DARPA’s The Sea Train program aims to demonstrate long range deployment capabilities for a distributed fleet of tactical unmanned surface vessels. The program seeks to enable extended transoceanic transit and long-range naval operations by exploiting the efficiencies of a system of connected vessels (Sea Train). The goal is to develop and demonstrate approaches that exploit wave-making resistance reductions to overcome the range limitations inherent in medium unmanned surface vessels. DARPA envisions sea trains formed by physically connecting vessels with various degrees of freedom between the vessels, or vessels sailing in collaborative formations at various distances between the vessels. The weak of October 5, 2020, DARPA awarded Gibbs & Cox a separate $9.5 million contract to develop a “Connectorless Sea Train” concept.
A study published by the China Aerospace Studies Institute in September 2020′China’s Space Narrative: Examining the Portrayal of the US-China Space Relationship in Chinese Sources‘ used publicly available Chinese language resources to draw insights on how the Chinese view the U.S.-China space relationship. According to the study:
“Chinese sources weave a space narrative that portrays China as a modernizing nation
committed to the peaceful uses of space and serving the broader interests of advancing humankind through international space cooperation, economic development, and scientific discovery. Chinese sources minimize the military role of China’s space program.
In contrast, the same sources portray the United States as the leading
space power bent on dominating space, restricting access to space, and limiting international space cooperation to countries with similar political systems and level of economic development.
The report concludes that the United States and China are in a long-term competition in space in which China is attempting to become a global power, in part, through the use of space. China’s primary motivation for developing space technologies is national security…China’s space program is one element of its efforts to transition the current U.S.-dominated international system to a multipolar world….
Many Chinese writings on commercial space analyze the experiences of U.S. companies, with a particular focus on SpaceX. Chinese space experts call SpaceX the “major representative company” for commercial space worldwide. A report from Hong Kong media claims that Chinese investors view SpaceX as the “benchmark company” for emerging commercial space companies in the mainland. Chinese authors also follow developments in other U.S. commercial space companies, such as Digital Globe
and Rocket Lab.
Chinese authors also pay attention to the ways in which the U.S. government uses various policies and incentives to create a favorable ecosystem for the growth of new commercial space companies. Chinese writings analyze ways in which NASA has supported private companies with funding, technology transfer, consulting, and infrastructure leasing. Although their specific recommendations vary, Chinese authors view strong government oversight and intervention as crucial toward the success of the domestic commercial space industry.”
Social-media firms make almost all their money from advertising. This pushes them to collect as much user data as possible, the better to target ads. Critics call this “surveillance capitalism”. It also gives them every reason to make their services as addictive as possible, so users watch more ads…
The new owner could turn TikTok from a social-media service to a digital commonwealth, governed by a set of rules akin to a constitution with its own checks and balances. User councils (a legislature, if you will) could have a say in writing guidelines for content moderation. Management (the executive branch) would be obliged to follow due process. And people who felt their posts had been wrongfully taken down could appeal to an independent arbiter (the judiciary). Facebook has toyed with platform constitutionalism now has an “oversight board” to hear user appeals…
Why would any company limit itself this way? For one thing, it is what some firms say they want. Microsoft in particular claims to be a responsible tech giant. In January 2020 its chief executive, Satya Nadella, told fellow plutocrats in Davos about the need for “data dignity”—ie, granting users more control over their data and a bigger share of the value these data create…Governments increasingly concur. In its Digital Services Act, to be unveiled in 2020, the European Union is likely to demand transparency and due process from social-media platforms…In the United States, Andrew Yang, a former Democratic presidential candidate, has launched a campaign to get online firms to pay users a “digital dividend”. Getting ahead of such ideas makes more sense than re-engineering platforms later to comply.
Excerpt from: Reconstituted: Schumpeter, Economist, Sept 5, 2020
The US Secretary of Defense stated in September 2020 that America’s air, space and cyber warriors “will be at the forefront of tomorrow’s high-end fight.” That means confronting near-peer competitors China and Russia. That means shifting the focus from defeating violent extremist groups to deterring great power competitors. It means fighting a high-intensity battle that combines all domains of warfare. “In this era of great power competition, we cannot take for granted the United States’ long-held advantages,” Esper said.
The last time an enemy force dropped a bomb on American troops was in the Korean War. “China and Russia, seek to erode our longstanding dominance in air power through long-range fires, anti-access/area-denial systems and other asymmetric capabilities designed to counter our strengths,” he said. “Meanwhile, in space, Moscow and Beijing have turned a once peaceful arena into a warfighting domain.” China and Russia have placed weapons on satellites and are developing directed energy weapons to exploit U.S. systems “and chip away at our military advantage,” he said.
Russia, China, North Korea, Iran and some violent extremist groups also look to exploit cyberspace to undermine U.S. security without confronting American conventional overmatch. “They do this all in an increasingly ‘gray zone’ of engagement that keeps us in a perpetual state of competition,’ the secretary said…The fiscal 2020 Defense Department research and development budget is the largest in history, he said, and it concentrates on critical technologies such as hypersonic weapons, directed energy and autonomous systems.
“In the Air Force, specifically, we are modernizing our force for the 21st century with aircraft such as the B-21, the X-37 and the Next Generation Air Dominance platform,” Esper said. “Equally important, we are transforming the way we fight through the implementation of novel concepts such as Dynamic Force Employment, which provides scalable options to employ the joint force while preserving our capabilities for major combat.”
To realize the full potential of new concepts the department must be able to exchange and synchronize information across systems, services and platforms, seamlessly across all domains, he said. “The Department of the Air Force is leading on this front with the advancement of Joint All-Domain Command and Control,” Esper said. This concept is part of the development of a Joint Warfighting concept that will drive transition to all-domain operations, he said. “
For these breakthroughs to succeed in any future conflict … we must maintain superiority in the ultimate high ground — space,” Esper said…In collaboration with academia and industry, the Air Force’s AI Accelerator program is able to rapidly prototype cutting-edge innovation,” Esper said. One example of this was the AI technology used to speed-up the development of F-15EX.
Excerpts from Esper: Air Force, Space Force Leading Charge to New Technologies, DOD News, Sept. 16, 2020
Ever since China claimed success in the secretive launch of an experimental spacecraft, experts have been pondering over what it could be and what it did in space.The spacecraft – mounted on a Long March 2F rocket – was launched from the Jiuquan Satellite Launch Centre in northern China on Sept. 4, 2020 and safely returned to Earth after two days in orbit…Unlike recent Chinese high-profile space missions, very few details have emerged about the vehicle and no visuals have been released. Chinese authorities have been tight-lipped about the nature of the short-duration excursion and what technologies were tested. The exact launch and landing times were not revealed, nor was the landing site although it is thought to be the Taklamakan Desert, which is in northwest China.
Three years ago, China said it would launch a space vessel in 2020 that “will fly into the sky like an aircraft” and be reusable. A reusable spacecraft – as the name implies can undertake multiple trips to space – thereby potentially lowering the overall cost of launch activity. A traditional one-off spacecraft – costing tens of millions of dollars – is practically rendered useless after a single mission.
The experimental vessel reached an altitude of about 350km, which is in line with China’s previous crewed flights. The spacecraft also released an unknown object into the orbit before returning to Earth…Once the testing is complete, such a vehicle could be used to launch and repair satellites, survey the Earth, as well as take astronauts and goods to and from orbit, possibly to a planned future Chinese space station.
The Chinese craft’s size and shape remain unclear but it is widely believed to be some sort of uncrewed space plane similar to the X-37B Orbital Test Vehicle operated by the US Air Force. The recent mission could be linked to the Shenlong – or divine dragon – space plane project, which has been in development for some time, according to reports. A second Chinese reusable space plane called Tengyun, or cloud climber, is also in the works. If confirmed as a space plane, China would become only the third country to have successfully launched such a vehicle into orbit after the US and the former Soviet Union. The European Space Agency is working on its own reusable orbital vehicle called Space Rider, while India is also said to be developing a space shuttle-like craft.
The X-37B, resembling a miniature space shuttle, has been in orbit since late May 2020 following its launch on its sixth assignment. Very little is known about the X-37B’s missions, prompting speculation that the planes could be used for spying activity or testing space weapons.
According to Bleddyn Bowen, China’s spacecraft launch is “just another part of China becoming a comprehensive space power that utilizes space technology for the purposes of war, development, and prestige like all others”.
Pratik Jakhar, China claims ‘important breakthrough’ in space mission shrouded in mystery, BBC, Sept. 9, 2020
The U.S. response to the 9/11 attacks launched an Air Force special operations unit into more than 6,900 days, or nearly two decades, of continuous deployments and combat operations in the Middle East, officials said. Within weeks of the terrorist attacks on the U.S., the 17th Special Tactics Squadron deployed with Army Rangers on raids into southern Afghanistan on Oct. 19, 2001. Since then, the squadron has had no breaks in deployment. “We fight, bleed and laugh beside [the Rangers],” said Staff Sgt. Ryan Duhon, a tactical air control party operator quoted in last month’s statement. “We win as a team or fail as a team.”….
The Special Tactics community, whose airmen conduct personnel recovery, precision strike missions and battlefield surgery, is the most highly decorated in the Air Force since the Vietnam War.
Excerpt from CHAD GARLAND, Air Force special ops members ‘fight, bleed and laugh’ on nearly 7,000 days of deployments, Stars and Stripes, Sept. 10, 2020
Based on United States Report released in 2020 “Military and Security Developments Involving the People’s Republic of China” by the Secretary of Defense, China’s progress in upgrading its strategic bombers to carry nuclear payloads puts it on the cusp of achieving a “triad” of delivery systems ((1) land-launched nuclear missiles, (2) nuclear-armed submarines, and (3) aircraft delivered nuclear bombs). The development of a nuclear triad raises the long-term stakes in the complex relationship between Beijing and Washington. …The heavy emphasis on China’s nuclear improvements will probably be used by the Pentagon to press lawmakers and the public to support the massive reinvestment already underway in modernized nuclear weapons. This includes the B-21 bomber, an $85 billion Ground Based Strategic Deterrent ICBM program and the $128 billion Columbia-class ballistic missile submarine.
China’s defense ministry denounced the report as a document created with a “zero-sum-game mindset and Cold War mentality,” saying that the U.S. had “misinterpreted” the country’s nuclear policy and stirred up confrontation with Taiwan. “It’s extremely wrong and China firmly rejects it.” As part of President Xi Jinping’s efforts to build a “world class” military by 2049, the Defense Department report said the People’s Liberation Army has already achieved parity with or exceeded the U.S. in at least three key areas: shipbuilding, land-based conventional ballistic and cruise missiles and integrated air defense systems.
While the country has one overseas military base, in the East African nation of Djibouti, China’s government “is very likely already considering and planning for additional overseas military logistics facilities to support naval, air and ground forces…”. China’s current nuclear arsenal includes 100 silo or road-mobile intercontinental ballistic missiles, as many as six Jin-class nuclear missile submarines capable of carrying 12 missiles each and a new air-refuelable H-6N long-range bomber. The bomber is an upgrade on a previous model and comes with a modified fuselage “that allows it to carry either a drone or an air-launched ballistic missile that may be nuclear-capable.
Excerpts from Anthony Capaccio, Pentagon Warns China Is Nearing a Milestone in Nuclear Weapons Buildup, Bloomberg, Sept. 1, 2020
China denounced the Pentagon report. According to Xinhua, the Pentagon report is crowded with anti-China hogwash. Fear-mongering over China has always been the Pentagon’s trick to demand more appropriations from the U.S. Congress. A fabricated grave threat to world peace can also help Washington sell more weapons to its allies, and serves as an excuse for America’s pursuit of global domination…While Washington is selling its latest “China-scare” fiction to the world, it is hard to overlook such facts that the United States spent more on military than 144 countries combined in 2018 and maintains nearly 800 military bases in over 70 countries.
Excerpt from Commentary: Lies, conspiracies behind Pentagon’s China military report, Xinhua, Sept. 5, 2020
The Defense Advanced Research Projects Agency launched its Electronic Resurgence Initiative (ERI) to help reboot a domestic chip industry that has been moving steadily offshore for decades…. Program officials and chip industry executives foresee the emergence of a “5th generation of computing” based on current cloud infrastructure while combining AI, the Internet of Things (IoT) and 5G wireless networks to deliver big data.
“The U.S. microelectronics industry is at an inflection point,” Ellen Lord, undersecretary of defense for acquisition and sustainment, told the virtual ERI summit. After decades of offshoring of chip fabrication, packaging and testing capabilities, “How do we reverse this trend?” The Defense Department is expanding its technology base efforts by implementing a “step-by-step process for reconstituting the microelectronics supply chain,” focusing on various segments of the semiconductor ecosystem, including memory devices, logic, ICs and advanced packaging along with testing and assembly.
“While DoD does not drive the electronics market,” constituting only about 1 percent of demand, “we can drive significant R&D,” ERI is advancing public-private partnerships that provide a framework for commercial innovation. The result would be “pathfinder projects” geared toward a renewal of U.S. chip manufacturing. As trade frictions with China grow, ERI is placing greater focus on ensuring the pedigree of U.S. electronics supply chain. “We need to find a path to domestic sources,” said Lord.
While nurturing government-industry partnerships as part of an emerging next-generation U.S. industrial policy, this year’s DARPA summit also emphasized chip standards and processes for securing fabs, foundry services, devices and foundational microelectronics. In that vein, U.S. officials stressed new chips metrics like “quantifiable assurance” to secure dual-use devices that could end up in weapons or an IoT device.
“Our interests to protect both the confidentiality and the integrity of our supply chain are aligned with commercial interests, and we will continue to work across government and industry to develop and implement our quantitative assurance strategy based on zero trust,” said Nicole Petta, principal director of DoD’s microelectronics office. The “zero trust” approach assumes no device is safe, and that all microelectronics components must be validated before deployment. The framework marks a philosophical departure from DoD’s “trusted foundry” approach instituted in the 1990s, largely because “perimeter defenses” failed to account for insider threats…
DARPA Chip Efforts Pivots to Securing US Supply Chain, https://www.hpcwire.com, Aug. 24, 2020
Despite a UN treaty banning mercenaries, their day is far from over. Some analysts think there are now more of them in Africa than ever. But can they ever be a force for good? ….In the years after most African countries gained independence, mercenaries were notorious for supporting secessionist movements and mounting coups.
Western governments have in the past winked at mercenary activity that served their commercial interests. But nowadays Russia is seen as the leading country egging on mercenaries to help it wield influence. It does so mainly through Wagner, ***whose founder, Yevgeny Prigozhin, is close to President Vladimir Putin.
Wagner has been hired to prop up a number of shaky African regimes. In Sudan it tried to sustain the blood-drenched dictatorship of Omar al-Bashir. He was ousted last year after big protests. In 2018 hundreds of Wagner men arrived in the Central African Republic to guard diamond mines, train the army and provide bodyguards for an embattled president, Faustin-Archange Touadéra. In Guinea, where Rusal, a Russian aluminium giant, has a big stake, Wagner has cosied up to President Alpha Condé, who has bloodily faced down protests against a new constitution that lets him have a third term in office. In Libya, despite a un arms embargo, Wagner is reported to have deployed 800-1,200 operatives in support of a rebel general, Khalifar Haftar, who has been trying to defeat the UN-recognised government….
Mercenaries have three main advantages over regular armies. First, they give plausible deniability. Using them, a government such as Russia’s can sponsor military action abroad while pretending not to. Second, they tend to be efficient, experienced, nimble and flexible. Third, they are cheaper than regular armies. Whereas soldiers receive lifelong contracts and pensions, mercenaries are often paid by the job..
Excerpts from Soldiers of misfortune: Why African governments still hire mercenaries, Economist, May 30, 2020
The U.S. determination that Hong Kong is no longer autonomous from mainland China, under the Hong Kong Policy Act of 1992, will have significant implications for the city’s exporters and businesses. Sensitive U.S. technologies could no longer be imported into Hong Kong, and the city’s exports might be hit with the same tariffs levied on Chinese trade.
