.  Pakistan has squelched trade between India and Afghanistan across its territory. It wants Afghanistan to eventually transport goods through a competing Pakistani port on the Gulf of Oman that is being developed with China…

“If you stop Chabahar, you make Afghanistan permanently dependent on Pakistan,” said Barnett Rubin, a New York University expert on South Asia who has advised Western governments on policy in Afghanistan and the surrounding region.

Exceprts from Iranian Port Project Poses a Dilemma for U.S., WSJ, Oct. 29, 2018

Insect Biogeneering as a Biological Weapon: DARPA

According to Science Magazine, Agricultural genetic technologies typically achieve their agronomic aims by introducing laboratory-generated modifications into target species’ chromosomes. However, the speed and flexibility of this approach are limited, because modified chromosomes must be vertically inherited from one generation to the next. In an effort to remove this limitation, an ongoing research program funded by the U.S. Defense Advanced Research Projects Agency (DARPA) aims to disperse infectious genetically modified viruses that have been engineered to edit crop chromosomes directly in fields [through insects]. This is genetic engineering through horizontal transfer, as opposed to vertical inheritance. The regulatory, biological, economic, and societal implications of dispersing such horizontal environmental genetic alteration agents (HEGAAs)[eg leafhoppers, whiteflies and aphids) into ecosystems are profound. Further, this program stipulates that the means of delivery of these viral HEGAAs into the environment should be insect-based dispersion (Insect Allies Program). In the context of the stated aims of the DARPA program, it is our opinion that the knowledge to be gained from this program appears very limited in its capacity to enhance U.S. agriculture or respond to national emergencies (in either the short or long term). Furthermore, there has been an absence of adequate discussion regarding the major practical and regulatory impediments toward realizing the projected agricultural benefits. As a result, the program may be widely perceived as an effort to develop biological agents for hostile purposes and their means of delivery, which—if true—would constitute a breach of the Biological Weapons Convention (BWC).

How to Swarm your Enemy

Swarming is…a deliberately structured, coordinated, strategic way to strike from all directions, by means of a sustainable pulsing of force and/or fire, close-in as well as from stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units (what we call “pods” organized in “clusters”). Developing a swarming force implies, among other things, radical changes in current military organizational structures. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” …

Swarming could become the catalyst for the creation of a newly energized military doctrine:“BattleSwarm.” One requirement—well-informed, deadly small units—is already coming into being…

Technological hurdles also loom large on the path to BattleSwarm. First, aside from the
challenge of assuring the internetting of communications among myriad units, it is
imperative that communications also be hardened and made redundant. An enemy who
knows that information operations lie at the enabling core of swarming will surely strike
at them—and we must prepare to parry such blows in advance. It may also be possible
to safeguard a swarm force’s information flows by means of decoys and deception.
Indeed, the use of false or enhanced signals and traffic may prove to have offensive, in
addition to defensive, utility.

Swarming and the Future of Conflict (Rand pfd)

DARPA’s OFFensive Swarm-Enabled Tactics (OFFSET) program envisions future small-unit infantry forces using swarms comprising upwards of 250 small unmanned aircraft systems (UASs) and/or small unmanned ground systems (UGSs) to accomplish diverse missions in complex urban environments. By leveraging and combining emerging technologies in swarm autonomy and human-swarm teaming, the program seeks to enable rapid development and deployment of breakthrough capabilities.

Shedding Nuclear Weapons: the uphill battle

At the June 2018 Singapore Summit, North Korea agreed to the goal of “complete denuclearization” in exchange for “security guarantees” by the United States, including an end to enmity … The two sides seem to have settled on the phrase “complete denuclearization.” For the purposes of this analysis, this is taken to include the key nuclear weapon–related obligations agreed on in the 1992 Joint Declaration of South and North Korea on the Denuclearization of the Korean Peninsula, namely to “not test, manufacture, produce, receive, possess, store, deploy or use nuclear weapons” and that these commitments would be verified.

In March 2018, North Korea announced a moratorium on nuclear weapons and ballistic missile testing. …Moving forward, eliminating North Korea’s nuclear weapons program and related facilities will need a freeze on current weapon-related activities; an agreed baseline of current stockpiles of nuclear weapons, fissile materials, ballistic missiles, and key components; and verified reductions of these stockpiles and downsizing of North Korea’s weapons complex….We assume that a new framework agreement would contain provisions similar to those in some other arms-control agreements, under which the parties agree not to interfere with specified remote-monitoring techniques or use concealment measures intended to obstruct verification.

Since North Korea’s withdrawal from the Nuclear Non-Proliferation Treaty (NPT) in 2003, there have been essentially no international inspection efforts in North Korea. At the same time, North Korea has expanded the scale and complexity of its nuclear weapons program. On the basis of information available via open sources, it is not clear how many nuclear weapons North Korea possesses today, of what kind (including possibly thermonuclear weapons), and whether they use plutonium or highly enriched uranium (HEU) or both as fissile material. Nor is there reliable information on its ballistic missile capabilities. To establish a basis for moving forward, North Korea could add to its freeze on nuclear weapon and ballistic missile tests a freeze on fissile material production. This can be verified primarily through agreed-on nonintrusive provisions.

