Category Archives: covert action

Government Intervention is Great: What China is Learning from the United States

A study published by the China Aerospace Studies Institute in September 2020′China’s Space Narrative: Examining the Portrayal of the US-China Space Relationship in Chinese Sources‘ used publicly available Chinese language resources to draw insights on how the Chinese view the U.S.-China space relationship. According to the study:

“Chinese sources weave a space narrative that portrays China as a modernizing nation
committed to the peaceful uses of space and serving the broader interests of advancing humankind through international space cooperation, economic development, and scientific discovery. Chinese sources minimize the military role of China’s space program.

In contrast, the same sources portray the United States as the leading
space power bent on dominating space, restricting access to space, and limiting international space cooperation to countries with similar political systems and level of economic development.

The report concludes that the United States and China are in a long-term competition in space in which China is attempting to become a global power, in part, through the use of space. China’s primary motivation for developing space technologies is national security…China’s space program is one element of its efforts to transition the current U.S.-dominated international system to a multipolar world….

Many Chinese writings on commercial space analyze the experiences of U.S. companies, with a particular focus on SpaceX. Chinese space experts call SpaceX the “major representative company” for commercial space worldwide. A report from Hong Kong media claims that Chinese investors view SpaceX as the “benchmark company” for emerging commercial space companies in the mainland. Chinese authors also follow developments in other U.S. commercial space companies, such as Digital Globe
and Rocket Lab.

Chinese authors also pay attention to the ways in which the U.S. government uses various policies and incentives to create a favorable ecosystem for the growth of new commercial space companies. Chinese writings analyze ways in which NASA has supported private companies with funding, technology transfer, consulting, and infrastructure leasing. Although their specific recommendations vary, Chinese authors view strong government oversight and intervention as crucial toward the success of the domestic commercial space industry.”

Tracking the Enemy: U.S. Space Force in Qatar

The newly formed U.S. Space Force is deploying troops to a vast new frontier: the Arabian Peninsula. Space Force now has a squadron of 20 airmen stationed at Qatar’s Al-Udeid Air Base in its first foreign deployment. The force, pushed by President Donald Trump, represents the sixth branch of the U.S. military and the first new military service since the creation of the Air Force in 1947.   Concerns over the weaponization of outer space are decades old. But as space becomes increasingly contested, military experts have cited the need for a space corps devoted to defending American interests…

In the spring of 2020, Iran’s paramilitary Revolutionary Guard launched its first satellite into space, revealing what experts describe as a secret military space program. The Trump administration has imposed sanctions on Iran’s space agency, accusing it of developing ballistic missiles under the cover of a civilian program to set satellites into orbit.

“The military is very reliant on satellite communications, navigation and global missile warning,” said Capt. Ryan Vickers, a newly inducted Space Force member at Al-Udeid. American troops, he added, use GPS coordinates to track ships passing through strategic Gulf passageways…

Isabel Debre, US Space Force deploys to vast new frontier: Arabian Desert, Associated Press, Sept. 21, 2020

Conquering Space: China’s X-37B and the United States

Ever since China claimed success in the secretive launch of an experimental spacecraft, experts have been pondering over what it could be and what it did in space.The spacecraft – mounted on a Long March 2F rocket – was launched from the Jiuquan Satellite Launch Centre in northern China on Sept. 4, 2020 and safely returned to Earth after two days in orbit…Unlike recent Chinese high-profile space missions, very few details have emerged about the vehicle and no visuals have been released. Chinese authorities have been tight-lipped about the nature of the short-duration excursion and what technologies were tested. The exact launch and landing times were not revealed, nor was the landing site although it is thought to be the Taklamakan Desert, which is in northwest China.

Three years ago, China said it would launch a space vessel in 2020 that “will fly into the sky like an aircraft” and be reusable. A reusable spacecraft – as the name implies can undertake multiple trips to space – thereby potentially lowering the overall cost of launch activity. A traditional one-off spacecraft – costing tens of millions of dollars – is practically rendered useless after a single mission.

The experimental vessel reached an altitude of about 350km, which is in line with China’s previous crewed flights. The spacecraft also released an unknown object into the orbit before returning to Earth…Once the testing is complete, such a vehicle could be used to launch and repair satellites, survey the Earth, as well as take astronauts and goods to and from orbit, possibly to a planned future Chinese space station.

The Chinese craft’s size and shape remain unclear but it is widely believed to be some sort of uncrewed space plane similar to the X-37B Orbital Test Vehicle operated by the US Air Force. The recent mission could be linked to the Shenlong – or divine dragon – space plane project, which has been in development for some time, according to reports. A second Chinese reusable space plane called Tengyun, or cloud climber, is also in the works. If confirmed as a space plane, China would become only the third country to have successfully launched such a vehicle into orbit after the US and the former Soviet Union. The European Space Agency is working on its own reusable orbital vehicle called Space Rider, while India is also said to be developing a space shuttle-like craft.

The X-37B, resembling a miniature space shuttle, has been in orbit since late May 2020 following its launch on its sixth assignment. Very little is known about the X-37B’s missions, prompting speculation that the planes could be used for spying activity or testing space weapons.

x-37b

According to Bleddyn Bowen, China’s spacecraft launch is “just another part of China becoming a comprehensive space power that utilizes space technology for the purposes of war, development, and prestige like all others”.

Pratik Jakhar, China claims ‘important breakthrough’ in space mission shrouded in mystery, BBC, Sept. 9, 2020

How to Fight: Laugh, Bleed, Kill

The U.S. response to the 9/11 attacks launched an Air Force special operations unit into more than 6,900 days, or nearly two decades, of continuous deployments and combat operations in the Middle East, officials said. Within weeks of the terrorist attacks on the U.S., the 17th Special Tactics Squadron deployed with Army Rangers on raids into southern Afghanistan on Oct. 19, 2001. Since then, the squadron has had no breaks in deployment. “We fight, bleed and laugh beside [the Rangers],” said Staff Sgt. Ryan Duhon, a tactical air control party operator quoted in last month’s statement. “We win as a team or fail as a team.”….

The Special Tactics community, whose airmen conduct personnel recovery, precision strike missions and battlefield surgery, is the most highly decorated in the Air Force since the Vietnam War. 

Excerpt from CHAD GARLAND, Air Force special ops members ‘fight, bleed and laugh’ on nearly 7,000 days of deployments, Stars and Stripes, Sept. 10, 2020

China’s Nuclear Triad: Land, Sumbarines and Bombers

Based on United States Report released in 2020 “Military and Security Developments Involving the People’s Republic of China” by the Secretary of Defense, China’s progress in upgrading its strategic bombers to carry nuclear payloads puts it on the cusp of achieving a “triad” of delivery systems ((1) land-launched nuclear missiles, (2) nuclear-armed submarines, and (3) aircraft delivered nuclear bombs).  The development of a nuclear triad raises the long-term stakes in the complex relationship between Beijing and Washington. …The heavy emphasis on China’s nuclear improvements will probably be used by the Pentagon to press lawmakers and the public to support the massive reinvestment already underway in modernized nuclear weapons. This includes the B-21 bomber, an $85 billion Ground Based Strategic Deterrent ICBM program and the $128 billion Columbia-class ballistic missile submarine.

China’s defense ministry denounced the report as a document created with a “zero-sum-game mindset and Cold War mentality,” saying that the U.S. had “misinterpreted” the country’s nuclear policy and stirred up confrontation with Taiwan. “It’s extremely wrong and China firmly rejects it.”  As part of President Xi Jinping’s efforts to build a “world class” military by 2049, the Defense Department report said the People’s Liberation Army has already achieved parity with or exceeded the U.S. in at least three key areas: shipbuilding, land-based conventional ballistic and cruise missiles and integrated air defense systems.

While the country has one overseas military base, in the East African nation of Djibouti, China’s government “is very likely already considering and planning for additional overseas military logistics facilities to support naval, air and ground forces…”.  China’s current nuclear arsenal includes 100 silo or road-mobile intercontinental ballistic missiles, as many as six Jin-class nuclear missile submarines capable of carrying 12 missiles each and a new air-refuelable H-6N long-range bomber. The bomber is an upgrade on a previous model and comes with a modified fuselage “that allows it to carry either a drone or an air-launched ballistic missile that may be nuclear-capable. 

Excerpts from Anthony Capaccio, Pentagon Warns China Is Nearing a Milestone in Nuclear Weapons Buildup, Bloomberg, Sept. 1, 2020

China denounced the Pentagon report. According to Xinhua, the Pentagon report is crowded with anti-China hogwash. Fear-mongering over China has always been the Pentagon’s trick to demand more appropriations from the U.S. Congress. A fabricated grave threat to world peace can also help Washington sell more weapons to its allies, and serves as an excuse for America’s pursuit of global domination…While Washington is selling its latest “China-scare” fiction to the world, it is hard to overlook such facts that the United States spent more on military than 144 countries combined in 2018 and maintains nearly 800 military bases in over 70 countries.

Excerpt from Commentary: Lies, conspiracies behind Pentagon’s China military report, Xinhua, Sept. 5, 2020


Under Zero Trust: the U.S. Chip Resurgence

The Defense Advanced Research Projects Agency launched its Electronic Resurgence Initiative (ERI)  to help reboot a domestic chip industry that has been moving steadily offshore for decades…. Program officials and chip industry executives foresee the emergence of a “5th generation of computing” based on current cloud infrastructure while combining AI, the Internet of Things (IoT) and 5G wireless networks to deliver big data.

“The U.S. microelectronics industry is at an inflection point,” Ellen Lord, undersecretary of defense for acquisition and sustainment, told the virtual ERI summit. After decades of offshoring of chip fabrication, packaging and testing capabilities, “How do we reverse this trend?”  The Defense Department is expanding its technology base efforts by implementing a “step-by-step process for reconstituting the microelectronics supply chain,” focusing on various segments of the semiconductor ecosystem, including memory devices, logic, ICs and advanced packaging along with testing and assembly.

“While DoD does not drive the electronics market,” constituting only about 1 percent of demand, “we can drive significant R&D,” ERI is advancing public-private partnerships that provide a framework for commercial innovation. The result would be “pathfinder projects” geared toward a renewal of U.S. chip manufacturing. As trade frictions with China grow, ERI is placing greater focus on ensuring the pedigree of U.S. electronics supply chain. “We need to find a path to domestic sources,” said Lord.

While nurturing government-industry partnerships as part of an emerging next-generation U.S. industrial policy, this year’s DARPA summit also emphasized chip standards and processes for securing fabs, foundry services, devices and foundational microelectronics. In that vein, U.S. officials stressed new chips metrics like “quantifiable assurance” to secure dual-use devices that could end up in weapons or an IoT device.

“Our interests to protect both the confidentiality and the integrity of our supply chain are aligned with commercial interests, and we will continue to work across government and industry to develop and implement our quantitative assurance strategy based on zero trust,” said Nicole Petta, principal director of DoD’s microelectronics office. The “zero trust” approach assumes no device is safe, and that all microelectronics components must be validated before deployment. The framework marks a philosophical departure from DoD’s “trusted foundry” approach instituted in the 1990s, largely because “perimeter defenses” failed to account for insider threats…

DARPA Chip Efforts Pivots to Securing US Supply Chain, https://www.hpcwire.com, Aug. 24, 2020

Everything Moving in Space Is a Weapon? Yes.

Kosmos 2542, a Russian satellite that was launched in November 2019, was “like Russian nesting dolls”. Eleven days after its launch it disgorged another satellite, labelled Kosmos 2543. Then, on July 15th, Kosmos 2543 itself spat out another object, which sped off into the void.  Merely a “small space vehicle” to inspect other satellites, said the Russians. Nonsense, said the Americans; it was a projectile. The intentl.. was to signal Russia’s ability to destroy other nations’ satellites….In January 2020, America complained that Kosmos 2542 and 2543 had tailed a spy satellite in an “unusual and disturbing” way (American satellites have also sidled up to others in the past). 

Anti-satellite weapons are not new. During the cold war, America and the Soviet Union developed several ways to blow up, ram, dazzle and even nuke each other’s satellites. The countries conducted two-dozen anti-satellite tests between them. Ten were “kinetic”, involving a projectile physically striking a target. But new competitors, and new technologies, mean anti-satellite warfare is a hot topic once again. China has conducted ten tests over the past 15 years, including a kinetic one in 2007 that created a great deal of space debris. India conducted its first kinetic test in 2019. America, Russia and China have all manoeuvred their satellites close to others, sometimes provocatively so. New methods of attack are being tested, including lasers and cyber-attacks.

Some satellites, such as America’s GPS constellation, blur the distinction between military and civilian assets. Over the past decade, America’s armed forces have put payloads on three commercial satellites, and plan to pay Japan to host others on its own navigation satellites….Then there is the question of what counts as an attack. Michael Schmitt, a law scholar, and Kieran Tinkler, a professor at the us Naval War College, say it is unclear whether jamming a civilian satellite would violate the general prohibition on attacking civilian objects. Blowing up a military one, meanwhile, might or might not constitute an indiscriminate (and hence illegal) attack, depending on whether it could have been disabled by other means and how much debris was produced.

Perhaps the biggest difference between space war and terrestrial war is how long the consequences can last. Much of the debris from China’s 2007 test, for instance, will still be in space at the turn of the next century. The more debris, the greater the likelihood of accidental collisions with other satellites, which generates more debris in turn. Enough debris could lead to a chain reaction known as Kessler syndrome, which could render entire swathes of near-Earth space unusable for decades…

Space Junk

The Outer Space Treaty of 1967 requires states to consult each other on actions that “would cause potentially harmful interference”, though the rule has rarely been heeded. Most countries accept that, in wartime, a body of existing laws known as international humanitarian law would apply, as on Earth—something America confirmed in its “Spacepower” doctrine, published on August 10, 2020. International humanitarian law is based on principles such as distinction (between combatants and civilians) and proportionality (between civilian harm and military advantage). But how to apply such ideas in a place with few humans is not always obvious.

The Manual on International Law Applicable to Military Uses of Outer Space (MILAMOS) is being spearheaded by McGill University, in Montreal, and a separate Woomera Manual by the University of Adelaide. Both hope to publish their documents 2020…

Russia and China would like a formal treaty banning all weapons in space. Both are keen to prevent America from deploying space-based anti-missile systems which might threaten their own nuclear forces. America and its allies resist this. They argue that it is impossible to define a space weapon—anything that manoeuvres in orbit could serve as one—and that it would be easy to cheat. The European Union has instead proposed a voluntary code of conduct. Many non-Western countries would prefer a binding treaty…. Though most are not space powers, many are likely to become so in the future, so their buy-in is important.

Excerpts from Satellite warfare: An arms race is brewing in orbit, Economist, Aug. 15, 2020

The Worst Murderer: Jihadists or Governments?

Sahel: West Africa’s most populous countries, along the Atlantic coast, have become vulnerable to the predations of jihadists spilling out of failing states farther north in the Sahel on the borders of the Sahara desert. Jihadists seized control of chunks of Mali in 2012 and were stopped from overrunning Bamako, its capital, only after thousands of French troops were hurriedly flown in. The insurgents have since pushed across the border into Niger and Burkina Faso. In those three countries alone, 4,800 people lost their lives in the conflict last year. Fully 1.7m people have been forced to flee their homes. Now the war is beginning to jump borders again, putting at risk some of Africa’s fastest-growing economies, including Benin, Ghana and Ivory Coast.


This war in the Sahel has been growing rapidly. Ten times more people were killed last year than in 2014 (excluding deaths in north-eastern Nigeria, which faces its own jihadist insurgents). Two main jihadist groups are behind most of the fighting: the Islamic State in the Greater Sahara (ISGS) and Jama’at Nasr al-Islam wal Muslimin (JNIM), which is linked to al-Qaeda. These groups have extended their reach, even though thousands of international peacekeepers and local and Western soldiers have been deployed to stop them. France has sent some 5,100 troops to the Sahel, while the United States has provided another 1,200. In addition, the un has 15,000 blue helmets there, including about 350 Germans, plus 250 British soldiers who are soon to arrive. With American forces leaving Afghanistan, the Sahel will soon be the West’s biggest combat zone.

Worse, the jihadists are expanding in three directions at once. To the south they threaten Benin, Ghana, Ivory Coast and Togo. To the west there has been a spate of attacks in Mali close to its border with Senegal; and to the east with Nigeria’s insurgent groups. The jihadists already have a “de facto safe haven in northern Mali”, says General Dagvin Anderson, in charge of America’s commandos in Africa. He frets that as they expand they will have more scope to plan attacks on American soil.

The weakness of governments and the feebleness of their public services are helping the jihadists. In the neglected hinterlands of the Sahel the rebels offer themselves as an alternate state, serving up sharia and medical aid. Moreover, the jihadists have been adept at exploiting ethnic faultlines, for instance between largely Muslim and seminomadic Fulani herders and more settled farming communities, which have their own armed groups of traditional hunters known as Dozos. =

Trade and commerce also provide an incentive for the jihadists to expand their reach. The migration corridor between Burkina Faso and Ivory Coast is the busiest in Africa. Jihadists cash in by taxing traders and smuggling stolen livestock, drugs and guns. The gold mines in Burkina Faso have become a target. Much of the gold is smuggled out through Togo, which officially exported seven tonnes of the metal to the United Arab Emirates in 2018, despite mining very little itself. Gold is also pulling jihadists towards Senegal…

But in 2020, more civilians in the Sahel have been killed by government soldiers than by jihadists, says José Luengo-Cabrera of the International Crisis Group (icg), a Brussels-based ngo. “When soldiers kill the head of the family, they almost throw his sons and nephews into the arms of bearded men in shorts hiding in the bush,” one villager told Human Rights Watch, a global monitor. It says in the town of Djibo alone, in Burkina Faso, evidence suggests government forces have murdered 180 men—many of them were blindfolded and had their hands bound before they were shot. In Burkina Faso… citizens may feel safer living among terrorists than with their own country’s security forces.

Governments in the region and some Western forces have made matters worse by supporting militias. In 2018 the French army allied itself with Tuareg militias from Mali to fight against ISGS. They clobbered the jihadists but also killed scores of civilians, aggravating ethnic tensions and fuelling recruitment by the insurgents….Above all, governments need to regain legitimacy by providing services and holding themselves to account. “It is not possible to win the war if there is not trust from the population,” says Niagale Bagayoko of the African Security Sector Network…But good governance and decent services in the region are scarce. At a meeting of Sahelian leaders with Mr hard. In Burkina Faso alone, the jihadists have forced about 2,500 schools to close.

Excerpts from Jihad in the Sahel: Fighting a Spreading Insurgency, Economist, July 11, 2020

Leave No Oil Under-Ground: OPEC against US Frackers

In 2014-16, the OPEC waged a failed price war to wipe out American frackers. Since then the cartel and its partners, led by Russia, have propped up oil prices enough to sustain shale, but not enough to support many members’ domestic budgets. In March 2020 Saudi Arabia urged Russia to slash output; Russia refused, loth to let Americans free-ride on OPEC-supported prices. The ensuing price war was spectacularly ill-timed, as it coincided with the biggest drop in oil demand on record.  The desire to chasten American frackers remains, though. OPEC controls about 70% of the world’s oil reserves, more than its 40% market share would suggest… If the world’s appetite for oil shrinks due to changing habits, cleaner technology or greener regulations, countries with vast reserves risk having to leave oil below ground. 

Excerpts from Crude Oil: After the Fall, Economist, June, 13, 2020

The Nuclear Option: Chopping off Hong Kong from the Dollar System

China and America have begun the fraught business of disentangling their financial systems. Chinese firms with shares listed in New York have rushed to float in Hong Kong, too, after the White House signalled they are not welcome on Wall Street….But now Hong Kong itself, the world’s third-biggest international financial centre, has become a geopolitical flashpoint. Its unique role as the conduit between global capital markets and China’s inward-looking financial system means that both sides must tread carefully.

On May 28, 2020 China said it would enact a new national-security law for Hong Kong, undermining the formulation of “one country, two systems” in place since 1997, under which the territory is supposed to be governed until 2047. In response, America has said it may downgrade the legal privileges it grants Hong Kong, which treat it as autonomous from China

Hong Kong’s place in the world depends on having the rule of law, a trusted reputation and seamless access to Western financial markets. Other Chinese cities have big stock exchanges: shares listed in Shanghai and Shenzhen are together worth a lot more than those in Hong Kong. But neither has fair courts, an independent central bank, free movement of capital or a mix of Western and Chinese firms. These foundations are the basis for $9.7trn of cross-border financial claims, such as loans, that are booked in the territory. Hong Kong is also where mainland Chinese firms and banks go to deal in the dollar, the world’s dominant currency. Some $10trn of dollar transactions flowed through Hong Kong’s bank-to-bank payments system last year.

Until recently, conventional wisdom held that Hong Kong’s position would be assured for 20-30 years, because it would take that long for China either to upgrade its markets to Western standards or to become so powerful that it could impose mainland practices, and the yuan, on the rest of the world. But the trade war, a year of street protests and China’s iron-fisted response to them raise new questions about Hong Kong’s durability. Bullying from Beijing erodes the sense that it is autonomous. And there is an outside chance that America could impose sanctions or other restrictions that would stop some Hong Kong officials, firms or banks from using dollars….. America’s might bring into question whether money parked in Hong Kong is still fully fungible with money in the global financial system. If these worries spread, they could destabilise Hong Kong and cause a financial shock in China and well beyond it.

The good news is that so far there is no sign of capital flight. Hong Kong’s vast deposit base has been stable in recent weeks, say its bankers. Investors are reassured by its $440bn or so mountain of foreign reserves and a long record of capable financial management. The rush of Chinese listings will bring in new cash and drum up business in the city….Nonetheless, for China the prudent policy is to try to speed up the development of the mainland’s financial capabilities so that it is less exposed to potential American punishment…Italso means another big push to boost the global role of the yuan and reduce China’s dependence on the dollar…

Excerpts from Hong Kong: Conduit’s End, Economist, June 6, 2020

Selling War Services: the Mercenaries

Despite a UN treaty banning mercenaries, their day is far from over. Some analysts think there are now more of them in Africa than ever. But can they ever be a force for good?  ….In the years after most African countries gained independence, mercenaries were notorious for supporting secessionist movements and mounting coups. 

Western governments have in the past winked at mercenary activity that served their commercial interests. But nowadays Russia is seen as the leading country egging on mercenaries to help it wield influence. It does so mainly through Wagner, ***whose founder, Yevgeny Prigozhin, is close to President Vladimir Putin.

Wagner has been hired to prop up a number of shaky African regimes. In Sudan it tried to sustain the blood-drenched dictatorship of Omar al-Bashir. He was ousted last year after big protests. In 2018 hundreds of Wagner men arrived in the Central African Republic to guard diamond mines, train the army and provide bodyguards for an embattled president, Faustin-Archange Touadéra. In Guinea, where Rusal, a Russian aluminium giant, has a big stake, Wagner has cosied up to President Alpha Condé, who has bloodily faced down protests against a new constitution that lets him have a third term in office. In Libya, despite a un arms embargo, Wagner is reported to have deployed 800-1,200 operatives in support of a rebel general, Khalifar Haftar, who has been trying to defeat the UN-recognised government….

Mercenaries have three main advantages over regular armies. First, they give plausible deniability. Using them, a government such as Russia’s can sponsor military action abroad while pretending not to. Second, they tend to be efficient, experienced, nimble and flexible. Third, they are cheaper than regular armies. Whereas soldiers receive lifelong contracts and pensions, mercenaries are often paid by the job..

***Other firms include Dyke Advisory Group (DAG) , OAM Middle East

See also The UN Working Group on the Use of Mercenaries

Excerpts from Soldiers of misfortune: Why African governments still hire mercenaries, Economist, May 30, 2020

Strangling China with Hong Kong: the Politics of Fear

The U.S. determination  that Hong Kong is no longer autonomous from mainland China, under the Hong Kong Policy Act of 1992, will have significant implications for the city’s exporters and businesses.  Sensitive U.S. technologies could no longer be imported into Hong Kong, and the city’s exports might be hit with the same tariffs levied on Chinese trade.

But the act doesn’t cover the far more extensive role Hong Kong plays as China’s main point of access to global finance.  As of 2019, mainland Chinese banks held 8,816 trillion Hong Kong dollars ($1.137 trillion) in assets in the semiautonomous city, an amount that has risen 373% in the last decade…. China’s banks do much of their international business, mostly conducted in U.S. dollars, from Hong Kong. With Shanghai inside China’s walled garden of capital controls, there is no obvious replacement.

While the U.S. doesn’t directly control Hong Kong’s status as a financial center, Washington has demonstrated its extensive reach over the dollar system, with penalties against Korean, French and Lebanese financiers for dealing with sanctioned parties. The U.S. recently threatened Iraq’s access to the New York Federal Reserve, demonstrating a growing willingness to use financial infrastructure as a tool of foreign policy.  Even though the U.S. can’t legislate Hong Kong’s ability to support Chinese banks out of existence, the role of an international funding hub is greatly reduced if your counterparties are too fearful to do business with you.

Putting the ability of Chinese banks to conduct dollar-denominated activities at risk would be deleterious to China’s ability to operate financially overseas, posing a challenge for the largely dollar-denominated Belt and Road global infrastructure initiative. It would also put the more financially fragile parts of the country, like its debt-laden property developers, under strain.  China’s hope to develop yuan into an influential currency also centers on Hong Kong’s remaining a viable global financial center—more than 70% of international trade in the yuan is done in the city.

Excerpts from Mike Bird, How the US Could Really Hurt China, WSJ, May 290, 2020

Mining the Moon: The First Mover Advantage

The US government is starting to lay down the groundwork for diplomacy on the moon. On 15 May, 2020 NASA administrator Jim Bridenstine released a set of principles that will govern the Artemis Accords on the exploration of the moon. The accords are named after NASA’s Artemis programme, the US initiative to explore the moon, with a planned launch of astronauts to the lunar surface in 2024. Other countries are also increasingly turning towards the moon, which is concerning when a landing on the moon can send up clouds of potentially hazardous dust that travel a long way across the surface and even into orbit…

At the moment, there is little practical international law governing activities on the moon. The Outer Space Treaty of 1967 deals with general space exploration, while the more specific Moon Agreement of 1984 states that “the moon and its natural resources are the common heritage of all mankind”, prohibiting the ownership of any part of the moon or any resources from the moon….However, no nation capable of human space flight has signed the Moon Agreement, effectively rendering it moot. In fact, in April 2020, US president Donald Trump issued an executive order supporting moon mining and taking advantage of the natural resources of space.

The Artemis Accords aim to protect historic locations like the Apollo landing sites but encourage mining in other areas. They also promote transparency and communication between nations, requiring signatories to share their lunar plans, register any spacecraft sent to or around the moon and release scientific data to the public.  That transparency requirement might be a stumbling block for potential parties to the accords, says Forczyk. “I really don’t know how much countries are going to be willing to share some of their more delicate, sensitive information,” she says. “

The rest of the stipulations of the Artemis Accords are about safety: nations will be able to set “safety zones” to protect their activities on the moon, they will have to work to mitigate the effects of debris in orbit around the moon and they will agree to provide emergency assistance to any astronauts in distress.

Rather than attempting to put together an international treaty, which could be difficult to negotiate before NASA’s next crewed launch to the moon, the US will sign bilateral agreements with individual countries.

Excerpts from Leah Crane, NASA’s Artemis Accords aim to lay down the law of the land on the moon, New Scientist, May 20, 2020

The Game of Chicken in the Melting Arctic

In 2018 the NATO alliance, joined by Sweden and Finland, held Trident Juncture, its largest exercise since the end of the cold war, in Norway. That involved the first deployment of an American aircraft-carrier in the Arctic Circle for three decades. Western warships have been frequent visitors since. On May 1, 2020 a “surface action group” of two American destroyers, a nuclear submarine, support ship and long-range maritime patrol aircraft, plus a British frigate, practised their submarine hunting skills in the Norwegian Sea.

Such drills are not unusual. But on May 4, 2020 some of those ships broke off and sailed further north into the Barents Sea, along with a third destroyer. Although American and British submarines routinely skulk around the area, to spy on Russian facilities and exercises covertly, surface ships have not done so in a generation. On May 7, 2020 Russia’s navy greeted the unwelcome visitors by announcing that it too would be conducting exercises in the Barents Sea—live-fire ones, in fact. On May 8, 2020… the NATO vessels departed.

It is a significant move. The deployment of destroyers which carry missile-defence systems and land-attack cruise missiles is especially assertive. After all, the area is the heart of Russian naval power, including the country’s submarine-based nuclear weapons. Russia’s Northern Fleet is based at Severomorsk on the Kola peninsula, to the east of Norway’s uppermost fringes.

Western navies are eager to show that covid-19 has not blunted their swords, at a time when America and France have each lost an aircraft-carrier to the virus. But their interest in the high north predates the pandemic. One purpose of the foray into the Barents Sea was “to assert freedom of navigation”, said America’s navy. Russia has been imposing rules on ships that wish to transit the Northern Sea Route (NSR), an Arctic passage between the Atlantic and Pacific that is becoming increasingly navigable as global warming melts ice-sheets . America scoffs at these demands, insisting that foreign warships have the right to pass innocently through territorial waters under the law of the sea. Although last week’s exercise did not enter the NSR, it may hint at a willingness to do so in the future.

On top of that, the Arctic is a growing factor in NATO defence policy. Russia has beefed up its Northern Fleet in recent years…Russian submarine activity is at its highest level since the cold war…Ten subs reportedly surged into the north Atlantic in October 2019  to test whether they could elude detection….Russia’s new subs are quiet and well-armed. As a result, NATO’s “acoustic edge”—its ability to detect subs at longer ranges than Russia—“has narrowed dramatically.”

Russia primarily uses its attack submarines to defend a “bastion”, the area in the Barents Sea and Sea of Okhotsk where its own nuclear-armed ballistic-missile submarines patrol.  A separate Russian naval force known as the Main Directorate of Deep-Sea Research (GUGI, in its Russian acronym) might also target the thicket of cables that cross the Atlantic.

The challenge is a familiar one. For much of the cold war, NATO allies sought to bottle up the Soviet fleet in the Arctic by establishing a picket across the so-called GIUK gap, a transit route between Greenland, Iceland and Britain that was strung with undersea listening posts….The gap is now back in fashion and NATO is reinvesting in anti-submarine capabilities after decades of neglect. America has stepped up flights of P8 submarine hunting aircraft from Iceland, and Britain and Norway are establishing P8 squadrons of their own. The aim is to track and hold at risk Russian nuclear subs as early as possible, because even a single one in the Atlantic could cause problems across a large swathe of ocean.

GIUK (Greenland, Iceland, UK) gap. Image from wikipedia.

But a defensive perimeter may not be enough. A new generation of Russian ship-based missiles could strike NATO ships or territory from far north of the GIUK gap, perhaps even from the safety of home ports. “This technological development represents a dramatically new and challenging threat to NATO forces…. Similar concerns led the Reagan administration to adopt a more offensive naval posture, sending forces above the gap and into the maritime bastion of the Soviet Union. 

Excerpts from Naval Strategy: Northern Fights, Economist, May 16, 2020

Our Cold War Roots: Weaponizing China’s One Child Policy

The elite US special operations forces are ill-equipped for high-tech warfare with China and Russia, experts warn, as the Trump administration pivots from the “war on terror” to a struggle with geopolitical rivals. Special operations, known for kicking down doors and eliminating high-value targets, number 70,000 personnel, cost $13bn a year and have carried much of the burden of the war on terror. But it is unclear what role they will play as the Pentagon moves to redeploy troops from Afghanistan to the Indo-Pacific to counter China’s regional ambitions.

General Richard Clarke, commander of special operations command (Socom), told an industry conference this week that the US needed to develop new capabilities to “compete and win” with Russia and China. He added that Socom must develop cyber skills and focus on influence campaigns rather than “the kill-capture missions” that characterised his own time in Afghanistan after the September 11 2001 attacks. Socom’s fighters include US Navy Seals, Army Green Berets and Marine Corps Raiders. Defence officials say China has raised military spending and research with the aim of exploiting American vulnerabilities, while Russia has tested out new technology during combat in Syria. “Maybe we are further behind than we know,” Colonel Michael McGuire told the annual Special Operations Industry Conference

McGuire highlighted US vulnerabilities in cyber security, and soft-power tactics by America’s enemies that could “drive fissures through some of our alliances”. He proposed shifting focus to defence over attack.   “You could have hundreds and thousands of engagements every single day in a fight against China. We are just not fast enough, dynamic enough or scaleable enough to handle that challenge,” said Chris Brose, chief strategy officer at Anduril…. He added “Most of the US-China competition is not going to be fighting world war three,” he said. “It’s going to be kicking each other under the table.”….

US special operators have for years had the run of the battlefield. But they face very different conditions in any fight against China, which has developed an arsenal of missiles, fighter jets, spy planes and other eavesdropping and jamming techniques that would make it hard for America to conceal troops, transport and communications. Special operations forces are not ready for operations against a near-peer foe, such as China, in a direct engagement… He called for a return to their cold war roots. “Vintage special operations forces is about stealth, cunning and being able to blend in — they were triathletes rather than muscle-bound infantrymen with tattoos,” said the former officer. 

David Maxwell, a former Green Beret and military analyst, is among those who favour a shift towards political warfare.One such idea of his would involve a popular writer being commissioned to pen fictionalised war stories based in Taiwan intended to discourage Beijing from invading the self-governing island. He told a gathering of Pacific special forces operators in February 2020 that fictional losses could “tell the stories of the demise of Chinese soldiers who are the end of their parents’ bloodline”. He argued that Beijing’s former one-child policy could be weaponised to convince China that war would be too costly. But Mr Maxwell said such ideas have yet to catch on. He added that psyops officers lamented to him that it was “easier to get permission to put a hellfire missile on the forehead of a terrorist than it is to get permission to put an idea between his ears”.

Excerpts from Katrina Manson , US elite forces ill-equipped for cold war with China, FT, May 16, 2020

Our Biggest Weakness: Weak Biodefenses + Malicious Viruses

The coronavirus that has killed over 180,000 people worldwide was not created with malice. Analysis of its genome suggests that, like many new pathogens, it originated by natural selection rather than human design. But …“Covid-19 has demonstrated the vulnerability of the US and global economy to biological threats, which exponentially increases the potential impact of an attack,” says Richard Pilch of the Middlebury Institute of International Studies. In theory, bioweapons are banned. Most countries in the world are party to the Biological Weapons Convention (BWC) of 1975, which outlaws making or stockpiling biological agents for anything other than peaceful purposes. But some countries probably make them secretly, or keep the option close at hand. America accuses North Korea of maintaining an offensive biological-weapons programme, and alleges that China, Iran and Russia dabble in dual-use biolgical research (for peaceful and military usage) research. Toxins like ricin have also been bought and sold on shady recesses of the internet known as the dark web.

Germ warfare briefly rose to prominence in September 2001, when letters laced with anthrax spores were mailed to American news organisations and senators, killing five people. That was a wake-up call. Public health became part of national security. BioWatch, a network of aerosol sensors, was installed in more than 30 cities across America. But in recent years threats from chemical weapons, like the sarin dropped by Syria’s air force and the Novichok smeared on door handles by Russian assassins, took priority.

Though the Trump administration published a national biodefence strategy in 2018, it shut down the National Security Council’s relevant directorate and proposed cuts to the laboratories that would test for biological threats. Funding for civilian biosecurity fell 27% between fiscal years 2015 and 2019, down to $1.61bn—less than was spent on buying Black Hawk helicopters.

Yet many pathogens used as weapons tend to differ from respiratory viruses in important ways. Those like anthrax, caused by bacteria which form rugged and sprayable spores, but do not spread from human to human, have the advantage of minimising the risk of rebound to the attacker. With the notable exception of smallpox—a highly contagious and lethal virus that was eradicated in 1979 but preserved by the Soviet Union for use against America (but not Europe), and now exists only in two laboratories, in America and Russia—most biological weapons would therefore have more localised effects than the new coronavirus.

Even so, the slow and stuttering response to the pandemic has exposed great weaknesses in how governments would cope…demonstrating that every part of public-health infrastructure is either broken or stretched to the max. The centrepiece of America’s biosurveillance programme, a network of laboratories designed for rapid testing, failed, says Mr Koblentz, while the national stockpile of face masks had not been substantially replenished in over a decade. Would-be attackers will take note.

In 2016 American intelligence agencies singled out genome editing as a national-security threat for the first time. Two years later a major study by the National Academies of Sciences, Engineering, and Medicine warned that synthetic biology, a potent set of methods for tinkering with or creating organisms, could, in time, be used to re-create viruses like smallpox or make existing pathogens more dangerous, such as resistant to antibiotics. In 2011 Dutch and Japanese scientists said that they had created a version of bird flu that could be transmitted between mammals by the respiratory route—an announcement that prompted the Netherlands to treat the relevant academic papers as sensitive goods subject to export controls.

In January 2020 Canadian scientists funded by an American biotech company used synthetic DNA from Germany to synthesise a microbe closely related to smallpox, indicating the ease with which it could be done. “If a potential bad actor pursues a weapons capability using sars-cov-2, the virus is now attainable in laboratories all around the world, and blueprints for assembling it from scratch have been published in the scientific literature.”

 The trouble is that biodefence has evolved slowly, says Dan Kaszeta, a former biological weapons adviser to the White House. Compact devices that can detect chemical threats and warn soldiers to don a gas mask have long been available. “That doesn’t exist for anthrax or any of the other aerosol pathogens,” says Mr Kaszeta. “Telling the difference between an anthrax spore and a bit of tree pollen is not something you can do in a couple of seconds.”

Excertps from Biodefence: Spore Wars, Economist, Apr. 25, at 19

Even the Oceans are not Free: Swarming the Seas

The Ocean of Things of Defence Advanced Research Projects Agency (DARPA) aims to  wire up the high seas with swarms of floating, connected sensors.  Such devices are not in themselves new. There are around 6,000 floating sensors deployed around the world’s oceans, run by navies and research institutes. What is unprecedented is the scale of  DARPA’s ambition. Over the next few years it hopes to deploy 50,000 sensors across 1m square kilometres of sea, an area considerably larger than Texas. The eventual goal—much more distant—is to enable the continuous monitoring and analysis of a significant fraction of the world’s oceans.

Existing “floating instrument packages”, known as floats or drifters, are often custom-built, and usually contain the highest-quality instruments available. They therefore tend to be expensive, and are bought only in small numbers. A typical existing float, designed for scientific research, is the Argo. It costs around $20,000, and can measure water temperature and salinity.  The Ocean of Things takes the opposite approach. The aim is to cram as many cheap, off-the-shelf components as possible into a single low-cost package. Current float prototypes cost around $750…That would allow tens of thousands to be deployed without breaking the bank. Large numbers are crucial for coverage. They also help compensate for inaccuracies in individual instruments.

The project’s researchers are evaluating three designs from different manufacturers, ranging in size from about six to 18 litres. One, proposed by Xerox’s Palo Alto Research Centre, is made of glass, like a traditional Japanese fishing float. A second, from a firm called Areté Associates, has an aluminium shell, and uses wood for buoyancy. Both models feature solar panels. The third, made by a company called Numurus, is made of lacquered cardboard, and relies entirely on its batteries. All three are designed to last for a year or so and are made to be as environmentally friendly as possible, with minimal use of plastics. That is important because, at the end of their mission, the floats are designed to scuttle themselves

With 361m square kilometres of ocean on the planet, a true Ocean of Things, monitoring everything on and under the water, would require about 18m floats.

Excerpts from Big Wet Data: The Ocean of Things, Economist, Mar. 14, 2020

Ethical Killing: Landmines

During the Gulf war of 1991, no fewer than 117,000 landmines were showered over Kuwait and Iraq by American planes. This barely dented the Pentagon’s vast stockpile of 19m. Just under a quarter of the devices scattered in the path of Saddam Hussein’s army were anti-personnel landmines (APLs), the sort that would soon be banned by the Anti-Personnel Mine Ban Convention of 1997, widely known as the Ottawa treaty. The Ottawa treaty has 164 parties, all of which ban the production and use of APL (anti-vehicle mines, among others, are still allowed). America is not among them. When the treaty was finalised, America declined to join (other holdouts include China, Cuba, Iran, Russia and Syria).

Landmines have a number of military uses. They are typically used to channel opposing armies away from particular areas and into others. A minefield can force an enemy to turn, which exposes their flank and makes them especially vulnerable, says Vincent Brooks, a retired general who commanded American forces in South Korea in 2016-18. They can also be used to “canalise” the enemy, channelling attackers into unfavourable terrain, where they may be more exposed to concentrated artillery fire. …But landmines are reviled weapons, and not without good reason. “They’re indiscriminate,”… Landmine casualties have fallen sharply over the years, but at least 2,000 people were killed or wounded by manufactured or improvised APLS in 2018, according to data collected by the Landmine and Cluster Munition Monitor, a research group. Laying a mine can cost a few dollars; clearing one can require $1,000.

The Pentagon has an answer to this. It says that it only possesses, would only produce and would only use “non-persistent” landmines with the capacity to self-destruct or, failing that, to self-deactivate, with a battery losing its charge, within 30 days (some models can blow themselves up in as little as a few hours). It claims that such features are remarkably reliable. …“When the technology is brought into the battlefield, we see that the actual data doesn’t match with the promises,” says Erik Tollefsen, head of Weapons Contamination for the International Committee of the Red Cross. He says that impressive reliability rates are usually derived from tests in sterile conditions, and prove wildly exaggerated in practice. In 2002 a report by the Government Accountability Office, an agency that audits the federal government, noted that during the Gulf war one in 10,000 mines were expected to remain active, which would have produced 12 duds. The actual figure was almost 2,000.

Others argue that there are perfectly viable alternatives to APLs….In particular, remotely activated mines (rather than victim-activated ones) are allowed under the treaty if the person triggering the device has the would-be victim in sight, although this makes them harder to use at range and hostage to a breakdown of communications. In 2018 Finland—a late and reluctant signatory to Ottawa, given its long border with Russia—said it was developing a new, remote-controlled variety of anti-personnel “bounding” mine that leaps into the air and fires metal bullets downward.

Excerpts from Ethical Landmines: Watch Your Step, Economist, Feb. 15, 2020

Breath and Sweat: the Biometrics of All Private Things

It is not just DNA that people scatter to the wind as they go about their business. They shed a whole range of other chemicals as well, in their breath, their urine, their faeces and their sweat. Collectively, these molecules are referred to as metabolites….