But the act doesn’t cover the far more extensive role Hong Kong plays as China’s main point of access to global finance. As of 2019, mainland Chinese banks held 8,816 trillion Hong Kong dollars ($1.137 trillion) in assets in the semiautonomous city, an amount that has risen 373% in the last decade…. China’s banks do much of their international business, mostly conducted in U.S. dollars, from Hong Kong. With Shanghai inside China’s walled garden of capital controls, there is no obvious replacement.
While the U.S. doesn’t directly control Hong Kong’s status as a financial center, Washington has demonstrated its extensive reach over the dollar system, with penalties against Korean, French and Lebanese financiers for dealing with sanctioned parties. The U.S. recently threatened Iraq’s access to the New York Federal Reserve, demonstrating a growing willingness to use financial infrastructure as a tool of foreign policy. Even though the U.S. can’t legislate Hong Kong’s ability to support Chinese banks out of existence, the role of an international funding hub is greatly reduced if your counterparties are too fearful to do business with you.
Putting the ability of Chinese banks to conduct dollar-denominated activities at risk would be deleterious to China’s ability to operate financially overseas, posing a challenge for the largely dollar-denominated Belt and Road global infrastructure initiative. It would also put the more financially fragile parts of the country, like its debt-laden property developers, under strain. China’s hope to develop yuan into an influential currency also centers on Hong Kong’s remaining a viable global financial center—more than 70% of international trade in the yuan is done in the city.
Excerpts from Mike Bird, How the US Could Really Hurt China, WSJ, May 290, 2020
The US government is starting to lay down the groundwork for diplomacy on the moon. On 15 May, 2020 NASA administrator Jim Bridenstine released a set of principles that will govern the Artemis Accords on the exploration of the moon. The accords are named after NASA’s Artemis programme, the US initiative to explore the moon, with a planned launch of astronauts to the lunar surface in 2024. Other countries are also increasingly turning towards the moon, which is concerning when a landing on the moon can send up clouds of potentially hazardous dust that travel a long way across the surface and even into orbit…
At the moment, there is little practical international law governing activities on the moon. The Outer Space Treaty of 1967 deals with general space exploration, while the more specific Moon Agreement of 1984 states that “the moon and its natural resources are the common heritage of all mankind”, prohibiting the ownership of any part of the moon or any resources from the moon….However, no nation capable of human space flight has signed the Moon Agreement, effectively rendering it moot. In fact, in April 2020, US president Donald Trump issued an executive order supporting moon mining and taking advantage of the natural resources of space.
The Artemis Accords aim to protect historic locations like the Apollo landing sites but encourage mining in other areas. They also promote transparency and communication between nations, requiring signatories to share their lunar plans, register any spacecraft sent to or around the moon and release scientific data to the public. That transparency requirement might be a stumbling block for potential parties to the accords, says Forczyk. “I really don’t know how much countries are going to be willing to share some of their more delicate, sensitive information,” she says. “
The rest of the stipulations of the Artemis Accords are about safety: nations will be able to set “safety zones” to protect their activities on the moon, they will have to work to mitigate the effects of debris in orbit around the moon and they will agree to provide emergency assistance to any astronauts in distress.
Rather than attempting to put together an international treaty, which could be difficult to negotiate before NASA’s next crewed launch to the moon, the US will sign bilateral agreements with individual countries.
Excerpts from Leah Crane, NASA’s Artemis Accords aim to lay down the law of the land on the moon, New Scientist, May 20, 2020
The elite US special operations forces are ill-equipped for high-tech warfare with China and Russia, experts warn, as the Trump administration pivots from the “war on terror” to a struggle with geopolitical rivals. Special operations, known for kicking down doors and eliminating high-value targets, number 70,000 personnel, cost $13bn a year and have carried much of the burden of the war on terror. But it is unclear what role they will play as the Pentagon moves to redeploy troops from Afghanistan to the Indo-Pacific to counter China’s regional ambitions.
General Richard Clarke, commander of special operations command (Socom), told an industry conference this week that the US needed to develop new capabilities to “compete and win” with Russia and China. He added that Socom must develop cyber skills and focus on influence campaigns rather than “the kill-capture missions” that characterised his own time in Afghanistan after the September 11 2001 attacks. Socom’s fighters include US Navy Seals, Army Green Berets and Marine Corps Raiders. Defence officials say China has raised military spending and research with the aim of exploiting American vulnerabilities, while Russia has tested out new technology during combat in Syria. “Maybe we are further behind than we know,” Colonel Michael McGuire told the annual Special Operations Industry Conference
McGuire highlighted US vulnerabilities in cyber security, and soft-power tactics by America’s enemies that could “drive fissures through some of our alliances”. He proposed shifting focus to defence over attack. “You could have hundreds and thousands of engagements every single day in a fight against China. We are just not fast enough, dynamic enough or scaleable enough to handle that challenge,” said Chris Brose, chief strategy officer at Anduril…. He added “Most of the US-China competition is not going to be fighting world war three,” he said. “It’s going to be kicking each other under the table.”….
US special operators have for years had the run of the battlefield. But they face very different conditions in any fight against China, which has developed an arsenal of missiles, fighter jets, spy planes and other eavesdropping and jamming techniques that would make it hard for America to conceal troops, transport and communications. Special operations forces are not ready for operations against a near-peer foe, such as China, in a direct engagement… He called for a return to their cold war roots. “Vintage special operations forces is about stealth, cunning and being able to blend in — they were triathletes rather than muscle-bound infantrymen with tattoos,” said the former officer.
David Maxwell, a former Green Beret and military analyst, is among those who favour a shift towards political warfare.One such idea of his would involve a popular writer being commissioned to pen fictionalised war stories based in Taiwan intended to discourage Beijing from invading the self-governing island. He told a gathering of Pacific special forces operators in February 2020 that fictional losses could “tell the stories of the demise of Chinese soldiers who are the end of their parents’ bloodline”. He argued that Beijing’s former one-child policy could be weaponised to convince China that war would be too costly. But Mr Maxwell said such ideas have yet to catch on. He added that psyops officers lamented to him that it was “easier to get permission to put a hellfire missile on the forehead of a terrorist than it is to get permission to put an idea between his ears”.
Excerpts from Katrina Manson , US elite forces ill-equipped for cold war with China, FT, May 16, 2020
United States officials granted Google permission to turn on a high-speed internet link to Taiwan but not to the Chinese territory of Hong Kong, citing national-security concerns in a ruling that underscores fraying ties between Washington and Beijing.“There is a significant risk that the grant of a direct cable connection between the United States and Hong Kong would “pose an unacceptable risk to the national security and law enforcement interests of the United States,” the U.S. Department of Justice said in its decision, which was backed by the departments of Homeland Security and Defense. The agencies instead urged the Federal Communications Commission to grant Google owner Alphabet permission to start using the portion of its 8,000-mile underwater Pacific Light cable that connects California to Taiwan. .
The decision threatens to end Hong Kong’s dominance as a top destination for U.S. internet cables and puts at risk several ongoing projects, including a Facebook backed fiber-optic line linking Los Angeles to Hong Kong and a Google-backed project linking Hong Kong to the U.S. territory of Guam.
Washington is turning to the self-ruling island of Taiwan, which the U.S. supports with arms sales and unofficial political ties despite Beijing’s claims that it is part of China. U.S. officials are also considering alternatives such as Indonesia, Philippines, Thailand, and Vietnam.
Google and Facebook originally teamed up to build Pacific Light to Hong Kong in 2016, continuing the Silicon Valley giants’ long-term strategy to take more control of the network pipes that connect their data centers. The web companies and their Chinese investment partners kept building the cable even as U.S. authorities withheld the regulatory approvals they needed to start using it.
Major international data projects are subject to review by Team Telecom, a coalition of federal agencies with national-security oversight. The panel has taken a hard line against China in recent years. Team Telecom in 2018 recommended for the first time the denial of a Chinese application—that of China Mobile —to provide telecom services through U.S. networks, citing national-security and law-enforcement concerns.
President Trump on April 4 2020 signed an executive order that puts the attorney general in charge of overseeing Team Telecom and gives the panel direct authority to review existing licenses to provide such services, including those issued earlier to Chinese state-owned operators China Telecom and China Unicom.
Excerpts from Drew FitzGerald and Kate O’Keeffe, U.S. Allows Google Internet Project to Advance Only if Hong Kong Is Cut Out, WSJ, Apr. 9, 2020
The Ocean of Things of Defence Advanced Research Projects Agency (DARPA) aims to wire up the high seas with swarms of floating, connected sensors. Such devices are not in themselves new. There are around 6,000 floating sensors deployed around the world’s oceans, run by navies and research institutes. What is unprecedented is the scale of DARPA’s ambition. Over the next few years it hopes to deploy 50,000 sensors across 1m square kilometres of sea, an area considerably larger than Texas. The eventual goal—much more distant—is to enable the continuous monitoring and analysis of a significant fraction of the world’s oceans.
Existing “floating instrument packages”, known as floats or drifters, are often custom-built, and usually contain the highest-quality instruments available. They therefore tend to be expensive, and are bought only in small numbers. A typical existing float, designed for scientific research, is the Argo. It costs around $20,000, and can measure water temperature and salinity. The Ocean of Things takes the opposite approach. The aim is to cram as many cheap, off-the-shelf components as possible into a single low-cost package. Current float prototypes cost around $750…That would allow tens of thousands to be deployed without breaking the bank. Large numbers are crucial for coverage. They also help compensate for inaccuracies in individual instruments.
The project’s researchers are evaluating three designs from different manufacturers, ranging in size from about six to 18 litres. One, proposed by Xerox’s Palo Alto Research Centre, is made of glass, like a traditional Japanese fishing float. A second, from a firm called Areté Associates, has an aluminium shell, and uses wood for buoyancy. Both models feature solar panels. The third, made by a company called Numurus, is made of lacquered cardboard, and relies entirely on its batteries. All three are designed to last for a year or so and are made to be as environmentally friendly as possible, with minimal use of plastics. That is important because, at the end of their mission, the floats are designed to scuttle themselves…
With 361m square kilometres of ocean on the planet, a true Ocean of Things, monitoring everything on and under the water, would require about 18m floats.
Excerpts from Big Wet Data: The Ocean of Things, Economist, Mar. 14, 2020
It is not just DNA that people scatter to the wind as they go about their business. They shed a whole range of other chemicals as well, in their breath, their urine, their faeces and their sweat. Collectively, these molecules are referred to as metabolites….
The most common way of analysing metabolite content is gas chromatography-mass spectrometry. This technique sorts molecules by their weight, producing a pattern of peaks that correspond to different substances….There are, however, a lot of information sources out there, in the form of publicly available metabolite databases. The databases themselves are getting better, too…. A study just published by Feliciano Priego-Capote at University of Cordoba, in Spain, for example, shows it is possible to extract much meaningful information from even a dried-up drop of sweat. “The day is coming soon”, observes Cecil Lewis, a molecular anthropologist at University of Oklahoma, who is studying the matter, “when it will be possible to swab a person’s desk, steering wheel or phone and determine a wide range of incredibly private things about them….
The police may be tempted to push the boundaries as well. The fourth amendment to America’s constitution protects against unwarranted searches and seizure of evidence. This means it is hard to force someone to give a sample. But if obtaining such merely requires taking a swab of a surface in a public place—perhaps a keyboard someone has just used—the 4th amendment is unlikely to apply.
That is not necessarily wrong, if it means more criminals are caught and convicted. But it needs to be thought about carefully, because many metabolites are sticky. Cocaine is a case in point. Studies have shown that as many as two-thirds of the dollar bills in circulation in America carry traces of this substance, which might thus end up on the fingertips of the innocent, as well as the guilty.
Excerpts from Metabolites and You, Economist, Feb. 15, 2019
Before pulling the trigger, a sniper planning to assassinate an enemy operative must be sure the right person is in the cross-hairs. Western forces commonly use software that compares a suspect’s facial features or gait with those recorded in libraries of biometric data compiled by police and intelligence agencies. Such technology can, however, be foiled by a disguise, head-covering or even an affected limp. For this reason America’s Special Operations Command (SOC), which oversees the units responsible for such operations in the various arms of America’s forces, has long wanted extra ways to confirm a potential target’s identity. Responding to a request from soc, the Combating Terrorism Technical Support Office (CTTSO), an agency of the defence department, has now developed a new tool for the job.
This system, dubbed Jetson, is able to measure, from up to 200 metres away, the minute vibrations induced in clothing by someone’s heartbeat. Since hearts differ in both shape and contraction pattern, the details of heartbeats differ, too. The effect of this on the fabric of garments produces what Ideal Innovations, a firm involved in the Jetson project, calls a “heartprint”—a pattern reckoned sufficiently distinctive to confirm someone’s identity.
To measure heartprints remotely Jetson employs gadgets called laser vibrometers. These work by detecting minute variations in a laser beam that has been reflected off an object of interest. They have been used for decades to study things like bridges, aircraft bodies, warship cannons and wind turbines—searching for otherwise-invisible cracks, air pockets and other dangerous defects in materials. However, only in the past five years or so has laser vibrometry become good enough to distinguish the vibrations induced in fabric by heartprints….
Candice Tresch, a spokeswoman for the cttso…. cannot discuss the process by which heartprint libraries might be built up in the first place. One starting point, presumably, would be to catalogue the heartbeats of detainees in the way that fingerprints and dna samples are now taken routinely.
Excerpts from Personal identificationPeople can now be identified at a distance by their heartbeat, Economist, Jan 23, 2020
The internet is the “spiritual home” of hundreds of millions of Chinese people. So China’s leader, Xi Jinping, described it in 2016. He said he expected citizens to help keep the place tidy. Many have taken up the challenge. In December 2019 netizens reported 12.2m pieces of “inappropriate” content to the authorities—four times as many as in the same month of 2015. The surge does not indicate that the internet in China is becoming more unruly. Rather, censorship is becoming more bottom-up.
Officials have been mobilising people to join the fight in this “drawn-out war”, as a magazine editor called it in a speech in September to Shanghai’s first group of city-appointed volunteer censors. “Internet governance requires that every netizen take part,” an official told the gathering. It was arranged by the city’s cyber-administration during its first “propaganda month” promoting citizen censorship. The 140 people there swore to report any online “disorder”…
Information-technology rules, which took effect on December 1st, 2019 oblige new subscribers to mobile-phone services not only to prove their identities, as has long been required, but also to have their faces scanned. That, presumably, will make it easier for police to catch the people who post the bad stuff online.
Excerpt from The Year of the Rat-fink: Online Censorship, Economist, Jan 18, 2020
New and unproved technologies—this time computer systems capable of performing superhuman tasks using machine learning and other forms of artificial intelligence (AI)—threaten to destabilise the global “strategic balance”, by seeming to offer ways to launch a knockout blow against a nuclear-armed adversary, without triggering an all-out war.
A report issued in November by America’s National Security Commission on Artificial Intelligence, a body created by Congress and chaired by Eric Schmidt, a former boss of Google, and Robert Work, who was deputy defence secretary from 2014-17, ponders how AI systems may reshape global balances of power, as dramatically as electricity changed warfare and society in the 19th century. Notably, it focuses on the ability of AI to “find the needle in the haystack”, by spotting patterns and anomalies in vast pools of data…In a military context, it may one day find the stealthiest nuclear-armed submarines, wherever they lurk. The commission is blunt. Nuclear deterrence could be undermined if AI-equipped systems succeed in tracking and targeting previously invulnerable military assets. That in turn could increase incentives for states, in a crisis, to launch a devastating pre-emptive strike. China’s rise as an AI power represents the most complex strategic challenge that America faces, the commission adds, because the two rivals’ tech sectors are so entangled by commercial, academic and investment ties.