In the case of plutonium, satellite imagery can be sufficient to confirm the operational status of reactors in North Korea. Imagery can be used to observe heat signatures, vapor plumes, cooling water discharges, and other activities near the reactor . All these indicators would provide good evidence for a suspension of plutonium production at Yongbyon nuclear reactor in North Korea. Regional krypton-85 monitoring, ideally with a small number of detectors placed around the Yongbyon site, could confirm that remaining spent fuel is not reprocessed . There are also simple measures to permanently disable the Yongbyon reactor—for example, by blowing boron dust through the core’s cooling channels—but North Korea may not agree to such actions until the later stages of the denuclearization process.

The situation with regard to uranium enrichment is more difficult. It may be possible to confirm remotely the shutdown status of the Yongbyon enrichment plant and a possible second plant suspected to be at Kangson—for example, by monitoring vehicle traffic, including shipments of uranium hexafluoride (UF6) cylinders entering and leaving the sites, or by monitoring signatures related to electricity supply.

Rather than shut them down, North Korea may prefer to use its enrichment plants for production of low-enriched uranium for its experimental light-water reactor (30 MW-electric). If this or other civilian reactors are allowed to operate, then International Atomic Energy Agency (IAEA) safeguards could be applied to these plants as well as to the feed and product materials associated with them, as happens with civilian uranium enrichment plants in all non-nuclear weapon states and also in some nuclear weapon states. In this case, verification could include unattended measurement systems confirming the nonproduction of HEU, but it would also include onsite inspections. Even if North Korea ended all nuclear activities, IAEA safeguards would still be required to detect possible efforts at reconstitution of its nuclear weapons program.

One major concern is the existence of undeclared nuclear facilities, especially uranium enrichment plants beyond that at Yongbyon and suspected at Kangson. This is a proliferation concern in all states and not limited to North Korea, however…

With a freeze as a starting point, declarations of current fissile material and nuclear warhead inventories would be important for measuring progress toward denuclearization. These initial declarations could be relatively simple. Ideally, as a transparency measure, they could be made public. In the case of nuclear warheads, a declaration could include the total number of warheads in North Korea’s stockpile, perhaps listed by type, and the number of additional warhead components in storage; in the case of fissile material, a declaration could include acquisitions, losses, and removals, including the aggregate amount of material consumed in tests, and the current inventory of plutonium and highly enriched uranium, ideally also specifying the respective plutonium-239 and uranium-235 contents. More detailed declarations could follow at a later stage of the process.

There is a precedent for fissile material declarations. In May 2008, North Korea declared its plutonium inventory, often reported as 37 kg and backed up by 18,000 pages of operating records. At the time, the United States estimated that North Korea had produced a total of 40 to 50 kg of plutonium, raising concerns that the declaration may be incomplete. U.S. negotiators requested access to the Yongbyon reactor to confirm total plutonium production through use of nuclear archaeological techniques, in which the isotopic ratios of trace impurities in graphite samples are analyzed. At that time, North Korea refused.  Nuclear archaeology techniques for graphite-moderated reactors are now well established and would be sufficient to narrow down the uncertainty in plutonium production to a few kilograms, possibly to less than one weapon-equivalent. North Korea may or may not agree to these procedures early on in the denuclearization process, but every effort must be made to preserve the reactor core and relevant operating records so that such an analysis can be conducted when circumstances permit.

Reconstructing uranium enrichment activities is more challenging. Perhaps the best option would be to reconstruct North Korea’s history of uranium supply and use. Such an effort would assess uranium production at North Korean mines, uranium purification, UF6 production, and enrichment. This would involve auditing the records for internal consistency. Reports of North Korean uranium ore grade suggest that it takes 300 to 400 tons of ore to extract 1 ton of uranium. This means that up to 2000 tons of ore are required to make 25 kg of weapon-grade HEU or 5 kg of weapon-grade plutonium, the typical amounts used in a nuclear weapon. The review of records from the different plants could be complemented with forensic analysis of tailings at the mines and depleted uranium in cylinders at known enrichment plants. It also may be possible to examine North Korea’s centrifuge-plant equipment and reconstruct the amount of uranium processed in these plants and respective HEU output.

It will take years to conclude that undeclared stockpiles of materials and warheads do not exist, even if North Korea fully cooperates...

For safety reasons, as former Los Alamos National Laboratory Director Siegfried Hecker and colleagues recently observed, “shipping the North’s nuclear weapons out of the country is naïve and dangerous. The weapons must be disassembled by the people who assembled them.”…A third option would be for North Korea to gradually reduce the size of its weapons complex without revealing where exactly nuclear weapons and long-range ballistic missiles remain. An estimate in 2014 suggested about 90 nuclear weapon and missile sites of potential interest…

Excerpts from Alexander Glaser and Zia Mian, Denuclearizing North Korea: A verified, phased approach, Science, Sept. 7, 2018

Favorite of the West: Niger as Police State

Niger, a poverty-stricken nation perched on the southern belt of the Sahara, is rapidly being transformed into one of the world’s most strategic security hubs….“This place is a nest of spies,” said one contractor … “Below the radar, it’s become a key country for the West.”  A surge in financial assistance from European nations seeking to stem the flow of African migrants has made Niger the world’s largest per capita recipient of European Union aid…Western military forces operate from at least nine bases in Niger, government officials said…. The U.S. is finishing a large air base in Agadez, while the Central Intelligence Agency has begun flying armed drones from an airstrip outside the northern town of Dirkou, Nigerien officials said.