The most common way of analysing metabolite content is gas chromatography-mass spectrometry. This technique sorts molecules by their weight, producing a pattern of peaks that correspond to different substances….There are, however, a lot of information sources out there, in the form of publicly available metabolite databases. The databases themselves are getting better, too…. A study just published by Feliciano Priego-Capote at University of Cordoba, in Spain, for example, shows it is possible to extract much meaningful information from even a dried-up drop of sweat. “The day is coming soon”, observes Cecil Lewis, a molecular anthropologist at University of Oklahoma, who is studying the matter, “when it will be possible to swab a person’s desk, steering wheel or phone and determine a wide range of incredibly private things about them….


The police may be tempted to push the boundaries as well. The fourth amendment to America’s constitution protects against unwarranted searches and seizure of evidence. This means it is hard to force someone to give a sample. But if obtaining such merely requires taking a swab of a surface in a public place—perhaps a keyboard someone has just used—the 4th amendment is unlikely to apply.

That is not necessarily wrong, if it means more criminals are caught and convicted. But it needs to be thought about carefully, because many metabolites are sticky. Cocaine is a case in point. Studies have shown that as many as two-thirds of the dollar bills in circulation in America carry traces of this substance, which might thus end up on the fingertips of the innocent, as well as the guilty.

Excerpts from Metabolites and You, Economist, Feb. 15, 2019

Biometrics Run Amok: Your Heartbeat ID, please

Before pulling the trigger, a sniper planning to assassinate an enemy operative must be sure the right person is in the cross-hairs. Western forces commonly use software that compares a suspect’s facial features or gait with those recorded in libraries of biometric data compiled by police and intelligence agencies. Such technology can, however, be foiled by a disguise, head-covering or even an affected limp. For this reason America’s Special Operations Command (SOC), which oversees the units responsible for such operations in the various arms of America’s forces, has long wanted extra ways to confirm a potential target’s identity. Responding to a request from soc, the Combating Terrorism Technical Support Office (CTTSO), an agency of the defence department, has now developed a new tool for the job.

This system, dubbed Jetson, is able to measure, from up to 200 metres away, the minute vibrations induced in clothing by someone’s heartbeat. Since hearts differ in both shape and contraction pattern, the details of heartbeats differ, too. The effect of this on the fabric of garments produces what Ideal Innovations, a firm involved in the Jetson project, calls a “heartprint”—a pattern reckoned sufficiently distinctive to confirm someone’s identity.

To measure heartprints remotely Jetson employs gadgets called laser vibrometers. These work by detecting minute variations in a laser beam that has been reflected off an object of interest. They have been used for decades to study things like bridges, aircraft bodies, warship cannons and wind turbines—searching for otherwise-invisible cracks, air pockets and other dangerous defects in materials. However, only in the past five years or so has laser vibrometry become good enough to distinguish the vibrations induced in fabric by heartprints….

Candice Tresch, a spokeswoman for the cttso…. cannot discuss the process by which heartprint libraries might be built up in the first place. One starting point, presumably, would be to catalogue the heartbeats of detainees in the way that fingerprints and dna samples are now taken routinely.

Excerpts from Personal identificationPeople can now be identified at a distance by their heartbeat, Economist, Jan 23, 2020

A Hypersonic Death: The Race to Develop Hypersonic Weapons

For decades, the U.S. military—and its adversaries—have coveted missiles that travel at hypersonic speed, generally defined as Mach 5 (5 times the speed of sound) or greater . Intercontinental ballistic missiles (ICBMs) meet that definition when they re-enter the atmosphere from space. But because they arc along a predictable ballistic path, like a bullet, they lack the element of surprise. In contrast, hypersonic weapons such as China’s waverider maneuver aerodynamically, enabling them to dodge defenses and keep an adversary guessing about the target.

The US Department of Defense (DOD) is leading a new charge, pouring more than $1 billion annually into hypersonic research. Competition from ambitious programs in China and Russia is a key motivator. Although hype and secrecy muddy the picture, all three nations appear to have made substantial progress in overcoming key obstacles, such as protecting hypersonic craft from savage frictional heating. Russia recently unveiled a weapon called the Kinzhal, said to reach Mach 10 under its own power, and another called Avangard that is boosted by a rocket to an astonishing Mach 27. China showed off a rocket-boosted hypersonic glide vehicle (HGV) of its own, the Dongfeng-17, in a recent military parade. The United States, meanwhile, is testing several hypersonic weapons. “It’s a race to the Moon sort of thing,” says Iain Boyd, an aerospace engineer at the University of Colorado, Boulder. “National pride is at stake.”

China’s military sees hypersonic weapons (as well as cyberwarfare and electromagnetic pulse strikes) as an “assassin’s mace”: a folklore term for a weapon that gives an advantage against a better-armed foe. If tensions were to spike over Taiwan or the South China Sea, for instance, China might be tempted to launch preemptive strikes with conventional hypersonic weapons that could cripple U.S. forces in the Pacific Ocean.For now, maneuverability at hypersonic speeds makes the weapons nearly impossible to shoot down—unstoppable…

At hypersonic speeds,  “You’re flying under extraordinary conditions”—extreme velocities, forces, and temperatures.  At hypersonic  speeds “temperatures start to get high enough to worry about… A vehicle’s survival requires resilient superalloys and ultra–high-temperature ceramics. And perhaps novel coolants…

Other nations are chasing the trio of leaders—or teaming up with them. Australia is collaborating with the United States on a Mach 8 HGV, and India with Russia on a Mach 7 Hypersonic Cruise Missile (HCM). France intends to field an HCM by 2022, and Japan is aiming for an HGV in 2026.

THE United States is largely defenseless against such weapons, at least for now, in part because it can’t track them…To remedy that shortcoming, the Pentagon plans to launch hundreds of small satellites with sensors capable of tracking heat sources an order of magnitude cooler than rocket boosters. The full Hypersonic and Ballistic Tracking Space Sensor network could be up and running by 2030, he adds. (The satellites would also be used to help guide U.S. hypersonic weapons.)  Once you have such sensors, “we can find a way to build the interceptors…Interceptors could destroy a hypersonic vehicle either by colliding with it or by detonating a warhead nearby. But Missile Defense Agency (MDA) is also exploring using directed energy: lasers, neutral particle beams, and microwaves or radio waves.

Richard StoneJan, National pride is at stake.’ Russia, China, United States race to build hypersonic weapons, Science, Jan 10, 2020

Stasi Reborn: Democratizing Internet Censorship

The internet is the “spiritual home” of hundreds of millions of Chinese people. So China’s leader, Xi Jinping, described it in 2016. He said he expected citizens to help keep the place tidy. Many have taken up the challenge. In December 2019 netizens reported 12.2m pieces of “inappropriate” content to the authorities—four times as many as in the same month of 2015. The surge does not indicate that the internet in China is becoming more unruly. Rather, censorship is becoming more bottom-up

Officials have been mobilising people to join the fight in this “drawn-out war”, as a magazine editor called it in a speech in September to Shanghai’s first group of city-appointed volunteer censors. “Internet governance requires that every netizen take part,” an official told the gathering. It was arranged by the city’s cyber-administration during its first “propaganda month” promoting citizen censorship. The 140 people there swore to report any online “disorder”…

 Information-technology rules, which took effect on December 1st, 2019 oblige new subscribers to mobile-phone services not only to prove their identities, as has long been required, but also to have their faces scanned. That, presumably, will make it easier for police to catch the people who post the bad stuff online.

Excerpt from  The Year of the Rat-fink: Online Censorship, Economist, Jan 18, 2020

Algorithms as Weapons –Tracking,Targeting Nuclear Weapons

 
New and unproved technologies—this time computer systems capable of performing superhuman tasks using machine learning and other forms of artificial intelligence (AI)—threaten to destabilise the global “strategic balance”, by seeming to offer ways to launch a knockout blow against a nuclear-armed adversary, without triggering an all-out war.

A report issued in November by America’s National Security Commission on Artificial Intelligence, a body created by Congress and chaired by Eric Schmidt, a former boss of Google, and Robert Work, who was deputy defence secretary from 2014-17, ponders how AI systems may reshape global balances of power, as dramatically as electricity changed warfare and society in the 19th century. Notably, it focuses on the ability of AI to “find the needle in the haystack”, by spotting patterns and anomalies in vast pools of data…In a military context, it may one day find the stealthiest nuclear-armed submarines, wherever they lurk. The commission is blunt. Nuclear deterrence could be undermined if AI-equipped systems succeed in tracking and targeting previously invulnerable military assets. That in turn could increase incentives for states, in a crisis, to launch a devastating pre-emptive strike. China’s rise as an AI power represents the most complex strategic challenge that America faces, the commission adds, because the two rivals’ tech sectors are so entangled by commercial, academic and investment ties.

Some Chinese officials sound gung-ho about AI as a path to prosperity and development, with few qualms about privacy or lost jobs. Still, other Chinese fret about AI that might put winning a war ahead of global stability, like some game-playing doomsday machine. Chinese officials have studied initiatives such as the “Digital Geneva Convention” drafted by Microsoft, a technology giant. This would require states to forswear cyber-attacks on such critical infrastructure as power grids, hospitals and international financial systems.  AI would make it easier to locate and exploit vulnerabilities in these…

One obstacle is physical. Warheads or missile defences can be counted by weapons inspectors. In contrast, rival powers cannot safely show off their most potent algorithms, or even describe AI capabilities in a verifiable way….Westerners worry especially about so-called “black box” algorithms, powerful systems that generate seemingly accurate results but whose reasoning is a mystery even to their designers.

Excerpts from Chaguan: The Digital Divide, Economist, Jan 18, 2019

Assassinations and Top Secret Chemicals: the case of Novichok Nerve Agent

In 2018, one of the Novichok nerve agents was used in an attempt to assassinate a former Russian spy on U.K. soil—spurring the United States and allies to lift the veil of secrecy and mount a drive to outlaw the obscure class of nerve agents, concocted in a Soviet weapons lab during the height of the Cold War. Now, their effort to amend the Chemical Weapons Convention (CWC) is about to pay off.

On 9 October, the Executive Council of the Organisation for the Prohibition of Chemical Weapons (OPCW), the body that administers the treaty, reviewed a revised proposal from Russia that would bring Novichoks under the treaty’s verification regime, along with a class of potential weapons known as carbamates. If the Russian proposal and a similar one from the United States, Canada, and the Netherlands are approved at a treaty review meeting in December 2019.

The newfound glasnost on Novichoks, also known as fourth-generation nerve agents, should spur research on their mechanism of action and on countermeasures and treatments.   Chemical weapons experts had been whispering about Novichoks for decades.   Treaty nations have long resisted adding Novichoks to the CWC’s so-called Schedule 1 list of chemical weapons, which compels signatories to declare and destroy any stockpiles. “People were worried about a Pandora’s box,” fearing such a listing would force them to regulate ingredients of the weapons, Koblentz says. That could hamper the chemical industry and might clue in enemies on how to cook them up. (Who has the agents now is anyone’s guess.) Indeed, the U.S. government for years classified the Novichok agents as top secret. “There was a desire among Western countries to keep the information as limited as possible to avoid proliferation issues,” Koblentz says.

The 2018 assassination attempt against former Russian spy Sergei Skripal in Salisbury, U.K., thrust the Novichok agents into the spotlight. The botched attack gravely sickened Skripal, his daughter Yulia, two police officers who investigated the crime scene, and a couple—Charlie Rowley and Dawn Sturgess—who a few months later happened on a perfume bottle containing the agent. After long hospitalizations, the Skripals, the officers, and Rowley recovered; Sturgess died. The United Kingdom charged two Russian men, reportedly military intelligence officers, as the alleged assailants, and obtained a European warrant for their arrest; they remain at large in Russia.

Excerpts from Richard Stone, Obscure Cold War nerve agents set to be banned, Science, Oct. 25, 2019

How to Engineer Bacteria to Search for Underground Chemical Weapons: DARPA

U.S. military researchers asked in 2019 two companies to develop new kinds of biological sensors that can detect underground disturbances or the presence of buried chemicals or weapons.

Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., are looking to Raytheon BBN Technologies, and Signature Science, for the BioReporters for Subterranean Surveillance program.  This project seeks to use indigenous and engineered organisms to sense changes of interest to military commanders in natural and built environments. Raytheon BBN and Signature Science won separate $1.6 million contracts for the Subterranean Surveillance progam.

The two companies will perform laboratory research and proof-of-concept demonstrations of biological sensing systems in well- controlled field tests that take advantage of recent advances in microbial science and synthetic biology to develop biological sensors, signal transducers, and reporters that can reveal subterranean phenomena at a distance.  Bio Reporters should be able to sense a phenomenon at least one meter below the surface, propagate a signal to the surface within seven days, and be continuously detectable on the surface at a distance of 10 meters over the subsequent seven days.

DARPA researchers want Raytheon BBN and Signature Science experts to take advantage of the extensive biological networks that exist underground to monitor large areas to increase the military’s ability to detect subterranean events without the need for precise coordinates.

Excerpts from John Keller, Researchers eye new biological sensors to to detect underground objects like buried chemicals and weapons, https://www.militaryaerospace.com,  Nov. 6, 2019

In more detail  Signature Science and its partner, the Texas A&M University Center for Phage Technology, aim to leverage modern and synthetic phage biology and the straightforward molecular genetics of the harmless soil bacterium Bacillus subtilis to generate a new platform to recognize and report on specific chemical threats underground. The Spore-Phage Amplified Detection (SPADe) method, potentially extensible to explosives, radiation or physical disturbance sensing, seeks to substantially advance currently used techniques which rely heavily on manual soil testing. 

Cyber-Attacking Nuclear Plants: the 3 000 cyber bugs

In the first half of 2019 , no country endured more cyber-attacks on its Internet of Things—the web of internet-connected devices and infrastructure—than India did. So asserts Subex, an Indian telecommunications firm, which produces regular reports on cyber-security. Between April and June of 2019, it said, recorded cyber-attacks jumped by 22%, with 2,550 unique samples of malware discovered. Some of that malicious code is turning up in hair-raising places.

On October 28, 2019 reports indicated that malware had been found on the computer systems of Kudankulam Nuclear Power Plant in Tamil Nadu, the newest and largest such power station in India. Pukhraj Singh, a cybersecurity researcher who formerly worked for the National Technical Research Organisation (NTRO), India’s signals-intelligence agency, says he was informed of the malware by an undisclosed third party in September, and notified the government.The attackers, he said, had acquired high-level access and struck “extremely mission-critical targets”…. On October 30, 2019 the body that operates nuclear power plants acknowledged, sheepishly, that a computer had indeed been infected, but it was only an “administrative” one.

Sensitive sites such as power plants typically isolate the industrial-control systems (those that control the workings of a plant) from those connected to the wider internet. They do so using air-gaps (which involve disconnecting the system from the wider world), firewalls (which monitor data-flows for suspicious traffic) or data diodes (which allow information to flow out but not in).

But breaching a computer on the outside of these digital moats is nevertheless troubling. It could have given the attackers access to sensitive emails, personnel records and other details which would, in turn, make it easier to gain access to the more isolated operational part of the plant. America and Israel are thought to have sneaked the devastating Stuxnet virus into Iran’s air-gapped uranium-enrichment plant at Natanz around 2007 by planting a USB stick on a worker, who carried it inside and plugged it in.

The culprit behind the Kudankulam attack is unknown, but left some clues. The malware in question is from a family known as DTrack, which gives attackers an intimate look at what victims are doing—down to their keystrokes. It is typically used to monitor a target, making it easier to deliver further malware. DTrack was originally developed by a group of hackers known as the Lazarus Group, who are widely assumed to be controlled or directed by North Korea.

Excerpts from On the DTrack: A cyber-attack on an Indian nuclear plant raises worrying questions, Economist, Nov. 1, 2019

How to Fool your Enemy: Artificial Intelligence in Conflict

The contest between China and America, the world’s two superpowers, has many dimensions… One of the most alarming and least understood is the race towards artificial-intelligence-enabled warfare. Both countries are investing large sums in militarised artificial intelligence  (AI), from autonomous robots to software that gives generals rapid tactical advice in the heat of battle….As Jack Shanahan, a general who is the Pentagon’s point man for AI, put it last month, “What I don’t want to see is a future where our potential adversaries have a fully ai-enabled force and we do not.”

AI-enabled weapons may offer superhuman speed and precision.  In order to gain a military advantage, the temptation for armies will be to allow them not only to recommend decisions but also to give orders. That could have worrying consequences. Able to think faster than humans, an AI-enabled command system might cue up missile strikes on aircraft carriers and airbases at a pace that leaves no time for diplomacy and in ways that are not fully understood by its operators. On top of that, ai systems can be hacked, and tricked with manipulated data.

AI in war might aid surprise attacks or confound them, and the death toll could range from none to millions.  Unlike missile silos, software cannot be spied on from satellites. And whereas warheads can be inspected by enemies without reducing their potency, showing the outside world an algorithm could compromise its effectiveness. The incentive may be for both sides to mislead the other. “Adversaries’ ignorance of AI-developed configurations will become a strategic advantage,” suggests Henry Kissinger, who led America’s cold-war arms-control efforts with the Soviet Union…Amid a confrontation between the world’s two big powers, the temptation will be to cut corners for temporary advantage. 

Excerpts from Mind control: Artificial intelligence and war, Economist,  Sept. 7, 2019

Example of the Use of AI in Warfare: The Real-time Adversarial Intelligence and Decision-making (RAID) program under the auspices of The Defense Advanced Research Projects Agency’s (DARPA) Information Exploitation Office (IXO)  focuses on the challenge of anticipating enemy actions in a military operation. In the US Air Force community, the term, predictive battlespace awareness, refers to capabilities that would help the commander and staff to characterize and predict likely enemy courses of action…Today’s practices of military intelligence and decision-making do include a number of processes specifically aimed at predicting enemy actions. Currently, these processes are largely manual as well as mental, and do not involve any significant use of technical means. Even when computerized wargaming is used (albeit rarely in field conditions), it relies either on human guidance of the simulated enemy units or on simple reactive behaviors of such simulated units; in neither case is there a computerized prediction of intelligent and forward-looking enemy actions….

[The deception reasoning of the adversary is very important in this context.]  Deception reasoning refers to an important aspect of predicting enemy actions: the fact that military operations are historically, crucially dependent on the ability to use various forms of concealment and deception for friendly purposes while detecting and counteracting the enemy’s concealment and deception. Therefore, adversarial reasoning must include deception reasoning.

The RAID Program will develop a real-time adversarial predictive analysis tool that operates as an automated enemy predictor providing a continuously updated picture of probable enemy actions in tactical ground operations. The RAID Program will strive to: prove that adversarial reasoning can be automated; prove that automated adversarial reasoning can include deception….

Excerpts from Real-time Adversarial Intelligence and Decision-making (RAID), US Federal Grants

Dodging the Camera: How to Beat the Surveillance State in its Own Game

Powered by advances in artificial intelligence (AI), face-recognition systems are spreading like knotweed. Facebook, a social network, uses the technology to label people in uploaded photographs. Modern smartphones can be unlocked with it… America’s Department of Homeland Security reckons face recognition will scrutinise 97% of outbound airline passengers by 2023. Networks of face-recognition cameras are part of the police state China has built in Xinjiang, in the country’s far west. And a number of British police forces have tested the technology as a tool of mass surveillance in trials designed to spot criminals on the street.  A backlash, though, is brewing.

Refuseniks can also take matters into their own hands by trying to hide their faces from the cameras or, as has happened recently during protests in Hong Kong, by pointing hand-held lasers at cctv cameras. to dazzle them. Meanwhile, a small but growing group of privacy campaigners and academics are looking at ways to subvert the underlying technology directly…

Laser Pointers Used to Blind CCTV cameras during the Hong Kong Protests 2019

In 2010… an American researcher and artist named Adam Harvey created “cv [computer vision] Dazzle”, a style of make-up designed to fool face recognisers. It uses bright colours, high contrast, graded shading and asymmetric stylings to confound an algorithm’s assumptions about what a face looks like. To a human being, the result is still clearly a face. But a computer—or, at least, the specific algorithm Mr Harvey was aiming at—is baffled….

Modern Make-Up to Hide from CCTV cameras

HyperFace is a newer project of Mr Harvey’s. Where cv Dazzle aims to alter faces, HyperFace aims to hide them among dozens of fakes. It uses blocky, semi-abstract and comparatively innocent-looking patterns that are designed to appeal as strongly as possible to face classifiers. The idea is to disguise the real thing among a sea of false positives. Clothes with the pattern, which features lines and sets of dark spots vaguely reminiscent of mouths and pairs of eyes are available…

Hyperface Clothing for Camouflage

 Even in China, says Mr Harvey, only a fraction of cctv cameras collect pictures sharp enough for face recognition to work. Low-tech approaches can help, too. “Even small things like wearing turtlenecks, wearing sunglasses, looking at your phone [and therefore not at the cameras]—together these have some protective effect”. 

Excerpts from As face-recognition technology spreads, so do ideas for subverting it: Fooling Big Brother,  Economist, Aug. 17, 2019

Who Owns Your Voice? Grabbing Biometric Data

Increasingly sophisticated technology that detects nuances in sound inaudible to humans is capturing clues about people’s likely locations, medical conditions and even physical features.Law-enforcement agencies are turning to those clues from the human voice to help sketch the faces of suspects. Banks are using them to catch scammers trying to imitate their customers on the phone, and doctors are using such data to detect the onset of dementia or depression.  That has… raised fresh privacy concerns, as consumers’ biometric data is harnessed in novel ways.

“People have known that voice carries information for centuries,” said Rita Singh, a voice and machine-learning researcher at Carnegie Mellon University who receives funding from the Department of Homeland Security…Ms. Singh measures dozens of voice-quality features—such as raspiness or tremor—that relate to the inside of a person’s vocal tract and how an individual voice is produced. She detects so-called microvolumes of air that help create the sound waves that make up the human voice. The way they resonate in the vocal tract, along with other voice characteristics, provides clues on a person’s skull structure, height, weight and physical surroundings, she said.

Nuance’s voice-biometric and recognition software is designed to detect the gender, age and linguistic background of callers and whether a voice is synthetic or recorded. It helped one bank determine that a single person was responsible for tens of millions of dollars of theft, or 18% of the fraud the firm encountered in a year, said Brett Beranek, general manager of Nuance’s security and biometrics business.

Audio data from customer-service calls is also combined with information on how consumers typically interact with mobile apps and devices, said Howard Edelstein, chairman of behavioral biometric company Biocatch. The company can detect the cadence and pressure of swipes and taps on a smartphone.  How a person holds a smartphone gives clues about their age, for example, allowing a financial firm to compare the age of the normal account user to the age of the caller…

If such data collected by a company were improperly sold or hacked, some fear recovering from identity theft could be even harder because physical features are innate and irreplaceable.

Sarah Krouse, What Your Voice Reveals About You, WSJ, Aug. 13, 2019

Who is Afraid of Shamoon? How to Wipe a Country Off the Face of the Earth

Suspected Iranian hackers infiltrated critical infrastructure and government computers in the Persian Gulf nation of Bahrain in July-August  2019, raising fears among leaders in the region that Tehran is stepping up its cyberattacks amid growing tensions…Hackers broke into the systems of Bahrain’s National Security Agency—the country’s main criminal investigative authority—as well as the Ministry of Interior and the first deputy prime minister’s office, according to one of the people familiar with the matter.

On July 25, 2019 Bahrain authorities identified intrusions into its Electricity and Water Authority. The hackers shut down several systems in what the authorities believed was a test run of Iran’s capability to disrupt the country, the person said. “They had command and control of some of the systems,” the person said.  The breaches appeared broadly similar to two hacks in 2012 that knocked Qatar’s natural-gas firm RasGas offline and wiped data from computer hard drives belonging to Saudi Arabia’s Aramco national oil company, a devastating attack that relied on a powerful virus known as Shamoon.  Bahrain is the smallest country in the Persian Gulf, but it is strategically important because it’s the permanent home of the U.S. Navy’s Fifth Fleet and Navy Central Command. It is closely allied with its much larger neighbor, Saudi Arabia, a regional rival of Iran.

The Bahrain authorities haven’t definitively attributed the attack to Iran, but they have been provided intelligence by the U.S. and others suggesting Iran is behind it, the people familiar with the matter said….“In the first half of 2019, the Information & eGovernment Authority successfully intercepted over 6 million attacks and over 830,000 malicious emails. The attempted attacks did not result in downtime or disruption of government services,” 

Excerpt from High-Level Cyber Intrusions Hit Bahrain Amid Tensions With Iran, WSJ, Aug. 7, 2019

How to Prepare for Deadly Flu and Nuclear Fallout

Breakthroughs in the science of programmable gene expression inspired DARPA to establish the PReemptive Expression of Protective Alleles and Response Elements (PREPARE) program with the goal of delivering powerful new defenses against public health and national security threats. DARPA has now selected five teams to develop a range of new medical interventions that temporarily and reversibly modulate the expression of protective genes to guard against acute threats from influenza and ionizing radiation, which could be encountered naturally, occupationally, or through a national security event.

The program builds from the understanding that the human body has innate defenses against many types of health threats, but that the body does not always activate these defenses quickly or robustly enough to block the worst damage. To augment existing physiological responses, PREPARE technologies would provide a programmable capability to up- or down-regulate gene expression on demand, providing timely, scalable defenses that are proportional to anticipated threats. Service members and first responders could administer these interventions prior to threat exposure or therapeutically after exposure to mitigate the risk of harm or death.

Influenza: “Researchers working within the PREPARE program seek to improve rates of survival and recovery in catastrophic scenarios for which reliable and scalable countermeasures don’t currently exist,” said Dr. Renee Wegrzyn, the PREPARE program manager….Three PREPARE teams are pursuing multi-pronged approaches to influenza defense and treatment that use programmable gene modulators to boost the human body’s natural defenses against influenza and also weaken the virus’ ability to cause harm by directly neutralizing the viral genomes. If successful, their approaches would potentially protect against virtually all influenza strains — regardless of whether a virus is newly emergent or has developed drug resistance — and would provide near instantaneous immunity, in contrast to traditional vaccines. Additionally, the teams are designing their countermeasures so that they are simple to deliver — for example, as intranasal sprays — reducing the logistical challenge of protecting large numbers of people.A team led by DNARx LLC, under principal investigator Dr. Robert Debs, aims to develop a new DNA-encoded gene therapy that helps patients fight influenza by boosting the natural immune response and other protective functions of their nasal passages and lungs.

Radiation Hazard Symbol

Ionizing Gamma Radiation: Other PREPARE teams are pursuing treatments to protect the body from the effects of ionizing gamma radiation. In humans, radiation poisoning primarily affects stem cells in the blood and gut, yet existing treatments only help to regenerate blood cells, and only with limited effect. There is no possibility for prophylactic administration of these drugs, and most must be delivered immediately following radiation exposure to provide any benefit. There are no existing medical countermeasures for radiation damage to the gut
A team led by the University of California, San Francisco, under principal investigator Dr. Jonathan Weissman, also aims to develop gene therapies to enhance resilience against ionizing radiation. The team’s approach should result in an intravenous or orally available treatment that activates innate defenses in gut and blood stem cells for a period of several weeks.

A Dose of Inner Strength to Survive and Recover from Potentially Lethal Health Threats
New tools for programmable modulation of gene expression could yield enhanced resilience against influenza and ionizing radiation for service members and first responders, DARPA Press Release, June 27, 2019

Nuclear Submarines on Fire (2)

Vladimir Putin has confirmed  on July 4, 2019  that the top-secret submarine that suffered a deadly fire was nuclear-powered, but Russia’s defence minister said the nuclear unit had been sealed off and was in “working order.”  The incident, which left 14 Russian sailors dead,  The Russian government has been slow to reveal information about the incident because the submersible, thought to be a deep-diving vessel used for research and reconnaissance, is among Russia’s most secret military projects.  The fire aboard the “Losharik” AS-31 submersible began in the battery compartment and spread through the vessel…The vessel is thought to be made of a series of orb-like compartments, which increase the submersible’s resilience and allow it to dive to the ocean floor. Once there, it can perform topographical research and participate in rescue missions. It may even be able to tap and sever communications cables on the seabed.

Officials claim the submariners sealed themselves in one of the compartments to battle the blaze and toxic fumes…A Norwegian official told Reuters there had been no “formal communication” from Russia about an incident aboard a nuclear-powered vessel, but “we would have been happy to have been informed of such incidents”….Accidents aboard submarines invariably evoke comparisons to Putin’s clumsy handling of the sinking of the Kursk nuclear submarine in 2000, which left 118 dead and families desperate for information about their loved ones.

Excerpt Putin confirms fire-hit Russian submarine was nuclear-powerered, Guardian, July 4, 2019

Black Operations are Getting Blacker: US Military

Heterogeneous Collaborative Unmanned Systems (HCUS), as these drones will be known, would be dropped off by either a manned submarine or one of the navy’s big new Orca robot submersibles.

Logo for Orca Submarine by Lockheed Martin

They could be delivered individually, but will more often be part of a collective system called an encapsulated payload. Such a system will then release small underwater vehicles able to identify ships and submarines by their acoustic signatures, and also aerial drones similar to the BlackWing reconnaissance drones already flown from certain naval vessels.

BlackWing

Once the initial intelligence these drones collect has been analysed, a payload’s operators will be in a position to relay further orders. They could, for example, send aerial drones ashore to drop off solar-powered ground sensors at specified points. These sensors, typically disguised as rocks, will send back the data they collect via drones of the sort that dropped them off. Some will have cameras or microphones, others seismometers which detect the vibrations of ground vehicles, while others still intercept radio traffic or Wi-Fi.

Lockheed Martin Ground Sensor Disguised as Rock

HCUS will also be capable of what are described as “limited offensive effects”. Small drones like BlackWing can be fitted with warheads powerful enough to destroy an SUV or a pickup truck. Such drones are already used to assassinate the leaders of enemy forces. They might be deployed against fuel and ammunition stores, too.

Unmanned systems such as HCUS thus promise greatly to expand the scope of submarine-based spying and special operations. Drones are cheap, expendable and can be deployed with no risk of loss of personnel. They are also “deniable”. Even when a spy drone is captured it is hard to prove where it came from. Teams of robot spies and saboteurs launched from submarines, both manned and unmanned, could thus become an important feature of the black-ops of 21st-century warfare.

Excerpts from Submarine-launched drone platoons will soon be emerging from the sea: Clandestine Warfare, Economist, June 22, 2019

If You Control Space, You Control Everything: Space as War Domain

The North Atlantic Treaty Organization (NATO) is looking to classify space as a domain for warfare in an attempt to deter China’s growing military power.  If NATO’s proposal succeeds, the international alliance could move forward with the development and use of space weapons.  According to NATO diplomats, the international organization is preparing to release an agreement that will officially declare space as a war domain. This means that aside from land, air and sea, space could also be used for military operations during times of war.

Although NATO’s partner countries currently own 65% of the satellites in space, China is reportedly preparing to launch a massive project that involves releasing constellations of satellites in low Earth orbit.  China Aerospace Science and Industry Corp (CASIC)  is planning to put in orbit 150 or more Hongyun satellites by 2023. Some of these satellites will provide commercial services like high-speed internet while others would be controlled by the Chinese military. These militarized satellites can be used to coordinate ground forces and to track approaching missiles.

“You can have warfare exclusively in space, but whoever controls space also controls what happens on land, on the sea and in the air,” according to Jamie Shea, a former NATO official. “If you don’t control space, you don’t control the other domains either.”

Excerpts from Inigo Monzon , NATO Prepares For Space Warfare By Militarizing Low Earth Orbit, International Business Times, June 24, 2019

How Companies Buy Social License: the ExxonMobil Example

The Mobil Foundation sought to use its tax-exempt grants to shape American laws and regulations on issues ranging from the climate crisis to toxic chemicals – with the explicit goal of benefiting Mobil, documents obtained by the Guardian newspaper show.  Recipients of Mobil Foundation grants included Ivy League universities, branches of the National Academies and well-known civic organizations and environmental researchers.  Benefits for Mobil included – in the foundation’s words – funding “a counterpoint to so-called ‘public interest’ groups”, helping Mobil obtain “early access” to scientific research, and offering the oil giant’s executives a forum to “challenge the US Environmental Protection Agency (EPA) behind-the-scenes”….

A third page reveals Mobil Foundation’s efforts to expand its audience inside environmental circles via a grant for the Environmental Law Institute, a half-century-old organization offering environmental law research and education to lawyers and judges.  “Institute publications are widely read in the environmental community and are helpful in communicating industry’s concerns to such organizations,” the entry says. “Mobil Foundation grants will enhance environmental organizations’ views of Mobil, enable us to reach through ELI activities many groups that we do not communicate with, and enable Mobil to participate in their dialogue groups.”

The documents also show Mobil Foundation closely examining the work of individual researchers at dozens of colleges and universities as they made their funding decisions, listing ways that foundation grants would help shape research interests to benefit Mobil, help the company recruit future employees, or help combat environmental and safety regulations that Mobil considered costly.  “It should be a wake-up call for university leaders, because what it says is that fossil fuel funding is not free,” said Geoffrey Supran, a postdoctoral researcher at Harvard and MIT.  “When you take it, you pay with your university’s social license,” Supran said. “You pay by helping facilitate these companies’ political and public relations tactics.”

In some cases, the foundation described how volunteer-staffed not-for-profits had saved Mobil money by doing work that would have otherwise been performed by Mobil’s paid staff, like cleaning birds coated in oil following a Mobil spill.  In 1987, the International Bird Rescue Research Center’s “rapid response and assistance to Mobil’s West Coast pipeline at a spill in Lebec, CA not only defused a potential public relations problem”, Mobil Foundation said, “but saved substantial costs by not requiring our department to fly cross country to respond”.d of trustees at the Woods Hole Oceanographic Institution (recipient of listed donations totalling over $200,000 from Mobil) and a part of UN efforts to study climate change.

Wise ultimately co-authored two UN Intergovernmental Panel on Climate Change reports, serving as a lead author on one. One report chapter Wise co-authored prominently recommended, among other things, burning natural gas (an ExxonMobil product) instead of coal as a way to combat climate change.

Excerpts from How Mobil pushed its oil agenda through ‘charitable giving’, Guardian, June 12, 2019

Your Typing Discloses Who You Are: Behavioral Biometrics

Behavioural biometrics make it possible to identify an individual’s “unique motion fingerprint”,… With the right software, data from a phone’s sensors can reveal details as personal as which part of someone’s foot strikes the pavement first, and how hard; the length of a walker’s stride; the number of strides per minute; and the swing and spring in the walker’s hips and step. It can also work out whether the phone in question is in a handbag, a pocket or held in a hand.

Using these variables, Unifyid, a private company, sorts gaits into about 50,000 distinct types. When coupled with information about a user’s finger pressure and speed on the touchscreen, as well as a device’s regular places of use—as revealed by its gps unit—that user’s identity can be pretty well determined, ction….Behavioural biometrics can, moreover, go beyond verifying a user’s identity. It can also detect circumstances in which it is likely that a fraud is being committed. On a device with a keyboard, for instance, a warning sign is when the typing takes on a staccato style, with a longer-than-usual finger “flight time” between keystrokes. This, according to Aleksander Kijek, head of product at Nethone, a firm in Warsaw that works out behavioural biometrics for companies that sell things online, is an indication that the device has been hijacked and is under the remote control of a computer program rather than a human typist…

Used wisely, behavioural biometrics could be a boon…Used unwisely, however, the system could become yet another electronic spy on people’s privacy, permitting complete strangers to monitor your every action, from the moment you reach for your phone in the morning, to when you fling it on the floor at night.

Excerpts from Behavioural biometrics: Online identification is getting more and more intrusive, Economist, May 23, 2019

Who is Afraid of the United States?

In 2018 America imposed sanctions on about 1,500 people, firms, vessels and other entities, nearly triple the number in 2016. The past six months of 2019 have been particularly eventful. America began imposing sanctions on Iran in November, and in January on Venezuela, another big oil exporter. On May 9th 2019, for the first time, it seized a ship accused of transporting banned North Korean coal.

Second, blackballed countries and unscrupulous middlemen are getting better at evasion. In March 2019advisers to the un, relying in part on Windward data, and American Treasury officials published separate reports that described common ways of doing it. Boats turn off their transmissions systems to avoid detection. Oil is transferred from one ship to another in the middle of the ocean—ships trading on behalf of North Korea find each other in the East China Sea using WeChat, a popular Chinese messaging service. Captains disguise a ship’s identity by manipulating transponder data to transmit false locations and identity numbers of different vessels.

Such methods have helped Iran and Russia transport oil to Syria, American officials say. In 2018 North Korea managed to import refined petroleum far in excess of the level allowed by multilateral sanctions. The situation in Venezuela is different—technically, America’s sanctions still allow foreigners to do business with the country. But fear that sanctions will expand mean that traditional trading partners are scarce. Nicolás Maduro’s regime this month found a shipowner to transport crude to India, according to a shipbroker familiar with the deal, but Venezuela had to pay twice the going rate.

Businesses keen to understand such shenanigans can be roughly divided into two categories. The first includes those who can profit from grasping sanctions’ impact on energy markets, such as hedge funds, analysts and traders. A squadron of firms is ready to assist them, combing through ship transmission data, commercial satellite imagery and other public and semi-public information. They do not specialise in sanctions, but sanctions are boosting demand for their tracking and data-crunching expertise.

A main determinant of Venezuela’s output, for instance, is access to the diluent it needs to blend with its heavy crude. A firm called Clipper Data has noted Russian ships delivering diluent to vessels near Malta, which then transport it to Venezuela. Kpler, a French rival, uses satellite images of shadows on lids of storage tanks to help estimate the volume of oil inside. Using transmissions data, images, port records and more, Kpler produces estimates of Iran’s exports for customers such as the International Energy Agency and Bernstein, a research firm—including a recent uptick in Iranian exports without a specific destination (see chart).

The second category of companies are wary of violating sanctions themselves. They need assistance of a different sort. Latham & Watkins, a firm that advised the chairman of EN+, which controls a Russian aluminium giant, as he successfully removed the company from America’s sanctions list this year, has seen a surge in sanctions-related business. Refinitiv, a data company, offers software which permits clients to screen partners and customers against lists of embargoed entities. Windward uses machine learning to pore over data such as ships’ travel patterns, transmissions gaps (some of which may be legitimate) and name changes to help firms identify suspicious activity. Kharon, founded last year by former United States Treasury officials, offers detailed analysis of anyone or anything on sanctions lists.

HIde and Seek: Sanctions Inc, Economist, May 18, 2019

US v. China: The Slow and Sure Conquest of Internet Infrastructure


A new front has opened in the battle between the U.S. and China over control of global networks that deliver the internet. This one is beneath the ocean. While the U.S. wages a high-profile campaign to exclude China’s Huawei Technologies Co. from next-generation mobile networks over fears of espionage, the company is embedding itself into undersea cable networks that ferry nearly all of the world’s internet data.

About 380 active submarine cables—bundles of fiber-optic lines that travel oceans on the seabed—carry about 95% of intercontinental voice and data traffic, making them critical for the economies and national security of most countries. 

The Huawei Marine’s Undersea Cable Network majority owned by Huawei Technologies, has worked on some 90 projects to build or upgrade submarine cables around the world…US o fficials say the company’s knowledge of and access to undersea cables could allow China to attach devices that divert or monitor data traffic—or, in a conflict, to sever links to entire nations.  Such interference could be done remotely, via Huawei network management software and other equipment at coastal landing stations, where submarine cables join land-based networks, these officials say.

Huawei Marine said in an email that no customer, industry player or government has directly raised security concerns about its products and operations.Joe Kelly, a Huawei spokesman, said the company is privately owned and has never been asked by any government to do anything that would jeopardize its customers or business. “If asked to do so,” he said, “we would refuse.”

The U.S. has sought to block Huawei from its own telecom infrastructure, including undersea cables, since at least 2012. American concerns about subsea links have since deepened—and spread to allies—as China moves to erode U.S. dominance of the world’s internet infrastructure…..Undersea cables are owned mainly by telecom operators and, in recent years, by such content providers as Facebook and Google. Smaller players rent bandwidth.Most users can’t control which cable systems carry their data between continents. A handful of switches typically route traffic along the path considered best, based on available capacity and agreements between cable operators.

In June 2017, Nick Warner, then head of Australia’s Secret Intelligence Service, traveled to the Solomon Islands, a strategically located South Pacific archipelago. His mission, according to people familiar with the visit, was to block a 2016 deal with Huawei Marine to build a 2,500-mile cable connecting Sydney to the Solomons.  Mr. Warner told the Solomons’ prime minister the deal would give China a connection to Australia’s internet grid through a Sydney landing point, creating a cyber risk, these people said. Australia later announced it would finance the cable link and steered the contract to an Australian company.  In another recent clash, the U.S., Australia and Japan tried unsuccessfully in September 2018 to quash an undersea-cable deal between Huawei Marine and Papua New Guinea.

U.S. and allied officials point to China’s record of cyber intrusions, growing Communist Party influence inside Chinese firms and a recent Chinese law requiring companies to assist intelligence operations. Landing stations are more exposed in poorer countries where cyber defenses tend to be weakest, U.S. and allied officials said. And network management systems are generally operated using computer servers at risk of cyber intrusion. Undersea cables are vulnerable, officials said, because large segments lie in international waters, where physical tampering can go undetected. At least one U.S. submarine can hack into seabed cables, defense experts said. In 2013, former National Security Agency contractor Edward Snowden alleged that Britain and the U.S. monitored submarine cable data. The U.S. and its allies now fear such tactics could be used against them. American and British military commanders warned recently that Russian submarines were operating near undersea cables. In 2018, the U.S. sanctioned a Russian company for supplying Russian spies with diving equipment to help tap seabed cables.


The Ionian Sea Submarine Cable Project (Greece) 

China seeks to build a Digital Silk Road, including undersea cables, terrestrial and satellite links, as part of its Belt and Road plan to finance a new global infrastructure network. Chinese government strategy papers on the Digital Silk Road cite the importance of undersea cables, as well as Huawei’s role in them. A research institute attached to China’s Ministry of Industry and Information Technology, in a paper published in September, praised Huawei’s technical prowess in undersea cable transmission and said China was poised to become “one of the world’s most important international submarine cable communication centers within a decade or two.” China’s foreign and technology ministries didn’t respond to requests for comment…

Huawei Marine Networks

Bjarni Thorvardarson, then chief executive of the cable’s Ireland-based operator, said U.S. authorities raised no objections until 2012, when a congressional report declared Huawei Technologies a national security threat. Mr. Thorvardarson wasn’t convinced. “It was camouflaged as a security risk, but it was mostly about a preference for using U.S. technology,” he said. Under pressure, Mr. Thorvardarson dropped Huawei Marine from Project Express in 2013. The older cable network continued to use Huawei equipment.