Some Chinese officials sound gung-ho about AI as a path to prosperity and development, with few qualms about privacy or lost jobs. Still, other Chinese fret about AI that might put winning a war ahead of global stability, like some game-playing doomsday machine. Chinese officials have studied initiatives such as the “Digital Geneva Convention” drafted by Microsoft, a technology giant. This would require states to forswear cyber-attacks on such critical infrastructure as power grids, hospitals and international financial systems. AI would make it easier to locate and exploit vulnerabilities in these…
One obstacle is physical. Warheads or missile defences can be counted by weapons inspectors. In contrast, rival powers cannot safely show off their most potent algorithms, or even describe AI capabilities in a verifiable way….Westerners worry especially about so-called “black box” algorithms, powerful systems that generate seemingly accurate results but whose reasoning is a mystery even to their designers.
Excerpts from Chaguan: The Digital Divide, Economist, Jan 18, 2019
Many African governments have unwisely bought biometric proprietary systems of private companies, meaning that they are forced to go back to the seller for maintenance, upgrades and new components. That can be expensive. When Nigeria wanted to use its own card-printing machines, the firm that had sold it software tried to insist that Nigeria buy its machines as well… They eventually got help from Pakistan, which had software that worked on any machine.
But there are signs of change coming from within the industry itself, spurred by developments in an entirely different part of the world: India. Like Africa, it is vast, poor and home to more than a billion people. Yet as a single country India has tremendous negotiating power. When India developed its “Aadhaar” identity programme it invited leading firms to bid—but with the caveat that they provide open-source software, or code that can be examined and changed by others. This allowed engineers to knit together different bits of a system such as databases, enrollment software, fingerprint scanners and so on. The suppliers agreed because they did not want to miss out on the biggest identity bonanza the world had ever seen. Moreover, India’s spending led to a big increase in production, which caused prices to fall across the industry.
Even as governments think about the technical problems of recording identity, they also need to grapple with the far more consequential ones around rights, governance and privacy. The starkest warning of the misuse of identity was in the Rwandan genocide, where ID papers listed ethnicity, making it easy to target Tutsis. Since data on religion and ethnicity are not needed to provide services, governments should not be hoovering it up.
States should also be wary of denying people their rights by creating a class of citizens without papers. In Kenya, for example, the government wants everyone to register for ID cards, but it discriminates against members of the Nubian minority by forcing them to appear before a security panel to prove their nationality. Modern identity systems promise to bring many benefits to Africa. But as they proliferate, so too will the temptation for politicians to misuse them
Excerpts from Identity Documentation in Africa: Papers Please, Economist, Dec. 7, 2019
In 2018, one of the Novichok nerve agents was used in an attempt to assassinate a former Russian spy on U.K. soil—spurring the United States and allies to lift the veil of secrecy and mount a drive to outlaw the obscure class of nerve agents, concocted in a Soviet weapons lab during the height of the Cold War. Now, their effort to amend the Chemical Weapons Convention (CWC) is about to pay off.
On 9 October, the Executive Council of the Organisation for the Prohibition of Chemical Weapons (OPCW), the body that administers the treaty, reviewed a revised proposal from Russia that would bring Novichoks under the treaty’s verification regime, along with a class of potential weapons known as carbamates. If the Russian proposal and a similar one from the United States, Canada, and the Netherlands are approved at a treaty review meeting in December 2019.
The newfound glasnost on Novichoks, also known as fourth-generation nerve agents, should spur research on their mechanism of action and on countermeasures and treatments. Chemical weapons experts had been whispering about Novichoks for decades. Treaty nations have long resisted adding Novichoks to the CWC’s so-called Schedule 1 list of chemical weapons, which compels signatories to declare and destroy any stockpiles. “People were worried about a Pandora’s box,” fearing such a listing would force them to regulate ingredients of the weapons, Koblentz says. That could hamper the chemical industry and might clue in enemies on how to cook them up. (Who has the agents now is anyone’s guess.) Indeed, the U.S. government for years classified the Novichok agents as top secret. “There was a desire among Western countries to keep the information as limited as possible to avoid proliferation issues,” Koblentz says.
The 2018 assassination attempt against former Russian spy Sergei Skripal in Salisbury, U.K., thrust the Novichok agents into the spotlight. The botched attack gravely sickened Skripal, his daughter Yulia, two police officers who investigated the crime scene, and a couple—Charlie Rowley and Dawn Sturgess—who a few months later happened on a perfume bottle containing the agent. After long hospitalizations, the Skripals, the officers, and Rowley recovered; Sturgess died. The United Kingdom charged two Russian men, reportedly military intelligence officers, as the alleged assailants, and obtained a European warrant for their arrest; they remain at large in Russia.
Excerpts from Richard Stone, Obscure Cold War nerve agents set to be banned, Science, Oct. 25, 2019
U.S. military researchers asked in 2019 two companies to develop new kinds of biological sensors that can detect underground disturbances or the presence of buried chemicals or weapons.
Officials of the U.S. Defense Advanced Research Projects Agency (DARPA) in Arlington, Va., are looking to Raytheon BBN Technologies, and Signature Science, for the BioReporters for Subterranean Surveillance program. This project seeks to use indigenous and engineered organisms to sense changes of interest to military commanders in natural and built environments. Raytheon BBN and Signature Science won separate $1.6 million contracts for the Subterranean Surveillance progam.
The two companies will perform laboratory research and proof-of-concept demonstrations of biological sensing systems in well- controlled field tests that take advantage of recent advances in microbial science and synthetic biology to develop biological sensors, signal transducers, and reporters that can reveal subterranean phenomena at a distance. Bio Reporters should be able to sense a phenomenon at least one meter below the surface, propagate a signal to the surface within seven days, and be continuously detectable on the surface at a distance of 10 meters over the subsequent seven days.
DARPA researchers want Raytheon BBN and Signature Science experts to take advantage of the extensive biological networks that exist underground to monitor large areas to increase the military’s ability to detect subterranean events without the need for precise coordinates.
Excerpts from John Keller, Researchers eye new biological sensors to to detect underground objects like buried chemicals and weapons, https://www.militaryaerospace.com, Nov. 6, 2019
In more detail Signature Science and its partner, the Texas A&M University Center for Phage Technology, aim to leverage modern and synthetic phage biology and the straightforward molecular genetics of the harmless soil bacterium Bacillus subtilis to generate a new platform to recognize and report on specific chemical threats underground. The Spore-Phage Amplified Detection (SPADe) method, potentially extensible to explosives, radiation or physical disturbance sensing, seeks to substantially advance currently used techniques which rely heavily on manual soil testing.
The U.S. Defense Department could one day place thousands of low-cost, floating sensors into the ocean to collect environmental data, such as water temperature, as well as activity data about commercial vessels, aircraft and even fish or maritime mammals moving through the area. But others also are dropping similar sensors in the world’s oceans, and defense researchers suggest many of those systems could be integrated into an even more comprehensive ocean-based Internet of Things.
The growing Internet of Things is mostly a land-based phenomenon, frequently in large cities with loads of sensors. But researchers at the Defense Advanced Research Projects Agency (DARPA) foresee a wide range of military and civil benefits from extending the Internet of Things out to sea. The agency announced its Ocean of Things program in 2017. John Waterston, a program manager within DARPA’s Strategic Technology Office, says the sensors will float along the surface for at least one year, transmitting short messages via the Iridium satellite constellation back to a central location for analysis. “It’s a 280-byte in and 340-byte out message, so it’s a little bit more than a tweet. I like to say these things tweet about their environment,” he says.
The goal is to increase maritime awareness in a cost-effective way. Using existing systems to continuously monitor vast regions of the ocean would be cost prohibitive…. By coupling powerful analytical tools with commercial sensor technology, the agency intends to create floating sensor networks that significantly expand maritime awareness at a fraction of the cost of current approaches.
Waterston says one of the most interesting missions for the sensor might be to simply determine whether GPS signals are available in an area of interest for military operations. …The program also could help improve ocean modeling, which is important for forecasting weather, finding people who have fallen overboard or locating debris from a crashed aircraft. …The agency has yet to determine how many sensors it might eventually deploy, but they could number in the tens of thousands. To put that into perspective, DARPA officials compare the final density to placing a penny on the national mall, which Wikipedia says covers about 309 acres between the Ulysses S. Grant Memorial and the Lincoln Memorial….
In addition, Argo, an international program, uses several thousand battery-powered, robotic floating devices to measure temperature, salinity and current for climate and oceanographic research. The floats mostly drift 10 days at a time below the ocean surface. After rising and transmitting their data to satellites, they return to depth to drift for another 10 days. The floats go as deep as 2,000 meters, according to the Argo website.
It is possible an ocean-based Internet could provide data on demand to a variety of customers inside and outside the Defense Department. If, for example, a government agency needs the water temperature in a given area reported every six hours, or a combatant command needs to know what’s happening in the Mediterranean, or NATO officials want information between Gibraltar and Sicily, or commercial fishermen need data on where the shrimp or tuna are, they could simply request it. “It’s about serving the end users. If you can use that data, we can generate it for you,” he offers. “It’s a little bit like floats-as-a-service or data-as-a-service.”
Another option is that other organizations could purchase and deploy the DARPA-developed sensors. “I hope people want to come up with their own sensors or want to buy these. I imagine a marketplace where you get many commercial people buying these. Everyone could buy 500 and then take advantage of the service provided by the thousands that are out there. I could imagine this as that foundational community,” Waterston suggests.
DARPA currently is working with three teams led by the Palo Alto Research Center, better known as PARC***, Areté Associates and Numurus LLC to develop the floats. Leidos, Draper Laboratory, SoarTech and Geometric Data Analytics are providing software for data visualization, performance prediction, float command and control and detection.
Excerpts from George Seffers, DARPA’s Ocean of Things Ripples Across Research Areas, AFCEA.org, Nov. 1, 2019
***See also DARPA’s Vanishing Programmable Resources (VAPR) program. According to one scientist that works in the PARC’s disappearing electronics platform (called DUST) “Imagine being able to cover a large area, like the ocean floor, with billions of tiny sensors to ‘hear’ what is happening within the earth’s crust, and have them quickly disintegrate into, essentially, sand, leaving no trace and not harming the planet or sea life,
Powered by advances in artificial intelligence (AI), face-recognition systems are spreading like knotweed. Facebook, a social network, uses the technology to label people in uploaded photographs. Modern smartphones can be unlocked with it… America’s Department of Homeland Security reckons face recognition will scrutinise 97% of outbound airline passengers by 2023. Networks of face-recognition cameras are part of the police state China has built in Xinjiang, in the country’s far west. And a number of British police forces have tested the technology as a tool of mass surveillance in trials designed to spot criminals on the street. A backlash, though, is brewing.
Refuseniks can also take matters into their own hands by trying to hide their faces from the cameras or, as has happened recently during protests in Hong Kong, by pointing hand-held lasers at cctv cameras. to dazzle them. Meanwhile, a small but growing group of privacy campaigners and academics are looking at ways to subvert the underlying technology directly…
In 2010… an American researcher and artist named Adam Harvey created “cv [computer vision] Dazzle”, a style of make-up designed to fool face recognisers. It uses bright colours, high contrast, graded shading and asymmetric stylings to confound an algorithm’s assumptions about what a face looks like. To a human being, the result is still clearly a face. But a computer—or, at least, the specific algorithm Mr Harvey was aiming at—is baffled….
HyperFace is a newer project of Mr Harvey’s. Where cv Dazzle aims to alter faces, HyperFace aims to hide them among dozens of fakes. It uses blocky, semi-abstract and comparatively innocent-looking patterns that are designed to appeal as strongly as possible to face classifiers. The idea is to disguise the real thing among a sea of false positives. Clothes with the pattern, which features lines and sets of dark spots vaguely reminiscent of mouths and pairs of eyes are available…
Even in China, says Mr Harvey, only a fraction of cctv cameras collect pictures sharp enough for face recognition to work. Low-tech approaches can help, too. “Even small things like wearing turtlenecks, wearing sunglasses, looking at your phone [and therefore not at the cameras]—together these have some protective effect”.
Excerpts from As face-recognition technology spreads, so do ideas for subverting it: Fooling Big Brother, Economist, Aug. 17, 2019
Increasingly sophisticated technology that detects nuances in sound inaudible to humans is capturing clues about people’s likely locations, medical conditions and even physical features.Law-enforcement agencies are turning to those clues from the human voice to help sketch the faces of suspects. Banks are using them to catch scammers trying to imitate their customers on the phone, and doctors are using such data to detect the onset of dementia or depression. That has… raised fresh privacy concerns, as consumers’ biometric data is harnessed in novel ways.
“People have known that voice carries information for centuries,” said Rita Singh, a voice and machine-learning researcher at Carnegie Mellon University who receives funding from the Department of Homeland Security…Ms. Singh measures dozens of voice-quality features—such as raspiness or tremor—that relate to the inside of a person’s vocal tract and how an individual voice is produced. She detects so-called microvolumes of air that help create the sound waves that make up the human voice. The way they resonate in the vocal tract, along with other voice characteristics, provides clues on a person’s skull structure, height, weight and physical surroundings, she said.
Nuance’s voice-biometric and recognition software is designed to detect the gender, age and linguistic background of callers and whether a voice is synthetic or recorded. It helped one bank determine that a single person was responsible for tens of millions of dollars of theft, or 18% of the fraud the firm encountered in a year, said Brett Beranek, general manager of Nuance’s security and biometrics business.
Audio data from customer-service calls is also combined with information on how consumers typically interact with mobile apps and devices, said Howard Edelstein, chairman of behavioral biometric company Biocatch. The company can detect the cadence and pressure of swipes and taps on a smartphone. How a person holds a smartphone gives clues about their age, for example, allowing a financial firm to compare the age of the normal account user to the age of the caller…
If such data collected by a company were improperly sold or hacked, some fear recovering from identity theft could be even harder because physical features are innate and irreplaceable.
Sarah Krouse, What Your Voice Reveals About You, WSJ, Aug. 13, 2019
Vladimir Putin has confirmed on July 4, 2019 that the top-secret submarine that suffered a deadly fire was nuclear-powered, but Russia’s defence minister said the nuclear unit had been sealed off and was in “working order.” The incident, which left 14 Russian sailors dead, The Russian government has been slow to reveal information about the incident because the submersible, thought to be a deep-diving vessel used for research and reconnaissance, is among Russia’s most secret military projects. The fire aboard the “Losharik” AS-31 submersible began in the battery compartment and spread through the vessel…The vessel is thought to be made of a series of orb-like compartments, which increase the submersible’s resilience and allow it to dive to the ocean floor. Once there, it can perform topographical research and participate in rescue missions. It may even be able to tap and sever communications cables on the seabed.
Officials claim the submariners sealed themselves in one of the compartments to battle the blaze and toxic fumes…A Norwegian official told Reuters there had been no “formal communication” from Russia about an incident aboard a nuclear-powered vessel, but “we would have been happy to have been informed of such incidents”….Accidents aboard submarines invariably evoke comparisons to Putin’s clumsy handling of the sinking of the Kursk nuclear submarine in 2000, which left 118 dead and families desperate for information about their loved ones.
Excerpt Putin confirms fire-hit Russian submarine was nuclear-powerered, Guardian, July 4, 2019
Heterogeneous Collaborative Unmanned Systems (HCUS), as these drones will be known, would be dropped off by either a manned submarine or one of the navy’s big new Orca robot submersibles.
They could be delivered individually, but will more often be part of a collective system called an encapsulated payload. Such a system will then release small underwater vehicles able to identify ships and submarines by their acoustic signatures, and also aerial drones similar to the BlackWing reconnaissance drones already flown from certain naval vessels.
Once the initial intelligence these drones collect has been analysed, a payload’s operators will be in a position to relay further orders. They could, for example, send aerial drones ashore to drop off solar-powered ground sensors at specified points. These sensors, typically disguised as rocks, will send back the data they collect via drones of the sort that dropped them off. Some will have cameras or microphones, others seismometers which detect the vibrations of ground vehicles, while others still intercept radio traffic or Wi-Fi.