U.S. and European policy makers praise the government as a good partner that has welcomed foreign military personnel and slashed the migrant flow by almost 90% from 2015 highs. …Locals, nongovernmental organizations and opposition activists say the government is using international backing to neutralize dissent and embezzle millions of dollars in aid, charges the government denies. The opposition—backed by rights group Amnesty International—says President Mahamadou Idriss Issoufou, in power since 2011, is arbitrarily jailing activists and spending Western aid on bolstering his elite Presidential Guard…

Swaths of the nation’s centuries-old transportation economy—the movement of people and goods from West Africa through the Sahara—has essentially been criminalized by the EU crackdown on migration.  Some of the desert-dwelling Tuareg people, who have transported goods for centuries, are now smuggling weapons, men and money for cash-rich jihadist insurgencies. Migrants are dying in the desert in failed attempts to find new routes.

“The West is pleased because Niger’s government is a willing partner,but as Niger’s security chief, Mohammed Bazoum, says “We have become a hinge country, a geostrategic hub, but it is a disaster for us. We are known as a land of terrorism and migrant traffic.”

Across Niger’s western border with Mali, jihadist groups including Islamic State and al Qaeda franchises control stretches of territory around the northern city of Gao. Along the southern frontier with Nigeria, a rejuvenated Boko Haram is mounting intensifying attacks against security forces, including around the city of Diffa, where the U.S. has dozens of troops stationed. To the north lies Libya, which has become a hotbed of instability, weapons and radicalization.

The European Development Fund last year awarded $1 billion to Niger through 2020, and unusually for a country governance watchdogs deem chronically corrupt, 75% is now infused directly into the Nigerien budget instead of through nongovernmental organizations.The money funds hundreds of off-road vehicles, motorcycles and satellite phones for Nigerien security forces as well as new infrastructure and technology along the borders and countrywide development programs.

In Niamey’s central Plateau district, tall black screens block the soaring new U.S. Embassy headquarters, which will be one of the largest in West Africa. Saudi Arabia has broken ground on its own huge mission, while buildings belonging to EU agencies occupy whole city blocks. Hotels and conference centers are rising in tandem, reconfiguring the economic and political landscape of a nation ranked the world’s second-poorest behind the Central African Republic.

The government says the building boom is creating jobs. Locals say it has stoked runaway inflation and priced them out of their neighborhoods. In the past year, the cost of a kilogram of rice has risen 29%, sending shock waves through homes where the average wage is $2.66 a day.

“The cost to live here rises with each new European coming,” lamented Abdulraham Mamoudou, repairing his motor scooter on a dusty corner near the expanding U.S. Embassy compound.

A similar pattern is playing out further north in the smuggling hub of Agadez, where the EU-coordinated migration crackdown has transformed a boomtown into a simmering bust.  The city’s jails are bursting with men who have been convicted of smuggling. Vast depots on the town’s outskirts house hundreds of trucks confiscated by authorities…“This place is now for the Americans and French,” said Sadiq, a former migrant smuggler who evaded arrest and is now unemployed. “They took our livelihood and don’t give us anything in return.”

Excerpts from ‘A Nest of Spies’: Niger’s Deserts Become Front Line of Fight Against Jihadis, Wall Street Journal, Sept. 12, 2018

A Sinkhole Sucking in Failed States: jihad in Africa

The number of violent incidents involving jihadist groups in Africa has increased by more than 300% between 2010 and 2017… Many Western officers are despondent. Without more troops “there is no question we will lose”, says a senior French officer.

In the potpourri of jihadist groups, many pledge their loyalties to al-Qaeda or IS. They include al-Shabab in Somalia, Boko Haram and its factions in Nigeria, and Jama’a Nusrat al-Islam wal-Muslimin in Mali. In each country, conflict may be fuelled largely by local grievances. But the insurgents share some ideological traits. Many have been strengthened by the breakdown of Libya after the downfall of Muammar Qaddafi’s regime in 2011. Weapons spilled out of Libya’s armouries, and smuggling networks for everything from people to drugs developed across the Sahara. There are signs that the jihadists are learning from one another and sucking money and support from militant groups in the Middle East

The most important of the battles is Nigeria’s campaign against Boko Haram. ..A retired general who once held a senior post at AFRICOM, America’s military command for Africa, puts it thus: “If Nigeria goes down it would make a giant sinkhole that would suck in six or seven other countries.” Nigeria’s difficulties, moreover, offer sobering lessons to many other African countries, and their Western allies.

Maiduguri (Nigeria) was the birthplace of Boko Haram, whose factions make up the world’s deadliest terrorist group. It is so extreme that it sickens even IS and al-Qaeda. The group was founded by the followers of a charismatic Islamic preacher, Mohammed Yusuf, who had started a religious school and mosque in Maiduguri in 2002… Among his demands was a ban on secular schooling (the group’s name, Boko Haram, means “Western education is a sin” in Hausa).

The Nigerian police arrested and then killed Yusuf in front of a crowd outside the police headquarters in Maiduguri (the government insisted he was shot while trying to escape). Yusuf’s followers went into hiding before emerging under the command of Abubakar Shekau. In 2011 they blew up the headquarters of the Nigerian police and a UN building in Abuja, Nigeria’s capital. By the end of 2014 they had overrun large parts of three states in north-eastern Nigeria, gained international notoriety after kidnapping almost 300 schoolgirls from Chibok and were fighting their way into Maiduguri. Nigeria’s army, hollowed out by corruption, was in disarray. Units were filled by ghost soldiers whose pay was being pocketed by their commanders. One Western officer recalls how a company that should have had 100-150 soldiers consisted of just 20 men.