The company is now the fourth-biggest player in an industry long dominated by U.S.-based SubCom and Finnish-owned Alcatel Submarine Networks. Japan’s NEC Corp is in third place.Huawei Marine is expected to complete 28 cables between 2015 and 2020—nearly a quarter of all those built globally—and it has upgraded many more, according to TeleGeography, a research company.

Excerpts from America’s Undersea Battle With China for Control of the Global Internet Grid , WSJ, Mar. 12, 2019

Who Has the Right to Free Speech? Let Credit Cards Decide The Wikileaks Saga from 2010 to 2019

Visa and Mastercard’s partner company in Iceland, Valitor was found guilty by the Reykjavik District Court for illegally blocking payments to the controversial international nonprofit WikiLeaks – a media outlet that publishes classified documents provided by anonymous sources The case against Valitor began sometime in 2010 when a data hosting company named DataCell was given the responsibility to handle donations sent to WikiLeaks.The year 2010 was a particularly important one for the publishing company as its famous Chelsea Manning leaks made rounds in media houses across the world. However, soon after the leaks, Valitor blocked transactions from Visa card holders in Iceland to WikiLeaks, thus starting a legal tug-of-war that would last for years.

Fast forward to 2019, DataCell has finally won the legal battle against Valitor which has now been ordered to pay approximately $9.85 million to both DataCell and Wikileaks’ publishing firm, Sunshine Press Productions.

Excerpts from Iceland: Debit Card Company Fined $9.85 Million for Blocking WikiLeaks Payment, April 30, 2019

An Affordable and Risk Free Way to Kill: Drones

Armed drones have become ubiquitous in the Middle East, say Aniseh Bassiri Tabrizi and Justin Bronk of the Royal United Services Institute, a British think-tank, in a recent report. America has jealously guarded the export of such aircraft for fear that they might fall out of government hands, be turned on protesters or used against Israel. America has also been constrained by the Missile Technology Control Regime, an arms-control agreement signed by 35 countries, including Russia, that restricts the transfer of particularly capable missiles and drones (both rely on the same underlying technology).

China…has sold missile-toting drones to Egypt, Jordan, Iraq, Saudi Arabia and the United Arab Emirates (UAE). All are American security partners…. Other countries, such as Israel, Turkey and Iran, have filled the gap with their own models.  America wants to muscle its way back into the market. In April 2018 the Trump administration began loosening export rules to let countries buy armed drones directly from defence companies rather than through official channels. Drones with “strike-enabling technology”, such as lasers to guide bombs to their targets, were reclassified as unarmed. American drones are costlier and require more paperwork than Chinese models, but are more capable. ..The flood of drones into the market is already making an impact—sometimes literally. Ms Tabrizi and Mr Bronk say some Middle Eastern customers see drones as an “affordable and risk-free” way to strike across borders… 

Drone Bayraktar made by Turkey

Non-state actors are unwilling to be left out of the party. The jihadists of Islamic State often used drones in Iraq and Syria. Hizbullah used drones when it hit 23 fighters linked to al-Qaeda in Syria in 2014. The Houthi drone that bombed Al-Anad looked a lot like an Iranian model. Last year the Houthis sent a similar one more than 100km (60 miles) into Saudi Arabia before it was shot down. ..

Excerpts from Predator Pricing: Weapon Sales, Economist,  Mar. 9, 2019

The Secret Powers of Saudi Arabia — Murder not Included

In 2016 Muhammad bin Salman, Saudi Arabia’s crown prince and de facto ruler, announced the latest stage of “Saudisation”—the replacement of foreign workers with Saudi ones. It now appears the policy does not stop at swapping out bankers and bakers, but extends to ballistic missiles.  Satellite photos analysed by researchers from the Middlebury Institute of International Studies, and reported by the Washington Post, appear to show that Saudi Arabia has been building a factory for rocket engines, at an existing missile base in al-Watah, south-west of Riyadh. It seems to be configured for solid-fuel rockets, which can be launched more quickly than liquid-fuelled ones….he rocket factory was “designed, equipped and constructed by an outside entity”. Saudi Arabia has “no capacity” for such a project. The facility, he notes, closely resembles a Chinese one in Lantian.

Saudi Arabia is no newcomer to missiles. Having watched Iran and Iraq fling them at each other during the 1980s, it bought a few dozen df-3 missiles from China in 1987. It came close to unleashing them after being struck by Iraqi Scud missiles during the Gulf war in 1991. In the 2000s it probably picked up a batch of newer, more accurate Chinese df-21s.

Iran, the kingdom’s arch-rival, has been honing its missile force despite Western opposition and un rebukes, conducting 135 test launches since 1990. On December 1st, 2018  it tested one thought capable of comfortably reaching any corner of Saudi soil….Nor is Iran the only concern. Hizbullah, a Lebanese militant group nurtured and armed by Iran, has a growing arsenal of missiles; some can already reach the north-western parts of Saudi Arabia. Israel is also armed to the teeth. Though Prince Muhammad is on good terms with the Jewish state, satellite images published in 2013 reportedly showed that one of the Saudi df-3 launching pads at al-Watah was set in the direction of Tel Aviv.

Because missiles are ideal delivery systems for nuclear weapons, news of the plant has also revived worries about Saudi Arabia’s atomic intentions…Without a doubt if Iran developed a nuclear bomb,” warned Prince Muhammad last March, “we will follow suit

So the Saudis may turn to other nuclear friends. Western diplomats and spooks have long been concerned that Pakistan, whose own nuclear programme was bankrolled by Saudi Arabia, might be a ready supplier of know-how, fuel or bombs. In 1999 Saudi Arabia’s then defence minister horrified American officials by touring Pakistan’s nuclear facilities and meeting A.Q. Khan, the scientist who sold nuclear technology to North Korea, Iran and Libya. Ties remain close. Prince Muhammad was due to agree on $14bn of investment in Pakistan during a visit to the country on February 16th.  2019. ….

Excerpts from Protection rocket Saudi Arabia’s missile race, Economist, Feb. 16, 2019

How Iranian Oil Escapes US Sanctions

 At least two tankers have ferried Iranian fuel oil to Asia in February 2019 despite U.S. sanctions against such shipments, according to a Reuters analysis of ship-tracking data and port information, as well as interviews with brokers and traders.  The shipments were loaded onto tankers with documents showing the fuel oil was Iraqi. But three Iraqi oil industry sources and Prakash Vakkayil, a manager at United Arab Emirates (UAE) shipping services firm Yacht International Co, said the papers were forged.  The people said they did not know who forged the documents, nor when.

“Some buyers…will want Iranian oil regardless of U.S. strategic objectives to deny Tehran oil revenue, and Iran will find a way to keep some volumes flowing,” said Peter Kiernan, lead energy analyst at the Economist Intelligence Unit.  While the United States has granted eight countries temporary waivers allowing limited purchases of Iranian crude oil, these exemptions do not cover products refined from crude, including fuel oil, mainly used to power the engines of large ships. Documents forwarded to Reuters by ship owners say a 300,000 tonne-supertanker, the Grace 1, took on fuel oil at Basra, Iraq, between Dec. 10 and 12, 2018. But Basra port loading schedules reviewed by Reuters do not list the Grace 1 as being in port during those dates.  One Iraqi industry source with knowledge of the port’s operations confirmed there were no records of the Grace 1 at Basra during this period. 

Grace 1 oil tanker

Reuters examined data from four ship-tracking information providers – Refinitiv, Kpler, IHS Markit and Vessel Finder – to locate the Grace 1 during that time. All four showed that the Grace 1 had its Automatic Identification System (AIS), or transponder, switched off between Nov. 30 and Dec. 14, 2018, meaning its location could not be tracked.  The Grace 1 then re-appeared in waters near Iran’s port of Bandar Assaluyeh, fully loaded, data showed. The cargo was transferred onto two smaller ships in UAE waters in January, from where one ship delivered fuel oil to Singapore in February 2019.  Shipping documents showed about 284,000 tonnes of fuel oil were transferred in the cargoes tracked by Reuters, worth about $120 million at current prices…

One of those vessels, the 130,000 tonne-capacity Kriti Island, offloaded fuel oil into a storage terminal in Singapore around Feb. 5 to 7. Reuters was unable to determine who purchased the fuel oil for storage in Singapore.  The Kriti Island is managed by Greece’s Avin International SA… Avin International’s Chief Executive Officer George Mylonas told Reuters. Mylonas confirmed the Kriti Island took on fuel oil from the Grace 1.There is no indication that Avin International knowingly shipped Iranian fuel oil. Mylonas said his firm had conducted all necessary due diligence to ensure the cargo’s legitimate origin….

Kriti Island oil tanker

Excerpts from Roslan Khasawneh et al, Exclusive: How Iran fuel oil exports beat U.S. sanctions in tanker odyssey to Asia, Reuters, Mar. 20, 2019

How to Save the Rhino? Torture and Kill Civilians

In national parks across Asia and Africa, the beloved nonprofit WWF  with the cuddly panda logo funds, equips, and works directly with paramilitary forces that have been accused of beating, torturing, sexually assaulting, and murdering scores of people…WWF has provided high-tech enforcement equipment, cash, and weapons to forces implicated in atrocities against indigenous communities…Villagers have been whipped with belts, attacked with machetes, beaten unconscious with bamboo sticks, sexually assaulted, shot, and murdered by WWF-supported anti-poaching units, according to reports and document

 WWF has provided paramilitary forces with salaries, training, and supplies — including knives, night vision binoculars, riot gear, and batons — and funded raids on villages…The charity has operated like a global spymaster, organizing, financing, and running dangerous and secretive networks of informants motivated by “fear” and “revenge,” including within indigenous communities, to provide park officials with intelligence — all while publicly denying working with informants.

The charity funnels large sums of cash to its field offices in the developing world where staff work alongside national governments — including brutal dictatorships — to help maintain and police vast national parks that shelter endangered species. But many parks are magnets for poachers, and WWF expends much of its energy — and money — in a global battle against the organized criminal gangs that prey on the endangered species the charity was founded to protect.  It’s a crusade that WWF refers to in the hardened terms of war. Public statements speak of “boots on the ground,” partnerships with “elite military forces,” the creation of a “Jungle Brigade,” and the deployment of “conservation drones.”  WWF is not alone in its embrace of militarization: Other conservation charities have enlisted in the war on poaching in growing numbers over the past decade, recruiting veterans from the wars in Afghanistan and Iraq to teach forest rangers counterinsurgency techniques

The enemy is real, and dangerous. Poaching is a billion-dollar industry that terrorizes animals and threatens some species’ very existence. Poachers take advantage of regions ravaged by poverty and violence. And the work of forest rangers is indeed perilous: By one 2018 estimate, poachers killed nearly 50 rangers around the world in the previous year. But like any conflict, WWF’s war on poaching has civilian casualties.

Indigenous people living near one park in southeast Cameroon described a litany of horrors incuding dead-of-night break-ins by men wielding machetes, rifle butt bludgeonings, burn torture involving chilis ground into paste, and homes and camps torched to the ground. Their tormentors in these accounts were not poachers, but the park officials who police them. Although governments employ the rangers, they often rely on WWF to bankroll their work.  …Documents reveal WWF’s own staffers on the ground are often deeply entwined with the rangers’ work — coordinating their operations, jointly directing their raids and patrols alongside government officials, and turning a blind eye to their misdeeds.

Iindigenous groups — both small-fry hunters and innocent bystanders — say they suffer at the hands of the rangers.  Nepal’s park officials were given this free rein decades ago, shortly after WWF first arrived in Chitwan in 1967 to launch a rhinoceros conservation project in a lush lowland forest at the foot of the Himalayas. To clear the way, tens of thousands of indigenous people were evicted from their homes and moved to areas outside the park’s boundaries..

The park’s creation radically changed their way of life: Now they must scrape together money to buy tin for their roofs, pay hospital bills, and farm new crops. They also live in fear of the park’s wild animals, which, while rising in number thanks to anti-poaching efforts, have destroyed crops and mauled people to death.  Rhinoceros horns can sell for hundreds of thousands of dollars on the black market. Professional poachers offer a tiny portion to locals who assist them, which can be hard for impoverished residents of villages to turn down.

Chitwan’s forest rangers work alongside over 1,000 soldiers from the park’s army battalion. Nepalese law gives them special power to investigate wildlife-related crimes, make arrests without a warrant, and retain immunity in cases where an officer has “no alternative” but to shoot the offender, even if the suspect dies….. Indigenous groups living near Chitwan have long detailed a host of abuses by these forces. Villagers have reported beatings, torture, sexual assaults, and killings by the park’s guards. They’ve accused park officials of confiscating their firewood and vegetables, and forcing them into unpaid labor.

WWF’s work with violent partners spans the globe. In Central Africa, internal documents show the charity’s close involvement in military-style operations with both a repressive dictatorship and a notoriously fierce army. …The park’s management plan says WWF will help organize raids, known as “coup de poings,” on local villages suspected of harboring poachers. A confidential internal report found that such missions, frequently conducted in the dead of night with the help of police units, were often violent.

Excerpts from WWF Funds Guards Who Have Tortured And Killed People, BuzzFeed News

US Special Forces in Africa: the G-5 Sahel

The number of attacks in Burkina Faso  have increased as al Qaeda- and ISIS-linked groups have established a presence there, attacking remote gendarmerie outposts and expanding their reach from Mali and Niger in attempt to take advantage of what they see as a permissible environment.  The number of violent incidents in Burkina Faso linked to the local affiliates of al Qaeda JNIM* and ISIS (Greater Sahara) rose from 24 in 2017 to 136 in 2018, according to a report by the Africa Center for Strategic Studies. 

 US Special Forces that train the Burkina Faso military told CNN in March 2019 that the US was considering deploying surveillance drones to Burkina Faso in order to help the country better monitor threats…The Burkina Faso, Mali, Niger, Mauritania and Chad, make up the G-5 Sahel, a multinational task force charged with combating transnational terrorists….A Burkinabe officer told CNN on Monday that terror groups had managed to recruit locals in the north of the country by exploiting the economic situation in the region, where many live in povert

**the local branch of al Qaeda, Jama’at Nasr al-Islam wal Muslimin (JNIM), commands over 800 fighters while ISIS in the Greater Sahara has approximately 300 members.

Excerpts from US Forces Train in African Nation Facing Twin Terror Threat, CNN, Mar. 2, 2019

US Military Leaves but CIA Remains: Syria

Is there a way for the United States and its allies to remain in northeastern Syria, even after President Trump pledged in December 2018 to withdraw U.S. military forces there? Officials are struggling to devise such a “workaround” strategy…One possibility, according to U.S. and foreign officials, would be to have paramilitary officers from the Central Intelligence Agency take over the training and advising of the Kurdish-led Syrian Democratic Forces (SDF). Since 2015, those duties have been carried out by U.S. Special Operations forces.  This approach, still in the discussion stage, would allow Trump to claim he is delivering on his pledge to withdraw troops from Syria, without creating a vacuum in the northeast that would be exploited by Turkey, Iran, Russia and the Syrian regime…

This new option, in the language of government lawyers, would mix Title 10 overt military operations and Title 50 covert action. Reduced military activity could continue under Title 10 authority, to provide air cover and logistical support for U.S. and allied troops on the ground, but the SDF’s advisers might be CIA officers. The CIA operatives, like existing Special Forces personnel, wouldn’t be involved directly in ground combat…

A paramilitary advisory force, operating under Title 50, would have some significant disadvantages…. Current U.S. military forces in Syria can deter adversaries because they carry the U.S. flag, literally and figuratively. A paramilitary force wouldn’t have that same deterrent capability, or the ability to deconflict operations with other forces in the area, such as Russia and Turkey. ..

Given the U.S. and European policy muddle, SDF commanders must weigh whether to make their own accommodation with Russia and the Syrian regime. The United Arab Emirates is said to favor such an approach, and some longtime SDF supporters say a deal with the regime would be safer for the Kurds than depending on a fickle United States and a gun-shy Europe.

Excerpts from David Ignatius, How the U.S. might stay in Syria, and leave at the same time, Washington Post, Feb. 16, 2019

The Nine and their Nuclear Weapons

Nine nationst control the roughly 14,200 nuclear weapons in the world… But What makes a good nuclear arsenal?  First, a good nuclear doctrine. Will a country strike first, or only in response?  Second, safety. Are the nukes secure? Does the country participate in nonproliferation treaties?
Third, do the nukes work as intended? Is the arsenal sufficient? Can the nukes survive an initial attack?…Business Insider has weighed these questions with the help of Hans Kristensen, the director of the Nuclear Information Project at the Federation of American Scientists, to rank the world’s nuclear arsenals.

9. North Korea: North Korea fails by virtually every metric used to measure nuclear arsenals… Because Pyongyang can never hope to defeat any of its enemies in conventional fighting, it turned to nukes as a guarantor of its security.  Weapons count: estimated 60. North Korea has a number of short- to intercontinental-range ballistic-missile systems thought to operate off the backs of mobile missile launchers.  One analyst has warned that North Korea’s mobile launchers may simply distract from the real threat of hidden nuclear silos, but no evidence of such silos has ever appeared in US intelligence reports made public.  It’s completely unknown if North Korea keeps its nuclear weapons mated or with the warhead affixed to the missile.

8. Pakistan: Pakistan built nuclear weapons in response to its bitter regional rival, India, testing and proceeding with a relatively simple nuclear mission: deter or defeat India….Pakistan has links to Islamic extremists with connections to global terror networks. Experts have long feared not enough has been done to secure Islamabad’s nukes against these threats.  Additionally, “Pakistan has lowered the threshold for nuclear weapons use,” by building smaller, tactical nuclear weaponsWeapons count: 150.  Pakistan has ballistic missiles with ranges just long enough to hit anywhere in the country of India….The US has specifically given Pakistan permission to modify its F-16 fighters to drop nuclear weapons…Pakistan is thought to keep its nuclear warheads separate from its missiles and delivery systems.

7. India: “India is still a nuclear posture that’s still in vivid development,” Just as Pakistan fears India’s greater strength and numbers, India has come to fear China’s growing and modernizing conventional forces.  But unlike Pakistan, India has sworn off nuclear first strikes and not looked into tactical nuclear weapons. ..But India’s submarine fleet remains a dream at the moment, lowering its overall score.  Weapons count: 140 (stored)  India recently launched its first nuclear-powered submarine..As it stands, the missiles and submarine India has picked out for its underwater nuclear deterrent can’t range China’s vital points or most of Pakistan.

6. Russia: “Russia seems to sort of be driven by a frantic exploitation of different options,”   Weapons count: 6,850 (1,600 deployed; 2,750 stored; 2,500 retired).  Russia has the full nuclear triad with constantly modernized bombers, land-based missiles, and submarines. The triad is a true 24/7/365 force with submarines on deterrence patrols at all times.  Additionally, Russia has a high number of tactical nuclear weapons with shorter-range and smaller-explosive yield…Russia’s Poseidon underwater 100 to 200 megaton nuclear torpedo is the biggest nuclear explosive device ever built…The weapon would essentially set off tidal waves so large and an explosion so radioactive and punishing that continents, not countries, would pay the price for decades.  The US has not found it useful to respond to these doomsday-type devices.  Russia stores its nuclear warheads mated to missiles and ready to fire. Additionally, it has surrounded Moscow with 68 nuclear-tipped missile interceptors meant to protect the city from a US strike.

5. Israel:   “Israel is interesting because it’s a semi-dormant nuclear program, but it’s not dormant,” …Israel’s conventional military, with its top-of-the-line air force and close coordination with the US, easily overpowers its regional foes in traditional fighting.  Instead of reaching for nuclear weapons to threaten a more powerful foe, Israel has a “very relaxed nuclear posture, truly what you could call a last resort posture,”  Weapons count: estimated 80..Truly, nobody knows what weapons Israel has or doesn’t have, and that’s the way they like it.

4. UK:   Weapons count: 215 (120 deployed; 95 stored)  During the Cold War, the UK labored to create its own nuclear weapons and delivery systems, but since the collapse of the Soviet Union, the UK has withdrawn from that posture and essentially become a client of the US.  The UK operates four nuclear submarines that fire can fire 16 Trident missiles made by the US. That’s it. The UK won’t get an “arsenal” page for this reason. The warheads on these patrols are mated to missiles.

3. France:  France has a long history with nuclear weapons, like the UK, but has maintained more independence and control over its stockpile and doctrine.  Weapons count: 300 (290 deployed; 10 stored)..France has four nuclear-powered submarines, one of which stays on a constant deterrence patrol ready to fire mated nuclear missiles.  While it’s not a nuclear weapon outright, outside of the US, only France operates a nuclear-powered aircraft carrier, the Charles de Gaulle.

2. US: Weapons count: 6,450 (1,750 deployed; 2,050 stored; 2,650 retiredd)Today the US’s nuclear arsenal has narrowed down to a triad in constant stages of modernization.  The US operates two nuclear-capable bombers, the B-2 Spirit stealth bomber and the B-52 Stratofortress, originally built in the 1950s and slated to fly for 100 years.  The US operates a fleet of nuclear submarines, which it keeps on constant deterrence patrols.  The US also has nearly 400 intercontinental-range missiles in silos around the country, mostly aimed at Russia’s nuclear weapons for an imagined “mutual destruction” scenario.  Recently, the US has come under intense criticism for President Donald Trump’s proposal to build more smaller or tactical nuclear weapons. Experts say these weapons make nuclear war more likely.  The US has tactical nuclear weapons stored around Europe and Turkey, which, like the bigger strategic weapons, are stored mated.


1. China:   China has just 280 nuclear warheads, and none of them are mated to delivery systems. China flies bombers and sails submarines that it calls nuclear-capable, but none of them have ever actually flown with nuclear weapons.  China’s nuclear doctrine forbids first strikes and centers around the idea that China would survive a nuclear strike, dig its bombs out of deep underground storage, and send a salvo of missiles back in days, months, or years.  This essentially nails the idea of “credible minimum deterrence.” Everyone knows China has nuclear weapons, that they work, and nobody doubts China would use them if it first received a nuclear attack.  China has nuclear-capable submarines and bombers, but they do not ever travel with nuclear weapons on board.  China relies on a growing and modernizing conventional military to assert its will on other countries and virtually never mentions its nuclear arsenal.

Excerpts from Alex Lockie,  We ranked the world’s nuclear arsenals — here’s why China’s came out on top, Business Insider, Jan. 25, 2019

After Khashoggi: the Saudi Missiles

Satellite images suggest that Saudi Arabia has constructed its first known ballistic missile factory, according to weapons experts and image analysts, a development that raises questions about the kingdom’s increasing military and nuclear ambitions under its 33-year-old crown prince.  If operational, the suspected factory at a missile base in al-Watah, southwest of Riyadh, would allow Saudi Arabia to manufacture its own ballistic missiles, fueling fears of an arms race against its regional rival Iran.  Saudi Arabia currently does not possess nuclear weapons, so any missiles produced at the apparent factory are likely to be conventionally armed. But a missile-making facility would be a critical component of any eventual Saudi nuclear weapons program, hypothetically giving the kingdom capability to produce the preferred delivery systems for nuclear warheads.

Two additional missile experts who reviewed the satellite images for The Washington Post… agreed that the high-resolution photographs of the al-Watah site appear to depict a ­rocket-engine production and test facility, probably using solid fuel…The complex…highlights the nation’s intention to make its own advanced missiles after years of seeking to purchase them abroad, at times successfully….

Saudi Arabia has been pursuing a nuclear power-plant deal with the United States that would potentially include allowing it to produce nuclear fuel. The kingdom’s insistence on domestic fuel production has raised worries among U.S. officials that the kingdom wants the atomic power project not only for civil use but also for covert weapon-making purposes. ..

How the Saudis obtained the technological expertise necessary to build the facility is unclear. One potential supplier: China…China has sold ballistic missiles to Saudi Arabia in the past and has helped supply ballistic missile production capabilities to other nations. In the 1990s, Pakistan secretly built a plant for medium-range missiles using blueprints and equipment supplied by China. The factory in Pakistan has long drawn the attention of top Saudi officials. ..

The main way the United States seeks to prevent the spread of drone and missile technology is through the Missile Technology Control Regime, or the MTCR, an informal multicountry pact designed to prevent the transfer of certain missile technologies. China is not a member but has agreed to abide by some of its stipulations.   While the United States sells an array of weaponry to Saudi Arabia, Washington has not sold ballistic missiles to Riyadh, in part because such missiles traditionally have been seen as destabilizing for the region. Saudi Arabia has turned to China in the past when met with refusals from the United States for certain weapons requests.

For example, the United States declined repeated Saudi requests to purchase what are known as category-one American drones, including Predators and Reapers, partly because of MTCR’s regulations. Instead, the kingdom turned to China, first purchasing drones and later striking a deal in which China will build a drone factory that will produce a Chinese copycat of the Predator in Saudi Arabia.

Excerpts Paul Sonne, Can Saudi Arabia produce ballistic missiles? Satellite imagery raises suspicions, Washington Post, Jan. 22, 2019

HyperSonic Gliders: Arms Race at the Speed of Sound

Hypersonics are like missiles that travel at over five times the speed of sound, but are able to manoeuvre in mid-flight, making them much harder to track and intercept than traditional projectiles.  France is the fourth of the five permanent UN Security Council members to join the so-called “stealth by speed” contest, after China, Russia and the United States.  “We have decided to issue a contract for a hypersonic glider”–V-MaX (Experimental Manoeuvering Vehicle)–that can travel at over 6,000 kilometres per hour, Defence Minister Florence Parly said last week, promising a test flight by the end of 2021.

In March 2018, Russian President Vladimir Putin stunned Western military analysts – and many in Russia – by unveiling plans for a new arsenal of hypersonic weapons which he said would render missile defence systems obsolete….A few months later US President Donald Trump threatened to walk away from a key arms control treaty with Moscow.

Hypersonic gliders would be carried to the end of the earth’s atmosphere by a launch vehicle and would then “glide” back to a target on the ground. “The goal is high-speed manoeuvrability. That’s how it differs from a ballistic trajectory,” the French government’s defence procurement and technology agency (DGA) said.  “Once the initial speed is reached, we can play with speed and altitude to move up and down, to the left and to the right, creating a trajectory that is more difficult to intercept,” it said…

In December 2018, the Kremlin touted the capabilities of its new hypersonic glider, aptly named “Avanguard”.  The Kremlin said that in tests, the intercontinental projectile reached 27 times the speed of sound – 33,000 kilometres per hour, or Mach 27.  “At this speed, not a single intercepter missile can shoot it down,” Deputy Prime Minister Yury Borisov boasted.  China has also reportedly carried out several successful tests since 2014 of a glider that can reach speeds of between Mach 5 and Mach 10.

Excerpts from Race for ‘hypersonic’ weapons heats up as France joins fray, Agence France Presse, Jan. 29, 2019

Shut-out, Cut-off and Suicidal: Aliens v. America

The United States leads the world in punishing corruption, money-laundering and sanctions violations. In the past decade it has increasingly punished foreign firms for misconduct that happens outside America. Scores of banks have paid tens of billions of dollars in fines. In the past 12 months several multinationals, including Glencore and ZTE, have been put through the legal wringer. The diplomatic row over Huawei, a Chinese telecoms-equipment firm, centres on the legitimacy of America’s extraterritorial reach.

America has taken it upon itself to become the business world’s policeman, judge and jury. It can do this because of its privileged role in the world economy. Companies that refuse to yield to its global jurisdiction can find themselves shut out of its giant domestic market, or cut off from using the dollar payments system and by extension from using mainstream banks. For most big companies that would be suicidal.

But as the full extent of extraterritorial legal activity has become clearer, so have three glaring problems.  First, the process is disturbingly improvised and opaque. Cases rarely go to court and, when they are settled instead, executives are hit with gagging orders. Facing little scrutiny, prosecutors have applied ever more expansive interpretations of what counts as the sort of link to America that makes an alleged crime punishable there; indirect contact with foreign banks with branches in America, or using Gmail, now seems to be enough. Imagine if China fined Amazon $5bn and jailed its executives for conducting business in Africa that did not break American law, but did offend Chinese rules and was discussed on WeChat.

Second, the punishments can be disproportionate. In 2014 bnp Paribas, a French bank, was hit with a sanctions-related fine of $8.9bn, enough to threaten its stability. In April ZTE, a Chinese tech firm with 80,000 employees, was banned by the Trump administration from dealing with American firms; it almost went out of business. The ban has since been reversed, underlining the impression that the rules are being applied on the hoof.

Third, America’s legal actions can often become intertwined with its commercial interests. As our investigation this week explains, a protracted bribery probe into Alstom, a French champion, helped push it into the arms of General Electric, an American industrial icon. American banks have picked up business from European rivals left punch-drunk by fines. Sometimes American firms are in the line of fire—Goldman Sachs is being investigated by the doj for its role in the 1mdb scandal in Malaysia. But many foreign executives suspect that American firms get special treatment and are wilier about navigating the rules.

America has much to be proud of as a corruption-fighter. But, for its own good as well as that of others, it needs to find an approach that is more transparent, more proportionate and more respectful of borders. If it does not, its escalating use of extraterritorial legal actions will ultimately backfire. It will discourage foreign firms from tapping American capital markets. It will encourage China and Europe to promote their currencies as rivals to the dollar and to develop global payments systems that bypass Uncle Sam…. Far from expressing geopolitical might, America’s legal overreach would then end up diminishing American power.

Excerpts from Tackling Corruption: Judge Dread, Economist, Jan. 19, 2019

The Space Rat Race

India, Japan and other space-faring countries are waking up to a harsh reality: Earth’s orbit is becoming a more dangerous place as the U.S., China and Russia compete for control of the final frontier…New Delhi is nervous because China has made no secret of its desire for influence in the Indian Ocean. China set up a naval base in Djibouti, a gateway to the ocean at the Horn of Africa. It secured a 99-year lease to the port of Hambantota in Sri Lanka. It is deeply involved in development projects in Maldives.

India has established itself as a player in the budget satellite business. It even put a probe into orbit around Mars in 2014, in a U.S.-assisted project that cost just $76 million. But it is scurrying to enhance its ability to monitor China’s activities, and the partnership with Japan is part of this.  Another sign that space is becoming a defense focus for India came on Dec. 19, when the country launched its third military communications satellite, the GSAT-7A. The satellite will connect with ground-based radar, bases and military aircraft, along with drone control networks.

China’s success in landing a craft on the far side of the moon on Jan. 3, 2019 came as a fresh reminder of its growing prowess. In late December, China also achieved global coverage with its BeiDou Navigation Satellite System. Only the U.S., Russia and the European Union had that capability.China aims to launch a Mars explorer in 2020 and complete its own Earth-orbiting space station around 2022.  In the back of Indian and Japanese officials’ minds is likely a stunning test China conducted in 2007. Beijing successfully destroyed one of its own weather satellites with a weapon, becoming only the third nation to pull off such a feat, after the Soviet Union and the U.S.

In December 2018, President Donald Trump ordered the Department of Defense to create a Space Command, widely seen as a precursor to a full-fledged Space Force.  There were 1,957 active satellites orbiting Earth as of Nov. 30, 2018 according to the Union of Concerned Scientists, a nonprofit U.S. advocacy group. America had the most by far, with 849, or 43% of the total. China was No. 2, with 284, followed by Russia with 152.  Japan and India had a combined 132 — 75 for the former and 57 for the latter.

Excerpts fromNUPUR SHAW India and Japan awaken to risks of superpower space race, Nikkei Asian Review, Jan. 8, 2019

Devil’s Idea for Tokyo’s End: Fukushima

By late March 2011… after tsunami struck the Fukushima Daiichi plant—it was far from obvious that the accident was under control and the worst was over. Chief Cabinet Secretary Yukio Edano feared that radioactive material releases from the Fukushima Daiichi plant and its sister plant (Fukushima Daini) located some 12 km south could threaten the entire population of eastern Japan: “That was the devil’s scenario that was on my mind. Common sense dictated that, if that came to pass, then it was the end of Tokyo.”

Prime Minister Naoto Kan asked Dr. Shunsuke Kondo, then-chairman of the Japanese Atomic Energy Commission, to prepare a report on worst-case scenarios from the accidenta .  Dr. Kondo led a 3-day study involving other Japanese experts and submitted his report (Kondo, 2011) to the prime minister on March 25, 2011. The existence of the report was initially kept secret because of the frightening nature of the scenarios it described. An article in the Japan Times quoted a senior government official as saying, “The content [of the report] was so shocking that we decided to treat it as if it didn’t exist.” …

One of the scenarios involved a self-sustaining zirconium cladding fire in the Unit 4 spent fuel pool. Radioactive material releases from the fire were estimated to cause extensive contamination of a 50- to 70-km region around the Fukushima Daiichi plant with hotspots significant enough to require evacuations up to 110 km from the plant. Voluntary evacuations were envisioned out to 200 km because of elevated dose levels. If release from other spent fuel pools occurred, then contamination could extend as far as Tokyo,…There was particular concern that the zirconium cladding fire could produce enough heat to melt the stored fuel, allowing it to flow to the bottom of the pool, melt through the pool liner and concrete bottom, and flow into the reactor building.

Lessons Learned from the Fukushima Daiichi Accident for Spent Fuel Storage: The U.S. nuclear industry and its regulator should give additional attention to improving the ability of plant operators to measure real-time conditions in spent fuel pools and maintain adequate cooling of stored spent fuel during severe accidents and terrorist attacks. These improvements should include hardened and redundant physical surveillance systems (e.g., cameras), radiation monitors, pool temperature monitors, pool water-level monitors, and means to deliver pool makeup water or sprays even when physical access to the pools is limited by facility damage or high radiation levels….

[At nuclear power plants there must be…adequate separation of plant safety and  security systems so that security systems can continue to function independently if safety systems are damaged. In particular, security systems need to have independent, redundant, and protected power sources…]

Excerpts from Lessons Learned from the Fukushima Accident for Improving
Safety and Security of U.S. Nuclear Plants: Phase 2, US National Academies, 2016

Killing Machines: Tiny Spy Satellites

As long as we’ve been launching spy satellites into space, we’ve been trying to find ways to hide them from the enemy. Now, thanks to the small satellite revolution—and a growing amount of space junk—America has a new way to mask its spying in orbit…

The National Reconnaissance Office, the operator of many of the U.S.’s spy sats, refused to answer any questions about ways to hide small satellites in orbit.  In 2014, Russia launched a trio of communications satellites. Like any other launch, spent stages and space debris were left behind in space. Air Force Space Command dutifully catalogued them, including a nondescript piece of debris called Object 2014-28E.  Nondescript until it started to move around in space, that is. One thing about orbits; they are supposed to be predictable. When something moves in an unexpected way, the debris is not debris but a spacecraft. And this object was flying close to the spent stages, maneuvering to get closer.  This fueled speculation that the object could be a prototype kamikaze-style sat killer. Other less frantic speculation postulated that it could be used to examine other sats in orbit, either Russia’s or those operated by geopolitical foes. Either way, the lesson was learned…

Modern tracking radar is supposed to map space junk better than ever before. But small spy satellites that will hide in the cloud of space debris may go undetected, even by the most sophisticated new radar or Earth-based electronic signals snooping.

Excerpts from Joe Pappalardo, Space Junk Could Provide a Perfect Hiding Spot for Tiny Spy Satellites, Popular Mechanics, Nov. 30, 2018

Killing US Enemies: Covert Operations

The U.S. has some of the best special operations units in the world, but they can’t do everything on their own. The American military relies on allied special operators from places like Britain, Iraq, and Israel to collect intelligence and kill enemy insurgents and soldiers. Here are 6 of those special operations commands.

1. SAS and SBS (UK)
These could obviously be two separate entries, but we’re combining them here because they’re both British units that often operate side-by-side with U.S. forces, just with different missions and pedigrees. The Special Air Service (SAS) pulls from the British Army and focuses on counter-terrorism and reconnaissance. The Special Boat Service (SBS) does maritime counter-terrorism and amphibious warfare (but will absolutely stack bodies on land, too).

2. Sayeret Matkal (Israel)
Israel’s Sayeret Matkal has generated rumors and conjecture for decades, and it’s easy to see why when you look at their few public successes…. The commandos in the unit are skilled in deception, direct action, and intelligence gathering…One of their most public recent successes came when they led a daring mission to install listening devices in ISIS buildings, learning of a plan to hide bombs in the battery wells of laptops.

3. French Special Operations Command
French special operations units are even more close-mouthed than the overall specops community…

4. Kommando Spezialkräfte (Germany)
The commandos have reportedly deployed to Syria in recent years to fight ISIS.

5. Iraqi Counter Terrorism Service

6. Afghan National Army Commando Corps
It’s even capable of the rapid nighttime raids that U.S. forces became famous for when they were in the lead in that country…Afghanistan also has the Ktah Khas, a counter-terrorism unit known for daring raids like their 2016 rescue of 59 prisoners in a Taliban hideout.

Logan Nye, We Are The Mighty: 6 foreign special operations units the US relies on to collect intelligence and kill enemy insurgents, Business Insider, Nov. 30, 2018

 

Undersea Drones: Military

Currently, manipulation operations on the seabed are conducted by Remotely Operated Vehicles (ROVs) tethered to a manned surface platform and tele-operated by a human pilot. Exclusive use of ROVs, tethered to manned ships and their operators, severely limits the potential utility of robots in the marine domain, due to the limitations of ROV tether length and the impracticality of wireless communications at the bandwidths necessary to tele-operate an underwater vehicle at such distances and depths. To address these limitations, the Angler program will develop and demonstrate an underwater robotic system capable of physically manipulating objects on the sea floor for long-duration missions in restricted environments, while deprived of both GPS and human intervention

The Angler program seeks to migrate advancements from terrestrial and space-based robotics, terrestrial autonomous manipulation, and underwater sensing technologies into the realm of undersea manipulation, with specific focus on long-distance, seabed-based missions. Specifically, the program aims to discover innovative autonomous robotic solutions capable of navigating unstructured ocean depths, surveying expansive underwater regions, and physically manipulating manmade objects of interest.

Excerpts DARPA Angle Program Nov. 2018

Under Greenland’s Ice: Nuclear Waste

In 1959 the U.S. Army Corps of Engineers built Camp Century beneath the surface of the northwestern Greenland Ice Sheet. There they studied the feasibility of deploying ballistic missiles within the ice sheet. The base and its wastes were abandoned with minimal decommissioning in 1967, under the assumption they would be preserved for eternity by perpetually accumulating snowfall.

In 2016 scientists showed that global warming could release the radioactive waste stored in the ice if Greenland’s ice continues to melt…

The general existence of Camp Century was understood by both the Danish and U.S. governments, which together signed the 1951 Defense of Greenland Agreement under the auspices of the North Atlantic Treaty Organization (NATO)….Reports, for example, suggest Danish permission for the operational disposal of radiological waste in the ice sheet. However, it is unclear whether Denmark was sufficiently consulted regarding the specific decommissioning of Camp Century, and thus whether the abandoned wastes there remain U.S. property. Article XI of the 1951 treaty states that “All property provided by the Government of the United States of America and located in Greenland shall remain the property of the Government of the United States of America. … [it] may be removed from Greenland free of any restriction, or disposed of in Greenland by the Government of the United States of America after consultation with the Danish authorities…”

Given the multinational origin and multigenerational legacy of Camp Century, there appears to be substantial ambiguity surrounding the political and legal liability associated with mitigating the potential remobilization of its pollutants. Interests likely differ across NATO members, particularly Denmark, the U.S. and Canada, partly because of their distinct levels of historical participation and their future potential for pollutant exposure.

Excerpts from  William Colgan et al, The abandoned ice sheet base at Camp Century, Greenland, in a warming climate, , Aug. 4, 2016

Overly Militarized Military: United States

Gray zone security challenges…that fall between the traditional war and peace duality, are characterized by ambiguity about the nature of the conflict, opacity of the parties involved, or uncertainty about the relevant policy and legal frameworks….

The U.S. already possesses the right mix of tools to prevail in the gray zone, but it must think, organize and act differently. Gray zone challenges are not new. Monikers such as irregular warfare, low-intensity conflict, asymmetric warfare, military operations other than war and small wars were employed to describe this phenomenon in the past. …

America spends roughly $600 billion every year on defense, and it is the dominant global power by every objective measure. Yet state and non-state actors (e.g., Russia and Daesh) are increasingly undeterred from acting in ways inimical to the global common good.
State actors like Russia and China reasonably believe we will not use nuclear or conventional military force to thwart their ambitions if they craft their aggressive actions to avoid clear-cut military triggers. Despite their inherent ambiguity, the United States should not be  frustrated by gray zone challenges. Rather, we should aim to achieve favorable outcomes by taking some practical steps to improve our ability to address them.

Our responses to gray zone challenges display several clear deficiencies. As separate U.S. government agencies strive to achieve their individual organizational goals, they seldom act in integrated ways to support wider government objectives….We also need to grow our non-military capabilities. Our gray zone actions are often overly militarized because the Department of Defense has the most capability and resources, and thus is often the default U.S. government answer…. Our counter-Daesh campaign is a perfect example. Thousands of airstrikes helped to check their rapid expansion, but the decisive effort against them will require discrediting their narrative and connecting the people to legitimate governing structures — areas where DoD should not have primacy.

Root Causes: Prudent strategies recognize root causes and address them. Daesh, for example, is merely symptomatic of the much larger problems of massive populations of disaffected Sunnis estranged from legitimate governance and a breakdown in the social order across much of Africa and the Middle East, which will worsen in coming years by economic and demographic trends. Daesh is also a prime example of gray zone challenges, since the legal and policy framework of how to attack a proto-state is highly ambiguous. Coalition aircraft started bombing Daesh in August of 2014, although the authorization for use of military force is still under debate a year later, highlighting the confusion on how to proceed.

[Develop and Nurture Surrogates to Fight China]

For example, China is both antagonistically asserting its questionable claims to specific islands  and atolls in the South China Sea while simultaneously expanding its import of raw materials from Africa. Instead of confronting China in the South China Sea directly, surrogates could, theoretically, be used to hold China’s African interests at risk in order to compel a more  favorable outcome of South China Sea disputes. Thus, the point of action (e.g., Africa) might be far removed from the point of effect (e.g., Asia), but the intent would be to alter the decision-making calculus regardless of geography. To be credible, such an approach requires  prep work every bit as important as the infrastructure behind our nuclear and conventional capabilities. Capable and trustworthy surrogates are the result of years of purposeful relationship nurturing,and the vast majority of the work should take place pre-crisis….