HCUS will also be capable of what are described as “limited offensive effects”. Small drones like BlackWing can be fitted with warheads powerful enough to destroy an SUV or a pickup truck. Such drones are already used to assassinate the leaders of enemy forces. They might be deployed against fuel and ammunition stores, too.
Unmanned systems such as HCUS thus promise greatly to expand the scope of submarine-based spying and special operations. Drones are cheap, expendable and can be deployed with no risk of loss of personnel. They are also “deniable”. Even when a spy drone is captured it is hard to prove where it came from. Teams of robot spies and saboteurs launched from submarines, both manned and unmanned, could thus become an important feature of the black-ops of 21st-century warfare.
Excerpts from Submarine-launched drone platoons will soon be emerging from the sea: Clandestine Warfare, Economist, June 22, 2019
The North Atlantic Treaty Organization (NATO) is looking to classify space as a domain for warfare in an attempt to deter China’s growing military power. If NATO’s proposal succeeds, the international alliance could move forward with the development and use of space weapons. According to NATO diplomats, the international organization is preparing to release an agreement that will officially declare space as a war domain. This means that aside from land, air and sea, space could also be used for military operations during times of war.
Although NATO’s partner countries currently own 65% of the satellites in space, China is reportedly preparing to launch a massive project that involves releasing constellations of satellites in low Earth orbit. China Aerospace Science and Industry Corp (CASIC) is planning to put in orbit 150 or more Hongyun satellites by 2023. Some of these satellites will provide commercial services like high-speed internet while others would be controlled by the Chinese military. These militarized satellites can be used to coordinate ground forces and to track approaching missiles.
“You can have warfare exclusively in space, but whoever controls space also controls what happens on land, on the sea and in the air,” according to Jamie Shea, a former NATO official. “If you don’t control space, you don’t control the other domains either.”
Excerpts from Inigo Monzon , NATO Prepares For Space Warfare By Militarizing Low Earth Orbit, International Business Times, June 24, 2019
The Mobil Foundation sought to use its tax-exempt grants to shape American laws and regulations on issues ranging from the climate crisis to toxic chemicals – with the explicit goal of benefiting Mobil, documents obtained by the Guardian newspaper show. Recipients of Mobil Foundation grants included Ivy League universities, branches of the National Academies and well-known civic organizations and environmental researchers. Benefits for Mobil included – in the foundation’s words – funding “a counterpoint to so-called ‘public interest’ groups”, helping Mobil obtain “early access” to scientific research, and offering the oil giant’s executives a forum to “challenge the US Environmental Protection Agency (EPA) behind-the-scenes”….
A third page reveals Mobil Foundation’s efforts to expand its audience inside environmental circles via a grant for the Environmental Law Institute, a half-century-old organization offering environmental law research and education to lawyers and judges. “Institute publications are widely read in the environmental community and are helpful in communicating industry’s concerns to such organizations,” the entry says. “Mobil Foundation grants will enhance environmental organizations’ views of Mobil, enable us to reach through ELI activities many groups that we do not communicate with, and enable Mobil to participate in their dialogue groups.”
The documents also show Mobil Foundation closely examining the work of individual researchers at dozens of colleges and universities as they made their funding decisions, listing ways that foundation grants would help shape research interests to benefit Mobil, help the company recruit future employees, or help combat environmental and safety regulations that Mobil considered costly. “It should be a wake-up call for university leaders, because what it says is that fossil fuel funding is not free,” said Geoffrey Supran, a postdoctoral researcher at Harvard and MIT. “When you take it, you pay with your university’s social license,” Supran said. “You pay by helping facilitate these companies’ political and public relations tactics.”
In some cases, the foundation described how volunteer-staffed not-for-profits had saved Mobil money by doing work that would have otherwise been performed by Mobil’s paid staff, like cleaning birds coated in oil following a Mobil spill. In 1987, the International Bird Rescue Research Center’s “rapid response and assistance to Mobil’s West Coast pipeline at a spill in Lebec, CA not only defused a potential public relations problem”, Mobil Foundation said, “but saved substantial costs by not requiring our department to fly cross country to respond”.d of trustees at the Woods Hole Oceanographic Institution (recipient of listed donations totalling over $200,000 from Mobil) and a part of UN efforts to study climate change.
Wise ultimately co-authored two UN Intergovernmental Panel on Climate Change reports, serving as a lead author on one. One report chapter Wise co-authored prominently recommended, among other things, burning natural gas (an ExxonMobil product) instead of coal as a way to combat climate change.
Excerpts from How Mobil pushed its oil agenda through ‘charitable giving’, Guardian, June 12, 2019
Behavioural biometrics make it possible to identify an individual’s “unique motion fingerprint”,… With the right software, data from a phone’s sensors can reveal details as personal as which part of someone’s foot strikes the pavement first, and how hard; the length of a walker’s stride; the number of strides per minute; and the swing and spring in the walker’s hips and step. It can also work out whether the phone in question is in a handbag, a pocket or held in a hand.
Using these variables, Unifyid, a private company, sorts gaits into about 50,000 distinct types. When coupled with information about a user’s finger pressure and speed on the touchscreen, as well as a device’s regular places of use—as revealed by its gps unit—that user’s identity can be pretty well determined, ction….Behavioural biometrics can, moreover, go beyond verifying a user’s identity. It can also detect circumstances in which it is likely that a fraud is being committed. On a device with a keyboard, for instance, a warning sign is when the typing takes on a staccato style, with a longer-than-usual finger “flight time” between keystrokes. This, according to Aleksander Kijek, head of product at Nethone, a firm in Warsaw that works out behavioural biometrics for companies that sell things online, is an indication that the device has been hijacked and is under the remote control of a computer program rather than a human typist…
Used wisely, behavioural biometrics could be a boon…Used unwisely, however, the system could become yet another electronic spy on people’s privacy, permitting complete strangers to monitor your every action, from the moment you reach for your phone in the morning, to when you fling it on the floor at night.
Excerpts from Behavioural biometrics: Online identification is getting more and more intrusive, Economist, May 23, 2019
America is no fan of Huawei. Its officials have spent months warning that the Chinese giant’s smartphones and networking gear could be Trojan horses for Chinese spies (something Huawei has repeatedly denied). They have threatened to withhold intelligence from any ally that allows the firm in.
On May 15th, 2019 they raised the stakes. President Donald Trump barred American firms from using telecoms equipment made by firms posing a “risk to national security”. His order named no names. But its target was plain. More significant was the announcement by the Commerce Department, on the same day, that it was adding Huawei to a list of firms with which American companies cannot do business without official permission. That amounts to a prohibition on exports of American technology to Huawei. It is a seismic decision, for no technology firm is an island. Supply chains are highly specialised and globally connected. Cutting them off—“weaponising interdependence”, in the jargon—can cause serious disruption. When ZTE, another Chinese technology company, received the same treatment in 2018 for violating American sanctions on Iran, it was brought to the brink of ruin. It survived only because Mr Trump intervened, claiming it was a favour to Xi Jinping, China’s president.
By May 20th, 2019 the impact of the ban was becoming clear. Google said it had stopped supplying the proprietary components of its Android mobile operating system to Huawei. A string of American chipmakers, including Intel, Qualcomm and Micron, have also ceased sales. Later that day the Commerce Department softened its line slightly, saying that firms could continue to supply Huawei for 90 days, but for existing products—for instance, with software updates for Huawei phones already in use. New sales, on which Huawei’s future revenue depends, remain banned…
Without Google’s co-operation, new Huawei phones will lack the latest versions of Android, and popular apps such as Gmail or Maps. That may not matter in China, where Google’s apps are forbidden. But it could be crippling in Europe, Huawei’s second-biggest market. Its telecoms business needs beefy server chips from Intel. The supply of software to manage those networks could dry up too. Huawei is developing replacements for all three, but they are far from ready….Accrording to Paul Triolo of Eurasia Group, the Huawei ban as “the logical end-game of the US campaign to take down Huawei”. A long-lasting ban would force the firm to look for alternative chips and software that Chinese suppliers would struggle to provide.
The second question concerns the reach of American power. The tangled nature of chip-industry supply chains means that many non-American companies make use of American parts or intellectual property. They may therefore consider themselves covered, wholly or partially, by the ban. Take Arm, a Britain-based firm whose technology powers chips in virtually every phone in the world, including those made by HiSilicon. Arm says that it will comply with the Commerce Department’s rules. That suggests that Arm will not grant Huawei new licences. It is unclear if Arm will offer support for existing licences, however. As Arm’s technology advances, Huawei risks being left behind.
Other non-American companies are as important. One industry insider with contacts in Taiwan says that American officials are pressing Taiwan Semiconductor Manufacturing Company (tsmc), a big and cutting-edge chipmaker, to drop Huawei, which is its third-biggest customer. That would be a crushing blow, for Chinese chip factories are not up to the task of manufacturing HiSilicon’s sophisticated designs. tsmc’s only peer is Samsung—and South Korea is another of America’s allies. tsmc said on May 23rd that it would continue supplying Huawei for now.
Even if the optimists are right, and the ban is lifted in exchange for trade concessions, a return to business as usual seems unlikely. America has twice demonstrated a willingness to throttle big Chinese companies. Trust in American technology firms has been eroded, says Mr Triolo. China has already committed billions of dollars to efforts to boost its domestic capabilities in chipmaking and technology. For its rulers, America’s bans highlight the urgency of that policy. Catching up will not be easy, believes Mr Ernst, for chips and software are the most complicated products that humans make. But, he says, if you talk to people in China’s tech industry they all say the same thing: “We no longer have any other option.”
Excerpts from Huawei has been cut off from American technology, Economist, May 25, 2019.
In 2018 America imposed sanctions on about 1,500 people, firms, vessels and other entities, nearly triple the number in 2016. The past six months of 2019 have been particularly eventful. America began imposing sanctions on Iran in November, and in January on Venezuela, another big oil exporter. On May 9th 2019, for the first time, it seized a ship accused of transporting banned North Korean coal.
Second, blackballed countries and unscrupulous middlemen are getting better at evasion. In March 2019advisers to the un, relying in part on Windward data, and American Treasury officials published separate reports that described common ways of doing it. Boats turn off their transmissions systems to avoid detection. Oil is transferred from one ship to another in the middle of the ocean—ships trading on behalf of North Korea find each other in the East China Sea using WeChat, a popular Chinese messaging service. Captains disguise a ship’s identity by manipulating transponder data to transmit false locations and identity numbers of different vessels.
Such methods have helped Iran and Russia transport oil to Syria, American officials say. In 2018 North Korea managed to import refined petroleum far in excess of the level allowed by multilateral sanctions. The situation in Venezuela is different—technically, America’s sanctions still allow foreigners to do business with the country. But fear that sanctions will expand mean that traditional trading partners are scarce. Nicolás Maduro’s regime this month found a shipowner to transport crude to India, according to a shipbroker familiar with the deal, but Venezuela had to pay twice the going rate.
Businesses keen to understand such shenanigans can be roughly divided into two categories. The first includes those who can profit from grasping sanctions’ impact on energy markets, such as hedge funds, analysts and traders. A squadron of firms is ready to assist them, combing through ship transmission data, commercial satellite imagery and other public and semi-public information. They do not specialise in sanctions, but sanctions are boosting demand for their tracking and data-crunching expertise.
A main determinant of Venezuela’s output, for instance, is access to the diluent it needs to blend with its heavy crude. A firm called Clipper Data has noted Russian ships delivering diluent to vessels near Malta, which then transport it to Venezuela. Kpler, a French rival, uses satellite images of shadows on lids of storage tanks to help estimate the volume of oil inside. Using transmissions data, images, port records and more, Kpler produces estimates of Iran’s exports for customers such as the International Energy Agency and Bernstein, a research firm—including a recent uptick in Iranian exports without a specific destination (see chart).
The second category of companies are wary of violating sanctions themselves. They need assistance of a different sort. Latham & Watkins, a firm that advised the chairman of EN+, which controls a Russian aluminium giant, as he successfully removed the company from America’s sanctions list this year, has seen a surge in sanctions-related business. Refinitiv, a data company, offers software which permits clients to screen partners and customers against lists of embargoed entities. Windward uses machine learning to pore over data such as ships’ travel patterns, transmissions gaps (some of which may be legitimate) and name changes to help firms identify suspicious activity. Kharon, founded last year by former United States Treasury officials, offers detailed analysis of anyone or anything on sanctions lists.
HIde and Seek: Sanctions Inc, Economist, May 18, 2019
A new front has opened in the battle between the U.S. and China over control of global networks that deliver the internet. This one is beneath the ocean. While the U.S. wages a high-profile campaign to exclude China’s Huawei Technologies Co. from next-generation mobile networks over fears of espionage, the company is embedding itself into undersea cable networks that ferry nearly all of the world’s internet data.
About 380 active submarine cables—bundles of fiber-optic lines that travel oceans on the seabed—carry about 95% of intercontinental voice and data traffic, making them critical for the economies and national security of most countries.
The Huawei Marine’s Undersea Cable Network majority owned by Huawei Technologies, has worked on some 90 projects to build or upgrade submarine cables around the world…US o fficials say the company’s knowledge of and access to undersea cables could allow China to attach devices that divert or monitor data traffic—or, in a conflict, to sever links to entire nations. Such interference could be done remotely, via Huawei network management software and other equipment at coastal landing stations, where submarine cables join land-based networks, these officials say.
Huawei Marine said in an email that no customer, industry player or government has directly raised security concerns about its products and operations.Joe Kelly, a Huawei spokesman, said the company is privately owned and has never been asked by any government to do anything that would jeopardize its customers or business. “If asked to do so,” he said, “we would refuse.”
The U.S. has sought to block Huawei from its own telecom infrastructure, including undersea cables, since at least 2012. American concerns about subsea links have since deepened—and spread to allies—as China moves to erode U.S. dominance of the world’s internet infrastructure…..Undersea cables are owned mainly by telecom operators and, in recent years, by such content providers as Facebook and Google. Smaller players rent bandwidth.Most users can’t control which cable systems carry their data between continents. A handful of switches typically route traffic along the path considered best, based on available capacity and agreements between cable operators.
In June 2017, Nick Warner, then head of Australia’s Secret Intelligence Service, traveled to the Solomon Islands, a strategically located South Pacific archipelago. His mission, according to people familiar with the visit, was to block a 2016 deal with Huawei Marine to build a 2,500-mile cable connecting Sydney to the Solomons. Mr. Warner told the Solomons’ prime minister the deal would give China a connection to Australia’s internet grid through a Sydney landing point, creating a cyber risk, these people said. Australia later announced it would finance the cable link and steered the contract to an Australian company. In another recent clash, the U.S., Australia and Japan tried unsuccessfully in September 2018 to quash an undersea-cable deal between Huawei Marine and Papua New Guinea.
U.S. and allied officials point to China’s record of cyber intrusions, growing Communist Party influence inside Chinese firms and a recent Chinese law requiring companies to assist intelligence operations. Landing stations are more exposed in poorer countries where cyber defenses tend to be weakest, U.S. and allied officials said. And network management systems are generally operated using computer servers at risk of cyber intrusion. Undersea cables are vulnerable, officials said, because large segments lie in international waters, where physical tampering can go undetected. At least one U.S. submarine can hack into seabed cables, defense experts said. In 2013, former National Security Agency contractor Edward Snowden alleged that Britain and the U.S. monitored submarine cable data. The U.S. and its allies now fear such tactics could be used against them. American and British military commanders warned recently that Russian submarines were operating near undersea cables. In 2018, the U.S. sanctioned a Russian company for supplying Russian spies with diving equipment to help tap seabed cables.