Boko Haram did not at first try to govern…. It preferred chaos. It bombed mosques and markets, massacred villagers and abducted women and children. Some girls were enslaved and sold. Others were pressed into being human bombs. A study by the Combating Terrorism Centre at West Point, a military academy, found that more than half of 434 such human bombs the group used between April 2011 and June 2017 were female.UNICEF, the UN children’s agency, says that last year Boko Haram strapped bombs to at least 135 children.

Mr Shekau’s brutality proved too much even for IS, to which he had sworn allegiance in 2015, changing Boko Haram’s name to Islamic State West Africa Province (ISWAP). In 2016 IS named Abu Musab al-Barnawi the leader of ISWAP, splintering the group into two factions.  Meanwhile, thousands of villagers and residents of Maiduguri took up machetes or handmade muskets and joined a self-defence militia, the Civilian Joint Task Force (CJTF), that held the gates of the city. The new president of Nigeria, Muhammadu Buhari, a northerner and former military dictator, ordered his generals to move their headquarters to Maiduguri. Neighbouring states such as Chad, Niger and Cameroon contributed troops to a multinational force. Within months the army had recaptured most big towns, pushing the insurgents into forests or Lake Chad, a mass of swamps where the borders of four countries meet.

Since then, though, stalemate has set in…The ISWAP has learned how to make roadside bombs and has become more skilled in conducting attacks.  …It levies “taxes” on locals and erects roadblocks to extort money from passing traffic… It is building a proto-caliphate. 

Nigeria’s generals talk about “winning hearts and minds” but they are doing the opposite. The army has systematically cleared people from the countryside, burning their villages and packing them into squalid camps in Maiduguri and other “garrison towns”. In all, some 2.4m people have been displaced by the fighting in Nigeria and neighbouring countries. T  Most observers think that indiscriminate killings by the army and the forcing of people into garrison towns are fuelling the insurgency. There are almost no jobs in the camps. Access is through checkpoints manned by the army and CJTF, who demand bribes. Amnesty International, a human-rights group, says many women and girls have been raped in the camps and that hundreds if not thousands of people confined in them have died of starvation or a lack of medical care. … “It is like a factory for jihadis.”

The Nigerian state’s failure extends far beyond the camps. In  In effect, Nigeria’s north-east is a failed state within a dysfunctional one.

Excerpts from Jihad’s Next Battleground,  Economist, July 14, 2018, at 41

Slyly Conquering East Africa

The rulers of United Arab Emirates (UAE), one of whose components, Dubai, own a majority stake in DP World, one of the world’s largest maritime firms with perations in 40 countries.It is one of several Gulf states trying to gain a strategic foothold in east Africa through ports. Controlling these offers commercial and military advantages but risks exacerbating tensions in the region…

DP World thinks the region from Sudan to Somalia needs 10-12 ports. It has just half that. The firm’s first foray was on Djibouti’s coast. When DP World won its first concessions there in the 1990s, the Emiratis were among the few investors interested in the small and poor former French colony. DP World built and operated a new container terminal, Doraleh,and helped finance roads and other infrastructure. Doraleh is now the country’s largest employer and the government’s biggest source of revenue. It runs at nearly full capacity, handling 800,000 containers a year. Much of its cargo travels along a Chinese-built railway from Addis Ababa, Ethiopia’s capital.

Djibouti’s profile rose further after the terrorist attacks on America of September 11th, 2001, when America opened a military base there. France and China also have bases; other navies patrol off its coast to deter Somali pirates. But when the Emiratis wanted to open their own naval base they were rebuffed, partly because of their close ties to Djibouti’s rival, Eritrea (the two states had a bloody border dispute in 2008). In 2015 the UAE started building a naval base in Assab, in southern Eritrea. The base has been used in the Saudi-led war against Houthi rebels in Yemen….In 2016 DP World won a 30-year concession to operate the port of Berbera in Somaliland, which declared independence in 1991 (though no foreign government recognises it). Critics said the deal would hasten the break-up of Somalia.

The Horn ports all sit near the Bab al-Mandab strait, a vital choke-point at the mouth of the Red Sea: 4.8m barrels of oil passed through it every day in 2016. Competition is getting fierce, though. Qatar and its ally, Turkey, are building ports in Sudan. Saudi Arabia is in talks to set up a naval base in Djibouti. All three Gulf states are trying to snap up farmland in east Africa, part of a broader effort to secure food supplies for their arid countries. Emirati-built ports could one day export crops from Emirati-owned farms…

Gulf states could also find themselves in competition with China…In February 2018 Djibouti seized the Doraleh port, a concession to the UAE… Shippers believe it took Doraleh as a sop to China, to which it is heavily indebted. In July 2018, Djibouti opened the first phase of a new $3.5bn free-trade zone, set to be the largest in Africa when it is finished. Built mostly by state-owned Chinese firms, it sits next to Doraleh. DP World says the project violates the terms of its concession and is threatening to sue.

Excerpts from Red Sea Scamble: Ports on the Horn, Economist, July 21, 2018, at 33

How to Navigate the Rubble: DARPA

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage.