Changing our vocabulary could help yield better decisions in the gray zone. Adopting a business vocabulary and a “SWOT” model (strength, weakness, opportunity and threat) would open other opportunities not available in military decision-making models. Similar to the way businesses decide how to allocate capital, we would necessarily distinguish between opportunities and threats and have at least an estimate of our expected return on investment. Talking and thinking differently about national security in the gray zone would help us measure the oft-ignored opportunity costs and come up with some metric, however imperfect initially, to measure our expected return on investment for defense dollars.

Cost should be a significant up front consideration. For example, we famously refused to provide a cost estimate for Operation Iraqi Freedom, other than to know that $200 billion was ar too high. Assuming we established $200 billion as the top end to “invest” in
Iraq, it would at least force us to review our actions and evaluate our return on investment as we blew through initial estimates on our way to spending in excess of $2 trillion.

Excerpts from the Gray Zone, Special Warfare, Oct-Dec. 2015, Volume 28, Issue 4

New Cold War over the Pacific

Australia said it would establish a development fund and offer Pacific island nations more than $2 billion for infrastructure projects while bolstering military cooperation, as U.S. allies take a more assertive stance against China in the region. Also Thursday, Australia said it would open new diplomatic posts across the Pacific, while New Zealand announced new funding to boost cultural engagement with small Pacific states.

The U.S. and its allies are increasingly coordinating to counter what officials in Washington and elsewhere see as Beijing’s attempts to gain influence over smaller nations through infrastructure loans under its Belt and Road initiative. Last month President Trump signed the Build Act, which expands American development financing for private companies to up to $60 billion….

Beijing, which says its goal is to help Pacific countries achieve peace, stability and prosperity, has urged other countries to “discard the Cold War mentality” and view its relations with Pacific states in an objective way.But old Western allies are concerned about its intentions toward impoverished island nations whose strategic value outstrips their size and wealth.  The U.K. recently announced three new diplomatic posts in the Pacific, while France gained a de facto seat in a key regional group—the Pacific Islands Forum—when its Pacific territories joined…

In September 2018, a senior U.S. official said the U.S., along with Japan and Australia, is vying to build an internet network in Papua New Guinea to block a Chinese telecom company.

Exceprts from U.S. Allies Vie With China to Make Pacific Island Friends, WSJ, Nov. 8, 2018 Continue reading

Skip Pakistan: new way into Afghanistan

A port being developed in the southern Iranian city of Chabahar underscores some of the dilemmas U.S. policy makers face in implementing sanctions against Tehran.  Strategically located on the Gulf of Oman and named for an Iranian revolutionary war hero, the Shahid Beheshti Port is exactly the sort of Iranian economic development the Trump administration wants to stop with sanctions that kick in on Nov. 5, 2018…

Once completed, the port—a small part of which started initial operations in December—could help Iran by strengthening economic ties with South and Central Asia, providing an export point for its oil beyond the Persian Gulf and functioning as a strategic military asset.   But it could also be a critical economic lifeline for Afghanistan, where the U.S. has tried for 16 years to strengthen and stabilize the government so thousands of U.S. troops can come home.

The port also could be a big boon to India, an increasingly close partner of the U.S. in Asia. India wants Chabahar port activities exempted from sanctions. Indian companies are mostly equipping and operating the facility. If the port is completed, they are expected to be among the biggest users of the port in order to participate in the reconstruction of Afghanistan—something the Trump administration has asked India to get more involved in—and establish a stronger economic presence in Central Asia.

The Chabahar port has long been seen as a potential way around Pakistan, a sworn enemy of India that believes holding sway over Afghanistan is critical to its own security.  Pakistan has squelched trade between India and Afghanistan across its territory. It wants Afghanistan to eventually transport goods through a competing Pakistani port on the Gulf of Oman that is being developed with China…

“If you stop Chabahar, you make Afghanistan permanently dependent on Pakistan,” said Barnett Rubin, a New York University expert on South Asia who has advised Western governments on policy in Afghanistan and the surrounding region.

Exceprts from Iranian Port Project Poses a Dilemma for U.S., WSJ, Oct. 29, 2018

Insect Biogeneering as a Biological Weapon: DARPA

According to Science Magazine, Agricultural genetic technologies typically achieve their agronomic aims by introducing laboratory-generated modifications into target species’ chromosomes. However, the speed and flexibility of this approach are limited, because modified chromosomes must be vertically inherited from one generation to the next. In an effort to remove this limitation, an ongoing research program funded by the U.S. Defense Advanced Research Projects Agency (DARPA) aims to disperse infectious genetically modified viruses that have been engineered to edit crop chromosomes directly in fields [through insects]. This is genetic engineering through horizontal transfer, as opposed to vertical inheritance. The regulatory, biological, economic, and societal implications of dispersing such horizontal environmental genetic alteration agents (HEGAAs)[eg leafhoppers, whiteflies and aphids) into ecosystems are profound. Further, this program stipulates that the means of delivery of these viral HEGAAs into the environment should be insect-based dispersion (Insect Allies Program). In the context of the stated aims of the DARPA program, it is our opinion that the knowledge to be gained from this program appears very limited in its capacity to enhance U.S. agriculture or respond to national emergencies (in either the short or long term). Furthermore, there has been an absence of adequate discussion regarding the major practical and regulatory impediments toward realizing the projected agricultural benefits. As a result, the program may be widely perceived as an effort to develop biological agents for hostile purposes and their means of delivery, which—if true—would constitute a breach of the Biological Weapons Convention (BWC).

How to Swarm your Enemy

Swarming is…a deliberately structured, coordinated, strategic way to strike from all directions, by means of a sustainable pulsing of force and/or fire, close-in as well as from stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units (what we call “pods” organized in “clusters”). Developing a swarming force implies, among other things, radical changes in current military organizational structures. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” …

Swarming could become the catalyst for the creation of a newly energized military doctrine:“BattleSwarm.” One requirement—well-informed, deadly small units—is already coming into being…

Technological hurdles also loom large on the path to BattleSwarm. First, aside from the
challenge of assuring the internetting of communications among myriad units, it is
imperative that communications also be hardened and made redundant. An enemy who
knows that information operations lie at the enabling core of swarming will surely strike
at them—and we must prepare to parry such blows in advance. It may also be possible
to safeguard a swarm force’s information flows by means of decoys and deception.
Indeed, the use of false or enhanced signals and traffic may prove to have offensive, in
addition to defensive, utility.

Swarming and the Future of Conflict (Rand pfd)

DARPA’s OFFensive Swarm-Enabled Tactics (OFFSET) program envisions future small-unit infantry forces using swarms comprising upwards of 250 small unmanned aircraft systems (UASs) and/or small unmanned ground systems (UGSs) to accomplish diverse missions in complex urban environments. By leveraging and combining emerging technologies in swarm autonomy and human-swarm teaming, the program seeks to enable rapid development and deployment of breakthrough capabilities.

Shedding Nuclear Weapons: the uphill battle

At the June 2018 Singapore Summit, North Korea agreed to the goal of “complete denuclearization” in exchange for “security guarantees” by the United States, including an end to enmity … The two sides seem to have settled on the phrase “complete denuclearization.” For the purposes of this analysis, this is taken to include the key nuclear weapon–related obligations agreed on in the 1992 Joint Declaration of South and North Korea on the Denuclearization of the Korean Peninsula, namely to “not test, manufacture, produce, receive, possess, store, deploy or use nuclear weapons” and that these commitments would be verified.

In March 2018, North Korea announced a moratorium on nuclear weapons and ballistic missile testing. …Moving forward, eliminating North Korea’s nuclear weapons program and related facilities will need a freeze on current weapon-related activities; an agreed baseline of current stockpiles of nuclear weapons, fissile materials, ballistic missiles, and key components; and verified reductions of these stockpiles and downsizing of North Korea’s weapons complex….We assume that a new framework agreement would contain provisions similar to those in some other arms-control agreements, under which the parties agree not to interfere with specified remote-monitoring techniques or use concealment measures intended to obstruct verification.

Since North Korea’s withdrawal from the Nuclear Non-Proliferation Treaty (NPT) in 2003, there have been essentially no international inspection efforts in North Korea. At the same time, North Korea has expanded the scale and complexity of its nuclear weapons program. On the basis of information available via open sources, it is not clear how many nuclear weapons North Korea possesses today, of what kind (including possibly thermonuclear weapons), and whether they use plutonium or highly enriched uranium (HEU) or both as fissile material. Nor is there reliable information on its ballistic missile capabilities. To establish a basis for moving forward, North Korea could add to its freeze on nuclear weapon and ballistic missile tests a freeze on fissile material production. This can be verified primarily through agreed-on nonintrusive provisions.

In the case of plutonium, satellite imagery can be sufficient to confirm the operational status of reactors in North Korea. Imagery can be used to observe heat signatures, vapor plumes, cooling water discharges, and other activities near the reactor . All these indicators would provide good evidence for a suspension of plutonium production at Yongbyon nuclear reactor in North Korea. Regional krypton-85 monitoring, ideally with a small number of detectors placed around the Yongbyon site, could confirm that remaining spent fuel is not reprocessed . There are also simple measures to permanently disable the Yongbyon reactor—for example, by blowing boron dust through the core’s cooling channels—but North Korea may not agree to such actions until the later stages of the denuclearization process.

The situation with regard to uranium enrichment is more difficult. It may be possible to confirm remotely the shutdown status of the Yongbyon enrichment plant and a possible second plant suspected to be at Kangson—for example, by monitoring vehicle traffic, including shipments of uranium hexafluoride (UF6) cylinders entering and leaving the sites, or by monitoring signatures related to electricity supply.

Rather than shut them down, North Korea may prefer to use its enrichment plants for production of low-enriched uranium for its experimental light-water reactor (30 MW-electric). If this or other civilian reactors are allowed to operate, then International Atomic Energy Agency (IAEA) safeguards could be applied to these plants as well as to the feed and product materials associated with them, as happens with civilian uranium enrichment plants in all non-nuclear weapon states and also in some nuclear weapon states. In this case, verification could include unattended measurement systems confirming the nonproduction of HEU, but it would also include onsite inspections. Even if North Korea ended all nuclear activities, IAEA safeguards would still be required to detect possible efforts at reconstitution of its nuclear weapons program.

One major concern is the existence of undeclared nuclear facilities, especially uranium enrichment plants beyond that at Yongbyon and suspected at Kangson. This is a proliferation concern in all states and not limited to North Korea, however…

With a freeze as a starting point, declarations of current fissile material and nuclear warhead inventories would be important for measuring progress toward denuclearization. These initial declarations could be relatively simple. Ideally, as a transparency measure, they could be made public. In the case of nuclear warheads, a declaration could include the total number of warheads in North Korea’s stockpile, perhaps listed by type, and the number of additional warhead components in storage; in the case of fissile material, a declaration could include acquisitions, losses, and removals, including the aggregate amount of material consumed in tests, and the current inventory of plutonium and highly enriched uranium, ideally also specifying the respective plutonium-239 and uranium-235 contents. More detailed declarations could follow at a later stage of the process.

There is a precedent for fissile material declarations. In May 2008, North Korea declared its plutonium inventory, often reported as 37 kg and backed up by 18,000 pages of operating records. At the time, the United States estimated that North Korea had produced a total of 40 to 50 kg of plutonium, raising concerns that the declaration may be incomplete. U.S. negotiators requested access to the Yongbyon reactor to confirm total plutonium production through use of nuclear archaeological techniques, in which the isotopic ratios of trace impurities in graphite samples are analyzed. At that time, North Korea refused.  Nuclear archaeology techniques for graphite-moderated reactors are now well established and would be sufficient to narrow down the uncertainty in plutonium production to a few kilograms, possibly to less than one weapon-equivalent. North Korea may or may not agree to these procedures early on in the denuclearization process, but every effort must be made to preserve the reactor core and relevant operating records so that such an analysis can be conducted when circumstances permit.

Reconstructing uranium enrichment activities is more challenging. Perhaps the best option would be to reconstruct North Korea’s history of uranium supply and use. Such an effort would assess uranium production at North Korean mines, uranium purification, UF6 production, and enrichment. This would involve auditing the records for internal consistency. Reports of North Korean uranium ore grade suggest that it takes 300 to 400 tons of ore to extract 1 ton of uranium. This means that up to 2000 tons of ore are required to make 25 kg of weapon-grade HEU or 5 kg of weapon-grade plutonium, the typical amounts used in a nuclear weapon. The review of records from the different plants could be complemented with forensic analysis of tailings at the mines and depleted uranium in cylinders at known enrichment plants. It also may be possible to examine North Korea’s centrifuge-plant equipment and reconstruct the amount of uranium processed in these plants and respective HEU output.

It will take years to conclude that undeclared stockpiles of materials and warheads do not exist, even if North Korea fully cooperates...

For safety reasons, as former Los Alamos National Laboratory Director Siegfried Hecker and colleagues recently observed, “shipping the North’s nuclear weapons out of the country is naïve and dangerous. The weapons must be disassembled by the people who assembled them.”…A third option would be for North Korea to gradually reduce the size of its weapons complex without revealing where exactly nuclear weapons and long-range ballistic missiles remain. An estimate in 2014 suggested about 90 nuclear weapon and missile sites of potential interest…

Excerpts from Alexander Glaser and Zia Mian, Denuclearizing North Korea: A verified, phased approach, Science, Sept. 7, 2018

Favorite of the West: Niger as Police State

Niger, a poverty-stricken nation perched on the southern belt of the Sahara, is rapidly being transformed into one of the world’s most strategic security hubs….“This place is a nest of spies,” said one contractor … “Below the radar, it’s become a key country for the West.”  A surge in financial assistance from European nations seeking to stem the flow of African migrants has made Niger the world’s largest per capita recipient of European Union aid…Western military forces operate from at least nine bases in Niger, government officials said…. The U.S. is finishing a large air base in Agadez, while the Central Intelligence Agency has begun flying armed drones from an airstrip outside the northern town of Dirkou, Nigerien officials said.

U.S. and European policy makers praise the government as a good partner that has welcomed foreign military personnel and slashed the migrant flow by almost 90% from 2015 highs. …Locals, nongovernmental organizations and opposition activists say the government is using international backing to neutralize dissent and embezzle millions of dollars in aid, charges the government denies. The opposition—backed by rights group Amnesty International—says President Mahamadou Idriss Issoufou, in power since 2011, is arbitrarily jailing activists and spending Western aid on bolstering his elite Presidential Guard…

Swaths of the nation’s centuries-old transportation economy—the movement of people and goods from West Africa through the Sahara—has essentially been criminalized by the EU crackdown on migration.  Some of the desert-dwelling Tuareg people, who have transported goods for centuries, are now smuggling weapons, men and money for cash-rich jihadist insurgencies. Migrants are dying in the desert in failed attempts to find new routes.

“The West is pleased because Niger’s government is a willing partner,but as Niger’s security chief, Mohammed Bazoum, says “We have become a hinge country, a geostrategic hub, but it is a disaster for us. We are known as a land of terrorism and migrant traffic.”

Across Niger’s western border with Mali, jihadist groups including Islamic State and al Qaeda franchises control stretches of territory around the northern city of Gao. Along the southern frontier with Nigeria, a rejuvenated Boko Haram is mounting intensifying attacks against security forces, including around the city of Diffa, where the U.S. has dozens of troops stationed. To the north lies Libya, which has become a hotbed of instability, weapons and radicalization.

The European Development Fund last year awarded $1 billion to Niger through 2020, and unusually for a country governance watchdogs deem chronically corrupt, 75% is now infused directly into the Nigerien budget instead of through nongovernmental organizations.The money funds hundreds of off-road vehicles, motorcycles and satellite phones for Nigerien security forces as well as new infrastructure and technology along the borders and countrywide development programs.

In Niamey’s central Plateau district, tall black screens block the soaring new U.S. Embassy headquarters, which will be one of the largest in West Africa. Saudi Arabia has broken ground on its own huge mission, while buildings belonging to EU agencies occupy whole city blocks. Hotels and conference centers are rising in tandem, reconfiguring the economic and political landscape of a nation ranked the world’s second-poorest behind the Central African Republic.

The government says the building boom is creating jobs. Locals say it has stoked runaway inflation and priced them out of their neighborhoods. In the past year, the cost of a kilogram of rice has risen 29%, sending shock waves through homes where the average wage is $2.66 a day.

“The cost to live here rises with each new European coming,” lamented Abdulraham Mamoudou, repairing his motor scooter on a dusty corner near the expanding U.S. Embassy compound.

A similar pattern is playing out further north in the smuggling hub of Agadez, where the EU-coordinated migration crackdown has transformed a boomtown into a simmering bust.  The city’s jails are bursting with men who have been convicted of smuggling. Vast depots on the town’s outskirts house hundreds of trucks confiscated by authorities…“This place is now for the Americans and French,” said Sadiq, a former migrant smuggler who evaded arrest and is now unemployed. “They took our livelihood and don’t give us anything in return.”

Excerpts from ‘A Nest of Spies’: Niger’s Deserts Become Front Line of Fight Against Jihadis, Wall Street Journal, Sept. 12, 2018

A Sinkhole Sucking in Failed States: jihad in Africa

The number of violent incidents involving jihadist groups in Africa has increased by more than 300% between 2010 and 2017… Many Western officers are despondent. Without more troops “there is no question we will lose”, says a senior French officer.

In the potpourri of jihadist groups, many pledge their loyalties to al-Qaeda or IS. They include al-Shabab in Somalia, Boko Haram and its factions in Nigeria, and Jama’a Nusrat al-Islam wal-Muslimin in Mali. In each country, conflict may be fuelled largely by local grievances. But the insurgents share some ideological traits. Many have been strengthened by the breakdown of Libya after the downfall of Muammar Qaddafi’s regime in 2011. Weapons spilled out of Libya’s armouries, and smuggling networks for everything from people to drugs developed across the Sahara. There are signs that the jihadists are learning from one another and sucking money and support from militant groups in the Middle East

The most important of the battles is Nigeria’s campaign against Boko Haram. ..A retired general who once held a senior post at AFRICOM, America’s military command for Africa, puts it thus: “If Nigeria goes down it would make a giant sinkhole that would suck in six or seven other countries.” Nigeria’s difficulties, moreover, offer sobering lessons to many other African countries, and their Western allies.

Maiduguri (Nigeria) was the birthplace of Boko Haram, whose factions make up the world’s deadliest terrorist group. It is so extreme that it sickens even IS and al-Qaeda. The group was founded by the followers of a charismatic Islamic preacher, Mohammed Yusuf, who had started a religious school and mosque in Maiduguri in 2002… Among his demands was a ban on secular schooling (the group’s name, Boko Haram, means “Western education is a sin” in Hausa).

The Nigerian police arrested and then killed Yusuf in front of a crowd outside the police headquarters in Maiduguri (the government insisted he was shot while trying to escape). Yusuf’s followers went into hiding before emerging under the command of Abubakar Shekau. In 2011 they blew up the headquarters of the Nigerian police and a UN building in Abuja, Nigeria’s capital. By the end of 2014 they had overrun large parts of three states in north-eastern Nigeria, gained international notoriety after kidnapping almost 300 schoolgirls from Chibok and were fighting their way into Maiduguri. Nigeria’s army, hollowed out by corruption, was in disarray. Units were filled by ghost soldiers whose pay was being pocketed by their commanders. One Western officer recalls how a company that should have had 100-150 soldiers consisted of just 20 men.

Boko Haram did not at first try to govern…. It preferred chaos. It bombed mosques and markets, massacred villagers and abducted women and children. Some girls were enslaved and sold. Others were pressed into being human bombs. A study by the Combating Terrorism Centre at West Point, a military academy, found that more than half of 434 such human bombs the group used between April 2011 and June 2017 were female.UNICEF, the UN children’s agency, says that last year Boko Haram strapped bombs to at least 135 children.

Mr Shekau’s brutality proved too much even for IS, to which he had sworn allegiance in 2015, changing Boko Haram’s name to Islamic State West Africa Province (ISWAP). In 2016 IS named Abu Musab al-Barnawi the leader of ISWAP, splintering the group into two factions.  Meanwhile, thousands of villagers and residents of Maiduguri took up machetes or handmade muskets and joined a self-defence militia, the Civilian Joint Task Force (CJTF), that held the gates of the city. The new president of Nigeria, Muhammadu Buhari, a northerner and former military dictator, ordered his generals to move their headquarters to Maiduguri. Neighbouring states such as Chad, Niger and Cameroon contributed troops to a multinational force. Within months the army had recaptured most big towns, pushing the insurgents into forests or Lake Chad, a mass of swamps where the borders of four countries meet.

Since then, though, stalemate has set in…The ISWAP has learned how to make roadside bombs and has become more skilled in conducting attacks.  …It levies “taxes” on locals and erects roadblocks to extort money from passing traffic… It is building a proto-caliphate. 

Nigeria’s generals talk about “winning hearts and minds” but they are doing the opposite. The army has systematically cleared people from the countryside, burning their villages and packing them into squalid camps in Maiduguri and other “garrison towns”. In all, some 2.4m people have been displaced by the fighting in Nigeria and neighbouring countries. T  Most observers think that indiscriminate killings by the army and the forcing of people into garrison towns are fuelling the insurgency. There are almost no jobs in the camps. Access is through checkpoints manned by the army and CJTF, who demand bribes. Amnesty International, a human-rights group, says many women and girls have been raped in the camps and that hundreds if not thousands of people confined in them have died of starvation or a lack of medical care. … “It is like a factory for jihadis.”

The Nigerian state’s failure extends far beyond the camps. In  In effect, Nigeria’s north-east is a failed state within a dysfunctional one.

Excerpts from Jihad’s Next Battleground,  Economist, July 14, 2018, at 41

Slyly Conquering East Africa

The rulers of United Arab Emirates (UAE), one of whose components, Dubai, own a majority stake in DP World, one of the world’s largest maritime firms with perations in 40 countries.It is one of several Gulf states trying to gain a strategic foothold in east Africa through ports. Controlling these offers commercial and military advantages but risks exacerbating tensions in the region…

DP World thinks the region from Sudan to Somalia needs 10-12 ports. It has just half that. The firm’s first foray was on Djibouti’s coast. When DP World won its first concessions there in the 1990s, the Emiratis were among the few investors interested in the small and poor former French colony. DP World built and operated a new container terminal, Doraleh,and helped finance roads and other infrastructure. Doraleh is now the country’s largest employer and the government’s biggest source of revenue. It runs at nearly full capacity, handling 800,000 containers a year. Much of its cargo travels along a Chinese-built railway from Addis Ababa, Ethiopia’s capital.

Djibouti’s profile rose further after the terrorist attacks on America of September 11th, 2001, when America opened a military base there. France and China also have bases; other navies patrol off its coast to deter Somali pirates. But when the Emiratis wanted to open their own naval base they were rebuffed, partly because of their close ties to Djibouti’s rival, Eritrea (the two states had a bloody border dispute in 2008). In 2015 the UAE started building a naval base in Assab, in southern Eritrea. The base has been used in the Saudi-led war against Houthi rebels in Yemen….In 2016 DP World won a 30-year concession to operate the port of Berbera in Somaliland, which declared independence in 1991 (though no foreign government recognises it). Critics said the deal would hasten the break-up of Somalia.

The Horn ports all sit near the Bab al-Mandab strait, a vital choke-point at the mouth of the Red Sea: 4.8m barrels of oil passed through it every day in 2016. Competition is getting fierce, though. Qatar and its ally, Turkey, are building ports in Sudan. Saudi Arabia is in talks to set up a naval base in Djibouti. All three Gulf states are trying to snap up farmland in east Africa, part of a broader effort to secure food supplies for their arid countries. Emirati-built ports could one day export crops from Emirati-owned farms…

Gulf states could also find themselves in competition with China…In February 2018 Djibouti seized the Doraleh port, a concession to the UAE… Shippers believe it took Doraleh as a sop to China, to which it is heavily indebted. In July 2018, Djibouti opened the first phase of a new $3.5bn free-trade zone, set to be the largest in Africa when it is finished. Built mostly by state-owned Chinese firms, it sits next to Doraleh. DP World says the project violates the terms of its concession and is threatening to sue.

Excerpts from Red Sea Scamble: Ports on the Horn, Economist, July 21, 2018, at 33

How to Navigate the Rubble: DARPA

Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage.

Dr. Ronald Polcawich, a DARPA program manager in the Microsystems Technology Office (MTO):”There are a number of environments that are inaccessible for larger robotic platforms. Smaller robotics systems could provide significant aide, but shrinking down these platforms requires significant advancement of the underlying technology.”

Technological advances in microelectromechanical systems (MEMS), additive manufacturing, piezoelectric actuators, and low-power sensors have allowed researchers to expand into the realm of micro-to-milli robotics. However, due to the technical obstacles experienced as the technology shrinks, these platforms lack the power, navigation, and control to accomplish complex tasks proficiently

To help overcome the challenges of creating extremely [Size, Weight and Power] SWaP-constrained microrobotics, DARPA is launching a new program called SHort-Range Independent Microrobotic Platforms (SHRIMP). The goal of SHRIMP is to develop and demonstrate multi-functional micro-to-milli robotic platforms for use in natural and critical disaster scenarios. To achieve this mission, SHRIMP will explore fundamental research in actuator materials and mechanisms as well as power storage components, both of which are necessary to create the strength, dexterity, and independence of functional microrobotics platforms.

“The strength-to-weight ratio of an actuator influences both the load-bearing capability and endurance of a micro-robotic platform, while the maximum work density characterizes the capability of an actuator mechanism to perform high intensity tasks or operate over a desired duration,” said Polcawich. “

Excerpts from Developing Microrobotics for Disaster Recovery and High-Risk Environments: SHRIMP program seeks to advance the state-of-the art in micro-to-milli robotics platforms and underlying technology, OUTREACH@DARPA.MIL, July 17, 2018

The Underground War

U.S. Army leaders say the next war will be fought in mega-cities..In 2017, the Army launched an accelerated effort that funnels some $572 million into training and equipping 26 of its 31 active combat brigades to fight in large-scale subterranean facilities that exist beneath dense urban areas around the world….For this new type of warfare, infantry units will need to know how to effectively navigate, communicate, breach heavy obstacles and attack enemy forces in underground mazes ranging from confined corridors to tunnels as wide as residential streets. Soldiers will need new equipment and training to operate in conditions such as complete darkness, bad air and lack of cover from enemy fire in areas that challenge standard Army communications equipment…

“This training circular is published to provide urgently needed guidance to plan and execute training for units operating in subterranean environments, according to TC 3-20.50 “Small Unit Training in Subterranean Environments,” published in November 2017.

The Army has always been aware that it might have to clear and secure underground facilities such as sewers and subway systems beneath densely-populated cities. ..An assessment last year estimates that there are about 10,000 large-scale underground military facilities around the world that are intended to serve as subterranean cities…The endeavor became an urgent priority because more than 4,800 of these underground facilities are located in North Korea, the source said… But in addition to its underground nuclear missile facilities, North Korea has the capability to move thousands of troops through deep tunnels beneath the border into South Korea, according to the Army’s new subterranean manual.

“North Korea could accommodate the transfer of 30,000 heavily armed troops per hour,” the manual states. “North Korea had planned to construct five southern exits and the tunnel was designed for both conventional warfare and guerrilla infiltration. Among other things, North Korea built a regimental airbase into a granite mountain.”

For its part, Russia inherited a vast underground facilities program from the Soviet Union, designed to ensure the survival of government leadership and military command and control in wartime, the manual states. Underground bunkers, tunnels, secret subway lines, and other facilities still beneath Moscow, other major Russian cities, and the sites of major military commands.  More recently, U.S. and coalition forces operating in Iraq and Syria have had to deal with fighters from the Islamic State of Iraq and Syria operating in tunnel systems.

Toxic air, or a drop in oxygen, are other challenges soldiers will be likely to face operating deep underground. The Army is evaluating off-the-shelf self-contained breathing equipment for units to purchase.”Protective masks without a self-contained breathing apparatus provide no protection against the absence of oxygen,” the subterranean manual states. ”  Soldiers can find themselves exposed to smoke, carbon monoxide, carbon dioxide, hydrogen sulfide, methane natural gas underground, according to the manual. Breathing gear is expensive; some apparatus cost as much as $13,000 apiece, the source said.

Underground tunnels and facilities are often lighted, but when the lights go out, soldiers will be in total darkness. The Army announced in February that it has money in its fiscal 2019 budget to buy dual-tubed, binocular-style night vision goggles to give soldiers greater depth perception than offered by the current single-tubed Enhanced Night Vision Goggles and AN/PVS 14s.

Excerpts from Matthew Cox, Army Is Spending Half a Billion to Train Soldiers to Fight Underground, Military.com, June 24, 2018

See also DARPA on Underground War

The fate of SS-18 Satan

While Ukraine renounced its own possession of nuclear weapons in 1994, many scientists and design bureaus in the country still have the know-how required to manufacture important components of strategic weapons.

China has often been particularly keen of this knowledge, acquiring Ukrainian help in designing their first phased-array radar system.  Ukrainian aerospace, tank and naval engineers is also a common phenomenon in China, most notably Valerii Babich, designer of the Varyag aircraft carrier. There are even rumors of “Ukrainetowns” in some Chinese cities founded by the large number of expats hired by Chinese firms. Ukrainian and Russian businessmen even sold Kh-55 nuclear cruise missiles (without the warheads) from Ukrainian stockpiles to China in the 2000s. As China continues to modernize their ICBM fleet, it begs the question: how much help is Ukraine providing, willingly and unwillingly?

This wouldn’t be the first time Ukraine’s ICBM knowhow was possibly exported. In the fall of 2017, Ukraine’s Yuzhnoye Design Bureau, based in Dnipro, was accused of providing rocket engines to North Korea. While Ukrainian media has denied this allegation, there was a definite case of Yushnoye employees who were caught selling the plans on the RS-20 (SS-18 “Satan”) to Chinese missile engineers. Although the Chinese engineers were caught by Ukrainian police, Chinese diplomatic influence resulted in the charges being cleared. This trend has continued, as recently as 2016 when a scientist at Dnipropetrovsk National University left for China with many materials regarding the use of composites and heat-shielding coatings on rocket launchers—which were considered Ukrainian state secrets…

Given all the different vectors through which rocket and missile technology are flowing from Ukraine to China, it’s reasonable to say that Ukraine has provided considerable aid to the Chinese ballistic missile program.

Excerpts, Charlie Gao, Do China’s Nuclear Missiles Have Ukrainian DNA?, The National Interest, June 23

How to Break the Rules without Breaking the Law

In 2009,  coalition casualties in Afghanistan had as much as doubled in the space of a year. Civilian casualties climbed to 2412. It was 2009. Coalition forces had been there since 2001 with no end and, to this point, no real campaign plan in sight…

Chris Masters, who was the only journalist to have been embedded with Australian special forces soldiers (SASR) in Afghanistan, believes a desensitisation occurred within the forces that allegedly allowed a “kill count mentality to develop”…SASR’s sabre squadrons are the tips of a trident of land, air and water operators, with the “wateries” an elite within an elite. And like their US counterparts, the Navy SEALs, unquestionable ability can come tinged with arrogance. In SASR, their rock-star persona did not sit easily with everyone when modesty was supposed to be a core value…

The most prominent allegation is traced to an assault on a compound codenamed Whiskey 108 at Kakarak in Oruzgan on Easter Sunday 2009…As shooting erupted, one operator remembers thinking: “I am going to die today.” Instead, methodically, they closed in on the remaining enemy, killing them one by one.  At this time Australian weapons were again heard firing and soldiers entering the compound saw something hurled from a window. It was an older man with a prosthetic leg, shot and now lying dead. The prosthetic leg was souvenired and returned to Perth to be fashioned into a drinking vessel.  What troubled a range of witnesses was not so much the killing of the men, who whether armed or unarmed were considered Taliban. It was more that the grim task of pulling the trigger had been pushed onto a “rookie”. As one operator told me: “If s— needs to be done, do it yourself.”

In rotations to come, the concept of blooding became well known. What became more disturbing was a suspicion the practise was not only about a first kill but also executing prisoners. ..What was not thought through was how many of the “blooded rookies” would be haunted well into the future by what was done…Soldiers began to refer to some of their members having gone “up the Congo”, into the moral wilderness of novelist Joseph Conrad’s Heart of Darkness. Numerous witnesses have spoken of one SASR team posting a kill board on their door. The patrol commander was heard talking about needing more kills and subsequently of the goal being met….

As the mission wore on, further alleged breaches of the rules of armed conflict began to emerge, conspicuously contained to Special Forces and most particularly to SASR. The “Who Dares Wins” ethos of the regiment encourages the testing of boundaries. As they often tell themselves, “you break the rules but not the law”.

Exceprts from Chris Masters, Australia’s ugly turn in Afghanistan, Sydney Morning Herald, June 8, 2018

A Strategy of Fear: boko haram

In July 2011, the Nigerian government unveiled plans to make telecommunications companies dedicate toll-free phone lines so civilians could report Boko Haram activity. Months later, insurgent spokesman Abu Qaqa threatened to attack service providers and Nigeria Communication Commission (NCC) offices.

Eight months later, Boko Haram made good on Qaqa’s threat. The militant group launched a two-day attack on telecommunications towers belonging to several providers in five cities: Bauchi, Gombe, Kano, Maiduguri and Potiskum…. Institute for Security Studies (ISS) researcher Omar S. Mahmood told ADF …’it’s a pretty powerful message if Boko Haram comes out and says, ‘I’m going to attack X because of this,’ and then they go out and they do it,” Mahmood said. “It just serves to make their next warning even more intimidating and effective.”

Mahmood, in his March 2017 paper for the ISS titled “More than propaganda: A review of Boko Haram’s public messages,” showed that a significant number of Boko Haram messages between 2010 and 2016 issued warnings and threatened violence. In fact, warnings and threats constitute the second-most-common theme of the group’s messaging out of the 145 messages studied…

Boko Haram demonstrated this tendency further in its threat against schools. In January 2012, Shekau complained publicly about alleged mistreatment of Islamic schools and students, and he threatened to launch attacks.  Again, Boko Haram followed through. From January to early March 2012, militants destroyed at least a dozen schools in the Maiduguri region of Borno State…

Ties between messaging and attacks also can be seen in Boko Haram’s assault on Nigerian media and the nation’s oil industry. As Qaqa complained that the media misrepresented Boko Haram, insurgents bombed This Daynewspaper offices in Abuja and Kaduna in April 2012…In June 2014, a suicide bomber detonated a bomb outside a Lagos oil refinery.

Boko Haram’s highest-profile action is the kidnapping of 276 Chibok schoolgirls in 2014. On April 14, militants attacked a boarding school in Chibok, Borno State, in the middle of the night. Insurgents raided dormitories, loaded girls into trucks and drove away. Some girls jumped into bushes as trucks rushed away, leaving 219 children held captive. The atrocity drew worldwide condemnation and parallels a long-standing grievance of Boko Haram: the desire for the release of incarcerated members.

In October 2016, after months of negotiations, Boko Haram released 21 of the Chibok girls in exchange for a monetary ransom, Daily Trust reported. In May 2017, insurgents swapped another 82 of the girls for five militant leaders.

The 2015 ISIS alignment was the beginning of big changes in messaging for Boko Haram…Boko Haram’s most powerful period was from 2013 to 2015, when it was capturing and holding territory, and dealing setbacks to military forces.   By late 2015 and through 2017, Nigerian and regional military assaults began to take their toll on Boko Haram…

In August 2016, Boko Haram split into two factions: One is led by pugnacious spokesman Shekau; the other by Abu Musab al-Barnawi, ISIS’ choice for leader….The split also has left al-Barnawi’s ISIS-aligned faction the clear winner in terms of potential longevity and lethality, Mahmood said. Shekau’s wing is just trying to survive, but it still uses ISIS logos in messages.

Excerpts from From Message to Mayhem, A Study of Boko Haram’s Public Communications Can Offer Hints About Its Strategy, Africa Defense Forum, Mar. 2018

Flying off the Shelves: the entrenching of drone warfare

A 2018 report published by Drone Wars UK reveals that over the last five years the number of countries actively using armed drones has quadrupled. Drone Wars: The Next Generation demonstrates that from just three states (US, UK and Israel) in 2013, there are now a further nine who have deployed armed drones in a variety of roles including for armed conflict and counter-terror operations. The report also shows that a further nine states are very close to having armed drone capabilities, almost doubling the number of existing users. To this number, we have added five non-state actors who have used armed drones, which will take the number of active operators of armed drones to over 25 in the next few years.

As is well known, China has sold armed drones to a number of countries around the world. Since 2013, Nigeria, Pakistan, Saudi Arabia, Iraq, UAE and Egypt have begun operating armed Chinese drones whilst another four countries (Jordan, Myanmar, Kazakhstan and Turkmenistan) are thought to have recently taken possession of, or be in discussion about the sale of, Chinese drones. These Wing Loong and CH series drones are cheaper and less powerful than US Predators and Reapers.  As, according to their specifications, they are not capable of delivering a payload of at least 500 kg to a range of at least 300 km they do not fall into the category of systems that would be refused under Category 1 of the Missile Technology Control Regime (MTCR) as the US systems do.

Turkey, Pakistan and Iran are actively using their own manufactured drones. Iran has, it seems, supplied Hamas, Hezbollah and the Houthis with armed drones while ISIS and the PKK  (Kurdistan Workers’ Party) have attached small explosives to off-the-shelf drones. Turkey are thought to be concluding deal with Qatar and the Ukrain eand South Korea are very close to beginning production of their own armed drones.

As for the larger countries that one might expect to have already deployed armed drones, such as Russia and India, they still appear to be some distance from producing workable models…Several cross-European projects are underway to develop indigenous armed drones within the EU.

Excerpts from New research shows rise in number of states deploying armed drones, Press Release from Drone Wars UK, May 17, 2018

The 1 Million Genies out of the Bottle

The head of the U.S. Departement of Homeland Security  (DHS)  on May 15, 2018 told Congress that the agency needs new legal authority to track threatening drones and disable or destroy them if necessary.  “Our enemies are exploring other technologies, too, such as drones, to put our country in danger. ISIS has used armed drones to strike targets in Syria, and we are increasingly concerned that they will try the same tactic on our soil,” she said…

Government and private-sector officials are concerned that dangerous or even hostile drones could get too close to places like military bases, airports and sports stadiums.Nielsen added that DHS has “also seen drones used to smuggle drugs across our borders and to conduct surveillance on sensitive government locations.”

In 2017, the Federal Aviation Administration barred drone flights over major U.S. nuclear sites. The FAA also banned drone flights over 10 U.S. landmarks, including the Statue of Liberty in New York and Mount Rushmore in South Dakota.  Also banned in 2017 were drone flights over 133 U.S. military facilities. The Pentagon said in August 2017 that U.S. military bases could shoot down drones that pose a threat.  The FAA said in January 2017  that more than 1 million drones have been registered. Last week, the U.S. Transportation Department picked 10 pilot projects allowing drone use at night, out of sight operations and over populated areas

Exceprts from U.S. agency seeks new authority to disable threatening drones, May 15, 2018

Somalia as Security Flank for the Gulf

A battle for access to seaports is underway in one of the world’s unlikeliest places: Somalia, now caught in a regional struggle between Saudi Arabia and the United Arab Emirates on one side with Qatar backed by Turkey on the other.  At stake: not just the busy waters off the Somali coast but the future stability of the country itself.

In 2017, a company owned by the United Arab Emirates government signed a $336 million contract to expand the port of Bosaso, north of Mogadishu in the semi-autonomous Somali region of Puntland.   In 2016, another UAE-owned firm took control of Berbera port in the breakaway northern region of Somaliland and pledged up to $440 million to develop it. In March 2017, Ethiopia took a stake in the port for an undisclosed sum.  The federal government in Mogadishu has long been at odds with the semi-autonomous regions of Puntland and Somaliland. The money could destabilise the country further by deepening tensions between central government, aligned with Turkey and Qatar, and Puntland and Somaliland, which both receive money from the UAE.

At the same time, Turkey, an ally of Qatar, is ramping up a multi-billion dollar investment push in Somalia. A Turkish company has run the Mogadishu port since 2014, while other Turkish firms built roads, schools and hospitals.   The rivalries have intensified since June 2017, when the most powerful Arab states, led by Saudi Arabia and including the UAE, cut diplomatic ties with Qatar, accusing it of supporting Iran and Islamist militants…

Saudi Arabia and the UAE increasingly view the Somali coastline – and Djibouti and Eritrea to the north – as their “western security flank”, according to a senior western diplomat in the Horn of Africa region…

Excerpts from  Gulf States Scramble for Somalia, Reuters, May 2, 2018

Stopping the Unstoppable: undersea nuclear torpedoes

On July 20th 1960, a missile popped out of an apparently empty Atlantic ocean. Its solid-fuel rocket fired just as it cleared the surface and it tore off into the sky. Hours later, a second missile followed. An officer on the ballistic-missile submarine USS George Washington sent a message to President Dwight Eisenhower: “POLARIS—FROM OUT OF THE DEEP TO TARGET. PERFECT.” America had just completed its first successful missile launch of an intercontinental ballistic missile (ICBM) from beneath the ocean. Less than two months later, Russia conducted a similar test in the White Sea, north of Archangel.

Those tests began a new phase in the cold war. Having ICBMs on effectively invisible launchers meant that neither side could destroy the other’s nuclear arsenal in a single attack. So by keeping safe the capacity for retaliatory second strikes, the introduction of ballistic-missile submarines helped develop the concept of “mutually assured destruction” (MAD), thereby deterring any form of nuclear first strike. America, Britain, China, France and Russia all have nuclear-powered submarines on permanent or near permanent patrol, capable of launching nuclear missiles; India has one such submarine, too, and Israel is believed to have nuclear missiles on conventionally powered submarines.

As well as menacing the world at large, submarines pose a much more specific threat to other countries’ navies; most military subs are attack boats rather than missile platforms. This makes anti-submarine warfare (ASW) a high priority for anyone who wants to keep their surface ships on the surface. Because such warfare depends on interpreting lots of data from different sources—sonar arrays on ships, sonar buoys dropped from aircraft, passive listening systems on the sea-floor—technology which allows new types of sensor and new ways of communicating could greatly increase its possibilities. “There’s an unmanned-systems explosion,” says Jim Galambos of DARPA, the Pentagon’s future-technology arm. Up until now, he says, submariners could be fairly sure of their hiding place, operating “alone and unafraid”. That is changing.