China seeks to build a Digital Silk Road, including undersea cables, terrestrial and satellite links, as part of its Belt and Road plan to finance a new global infrastructure network. Chinese government strategy papers on the Digital Silk Road cite the importance of undersea cables, as well as Huawei’s role in them. A research institute attached to China’s Ministry of Industry and Information Technology, in a paper published in September, praised Huawei’s technical prowess in undersea cable transmission and said China was poised to become “one of the world’s most important international submarine cable communication centers within a decade or two.” China’s foreign and technology ministries didn’t respond to requests for comment…
Bjarni Thorvardarson, then chief executive of the cable’s Ireland-based operator, said U.S. authorities raised no objections until 2012, when a congressional report declared Huawei Technologies a national security threat. Mr. Thorvardarson wasn’t convinced. “It was camouflaged as a security risk, but it was mostly about a preference for using U.S. technology,” he said. Under pressure, Mr. Thorvardarson dropped Huawei Marine from Project Express in 2013. The older cable network continued to use Huawei equipment.
The company is now the fourth-biggest player in an industry long dominated by U.S.-based SubCom and Finnish-owned Alcatel Submarine Networks. Japan’s NEC Corp is in third place.Huawei Marine is expected to complete 28 cables between 2015 and 2020—nearly a quarter of all those built globally—and it has upgraded many more, according to TeleGeography, a research company.
Excerpts from America’s Undersea Battle With China for Control of the Global Internet Grid , WSJ, Mar. 12, 2019
Visa and Mastercard’s partner company in Iceland, Valitor was found guilty by the Reykjavik District Court for illegally blocking payments to the controversial international nonprofit WikiLeaks – a media outlet that publishes classified documents provided by anonymous sources The case against Valitor began sometime in 2010 when a data hosting company named DataCell was given the responsibility to handle donations sent to WikiLeaks.The year 2010 was a particularly important one for the publishing company as its famous Chelsea Manning leaks made rounds in media houses across the world. However, soon after the leaks, Valitor blocked transactions from Visa card holders in Iceland to WikiLeaks, thus starting a legal tug-of-war that would last for years.
Fast forward to 2019, DataCell has finally won the legal battle against Valitor which has now been ordered to pay approximately $9.85 million to both DataCell and Wikileaks’ publishing firm, Sunshine Press Productions.
Excerpts from Iceland: Debit Card Company Fined $9.85 Million for Blocking WikiLeaks Payment, April 30, 2019
The most advanced satellite to ever launch from Africa will soon be patrolling South Africa’s coastal waters to crack down on oil spills and illegal dumping. Data from another satellite, this one collecting images from the Texas portion of a sprawling oil and gas region known as the Permian Basin, recently delivered shocking news: Operators there are burning off nearly twice as much natural gas as they’ve been reporting to state officials.
With some 5,000 satellites now orbiting our planet on any given day…. They will help create a constantly innovating industry that will revolutionize environmental monitoring of our planet and hold polluters accountable…
A recent study by Environmental Defense Fund focused on natural gas flares from the wells in the Permian Basin, located in Western Texas and southeastern New Mexico. Our analysis proved that the region’s pollution problem was much larger than companies had revealed. A second study about offshore gas flaring in the Gulf of Mexico, published by a group of scientists in the Geophysical Research Letters, showed that operators there burn off a whopping 40% of the natural gas they produce.
Soon a new satellite will be launching that is specifically designed not just to locate, but accurately measure methane emissions from human-made sources, starting with the global oil and gas industry. MethaneSAT, a new EDF affiliate unveiled in 2018, will launch a future where sensors in space will find and measure pollution that today goes undetected. This compact orbital platform will map and quantify methane emissions from oil and gas operations almost anywhere on the planet at least weekly.
Excerpts from Mark Brownstein, These pollution-spotting satellites are just a taste of what’s to come, EDF, Apr. 4, 2019
Armed drones have become ubiquitous in the Middle East, say Aniseh Bassiri Tabrizi and Justin Bronk of the Royal United Services Institute, a British think-tank, in a recent report. America has jealously guarded the export of such aircraft for fear that they might fall out of government hands, be turned on protesters or used against Israel. America has also been constrained by the Missile Technology Control Regime, an arms-control agreement signed by 35 countries, including Russia, that restricts the transfer of particularly capable missiles and drones (both rely on the same underlying technology).
China…has sold missile-toting drones to Egypt, Jordan, Iraq, Saudi Arabia and the United Arab Emirates (UAE). All are American security partners…. Other countries, such as Israel, Turkey and Iran, have filled the gap with their own models. America wants to muscle its way back into the market. In April 2018 the Trump administration began loosening export rules to let countries buy armed drones directly from defence companies rather than through official channels. Drones with “strike-enabling technology”, such as lasers to guide bombs to their targets, were reclassified as unarmed. American drones are costlier and require more paperwork than Chinese models, but are more capable. ..The flood of drones into the market is already making an impact—sometimes literally. Ms Tabrizi and Mr Bronk say some Middle Eastern customers see drones as an “affordable and risk-free” way to strike across borders…
Non-state actors are unwilling to be left out of the party. The jihadists of Islamic State often used drones in Iraq and Syria. Hizbullah used drones when it hit 23 fighters linked to al-Qaeda in Syria in 2014. The Houthi drone that bombed Al-Anad looked a lot like an Iranian model. Last year the Houthis sent a similar one more than 100km (60 miles) into Saudi Arabia before it was shot down. ..
Excerpts from Predator Pricing: Weapon Sales, Economist, Mar. 9, 2019
In 2016 Muhammad bin Salman, Saudi Arabia’s crown prince and de facto ruler, announced the latest stage of “Saudisation”—the replacement of foreign workers with Saudi ones. It now appears the policy does not stop at swapping out bankers and bakers, but extends to ballistic missiles. Satellite photos analysed by researchers from the Middlebury Institute of International Studies, and reported by the Washington Post, appear to show that Saudi Arabia has been building a factory for rocket engines, at an existing missile base in al-Watah, south-west of Riyadh. It seems to be configured for solid-fuel rockets, which can be launched more quickly than liquid-fuelled ones….he rocket factory was “designed, equipped and constructed by an outside entity”. Saudi Arabia has “no capacity” for such a project. The facility, he notes, closely resembles a Chinese one in Lantian.
Saudi Arabia is no newcomer to missiles. Having watched Iran and Iraq fling them at each other during the 1980s, it bought a few dozen df-3 missiles from China in 1987. It came close to unleashing them after being struck by Iraqi Scud missiles during the Gulf war in 1991. In the 2000s it probably picked up a batch of newer, more accurate Chinese df-21s.
Iran, the kingdom’s arch-rival, has been honing its missile force despite Western opposition and un rebukes, conducting 135 test launches since 1990. On December 1st, 2018 it tested one thought capable of comfortably reaching any corner of Saudi soil….Nor is Iran the only concern. Hizbullah, a Lebanese militant group nurtured and armed by Iran, has a growing arsenal of missiles; some can already reach the north-western parts of Saudi Arabia. Israel is also armed to the teeth. Though Prince Muhammad is on good terms with the Jewish state, satellite images published in 2013 reportedly showed that one of the Saudi df-3 launching pads at al-Watah was set in the direction of Tel Aviv.
Because missiles are ideal delivery systems for nuclear weapons, news of the plant has also revived worries about Saudi Arabia’s atomic intentions…Without a doubt if Iran developed a nuclear bomb,” warned Prince Muhammad last March, “we will follow suit
So the Saudis may turn to other nuclear friends. Western diplomats and spooks have long been concerned that Pakistan, whose own nuclear programme was bankrolled by Saudi Arabia, might be a ready supplier of know-how, fuel or bombs. In 1999 Saudi Arabia’s then defence minister horrified American officials by touring Pakistan’s nuclear facilities and meeting A.Q. Khan, the scientist who sold nuclear technology to North Korea, Iran and Libya. Ties remain close. Prince Muhammad was due to agree on $14bn of investment in Pakistan during a visit to the country on February 16th. 2019. ….
Excerpts from Protection rocket Saudi Arabia’s missile race, Economist, Feb. 16, 2019
At least two tankers have ferried Iranian fuel oil to Asia in February 2019 despite U.S. sanctions against such shipments, according to a Reuters analysis of ship-tracking data and port information, as well as interviews with brokers and traders. The shipments were loaded onto tankers with documents showing the fuel oil was Iraqi. But three Iraqi oil industry sources and Prakash Vakkayil, a manager at United Arab Emirates (UAE) shipping services firm Yacht International Co, said the papers were forged. The people said they did not know who forged the documents, nor when.
“Some buyers…will want Iranian oil regardless of U.S. strategic objectives to deny Tehran oil revenue, and Iran will find a way to keep some volumes flowing,” said Peter Kiernan, lead energy analyst at the Economist Intelligence Unit. While the United States has granted eight countries temporary waivers allowing limited purchases of Iranian crude oil, these exemptions do not cover products refined from crude, including fuel oil, mainly used to power the engines of large ships. Documents forwarded to Reuters by ship owners say a 300,000 tonne-supertanker, the Grace 1, took on fuel oil at Basra, Iraq, between Dec. 10 and 12, 2018. But Basra port loading schedules reviewed by Reuters do not list the Grace 1 as being in port during those dates. One Iraqi industry source with knowledge of the port’s operations confirmed there were no records of the Grace 1 at Basra during this period.
Reuters examined data from four ship-tracking information providers – Refinitiv, Kpler, IHS Markit and Vessel Finder – to locate the Grace 1 during that time. All four showed that the Grace 1 had its Automatic Identification System (AIS), or transponder, switched off between Nov. 30 and Dec. 14, 2018, meaning its location could not be tracked. The Grace 1 then re-appeared in waters near Iran’s port of Bandar Assaluyeh, fully loaded, data showed. The cargo was transferred onto two smaller ships in UAE waters in January, from where one ship delivered fuel oil to Singapore in February 2019. Shipping documents showed about 284,000 tonnes of fuel oil were transferred in the cargoes tracked by Reuters, worth about $120 million at current prices…
One of those vessels, the 130,000 tonne-capacity Kriti Island, offloaded fuel oil into a storage terminal in Singapore around Feb. 5 to 7. Reuters was unable to determine who purchased the fuel oil for storage in Singapore. The Kriti Island is managed by Greece’s Avin International SA… Avin International’s Chief Executive Officer George Mylonas told Reuters. Mylonas confirmed the Kriti Island took on fuel oil from the Grace 1.There is no indication that Avin International knowingly shipped Iranian fuel oil. Mylonas said his firm had conducted all necessary due diligence to ensure the cargo’s legitimate origin….
Excerpts from Roslan Khasawneh et al, Exclusive: How Iran fuel oil exports beat U.S. sanctions in tanker odyssey to Asia, Reuters, Mar. 20, 2019
Brick kilns, tens of thousands across South Asia are often run on forced labor. Satellite imagery of such kilns can help tally the kilns, enabling organizations on the ground to target slaveholders at the sites…
Some 40.3 million people are held in bondage today, according to the latest estimates from the International Labor Organization, headquartered in Geneva, Switzerland. But finding them is hard… Boyd who works for the Rights Lab estimates, however, that one-third of all slavery is visible from space, whether in the scars of kilns or illegal mines or the outlines of transient fish-processing camps.
Boyd is now using artificial intelligence to speed up the search. As a pilot project, she and her colleagues at the Rights Lab used crowdsourced visual searchers to identify brick kilns. The oval shape of the large ovens, sometimes 150 meters long, and their chimneys are distinctive, even from space. “You cannot mix them up with something else,” Boyd says.
Since then, Boyd has turned to machine-learning algorithms that recognize the kilns after being trained on the human-tagged examples. Last month, in the journal Remote Sensing, she and her colleagues reported that the algorithms could correctly identify 169 of 178 kilns in Google Earth data on one area of Rajasthan, although it also output nine false positives…
Another company, called Planet, has about 150 small satellites that snap images of the globe’s entire landmass daily. The images are lower-resolution than DigitalGlobe’s, but their frequency opens up opportunities to identify changes over time.With Planet data, Boyd and the Rights Lab plan to investigate fast moving signatures of slavery. From space, you can watch a harvest in Turkmenistan and, based on how quickly the cotton disappears, you can tell whether machines or hands picked it. In the Sundarbans, an area spanning India and Bangladesh, shrimp farms and fish-processing camps employ slave labor to clear mangrove trees—a process satellites can capture.
Excerpts from Sarah Scoles, Researchers Spy Signs of Slavery from Space, Science, Feb. 21, 2018
Satellite images suggest that Saudi Arabia has constructed its first known ballistic missile factory, according to weapons experts and image analysts, a development that raises questions about the kingdom’s increasing military and nuclear ambitions under its 33-year-old crown prince. If operational, the suspected factory at a missile base in al-Watah, southwest of Riyadh, would allow Saudi Arabia to manufacture its own ballistic missiles, fueling fears of an arms race against its regional rival Iran. Saudi Arabia currently does not possess nuclear weapons, so any missiles produced at the apparent factory are likely to be conventionally armed. But a missile-making facility would be a critical component of any eventual Saudi nuclear weapons program, hypothetically giving the kingdom capability to produce the preferred delivery systems for nuclear warheads.
Two additional missile experts who reviewed the satellite images for The Washington Post… agreed that the high-resolution photographs of the al-Watah site appear to depict a rocket-engine production and test facility, probably using solid fuel…The complex…highlights the nation’s intention to make its own advanced missiles after years of seeking to purchase them abroad, at times successfully….
Saudi Arabia has been pursuing a nuclear power-plant deal with the United States that would potentially include allowing it to produce nuclear fuel. The kingdom’s insistence on domestic fuel production has raised worries among U.S. officials that the kingdom wants the atomic power project not only for civil use but also for covert weapon-making purposes. ..
How the Saudis obtained the technological expertise necessary to build the facility is unclear. One potential supplier: China…China has sold ballistic missiles to Saudi Arabia in the past and has helped supply ballistic missile production capabilities to other nations. In the 1990s, Pakistan secretly built a plant for medium-range missiles using blueprints and equipment supplied by China. The factory in Pakistan has long drawn the attention of top Saudi officials. ..
The main way the United States seeks to prevent the spread of drone and missile technology is through the Missile Technology Control Regime, or the MTCR, an informal multicountry pact designed to prevent the transfer of certain missile technologies. China is not a member but has agreed to abide by some of its stipulations. While the United States sells an array of weaponry to Saudi Arabia, Washington has not sold ballistic missiles to Riyadh, in part because such missiles traditionally have been seen as destabilizing for the region. Saudi Arabia has turned to China in the past when met with refusals from the United States for certain weapons requests.
For example, the United States declined repeated Saudi requests to purchase what are known as category-one American drones, including Predators and Reapers, partly because of MTCR’s regulations. Instead, the kingdom turned to China, first purchasing drones and later striking a deal in which China will build a drone factory that will produce a Chinese copycat of the Predator in Saudi Arabia.
Excerpts Paul Sonne, Can Saudi Arabia produce ballistic missiles? Satellite imagery raises suspicions, Washington Post, Jan. 22, 2019
[A] tanker chartered by Cheniere Energy, an American company, left a Louisiana port this week with the first major exports of U.S. liquefied natural gas, or LNG. This shipment isn’t going to Europe, but others are expected to arrive by spring. “Like shale gas was a game changer in the U.S., American gas exports could be a game changer for Europe,” said Maros Sefcovic, the European Union’s energy chief.
Many in Europe see U.S. entry into the market as part of a broader effort to challenge Russian domination of energy supplies and prices in this part of the world. Moscow has for years used its giant energy reserves as a strategic tool to influence former satellite countries, including Lithuania, one of the countries on the fringes of Russia that now see a chance to break away.
Some are building the capacity to handle seaborne LNG, including Poland, which opened its first import terminal in 2015. In Bulgaria, which buys about 90% of its gas from Russia, Prime Minister Boyko Borissov said last month that supplies of U.S. gas could arrive via Greek LNG facilities, “God willing.”… Deutsche Bank estimates the U.S. could catch up with Russia as Europe’s biggest gas supplier within a decade, with each nation controlling around a fifth of the market. Russia supplies about a third of Europe’s gas via pipeline….The U.S. will compete with Russia, Norway, U.K., Australia and others in Europe’s gas market. Germany, for example, gets half its gas and Italy a third from Russia.Low prices also mean natural gas could compete with coal and help Europe achieve its commitment to reducing greenhouse gas emissions .In Lithuania, officials have accused Moscow of engaging in a campaign of espionage and cyberwarfare to keep its share of the lucrative energy market….