Dr. Ronald Polcawich, a DARPA program manager in the Microsystems Technology Office (MTO):”There are a number of environments that are inaccessible for larger robotic platforms. Smaller robotics systems could provide significant aide, but shrinking down these platforms requires significant advancement of the underlying technology.”

Technological advances in microelectromechanical systems (MEMS), additive manufacturing, piezoelectric actuators, and low-power sensors have allowed researchers to expand into the realm of micro-to-milli robotics. However, due to the technical obstacles experienced as the technology shrinks, these platforms lack the power, navigation, and control to accomplish complex tasks proficiently

To help overcome the challenges of creating extremely [Size, Weight and Power] SWaP-constrained microrobotics, DARPA is launching a new program called SHort-Range Independent Microrobotic Platforms (SHRIMP). The goal of SHRIMP is to develop and demonstrate multi-functional micro-to-milli robotic platforms for use in natural and critical disaster scenarios. To achieve this mission, SHRIMP will explore fundamental research in actuator materials and mechanisms as well as power storage components, both of which are necessary to create the strength, dexterity, and independence of functional microrobotics platforms.

“The strength-to-weight ratio of an actuator influences both the load-bearing capability and endurance of a micro-robotic platform, while the maximum work density characterizes the capability of an actuator mechanism to perform high intensity tasks or operate over a desired duration,” said Polcawich. “

Excerpts from Developing Microrobotics for Disaster Recovery and High-Risk Environments: SHRIMP program seeks to advance the state-of-the art in micro-to-milli robotics platforms and underlying technology, OUTREACH@DARPA.MIL, July 17, 2018

The Underground War

U.S. Army leaders say the next war will be fought in mega-cities..In 2017, the Army launched an accelerated effort that funnels some $572 million into training and equipping 26 of its 31 active combat brigades to fight in large-scale subterranean facilities that exist beneath dense urban areas around the world….For this new type of warfare, infantry units will need to know how to effectively navigate, communicate, breach heavy obstacles and attack enemy forces in underground mazes ranging from confined corridors to tunnels as wide as residential streets. Soldiers will need new equipment and training to operate in conditions such as complete darkness, bad air and lack of cover from enemy fire in areas that challenge standard Army communications equipment…

“This training circular is published to provide urgently needed guidance to plan and execute training for units operating in subterranean environments, according to TC 3-20.50 “Small Unit Training in Subterranean Environments,” published in November 2017.

The Army has always been aware that it might have to clear and secure underground facilities such as sewers and subway systems beneath densely-populated cities. ..An assessment last year estimates that there are about 10,000 large-scale underground military facilities around the world that are intended to serve as subterranean cities…The endeavor became an urgent priority because more than 4,800 of these underground facilities are located in North Korea, the source said… But in addition to its underground nuclear missile facilities, North Korea has the capability to move thousands of troops through deep tunnels beneath the border into South Korea, according to the Army’s new subterranean manual.

“North Korea could accommodate the transfer of 30,000 heavily armed troops per hour,” the manual states. “North Korea had planned to construct five southern exits and the tunnel was designed for both conventional warfare and guerrilla infiltration. Among other things, North Korea built a regimental airbase into a granite mountain.”

For its part, Russia inherited a vast underground facilities program from the Soviet Union, designed to ensure the survival of government leadership and military command and control in wartime, the manual states. Underground bunkers, tunnels, secret subway lines, and other facilities still beneath Moscow, other major Russian cities, and the sites of major military commands.  More recently, U.S. and coalition forces operating in Iraq and Syria have had to deal with fighters from the Islamic State of Iraq and Syria operating in tunnel systems.

Toxic air, or a drop in oxygen, are other challenges soldiers will be likely to face operating deep underground. The Army is evaluating off-the-shelf self-contained breathing equipment for units to purchase.”Protective masks without a self-contained breathing apparatus provide no protection against the absence of oxygen,” the subterranean manual states. ”  Soldiers can find themselves exposed to smoke, carbon monoxide, carbon dioxide, hydrogen sulfide, methane natural gas underground, according to the manual. Breathing gear is expensive; some apparatus cost as much as $13,000 apiece, the source said.

Underground tunnels and facilities are often lighted, but when the lights go out, soldiers will be in total darkness. The Army announced in February that it has money in its fiscal 2019 budget to buy dual-tubed, binocular-style night vision goggles to give soldiers greater depth perception than offered by the current single-tubed Enhanced Night Vision Goggles and AN/PVS 14s.

Excerpts from Matthew Cox, Army Is Spending Half a Billion to Train Soldiers to Fight Underground, Military.com, June 24, 2018

See also DARPA on Underground War

The fate of SS-18 Satan

While Ukraine renounced its own possession of nuclear weapons in 1994, many scientists and design bureaus in the country still have the know-how required to manufacture important components of strategic weapons.

China has often been particularly keen of this knowledge, acquiring Ukrainian help in designing their first phased-array radar system.  Ukrainian aerospace, tank and naval engineers is also a common phenomenon in China, most notably Valerii Babich, designer of the Varyag aircraft carrier. There are even rumors of “Ukrainetowns” in some Chinese cities founded by the large number of expats hired by Chinese firms. Ukrainian and Russian businessmen even sold Kh-55 nuclear cruise missiles (without the warheads) from Ukrainian stockpiles to China in the 2000s. As China continues to modernize their ICBM fleet, it begs the question: how much help is Ukraine providing, willingly and unwillingly?