Aircraft play a big role in today’s ASW, flying from ships or shore to drop “sonobuoys” in patterns calculated to have the best chance of spotting something. This is expensive. An aeroplane with 8-10 people in it throws buoys out and waits around to listen to them and process their data on board. “In future you can envision a pair of AUVs [autonomous underwater vehicles], one deploying and one loitering and listening,” says Fred Cotaras of Ultra Electronics, a sonobuoy maker. Cheaper deployment means more buoys.

But more data is not that helpful if you do not have ways of moving it around, or of knowing where exactly it comes from. That is why DARPA is working on a Positioning System for Deep Ocean Navigation (POSYDON) which aims to provide “omnipresent, robust positioning across ocean basins” just as GPS satellites do above water, says Lisa Zurk, who heads up the programme. The system will use a natural feature of the ocean known as the “deep sound channel”. The speed of sound in water depends on temperature, pressure and, to some extent, salinity. The deep sound channel is found at the depth where these factors provide the lowest speed of sound. Below it, higher pressure makes the sound faster; above it, warmer water has the same effect…

Even in heavily surveilled seas, spotting submarines will remain tricky. They are already quiet, and getting quieter; new “air-independent propulsion” systems mean that conventionally powered submarines can now turn off their diesel engines and run as quietly as nuclear ones, perhaps even more so, for extended periods of time. Greater autonomy, and thus fewer humans—or none at all—could make submarines quieter still.

A case in point is a Russian weapon called Status-6, also known as Kanyon, about which Vladimir Putin boasted in a speech on March 1st, 2018. America’s recent nuclear-posture review describes it as “a new intercontinental, nuclear-armed, nuclear-powered, undersea autonomous torpedo”. A Russian state television broadcast in 2015 appeared to show it as a long, thin AUV that can be launched from a modified submarine and travel thousands of kilometres to explode off the shore of a major city with a great deal more energy than the largest warheads on ICBMs, thus generating a radioactive tsunami. Such a system might be seen as preserving a second-strike capability even if the target had a missile-defence system capable of shooting ICBMs out of the sky…

One part of the ocean that has become particularly interesting in this regard is the Arctic. Tracking submarines under or near ice is difficult, because ice constantly shifts, crackles and groans loudly enough to mask the subtle sounds of a submarine. With ever less ice in the Arctic this is becoming less of a problem, meaning America should be better able to track Russian submarines through its Assured Arctic Awareness programme…

Greater numbers of better sensors, better networked, will not soon make submarines useless; but even without breakthroughs, they could erode the strategic norm that has guided nuclear thinking for over half a century—that of an unstoppable second strike.

Excerpts from Mutually assured detection, Economist, Mar. 10, 2018

Like Afghanistan, Like Niger?

On the scorching edge of the Sahara Desert, the U.S. Air Force is building a base for armed drones, the newest front in America’s battle against the growing extremist threat in Africa’s vast Sahel region.  Three hangars and the first layers of a runway command a sandy, barren field. Niger Air Base 201 is expected to be functional in 2019. The base, a few miles outside Agadez and built at the request of Niger’s government, will eventually house fighter jets and MQ-9 drones transferred from the capital Niamey. The drones, with surveillance and added striking capabilities, will have a range enabling them to reach a number of West and North African countries.

Few knew of the American military’s presence in this desperately poor, remote West African country until October 2018, when an ambush by Islamic State group-linked extremists killed four U.S. soldiers and five Nigeriens.

The $110 million project is the largest troop labor construction project in U.S. history, according to Air Force officials. It will cost $15 million annually to operate…. Already the U.S. military presence here is the second largest in Africa behind the sole permanent U.S. base on the continent, in the tiny Horn of Africa nation of Djibouti.  “We are afraid of falling back into the same situation as in Afghanistan, with many mistakes made by American soldiers who did not always know the difference between a wedding ceremony and a training of terrorist groups,” said Amadou Roufai, a Nigerien administration official.  Civic leader Nouhou Mahamadou also expressed concerns.

“The presence of foreign bases in general and American in particular is a serious surrender of our sovereignty and a serious attack on the morale of the Nigerien military,” he said.

The number of U.S. military personnel in Niger has risen over the past few years from 100 to 800, the second largest concentration in Africa after the 4,000 in Camp Lemonnier in Djibouti. About 500 personnel are working on the new air and drone base and the base camp is marked with an American and Nigerien flag.

Excerpts  from Carley Petesch, US Builds Drone Base in Niger, Crossroads of Extremism Fight, Associated Press, April 23, 2018

US in Africa: Ghana

Ghana’s parliament on March 23, 2018 ratified a deal granting “unimpeded” access to the United States to deploy troops and military equipment in the West African nation in a vote boycotted by the opposition, legislators said.The Ghana-U.S. Military Cooperation agreement requires Ghana to provide unimpeded access to agreed facilities and areas to U.S. forces, their contractors and other related services.

It said facilities provided by Ghana shall be designated as either for exclusive use by U.S. troops or to be jointly used with their Ghanaian counterparts. “Ghana shall also provide access to and use of a runway that meets the requirements of United States forces,” it said. The Americans will use

But critics, including some civil society groups, say this year’s agreement amounted to mortgaging the country’s sovereignty.

Ghana votes to host U.S. military; opposition boycotts vote, Reuters, Mar. 23, 2018

The Prefect Crystal Ball for Gray War

The activity, hostile action that falls short of–but often precedes–violence, is sometimes referred to as gray zone warfare, the ‘zone’ being a sort of liminal state in between peace and war. The actors that work in it are difficult to identify and their aims hard to predict, by design…

Dubbed COMPASS, the new program will “leverage advanced artificial intelligence technologies, game theory, and modeling and estimation to both identify stimuli that yield the most information about an adversary’s intentions, and provide decision makers high-fidelity intelligence on how to respond–-with positive and negative tradeoffs for each course of action,” according to a DARPA notice posted on March 14, 2018.

Teaching software to understand and interpret human intention — a task sometimes called “plan recognition” …has advanced as quickly as the spread of computers and the internet, because all three are intimately linked.

From Amazon to Google to Facebook, the world’s top tech companies are pouring money into probabilistic modeling of user behavior, as part of a constant race to keep from losing users to sites that can better predict what they want. A user’s every click, “like,” and even period of inactivity adds to the companies’ almost unimaginably large sets, and new  machine learning and statistical techniques make it easier than ever to use the information to predict what a given user will do next on a given site.

But inferring a user’s next Amazon purchase (based on data that user has volunteered about previous choices, likes, etc.) is altogether different from predicting how an adversary intends to engage in political or unconventional warfare. So the COMPASS program seeks to use video, text, and other pieces of intelligence that are a lot harder to get than shopping-cart data…

Unlike shopping, the analytical tricks that apply to one gray-zone adversary won’t work on another. “History has shown that no two [unconventional warfare] situations or solutions are identical, thus rendering cookie-cutter responses not only meaningless but also often counterproductive,” wrote Gen. Joseph Votel, who leads U.S. Central Command, in his seminal 2016 treatise on gray zone warfare.

Exceprts from The Pentagon Wants AI To Reveal Adversaries’ True Intention, www.govexec.com, Mar. 17, 2018

Who’s Fighting over Djibouti?

The top US general for Africa told lawmakers the American military could face “significant” consequences should China take a key port in Djibouti….  In Febuary 2018, Djibouti ended its contract with Dubai’s DP World, one of the world’s biggest port operators, to run the Doraleh Container Terminal, citing failure to resolve a dispute that began in 2012.  DP World called the move an illegal seizure of the terminal and said it had begun new arbitration proceedings before the London Court of International Arbitration.

During a congressional hearing on March 7, 2018, dominated by concerns about China’s role in Africa, lawmakers said they had seen reports that Djibouti seized control of the port to give it to China as a gift. China has already built a military base in Djibouti, just miles from a critical US military base.

Djibouti is strategically located at the southern entrance to the Red Sea on the route to the Suez Canal.  Marine General Thomas Waldhauser, the top US military commander overseeing troops in Africa, said if China placed restrictions on the port’s use, it could affect resupplying the US base in Djibouti and the ability of Navy ships to refuel there.  Djibouti hosts a vital US military base home to about 4,000 personnel,[Camp Lemonnier] including special operations forces, and is a launchpad for operations in Yemen and Somalia.

China has sought to be visible in Africa, including through high-profile investment in public infrastructure projects, as it deepens trade ties.  Waldhauser said the United States would be unable to match the scale of Chinese investment throughout Africa, noting Beijing’s construction of shopping malls, government buildings and even soccer stadiums.  “We’ll never outspend the Chinese in Africa,” Waldhauser said, noting some Chinese investments in Djibouti.

In 2018, the US military put countering China, along with Russia, at the centre of a new national defence strategy.  The Pentagon said China was a part of “revisionist powers” that “seek to create a world consistent with authoritarian models.”

Excerpts from  Significant consequences if China takes port in Djibouti, Reuters, Mar. 7, 2018

Up, Close and Personal: How to Destroy the Enemy

Deep southern Negev desert, Israel, there is a small town called Baladia, with a main square, five mosques, cafés, a hospital, multi-storey blocks of flats, a kasbah and a cemetery. Oddly, it also has a number of well-constructed tunnels. The only people milling around in its streets are Israeli Defence Force (IDF) soldiers. Baladia, the Arab word for city, is part of the Tze’elim army base**. It has been built to provide a realistic training ground for the next time the IDF is required to go into Gaza to destroy Hamas missile launchers…Acceptance among Western armies that future fights are most likely to take place in cities. Megacities with populations of more than 10m are springing up across Africa and Asia. They are often ringed by closely packed slums controlled by neighbourhood gangs. Poor governance, high unemployment and criminality make them fertile territory for violent extremism.

It is hardly surprising that non-state adversaries of the West and its allies should seek asymmetric advantage by taking the fight into cities. Air power and precision-guided munitions lose some of their effectiveness in urban warfare because their targets can hide easily and have no scruples about using a densely packed civilian population as a shield.

Valuable lessons have been learned from the battle for Sadr City, a large suburb of Baghdad, in 2008, Israel going into Gaza in 2014 and the defeat of Islamic State (IS) in Mosul 2017….As General Mark Milley, the head of the US Army, puts it, “it took the infantry and the armour and the special operations commandos to go into that city, house by house, block by block, room by room…and it’s taken quite a while to do it, and at high cost.” He thinks that his force should now focus less on fighting in traditional environments such as woodland and desert and more on urban warfare.

To that end, he advocates smaller but well-armoured tanks that can negotiate city streets, and helicopters with a narrower rotor span that can fly between buildings. At the organisational level, that means operating with smaller, more compartmentalised fighting units with far more devolved decision-making powers…

Western military forces should still enjoy a significant technological edge. They will have a huge range of kit, including tiny bird- or insect-like unmanned aerial vehicles that can hover outside buildings or find their way in. Unmanned ground vehicles can reduce the risk of resupplying troops in contested areas and provide medical evacuation for injured soldiers, and some of them will carry weapons….

For all the advances that new technologies can offer, General Milley says it is a fantasy to think that wars can now be won without blood and sacrifice: “After the shock and awe comes the march and fight…to impose your political will on the enemy requires you…to destroy that enemy up close with ground forces.”

Excerpt from House to House in the The New Battlegrounds, Economist Special Report, the Future of War, Jan. 27, 2018

***In 2005, the Israeli Defense Forces, with assistance from the United States, built the Urban Warfare Training Center at the Tze’elim Army Base, at a cost of $45 million. Nicknamed “Baladia” it is a 7.4 square mile training center used to instruct soldiers in urban warfare techniques, and consists of an imitation Middle Eastern style city with multiple multistory buildings. It has been used to train various military organizations, including the US Army and UN peacekeepers.  Wikipedia

The Perfect Spies: Animals as Mobile Sensors of US Enemies

The world’s vast oceans and seas offer seemingly endless spaces in which adversaries of the United States can maneuver undetected. The U.S. military deploys networks of manned and unmanned platforms and sensors to monitor adversary activity, but the scale of the task is daunting and hardware alone cannot meet every need in the dynamic marine environment. Sea life, however, offers a potential new advantage. Marine organisms are highly attuned to their surroundings—their survival depends on it—and a new program out of DARPA’s Biological Technologies Office aims to tap into [marine animals] natural sensing capabilities to detect and signal when activities of interest occur in strategic waters such as straits and littoral regions.

The Persistent Aquatic Living Sensors (PALS) program, led by program manager Lori Adornato, will study natural and modified organisms to determine which ones could best support sensor systems that detect the movement of manned and unmanned underwater vehicles. PALS will investigate marine organisms’ responses to the presence of such vehicles, and characterize the resulting signals or behaviors so they can be captured, interpreted, and relayed by a network of hardware devices.

Beyond sheer ubiquity, sensor systems built around living organisms would offer a number of advantages over hardware alone. Sea life adapts and responds to its environment, and it self-replicates and self-sustains. Evolution has given marine organisms the ability to sense stimuli across domains—tactile, electrical, acoustic, magnetic, chemical, and optical. Even extreme low light is not an obstacle to organisms that have evolved to hunt and evade in the dark.

However, evaluating the sensing capabilities of sea life is only one of the challenges for PALS researchers. Performer teams supporting DARPA will also have to develop hardware, software, and algorithms to translate organism behavior into actionable information and then communicate it to end users…. The complete sensing systems must also discriminate between target vehicles and other sources of stimuli, such as debris and other marine organisms, to limit the number of false positives.

Adornato is aiming to demonstrate the approach and its advantages in realistic environments to convey military utility. “Our ideal scenario for PALS is to leverage a wide range of native marine organisms, with no need to train, house, or modify them in any way, which would open up this type of sensing to many locations,” Adornato said.

Excerpt from PALS Turns to Marine Organisms to Help Monitor Strategic Waters: Highly adapted sea life could help U.S. military detect adversary activity over large areas, Feb. 2, 2018

The Power of Yes-Men

American military engagement in Niger is a $110 million drone base the U.S. is building about 450 miles northeast of Niamey in Agadez…Its existence was partially confirmed in February 2018, inadvertently, when it was discovered that Strava, a fitness app used mostly  by westerners, had released location data that showed the global movements of the users of workout trackers like Fitbit — and the data showed unusual activity in far-off Aguelal, Agadez, Niger.

On the southeast edge of the civilian airport, accessible by tracks in the sand used mainly to exit the town, is Nigerien Air Base 201, or in common parlance “the American base.” The base, scheduled for completion in late 2018, is technically the property of the Nigerien military, though it is paid for, built, and operated by Americans. It is being constructed on land formerly used by Tuareg cattle-herders. … The U.S. currently flies drones out of an airport in Niamey, but those operations will be shifted to Agadez once the new base is completed.

When asked to confirm the American presence in those areas of Niger, U.S. Africa Command spokesperson Samantha Reho replied, “I can confirm there are approximately 800 Department of Defense personnel (military, civilian, and contractor) currently working in Niger, making that country the second-highest concentration of DoD people across the continent, with the first being in Djibouti at Combined Joint Task Force-Horn of Africa.”

The U.S. is just one of several Western militaries that have established and strengthened military ties to Niger over the past few years. France has had soldiers in the country since 2013, when it launched Opération Serval in neighboring Mali. In 2015, France reopened a colonial fort in Madama, close to the border with Libya — unthinkable during the times of Moammar Gadhafi; the Libyan leader maintained a sphere of influence in the region that would have been at odds with a French military presence. Germany sent its own troops in Niger to support the United Nations peacekeeping mission across the border in Mali, and German Chancellor Angela Merkel even visited Niger in 2017. And Italy recently announced it would send 470 troops to a French base in the north of Niger to fight migrant transporters….

The base in Agadez is about 6 square kilometers, though most of the land is yet to be developed. ….. The base is tucked away and hidden from Agadez first by the 8-to-10-foot wall that separates the city of 125,000 from the airport, and it is surrounded by a barbed wire fence with sandbags, so despite there being a few hundred Americans in Agadez, you would hardly know they were there unless you went looking. Both the Nigerien and the American governments prefer to keep it this way…

The man the middle is Mahamadou Issoufou, the president of Niger. In power for six years, he has adopted a clear strategy for trying to keep control of things – by aligning himself closely with Europe and the United States, while presiding over an electoral system that his opponents describe as rigged. This is not a recipe for stability in a country that has had little of it since its founding in 1960, at the end of French colonial rule.

Issoufou is a trained engineer and a former secretary-general of Somaïr, a uranium mine that was run by the French company Areva. Until migration and terrorism, uranium was the focal point of outside, particularly French, interest in Niger. France’s electricity grid is powered by nuclear energy, and Areva’s uranium concessions in Niger provide up to one-fifth of the uranium necessary to power that grid. Issoufou’s predecessor, Mamadou Tandja, had sparred with the French over the concession, and in 2009, then-French President Nicholas Sarkozy visited Niger to negotiate a deal on opening a new mine called Imouraren. After a $1.2 billion deal was struck, Tandja tried to reverse the constitution to stay in power for a third term, and after street protests, a group of low-ranking army officers carried out a coup d’état.

When the transition period ended with Issoufou’s election in 2011, the Fukushima nuclear disaster in Japan caused a sharp downturn in global uranium prices. Areva dropped its plans for Imouraren, and Issoufouacquiesced to the French firm’s plans for delaying the mine until prices rose, denting economic growth prospects for the country. But despite losing out on Imouraren, Issoufou quickly became a donor darling and found that the closer he was to France and the West, the better his image and the more firm his hold on political power. Issoufou was criticized heavily for going to Paris to attend the “Je Suis Charlie” march in January 2015, and some human rights organizations view him as a lackey of the West. He works with Image Sept, a French firm with close ties to the Parisian political elite, to manage his image.A couple of months before his re-election in 2016, Issoufou jailed his main political opponent and former close ally, Hama Amadou of the Moden Lumana party….

Many people I spoke to in Niger feel their country has had its autonomy usurped by Westerners. “The reality is that Niger is not at a level where it can say yes or no to the French or Americans. … We only have sovereignty on paper,” said Djibril Abarché, president of the Nigerien Human Rights Association.

Exceprts from Joe Penny, Drones in the Sahara, the Intercept, Feb. 18, 2018

Handcrafted Terror

An attack on Russian forces in Syria on January 5th, 2018 by 13 home-made drones is a good example of “asymmetric” warfare..The craft involved in these attacks resembled hobbyists’ model aircraft. They had three-metre wingspans, were built crudely of wood and plastic, and were powered by lawnmower engines. Each carried ten home-made shrapnel grenades under its wings.  The drones were guided by GPS and had a range of 100km. The electronics involved were off-the-shelf components, and the total cost of each drone was perhaps a couple of thousand dollars. The airframes bore a resemblance to those of Russian Orlan-10 drones, several of which have been shot down by rebel forces in Syria. The craft may thus have been a cheap, garage-built copy of captured kit.

Guerrillas have been using commercial drones since 2015. Islamic State (IS), one of the groups active in Syria, makes extensive use of quadcopters to drop grenades. In 2017 alone the group posted videos of over 200 attacks. IS has also deployed fixed-wing aircraft based on the popular Skywalker X8 hobby drone. These have longer ranges than quadcopters and can carry bigger payloads. Other groups in Syria, and in Iraq as well, employ similar devices. Their use has spread, too, to non-politically-motivated criminals. In October, four Mexicans allegedly linked to a drug cartel were arrested with a bomb-carrying drone…

Existing defences are not geared up to cope with small drones, which are difficult to spot, identify and track, and which may be too numerous to stop. Jamming might be thought an obvious solution….Many jammers, with names like Dedrone, DroneDefender and DroneShield, have already been employed by various countries. …Drones are, however, becoming increasingly autonomous. This means there is no operator link to jam…But new technologies such as optical navigation (which permits a drone to compare its surroundings with an on-board electronic map, and thus to know where it is) will make even GPS jammers useless. Hence the need for “kinetic solutions”, to shoot drones down.

Small drones are surprisingly hard targets, however. Iraqi forces in Mosul used to joke that trying to deal with an IS drone attack was like being at a wedding celebration: everyone fired their Kalashnikovs into the air with no effect. A recent American army manual …suggests that rather than aiming directly at a drone, the entire squad should fire their weapons at a fixed point ahead of it, hoping to bring the small drones down with a curtain of fire. The manual also advises commanders that the best course of action may be “immediate relocation of the unit to a safer location”….

A similar problem applies at sea, where billion-dollar ships might have their defences overwhelmed by squadrons of cheap, jerry-built drones. The mainstay of American naval air defence is Aegis, an orchestrated arrangement of radars, computers, missiles and cannons. The short-range element of Aegis is a Dalek-like, rapid-fire cannon called Phalanx, which spits out 75 rounds a second and can shoot down incoming cruise missiles. This will not cope well with lots of small drones, though. The navy is now upgrading Aegis’s software to handle multiple simultaneous incoming targets by scheduling bursts of fire to destroy as many members of a swarm as possible. It is doubtful, however, whether one gun could account for more than a handful of attackers coming in from all directions at once. An unclassified study suggests that it could be overwhelmed by as few as eight [handcrafted drones].

Developers of drone-countering measures hope to overcome that by using laser weapons…An American army document from 2016 thus emphasises the importance of stopping drones “left of launch”—that is, before they can take off. IS drone workshops and operators have been attacked to stop the drone threat… Until adequate defences are in place, then, guerrilla drone swarms will be a real danger.

Excerpt from Buzz, buzz, you’re dead, Economist, Feb. 10, at 70

Thugs and Lambs: the war in Yemen

A withering United Nations report on Yemen’s civil war provides fresh evidence about the extent to which Saudi Arabia and Iran have intervened in the conflict, pursuing their regional proxy war even as Yemen disintegrated into “warring statelets” that would be difficult to reunite. The U.N. panel said there were “strong indications of the supply of arms-related material manufactured in, or emanating from, the Islamic Republic of Iran,” in violation of a U.N. embargo on Yemen.

The U.N. experts were particularly critical of airstrikes by the Saudi-led coalition. The U.N. previously had said that the majority of the more than 5,000 civilian deaths in the conflict are a result of the airstrikes, which are carried out by a handful of coalition countries including Saudi Arabia and the United Arab Emirates, often using U.S.-supplied munitions.  The report, which has not yet been made public, was obtained by The Washington Post…

Eight million people, or a third of the Yemen’s population, are facing famine. A cholera outbreak that has affected roughly a million people is one of the largest ever recorded. More than 10,000 people have been killed since the war began…

At least four attacks on Saudi Arabia were carried out with missiles capable of a range “beyond that normally expected of the known missiles” in the Houthi arsenal, the panel said. The U.N. panel examined the remnants of two of the missiles – fired July 22 and Nov. 4, 2017 – and found they were consistent with the design of an Iranian missile and “almost certainly produced by the same manufacturer.”  While the report criticized Iran for failing to halt the transfer of weapons, the panel could not say with certainty how they were transported to the Houthis or who the supplier was.

In reviewing the conduct of Saudi-led military activity, the U.N. panel examined 10 airstrikes last year that killed 157 people, including 85 children, and found that “measures taken by the Saudi Arabia-led coalition in its targeting process to minimize child casualties, if any, remain largely ineffective.” And a coalition committee tasked with investigating the airstrikes had in some cases denied that strikes had taken place despite “clear evidence” to the contrary, the report said… The panel had corroborated media reports that the United Arab Emirates – part of the Saudi-led military coalition – had tortured prisoners under its control. The Saudi-led coalition, which enforced a blockade on Yemen, was using the “threat of starvation as a bargaining tool and an instrument of war.”The Houthis had carried out extrajudicial executions and mass detentions, fueling a cycle of revenge that “may last for years.”…“Political decision makers on all sides are not bearing the brunt of the war,” the report added. “Yemeni civilians are.”

Excerpts from KAREEM FAHIM A United Nations probe has detailed the fallout of the proxy war in Yemen between the Saudi coalition and Iran,  Washington Post, Jan 12, 2018

Killer Robotic Insects

On November 12, 2017,  a video called “Slaughterbots” was uploaded to YouTube. … It is set in a near-future in which small drones fitted with face-recognition systems and shaped explosive charges can be programmed to seek out and kill known individuals or classes of individuals (those wearing a particular uniform, for example). In one scene, the drones are shown collaborating with each other to gain entrance to a building. One acts as a petard, blasting through a wall to grant access to the others…

[M]ilitary laboratories around the planet are busy developing small, autonomous robots for use in warfare, both conventional and unconventional. In America, in particular, a programme called MAST (Micro Autonomous Systems and Technology), which has been run by the US Army Research Laboratory in Maryland, is wrapping up this month after ten successful years….. Its successor, the Distributed and Collaborative Intelligent Systems and Technology (DCIST) programme, which began earlier this year, is now getting into its stride….Along with flying drones, MAST’s researchers have been developing pocket-sized battlefield scouts that can hop or crawl ahead of soldiers. DCIST’s purpose is to take these autonomous robots and make them co-operate. The result, if the project succeeds, will be swarms of devices that can take co-ordinated action to achieve a joint goal.

If swarms of small robots can be made to collaborate autonomously, someone, somewhere will do it…[Many of these small robots are today] cyclocopters …of less than 30 grams. Such machines can outperform polycopters...Cyclocopter aerodynamics is more like that of insects than of conventional aircraft…Cyclocopters get better as they get smaller. They are also quieter…[Another innovation involves] robots…that hop.One of the most advanced is Salto, developed by the Biomimetic Millisystems Laboratory at the University of California, Berkeley. Salto… has the agility to bounce over uneven surfaces and also to climb staircases…

Bouncing over the rubble of a collapsed building is not the only way to explore it. Another is to weave through the spaces between the debris. Researchers at the Biomimetic Millisystems lab are working on that, too. Their solution resembles a cockroach.

Getting into a building, whether collapsed or intact, is one thing. Navigating around it without human assistance is quite another. For this purpose MAST has been feeding its results to the Defence Advanced Research Projects Agency (DARPA)… The next challenge…is getting the robots to swarm and co-ordinate their behavior effectively.

Excerpt from Miniature Robots: Bot Flies, Economist, Dec. 16, 2017

The Subterraneans

Underground settings are becoming increasingly relevant to global security and safety. Rising populations and urbanization are requiring military and civilian first responders to perform their duties below ground in human-made tunnels, underground urban spaces [e.g. mass transit, water infrastructure] and natural cave networks. Recognizing that innovative, enhanced technologies could accelerate development of critical lifesaving capabilities, DARPA today announced its newest challenge: the DARPA Subterranean Challenge.

The DARPA Subterranean or “SubT” Challenge aims to explore new approaches to rapidly map, navigate, and search underground environments. Teams from around the world will be invited to propose novel methods for tackling time-critical scenarios through unknown courses in mapping subsurface networks and unpredictable conditions, which are too hazardous for human first responders.

“One of the main limitations facing warfighters and emergency responders in subterranean environments is a lack of situational awareness; we often don’t know what lies beneath us,” said Timothy Chung, program manager in DARPA’s Tactical Technology Office (TTO). “The DARPA Subterranean Challenge aims to provide previously unimaginable situational awareness capabilities for operations underground.”

“We’ve reached a crucial point where advances in robotics, autonomy, and even biological systems could permit us to explore and exploit underground environments that are too dangerous for humans,” said TTO Director Fred Kennedy.“Instead of avoiding caves and tunnels, we can use surrogates to map and assess their suitability for use. Through the DARPA Subterranean Challenge, we are inviting the scientific and engineering communities—as well as the public—to use their creativity and resourcefulness to come up with new technologies and concepts to make the inaccessible accessible.

Excerpts from DARPA Subterranean Challenge Aims to Revolutionize Underground Capabilities, Dec. 21, 2017

The Power Plays in Africa

As the overthrow of despot Robert Mugabe entered a stalemate on November 17,  2017, eyes turned to China — Zimbabwe’s largest foreign investor and a key ally — amid speculation over its role in the military coup.Source in Harare believe the Zimbabwean conflict within the ruling party Zanu PF is involving two rival camps has direct links to China and Russia with both countries trying to control and protect their own economic interests.

The army chief General Constantino Chiwenga, visited Beijing l — just days before tanks rolled into the streets of Harare. President Mugabe has been been hostile to the Chinese in recent years accusing them of plundering the countries diamonds worth $15 billion.  On October 2017 First Lady Grace Mugabe was in Russia where she represented her 93-year-old husband at a function where he was honoured with some accolade in Russia at the World Federation of Democratic Youth (WFDY) in Moscow.

“It is a BRICS internal rivalry with both Russia and South Africa on one side trying to protect their economic interests and China on the other side,” a regional think-tank in London said on November 17, 2017… Russia has been investing in several projects in southern African nations, for example, the ALROSA group of diamond mining companies is engaged in several projects in Zimbabwe, while mining and steelmaking company Evraz and Severstal steel and steel-related mining company conduct their business in South Africa.

Russia and South Africa, which together control about 80% of the world’s reserves of platinum group metals, have created a trading bloc similar to OPEC to control the flow of exports according to Bloomberg.

Zimbabwe, Canada, and the U.S. are among other major platinum group metals producers.

Russian and South African officials signed a memorandum of understanding today to cooperate in the industry.South Africa mines about 70 percent of the world’s platinum, while Russia leads in palladium, a platinum group metal used in autocatalysts, with about 40% of output, according to a 2012 report by Johnson Matthey Plc.

According to the Chamber of Mines of Zimbabwe (CMZ) and geologists, Zimbabwe has far bigger platinum reserves than Russia. The country currently has the second known largest platinum reserves after South Africa. Experts say underfunding and limited exploration has over the years stifled growth of the mining sector.

The Zimbabwe chamber is on record saying it seeks to increase production to the targeted 500 000 ounces per annum requires the setting up of base and precious metal smelters and refineries, investment of $2,8 billion in mines, $2 billion in processing plants and between $200 and $500 million to ensure adequate power supply. Already, the country’s major platinum miners – Zimplats, Unki and Mimosa who are currently processing the metal in neighbouring South Africa – have undertaken to construct the refinery….

Miles Blessing Tendi, a lecturer in African history and politics at the University of Oxford, says there is no way to be certain if China knew about Mugabe’s fate but believes China’s respect for sovereignty would make their involvement uncharacteristic.

Excerpt, It gets ugly as Russia and South Africa gang-up against China over Zimbabwe coup, http://www.thezimbabwemail.com/, November 17, 2017

Who is Afraid of North Korea

President Trump agreed in September 2017 to send more of the Pentagon’s “strategic assets” to South Korea on a rotational basis to deter North Korean provocations, but what exactly that means remains something of a mystery.

The U.S. assets — typically defined as submarines, aircraft carriers, nuclear weapons or bombers — have long been involved in the standoff that began with the 1953 Korean Armistice Agreement after open warfare subsided between the two Koreas.

The U.S. Navy typically keeps the movements of its submarines secret, but it also has periodically sent them to port in South Korea. The USS Michigan, an Ohio-class nuclear-powered submarine, has appeared at Busan Naval Base in South Korea at least twice in 2017. It is capable of carrying cruise missiles and elite Navy SEALs, although not ballistic missiles.

More recently, the Navy announced last week it has plans for a massive exercise involving three aircraft carriers — the USS Nimitz, the USS Theodore Roosevelt and the USS Ronald Reagan — and their associated strike groups, each of which include dozens of aircraft and thousands of sailors and Marines.

Excerpts from  Dan Lamothe, In standoff with North Korea, the U.S. keeps deployment of ‘strategic assets’ mysterious, Washington Post, Oct. 29, 2017

The Flourishing Jihadists and their Support Systems

U.S. special forces who accompanied Niger’s military at a meeting of village leaders in Tongo Tongo on Oct. 4, 2017were working in the country’s treacherous western borderlands, a region of shifting tribal allegiances, opaque motives and ethnic grudges going back decades, all feeding into a growing jihadi problem.  Four Americans and five Nigerien troops died after leaving Tongo Tongo and being ambushed and heavily outgunned by fighters armed with automatic weapons and rocket-propelled grenades. The militants are believed to be from a Malian-led militia, Islamic State in the Greater Sahel, which declared allegiance to the overall militant organization in 2015.

One error appears to have been downplaying the danger. The Tillaberi and Tahoua regions in western Niger have been under a state of emergency since March 2017, as Niger has confronted the Islamic State offshoot, led by Malian extremist Abu Walid Sahrawi. U.S. forces have been present in the region to advise and assist Nigerien forces.

The United Nations has cataloged 46 attacks by extremists in western Niger since February 2016, including a February 2017 attack that killed 15 Nigerien soldiers and one a year ago that killed 22 Nigerien forces at a refugee camp.,,

Niger’s interior minister, Mohamed Bazoum, said intelligence failures were to blame for the nine deaths. He said Islamic State in the Greater Sahel is more entrenched in local communities than are government forces.

Adam Sandor, an analyst on violent extremism in the Sahel at the University of Ottawa, said….“Essentially, the attackers are believed to have been scoping out and planning the attack and must have a knowledge of local communities in the area. Local communities most likely shared with them the information regarding the Nigerien Armed Forces operating with foreigners or military advisors in this space,” he said.  Leaders of Tongo Tongo village have been arrested, amid suspicions they were delaying the departure of the Nigerien and U.S. forces to pave the way for the attackers.

America has 6,000 troops in 50 countries across the continent, according to the Department of Defense, although many of the missions are charged with guarding U.S. embassies. The counter-terrorism deployments include an estimated 1,000 special operations forces, many posted in high-risk locations such as Somalia, Mali and Nigeria. An estimated 800 troops are in Niger.  The U.S. also operates a string of drone bases throughout Africa, including one in Niger.

The Shabab is the deadliest of Africa’s terrorist groups and is believed to be responsible for the country’s worst terrorist attack: At least 358 people were killed Oct. 14, 2017 and 56 are still missing. The attack came weeks after a U.S. drone strike killed 10 civilians, including three children, in Bariire, west of Mogadishu.  The U.S. has carried out at least 60 drone strikes in Somalia since January 2017, according to the Bureau of Investigative Journalism, killing up to 510 people, including at least 38 civilians. The Shabab has killed 2,745 people in 2017, carrying out 987 of the continent’s 1,827 incidents of violent extremism in the first nine months of the year, according to the analytical group African Center for Strategic Studies.

The Shabab also has a presence in Kenya, where it launches regular attacks, including the 2013 Westgate shopping mall massacre that killed at least 67 people, and the 2015 Garissa University College attack, where 147 people — mainly university students — were killed. The terrorist group is believed to have a presence across East Africa.

Boko Haram, operating in Nigeria, Cameroon, Chad and southeastern Niger, was responsible for 2,232 deaths in the first nine months of the year, according to the Bureau of Investigative Journalism.

In Mali, myriad armed extremists operate, including Islamic State in the Greater Sahel and its rival the Group for the Support of Islam and Muslims, formed in March 2017 from several Al Qaeda-linked extremist groups, including Al Qaeda in the Islamic Maghreb. In 2012, Islamist militias took over half of the country before the French military drove them out of major cities.

The militias range freely across rural areas, crossing borders at will, launching operations in Mauritania, Ivory Coast and Burkina Faso, including attacks on hotels and resorts popular with foreigners.   In the Democratic Republic of Congo, where myriad rebel groups vie for control over mineral resources, a new organization emerged recently declaring fealty to Islamic State.  By comparison, Niger is one of the more stable countries in the region, making it the U.S. choice for a drone base being built outside Agadez, in central Niger, that will launch strikes across the region.

The Tongo Tongo attack has focused attention on Sahel leader Sahrawi…. He has a history of swapping sides and financing his operations through kidnappings.  He has recruited fighters from among the Fulani nomads in western Niger, exploiting ethnic rivalries with the Daoussahak people in the region, some of whom have formed a militia called the National Movement for the Liberation of Azawad. Both Niger and France have used the group as a proxy force to fight Islamic State in the Great Sahel, deepening ethnic animosities.

Excerpts from After Niger attack, a look at clandestine jihadis posing a growing danger to U.S. forces in Africa, L.A. Times, Oct. 21, 2017

Trapped to Death

By the start of 2017 the Taliban was pushing hard to take Sangin city’s district centre, Afghanistan, a fortified compound which housed the local security and administrative officials, just a few miles from Hamid Gul’s family home. The compound was the only thing stopping the Taliban from claiming the whole district as their own. The US, which had lost at least 70 of its own troops keeping Sangin out of insurgent hands over the years, scrambled to respond with scores of airstrikes.  Hamid was convinced that his family were still safer behind Taliban lines than in Laskhar Gah, one of the Taliban’s prime targets. But on the morning of February 10 2017, he got an unexpected phone call from a neighbour in Sangin: the family’s house had been flattened.  In that one night Hamid Gul lost his 50 year-old mother, Bibi Bakhtawara, six brothers and a sister. All seven children were under 16 years of age. Bibi Rahmania, his niece, also died. She was just two years old.

By the end of those three days, five women and 19 children were dead
Hamid was not the only person given devastating news on that day. On the same night, a few hours later, a second civilian house, just a few miles away from his own, was also hit. The following night a third one was struck.

To this day, there is no consensus about what happened to those three houses and why. What is clear, however, is that by the end of those three days in early February five women and 19 children were dead, among a full toll of 26 civilians, a Bureau investigation has established.

Three local officials interviewed by Bureau reporters on the ground claimed US airstrikes had destroyed the houses and killed their inhabitants. The United Nations (UN) said the same, in its biannual accounting of Afghan civilians killed in the war, released in July 2017, adding that there appeared to have been no fighting in the area at the time, meaning the attacks may have been pre-planned.

A spokesperson for Resolute Support, the US-led Nato mission in Afghanistan, told the Bureau that after four investigations the organisation could not confirm or deny responsibility for killing the civilians, though he pushed back strongly against the UN’s claims that there was no fighting in the villages at the time. Resolute Support has officially concluded the case as “disputed”, one of four categories for recording allegations of civilian casualties. It was used in this case because Resolute Support cannot decide if insurgents or the Afghan National Security Forces (ANSF) were responsible for the casualties, the spokesperson told the Bureau.

The fact that no-one has taken responsibility for the deaths of 24 women and children offers an insight into the lack of accountability of America’s longest-running conflict, which it now fights largely from the air under opaque rules of engagement against 20-odd armed groups.

Excerpts from  Caught in the crossfire
Civilians are bearing the brunt of conflict in Afghanistan, Bureau of Investigative Journalism, Sept. 30, 2017

The Meaning of Forever: permanent military presence

UK Foreign Minister Michael Fallon cemented a raft of military agreements with Oman in August 2017, including the use of an Arabian Sea port for British naval ships.  Fallon visited the sultanate on August 28, 2017 to sign agreements with his counterpart and strengthen the already close military ties between the two countries.  A memorandum of understanding was signed between the two defence ministers to allow British naval ships to the use facilities at Duqm port before the establishment of the UK Joint Logistics Support Base.  “This agreement ensures British engineering expertise will be involved in developing Duqm as a strategic port for the Middle East, benefiting the Royal Navy and others,” Fallon said….Among the craft that will be allowed to dock in Duqm is the HMS Queen Elizabeth aircraft carrier, the largest ship in the British navy.   From Duqm, the supercarrier will be able to “project influence across an important region” the UK foreign office said.

The Joint Logistics Support Base*** will give the UK a “permanent” military presence in Oman, serving as a naval base, training facility, and key logistics centre, the foreign office said on its website.

Also finalised were joint exercises between the two countries, including “Saif Sareea 3” due to take place next year in Duqm.  Oman and the UK have some of the strongest military relations in the Gulf, strengthened after Sultan Qaboos bin Said took to the throne in 1970.  The UK was a key ally in the sultan’s war against communist separatists in the south of the country.  British military officers have traditionally trained the Omani armed forces, while the UK has been a notable arms supplier including the sale of 12 Typhoon “Eurofighters” with the first jets delivered in May

Excerpts from UK secures use of Oman naval base in Duqm, The New Arab, Aug. 29, 2017

***Once completed, the UK Joint Logistics Support Base, a multi-million pound joint venture between British defence company Babcock International and the Oman Drydock Company, will provide the UK a permanent training facility in addition to a key military logistics centre in the Gulf. It will also be connected to other Gulf countries by the Gulf Rail Project.

The Deadly Combination

Two North Korean shipments to a Syrian government agency responsible for the country’s chemical weapons program were intercepted in mid-2017 according to a confidential United Nations report on North Korea sanctions violations.  The report by a panel of independent U.N. experts, which was submitted to the U.N. Security Council in August 2017 and seen by Reuters gave no details on when or where the interdictions occurred or what the shipments contained.  “The panel is investigating reported prohibited chemical, ballistic missile and conventional arms cooperation between Syria and the DPRK (North Korea),” the experts wrote in the 37-page report.

“Two member states interdicted shipments destined for Syria. Another Member state informed the panel that it had reasons to believe that the goods were part of a KOMID contract with Syria,” according to the report.

KOMID is the Korea Mining Development Trading Corporation.  It was blacklisted by the Security Council in 2009 and described as Pyongyang’s key arms dealer and exporter of equipment related to ballistic missiles and conventional weapons. In March 2016 the council also blacklisted two KOMID representatives in Syria.  “The consignees were Syrian entities designated by the European Union and the United States as front companies for Syria’s Scientific Studies and Research Centre (SSRC), a Syrian entity identified by the Panel as cooperating with KOMID in previous prohibited item transfers,” the U.N. experts wrote.  SSRC has overseen the country’s chemical weapons program since the 1970s.

The U.N. experts said activities between Syria and North Korea they were investigating included cooperation on Syrian Scud missile programs and maintenance and repair of Syrian surface-to-air missiles air defense systems….The experts said they were also investigating the use of the VX nerve agent in Malaysia to kill the estranged half-brother of North Korea’s leader Kim Jong Un in February.
North Korea has been under U.N. sanctions since 2006 over its ballistic missile and nuclear programs…Syria agreed to destroy its chemical weapons in 2013 under a deal brokered by Russia and the United States. However, diplomats and weapons inspectors suspect Syria may have secretly maintained or developed a new chemical weapons capability.

During the country’s more than six-year long civil war the Organisation for the Prohibition of Chemical Weapons has said the banned nerve agent sarin has been used at least twice, while the use of chlorine as a weapon has been widespread. The Syrian government has repeatedly denied using chemical weapons.

On September 7, Israel targeted and heavily damaged a SSRC weapons factory in Masyaf Syria.

Excerpts from Michelle Nichols North Korea shipments to Syria chemical arms agency intercepted: U.N. report, Reuters, Aug. 21, 2017
Excerpts from Israel Hits Syrian Site Said to be Linked to Nuclear Weapons, Reuters, Sept. 7, 2017

Battle of 1500 Chagossians: Diego Garcia

On June 22nd, 2017 the UN weighed in on a dispute between Britain and Mauritius over the Chagos islands, a tiny but strategically important archipelago in the Indian Ocean. Ninety-four countries sided with Mauritius; just 15 backed Britain… Only four members of the EU voted with Britain; one, Cyprus, voted with Mauritius and 22 abstained, including usually reliable allies France, Germany, Italy, the Netherlands and Spain.