Bulgarian officials allege Russia bankrolled a wave of street protests in 2012 that forced the government to impose a moratorium on shale gas exploration. In 2014, Anders Fogh Rasmussen, then-head of NATO, told reporters that Russia was covertly funding European environmental organizations to campaign against shale gas to help maintain dependence on Russian gas.
Until 2014, Gazprom owned 37% of Lithuania’s national gas company, Lietuvos Dujos, and dominated its boardroom, said current and former officials.“There was no negotiation about gas prices,” said Jaroslav Neverovic, Lithuania’s energy minister from 2012 to 2014. He said Gazprom would send Lietuvos Dujos a list of gas prices, which the board automatically approved.. In 2015, [though] Lithuania began receiving Norwegian LNG, reducing Gazprom’s gas monopoly to a market share of less than 80%. In the months before the terminal opened, Gazprom lowered Lithuanian gas prices by 23% and it remained cheaper than Norwegian gas. Still, Lithuania plans to increase its purchase of Norwegian gas this year. The U.S. is next….
Klaipeda’s mayor, Mr. Grubliauskas, said during a recent interview at his office, decorated with photographs of U.S. naval drills in the port: “U.S. LNG is more than just about gas. It’s about freedom.”
Excerpts With U.S. Gas, Europe Seeks Escape From Russia’s Energy Grip, WSJ, Feb. 26, 2016
The United States leads the world in punishing corruption, money-laundering and sanctions violations. In the past decade it has increasingly punished foreign firms for misconduct that happens outside America. Scores of banks have paid tens of billions of dollars in fines. In the past 12 months several multinationals, including Glencore and ZTE, have been put through the legal wringer. The diplomatic row over Huawei, a Chinese telecoms-equipment firm, centres on the legitimacy of America’s extraterritorial reach.
America has taken it upon itself to become the business world’s policeman, judge and jury. It can do this because of its privileged role in the world economy. Companies that refuse to yield to its global jurisdiction can find themselves shut out of its giant domestic market, or cut off from using the dollar payments system and by extension from using mainstream banks. For most big companies that would be suicidal.
But as the full extent of extraterritorial legal activity has become clearer, so have three glaring problems. First, the process is disturbingly improvised and opaque. Cases rarely go to court and, when they are settled instead, executives are hit with gagging orders. Facing little scrutiny, prosecutors have applied ever more expansive interpretations of what counts as the sort of link to America that makes an alleged crime punishable there; indirect contact with foreign banks with branches in America, or using Gmail, now seems to be enough. Imagine if China fined Amazon $5bn and jailed its executives for conducting business in Africa that did not break American law, but did offend Chinese rules and was discussed on WeChat.
Second, the punishments can be disproportionate. In 2014 bnp Paribas, a French bank, was hit with a sanctions-related fine of $8.9bn, enough to threaten its stability. In April ZTE, a Chinese tech firm with 80,000 employees, was banned by the Trump administration from dealing with American firms; it almost went out of business. The ban has since been reversed, underlining the impression that the rules are being applied on the hoof.
Third, America’s legal actions can often become intertwined with its commercial interests. As our investigation this week explains, a protracted bribery probe into Alstom, a French champion, helped push it into the arms of General Electric, an American industrial icon. American banks have picked up business from European rivals left punch-drunk by fines. Sometimes American firms are in the line of fire—Goldman Sachs is being investigated by the doj for its role in the 1mdb scandal in Malaysia. But many foreign executives suspect that American firms get special treatment and are wilier about navigating the rules.
America has much to be proud of as a corruption-fighter. But, for its own good as well as that of others, it needs to find an approach that is more transparent, more proportionate and more respectful of borders. If it does not, its escalating use of extraterritorial legal actions will ultimately backfire. It will discourage foreign firms from tapping American capital markets. It will encourage China and Europe to promote their currencies as rivals to the dollar and to develop global payments systems that bypass Uncle Sam…. Far from expressing geopolitical might, America’s legal overreach would then end up diminishing American power.
Excerpts from Tackling Corruption: Judge Dread, Economist, Jan. 19, 2019
India, Japan and other space-faring countries are waking up to a harsh reality: Earth’s orbit is becoming a more dangerous place as the U.S., China and Russia compete for control of the final frontier…New Delhi is nervous because China has made no secret of its desire for influence in the Indian Ocean. China set up a naval base in Djibouti, a gateway to the ocean at the Horn of Africa. It secured a 99-year lease to the port of Hambantota in Sri Lanka. It is deeply involved in development projects in Maldives.
India has established itself as a player in the budget satellite business. It even put a probe into orbit around Mars in 2014, in a U.S.-assisted project that cost just $76 million. But it is scurrying to enhance its ability to monitor China’s activities, and the partnership with Japan is part of this. Another sign that space is becoming a defense focus for India came on Dec. 19, when the country launched its third military communications satellite, the GSAT-7A. The satellite will connect with ground-based radar, bases and military aircraft, along with drone control networks.
China’s success in landing a craft on the far side of the moon on Jan. 3, 2019 came as a fresh reminder of its growing prowess. In late December, China also achieved global coverage with its BeiDou Navigation Satellite System. Only the U.S., Russia and the European Union had that capability.China aims to launch a Mars explorer in 2020 and complete its own Earth-orbiting space station around 2022. In the back of Indian and Japanese officials’ minds is likely a stunning test China conducted in 2007. Beijing successfully destroyed one of its own weather satellites with a weapon, becoming only the third nation to pull off such a feat, after the Soviet Union and the U.S.
In December 2018, President Donald Trump ordered the Department of Defense to create a Space Command, widely seen as a precursor to a full-fledged Space Force. There were 1,957 active satellites orbiting Earth as of Nov. 30, 2018 according to the Union of Concerned Scientists, a nonprofit U.S. advocacy group. America had the most by far, with 849, or 43% of the total. China was No. 2, with 284, followed by Russia with 152. Japan and India had a combined 132 — 75 for the former and 57 for the latter.
Excerpts fromNUPUR SHAW India and Japan awaken to risks of superpower space race, Nikkei Asian Review, Jan. 8, 2019
A federal judge has dismissed a class action lawsuit against Facebook after the California-based social media site claimed there was a lack of personal jurisdiction in Illinois.The plaintiff in the case, Fredrick William Gullen, filed the complaint alleging violations of the Illinois Biometric Information Privacy Act. Gullen is not a Facebook user, but he alleged that his image was uploaded to the site and that his biometric identifiers and biometric information was collected, stored and used by Facebook without his consent. The Illinois Biometric Information Privacy Act, implemented in 2008, regulates the collection, use, and storage of biometric identifiers and biometric information such as scans of face or hand geometry. The act specifically excludes photographs, demographic information, and physical descriptions….
In the Facebook case, no ruling has been made on whether the information on Facebook counts as biometric identifiers and biometric information under the Illinois Biometric Information Privacy Act. Instead, the judge agreed with Facebook that the case could not be tried in Illinois.
However, the company is currently facing a proposed class action in California relating to some of the same questions….How the California class action will play out remains to be seen. California does not yet have a clear policy on biometric privacy.A bill pending in the state’s legislature would extend the scope of the data security law to include biometric data as well as geophysical location, but it has not yet become law. The question of privacy in regards to biometric information is one that has garnered increasing attention in recent months. On Feb. 4, 2016 the Biomterics Institute, an independent research and analysis organization, released revised guidelines comprising 16 privacy principles for companies that gather and use biometrics data.
Excerpts from Emma Gallimore, Federal judge boots Illinois biometrics class action against Facebook, Legal Newswire, Feb. 22, 2016, 12:15pm
See also the case (pdf)
Rarely has a manifesto been so wrong. “A Declaration of the Independence of Cyberspace”, written 20 years ago by John Perry Barlow, a digital civil-libertarian, begins thus: “Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.”
At the turn of the century, it seemed as though this techno-Utopian vision of the world could indeed be a reality. It didn’t last… Autocratic governments around the world…have invested in online-surveillance gear. Filtering systems restrict access: to porn in Britain, to Facebook and Google in China, to dissent in Russia.
Competing operating systems and networks offer inducements to keep their users within the fold, consolidating their power. Their algorithms personalise the web so that no two people get the same search results or social media feeds, betraying the idea of a digital commons. Five companies account for nearly two-thirds of revenue from advertising, the dominant business model of the web.
The open internet accounts for barely 20% of the entire web. The rest of it is hidden away in unsearchable “walled gardens” such as Facebook, whose algorithms are opaque, or on the “dark web”, a shady parallel world wide web. Data gathered from the activities of internet users are being concentrated in fewer hands. And big hands they are too. BCG, a consultancy, reckons that the internet will account for 5.3% of GDP of the world’s 20 big economies this year, or $4.2 trillion.
How did this come to pass? The simple reply is that the free, open, democratic internet dreamed up by the optimists of Silicon Valley was never more than a brief interlude. The more nuanced answer is that the open internet never really existed.
[T]e internet, it was developed “by the US military to serve US military purposes”… The decentralised, packet-based system of communication that forms the basis of the internet originated in America’s need to withstand a massive attack on its soil. Even the much-ballyhooed Silicon Valley model of venture capital as a way to place bets on risky new businesses has military origins.
In the 1980s the American military began to lose interest in the internet…. The time had come for the hackers and geeks who had been experimenting with early computers and phone lines. Today they are the giants. Google, Apple, Facebook, Amazon and Microsoft—together with some telecoms operators—help set policy in Europe and America on everything from privacy rights and copyright law to child protection and national security. As these companies grow more powerful, the state is pushing back…
The other big risk is that the tension between states and companies resolves into a symbiotic relationship. A leaked e-mail shows a Google executive communicating with Hillary Clinton’s state department about an online tool that would be “important in encouraging more [Syrians] to defect and giving confidence to the opposition.”+++ If technology firms with global reach quietly promote the foreign-policy interests of one country, that can only increase suspicion and accelerate the fracturing of the web into regional internets….
Mr Malcomson describes the internet as a “global private marketplace built on a government platform, not unlike the global airport system”.
Excerpts from Evolution of the internet: Growing up, Economist, Mar. 26, 2016
+++The email said Google would be “partnering with Al Jazeera” who would take “primary ownership” of the tool, maintaining it and publicizing it in Syria. It was eventually published by Al Jazeera in English and Arabic.
Data breaches at Facebook and Google—and along with Amazon, those firms’ online dominance—crest a growing wave of anxiety around the internet’s evolving structure and its impact on humanity…The runaway success of a few startups has created new, proprietized one-stop platforms. Many people are not really using the web at all, but rather flitting among a small handful of totalizing apps like Facebook and Google. And those application-layer providers have dabbled in providing physical-layer internet access. Facebook’s Free Basics program has been one of several experiments that use broadband data cap exceptions to promote some sites and services over others.
What to do? Columbia University law professor Tim Wu has called upon regulators to break up giants like Facebook, but more subtle interventions should be tried first…Firms that do leverage users’ data should be “information fiduciaries,” obliged to use what they learn in ways that reflect a loyalty to users’ interests…The internet was designed to be resilient and flexible, without need for drastic intervention. But its trends toward centralization, and exploitation of its users, call for action
Excerpts from Jonathan Zittrain, Fixing the internet, Science, Nov. 23, 2018
As long as we’ve been launching spy satellites into space, we’ve been trying to find ways to hide them from the enemy. Now, thanks to the small satellite revolution—and a growing amount of space junk—America has a new way to mask its spying in orbit…
The National Reconnaissance Office, the operator of many of the U.S.’s spy sats, refused to answer any questions about ways to hide small satellites in orbit. In 2014, Russia launched a trio of communications satellites. Like any other launch, spent stages and space debris were left behind in space. Air Force Space Command dutifully catalogued them, including a nondescript piece of debris called Object 2014-28E. Nondescript until it started to move around in space, that is. One thing about orbits; they are supposed to be predictable. When something moves in an unexpected way, the debris is not debris but a spacecraft. And this object was flying close to the spent stages, maneuvering to get closer. This fueled speculation that the object could be a prototype kamikaze-style sat killer. Other less frantic speculation postulated that it could be used to examine other sats in orbit, either Russia’s or those operated by geopolitical foes. Either way, the lesson was learned…
Modern tracking radar is supposed to map space junk better than ever before. But small spy satellites that will hide in the cloud of space debris may go undetected, even by the most sophisticated new radar or Earth-based electronic signals snooping.
Excerpts from Joe Pappalardo, Space Junk Could Provide a Perfect Hiding Spot for Tiny Spy Satellites, Popular Mechanics, Nov. 30, 2018
A port being developed in the southern Iranian city of Chabahar underscores some of the dilemmas U.S. policy makers face in implementing sanctions against Tehran. Strategically located on the Gulf of Oman and named for an Iranian revolutionary war hero, the Shahid Beheshti Port is exactly the sort of Iranian economic development the Trump administration wants to stop with sanctions that kick in on Nov. 5, 2018…
Once completed, the port—a small part of which started initial operations in December—could help Iran by strengthening economic ties with South and Central Asia, providing an export point for its oil beyond the Persian Gulf and functioning as a strategic military asset. But it could also be a critical economic lifeline for Afghanistan, where the U.S. has tried for 16 years to strengthen and stabilize the government so thousands of U.S. troops can come home.
The port also could be a big boon to India, an increasingly close partner of the U.S. in Asia. India wants Chabahar port activities exempted from sanctions. Indian companies are mostly equipping and operating the facility. If the port is completed, they are expected to be among the biggest users of the port in order to participate in the reconstruction of Afghanistan—something the Trump administration has asked India to get more involved in—and establish a stronger economic presence in Central Asia.
The Chabahar port has long been seen as a potential way around Pakistan, a sworn enemy of India that believes holding sway over Afghanistan is critical to its own security. Pakistan has squelched trade between India and Afghanistan across its territory. It wants Afghanistan to eventually transport goods through a competing Pakistani port on the Gulf of Oman that is being developed with China…
“If you stop Chabahar, you make Afghanistan permanently dependent on Pakistan,” said Barnett Rubin, a New York University expert on South Asia who has advised Western governments on policy in Afghanistan and the surrounding region.
Exceprts from Iranian Port Project Poses a Dilemma for U.S., WSJ, Oct. 29, 2018
China for decades has struggled to develop nuclear ballistic-missile submarines . The country finally might be on the cusp of deploying reliable boomers. An effective Chinese ballistic-missile submarine fleet over the long term could have a stabilizing influence on the world’s nuclear balance. But in the short term, it might heighten tensions. Especially if Beijing lets popular fervor drive its build-up.n n That’s the surprising conclusion of a new report from Tong Zhao. …Beijing began developing boomers as far back as 1958. It wasn’t until the late 1980s that the country completed its first boat….A Type 094 apparently conducted China’s first undersea deterrence patrol in 2015. “China has obtained, for the first time, a demonstrably operational underwater nuclear capability. This represents the start of a new era for China’s sea-based nuclear forces.” As of late 2018 there are four Type 094s in service. Beijing has not publicly released a detailed plan for its SSBN fleet expansion, but the U.S. military expects China to build between five and eight of the vessels, in total, according to Tong and various military reports and statements.
The U.S. military has responded to the China’s new boomers by boosting its own anti-submarine capabilities. “Between Chinese efforts to create a credible sea-based nuclear deterrent and U.S. endeavors to strengthen anti-submarine countermeasures, tensions are brewing under the surface of the South China Sea and the broader Pacific Ocean,” Tong explains.