This wouldn’t be the first time Ukraine’s ICBM knowhow was possibly exported. In the fall of 2017, Ukraine’s Yuzhnoye Design Bureau, based in Dnipro, was accused of providing rocket engines to North Korea. While Ukrainian media has denied this allegation, there was a definite case of Yushnoye employees who were caught selling the plans on the RS-20 (SS-18 “Satan”) to Chinese missile engineers. Although the Chinese engineers were caught by Ukrainian police, Chinese diplomatic influence resulted in the charges being cleared. This trend has continued, as recently as 2016 when a scientist at Dnipropetrovsk National University left for China with many materials regarding the use of composites and heat-shielding coatings on rocket launchers—which were considered Ukrainian state secrets…

Given all the different vectors through which rocket and missile technology are flowing from Ukraine to China, it’s reasonable to say that Ukraine has provided considerable aid to the Chinese ballistic missile program.

Excerpts, Charlie Gao, Do China’s Nuclear Missiles Have Ukrainian DNA?, The National Interest, June 23

How to Break the Rules without Breaking the Law

In 2009,  coalition casualties in Afghanistan had as much as doubled in the space of a year. Civilian casualties climbed to 2412. It was 2009. Coalition forces had been there since 2001 with no end and, to this point, no real campaign plan in sight…

Chris Masters, who was the only journalist to have been embedded with Australian special forces soldiers (SASR) in Afghanistan, believes a desensitisation occurred within the forces that allegedly allowed a “kill count mentality to develop”…SASR’s sabre squadrons are the tips of a trident of land, air and water operators, with the “wateries” an elite within an elite. And like their US counterparts, the Navy SEALs, unquestionable ability can come tinged with arrogance. In SASR, their rock-star persona did not sit easily with everyone when modesty was supposed to be a core value…

The most prominent allegation is traced to an assault on a compound codenamed Whiskey 108 at Kakarak in Oruzgan on Easter Sunday 2009…As shooting erupted, one operator remembers thinking: “I am going to die today.” Instead, methodically, they closed in on the remaining enemy, killing them one by one.  At this time Australian weapons were again heard firing and soldiers entering the compound saw something hurled from a window. It was an older man with a prosthetic leg, shot and now lying dead. The prosthetic leg was souvenired and returned to Perth to be fashioned into a drinking vessel.  What troubled a range of witnesses was not so much the killing of the men, who whether armed or unarmed were considered Taliban. It was more that the grim task of pulling the trigger had been pushed onto a “rookie”. As one operator told me: “If s— needs to be done, do it yourself.”

In rotations to come, the concept of blooding became well known. What became more disturbing was a suspicion the practise was not only about a first kill but also executing prisoners. ..What was not thought through was how many of the “blooded rookies” would be haunted well into the future by what was done…Soldiers began to refer to some of their members having gone “up the Congo”, into the moral wilderness of novelist Joseph Conrad’s Heart of Darkness. Numerous witnesses have spoken of one SASR team posting a kill board on their door. The patrol commander was heard talking about needing more kills and subsequently of the goal being met….

As the mission wore on, further alleged breaches of the rules of armed conflict began to emerge, conspicuously contained to Special Forces and most particularly to SASR. The “Who Dares Wins” ethos of the regiment encourages the testing of boundaries. As they often tell themselves, “you break the rules but not the law”.

Exceprts from Chris Masters, Australia’s ugly turn in Afghanistan, Sydney Morning Herald, June 8, 2018

A Strategy of Fear: boko haram

In July 2011, the Nigerian government unveiled plans to make telecommunications companies dedicate toll-free phone lines so civilians could report Boko Haram activity. Months later, insurgent spokesman Abu Qaqa threatened to attack service providers and Nigeria Communication Commission (NCC) offices.

Eight months later, Boko Haram made good on Qaqa’s threat. The militant group launched a two-day attack on telecommunications towers belonging to several providers in five cities: Bauchi, Gombe, Kano, Maiduguri and Potiskum…. Institute for Security Studies (ISS) researcher Omar S. Mahmood told ADF …’it’s a pretty powerful message if Boko Haram comes out and says, ‘I’m going to attack X because of this,’ and then they go out and they do it,” Mahmood said. “It just serves to make their next warning even more intimidating and effective.”

Mahmood, in his March 2017 paper for the ISS titled “More than propaganda: A review of Boko Haram’s public messages,” showed that a significant number of Boko Haram messages between 2010 and 2016 issued warnings and threatened violence. In fact, warnings and threats constitute the second-most-common theme of the group’s messaging out of the 145 messages studied…

Boko Haram demonstrated this tendency further in its threat against schools. In January 2012, Shekau complained publicly about alleged mistreatment of Islamic schools and students, and he threatened to launch attacks.  Again, Boko Haram followed through. From January to early March 2012, militants destroyed at least a dozen schools in the Maiduguri region of Borno State…

Ties between messaging and attacks also can be seen in Boko Haram’s assault on Nigerian media and the nation’s oil industry. As Qaqa complained that the media misrepresented Boko Haram, insurgents bombed This Daynewspaper offices in Abuja and Kaduna in April 2012…In June 2014, a suicide bomber detonated a bomb outside a Lagos oil refinery.