The roots of the dispute go back to 1965, when Britain lopped off the Chagos islands from Mauritius, at the time a British colony. It loaned the largest island, Diego Garcia, to America to use as a military base. Since then the atoll, which is within striking distance of east Africa, the Middle East and South-East Asia, has become indispensable for America’s armed forces, who nickname it “the footprint of freedom”. It gives them control over the Indian Ocean and has served as a base for long-range bombers to pummel Afghanistan and Iraq. The CIA used it as a “black site” in its rendition programme.

But taking over Diego Garcia for military use meant deporting some 1,500 Chagossians, mostly to Mauritius and the Seychelles. They have never been allowed to return; many moved to Britain. (After landing at Gatwick airport, they were given temporary accommodation nearby in Crawley, where most of them still live.)

The importance of the vote should not be exaggerated. It refers the case to the ICJ, whose opinion will be non-binding….The ICJ will probably offer an advisory opinion on the matter, but not before the spring of 2019.

Excerpt from: Britain and Diego Garcia: Tropical Storm, Economist, July 1, 2017

Scientific Torture

Was the Central Intelligence Agency’s post-9/11 “enhanced interrogation” program an instance of human experimentation?

Recently declassified documents raise this explosive question. The documents were obtained by the American Civil Liberties Union in connection with a federal lawsuit scheduled for trial on September 2017. The case was brought on behalf of three former detainees against two psychologists who developed the C.I.A.’s program..[T]he C.I.A. paid the psychologists to develop a research methodology and instructed physicians and other medical staff members at clandestine detention sites to monitor and chart the health conditions of detainees.

In response, the advocacy group Physicians for Human Rights has charged that the program was an unlawful experiment on human beings. It calls the program “one of the gravest breaches of medical ethics by United States health professionals since the Nuremberg Code,” the ethical principles written to protect people from human experimentation after World War II. In its lawsuit, the A.C.L.U. is pressing a similar claim….

To some degree, the documents suggest, the two psychologists resisted pressure within the C.I.A. for rigorous assessment of the program’s efficacy. They argued that interrogation strategies can’t be standardized and therefore can’t be compared, like medical treatments, in randomized, prospective fashion. But backers of more systematic assessment seem to have won out. In an undated document, the C.I.A.’s chief of medical services chided Dr. Mitchell and Dr. Jessen for treating the torture program as an “art form” that “could not be objectively analyzed,” then pressed the “need to look more objectively for the least intrusive way to gain cooperation.”…

Given that, in the words of President Barack Obama, “we tortured some folks,” isn’t it better to have learned something about the toll on bodies and minds?… Here’s why it may be….Prohibiting data collection as an adjunct to torture makes it harder for perpetrators to hone their technique. It stands in the way of efforts to make torture, like some medical procedure, “safe and effective.” And it keeps apologists from rationalizing that abuse is acceptable since researchers are making improvements.  Observational studies of the torturer’s craft victimize people by legitimizing it. And they put future captives at greater risk for becoming victims.

Excerpts from  M. GREGG BLOCHE , When Torture Becomes Science, New York Times, Aug. 12, 2017 full article

Secret Trade Deals – Role of Wikileaks

On August 11, 2015 WikiLeaks has launched a campaign to crowd-source a €100,000 reward for Europe’s most wanted secret: the Transatlantic Trade and Investment Partnership (TTIP).

Starting pledges have already been made by a number of high profile activists and luminaries from Europe and the United States….Since it began to face opposition from BRICS countries at the World Trade Organisation, US policy has been to push through a triad of international “trade agreements” outside of the WTO framework, aimed at radically restructuring the economies of negotiating countries, and cutting out the rising economies of Brazil, Russia, India, China and South Africa (BRICS).

The three treaties, the “Three Big T’s”, aim to create a new international legal regime that will allow transnational corporations to bypass domestic courts, evade environmental protections, police the internet on behalf of the content industry, limit the availability of affordable generic medicines, and drastically curtail each country’s legislative sovereignty.  Two of these super-secret trade deals have already been published in large part by WikiLeaks – the Transpacific Partnership Agreement (TPP) and the Trade in Services Agreement (TISA) – defeating unprecedented efforts by negotiating governments to keep them under wraps.

But for Europeans the most significant of these agreements remains shrouded in almost complete secrecy. The Transatlantic Trade and Investment Partnership (TTIP), which is currently under negotiation between the US and the European Union, remains closely guarded by negotiators and big corporations have been given privileged access. The public cannot read it.

Today WikiLeaks is taking steps to ensure that Europeans can finally read the monster trade deal, which has been dubbed an “economic NATO” by former US Secretary of State Hillary Clinton.  Using the new WikiLeaks pledge system everyone can help raise the bounty for Europe’s most wanted leak. The system was deployed in June to raise a $100,000 bounty for the TTIP’s sister-treaty for the Pacific Rim, the TPP.

The pledge system has been hailed by the New York Times as “a great disrupter”, which gives “millions of citizens… the ability to debate a major piece of public policy,” and which “may be the best shot we have at transforming the [treaty negotiation] process from a back-room deal to an open debate.”

WikiLeaks founder Julian Assange said,

“The secrecy of the TTIP casts a shadow on the future of European democracy. Under this cover, special interests are running wild, much as we saw with the recent financial siege against the people of Greece. The TTIP affects the life of every European and draws Europe into long term conflict with Asia. The time for its secrecy to end is now.”

Excerpts from WikiLeaks goes after hyper-secret Euro-American trade pact

Mosaic Warfare: how to fight like a network

DARPA’s Strategic Technology Office (STO) on August 4, 2017 unveiled its updated approach to winning or deterring future conflicts. The foundation of STO’s new strategy rests on the recognition that traditional U.S. asymmetric technology advantage—such as highly advanced satellites, stealth aircraft, or precision munitions—today offer a reduced strategic value because of growing global access to comparable high-tech systems and components, many of which are now commercially available. Additionally, the high cost and sometimes decades-long development timelines for new military systems can’t compete with the fast refresh rate of electronics component technology on the commercial market, which can make new military systems obsolete before they’re delivered.

STO’s updated strategy seeks a new asymmetric advantage—one that imposes complexity on adversaries by harnessing the power of dynamic, coordinated, and highly autonomous composable systems.

“We’ve developed a technology-based vision that would enable highly complex, strategic moves by composing multiple contributing systems to enable what might be thought of as ‘mosaic warfare,’ in which individual components can respond to needs in real time to create desired outcomes,” said Tom Burns, director of STO. “The goal is to fight as a network to create a chain of effects—or, more accurately because these effects are not linear, ‘effects webs’—to deter and defeat adversaries across multiple scales of conflict intensity. This could be anything from conventional force-on-force battles to more nebulous ‘Gray Zone’ conflicts, which don’t reach the threshold of traditional military engagements but can be equally disruptive and subversive.”

U.S. military power has traditionally relied upon monolithic military systems where one type of aircraft, for example, is designed to provide a single end-to-end capability tailored to a very specific warfighting context—and be a significant loss if shot down. In contrast, the composable effects webs concept seeks a mosaic-like flexibility in designing effects for any threat scenario. By using less expensive systems brought together on demand as the conflict unfolds, these effects webs would enable diverse, agile applications—from a kinetic engagement in a remote desert setting, to multiple small strike teams operating in a bustling megacity, or an information operation to counter an adversary spreading false information in a population threatening friendly forces and strategic objectives. Mosiacs can rapidly be tailored to accommodate available resources, adapt to dynamic threats, and be resilient to losses and attrition.

This means that even if an adversary can neutralize a number of pieces of the mosaic, the collective can instantly respond as needed to still achieve the desired, overall effect.”…The mosaic strategy is also anticipated to change the way the military thinks about designing and buying future systems. Instead of spending years or even decades building exquisite, monolithic systems to rigid requirements, future acquisition programs would be able to buy mosaic “tiles” at a rapid, continuous pace. The true power of the new capabilities will come from the composite mosaic effects.

The approach will draw in part on a number of existing DARPA programs that are developing enabling technologies to achieve the challenging mosaic warfare architecture, including: The Complex Adaptive System Composition And Design Environment (CASCADE) program is addressing composition of existing and new systems; the System of Systems Integration Technology and Experimentation (SoSITE) program is focused on integrating the various systems to work together; Distributed Battle Management (DBM) and Resilient Synchronized Planning and Assessment for the Contested Environment (RSPACE) are addressing battle management command and control; and Communications in Contested Environments (C2E) and Dynamic Network Adaptation for Mission Optimization (DyNAMO) are focused on seamless, adaptable communications and networking.

Excerpts from Strategic Technology Office Outlines Vision for “Mosaic Warfare”, DARPA Press Release, Aug. 4, 2017

Privatization for Obfuscation: military training in Jordan

US military aid to Washington’s key ally in the region –  Jordan – has risen to a staggering $463m in 2016 alone. But little is known about how this money is spent. Who benefits? And who or what is secured by US military funding?

The King Abdullah II Special Operations Training Centre (KASOTC) is the centrepiece of US-Jordanian counterterrorism and intelligence cooperation. It not only offers a base for the training of international Special Forces and Jordanian border guards, but also for military adventure holidays, corporate leadership programmes, and stunt training for actors. While war at KASOTC is an interactive and consumable event for affluent customers, it engenders deadly realities for others.

Following Jordanian approval of a political-military agreement concerning the use of the facility, the US provided $99m of military assistance for the construction of the centre, accounting for a third of the total US military aid to Jordan in 2005. While KASOTC was built by the Army Corps of Engineers Transatlantic Programs Center, it is owned by the Jordanian Armed Forces (JAF), and managed by the Maryland-based limited liability company ViaGlobal.

The ViaGlobal staff based at KASOTC have US military background. Also the board of the company almost exclusively consists of retired US military personnel. Although KASOTC thereby comes close to operating as a US army training centre, its business structure allows both the US and the Jordanian governments to insist that there are indeed no foreign military training centres in the country

According to one ViaGlobal employee, in 2013, 60 percent of the revenues earned at KASOTC came from the training of US soldiers and 20 percent from the training of Jordanian forces.  KASOTC offers its customers what its construction manager imagined to be an environment that is just like what soldiers might encounter with terrorists. Besides a fake Afghan village, a real Airbus 300, a mock city, and a sniper range, KASOTC also features its own artificial refugee camp. The simulation of a typical terrorist environment is further enhanced by the use of thousands of sound and smell effects, fog generators, and rooftop explosions…

As part of its Annual Warrior Competition, KASOTC for instance invitesSpecial Forces units from all over the world to what its business manager, a former US marine, in 2013 aptly called the Olympics of Special Forces.   The event itself primarily serves PR purposes and is sponsored by international weapons producers. In return for their sponsoring, the latter can directly showcase their products to the participating units.

Excerpts from Benjamin Schuetze, Jordan’s KASOTC: Privatising anti-terror training, AlJazeera, July 17, 2018

Spreading the War Bug

Foreign Policy reported recently that key officials within the Trump administration are “pushing to broaden the war in Syria, viewing it as an opportunity to confront Iran and its proxy forces on the ground there”. The strategy was being advocated over objections from the Pentagon, but it doesn’t seem to be deterring the White House.  As the Washington Post made clear just a few days ago, Iranian and US forces have already been directly clashing in the region, and officials are busy planning the “next stage” of the Syria war once Isis is defeated – a plan that centers around directly attacking the Iranians….

Just this weekend, Politico quoted key Republican senator Tom Cotton saying: “The policy of the United States should be regime change in Iran.” The CIA has already expanded its Iranian covert operations, while the main White House liaison to intelligence agencies, Ezra Cohen-Watnick, has reportedly“told other administration officials that he wants to use American spies to help oust the Iranian government”. And US secretary of state Rex Tillerson, in little noticed comments to Congress last week, called for “regime change” in Iran as well (albeit a “peaceful” one – whatever that means)…

The Trump administration’s plans may not stop in Syria either. Some officials have allegedly also been pushing for the Pentagon to step up its support of Saudi Arabia’s appalling war in Yemen, which has left 20 million people on the verge of starvation – all to go after Iranian-backed forces in the region as well.

All this comes as the Trump administration ramps up war across the Middle East. They are conducting drone strikes at a rate almost four times that of the Obama administration; civilian deaths from US forces in Syria have skyrocketed; special operations in Somalia have been ramping up; and the Pentagon is sending thousands of more troops to Afghanistan.

Excerpt from: Trevor Timm, Trump administration Donald Trump’s bloodlust for war in the Middle East risks chaos, Guardian, June 27, 2017

The Brutal Kangaroos

On June 22nd 2017, WikiLeaks published documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives…

The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as “primary host”) and installs the BrutalKangaroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked.

Excerpts from Brutal Kangaroo Press Release Wikileaks, June 22, 2017

Firing Back with Vengeance: the NSA Weapons

The strike on IDT, a conglomerate,… was similar to WannaCry in one way: Hackers locked up IDT data and demanded a ransom to unlock it.  But the ransom demand was just a smoke screen for a far more invasive attack that stole employee credentials. With those credentials in hand, hackers could have run free through the company’s computer network, taking confidential information or destroying machines….Were it not for a digital black box that recorded everything on IDT’s network, …the attack might have gone unnoticed.

Scans for the two hacking tools used against IDT indicate that the company is not alone. In fact, tens of thousands of computer systems all over the world have been “backdoored” by the same N.S.A. weapons. Mr. Ben-Oni and other security researchers worry that many of those other infected computers are connected to transportation networks, hospitals, water treatment plants and other utilities…

Both WannaCry and the IDT attack used a hacking tool the agency had code-named EternalBlue. The tool took advantage of unpatched Microsoft servers to automatically spread malware from one server to another, so that within 24 hours… hackers had spread their ransomware to more than 200,000 servers around the globe. The attack on IDT went a step further with another stolen N.S.A. cyberweapon, called DoublePulsar. The N.S.A. used DoublePulsar to penetrate computer systems without tripping security alarms. It allowed N.S.A. spies to inject their tools into the nerve center of a target’s computer system, called the kernel, which manages communications between a computer’s hardware and its software.

In the pecking order of a computer system, the kernel is at the very top, allowing anyone with secret access to it to take full control of a machine. It is also a dangerous blind spot for most security software, allowing attackers to do what they want and go unnoticed. In IDT’s case, attackers used DoublePulsar to steal an IDT contractor’s credentials. Then they deployed ransomware in what appears to be a cover for their real motive: broader access to IDT’s businesses…

But the attack struck Mr. Ben-Oni as unique. For one thing, it was timed perfectly to the Sabbath. Attackers entered IDT’s network at 6 p.m. on Saturday on the dot, two and a half hours before the Sabbath would end and when most of IDT’s employees — 40 percent of whom identify as Orthodox Jews — would be off the clock. For another, the attackers compromised the contractor’s computer through her home modem — strange.

The black box of sorts, a network recording device made by the Israeli security company Secdo, shows that the ransomware was installed after the attackers had made off with the contractor’s credentials. And they managed to bypass every major security detection mechanism along the way. Finally, before they left, they encrypted her computer with ransomware, demanding $130 to unlock it, to cover up the more invasive attack on her computer.

A month earlier, Microsoft had issued a software patch to defend against the N.S.A. hacking tools — suggesting that the agency tipped the company off to what was coming. Microsoft regularly credits those who point out vulnerabilities in its products, but in this case the company made no mention of the tipster. Later, when the WannaCry attack hit hundreds of thousands of Microsoft customers, Microsoft’s president, Brad Smith, slammed the government in a blog post for hoarding and stockpiling security vulnerabilities.  For his part, Mr. Ben-Oni said he had rolled out Microsoft’s patches as soon as they became available, but attackers still managed to get in through the IDT contractor’s home modem.

There are now YouTube videos showing criminals how to attack systems using the very same N.S.A. tools used against IDT, and Metasploit, an automated hacking tool, now allows anyone to carry out these attacks with the click of a button….

“Once DoublePulsar is on the machine, there’s nothing stopping anyone else from coming along and using the back door,” Mr. Dillon said.More distressing, Mr. Dillon tested all the major antivirus products against the DoublePulsar infection and a demoralizing 99 percent failed to detect it.  “We’ve seen the same computers infected with DoublePulsar for two months and there is no telling how much malware is on those systems,” Mr. Dillon said. “Right now we have no idea what’s gotten into these organizations.”..

Could that attack be coming? The Shadow Brokers resurfaced last month, promising a fresh load of N.S.A. attack tools, even offering to supply them for monthly paying subscribers — like a wine-of-the-month club for cyberweapon enthusiasts.

Excerpts from NICOLE PERLROTHJUNE, A Cyberattack ‘the World Isn’t Ready For’,  New York Times, June 20, 2017

Engineering Revolutions: the CIA

There’s the extremely odd tale of how the CIA imported significant amounts of LSD from its Swiss manufacturer in hopes that it could used for successful mind control. Instead, by dosing thousands of young volunteers including Ken Kesey, Whitey Bulger, and Grateful Dead lyricist Robert Hunter, the Agency accidentally helped popularize acid and generate the 1960s counter-culture of psychedelia.

During the Vietnam War, the U.S. allied with anti-communist forces in Laos that leveraged our support to become some of the largest suppliers of opium on earth. Air America, a CIA front, flew supplies for the guerrillas into Laos and then flew drugs out, all with the knowledge and protection of U.S. operatives.  The same dynamic developed in the 1980s as the Reagan administration tried to overthrow the Sandinista government in Nicaragua. The planes that secretly brought arms to the contras turned around and brought cocaine back to America, again shielded from U.S. law enforcement by the CIA.

Most recently, there’s our 16-year-long war in Afghanistan. While less has been uncovered about the CIA’s machinations here, it’s hard not to notice that we installed Hamid Karzai as president while his brother apparently was on the CIA payroll and, simultaneously, one of the country’s biggest opium dealers. Afghanistan now supplies about 90 percent of the world’s heroin.

The documentary ‘America’s War on Drugs’ on the History Channel makes clear that this is not part of a secret government plot to turn Americans into drug addicts. But, as Moran puts it, “When the CIA is focused on a mission, on a particular end, they’re not going to sit down and pontificate about ‘What are the long-term, global consequences of our actions going to be?’” Winning their secret wars will always be their top priority, and if that requires cooperation with drug cartels which are flooding the U.S. with their product, so be it. “A lot of these patterns that have their origins in the 1960s become cyclical,” Moran adds. “Those relationships develop again and again throughout the war on drugs.”

Excerpt from Jon Schwarz, THE HISTORY CHANNEL IS FINALLY TELLING THE STUNNING SECRET STORY OF THE WAR ON DRUGS,  the Intercept, June 18, 2017

Behavior Mining

Understanding and assessing the readiness of the warfighter is complex, intrusive, done relatively infrequently, and relies heavily on self-reporting. Readiness is determined through medical intervention with the help of advanced equipment, such as electrocardiographs (EKGs) and otherspecialized medical devices that are too expensive and cumbersome to employ continuously without supervision in non-controlled environments. On the other hand, currently 92% of adults in the United States own a cell phone, which could be used as the basis for continuous, passive health and readiness assessment.  The WASH program will use data collected from cellphone sensors to enable novel algorithms that conduct passive, continuous, real-time assessment of the warfighter.

DARPA’s WASH [Warfighter Analytics using Smartphones for Health] will extract physiological signals, which may be weak and noisy, that are embedded in the data obtained through existing mobile device sensors (e.g., accelerometer, screen, microphone). Such extraction and analysis, done on a continuous basis, will be used to determine current health status and identify latent or developing health disorders. WASH will develop algorithms and techniques for identifying both known indicators of physiological problems (such as disease, illness, and/or injury) and deviations from the warfighter’s micro-behaviors that could indicate such problems.

Excerpt from Warfighter Analytics using Smartphones for Health (WASH)
Solicitation Number: DARPA-SN-17-4, May, 2, 2018

See also Modeling and discovering human behavior from smartphone sensing life-log data for identification purpose

SpaceX Falcon

A SpaceX Falcon rocket lifted off from the Kennedy Space Center in Florida on May , 2017 to boost a classified spy satellite into orbit for the U.S. military, then turned around and touched down at a nearby landing pad.

It was the 34th mission for SpaceX, but its first flight for the Department of Defense, a customer long-pursued by company founder Elon Musk. The privately owned SpaceX once sued the Air Force over its exclusive launch services contract with United Launch Alliance (ULA), a partnership of Lockheed-Martin and Boeing.)  The liftoff of a classified satellite for the National Reconnaissance Office (NRO) officially broke ULA’s 10-year monopoly on launching U.S. military and national security satellites.

In addition to the NRO’s business, SpaceX has won two Air Force contracts to launch Global Positioning System satellites in 2018 and 2019.  For now, the military’s business is a fraction of more than 70 missions, worth more than $10 billion, slated to fly on SpaceX rockets. But with up to 13 more military satellite launches open for competitive bidding in the next few years and ULA’s lucrative sole-source contract due to end in 2019, SpaceX is angling to become a majo launch service provider to the Department of Defense.

A month ago, SpaceX for the first time launched one of its previously flown rockets to send an SES communications satellite into orbit, a key step in Musk’s quest to demonstrate reusability and slash launch costs.

Excertps, SpaceX Launches US Spy Satellite on Secret Mission, Nails Rocket Landing, Space.com, May 1, 2017

17+23 Mass Graves in Gongo

The Kamwina Nsapu rebellion is an ongoing rebellion instigated by the Kamwina Nsapu militia against state security forces in the Democratic Republic of the Congo (DRC).  The ilitia are named after Kamwina Nsapu [translating black ant], the tribal chief in the region.  The rebellion takes place in the provinces of Kasaï-Central, Kasaï, Kasai-Oriental and Lomami.   This region supported the opposition in the last presidential election against the current President Joseph Kabila who refused to step down at the end of his final term in office in December 2016,  Tensions flared when the government appointed those close to them rather than tribal chiefs into powerful positions in the local government. In June 2016, Kamwina Nsapu contested the central government’s power and began calling for an insurrection and attacked local police. On 12 August 2016, he was killed alongside eight other militiamen and 11 policemen in Tshimbulu. Upon his death, the Congolese Observatory for Human Rights condemned his killing and suggested he should have been arrested instead. There is an ethnic nature to the conflict with the militia mostly made up of Luba people and they have selectively killed non-Luba people.

On 9 February 2017, fighting erupted in Tshimbulu between 300 militiamen and the armed forces in a reprisal attack by the militia…On 14 February, the United Nations human rights spokeswoman Liz Throssell announced that at least 101 people had been killed by government forces between 9 and 13 February, with 39 women confirmed to be among them.  A few days later, a video showing members of the Congolese military killing civilians in the village of Mwanza Lomba was leaked.’

Investigators working for the United Nations have discovered 17 mass graves in the Central Democratic Republic of Congo, adding to the 23 graves that were recently discovered in the area.

“The discovery of yet more mass graves and the reports of continued violations and abuses highlight the horror that has been unfolding in the Kasais over the last nine months,” UN High Commissioner for Human Rights Zeid Ra’ad Al Hussein said.  The discovery of the graves warrants an investigation by an international body, such as the International Criminal court (ICC).  It has also been reported that at least two women and three girls were raped by government soldiers during the operation.

The Kamuina Nsapu militia group has also been accused of carrying out a series of criminal activities against locals in Central DRC, including killings, abductions, and the recruitment of child soldiers.

Excerpts from Wikipedia and UN Discovers 17 Mass Graves in Central Congo, FacetoFace Africa, Apr. 20, 2017 https://face2faceafrica.com/article/mass-grave-d.

 

Who is Selling Weapons to Yemen

As Yemen’s formal economy collapses, a war economy has taken its place. For a fee, any truck can pass checkpoints without inspection, no matter what it carries. Weapons-smuggling is rife; particularly, says a diplomat, of Saudi-supplied arms. So cheap and plentiful are hand-grenades that Yemenis throw them to celebrate weddings. Sheikhs offer their tribesmen as fighters for neighbouring countries willing to pay for regional influence….

Outsiders have added greatly to the fragmentation of Yemen. Iran has long backed the Houthis with weapons, but ideas are just as lethal an export…Saudi Arabia countered by exporting its own Wahhabi version of Sunni Islam. Radical preachers, such as Muqbil al-Waddai, opened retreats in the desert, where at prayer-time trainees bowed down to Kalashnikovs laid in front of them. With Sunnis concentrated on the coast and in the east, and Shias predominating in the highlands of the north-west, their rival creeds prised the country apart.

Such are the animosities that Yemen, stitched together in 1990, is now disintegrating. The south seethes at the northern bullies who bombarded their roads and sniped at their citizens when they briefly conquered Aden in the early months of the war. The north decries the southern traitors who invited Saudi and Emirati forces to drop bombs on them and isolate them by land, air and sea after the outsiders joined the war in March 2015…

Reluctant to take risks, Saudi pilots fly high, out of range of anti-aircraft fire. That spares Saudi lives, but imprecise bombing increases Yemeni civilian casualties. The UN says over 7,000 Yemenis have been killed in the two years of war. Hospitals were attacked 18 times in 2016.

Hunger is also taking a toll. Yemen imports 90% of its food, so the warring parties control its supply as yet another weapon. Without electricity to keep it cool, much of what gets through perishes. Of some 27m Yemenis, 7m are going hungry, says the UN, almost double the figure in January. Some 3m people have fled their homes, but of Yemen’s neighbours, only Djibouti accepts refugees. Yemen, says the UN, is the world’s largest humanitarian crisis.

Saudi Arabia insists all this is a price worth paying for reinstating the president the Houthis chased out of the capital in 2015…Vowing to push Iran back, the new Saudi king’s impulsive son and defence minister, Muhammad bin Salman, saw a chance to prove his mettle.

But even if the diagnosis was accurate, the prince’s response has been fatally flawed. War has only exacerbated the manageable threat that Saudi Arabia faced at the start. No matter how often its loyal press report victorious advances, the front lines have in fact changed very little. But Saudi Arabia now looks more vulnerable and Iran looms larger than ever. The Houthis mount regular raids dozens of kilometres into Saudi Arabia, often unopposed. Missiles land as far north as Riyadh, most recently striking an airbase there on March 18th, and disable coalition naval vessels in the Red Sea. Scores of Saudi and UAE tanks have been struck. As always, al-Qaeda and Islamic State fill the copious ungoverned spaces, perhaps offering a refuge for fighters fleeing Iraq and Syria. As a war it predicted would quickly end enters its third year, Saudi Arabia seems without an exit strategy. “Yemen [is] in danger of fracturing beyond the point of no return,” said a recent UN report.

All permanent members of the UN Security Council are against the war, but they are all ready to sell Yemen for arms,” says an ex-UN official who worked on Yemen. By night Saudi Arabia launches American-made Reaper combat drones from an American base in Djibouti. In order to buy silence, King Salman promised China $65bn of investment on a visit this month….

Beggar thy neighbourYemen’s war enters its third bloody year, Economist, Mar. 25, 2017

US Special Forces Wars: 2017

Yemen to Syria to Central Africa, the Trump administration is relying on Special Operations forces to intensify its promised fight against the Islamic State and other terrorist groups as senior officials embrace an Obama-era strategy to minimize the American military’s footprint overseas.

In Africa, President Trump is expected to soon approve a Pentagon proposal to remove constraints on Special Operations airstrikes and raids in parts of Somalia to target suspected militants with the Shabab, an extremist group linked to Al Qaeda. Critics say that the change — in one of the few rejections of President Barack Obama’s guidelines for the elite forces — would bypass rules that seek to prevent civilian deaths from drone attacks and commando operations.

The global reach of special operators is widening. During the peak of the conflicts in Iraq and Afghanistan, nearly 13,000 Special Operations forces were deployed on missions across the globe, but a large majority were assigned to those two countries. Now, March 2017, more than half of the 8,600 elite troops overseas are posted outside the Middle East or South Asia, operating in 97 countries, according to the Special Operations Command.  Still, about one-third of the 6,000 American troops currently in Iraq and Syria are special operators, many of whom are advising local troops and militias on the front lines. About a quarter of the 8,400 American troops in Afghanistan are special operators.

In Africa, about one-third of the nearly 6,000 overall troops are Special Operations forces. The only permanent American installation on the continent is Camp Lemonnier [Djibouti], a sprawling base of 4,000 United States service members and civilians in Djibouti that serves as a hub for counterterrorism operations and training. The United States Air Force flies surveillance drones from small bases in Niger and Cameroon.

Elsewhere in Africa, the roles of special operators are varied, and their ranks are small, typically measured in the low dozens for specific missions. Between 200 and 300 Navy SEALs and other special operators work with African allies to hunt shadowy Shabab terrorists in Somalia. As many as 100 Special Forces soldiers help African troops pursue the notorious leader of the Lord’s Resistance Army, Joseph Kony. And Navy SEALs are training Nigerian commandos for action in the oil-rich delta.

The United States is building a $50 million drone base in Agadez, Niger, that is likely to open sometime in 2018 to monitor Islamic State insurgents in a vast area on the southern flank of the Sahara that stretches from Senegal to Chad.  Mr. Trump’s tough talk on terrorism has been well received in Chad, where American Special Operations and military instructors from several Western nations finished an annual three-week counterterrorism training exercise last week.

Excerpts from AERIC SCHMITT, Using Special Forces Against Terrorism, Trump Seeks to Avoid Big Ground Wars, Mar. 19, 2017

Kill Operations in Yemen

The Pentagon has quietly ordered new commando deployments to the Middle East and North Africa amid an unprecedented series of American airstrikes in Yemen, counterterrorism officials tell ABC News.  The moves appear to signal that the U.S. military is kicking off a more aggressive counterterrorism campaign… against Qaeda in the Arabian Peninsula (AQAP) and ISIS strongholds in Syria and areas in North Africa.

The Trump administration in late January 2017 launched the first known ground force operation in Yemen in two years followed by an unprecedented two-dozen or more airstrikes the first week of March 2017 targeting al-Qaeda’s most dangerous affiliate, including airstrikes March 2, 2017 night. This week also saw the killing of al-Qaeda’s overall deputy leader in a U.S. drone strike in northwestern Syria….

Un-announced fresh deployments of elite American commando units from the Army’s Delta Force and Navy SEAL teams continue…

But the first known ground force operation in two years on Jan. 28, 2017 raid by the Navy’s “black ops” counterterror unit, SEAL Team Six, came at a high price.  The experienced operators were caught in a withering mountain gunfight with fighters from AQAP, the only terrorist group which has succeeded three times in smuggling sophisticated bombs aboard U.S.-bound jetliners, which were defused before they exploded.

“There were women straight up shooting at the SEALs,” said a counterterrorism official briefed on the fight, describing the unusual battle, which resulted in one SEAL killed in action, some children in the compound killed by crossfire as the SEALs tried to search buildings and then broke contact, leaving the site aboard MV-22 Osprey aircraft. One Osprey had to make a hard landing, which injured three SEALs and the aircraft had to be destroyed in place by the operators….

One computer hard drive and phones containing a wealth of contact information for al-Qaeda operatives around the region were recovered by the SEALs…While the Yemen operation has become politicized in Washington as having “failed,” with some Democrats questioning whether any intelligence gains were worth the high cost of SEAL Ryan Owens’ life, a $75 million aircraft crashed and children killed in crossfire, military analysts continue “docex” — document exploitation — in an eavesdrop-proof sensitive compartmented information facility….

Excerpts from JAMES GORDON MEEK,US special ops step up strikes on al-Qaeda and ISIS, insiders say, Mar. 3, 2017

 

Power Grid: smart and sensitive

Raytheon Company  and Utilidata have formed a strategic alliance to help power utilities proactively detect, defend against and respond to cyber threats.  The effort will combine Utilidata’s experience in the use of real-time data from the electrical grid to detect and respond to cyber attacks and Raytheon’s expertise in proactive cyber threat hunting, automation and managed security services to provide world-class cybersecurity, analytics and other innovative technologies….

[According to] Scott DePasquale, chairman and CEO of Utilidata. “With more and more devices and systems connected to the internet, and all of them needing electrical power, these challenges are increasing exponentially. This new alliance will help define the future of cybersecurity in the power utilities sector.”  In December 2015, a cyber attack shut down a large section of the Ukrainian power grid – an incident that the Department of Energy identified in the 2017 installment of the Quadrennial Energy Review as an ‘indicator of what is possible.’

Excerpts from  Raytheon, Utilidata to deliver defense-grade cybersecurity for utilities, PRNewswire, Feb. 8, 2017

Drone Strikes: the body count

The U.S. assaults… have been far more deadly than is generally recognized. Military sources say that drone strikes have killed between 20,000 and 25,000 Islamic State operatives in Iraq and Syria. U.S. conventional attacks have killed about 30,000 more, for a total “body count” of over 50,000….The CIA and JSOC both conduct roughly the same number of drone flights every day. But the sources said the military’s drones conducted more than 20,000 strikes over the last year, in Afghanistan, Yemen and Syria, while the CIA is said to have struck less than a dozen targets over that same period.

The CIA oversaw much of America’s drone warfare during the first half of Obama’s presidency, when it was targeting al-Qaida operatives in Pakistan. But the agency’s focus on such counterterrorism “direct action” appears to have diminished over the past several years.

Obama’s  preference for special operations forces and their “small-footprint” tactics, as opposed to big conventional assaults….One unlikely legacy of Obama’s presidency is that he made the secret, once-impermissible tactic of targeted killing the preferred tool of U.S. counterterrorism policy.

Excerpt from David Ignatius, Pentagon and CIA in a terror turf war,  Washington Post. Dec 12, 2016

Kidnapper Satellites: war in space

It was May 2014 when a small team of American airmen monitoring a Russian satellite launch saw something they had never seen before. An object the team thought was a piece of debris from the launch suddenly came to life.  “The one object that we assumed was a piece of debris started to maneuver in close proximity to the (rocket) booster,” recalled Lt. Gen. David Buck …at Vandenberg Air Force Base in California. Buck… said the deliberate maneuvers the mystery object made close to the rocket’s booster were a red flag. Getting that close to another object in space is a complex feat, as objects can move as fast as 17,500 miles per hour….[W]hat the US military was witnessing was not debris at all, but instead a satellite with a dangerous capability, one that could allow it to cozy up next to another satellite and potentially destroy it….

The Russian satellite is officially known as Kosmos 2499 but it has been given a more daunting nickname: “kamikaze,” a spacecraft expressly designed to maneuver up close to another satellite to disable or destroy it. In other words, it’s a satellite that could go on the attack.Retired Gen. William Shelton, the former commander of Air Force space command, likened the satellite to a space Trojan horse. “You could have something on orbit that, for all intents and purposes, looks like a communications satellite, when in actuality, it is also a weapon,” said Shelton.

Kosmos 2499 is far from the only threat. In September 2014, just a few months after Kosmos was placed in orbit, Russia launched an additional satellite named Luch with both maneuvering and spying capabilities.  “This satellite has been maneuvering through geosynchronous space … cozying up close to various communications satellites, listening to what traffic is flowing over those,” said Paul Graziani, CEO of civilian satellite tracker Analytical Graphics, Inc. (AGI).

Over the course of a year, Graziani’s team has watched as Luch parked itself next to three US commercial satellites and one European satellite. The Russians flew the satellite close enough to collect both civilian and, possibly, sensitive military information.  Graziani was charged with delivering the bad news to US-owned commercial satellite company Intelsat…

“If the operators of this spacecraft so chose, they could direct it to actually hit another spacecraft,” said Graziani.  Like Kosmos, Luch’s ability to maneuver has the potential to make it into a satellite killer.

 Launched in 2013, the Shiyan, meaning “experiment” in Chinese, was “experimenting” shadowing the smaller satellite, according to AGI. But then something unexpected happened: The smaller satellite repeatedly disappeared and then reappeared on their screens.“We saw the approach, we saw the larger spacecraft come close to the smaller spacecraft, and then we no longer saw the smaller spacecraft,” said Graziani.

The only reasonable explanation, experts say, is that the Shiyan has a robotic arm that was repeatedly grabbing and then releasing its smaller partner.  The Chinese government acknowledged the satellite’s robotic arm, saying the satellite is “mainly used in space debris observation,” according to the state-run Xinhua News Agency.

But space watchers like Graziani see a more sinister application.  “You could grab and hold of a satellite and maneuver it out of its mission,” said Graziani  If true, it would be a new threatening capability, allowing the Shiyan to essentially kidnap another satellite….

Lasers:  “You can aim a laser at a satellite’s sensor and try to make it hard to see,” said Laura Grego, a scientist with the Union of Concerned Scientists. “Like someone shining a flashlight in your eyes.”With power dialed up high that same laser could permanently fry the satellite’s sensor. But “very expensive and important satellites should have shutters” to block this kind of threat, said Grego, who considers these types of activities more of a nuisance than a space attack.

Space drone: Moving further into the realm of science fiction, the US military has developed the first space drone, the X-37B. Bearing a striking resemblance to the space shuttle, the drone is officially a reusable spacecraft for carrying payloads into space…Its other missions are classified, but the drone’s maneuverability, payload space and ability to stay in orbit for hundreds of days have space watchers and countries like Russia and China wondering whether the X-37B would one day be used as a space fighter jet,

Excerpts from Jim Sciutto and Jennifer Rizzo War in space: Kamikazes, kidnapper satellites and lasers, CNN, Nov. 29, 2016

Best Practices to Capture or Kill

The creation of a new  Joint Special Operations Command (JSOC ) entity,  the “Counter-External Operations Task Force,” this late [November 2016]  in the Obama’s tenure is the “codification” of best practices in targeting terrorists outside of conventional conflict zones, according to the officials who spoke on the condition of anonymity …[These practices]include guidelines for counterterrorism operations such as approval by several agencies before a drone strike and “near certainty” that no civilians will be killed. This series of presidential orders is known as the “playbook.”

The new JSOC task force could also offer intelligence, strike recommendations and advice to the militaries and security forces of traditional Western allies, or conduct joint operations, officials said. In other parts of the world, with weak or no governments, JSOC could act unilaterally…

The new JSOC task force will report to the Pentagon through the U.S. Special Operations Command, or SOCOM, according to U.S. military officials, creating a hybrid command system that can sidestep regional commanders for the sake of speed….But [the problem is that] regional commanders, all four star generals, guard their turf carefully.

Officials hope the task force, known throughout the Pentagon as “Ex-Ops,” will be a clearinghouse for intelligence coordinating and targeting against groups or individuals attempting to plot attacks in places like the United States and Europe.  According to officials familiar with plans for the task force, it will initially draw on an existing multinational intelligence operation in the Middle East that tracks foreign fighters, called Gallant Phoenix, and one of JSOC’s intelligence centers in Northern Virginia.

While in the past the smaller task forces, such as Gallant Phoenix, were staffed by representatives from different intelligence agencies, the new task force aims to have decision-makers present, ensuring that the targeting process happens in one place and quickly…. “There has never been an ex-ops command team that works trans-regionally to stop attacks.”

Excerpts from  Thomas Gibbons-Neff and Dan Lamothe, Obama administration expands elite, Washington Post, Nov.25, 2016

 

 

The Yemen Files

On November 25, 2016,  WikiLeaks released the Yemen Files.The Yemen Files are a collection of more than 500 documents from the United States embassy in Sana’a, Yemen. Comprising more than 200 emails and 300 PDFs, the collection details official documents and correspondence pertaining to the Office for Military Cooperation (OMC) located at the US embassy. The collection spans the period from 2009 until just before the war in Yemen broke out in earnest during March 2015.

Julian Assange said: “The war in Yemen has produced 3.15 million internally displaced persons. Although the United States… is deeply involved in the conduct of the war itself reportage on the war in English is conspicuously rare.”

Yemen is of significant strategic interest as Yemen controls a narrow choke-point to the Red Sea and the Suez Canal through which 11% of the world’s petroleum passes each day. In addition, Yemen borders Saudi Arabia (to the north) and Oman (to the east) and has access to the Arabian Sea, through which another 20% of the world’s petroleum passes from the Strait of Hormuz (including the oil of Saudi Arabia and Iran). Saudi Arabia seeks to control a port in Yemen to avoid the potential constriction of its oil shipments byIran along the Strait of Hormuz or by countries which can control its other oil shipment path along the Red Sea.The Yemen Files offer documentary evidence of the US arming, training and funding of Yemeni forces in the years building up to the war. The documents reveal, among other things, procurement of many different weapon types: aircraft, vessels, vehicles, proposals for maritime border security control and Yemeni procurement of US biometric systems.

See also Yemen File

 

The Quiet Revolution in Space

National security critically depends on space, and the Defense Advanced Research Projects Agency (DARPA) is focused today on creating the capabilities needed to help make that environment a real-time operational domain, DARPA Director Dr. Arati Prabhakar…

“The questions we ask ourselves at DARPA about the space domain … is what would it take to make the space domain robust for everything that we need militarily and for intelligence, and what would it take to make space a real-time operational domain, which it’s not at all today,” the director said, noting that many other nation-states now are active in orbit and space is a domain where conflict is becoming a real possibility.

Through a national security lens, she added, nothing needed from an intelligence or military perspective can be done effectively without access to space. Something as simple as navigation completely depends on GPS in nearly every part of the world and in every operating regime.

In an era of declining budgets and adversaries’ evolving capabilities, quick, affordable and routine access to space is increasingly critical for national and economic security. Today’s satellite launch systems require scheduling years in advance for a limited inventory of available slots and launches often cost hundreds of millions of dollars each. The Defense Advanced Research Projects Agency created its Experimental Spaceplane, or XS-1, program to help overcome these challenges and reduce the time to get capabilities to space. DARPA artist-concept graphics  “Because of the demands on launch, from the day you know you have to put an asset on orbit to the time you can plan on a launch today is still unacceptably long,” Prabhakar said.

Commercial capabilities will help, she added, “but if in a time of war we imagine if we could go to space not in a month or next week but tomorrow, think about how that would completely change the calculus for an adversary that’s thinking about [using an antisatellite] weapon to take out one of our satellites

”With that ambition in mind, DARPA is now starting Phase 2 of its Experimental Spaceplane, or XS-1.“It’s a reusable first stage that’s designed to be able to put 3,000 or 5,000 pounds into low earth orbit … at a very low cost point — a few million dollars — but very significantly the objective on the DARPA program is by the end of the program to fly that spacecraft 10 times in 10 days,” Prabhakar said, “something that’s inconceivable with any of the spacecraft we have today.”