Exceprts from David Axe China Is Building More Submarines That Carry Nuclear Weapons. And It Could Be a Good Thing, The National Interest, Oct. 27, 2018
Niger, a poverty-stricken nation perched on the southern belt of the Sahara, is rapidly being transformed into one of the world’s most strategic security hubs….“This place is a nest of spies,” said one contractor … “Below the radar, it’s become a key country for the West.” A surge in financial assistance from European nations seeking to stem the flow of African migrants has made Niger the world’s largest per capita recipient of European Union aid…Western military forces operate from at least nine bases in Niger, government officials said…. The U.S. is finishing a large air base in Agadez, while the Central Intelligence Agency has begun flying armed drones from an airstrip outside the northern town of Dirkou, Nigerien officials said.
U.S. and European policy makers praise the government as a good partner that has welcomed foreign military personnel and slashed the migrant flow by almost 90% from 2015 highs. …Locals, nongovernmental organizations and opposition activists say the government is using international backing to neutralize dissent and embezzle millions of dollars in aid, charges the government denies. The opposition—backed by rights group Amnesty International—says President Mahamadou Idriss Issoufou, in power since 2011, is arbitrarily jailing activists and spending Western aid on bolstering his elite Presidential Guard…
Swaths of the nation’s centuries-old transportation economy—the movement of people and goods from West Africa through the Sahara—has essentially been criminalized by the EU crackdown on migration. Some of the desert-dwelling Tuareg people, who have transported goods for centuries, are now smuggling weapons, men and money for cash-rich jihadist insurgencies. Migrants are dying in the desert in failed attempts to find new routes.
“The West is pleased because Niger’s government is a willing partner,but as Niger’s security chief, Mohammed Bazoum, says “We have become a hinge country, a geostrategic hub, but it is a disaster for us. We are known as a land of terrorism and migrant traffic.”
Across Niger’s western border with Mali, jihadist groups including Islamic State and al Qaeda franchises control stretches of territory around the northern city of Gao. Along the southern frontier with Nigeria, a rejuvenated Boko Haram is mounting intensifying attacks against security forces, including around the city of Diffa, where the U.S. has dozens of troops stationed. To the north lies Libya, which has become a hotbed of instability, weapons and radicalization.
The European Development Fund last year awarded $1 billion to Niger through 2020, and unusually for a country governance watchdogs deem chronically corrupt, 75% is now infused directly into the Nigerien budget instead of through nongovernmental organizations.The money funds hundreds of off-road vehicles, motorcycles and satellite phones for Nigerien security forces as well as new infrastructure and technology along the borders and countrywide development programs.
In Niamey’s central Plateau district, tall black screens block the soaring new U.S. Embassy headquarters, which will be one of the largest in West Africa. Saudi Arabia has broken ground on its own huge mission, while buildings belonging to EU agencies occupy whole city blocks. Hotels and conference centers are rising in tandem, reconfiguring the economic and political landscape of a nation ranked the world’s second-poorest behind the Central African Republic.
The government says the building boom is creating jobs. Locals say it has stoked runaway inflation and priced them out of their neighborhoods. In the past year, the cost of a kilogram of rice has risen 29%, sending shock waves through homes where the average wage is $2.66 a day.
“The cost to live here rises with each new European coming,” lamented Abdulraham Mamoudou, repairing his motor scooter on a dusty corner near the expanding U.S. Embassy compound.
A similar pattern is playing out further north in the smuggling hub of Agadez, where the EU-coordinated migration crackdown has transformed a boomtown into a simmering bust. The city’s jails are bursting with men who have been convicted of smuggling. Vast depots on the town’s outskirts house hundreds of trucks confiscated by authorities…“This place is now for the Americans and French,” said Sadiq, a former migrant smuggler who evaded arrest and is now unemployed. “They took our livelihood and don’t give us anything in return.”
Excerpts from ‘A Nest of Spies’: Niger’s Deserts Become Front Line of Fight Against Jihadis, Wall Street Journal, Sept. 12, 2018
The rulers of United Arab Emirates (UAE), one of whose components, Dubai, own a majority stake in DP World, one of the world’s largest maritime firms with perations in 40 countries.It is one of several Gulf states trying to gain a strategic foothold in east Africa through ports. Controlling these offers commercial and military advantages but risks exacerbating tensions in the region…
DP World thinks the region from Sudan to Somalia needs 10-12 ports. It has just half that. The firm’s first foray was on Djibouti’s coast. When DP World won its first concessions there in the 1990s, the Emiratis were among the few investors interested in the small and poor former French colony. DP World built and operated a new container terminal, Doraleh,and helped finance roads and other infrastructure. Doraleh is now the country’s largest employer and the government’s biggest source of revenue. It runs at nearly full capacity, handling 800,000 containers a year. Much of its cargo travels along a Chinese-built railway from Addis Ababa, Ethiopia’s capital.
Djibouti’s profile rose further after the terrorist attacks on America of September 11th, 2001, when America opened a military base there. France and China also have bases; other navies patrol off its coast to deter Somali pirates. But when the Emiratis wanted to open their own naval base they were rebuffed, partly because of their close ties to Djibouti’s rival, Eritrea (the two states had a bloody border dispute in 2008). In 2015 the UAE started building a naval base in Assab, in southern Eritrea. The base has been used in the Saudi-led war against Houthi rebels in Yemen….In 2016 DP World won a 30-year concession to operate the port of Berbera in Somaliland, which declared independence in 1991 (though no foreign government recognises it). Critics said the deal would hasten the break-up of Somalia.
The Horn ports all sit near the Bab al-Mandab strait, a vital choke-point at the mouth of the Red Sea: 4.8m barrels of oil passed through it every day in 2016. Competition is getting fierce, though. Qatar and its ally, Turkey, are building ports in Sudan. Saudi Arabia is in talks to set up a naval base in Djibouti. All three Gulf states are trying to snap up farmland in east Africa, part of a broader effort to secure food supplies for their arid countries. Emirati-built ports could one day export crops from Emirati-owned farms…
Gulf states could also find themselves in competition with China…In February 2018 Djibouti seized the Doraleh port, a concession to the UAE… Shippers believe it took Doraleh as a sop to China, to which it is heavily indebted. In July 2018, Djibouti opened the first phase of a new $3.5bn free-trade zone, set to be the largest in Africa when it is finished. Built mostly by state-owned Chinese firms, it sits next to Doraleh. DP World says the project violates the terms of its concession and is threatening to sue.
Excerpts from Red Sea Scamble: Ports on the Horn, Economist, July 21, 2018, at 33
Imagine a natural disaster scenario, such as an earthquake, that inflicts widespread damage to buildings and structures, critical utilities and infrastructure, and threatens human safety. Having the ability to navigate the rubble and enter highly unstable areas could prove invaluable to saving lives or detecting additional hazards among the wreckage.
Dr. Ronald Polcawich, a DARPA program manager in the Microsystems Technology Office (MTO):”There are a number of environments that are inaccessible for larger robotic platforms. Smaller robotics systems could provide significant aide, but shrinking down these platforms requires significant advancement of the underlying technology.”
Technological advances in microelectromechanical systems (MEMS), additive manufacturing, piezoelectric actuators, and low-power sensors have allowed researchers to expand into the realm of micro-to-milli robotics. However, due to the technical obstacles experienced as the technology shrinks, these platforms lack the power, navigation, and control to accomplish complex tasks proficiently
To help overcome the challenges of creating extremely [Size, Weight and Power] SWaP-constrained microrobotics, DARPA is launching a new program called SHort-Range Independent Microrobotic Platforms (SHRIMP). The goal of SHRIMP is to develop and demonstrate multi-functional micro-to-milli robotic platforms for use in natural and critical disaster scenarios. To achieve this mission, SHRIMP will explore fundamental research in actuator materials and mechanisms as well as power storage components, both of which are necessary to create the strength, dexterity, and independence of functional microrobotics platforms.
“The strength-to-weight ratio of an actuator influences both the load-bearing capability and endurance of a micro-robotic platform, while the maximum work density characterizes the capability of an actuator mechanism to perform high intensity tasks or operate over a desired duration,” said Polcawich. “
Excerpts from Developing Microrobotics for Disaster Recovery and High-Risk Environments: SHRIMP program seeks to advance the state-of-the art in micro-to-milli robotics platforms and underlying technology, OUTREACH@DARPA.MIL, July 17, 2018
Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to undersea warfare — including secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020, according to American officials. The breaches occurred in January and February 2018, the officials said… The hackers targeted a contractor who works for the Naval Undersea Warfare Center, a military organization headquartered in Newport, R.I., that conducts research and development for submarines and underwater weaponry.
Taken were 614 gigabytes of material relating to a closely held project known as Sea Dragon, as well as signals and sensor data, submarine radio room information relating to cryptographic systems, and the Navy submarine development unit’s electronic warfare library…This fact raises concerns about the Navy’s ability to oversee contractors tasked with developing cutting-edge weapons.
For years, Chinese government hackers have siphoned information on the U.S. military, underscoring the challenge the Pentagon faces in safeguarding details of its technological advances. Over the years, the Chinese have snatched designs for the F-35 Joint Strike Fighter; the advanced Patriot PAC-3 missile system; the Army system for shooting down ballistic missiles known as Terminal High Altitude Area Defense; and the Navy’s new Littoral Combat Ship, a small surface vessel designed for near-shore operations, according to previous reports prepared for the Pentagon. In some cases, suspected Chinese breaches appear to have resulted in copycat technologies…
Investigators say the hack was carried out by the Chinese Ministry of State Security, a civilian spy agency responsible for counterintelligence, foreign intelligence and domestic political security. The hackers operated out of an MSS division in the province of Guangdong, which houses a major foreign hacking department….
In September 2015, in a bid to avert economic sanctions, Chinese President Xi Jinping pledged to President Barack Obama that China would refrain from conducting commercial cyberespionage against the United States. …Both China and the United States consider spying on military technology to fall outside the pact.
Excerpts from Ellen Nakashima and Paul Sonne, China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare, Washington Post, June 8, 2018
A Beijing-funded wharf in Vanuatu is big enough to allow powerful warships to dock alongside it, heightening fears the port could be converted into a Chinese naval installation. Fairfax Media inspected the $114 million Luganville wharf and was told US coastguard officials and Marines recently visited the sprawling facility and took a keen interest in its specifications. The Chinese and Vanuatu governments have strenuously denied they have discussed a military base…
The Vanuatu government has taken on significant debt to China, though it appears to have stopped taking large loans since getting a stern warning from the International Monetary Fund in 2016. The wharf expected to be used to accept container and cruise ships was constructed by the Shanghai Construction Company and opened with fanfare in the middle of 2017. It is unclear whether the wharf loan contract with the Vanuatu government includes a so-called debt-equity swap clause, which would mean China could take over the facility if Vanuatu defaults on its payments. It has recently taken over the major port of Hambantota from Sri Lanka in these circumstances.
Malcolm Davis, a defence expert at the Australian Strategic Policy Institute, said it was “not by accident” that wharf had been built for large vessels.
“My guess is there’s a Trojan horse operation here that eventually will set up a large facility that is very modern and very well-equipped. They’ve done this before in other parts of the world. “Their hope is that the debt of the Vanuatu government will be so onerous that they can’t pay it back. The Chinese will say, ‘the facility is ours for 99 years’ and the next thing you’ve got a PLA Navy Luang III class [destroyer] docking there.
Excerpts from China and the Pacific: The Great Wharf, Economist, Apr. 21, 2018, at 33.
A 2018 report published by Drone Wars UK reveals that over the last five years the number of countries actively using armed drones has quadrupled. Drone Wars: The Next Generation demonstrates that from just three states (US, UK and Israel) in 2013, there are now a further nine who have deployed armed drones in a variety of roles including for armed conflict and counter-terror operations. The report also shows that a further nine states are very close to having armed drone capabilities, almost doubling the number of existing users. To this number, we have added five non-state actors who have used armed drones, which will take the number of active operators of armed drones to over 25 in the next few years.
As is well known, China has sold armed drones to a number of countries around the world. Since 2013, Nigeria, Pakistan, Saudi Arabia, Iraq, UAE and Egypt have begun operating armed Chinese drones whilst another four countries (Jordan, Myanmar, Kazakhstan and Turkmenistan) are thought to have recently taken possession of, or be in discussion about the sale of, Chinese drones. These Wing Loong and CH series drones are cheaper and less powerful than US Predators and Reapers. As, according to their specifications, they are not capable of delivering a payload of at least 500 kg to a range of at least 300 km they do not fall into the category of systems that would be refused under Category 1 of the Missile Technology Control Regime (MTCR) as the US systems do.
Turkey, Pakistan and Iran are actively using their own manufactured drones. Iran has, it seems, supplied Hamas, Hezbollah and the Houthis with armed drones while ISIS and the PKK (Kurdistan Workers’ Party) have attached small explosives to off-the-shelf drones. Turkey are thought to be concluding deal with Qatar and the Ukrain eand South Korea are very close to beginning production of their own armed drones.
As for the larger countries that one might expect to have already deployed armed drones, such as Russia and India, they still appear to be some distance from producing workable models…Several cross-European projects are underway to develop indigenous armed drones within the EU.
Excerpts from New research shows rise in number of states deploying armed drones, Press Release from Drone Wars UK, May 17, 2018
The McKinsey Global Institute estimates that cross-border flows of goods, services and data added 10 per cent to global gross domestic product in the decade to 2015, with data providing a third of that increase. That share of the contribution seems likely to rise: conventional trade has slowed sharply, while digital flows have surged. Yet as the whole economy becomes more information-intensive — even heavy industries such as oil and gas are becoming data-driven — the cost of blocking those flows increases…
Yet that is precisely what is happening. Governments have sharply increased “data localisation” measures requiring information to be held in servers inside individual countries. The European Centre for International Political Economy, a think-tank, calculates that in the decade to 2016, the number of significant data localisation measures in the world’s large economies nearly tripled from 31 to 84.
Even in advanced economies, exporting data on individuals is heavily restricted because of privacy concerns, which have been highlighted by the Facebook/ Cambridge Analytica scandal. Many EU countries have curbs on moving personal data even to other member states. Studies for the Global Commission on Internet Governance, an independent research project, estimates that current constraints — such as restrictions on moving data on banking, gambling and tax records — reduces EU GDP by half a per cent.
In China, the champion data localiser, restrictions are even more severe. As well as long-established controls over technology transfer and state surveillance of the population, such measures form part of its interventionist “ Made in China 2025 ” industrial strategy, designed to make it a world leader in tech-heavy sectors such as artificial intelligence and robotics.
China’s Great Firewall has long blocked most foreign web applications, and a cyber security law passed in 2016 also imposed rules against exporting personal information, forcing companies including Apple and LinkedIn to hold information on Chinese users on local servers. Beijing has also given itself a variety of powers to block the export of “important data” on grounds of reducing vaguely defined economic, scientific or technological risks to national security or the public interest. “The likelihood that any company operating in China will find itself in a legal blind spot where it can freely transfer commercial or business data outside the country is less than 1 per cent,” says ECIPE director Hosuk Lee-Makiyama….
Other emerging markets, such as Russia, India, Indonesia and Vietnam, are also leading data localisers. Russia has blocked LinkedIn from operating there after it refused to transfer data on Russian users to local servers.
Business organisations including the US Chamber of Commerce want rules to restrain what they call “digital protectionism”. But data trade experts point to a serious hole in global governance, with a coherent approach prevented by different philosophies between the big trading powers. Susan Aaronson, a trade academic at George Washington University in Washington, DC, says: “There are currently three powers — the EU, the US and China — in the process of creating separate data realms.”
The most obvious way to protect international flows of data is in trade deals — whether multilateral, regional or bilateral. Yet only the World Trade Organization laws governing data flows predate the internet and have not been thoroughly tested through litigation. It recently recruited Alibaba co-founder Jack Ma to front an ecommerce initiative, but officials involved admit it is unlikely to produce anything concrete for a long time. In any case, Prof Aaronson says: “While data has traditionally been addressed in trade deals as an ecommerce issue, it goes far wider than that.”