Boko Haram’s highest-profile action is the kidnapping of 276 Chibok schoolgirls in 2014. On April 14, militants attacked a boarding school in Chibok, Borno State, in the middle of the night. Insurgents raided dormitories, loaded girls into trucks and drove away. Some girls jumped into bushes as trucks rushed away, leaving 219 children held captive. The atrocity drew worldwide condemnation and parallels a long-standing grievance of Boko Haram: the desire for the release of incarcerated members.

In October 2016, after months of negotiations, Boko Haram released 21 of the Chibok girls in exchange for a monetary ransom, Daily Trust reported. In May 2017, insurgents swapped another 82 of the girls for five militant leaders.

The 2015 ISIS alignment was the beginning of big changes in messaging for Boko Haram…Boko Haram’s most powerful period was from 2013 to 2015, when it was capturing and holding territory, and dealing setbacks to military forces.   By late 2015 and through 2017, Nigerian and regional military assaults began to take their toll on Boko Haram…

In August 2016, Boko Haram split into two factions: One is led by pugnacious spokesman Shekau; the other by Abu Musab al-Barnawi, ISIS’ choice for leader….The split also has left al-Barnawi’s ISIS-aligned faction the clear winner in terms of potential longevity and lethality, Mahmood said. Shekau’s wing is just trying to survive, but it still uses ISIS logos in messages.

Excerpts from From Message to Mayhem, A Study of Boko Haram’s Public Communications Can Offer Hints About Its Strategy, Africa Defense Forum, Mar. 2018

Flying off the Shelves: the entrenching of drone warfare

A 2018 report published by Drone Wars UK reveals that over the last five years the number of countries actively using armed drones has quadrupled. Drone Wars: The Next Generation demonstrates that from just three states (US, UK and Israel) in 2013, there are now a further nine who have deployed armed drones in a variety of roles including for armed conflict and counter-terror operations. The report also shows that a further nine states are very close to having armed drone capabilities, almost doubling the number of existing users. To this number, we have added five non-state actors who have used armed drones, which will take the number of active operators of armed drones to over 25 in the next few years.

As is well known, China has sold armed drones to a number of countries around the world. Since 2013, Nigeria, Pakistan, Saudi Arabia, Iraq, UAE and Egypt have begun operating armed Chinese drones whilst another four countries (Jordan, Myanmar, Kazakhstan and Turkmenistan) are thought to have recently taken possession of, or be in discussion about the sale of, Chinese drones. These Wing Loong and CH series drones are cheaper and less powerful than US Predators and Reapers.  As, according to their specifications, they are not capable of delivering a payload of at least 500 kg to a range of at least 300 km they do not fall into the category of systems that would be refused under Category 1 of the Missile Technology Control Regime (MTCR) as the US systems do.

Turkey, Pakistan and Iran are actively using their own manufactured drones. Iran has, it seems, supplied Hamas, Hezbollah and the Houthis with armed drones while ISIS and the PKK  (Kurdistan Workers’ Party) have attached small explosives to off-the-shelf drones. Turkey are thought to be concluding deal with Qatar and the Ukrain eand South Korea are very close to beginning production of their own armed drones.

As for the larger countries that one might expect to have already deployed armed drones, such as Russia and India, they still appear to be some distance from producing workable models…Several cross-European projects are underway to develop indigenous armed drones within the EU.

Excerpts from New research shows rise in number of states deploying armed drones, Press Release from Drone Wars UK, May 17, 2018

The 1 Million Genies out of the Bottle

The head of the U.S. Departement of Homeland Security  (DHS)  on May 15, 2018 told Congress that the agency needs new legal authority to track threatening drones and disable or destroy them if necessary.  “Our enemies are exploring other technologies, too, such as drones, to put our country in danger. ISIS has used armed drones to strike targets in Syria, and we are increasingly concerned that they will try the same tactic on our soil,” she said…

Government and private-sector officials are concerned that dangerous or even hostile drones could get too close to places like military bases, airports and sports stadiums.Nielsen added that DHS has “also seen drones used to smuggle drugs across our borders and to conduct surveillance on sensitive government locations.”

In 2017, the Federal Aviation Administration barred drone flights over major U.S. nuclear sites. The FAA also banned drone flights over 10 U.S. landmarks, including the Statue of Liberty in New York and Mount Rushmore in South Dakota.  Also banned in 2017 were drone flights over 133 U.S. military facilities. The Pentagon said in August 2017 that U.S. military bases could shoot down drones that pose a threat.  The FAA said in January 2017  that more than 1 million drones have been registered. Last week, the U.S. Transportation Department picked 10 pilot projects allowing drone use at night, out of sight operations and over populated areas

Exceprts from U.S. agency seeks new authority to disable threatening drones, May 15, 2018

Somalia as Security Flank for the Gulf

A battle for access to seaports is underway in one of the world’s unlikeliest places: Somalia, now caught in a regional struggle between Saudi Arabia and the United Arab Emirates on one side with Qatar backed by Turkey on the other.  At stake: not just the busy waters off the Somali coast but the future stability of the country itself.

In 2017, a company owned by the United Arab Emirates government signed a $336 million contract to expand the port of Bosaso, north of Mogadishu in the semi-autonomous Somali region of Puntland.   In 2016, another UAE-owned firm took control of Berbera port in the breakaway northern region of Somaliland and pledged up to $440 million to develop it. In March 2017, Ethiopia took a stake in the port for an undisclosed sum.  The federal government in Mogadishu has long been at odds with the semi-autonomous regions of Puntland and Somaliland. The money could destabilise the country further by deepening tensions between central government, aligned with Turkey and Qatar, and Puntland and Somaliland, which both receive money from the UAE.