A second piece of the puzzle is what can be done in orbit, she added, referring to low earth orbit, or LEO, an orbit around Earth whose altitude is between 99 and 1,200 miles.

“We’re doing some amazing work with geo[synchronous]-robotics and rethinking [geostationary Earth orbit]-architectures once you have an asset that would allow you to extend the life or do inspection or simple repairs at GEO, which is something you can’t do today.  GEO [geostationary orbit]is a stable region of space 22,370 miles from Earth.  And because GEO is a stable environment for machines — but hostile for people because of high radiation levels — DARPA thinks the key technology there is space robotics.  DARPA’s Phoenix program seeks to enable GEO robotics servicing and asset life extension while developing new satellite architectures to reduce the cost of space-based systems.

The program’s goal is to develop and demonstrate technologies that make it possible to inspect and robotically service cooperative space systems in GEO and to validate new satellite assembly architectures. Phoenix has validated the concept that new satellites could be built on orbit by physically aggregating “satlets” in space, according to DARPA.

Satlets are small independent modules that can attach together to create a new low-cost, modular satellite architecture, DARPA says. Satlets incorporate essential satellite functionality — power supplies, movement controls, sensors and others — and share data, power and thermal management capabilities. DARPA now is working to validate the technical concept of satlets in LEO [Low earth orbit an orbit around Earth whose altitude is between 99 and 1,200 miles.]

Excerpts from  Cheryl Pellerin Director: DARPA Space Projects Critical to Shifting Trajectories , US DOD News, Nov. 22, 2016

 

Mega Data to Uncover Terrorists

DARPA is soliciting research proposals in the area of modeling adversarial activity for the purpose of producing high-confidence indications and warnings of efforts to acquire, fabricate, proliferate, and/or deploy weapons of mass terrorism (WMT)….

The goal of the Modeling Adversarial Activity (MAA) program is  to develop mathematical and computational techniques for the integration and analysis of multiple sources of transaction data … Currently, transaction data is used as a means to validate leads developed from traditional sources such as Signals Intelligence (SIGINT). MAA assumes that an adversary’s WMT activities will result in observable transactions. …

MAA may draw on related domains, including human trafficking, smuggling of drugs, antiquities or rare wildlife species, and illegal arms dealing, during the creation of synthetic data sets to meet the need for a large amount and diverse types of synthetic data….

Excerpt from Broad Agency Announcement Modeling Adversarial Activity (MAA) DARPA-BAA-16-61, September 30, 2016

Space Surveillance Telescope: military use

The most sophisticated space surveillance telescope ever developed is ready to begin tracking thousands of space objects as small as a softball. It’s a boon to space surveillance and science and a new military capability important to the nation and the globe, an Air Force general says.

Developed by the Defense Advanced Research Projects Agency, the Space Surveillance Telescope  (SST) is the most sophisticated instrument of its kind ever developed. It was transferred to the Air Force on Oct. 18, 2016, which has plans to operate it jointly with the Royal Australian Air Force….The Air Force will move the SST to Harold E. Holt Naval Communication Station in Western Australia, operating and maintaining the telescope jointly with the Royal Australian Air Force.The SST also will be a dedicated sensor in the U.S. Space Surveillance Network, operated by the Air Force Space Command.

SST has increased space situational awareness from a narrow view of a few large objects at a time to a widescreen view of 10,000 objects as small as softballs, DARPA says. The telescope also can search an area larger than the continental United States in seconds and survey the entire geosynchronous belt in its field of view –– a quarter of the sky –– multiple times in a night.

Excerpt Advanced Space Surveillance Telescope Has Critical Military Applications, US Department of Defense News, Oct. 22, 2016

Cargo Boxes for Torture, CIA

A warehouse in a tiny Lithuanian village.. not far from the Lithuanian capital city of Vilnius, is thought to be where the alleged 9/11 mastermind Khaled Sheikh Mohamed was held, as well as other prisoners who were subjected to secret confinement by the CIA. It was established in 2004 at the height of the US-led “rendition, detention, interrogation” programme, which saw terror suspects clandestinely captured and transported around the world.

The documents obtained by the Bureau of Investigative Journalism (pdf)  disclose inside details of assistance provided by the Lithuanian State Security Department (SSD) to the CIA.

They take the form of dozens of pages of interview summaries gathered during a 2010 investigation by the Lithuanian state prosecutor which looked at allegations state officials had helped US agents set up a secret prison. The cache, which has been secret up until now, forms part of several hundred pages of material disclosed by the Lithuanian government to the European Court of Human Rights (ECHR) in 2015…

On several occasions, SSD officers describe helping the CIA transfer boxes – which they described as “cargo” – in and out of the facility. The dates of these transfers match those on which lawyers believe that al Qaeda suspects were brought in and out of Lithuania. The boxes were each more than a metre long and needed two people to carry them, the documents say.  Lithuanian officials told prosecutors they did not know what was in the boxes they helped transport, and that although they had access to the building, they did not see all of it.

In shutting down their investigation, Lithuanian prosecutors stated that they had “no data” concerning the “precise purpose of the cargo”. It “could have been communications equipment,” the office concluded.  The country has long denied that CIA prisoners were held on its territory,…But details in the interview summaries correspond closely with findings in a 2014 Senate Intelligence Committee report on CIA secret prisons, which describes how two facilities were set up in the same country. One of them, known as “site Violet”, was used to hold prisoners in 2005 and 2006…

Abu Zubaydah is believed to have been held in Lithuania during 2005-6, and is suing the country for its alleged role in his detention at the ECHR.

Documents declassified by the CIA in June this year suggeLithuania cooperated with the CIA to secretly transfer prisoners and detain them on Lithuanian territory…

Excerpts from Crofton Black, “Site Violet”: How Lithuania helped run a secret CIA prison, Bureau of Investigative Journalism, Oct. 10, 2016

The Hornet’s Nest in Syria

Tensions between Russia and the United States are coming to a head over the civil war in Syria. Washington has suspended bilateral talks with Russia to end the five-year old war. Moscow has suspended an agreement to destroy 34 tons of weapons-grade plutonium that was reached during the year 2000, using especially harsh rhetoric. Meanwhile, Syrian regime forces—with the backing of Russian airpower—are continuing to mount a fierce attack on the partially rebel-held city of Aleppo with Washington seemingly powerless to influence events on the ground….Among the four options that may be under consideration [in the United States] are a no-fly-zone, safe zones, attacking the Syrian air force and arming the Syrian rebels with additional weaponry. But each option carries with it significant risk of escalation or blowback.
While the United States has the capability to defeat Russian and Syrian regime air forces and air defenses, which is necessary to establish a no-fly zone or safe-zone, or to destroy the regime’s airpower, there are several risks from a legal and military standpoint. The legal problem comes from the fact that the United States is not technically at war with the Syria, nor is there a UN resolution authorizing American forces to operate inside that nation… [On the contrary] Russia is invited in by the legitimate regime.

A no-fly zone or safe zone would require U.S. combat aircraft to intercept and possibly shoot down Russian and Syrian warplanes entering into the area designated by Washington and its allies…. [But] It is highly unlikely that any U.S. President would be willing to risk war against a nuclear-armed power with only four months left in office in a conflict with few—if any—vital American interests at stake. The Russians know that and might not be willing to back down in the event of an air-to-air confrontation with American forces because too much national prestige—and even Mr. Putin’s personal prestige—would be on the line. Thus, such an encounter could escalate in unpredictable ways…

A worse option still would be for the U.S. military to attack the Syrian air force and its bases directly since it would an overt act of war against Syria—even more so than a no-fly or safe zone. As Secretary Kerry pointed out, without a U.N. Security Council resolution, the United States does not have legal grounds to go to war. But moreover, the military difficulties with directly attacking Syrian forces are more problematic.

The United States Air Force, Navy and Marine Corps could easily annihilate Syrian and even Russian air defenses—and airpower—inside Syria. Moscow—even with the fearsome capabilities of its S-400 air and missile defense system—is not able to defeat the U.S. Air Force’s fleet of stealthy Lockheed Martin F-22 Raptors, which are able to fly inside zones protected by those system and defeat them. In fact, defeating advanced air defenses is one of the Raptor’s primary missions. Nor would Russian Su-30SM or Su-35S Flankers survive long against the Raptor, which was specifically designed to counter advanced next-generation Soviet fighters that ultimately never materialized….

[But] Russia might not limit its retaliation to just American and NATO forces in Syria. Given Moscow’s arsenal of Kaliber-NK cruise missiles and long-range bombers and submarines, the Kremlin has options to strike back across a huge geographic range. It is not outside realm of the possible that Russia would hit back at U.S. bases in Qatar, United Arab Emirates or Turkey using long-range precision-guided cruise missiles. The Russian Black Sea fleet and the Caspian Sea flotilla can easily hit such targets. Then there is Moscow’s formidable bomber fleet which can target the continental United States itself….

It might be prudent to exercise restraint before launching a new war—against a nuclear-armed power—that the American people don’t necessarily want to fight. That’s especially true in a conflict where the lines are blurry and there are no clear-cut good guys—where even so-called “moderate” rebels backed by the U.S. government are beheading children.  Under such circumstances, the best policy for the United States might simply be to leave well enough alone—there is simply no need to stick our fingers into yet another hornet’s nest.

Excerpts from Dave Majumdar, Why the United States Should Exercise Restraint Before Launching A New War in Syria, National Interest, Oct. 3, 2016

Electronic Warfare: Algorithm Dominance

US Army Secretary Eric Fanning announced [in August 2016] a new Rapid Capabilities Office to accelerate the development of cyber, electronic warfare…That rapid technological progression is on full display, for example, in eastern Ukraine, where Ukrainian soldiers have been battling Russian-backed forces since 2014. For example, Russian-backed separatists have used EW and GPS-spoofing to jam and misdirect the drones that Ukrainian troops use to scope out enemy positions. “Over the past several years we’ve learned from what we’ve seen from Russia and Ukraine, and later in Syria, and from the different capabilities they’ve brought to the battlefield. We’ve seen the combination of unmanned aerial systems and offensive cyber and advanced electronic warfare capabilities and how they provided Russian forces a new degree of sophistication,” said Fanning…

“My guess is … that after 15 years of doing largely counter-insurgency operations in the Middle East, the Army is now taking a look at how it would do large force-on-force conflict in a place like Europe. ”

The pace of innovation in EW — in the form of novel new waveforms that can disrupt an adversary’s electronics, paint enemy stealth aircraft* etc. — has surprised many in the military. That’s because EW innovation has become less and less a hardware challenge and more of a software challenge. You can make a new weapon as quickly as your algorithm can pull together a new waveform from the spectrum. But the military, too often, still procures EW assets the same way it buys jets and boats. Slowly.

Excerpts from To Counter Russia’s Cyber Prowess, US Army Launches Rapid-Tech Office, DefenseOne, Aug. 31, 2016

*Radar-absorbent material (RAM), often paints used on aircraft,: absorb radiated energy from a ground or air based radar station into the coating and convert it to heat rather than reflect it back thus avoiding detection by the radar.

Killing Civilians in Theory and Practice

[T]he long list of errant airstrikes carried out by American warplanes: Weddings, funerals, hospitals and friendly forces have been mistakenly attacked, with each strike prompting fresh outrage.

While most of those killed have been civilians — in Afghanistan alone, the United Nations recorded 1,243 civilians killed in airstrikes between 2009 and 2015 — American-led forces have repeatedly struck friendly forces. It is a pattern that was repeated last weekend with a pair of separate airstrikes in Syria and Afghanistan that have again cast a harsh spotlight on the seeming inability of the United States to avoid hitting the wrong targets in its air campaigns.

[A]lmost all the mistaken strikes over the years have come down to two main reasons: Faulty intelligence, and what military strategists call “the fog of war,” referring to the confusion of the battlefield.

WRONG TARGETS

Many of the deadliest American airstrikes to hit civilians in the last 15 years have taken place in Afghanistan.

·         JULY 1, 2002

An American AC-130 gunship struck an engagement party in the village of Kakrak in Uruzgan Province, killing 48 people.

·         MAY 4, 2009

American airstrikes in the village of Granai in Farah Province killed 147 civilians, the Afghan government said. The United States estimated that 20 to 30 civilians and as many as 65 Taliban fighters had been killed.

·         SEPT. 4, 2009

An American F-15E fighter jet, acting on orders from a German commander, dropped a 500-pound bomb on a tanker truck outside the village of Haji Sakhi Dedby in Kunduz Province, killing at least 70 people, and possibly dozens more.

·         OCT. 3, 2015

An American AC-130 gunship, called in by American Special Forces, struck a hospital run by Doctors Without Borders in Kunduz, killing 42 people…

No matter what the intent, killing civilians by mistake can amount to a war crime, though the military almost never brings criminal charges against those involved. That was the case with the strike on a hospital run by Doctors Without Borders in Kunduz, in northern Afghanistan, in 2015, that killed 42 people. The military’s own investigation found that those who took part in the attack “failed to comply with the” laws of armed conflict, and though 12 service members were disciplined, none faced criminal charges…

One of the issues, experts say, is the culture of the Air Force itself….“One of the core aspects of air power theory is this idea that with enough reconnaissance, with enough data with enough data crunching, we can paint an extremely hyper-accurate picture of the battlefield that is going to not only eliminate accidental strikes, but it’s going to make it so we can strike directly and precisely,” Mr. Farley said.“So in some sense, that kind of extreme optimism about air-power targeting is baked into Air Force culture, is baked into the Air Force cake,” he added.

But bad information leads to bad outcomes. Faulty readings of surveillance from drones and other sources appear to have been involved in the strike in Syria, which infuriated the Syrian government and its Russian backers, further undermining an already shaky cease-fire there.

The attack occurred on September 17, 2016  when fighter jets from the American-led coalition struck what the military believed was an Islamic State position. The attack was methodical and merciless — the jets took run after run over the camp in an effort destroy it, cutting down men as they fled.But about 20 minutes into the strike, Russia notified the United States that the jets were hitting troops loyal to the Syrian government, not the Islamic State. Russia and Syria have since said that more than 60 Syrian troops were killed.

Excerpts from  MATTHEW ROSENBERG,It’s Not Like Hollywood: Why U.S. Airstrikes Go Awry 20, NY Times Sept. 20, 2016

South Sudan as a State

“There is no evidence to suggest that more weapons are required in South Sudan for the government to achieve a stable security environment,” the UN monitors said. “Rather, the continued influx of weapons … contributes to spreading instability and the continuation of the conflict.”

They said while Sudan had provided small arms, bullets and logistical support to opposition troops, they “found no evidence to date that Sudan – or any other neighbouring country – has provided heavy weapons … which has limited the opposition’s ability to mount large-scale operations.”

Two truckloads of ammunition were transferred to the capital Juba from Uganda in June 2016, while in 2015 South Sudanese army chief Paul Malong asked a Lebanese company to begin developing a small ‘arms ammunition manufacturing facility in Juba, the monitors said.

A UN peacekeeping mission (UNMISS) has been in South Sudan since the country gained independence from Sudan in 2011.The UN monitors said that in rhetoric and action, government-affiliated forces “have actively threatened the operations and personnel of UNMISS and other UN agencies, and both parties have continued to target humanitarian workers.”

During the violence in July 2016, between 80 and 100 uniformed soldiers overran Juba’s Hotel Terrain compound, home to the staff of international organizations, and in four hours killed an ethnic Nuer journalist and raped at least five foreign aid workers and other staff working at the compound, the monitors said.The monitors said given the number of soldiers involved, the number of items stolen and the systematic damage inflicted, “this attack was well co-ordinated and cannot be considered as an opportunistic act of violence and robbery.”,,,

A political rivalry between President Salva Kiir, an ethnic Dinka, and opposition leader Riek Machar, a Nuer, sparked the civil war. The pair signed a shaky peace deal a year ago, but fighting has continued. Machar fled the country after the violence between their troops erupted in July 2016

Excerpts South Sudan buying arms as economy collapses – UN panel, Reuters, Sept, 9 2016

Stop the Dirty Bomb

A DARPA program aimed at preventing attacks involving radiological “dirty bombs” and other nuclear threats has successfully developed and demonstrated a network of smartphone-sized mobile devices that can detect the tiniest traces of radioactive materials. Combined with larger detectors along major roadways, bridges, other fixed infrastructure, and in vehicles, the new networked devices promise significantly enhanced awareness of radiation sources and greater advance warning of possible threats.

The demonstration of efficacy earlier this year was part of DARPA’s SIGMA program, launched in 2014 with the goal of creating a cost-effective, continuous radiation-monitoring network able to cover a large city or region. The demonstration was conducted at one of the Port Authority of New York and New Jersey’s major transportation hubs where DARPA tested more than 100 networked SIGMA sensors…

The pocket-sized radiation “pager” sensors developed by DARPA and used in the exercise can be easily worn on a person’s belt, are one-tenth the cost of conventional sensors, and are up to 10 times faster in detecting gamma and neutron radiation. Moreover, the program achieved its price goal of 10,000 pocket-sized detectors for $400 per unit….A large-scale test deployment of more than 1,000 detectors is being planned for Washington, D.C., later this year.

Excerpt from Ushering in a New Generation of Low-Cost, Networked, Nuclear-Radiation Detectors, OUTREACH@DARPA.MIL, Aug. 23, 2016

The Genius Puppetry behind the Syrian War

By most accounts, America’s efforts to covertly train and supply moderate rebels in Syria aren’t going so well. Apart from the obvious (Assad is still firmly entrenched in power and continuing to receive ever-growing external support),The New York Times recently reported that some arms provided by the Central Intelligence Agency (CIA) and Saudi Arabia haven’t quite reached their intended targets. According to the report, some individuals in Jordan’s intelligence bureau — ostensibly partnering to funnel weapons to Assad’s opponents — stole weapons destined for U.S.-backed rebels and instead sold them on the black market…..

American involvement in Syria comes in two main flavors. The first is a limited covert operation to support moderate rebels in their quest to unseat Assad. The second is an overt military campaign to combat ISIL. .

Deliberations over what the United States ought to do militarily in Syria began as early as 2012. The first rebels trained, funded, and armed by the CIA — a small “50-man cell” of fighters — were reported to have arrived in the fall of 2013, a few months after Obama gave the green light. Since then, America’s CIA covert operation against the Syrian regime, known as Timber Sycamore, has grown substantially. In 2014, reports suggested that the United States was “ramping up” its support to the rebels through the provision of TOW anti-tank guided missiles. Earlier this year, The New York Times reported that America wasn’t acting alone. Timber Sycamore had become a joint effort with Saudi Arabia: The Saudis provided cash and arms, while the Americans provided training.

To date, efforts to replace Assad or bring him to the negotiating table haven’t succeeded….[and]America’s efforts to replace Assad are further complicated by a parallel but distinct effort to degrade and destroy ISIL…

Covert intervention allows major powers to “back stage” their role. As a result, any escalatory incidents or clashes can be obscured from the “audience” (i.e. domestic publics and third party states), which preserves face-saving ways to de-escalate. “Back-staging” outside meddling can protect the “front stage” performance of a localized war with limited geopolitical stakes and the potential for diplomatic resolution. The CIA’s Timber Sycamore program embodies this logic in key respects. By rejecting an overt and acknowledged relationship with Syrian rebel groups, the Obama White House has retained greater flexibility to tweak the program as the war evolves. Even relatively porous secrecy may help to evade the daily media reporting, public justifications, and regular congressional involvement that so often accompany overt programs. Moreover, by embracing a “back stage” role in Syria, the United States has avoided a naked geopolitical challenge to other states. Doing so reduces the chances of a public diplomatic crisis should American-supplied weaponry advertently or inadvertently be used in a clash with, say, Iranian personnel in Syria. Russia’s “front stage” air intervention and American overt air strikes against ISIL only strengthens this limited war logic. With Russian and American pilots in the skies, keeping the American program against Russia’s ally in Damascus low-profile makes U.S.-Russian crisis prevention measures easier.

Excerpts from AUSTIN CARSON AND MICHAEL POZNANSKY, THE LOGIC FOR (SHODDY) U.S. COVERT ACTION IN SYRIA, from War on the Rocks, July 21, 2016

How to Make Space Friendly for Military Use

From the DARPA website

The volume of Earth’s operational space domain is hundreds of thousands times larger than the Earth’s oceans. It contains thousands of objects hurtling at tens of thousands of miles per hour. The scales and speeds in this extreme environment are difficult enough to grasp conceptually, let alone operationally, as is required for commanders overseeing the nation’s increasingly critical space assets.

Current [US] space domain awareness tools and technologies were developed when there were many fewer objects in space. Only a few nations could even place satellites in orbit, and those orbits were easily predictable without advanced software tools. That situation has changed dramatically in the past decade with a developing space industry flooding once lonely orbits with volleys of satellite constellations. Despite this much more complex and chaotic environment, commanders with responsibility for space domain awareness often rely on outdated tools and processes—and thus incomplete information—as they plan, assess, and execute U.S. military operations in space.

To help address these technical and strategic challenges, DARPA is launching the first of two planned efforts under the Agency’s new Hallmark program, which has the overarching goal to provide breakthrough capabilities in U.S. space command and control. This first effort, the Hallmark Software Testbed (Hallmark-ST), has as its primary goal the creation of an advanced enterprise software architecture for a testbed for tools that will integrate a full spectrum of real-time space-domain systems and capabilities. The testbed would be used to expedite the creation and assessment of a comprehensive set of new and improved tools and technologies that could be spun off into near-term operational use for the Defense Department’s Joint Space Operations Center (JSpOC) and Joint Interagency Combined Space Operations Center (JICSpOC).

“For example, an intuitive user interface incorporating 3-D visualization technology would present complex information in novel ways and provide commanders with unprecedented awareness and comprehension. An advanced testbed featuring playback and simulation capabilities would significantly facilitate research and development activities, experiments, and exercises to evaluate new technologies for their impact on space command and control capabilities.”

The enterprise architecture would be the backbone of a long-term testbed, the Hallmark Space Evaluation and Analysis Capability (SEAC), anticipated to be located in Northern Virginia.

Excerpts from Hallmark Envisions Real-Time Space Command and Control,  www. darpa. mil, June 17, 2016

See also Hallmark Software Testbed (Hallmark-ST)/Solicitation Number: DARPA-BAA-16-40, June 17, 2016 Federal Business Opportunities

Drones Talk Like Wolves

From the DARPA website:

CODE intends to focus on developing and demonstrating improvements in collaborative autonomy—the capability of groups of UAS to work together under a single person’s supervisory control. The unmanned vehicles would continuously evaluate their own states and environments and present recommendations for coordinated UAS actions to a mission supervisor, who would approve or disapprove such team actions and direct any mission changes. Using collaborative autonomy,

CODE’s envisioned improvements to collaborative autonomy would help transform UAS operations from requiring multiple operators for each UAS to having one mission commander simultaneously directing all of the unmanned vehicles required for the mission. …

CODE’s prototype human-system interface (HSI) is designed to allow a single person to visualize, supervise, and command a team of unmanned systems in an intuitive manner. Mission commanders can know their team’s status and tactical situation, see pre-planned and alternative courses of action, and alter the UASs’ activities in real time.  For example, the mission commander could pick certain individual UASs from a team, circle them on the command station display, say “This is Group 1,” circle another part of the map, and say “Group 1 search this area.”

Companies involved Lockheed Martin Corporation (Orlando, Fla.) and the Raytheon Company (Tucson, Ariz.).  Also:

  • Daniel H. Wagner Associates (Hampton, Va.)
  • Smart Information Flow Technologies, LLC (Minneapolis, Minn.)
  • Soar Technology, Inc. (Ann Arbor, Mich.)
  • SRI International (Menlo Park, Calif.)
  • Vencore Labs dba Applied Communication Sciences (Basking Ridge, N.J.)

 

Excerpts from CODE Takes Next Steps toward More Sophisticated, Resilient, and Collaborative Unmanned Air Systems

Messaging Secrecy: US Military

The United States Department of Defense and DARPA [seek to establish] a secure messaging system that can provide repudiation or deniability, perfect forward and backward secrecy, time to live/self delete for messages, one time eyes only messages, a decentralized infrastructure to be resilient to cyber-attacks, and ease of use for individuals in less than ideal situations….The messaging platform will transfer messages via a secure decentralized protocol that will be secured across multiple channels, including but not limited to: 1) Transport protocol, 2) Encryption of messages via various application protocols, 3) Customized blockchain implementation of message deconstruction and reconstruction, and decentralized ledger implementation

Excerpts from SBIR.defense business. org

A Barbed Wire for Outer Space

In 2007 a missile launch by the Chinese in 2007 blew up a dead satellite and littered space with thousands of pieces of debris. But it was another Chinese launch  in 2013 that made the Pentagon really snap to attention, opening up the possibility that outer space would become a new front in modern warfare.  This time, the rocket reached close to a far more distant orbit — one that’s more than 22,000 miles away — and just happens to be where the United States parks its most sensitive national security satellites, used for tasks such as guiding precision bombs and spying on adversaries.

The flyby served as a wake-up call and prompted the Defense Department and intelligence agencies to begin spending billions of dollars to protect what Air Force Gen. John Hyten in an interview called the “most valuable real estate in space.”..[I]nstead of relying only on large and expensive systems, defense officials plan to send swarms of small satellites into orbit that are much more difficult to target–GPS III is the next generation of GPS satellites..

At the same time..[a]gencies have begun participating in war-game scenarios involving space combat at the recently activated Joint Interagency Combined Space Operations Center. The Pentagon is even developing what is known as the “Space Fence,” which would allow it to better track debris in space.

National security officials are not only concerned that missiles could take out their satellites but also that a craft’s equipment could be easily jammed. Potential enemies could “dazzle” sensors, temporarily blinding them, or deploy tiny “parasitic satellites” that attach to host satellites and do their worst. That could lead to soldiers stranded on the battlefield with little means of communication or missiles that would not be able to find their targets.  “We have considered space a sanctuary for quite some time. And therefore a lot of our systems are big, expensive, enormously capable, but enormously vulnerable,” said Deputy Defense Secretary Robert O. Work.

Pentagon officials say that Russia and China have been developing the capability to attack the United States in space…Pentagon officials fear its satellites could be sitting ducks. Navy Adm. Cecil Haney, commander of the U.S. Strategic Command, said recently that North Korea has successfully jammed GPS satellites, that Iran was busy building a space program and that “violent extremist organizations” were able to access space-based technologies to help them encrypt communications, among other things.

The Pentagon spends $22 billion on space programs and is investing an additional $5 billion in space efforts this year, including $2 billion for what is known as “space control,” which includes its highly classified offensive programs. Hyten declined to discuss the ways in which the United States is preparing to attack other countries in space. But the United States has had the capability to blow up satellites since 1985, when an F-15 fighter pilot fired a missile into space that took out an old military observation satellite.

Excerpts from  Christian Davenport: A fight to protect ‘the most valuable real estate in space, Washington Post, May 9, 2016

Biometrics Gone Wrong

Despite their huge potential, artificial intelligence and biometrics still very much need human input for accurate identification, according to the director of the Defense Advanced Research Projects Agency.  Speaking at  an Atlantic Council event, Arati Prabhakar said that while the best facial recognition systems out there are statistically better than most humans at image identification, that when they’re wrong, “they are wrong in ways that no human would ever be wrong”….

“You want to embrace the power of these new technologies but be completely clear-eyed about what their limitations are so that they don’t mislead us,” Prabhakar said. That’s a stance humans must take with technology writ large, she said, explaining her hesitance to take for granted what many of her friends in Silicon Valley often assume  — that more data is always a good thing.  More data could just mean that you have so much data that whatever hypothesis you have you can find something that supports it,” Prabhakar said

DARPA director cautious over AI, biometrics, Planet Biometrics, May 4, 2016

Unhackable GPS

South Korea has revived a project to build a backup ship navigation system that would be difficult to hack after a recent wave of GPS signal jamming attacks it blamed on North Korea disrupted fishing vessel operations, officials say.Global Positioning System (GPS) and other electronic navigation aids are vulnerable to signal loss from solar weather effects, radio and satellite interference and deliberate jamming.

South Korea, which says it has faced repeated attempts by the rival North to interfere with satellite signals, will award a 15 billion won ($13 million) contract this month to secure technology required to build an alternative land-based radio system called eLoran (enhanced LOng-RAnge Navigation), which it hopes will provide reliable alternative position and timing signals for navigation….

GPS vulnerability poses security and commercial risks, especially for ships whose crews are not familiar with traditional navigation techniques or using paper charts.The General Lighthouse Authorities of the UK and Ireland, which tried to pioneer an eLoran system in Europe, conducted simulated communications attacks on ships at sea and said the results “demonstrated the devastating effects of jamming on the ships’ electronic bridge systems”.The United States, Russia and India are all looking into deploying versions of eLoran, which sends a much stronger signal and is harder to jam, as backup.

Installing an eLoran receiver and antenna on a ship would cost thousands of dollars, although cheaper options could include incorporating eLoran systems into satnav devices, according to technical specialists.

Excerpts from South Korea Revives GPS Backup After Cyber Attack  , euters, May 1, 2016

The Sea Hunter Drone

The Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV) is developing an unmanned vessel optimized to robustly track quiet diesel electric submarines. … capable of missions spanning thousands of kilometers of range and months of endurance under a sparse remote supervisory control model. This includes…autonomous interactions with an intelligent adversary.
Excerpts from Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ASW Continuous Trail Unmanned Vessel (ACTUV))

 

Stolen Nuclear Materials: Iraq

Iraq is searching for “highly dangerous” radioactive material stolen in 2015, according to an environment ministry document and seven security, environmental and provincial officials who fear it could be used as a weapon if acquired by Islamic State.

The material, stored in a protective case the size of a laptop computer, went missing in November 2015 from a storage facility near the southern city of Basra belonging to U.S. oilfield services company Weatherford WFT.N, the document seen by Reuters showed and officials confirmed…

The material, which uses gamma rays to test flaws in materials used for oil and gas pipelines in a process called industrial gamma radiography, is owned by Istanbul-based SGS Turkey, according to the document and officials.  A U.S. official said separately that Iraq had reported a missing specialized camera containing highly radioactive Iridium-192 to the International Atomic Energy Agency (IAEA), the Vienna-based U.N. nuclear watchdog, in November 2015….The environment ministry document, dated Nov. 30 and addressed to the ministry’s Centre for Prevention of Radiation, describes “the theft of a highly dangerous radioactive source of Ir-192 with highly radioactive activity belonging to SGS from a depot belonging to Weatherford in the Rafidhia area of Basra province”…

A senior environment ministry official based in Basra, who declined to be named as he is not authorised to speak publicly, told Reuters the device contained up to 10 grams (0.35 ounces) of Ir-192 “capsules”, a radioactive isotope of iridium also used to treat cancer.

The material is classed as a Category 2 radioactive source by the IAEA, meaning that if not managed properly it could cause permanent injury to a person in close proximity to it for minutes or hours, and could be fatal to someone exposed for a period of hours to days….

Large quantities of Ir-192 have gone missing before in the United States, Britain and other countries, stoking fears among security officials that it could be used to make a dirty bomb…..“They could simply attach it to explosives to make a dirty bomb,” said the official, who works at the interior ministry…But the official said the initial inquiry suggested the perpetrators had specific knowledge of the material and the facility. “No broken locks, no smashed doors and no evidence of forced entry,” he said….

Besides the risk of a dirty bomb, the radioactive material could cause harm simply by being left exposed in a public place for several days, said David Albright, a physicist and president of the Washington-based Institute for Science and International Security…The senior environmental official said authorities were worried that whoever stole the material would mishandle it, leading to radioactive pollution of “catastrophic proportions”.

Excerpts from Exclusive: Radioactive material stolen in Iraq raises security fears, Reuters, Feb. 17, 2016

 

 

Hacking the Power Grid

In Ukraine on Dec. 23, 2015 the power suddenly went out for thousands of people in the capital, Kiev, and western parts of the country. While technicians struggled for several hours to turn the lights back on, frustrated customers got nothing but busy signals at their utilities’ call centers….Hackers had taken down almost a quarter of the country’s power grid, claimed Ukrainian officials.  Specifically, the officials blamed Russians for tampering with the utilities’ software, then jamming the power companies’ phone lines to keep customers from alerting anyone….Several of the firms researching the attack say signs point to Russians as the culprits. The malware found in the Ukrainian grid’s computers, BlackEnergy3, is a known weapon of only one hacking group—dubbed Sandworm by researcher ISight Partners—whose attacks closely align with the interests of the Russian government. The group carried out attacks against the Ukrainian government and NATO in 2014…

The more automated U.S. and European power grids are much tougher targets. To cloak Manhattan in darkness, hackers would likely need to discover flaws in the systems the utilities themselves don’t know exist before they could exploit them. In the Ukrainian attack, leading security experts believe the hackers simply located the grid controls and delivered a command that shut the power off. Older systems may be more vulnerable to such attacks, as modern industrial control software is better at recognizing and rejecting unauthorized commands, says IOActive’s Larsen.

That said, a successful hack of more advanced U.S. or European systems would be a lot harder to fix. Ukrainian utility workers restored power by rushing to each disabled substation and resetting circuit breakers manually. Hackers capable of scrambling New York’s power plant software would probably have to bypass safety mechanisms to run a generator or transformer hotter than normal, physically damaging the equipment. That could keep a substation offline for days or weeks, says Michael Assante, former chief security officer for the nonprofit North American Electric Reliability.

Hackers may have targeted Ukraine’s grid for the same reason NATO jets bombed Serbian power plants in 1999: to show the citizenry that its government was too weak to keep the lights on. The hackers may even have seen the attack as in-kind retaliation after sabotage left 1.2 million people in Kremlin-controlled Crimea without lights in November 2015. In that case, saboteurs blew up pylons with explosives, then attacked the repair crews that came to fix them, creating a blackout that lasted for days. Researchers will continue to study the cyber attack in Ukraine, but the lesson may be that when it comes to war, a bomb still beats a keyboard.

Excerpts How Hackers Took Down a Power Grid, Bloomberg Business Week, Jan. 14, 2016

GeoProfile as a Surveillance Tool

Guerrillas and terrorists are not fools. They are aware they may be under surveillance, and take what they hope are appropriate counter-measures. They are unlikely, for example, to make calls from inside a safe house in which they are living. Instead, they typically make calls from roughly spaced out nearby locations, taking care not to call too often from the same spot. They hope, thereby, that if their activity is being monitored, it will appear random and therefore meaningless.

Spacing things out like this is, in mathematical fact, anything but random: that, in itself, is suspicious. But true randomness would also be odd. As Ian Laverty, the boss of ECRI, a geoprofiling-software firm in Vancouver, observes, innocent phone calls have geographical patterns, because people have routines. Those who take steps to elude the authorities thus often end up unwittingly creating a profile of where their home base is—a profile that a piece of ECRI’s software called Rigel Analyst can spot. This software is used by more than 90 intelligence agencies around the world. Its applications include searching for Taliban rocket caches in Afghanistan.

Geoprofiling is thus already an important counter-insurgency tool…according to a geoprofiler in Denmark’s intelligence apparatus who prefers to remain anonymous. This operative uses geoprofiling software called ArcGIS that analyses Global Positioning System (GPS) data provided unwittingly by insurgents’ growing use of smartphones and other gadgets that are equipped, by default, with GPS kit. For example, simply right-clicking on propaganda images posted online often obtains a GPS “geocode” that reveals where the picture was taken.

Excerpts from Counter-Terrorism, Shrinking the Haystack,  /Economist,Jan. 16, 2016, at 86

Sexual Violence in Burundi

UN High Commissioner for Human Rights Zeid Ra’ad Al Hussein warned on January 15, 2016 that deeply worrying new trends are emerging in Burundi, including cases of sexual violence by security forces and a sharp increase in enforced disappearances and torture cases. He also called for an urgent investigation into the events that took place in Bujumbura on 11-12 December,2015  including the reported existence of at least nine mass graves.

“We have documented 13 cases of sexual violence against women, which began during the search and arrest operations that took place after the December events in the neighbourhoods perceived as supportive of the opposition. The pattern was similar in all cases:  security forces allegedly entered the victims’ houses, separated the women from their families, and raped – in some cases gang-raped – them,” Zeid said…

“Despite these allegations of large-scale arrests, my Office is finding that only a small proportion of them appear to be in official places of detention,” said the High Commissioner. “The increasing number of enforced disappearances, coupled with allegations of secret detention facilities and mass graves is extremely alarming,” he said……In addition, he said, witnesses had reported the existence of at least nine mass graves in Bujumbura and its surroundings – including one in a military camp –containing more than 100 bodies in total, all of them allegedly killed on 11 December 2015. …“My Office is analysing satellite images in an effort to shed more light on these extremely serious allegations,” Zeid said. “All the alarm signals, including the increasing ethnic dimension of the crisis, are flashing red,” he added.

According to information gathered from inhabitants of various neighbourhoods, some of the victims of human rights violations during the search operations that followed the 11 December, 2015 events were targeted because they were Tutsis.

Excerpts from Press Release, Alarming new patterns of violations emerging in Burundi – Zeid , Jan. 15, 2016

Drones Inside Ships: Military

Small-deck ships such as destroyers and frigates could greatly increase their effectiveness if they had their own unmanned air systems (UASs) to provide intelligence, surveillance and reconnaissance (ISR) and other capabilities at long range around the clock. Current state-of-the-art UASs, however, lack the ability to take off and land from confined spaces in rough seas and achieve efficient long-duration flight. TERN (Tactically Exploited Reconnaissance Node) , a joint program between DARPA and the U.S. Navy’s Office of Naval Research (ONR), seeks to provide these and other previously unattainable capabilities. As part of Tern’s ongoing progress toward that goal, DARPA has awarded Phase 3 of Tern to a team led by the Northrop Grumman Corporation….  The Tern Phase 3 design envisions a tail-sitting, flying-wing aircraft with twin counter-rotating, nose-mounted propellers. The propellers would lift the aircraft from a ship deck, orient it for horizontal flight and provide propulsion to complete a mission. They would then reorient the craft upon its return and lower it to the ship deck. The system would fit securely inside the ship when not in use.

Tern’s potentially groundbreaking capabilities have been on the Navy’s wish list in one form or another since World War II. The production of the first practical helicopters in 1942 helped the U.S. military realize the potential value of embedded vertical takeoff and landing (VTOL) aircraft to protect fleets and reduce the reliance on aircraft carriers and land bases.  The Tern demonstrator will bear some resemblance to the Convair XFY-1 Pogo, an experimental ship-based VTOL fighter designed by the Navy in the 1950s to provide air support for fleets. Despite numerous successful demonstrations, the XFY-1 never advanced beyond the prototype stage, in part because the Navy at the time was focusing on faster jet aircraft and determined that pilots would have needed too much training to land on moving ships in rough seas….Moving to [drones removes the need for training aircraft pilots].

Excerpt from DARPA Tern Moves Closer to Full-Scale Demonstration of Unmanned VTOL Aircraft Designed for Small Ships

ISIS Money

So while Islamic State probably maintains some refining capacity, the majority of the oil in IS territory is refined by locals who operate thousands of rudimentary, roadside furnaces that dot the Syrian desert.  Pentagon officials also acknowledge that for more than a year they avoided striking tanker trucks to limit civilian casualties. “None of these guys are ISIS. We don’t feel right vaporizing them, so we have been watching ISIS oil flowing around for a year,” says Knights. That changed on Nov. 16, 2015 when four U.S. attack planes and two gunships destroyed 116 oil trucks. A Pentagon spokesman says the U.S. first dropped leaflets warning drivers to scatter.

Beyond oil, the caliphate is believed by U.S. officials to have assets including $500 million to $1 billion that it seized from Iraqi bank branches last year, untold “hundreds of millions” of dollars that U.S. officials say are extorted and taxed out of populations under the group’s control, and tens of millions of dollars more earned from looted antiquities and ransoms paid to free kidnap victims….

Arguably the least appreciated resource for Islamic State is its fertile farms. Before even starting the engine of a single tractor, the group is believed to have grabbed as much as $200 million in wheat from Iraqi silos alone.  paid on black markets. And how do you conduct airstrikes on farm fields?  For his part, Bahney contends that the group’s real financial strength is its fanatical spending discipline. Rand estimates the biggest and most important drain on Islamic State’s budget is the salary line for up to 100,000 fighters. But the oil revenue alone could likely pay those salaries almost two times over, Bahney says.

Excerpts from Cam Simpson, Why U.S. Efforts to Cut Off Islamic State’s Funds Have Failed: It’s more than just oil, WSJ, Nov. 19, 2015

The CIA Khost Force in Afghanistan

The CIA continues to run a shadow war in the eastern part of Afghanistan, overseeing an Afghan proxy called the Khost Protection Force (KPF), according to local officials, former commanders of that militia and Western advisers.  The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids, abuses that have mostly not been previously disclosed.

Here in Khost–the strategic eastern border province, which has long served as a key gateway for militants entering from Pakistan, the KPF fights in conjunction with the CIA out of Forward Operating Base Chapman.In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government, often acting outside normal chains of command. Locally, militias such as the KPF are called “campaign forces,” an informal name Afghans use for pro-government armed groups….

But a visit to Khost last month revealed that although there is coordination with the security directorate — the NDS — the CIA is still directing the KPF’s operations, paying fighters’ salaries, and training and equipping them. American personnel were gathering biometric data of alleged suspects, according to witnesses, former KPF commanders and local officials who regularly meet with the force and their American overseers.

The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks. Recruits were drawn from local tribes in Khost with promises of salaries, equipment and conditions that were better than in the Afghan military.The force largely operates along the border with North Waziristan, the Pakistani tribal region that is a nerve center for the Taliban, its ally, the Haqqani Network, and al-Qaeda. Fighters receive as much as $400 a month in salary, twice what a soldier in the Afghan security forces earns. Commanders earn $1,000 or more a month, as much as an Afghan army general. Equipped with night-vision goggles, they drive tan Humvees and armored trucks mounted with machine guns.CIA operatives often travel along on raids with the KPF in order to call in airstrikes, from U.S. warplanes or drones, if needed, said Sardar Khan Zadran, a former top KPF commander who still maintains close links to the force.  “They are accountable to no one but the Americans,” Zadran said…

On Nov. 7, 2015 hundreds of angry villagers took to the streets of Khost city. There had been another night raid in which the KPF killed two people, described by the protesters as civilians. The corpses were placed in pickup trucks, and the crowd moved toward Camp Chapman. Some clutched sticks and tree branches. Others carried white Taliban flags.“Death to Americans,” they chanted. “Death to American slaves.”

It was the latest sign of a growing backlash against the CIA and its proxy.The provincial council, several of its members said, has received thousands of complaints about the KPF, not just about the deadly night raids, but also about strict roadblocks that can last for hours. “If their problems are not solved, those people might start cooperating with the insurgents,” said Bostan Walizai, a human rights activist.

Excerpts from  Sudarsan Raghavan, CIA runs shadow war with Afghan militia implicated in civilian killings, Washington Post,  Dec. 3, 2015

Chinese Drones

China has displayed its latest and biggest military unmanned aircraft at an industry expo in Shenzhen, Guangdong province…Considering the rule that China’s defence sector never publicly displays advanced weapons solely designed for the People’s Liberation Army (PLA), the public debut of CH-5 at the China (Shenzhen) International Unmanned Vehicle Systems Trade Fair has an unmistakable indication: China is eager to sell it.  “We have sold the CH-3 to several foreign nations and now we plan to launch the export version of the CH-5 to the international market. It can perform air-to-ground strike, reconnaissance and transport operations,” said Shi Wen, chief designer of the CH series at China Academy of Aerospace Aerodynamics..  They did not disclose which countries have introduced the CH series, but earlier reports quoted Vasily Kashin, a senior analyst with the Moscow-based Centre for Analysis of Strategies and Technologies, as saying Egypt, Saudi Arabia and Iraq have deployed drones from the CH family.…[T]he drone can stay in the air for as long as about 40 hours and operate at an altitude of up to 10 km.  Compared with other military drones that usually have a maximum take-off weight of less than 1,500 kg, the CH-5 is much more powerful-it is able to fly with a weight of 3,000 kg and carry 900 kg of equipment and weapons.

Excerpt from China displays biggest drone, The Hindu, Nov. 21, 2015

Drones in Peacekeeping Operations: South Sudan

The U.N. Security Council is urging the use of unarmed drones in the peacekeeping mission in South Sudan, but the government there says that could cause “disagreement and hostility” as a peace deal tries to take hold.  The council on October 9, 2015 adopted a U.S.-drafted resolution requesting the U.N. secretary-general to “prioritize” the deployment of remaining troops, plus military helicopters and drones. The U.N. is exploring the use of drones in a growing number of peacekeeping missions after first using them in Congo in 2013.  But deploying the drones — even getting them into South Sudan — needs government consent. “The mission requires the collaboration and cooperation from the host authorities for its operations, including air and aviation ones,” a U.N. official said. The official spoke on condition of anonymity because they were not authorized to speak publicly.  Ambassador Francis Deng told the council that requesting drones without consulting his government is “to invite controversy.”

South Sudan’s rival sides signed a peace deal in August 2015, but numerous cease-fire violations have been reported. Each side blames the other for the violations. Meanwhile, more than 100,000 civilians remain sheltered in U.N. bases throughout the country. Thousands have been killed in the conflict fueled by the rivalry between President Salva Kiir and former vice president Riek Machar.  The council resolution also extends the peacekeeping mission’s mandate until Dec. 15 while supporting the implementation of the peace deal. The mission has more than 12,500 uniformed personnel on the ground.

Excerpts from UN Wants Peacekeeping Drones in South Sudan, Which Objects, Associated Press, Oct. 10, 2015

Leaked Papers on US Drone War: 2015

The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses to find and kill suspected terrorists in Yemen and Somalia.
Those shortfalls stem from the remote geography of Yemen and Somalia and the limited American presence there. As a result, the U.S. military has been overly reliant on signals intelligence from computers and cellphones, and the quality of those intercepts has been limited by constraints on surveillance flights in the region.

The documents are part of a study by a Pentagon Task Force on Intelligence, Surveillance, and Reconnaissance. They provide details about how targets were tracked for lethal missions carried out by the Joint Special Operations Command, or JSOC, in Yemen and Somalia between January 2011 and summer 2012. When the study was circulated in 2013, the Obama administration was publicly floating the idea of moving the bulk of its drone program to the Pentagon from the CIA, and the military was eager to make the case for more bases, more drones, higher video quality, and better eavesdropping equipment.

Yet by identifying the challenges and limitations facing the military’s “find, fix, finish” operations in Somalia and Yemen — the cycle of gathering intelligence, locating, and attacking a target — the conclusions of the ISR study would seem to undermine the Obama administration’s claims of a precise and effective campaign, and lend support to critics who have questioned the quality of intelligence used in drone strikes.

One of the most glaring problems identified in the ISR study was the U.S. military’s inability to carry out full-time surveillance of its targets in the Horn of Africa and Yemen. Behind this problem lies the “tyranny of distance” — a reference to the great lengths that aircraft must fly to their targets from the main U.S. air base in Djibouti, the small East African nation that borders Somalia and sits just across the Gulf of Aden from Yemen. Surveillance flights are limited by fuel — and, in the case of manned aircraft, the endurance of pilots. In contrast with Iraq, where more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base, the study notes that “most objectives in Yemen are ~ 500 km away” from Djibouti and “Somalia can be over 1,000 km.” The result is that drones and planes can spend half their air time in transit, and not enough time conducting actual surveillance….

Compounding the tyranny of distance, the ISR study complained, was the fact that JSOC had too few drones in the region to meet the requirements mandated for carrying out a finishing operation.  The “sparse” available resources meant that aircraft had to “cover more potential leads — stretching coverage and leading to [surveillance] ‘blinks.’” Because multiple aircraft needed to be “massed” over one target before a strike, surveillance of other targets temporarily ceased, thus breaking the military’s ideal of a “persistent stare” or the “unblinking eye” of around-the-clock tracking.

JSOC relied on manned spy planes to fill the orbit gap over Yemen. In June 2012 there were six U-28 spy planes in operation in East Africa and the Arabian Peninsula,..Only in the summer of 2012, with the addition of contractor-operated drones based in Ethiopia and Fire Scout unmanned helicopters, did Somalia have the minimum number of drones commanders wanted. The number of Predator drones stationed in Djibouti doubled over the course of the study, and in 2013, the fleet was moved from the main U.S. air base, Camp Lemonnier, to another Djibouti airstrip because of overcrowding and a string of crashes.

Expanding the use of aircraft launched from ships.

JSOC already made use of Fire Scout helicopter drones and small Scan Eagle drones off the coast of Somalia, as well as “Armada Sweep,” which a 2011 document from the National Security Agency, provided by former contractor Edward Snowden, describes as a “ship-based collection system” for electronic communications data. (The NSA declined to comment on Armada Sweep.)…

The find, fix, finish cycle is known in the military as FFF, or F3. But just as critical are two other letters: E and A, for “exploit and analyze,” referring to the use of materials collected on the ground and in detainee interrogations..  F3EA became doctrine in counterinsurgency campaigns in Iraq and Afghanistan in the mid-2000s…

[But] Assassinations are intelligence dead ends.  The ISR study shows that after a “kill operation” there is typically nobody on the ground to collect written material or laptops in the target’s house, or the phone on his body, or capture suspects and ask questions. Yet collection of on-the-ground intelligence of that sort — referred to as DOMEX, for “document and media exploitation,” and TIR, for “tactical interrogation report” — is invaluable for identifying future targets.,,,[Another issue is whether the US government can rely on foreign governments for intelligence]….In 2011, for example, U.S. officials told the Wall Street Journal that they had killed a local governor because Yemeni officials didn’t tell them he was present at a gathering of al Qaeda figures. “We think we got played,” one official said. (The Yemeni government disputed the report.)…
With limited ability to conduct raids or seize materials from targeted individuals in Yemen and Somalia, JSOC relied overwhelmingly on monitoring electronic communications to discover and ultimately locate targets.  The documents state bluntly that SIGINT is an inferior form of intelligence. Yet signals accounted for more than half the intelligence collected on targets, with much of it coming from foreign partners. The rest originated with human intelligence, primarily obtained by the CIA. “These sources,” the study notes, “are neither as timely nor as focused as tactical intelligence” from interrogations or seized materials.  Making matters worse, the documents refer to “poor” and “limited”capabilities for collecting SIGINT, implying a double bind in which kill operations were reliant on sparse amounts of inferior intelligence.

The disparity with other areas of operation was stark, as a chart contrasting cell data makes clear: In Afghanistan there were 8,900 cell data reports each month, versus 50 for Yemen and 160 for Somalia. Despite that, another chart shows SIGINT comprised more than half the data sources that went into developing targets in Somalia and Yemen in 2012.  Cellphone data was critical for finding and identifying targets, yet a chart from a Pentagon study shows that the military had far less information in Yemen and Somalia than it was accustomed to having in Afghanistan….

After locating a target, usually by his cellphone or other electronics, analysts would study video feeds from surveillance aircraft “to build near-certainty via identification of distinguishing physical characteristics.”

A British intelligence document on targeted killing in Afghanistan, which was among the Snowden files, describes a similar process of “monitoring a fixed location, and tracking any persons moving away from that location, and identifying if a similar pattern is experienced through SIGINT collect.” The document explains that “other visual indicators may be used to aid the establishment of [positive identification]” including “description of clothing” or “gait.” After a shot, according to the British document and case studies in the Pentagon’s ISR report, drones would hover to determine if their target had been hit, collecting video and evidence of whether the cellphone had been eliminated...  Yet according to the ISR study, the military faced “critical shortfalls of capabilities” in the technologies enabling that kind of precise surveillance and post-strike assessment. At the time of the study, only some of the Reaper drones had high-definition video, and most of the aircraft over the region lacked the ability to collect “dial number recognition” data.

Excerpts from Firing Blind, Intercept, the Drone Papers, Oct. 2015

Recyclable, Mini and Lethal: Drones

From DARPA Website:  An ability to send large numbers of small unmanned air systems (UAS) with coordinated, distributed capabilities could provide U.S. forces with improved operational flexibility at much lower cost than is possible with today’s expensive, all-in-one platforms—especially if those unmanned systems could be retrieved for reuse while airborne. So far, however, the technology to project volleys of low-cost, reusable systems over great distances and retrieve them in mid-air has remained out of reach.

To help make that technology a reality, DARPA has launched the Gremlins program….The program envisions launching groups of gremlins from large aircraft such as bombers or transport aircraft, as well as from fighters and other small, fixed-wing platforms while those planes are out of range of adversary defenses. When the gremlins complete their mission, a C-130 transport aircraft would retrieve them in the air and carry them home, where ground crews would prepare them for their next use within 24 hours….With an expected lifetime of about 20 uses, Gremlins could fill an advantageous design-and-use space between existing models of missiles and conventional aircraft…

Excerpts from Friendly “Gremlins” Could Enable Cheaper, More Effective, Distributed Air Operations, DARPA Website, Aug. 28, 2015

 

United States Military Strategy: 2015 and beyond

The United States [is developing]  a “third offset strategy”… It is the third time since the second world war that America has sought technological breakthroughs to offset the advantages of potential foes and reassure its friends. The first offset strategy occurred in the early 1950s, when the Soviet Union was fielding far larger conventional forces in Europe than America and its allies could hope to repel. The answer was to extend America’s lead in nuclear weapons to counter the Soviet numerical advantage—a strategy known as the “New Look”.

A second offset strategy was conceived in the mid-1970s. American military planners, reeling from the psychological defeat of the Vietnam war, recognised that the Soviet Union had managed to build an equally terrifying nuclear arsenal. They had to find another way to restore credible deterrence in Europe. Daringly, America responded by investing in a family of untried technologies aimed at destroying enemy forces well behind the front line. Precision-guided missiles, the networked battlefield, reconnaissance satellites, the Global Positioning System (GPS) and radar-beating “stealth” aircraft were among the fruits of that research…The second offset strategy,  the so-called “revolution in military affairs” was hammered home in 1991 during the first Gulf war. Iraqi military bunkers were reduced to rubble and Soviet-style armoured formations became sitting ducks. Watchful Chinese strategists, who were as shocked as their Soviet counterparts had been, were determined to learn from it.

The large lead that America enjoyed then has dwindled. Although the Pentagon has greatly refined and improved the technologies that were used in the first Gulf war, these technologies have also proliferated and become far cheaper. Colossal computational power, rapid data processing, sophisticated sensors and bandwidth—some of the components of the second offset—are all now widely available.

And America has been distracted. During 13 years of counter-insurgency and stabilisation missions in Afghanistan and Iraq, the Pentagon was more focused on churning out mine-resistant armoured cars and surveillance drones than on the kind of game-changing innovation needed to keep well ahead of military competitors. America’s combat aircraft are 28 years old, on average. Only now is the fleet being recapitalised with the expensive and only semi-stealthy F-35 Joint Strike Fighter.  China, in particular, has seized the opportunity to catch up. With a defence budget that tends to grow by more than 10% a year, it has invested in an arsenal of precision short- to medium-range ballistic and cruise missiles, submarines equipped with wake-homing torpedoes and long-range anti-ship missiles, electronic warfare, anti-satellite weapons, modern fighter jets, integrated air defences and sophisticated command, control and communications systems.

The Chinese call their objective “winning a local war in high-tech conditions”. In effect, China aims to make it too dangerous for American aircraft-carriers to operate within the so-called first island chain (thus pushing them out beyond the combat range of their tactical aircraft) and to threaten American bases in Okinawa and South Korea. American strategists call it “anti-access/area denial”, or A2/AD.  The concern for America’s allies in the region is that, as China’s military clout grows, the risks entailed in defending them from bullying or a sudden aggressive act—a grab of disputed islands to claim mineral rights, say, or a threat to Taiwan’s sovereignty—will become greater than an American president could bear. Some countries might then decide to throw in their lot with the regional hegemon.

Although China is moving exceptionally quickly, Russia too is modernising its forces after more than a decade of neglect. Increasingly, it can deploy similar systems. Iran and North Korea are building A2/AD capabilities too, albeit on a smaller scale than China. Even non-state actors such as Hizbullah in Lebanon and Islamic State in Syria and Iraq are acquiring some of the capabilities that until recently were the preserve of military powers.

Hence the need to come up with a third offset strategy.….America needs to develop new military technologies that will impose large costs on its adversaries

The programme needs to overcome at least five critical vulnerabilities.

  • The first is that carriers and other surface vessels can now be tracked and hit by missiles at ranges from the enemy’s shore which could prevent the use of their cruise missiles or their tactical aircraft without in-flight refuelling by lumbering tankers that can be picked off by hostile fighters.
  • The second is that defending close-in regional air bases from a surprise attack in the opening stages of a conflict is increasingly hard.
  • Third, aircraft operating at the limits of their combat range would struggle to identify and target mobile missile launchers.
  • Fourth, modern air defences can shoot down non-stealthy aircraft at long distances.
  • Finally, the satellites America requires for surveillance and intelligence are no longer safe from attack.

It is an alarming list. Yet America has considerable advantages…. Those advantages include unmanned systems, stealthy aircraft, undersea warfare and the complex systems engineering that is required to make everything work together.

Over the next decade or so, America will aim to field unmanned combat aircraft that are stealthy enough to penetrate the best air defences and have the range and endurance to pursue mobile targets. Because they have no human pilots, fewer are needed for training. Since they do not need to rest, they can fly more missions back to back. And small, cheaper American drones might be used to swarm enemy air defences.

Drones are widespread these days, but America has nearly two decades of experience operating them. And the new ones will be nothing like the vulnerable Predators and Reapers that have been used to kill terrorists in Yemen and Waziristan. Evolving from prototypes like the navy’s “flying wing” X-47B and the air force’s RQ-180, they will be designed to survive in the most hostile environments. The more autonomous they are, the less they will have to rely on the control systems that enemies will try to disrupt—though autonomy also raises knotty ethical and legal issues.

Some of the same technologies could be introduced to unmanned underwater vehicles. These could be used to clear mines, hunt enemy submarines in shallow waters, for spying and for resupplying manned submarines, for example, with additional missiles. They can stay dormant for long periods before being activated for reconnaissance or strike missions. Big technical challenges will have to be overcome:.. [T]he vehicles will require high-density energy packs and deep undersea communications.

Contracts will be awarded this summer for a long-range strike bomber, the first new bomber since the exotic and expensive B-2 began service two decades ago. The B-3, of which about 100 are likely to be ordered, will also have a stealthy, flying-wing design…

If surface vessels, particularly aircraft-carriers, are to remain relevant, they will need to be able to defend themselves against sustained attack from precision-guided missiles. The navy’s Aegis anti-ballistic missile-defence system is capable but expensive: each one costs $20m or so. If several of them were fired to destroy an incoming Chinese DF-21D anti-ship ballistic missile, the cost for the defenders might be ten times as much as for the attackers.

If carriers are to stay in the game, the navy will have to reverse that ratio. Hopes are being placed in two technologies: electromagnetic rail guns, which fire projectiles using electricity instead of chemical propellants at 4,500mph to the edge of space, and so-called directed-energy weapons, most likely powerful lasers. The rail guns are being developed to counter ballistic missile warheads; the lasers could protect against hypersonic cruise missiles. In trials, shots from the lasers cost only a few cents. The navy has told defence contractors that it wants to have operational rail guns within ten years.

Defending against salvoes of incoming missiles will remain tricky and depend on other technological improvements, such as compact long-range radars that can track multiple targets. Finding ways to protect communications networks, including space-based ones, against attack is another priority. Satellites can be blinded by lasers or disabled by exploding missiles. One option would be to use more robust technologies to transmit data—such as chains of high-altitude, long-endurance drones operating in relays….

As Elbridge Colby of the Centre for a New American Security argues: “The more successful the offset strategy is in extending US conventional advantages, the more attractive US adversaries will find strategies of nuclear escalation.” The enemy always gets a vote.

Weapons Technology: Who’s Afraid of America, Economist, June 13, 2015, at 57.

Buying the Media – the Saudi Cable

Buying Silence: How the Saudi Foreign Ministry controls Arab media (wikileaks website)

Saudi Arabia controls its image by monitoring media and buying loyalties from Australia to Canada and everywhere in between.  Documents reveal the extensive efforts to monitor and co-opt Arab media, making sure to correct any deviations in regional coverage of Saudi Arabia and Saudi-related matters. Saudi Arabia’s strategy for co-opting Arab media takes two forms, corresponding to the “carrot and stick” approach, referred to in the documents as “neutralisation” and “containment”. The approach is customised depending on the market and the media in question.

The initial reaction to any negative coverage in the regional media is to “neutralise” it. The term is used frequently in the cables and it pertains to individual journalists and media institutions whose silence and co-operation has been bought. “Neutralised” journalists and media institutions are not expected to praise and defend the Kingdom, only to refrain from publishing news that reflects negatively on the Kingdom, or any criticism of its policies. The “containment” approach is used when a more active propaganda effort is required. Journalists and media institutions relied upon for “containment” are expected not only to sing the Kingdom’s praises, but to lead attacks on any party that dares to air criticisms of the powerful Gulf state.

One of the ways “neutralisation” and “containment” are ensured is by purchasing hundreds or thousands of subscriptions in targeted publications. These publications are then expected to return the favour by becoming an “asset” in the Kingdom’s propaganda strategy. A document listing the subscriptions that needed renewal by 1 January 2010 details a series of contributory sums meant for two dozen publications in Damascus, Abu Dhabi, Beirut, Kuwait, Amman and Nouakchott. The sums range from $500 to 9,750 Kuwaiti Dinars ($33,000). The Kingdom effectively buys reverse “shares” in the media outlets, where the cash “dividends” flow the opposite way, from the shareholder to the media outlet. In return Saudi Arabia gets political “dividends” – an obliging press.

An example of these co-optive practices in action can be seen in an exchange between the Saudi Foreign Ministry and its Embassy in Cairo. On 24 November 2011 Egypt’s Arabic-language broadcast station ONTV hosted the Saudi opposition figure Saad al-Faqih, which prompted the Foreign Ministry to task the embassy with inquiring into the channel. The Ministry asked the embassy to find out how “to co-opt it or else we must consider it standing in the line opposed to the Kingdom’s policies”.  The document reports that the billionaire owner of the station, Naguib Sawiris, did not want to be “opposed to the Kingdom’s policies” and that he scolded the channel director, asking him “never to host al-Faqih again”. He also asked the Ambassador if he’d like to be “a guest on the show”.

The Saudi Cables are rife with similar examples, some detailing the figures and the methods of payment. These range from small but vital sums of around $2000/year to developing country media outlets – a figure the Guinean News Agency “urgently needs” as “it would solve many problems that the agency is facing” – to millions of dollars, as in the case of Lebanese right-wing television station MTV.

The “neutralisation” and “containment” approaches are not the only techniques the Saudi Ministry is willing to employ. In cases where “containment” fails to produce the desired effect, the Kingdom moves on to confrontation. In one example, the Foreign Minister was following a Royal Decree dated 20 January 2010 to remove Iran’s new Arabic-language news network, Al-Alam, from the main Riyadh-based regional communications satellite operator, Arabsat. After the plan failed, Saud Al Faisal sought to “weaken its broadcast signal”.

The documents show concerns within the Saudi administration over the social upheavals of 2011, which became known in the international media as the “Arab Spring”. The cables note with concern that after the fall of Mubarak, coverage of the upheavals in Egyptian media was “being driven by public opinion instead of driving public opinion”. The Ministry resolved “to give financial support to influential media institutions in Tunisia”, the birthplace of the “Arab Spring”.

Animal Diseases as Biological Weapons

The World Health Organisation (WHO), animal health and national defence officers called for wider international co-operation to avoid the spread of animal diseases that could be used as biological weapons.  Sixty percent of human diseases come from animal agents and 80% of the agents that could be used for bio-terrorism are of animal origin, said Bernard Vallat, director general of the World Organisation for Animal Health (OIE).

“History has shown animal diseases have often been used as weapons before. Advances in genetics can now make them even more harmful. So we are calling for further investment to be made at national level on bio-security,” Vallat said at a conference on biological threat reduction.  Diseases have spread from animals to humans for millennia, with latest examples including the bird flu virus that has killed hundreds of people around the globe.

The OIE and the WHO warned animal disease agents could escape naturally, accidentally but also intentionally from laboratories, to be used as bio-weapons….Security breaches involving animal diseases are not rare.  The Pentagon said in May 2015 and June the US military had sent live samples of anthrax, which can be used as biological weapon, to five countries outside the United States and to dozens of US labs.

Excerpts from Beware of animal diseases as biological weapons, health experts say, Reuters, June 30, 2015

Surgically Implanted Explosive Devices and Drone Strikes

The documents, provided to the Guardian by NSA whistleblower Edward Snowden and reported in partnership with the New York Times, discuss how a joint US, UK and Australian programme codenamed Overhead supported the strike in Yemen in 2012….

British officials and ministers follow a strict policy of refusing to confirm or deny any support to the targeted killing programme, and evidence has been so scant that legal challenges have been launched on the basis of single paragraphs in news stories.

The new documents include a regular series of newsletters – titled Comet News – which are used to update GCHQ personnel on the work of Overhead, an operation based on satellite, radio and some phone collection of intelligence. Overhead began as a US operation but has operated for decades as a partnership with GCHQ and, more recently, Australian intelligence.

The GCHQ memos, which span a two-year period, set out how Yemen became a surveillance priority for Overhead in 2010, in part at the urging of the NSA, shortly after the failed 2009 Christmas Day bomb plot in which Umar Farouk Abdulmutallab attempted to detonate explosives hidden in his underpants on a transatlantic flight.  Ten months later a sophisticated plot to smuggle explosives on to aircraft concealed in printer cartridges was foiled at East Midlands airport. Both plots were the work of al-Qaida in the Arabian Peninsula (AQAP), the Yemen-based al-Qaida offshoot.

One Comet News update reveals how Overhead’s surveillance networks supported an air strike in Yemen that killed two men on 30 March 2012. The men are both described as AQAP members.  In the memo, one of the dead men is identified as Khalid Usama – who has never before been publicly named – a “doctor who pioneered using surgically implanted explosives”. The other is not identified…

US officials confirmed to Reuters in 2012 that there had been a single drone strike in Yemen on 30 March of that year. According to a database of drone strikes maintained by the not-for-profit Bureau of Investigative Journalism, the only incident in Yemen on that date targeted AQAP militants, causing between six and nine civilian casualties, including six children wounded by shrapnel.  Asked whether the strike described in the GCHQ documents was the same one as recorded in the Bureau’s database, GCHQ declined to comment.

The incident is one of more than 500 covert drone strikes and other attacks launched by the CIA and US special forces since 2002 in Pakistan, Yemen and Somalia – which are not internationally recognised battlefields.  The GCHQ documents also suggest the UK was working to build similar location-tracking capabilities in Pakistan, the country that has seen the majority of covert strikes, to support military operations “in-theatre”.

A June 2009 document indicates that GCHQ appeared to accept the expanded US definition of combat zones, referring to the agency’s ability to provide “tactical and strategic SIGINT [signals intelligence] support to military operations in-theatre, notably Iraq and Afghanistan, but increasingly Pakistan”. The document adds that in Pakistan, “new requirements are yet to be confirmed, but are both imminent and high priority”….

By this point NSA and GCHQ staff working within the UK had already prioritised surveillance of Pakistan’s tribal areas, where the majority of US covert drone strikes have been carried out. A 2008 memo lists surveillance of two specific sites and an overview of satellite-phone communications of the Federally Administered Tribal Areas, in which nearly all Pakistan drone strikes have taken place, among its key projects.

British intelligence-gathering in Pakistan is likely to have taken place for a number of reasons, not least because UK troops in Afghanistan were based in Helmand, on the Pakistani border.One of the teams involved in the geo-location of surveillance targets was codenamed “Widowmaker”, whose task was to “discover communications intelligence gaps in support of the global war on terror”, a note explains.

Illustrating the close links between the UK, US and Australian intelligence services, Widowmaker personnel are based at Menwith Hill RAF base in Yorkshire, in the north of England, in Denver, Colorado, and in Alice Springs in Australia’s Northern Territory.

Other Snowden documents discuss the difficult legal issues raised by intelligence sharing with the US….The UK has faced previous legal challenges over the issue. In 2012, the family of a tribal elder killed in Pakistan, Noor Khan, launched a court case in England in which barristers claimed GCHQ agents who shared targeting intelligence for covert strikes could be “accessory to murder”. Judges twice refused to rule on the issue on the grounds it could harm the UK’s international relations.

Excerpts from Alice Ross and James Ball,  GCHQ documents raise fresh questions over UK complicity in US drone strikes,  Guardian, June 24, 2015

Iran Wants to Be North Korea: nuclear weapons

The US tried to deploy a version of the Stuxnet computer virus to attack North Korea’s nuclear weapons programme five years  (2010) ago but ultimately failed, according to people familiar with the covert campaign.  The operation began in tandem with the now-famous Stuxnet attack that sabotaged Iran’s nuclear programme in 2009 and 2010 by destroying a thousand or more centrifuges that were enriching uraniumc. Reuters and others have reported that the Iran attack was a joint effort by US and Israeli forces.

According to one US intelligence source, Stuxnet’s developers produced a related virus that would be activated when it encountered Korean-language settings on an infected machine…But the National Security Agency-led campaign was stymied by North Korea’s utter secrecy, as well as the extreme isolation of its communications systems...North Korea has some of the most isolated communications networks in the world. Just owning a computer requires police permission, and the open internet is unknown except to a tiny elite. The country has one main conduit for internet connections to the outside world, through China.  In contrast, Iranians surfed the net broadly and had interactions with companies from around the globe.

The US has launched many cyber espionage campaigns, but North Korea is only the second country, after Iran, that the NSA is now known to have targeted with software designed to destroy equipment.

Experts in nuclear programmes said there were similarities between North Korea and Iran’s operations, and the two countries continue to collaborate on military technology. Both countries use a system with P-2 centrifuges, obtained by Pakistani nuclear scientist AQ Khan, who is regarded as the father of Islamabad’s nuclear bomb, they said. Like Iran, North Korea probably directs its centrifuges with control software developed by Siemens AG that runs on Microsoft Corp’s Windows operating system, the experts said. Stuxnet took advantage of vulnerabilities in both the Siemens and Microsoft programmes…

Despite modest differences between the programmes, “Stuxnet can deal with both of them. But you still need to get it in,” said Olli Heinonen, senior fellow at Harvard University’s Belfer Center for Science and International Affairs and former deputy director general of the International Atomic Energy Agency…

The Stuxnet campaign against Iran, code-named Olympic Games, was discovered in 2010. It remains unclear how the virus was introduced to the Iranian nuclear facility in Natanz, which was not connected to the Internet.,,,According to cybersecurity experts, Stuxnet was found inside industrial companies in Iran that were tied to the nuclear effort. As for how Stuxnet got there, a leading theory is that it was deposited by a sophisticated espionage programme developed by a team closely allied to Stuxnet’s authors, dubbed the Equation Group by researchers at Kaspersky Lab…

In addition, North Korea likely has plutonium, which does not require a cumbersome enrichment process depending on the cascading centrifuges that were a fat target for Stuxnet, they said.

Excerpts from NSA tried Stuxnet cyber-attack on North Korea five years ago but failed, Reuters, May 29, 2015

Surveillance State: US

Were it not for Edward Snowden or someone like him, the N.S.A. would likely still be collecting the records of almost every phone call made in the United States, and no one outside of government would know it. A handful of civil-liberties-minded representatives and senators might drop hints in hearings and ask more pointed questions in classified settings. Members of the public would continue making phone calls, unaware that they were contributing to a massive government database that was supposedly intended to make their lives safer but had not prevented a single terrorist attack. And, on Monday June 1, 2015  the government’s Section 215 powers, used to acquire records from hundred of billions of phone calls, among other “tangible things,” would be quietly renewed.

Snowden shouldn’t have been necessary. The Foreign Intelligence Surveillance Court (or FISA Court), which evaluates Section 215 requests, is supposed to be interpreting the law to make sure that government surveillance doesn’t go outside of it. Congressional intelligence committees, which review the activities of the N.S.A., are supposed to be providing some oversight. The N.S.A. itself reports to the Department of Defense, which reports to the White House, all of which have dozens of lawyers, who are all supposed to apply the law. The government, in other words, is supposed to be watching itself…

The government enshrouds the details of its surveillance programs in a technical vocabulary (“reasonable articulable suspicion,” “seeds,” “queries,” “identifiers”) that renders them too dull and opaque for substantive discussion by civilians. …Little is known about how other authorities, including Executive Order 12333, which some consider the intelligence community’s most essential charter, are being interpreted to permit spying on Americans. And a redacted report, released last week by the Department of Justice’s Office of the Inspector General, hints at how much we still don’t know about Section 215. Nearly two years into the congressional debate over the use and legality of Section 215, the report provides the first official confirmation that the “tangible things” obtained by the F.B.I. through Section 215 include not just phone metadata but “email transactional records” and two full lines of other uses, all of which the F.B.I. saw fit to redact.

Excerpts from MATTATHIAS SCHWARTZ, Who Needs Edward Snowden?,  New Yorker, MAY 28, 2015

Looking Behind the Brick Wall: Military

From the DARPA website on project  Revolutionary Enhancement of Visibility by Exploiting Active Light-fields (REVEAL) program

Imagine, for example, squad members patrolling a street in a deployed urban environment, and an armed assailant crouching behind a car or a concrete barrier. Without the benefit of different vantage points (from the air, for example), the squad could be blind to the hidden threat. If by chance a glass storefront window were behind the assailant, the squad might spot the assailant’s reflection in the window. But if the backdrop were a brick wall, there would be no visible reflection. By exploiting currently untapped aspects of light and the varied paths of photons bouncing off the brick wall, troops using hardware based on the theoretical foundations provided by REVEAL might someday be able to detect the otherwise hidden assailant [or see clearly what people are doing inside their homes].

Another potential application could be determining an unknown material’s composition and other properties from a safe distance, avoiding the potential danger associated with close proximity and physical examination. Based on information carried by the photons interacting with the material, it may be possible for troops in the future to identify radioactive, biological or chemical threats and camouflaged targets from much farther away than currently possible.

See also FBO

The X-37B Drone: 4th Mission

The unmanned X-37B spacecraft was launched May 20 2015  atop a United Launch Alliance Atlas 5 rocket from Florida’s Cape Canaveral Air Force Station. The liftoff will begin the reusable space plane’s fourth mission, which is known as OTV-4 (short for Orbital Test Vehicle-4).  Most of the X-37B’s payloads and specific activities are classified, so it’s not clear what the space plane will be doing once it leaves Earth. This secrecy has led to some speculation that the vehicle might be some sort of space weapon. Air Force officials have repeatedly rejected that notion, saying that the X-37B flights simply test a variety of new space technologies.

For example, the space plane is carrying a type of ion engine called a Hall thruster on OTV-4, Air Force officials said. This Hall thruster is an advanced version of the one that powered the first three Advanced Extremely High Frequency military communications satellites, the officials added.  NASA is also flying an experiment on OTV-4. The agency’s Materials Exposure and Technology Innovation in Space investigation will see how exposure to the space environment affects nearly 100 different types of materials. The results should aid in the design of future spacecraft, NASA says.

The X-37B looks like a miniature version of NASA’s now-retired space shuttle. The robotic, solar-powered space plane is about 29 feet long by 9.5 feet tall (8.8 by 2.9 meters), with a wingspan of 15 feet (4.6 meters) and a payload bay the size of a pickup-truck bed. Like the space shuttle, the X-37B launches vertically and lands horizontally, on a runway.

Excerpts from Mike Wall, Air Force Gets X-37B Space Plane Ready for Its Next Mystery,  SPACE.COM, May 18, 2015

CIA Drone Strikes from Germany

The case of three Yemenis whose relatives were killed in the attack in August 2012, will be heard on Wednesday by a court in Cologne, Germany. Lawyers for the victims say the German government shares responsibility for the death of civilians because the US military base of Ramstein, which allegedly played a key role in the attack, is on German soil. The government rejects the claim.

Faisal bin Ali Jaber, who lost his brother-in-law Salim, a preacher, and his nephew Waleed, a police officer, in the strike on the village of Khashamir on 29 August, 2012,…Bin Ali Jaber, whose extended family had travelled back to the eastern Yemeni village to celebrate a wedding, had been having supper when he felt the impact of five rockets hitting the ground. Speaking in Arabic through a translator, he recalled leaving his house with his wife. “We found scattered body parts and people picking them up. We picked them up as well. It (soon) became apparent that Salim and Walid were among the victims. The incident was a tragedy in every way, for all the residents of Khashamir and the surrounding villages.”

Ramstein, in the German state of Rheinland Pfalz, is used by the US military on condition nothing is done there that violates German law. The German government has been repeatedly accused of failing to confront Washington over Ramstein’s alleged role in the drone war.The case rests on the claim that Ramstein is central to the drone strikes because it relays crucial information via satellite that enables drone operators in Nevada to communicate with the aircraft in Yemen, Pakistan, Afghanistan and elsewhere.  The geographical location of Ramstein is said to be vital to the transmission of the information, because, due to the curvature of the earth, a relay station is needed between the US and the Middle East.

Der Spiegel and the Intercept website reported in April 2015  that Ramstein is critical to the US drone strikes, quoting experts, but the US government has so far failed to confirm or deny the claim.  The potential loss of Ramstein as a strategically located relay station would present the US with the tough challenge of finding an alternative country willing to offer it a hub, amid global controversy and growing unease over drone strikes.

Excerpts from Kate Connolly ,German court to hear case brought by relatives of Yemen drone attack victims, Guardian, May 22, 2015

Chinese Military Base in Africa: Djibouti

China is negotiating a military base in the strategic port of Djibouti, an historic development that would see the US and China each have bases in the small nation that guards the entrance to the Red Sea and the Suez Canal. President Ismail Omar Guelleh says that discussions are “ongoing” and that Beijing is “welcome”.  Djibouti is already home to Camp Lemonnier, the military headquarters used by US Special Forces for covert, anti-terror and other operations in Yemen and in Africa. France, the former colonial master, and Japan also have bases in the port, which is used by many foreign navies to fight piracy in neighbouring Somalia…

China signed a security and defence agreement with Djibouti in February 2014. But a Chinese military base in Djibouti, the first in Africa, “would definitely be historic”, according to David Shinn, a former US ambassador to Ethiopia.  The US was reportedly angry about the conclusion last year of the China-Djibouti defence deal last year. But Shinn predicts that the US will take it in its stride…

China is reportedly considering a permanent military base in Obock, Djibouti’s northern port city.  “China clearly has a goal of building a blue-water navy, which means it will at some point go well beyond the east coast of Africa and the western Indian Ocean, and it has to think — long term — about how it would be able to service its naval vessels as they go further and further, ” he explained.

Camp Lemonnier, home to 4,000 American citizens, is in the south-east of Djibouti. The US in May 2015 signed a 20-year lease, indicating its willingness to stay. Terms of the lease were not disclosed.

A new Chinese deep-sea port in Djibouti…could provide a boost to China’s sphere of influence, which already extends from the South China Sea, along the west coast of Myanmar to the Arabian-Sea coastal port of Gwadar, Pakistan — a major destination in the China-Pakistan Economic Corridor.  “Establishing these deep-sea ports is really about securing its economic interests, projecting influence and securing oil exports from the Gulf region,”…..

Trade between Africa and China, in excess of 200 billion dollars (180 billion euros), is above the continent’s trade with the European Union or the US.  In Djibouti, China is already financing major infrastructure projects estimated to total more than 9 billion dollars (8 billion euros), including improved ports, airports and railway lines….There was speculation that Russia also wanted to establish a presence in Djibouti, but the presence of Russian warships may have created even more controversy in western nations because of the crisis in the Ukraine.

Excerpts  Michel Arseneault, ‘Historic’ Chinese military base to open in Horn of Africa, Agence France Presse, May 11, 2015

Never Ending – War in Afghanistan

Months after President Obama formally declared that the United States’ long war against the Taliban was over in Afghanistan, the American military is regularly conducting airstrikes against low-level insurgent forces and sending Special Operations troops directly into harm’s way under the guise of “training and advising.”…[I]nterviews with American and Western officials in Kabul and Washington offer a picture of a more aggressive range of military operations against the Taliban in recent months, as the insurgents have continued to make gains against struggling government forces.

Rather than ending the American war in Afghanistan, the military is using its wide latitude to instead transform it into a continuing campaign of airstrikes — mostly drone missions — and Special Operations raids that have in practice stretched or broken the parameters publicly described by the White House.

Western and military officials said that American and NATO forces conducted 52 airstrikes in March 2015 months after the official end of the combat mission. Many of these air assaults, which totaled 128 in the first three months of 2015, targeted low- to midlevel Taliban commanders in the most remote reaches of Afghanistan.,,,“They are putting guys on the ground in places to justify the airstrikes,” one of the officials said. “It’s not force protection when they are going on the offensive.”…Gen. John F. Campbell, vehemently denied accusations that he was putting troops into harm’s way just to enable more airstrikes.….“Washington is going to have to say what they say politically for many different audiences, and I have no issue with that,” General Campbell said. “I understand my authorities and what I have to do with Afghanistan’s forces and my forces. And if that doesn’t sell good for a media piece then, again, I can’t worry about it.”

The operations are continuing during a troubling stretch for the Afghan security forces, as the Taliban are continuing to make gains…Mr. Ghani, who has yet to name a minister of defense, has in many ways outsourced much of the running of the war to General Campbell.

Excerpts from AZAM AHMED and JOSEPH GOLDSTEIN, Taliban Gains Pull U.S. Units Back Into Fight in Afghanistan, NY Times, Apr. 29, 2015

Brazil as Space Power

The Brazilian government is ending a decade-long project to operate Ukraine’s Cyclone-4 rocket from Brazilian territory following a government review that found too many open questions about its cost and future market success, the deputy chief of the Brazilian Space Agency (AEB) said.  It remains unclear whether the decision will force Brazil to pay Ukraine any financial penalties for a unilateral cancellation of a bilateral agreement. Over the years, the work to build a launch facility for Ukraine’s Cyclone at Brazil’s Alcantara spaceport has suffered multiple stops and starts as one side or the other fell short on its financial obligations to the effort…

Noronha de Souza said the idea of making a profit in the launch business is now viewed as an illusion. The project, he said, was unlikely ever to be able to support itself on commercial revenue alone.  “Do you really believe launchers make money in any part of the world? I don’t believe so. If the government doesn’t buy launches and fund the development of technology, it does not work,” he said.  “Everybody talks about SpaceX [of Hawthorne, California] like it’s magic, somehow different. It’s no different. Their connections with NASA have been important. If NASA had stopped the funding, where would they be? I really appreciate what they are doing, but I doubt whether launch bases can make money and survive on their own without government support.”…

While the Cyclone-4 project is about to end, Brazil has maintained as a strategic goal the development of a space-launch vehicle from the Brazilian military-owned Alcantara facility. As such it is continuing work with the German Aerospace Center, DLR, on a small solid-fueled vehicle, called VLM-1 for Microsatellite Launch Vehicle, that began as a launcher for suborbital missions and has evolved to a small-satellite-launch capability…

AEB is a purely civilian agency funded through the Science and Technology Ministry. Until a few years ago, the Brazilian military had not been a player in the nation’s space policy. That is starting to change with the Brazilian Defense Ministry’s establishment of space-related operational requirements.  Among those requirements is a radar Earth observation satellite, which AEB has penciled into its program for around 2020. Aside from allowing the use of its Alcantara site, the Brazilian military is not yet financing any AEB work, but the military is expected to pay for launches of its satellites once the development is completed

AEB is finishing design of a small multimission satellite platform whose first launch will be of the Amazonia-1 Earth observation payload, with a medium-resolution imager of 10-meter-resolution, similar to the capacity of today’s larger China-Brazil CBERS-4 satellite, which is in orbit.

Brazil and Argentina’s CONAE space agency will be dividing responsibility for an ocean-observation satellite system, using the same multimission platform, called Sabia-Mar. The first Sabia-Mar is scheduled for launch in 2017, with a second in 2018, according to AEB planning.

Excerpts from Peter B. de Selding Brazil Pulling Out of Ukrainian Launcher Project,  Space News, Apr. 16, 2015

Russia has rushed to take advantage of the cancellation of space agreement between Brazil and Ukraine. [Russia] wants bot build  joint projects and space programs on the long term with BRICS Group member countries, particularly Brazil.  Brazil attempts to build its own cosmodrome, and unfortunately for the loss of Ukraine and its technology, the Brazilian-Ukrainian Project for the use of the Cyclone rocket in coastal launchings is practically minimalized…Russia proposed its variant of work, consisting in principle on the installation, already existent, of several satellite navigation stations Glonass and tbe idea of helping Brasilia in some way to the construction of the cosmodrome.

Excerpt from  Odalys Buscarón Ochoa, Russia Interested in Space Coop with BRICS Countries, Prensa Latina, Apr. 24, 2015