At the same time, Turkey, an ally of Qatar, is ramping up a multi-billion dollar investment push in Somalia. A Turkish company has run the Mogadishu port since 2014, while other Turkish firms built roads, schools and hospitals.   The rivalries have intensified since June 2017, when the most powerful Arab states, led by Saudi Arabia and including the UAE, cut diplomatic ties with Qatar, accusing it of supporting Iran and Islamist militants…

Saudi Arabia and the UAE increasingly view the Somali coastline – and Djibouti and Eritrea to the north – as their “western security flank”, according to a senior western diplomat in the Horn of Africa region…

Excerpts from  Gulf States Scramble for Somalia, Reuters, May 2, 2018

Stopping the Unstoppable: undersea nuclear torpedoes

On July 20th 1960, a missile popped out of an apparently empty Atlantic ocean. Its solid-fuel rocket fired just as it cleared the surface and it tore off into the sky. Hours later, a second missile followed. An officer on the ballistic-missile submarine USS George Washington sent a message to President Dwight Eisenhower: “POLARIS—FROM OUT OF THE DEEP TO TARGET. PERFECT.” America had just completed its first successful missile launch of an intercontinental ballistic missile (ICBM) from beneath the ocean. Less than two months later, Russia conducted a similar test in the White Sea, north of Archangel.

Those tests began a new phase in the cold war. Having ICBMs on effectively invisible launchers meant that neither side could destroy the other’s nuclear arsenal in a single attack. So by keeping safe the capacity for retaliatory second strikes, the introduction of ballistic-missile submarines helped develop the concept of “mutually assured destruction” (MAD), thereby deterring any form of nuclear first strike. America, Britain, China, France and Russia all have nuclear-powered submarines on permanent or near permanent patrol, capable of launching nuclear missiles; India has one such submarine, too, and Israel is believed to have nuclear missiles on conventionally powered submarines.

As well as menacing the world at large, submarines pose a much more specific threat to other countries’ navies; most military subs are attack boats rather than missile platforms. This makes anti-submarine warfare (ASW) a high priority for anyone who wants to keep their surface ships on the surface. Because such warfare depends on interpreting lots of data from different sources—sonar arrays on ships, sonar buoys dropped from aircraft, passive listening systems on the sea-floor—technology which allows new types of sensor and new ways of communicating could greatly increase its possibilities. “There’s an unmanned-systems explosion,” says Jim Galambos of DARPA, the Pentagon’s future-technology arm. Up until now, he says, submariners could be fairly sure of their hiding place, operating “alone and unafraid”. That is changing.

Aircraft play a big role in today’s ASW, flying from ships or shore to drop “sonobuoys” in patterns calculated to have the best chance of spotting something. This is expensive. An aeroplane with 8-10 people in it throws buoys out and waits around to listen to them and process their data on board. “In future you can envision a pair of AUVs [autonomous underwater vehicles], one deploying and one loitering and listening,” says Fred Cotaras of Ultra Electronics, a sonobuoy maker. Cheaper deployment means more buoys.

But more data is not that helpful if you do not have ways of moving it around, or of knowing where exactly it comes from. That is why DARPA is working on a Positioning System for Deep Ocean Navigation (POSYDON) which aims to provide “omnipresent, robust positioning across ocean basins” just as GPS satellites do above water, says Lisa Zurk, who heads up the programme. The system will use a natural feature of the ocean known as the “deep sound channel”. The speed of sound in water depends on temperature, pressure and, to some extent, salinity. The deep sound channel is found at the depth where these factors provide the lowest speed of sound. Below it, higher pressure makes the sound faster; above it, warmer water has the same effect…

Even in heavily surveilled seas, spotting submarines will remain tricky. They are already quiet, and getting quieter; new “air-independent propulsion” systems mean that conventionally powered submarines can now turn off their diesel engines and run as quietly as nuclear ones, perhaps even more so, for extended periods of time. Greater autonomy, and thus fewer humans—or none at all—could make submarines quieter still.

A case in point is a Russian weapon called Status-6, also known as Kanyon, about which Vladimir Putin boasted in a speech on March 1st, 2018. America’s recent nuclear-posture review describes it as “a new intercontinental, nuclear-armed, nuclear-powered, undersea autonomous torpedo”. A Russian state television broadcast in 2015 appeared to show it as a long, thin AUV that can be launched from a modified submarine and travel thousands of kilometres to explode off the shore of a major city with a great deal more energy than the largest warheads on ICBMs, thus generating a radioactive tsunami. Such a system might be seen as preserving a second-strike capability even if the target had a missile-defence system capable of shooting ICBMs out of the sky…

One part of the ocean that has become particularly interesting in this regard is the Arctic. Tracking submarines under or near ice is difficult, because ice constantly shifts, crackles and groans loudly enough to mask the subtle sounds of a submarine. With ever less ice in the Arctic this is becoming less of a problem, meaning America should be better able to track Russian submarines through its Assured Arctic Awareness programme…

Greater numbers of better sensors, better networked, will not soon make submarines useless; but even without breakthroughs, they could erode the strategic norm that has guided nuclear thinking for over half a century—that of an unstoppable second strike.

Excerpts from Mutually assured detection, Economist, Mar. 10, 2018