The internet has always been regarded by pioneers and campaigners as a decentralised, self-regulating community. Activists have tended to regard government intervention with suspicion, except for its role in protecting personal data, and many are wary of legislation to enable data flows. “While we support the approach of preventing data localisation, we need to balance that against other rights such as data protection, cyber security and consumer rights,” says Jeremy Malcolm, senior global policy analyst at the Electronic Frontier Foundation, a campaign for internet freedom…
Europe has traditionally had a very different philosophy towards data and privacy than the US. In Germany, for instance, public opinion tends to support strict privacy laws — usually attributed to lingering memories of surveillance by the Stasi secret police in East Germany. The EU’s new General Data Protection Regulation (GDPR), which comes into force on May 25, 2018 imposes a long list of requirements on companies processing personal data on pain of fines that could total as much as 4 per cent of annual turnover….But trade experts warn that the GDPR is very cautiously written, with a blanket exemption for measures claiming to protect privacy. Mr Lee-Makiyama says: “The EU text will essentially provide no meaningful restriction on countries wanting to practice data localisation.”
Against this political backdrop, the prospects for broad and binding international rules on data flow are dim. …In the battle for dominance over setting rules for commerce, the EU and US often adopt contrasting approaches. While the US often tries to export its product standards in trade diplomacy, the EU tends to write rules for itself and let the gravity of its huge market pull other economies into its regulatory orbit. Businesses faced with multiple regulatory regimes will tend to work to the highest standard, known widely as the “Brussels effect”. Companies such as Facebook have promised to follow GDPR throughout their global operations as the price of operating in Europe.
Excerpts from Data protectionism: the growing menace to global business, Financial Times, May 13, 2018
The top US general for Africa told lawmakers the American military could face “significant” consequences should China take a key port in Djibouti…. In Febuary 2018, Djibouti ended its contract with Dubai’s DP World, one of the world’s biggest port operators, to run the Doraleh Container Terminal, citing failure to resolve a dispute that began in 2012. DP World called the move an illegal seizure of the terminal and said it had begun new arbitration proceedings before the London Court of International Arbitration.
During a congressional hearing on March 7, 2018, dominated by concerns about China’s role in Africa, lawmakers said they had seen reports that Djibouti seized control of the port to give it to China as a gift. China has already built a military base in Djibouti, just miles from a critical US military base.
Djibouti is strategically located at the southern entrance to the Red Sea on the route to the Suez Canal. Marine General Thomas Waldhauser, the top US military commander overseeing troops in Africa, said if China placed restrictions on the port’s use, it could affect resupplying the US base in Djibouti and the ability of Navy ships to refuel there. Djibouti hosts a vital US military base home to about 4,000 personnel,[Camp Lemonnier] including special operations forces, and is a launchpad for operations in Yemen and Somalia.
China has sought to be visible in Africa, including through high-profile investment in public infrastructure projects, as it deepens trade ties. Waldhauser said the United States would be unable to match the scale of Chinese investment throughout Africa, noting Beijing’s construction of shopping malls, government buildings and even soccer stadiums. “We’ll never outspend the Chinese in Africa,” Waldhauser said, noting some Chinese investments in Djibouti.
In 2018, the US military put countering China, along with Russia, at the centre of a new national defence strategy. The Pentagon said China was a part of “revisionist powers” that “seek to create a world consistent with authoritarian models.”
Excerpts from Significant consequences if China takes port in Djibouti, Reuters, Mar. 7, 2018
Deep southern Negev desert, Israel, there is a small town called Baladia, with a main square, five mosques, cafés, a hospital, multi-storey blocks of flats, a kasbah and a cemetery. Oddly, it also has a number of well-constructed tunnels. The only people milling around in its streets are Israeli Defence Force (IDF) soldiers. Baladia, the Arab word for city, is part of the Tze’elim army base**. It has been built to provide a realistic training ground for the next time the IDF is required to go into Gaza to destroy Hamas missile launchers…Acceptance among Western armies that future fights are most likely to take place in cities. Megacities with populations of more than 10m are springing up across Africa and Asia. They are often ringed by closely packed slums controlled by neighbourhood gangs. Poor governance, high unemployment and criminality make them fertile territory for violent extremism.
It is hardly surprising that non-state adversaries of the West and its allies should seek asymmetric advantage by taking the fight into cities. Air power and precision-guided munitions lose some of their effectiveness in urban warfare because their targets can hide easily and have no scruples about using a densely packed civilian population as a shield.
Valuable lessons have been learned from the battle for Sadr City, a large suburb of Baghdad, in 2008, Israel going into Gaza in 2014 and the defeat of Islamic State (IS) in Mosul 2017….As General Mark Milley, the head of the US Army, puts it, “it took the infantry and the armour and the special operations commandos to go into that city, house by house, block by block, room by room…and it’s taken quite a while to do it, and at high cost.” He thinks that his force should now focus less on fighting in traditional environments such as woodland and desert and more on urban warfare.
To that end, he advocates smaller but well-armoured tanks that can negotiate city streets, and helicopters with a narrower rotor span that can fly between buildings. At the organisational level, that means operating with smaller, more compartmentalised fighting units with far more devolved decision-making powers…
Western military forces should still enjoy a significant technological edge. They will have a huge range of kit, including tiny bird- or insect-like unmanned aerial vehicles that can hover outside buildings or find their way in. Unmanned ground vehicles can reduce the risk of resupplying troops in contested areas and provide medical evacuation for injured soldiers, and some of them will carry weapons….
For all the advances that new technologies can offer, General Milley says it is a fantasy to think that wars can now be won without blood and sacrifice: “After the shock and awe comes the march and fight…to impose your political will on the enemy requires you…to destroy that enemy up close with ground forces.”
Excerpt from House to House in the The New Battlegrounds, Economist Special Report, the Future of War, Jan. 27, 2018
***In 2005, the Israeli Defense Forces, with assistance from the United States, built the Urban Warfare Training Center at the Tze’elim Army Base, at a cost of $45 million. Nicknamed “Baladia” it is a 7.4 square mile training center used to instruct soldiers in urban warfare techniques, and consists of an imitation Middle Eastern style city with multiple multistory buildings. It has been used to train various military organizations, including the US Army and UN peacekeepers. Wikipedia
The world’s vast oceans and seas offer seemingly endless spaces in which adversaries of the United States can maneuver undetected. The U.S. military deploys networks of manned and unmanned platforms and sensors to monitor adversary activity, but the scale of the task is daunting and hardware alone cannot meet every need in the dynamic marine environment. Sea life, however, offers a potential new advantage. Marine organisms are highly attuned to their surroundings—their survival depends on it—and a new program out of DARPA’s Biological Technologies Office aims to tap into [marine animals] natural sensing capabilities to detect and signal when activities of interest occur in strategic waters such as straits and littoral regions.
The Persistent Aquatic Living Sensors (PALS) program, led by program manager Lori Adornato, will study natural and modified organisms to determine which ones could best support sensor systems that detect the movement of manned and unmanned underwater vehicles. PALS will investigate marine organisms’ responses to the presence of such vehicles, and characterize the resulting signals or behaviors so they can be captured, interpreted, and relayed by a network of hardware devices.
Beyond sheer ubiquity, sensor systems built around living organisms would offer a number of advantages over hardware alone. Sea life adapts and responds to its environment, and it self-replicates and self-sustains. Evolution has given marine organisms the ability to sense stimuli across domains—tactile, electrical, acoustic, magnetic, chemical, and optical. Even extreme low light is not an obstacle to organisms that have evolved to hunt and evade in the dark.
However, evaluating the sensing capabilities of sea life is only one of the challenges for PALS researchers. Performer teams supporting DARPA will also have to develop hardware, software, and algorithms to translate organism behavior into actionable information and then communicate it to end users…. The complete sensing systems must also discriminate between target vehicles and other sources of stimuli, such as debris and other marine organisms, to limit the number of false positives.
Adornato is aiming to demonstrate the approach and its advantages in realistic environments to convey military utility. “Our ideal scenario for PALS is to leverage a wide range of native marine organisms, with no need to train, house, or modify them in any way, which would open up this type of sensing to many locations,” Adornato said.
Excerpt from PALS Turns to Marine Organisms to Help Monitor Strategic Waters: Highly adapted sea life could help U.S. military detect adversary activity over large areas, Feb. 2, 2018
American military engagement in Niger is a $110 million drone base the U.S. is building about 450 miles northeast of Niamey in Agadez…Its existence was partially confirmed in February 2018, inadvertently, when it was discovered that Strava, a fitness app used mostly by westerners, had released location data that showed the global movements of the users of workout trackers like Fitbit — and the data showed unusual activity in far-off Aguelal, Agadez, Niger.
On the southeast edge of the civilian airport, accessible by tracks in the sand used mainly to exit the town, is Nigerien Air Base 201, or in common parlance “the American base.” The base, scheduled for completion in late 2018, is technically the property of the Nigerien military, though it is paid for, built, and operated by Americans. It is being constructed on land formerly used by Tuareg cattle-herders. … The U.S. currently flies drones out of an airport in Niamey, but those operations will be shifted to Agadez once the new base is completed.
When asked to confirm the American presence in those areas of Niger, U.S. Africa Command spokesperson Samantha Reho replied, “I can confirm there are approximately 800 Department of Defense personnel (military, civilian, and contractor) currently working in Niger, making that country the second-highest concentration of DoD people across the continent, with the first being in Djibouti at Combined Joint Task Force-Horn of Africa.”
The U.S. is just one of several Western militaries that have established and strengthened military ties to Niger over the past few years. France has had soldiers in the country since 2013, when it launched Opération Serval in neighboring Mali. In 2015, France reopened a colonial fort in Madama, close to the border with Libya — unthinkable during the times of Moammar Gadhafi; the Libyan leader maintained a sphere of influence in the region that would have been at odds with a French military presence. Germany sent its own troops in Niger to support the United Nations peacekeeping mission across the border in Mali, and German Chancellor Angela Merkel even visited Niger in 2017. And Italy recently announced it would send 470 troops to a French base in the north of Niger to fight migrant transporters….
The base in Agadez is about 6 square kilometers, though most of the land is yet to be developed. ….. The base is tucked away and hidden from Agadez first by the 8-to-10-foot wall that separates the city of 125,000 from the airport, and it is surrounded by a barbed wire fence with sandbags, so despite there being a few hundred Americans in Agadez, you would hardly know they were there unless you went looking. Both the Nigerien and the American governments prefer to keep it this way…
The man the middle is Mahamadou Issoufou, the president of Niger. In power for six years, he has adopted a clear strategy for trying to keep control of things – by aligning himself closely with Europe and the United States, while presiding over an electoral system that his opponents describe as rigged. This is not a recipe for stability in a country that has had little of it since its founding in 1960, at the end of French colonial rule.
Issoufou is a trained engineer and a former secretary-general of Somaïr, a uranium mine that was run by the French company Areva. Until migration and terrorism, uranium was the focal point of outside, particularly French, interest in Niger. France’s electricity grid is powered by nuclear energy, and Areva’s uranium concessions in Niger provide up to one-fifth of the uranium necessary to power that grid. Issoufou’s predecessor, Mamadou Tandja, had sparred with the French over the concession, and in 2009, then-French President Nicholas Sarkozy visited Niger to negotiate a deal on opening a new mine called Imouraren. After a $1.2 billion deal was struck, Tandja tried to reverse the constitution to stay in power for a third term, and after street protests, a group of low-ranking army officers carried out a coup d’état.
When the transition period ended with Issoufou’s election in 2011, the Fukushima nuclear disaster in Japan caused a sharp downturn in global uranium prices. Areva dropped its plans for Imouraren, and Issoufouacquiesced to the French firm’s plans for delaying the mine until prices rose, denting economic growth prospects for the country. But despite losing out on Imouraren, Issoufou quickly became a donor darling and found that the closer he was to France and the West, the better his image and the more firm his hold on political power. Issoufou was criticized heavily for going to Paris to attend the “Je Suis Charlie” march in January 2015, and some human rights organizations view him as a lackey of the West. He works with Image Sept, a French firm with close ties to the Parisian political elite, to manage his image.A couple of months before his re-election in 2016, Issoufou jailed his main political opponent and former close ally, Hama Amadou of the Moden Lumana party….
Many people I spoke to in Niger feel their country has had its autonomy usurped by Westerners. “The reality is that Niger is not at a level where it can say yes or no to the French or Americans. … We only have sovereignty on paper,” said Djibril Abarché, president of the Nigerien Human Rights Association.
Exceprts from Joe Penny, Drones in the Sahara, the Intercept, Feb. 18, 2018
North Korea’s preparations to launch a more advanced reconnaissance satellite with a high-resolution scanning capability threaten to push Asia’s space race deeper into the military theater. The Kwangmyongsong-5 Earth-exploration satellite, likely to be packaged with a separate communications satellite, will technically allow North Korea to transmit data down to the ground for the first time, thus offering real-time intelligence for potential ballistic-missile strikes.
This is well short of the technological capacity needed to deploy orbital weapon systems, but will cause some unease among Asian power-brokers China, Japan and India as they pour money into the last strategic frontier of outer space. Space programs in Asia have largely been driven by competition for the US$300 billion global commercial transponders market, which is expected to double by 2030 if demand holds.
A shift toward miniature satellites of less than 20 kilograms, mostly used by governments and smaller companies, has drawn nations as diverse as Singapore, Pakistan, Vietnam and South Korea into a field led by Japan and China, with India a more recent player.
Japan placed two satellites in different orbits for the first time on December 2017, displaying a technical edge aimed at reducing launch costs for commercial clients. India announced this week that it had successfully tested a GSLV Mark III rocket that can lift a 4-ton satellite into orbit. In 2017, it managed to launch 104 satellites of varying sizes in just one operation. China has loftier ambitions, including a lunar landing some time in 2018, after sending a roving module down a steep crater on the moon in 2013. About 40 Chinese launches are likely in 2018, mainly to boost communications. India and Japan are both locked in undeclared space races with China that go well beyond commercial rivalries and have muddied the debate over North Korea’s shadowy aims….
“Militarization” refers to any systems that enhance the capability of forces in a conventional setting, such as intelligence, communications and surveillance. “Weaponization” is the physical deployment of weapons in outer space or in a ground mode where they can be used to attack and destroy targets in orbit. The United Nations Treaty on Outer Space prohibits the deployment of weapons of mass destruction in space, but the US has blocked efforts to ban space weapons outright. In 2007, Washington said it would “preserve its rights, capabilities, and freedom of action in space.”
Excerpts from ALAN BOYD, Asia’s Space Race Gathers Pace, Asia Times, Jan. 6, 2018
On November 12, 2017, a video called “Slaughterbots” was uploaded to YouTube. … It is set in a near-future in which small drones fitted with face-recognition systems and shaped explosive charges can be programmed to seek out and kill known individuals or classes of individuals (those wearing a particular uniform, for example). In one scene, the drones are shown collaborating with each other to gain entrance to a building. One acts as a petard, blasting through a wall to grant access to the others…
[M]ilitary laboratories around the planet are busy developing small, autonomous robots for use in warfare, both conventional and unconventional. In America, in particular, a programme called MAST (Micro Autonomous Systems and Technology), which has been run by the US Army Research Laboratory in Maryland, is wrapping up this month after ten successful years….. Its successor, the Distributed and Collaborative Intelligent Systems and Technology (DCIST) programme, which began earlier this year, is now getting into its stride….Along with flying drones, MAST’s researchers have been developing pocket-sized battlefield scouts that can hop or crawl ahead of soldiers. DCIST’s purpose is to take these autonomous robots and make them co-operate. The result, if the project succeeds, will be swarms of devices that can take co-ordinated action to achieve a joint goal.
If swarms of small robots can be made to collaborate autonomously, someone, somewhere will do it…[Many of these small robots are today] cyclocopters …of less than 30 grams. Such machines can outperform polycopters...Cyclocopter aerodynamics is more like that of insects than of conventional aircraft…Cyclocopters get better as they get smaller. They are also quieter…[Another innovation involves] robots…that hop.One of the most advanced is Salto, developed by the Biomimetic Millisystems Laboratory at the University of California, Berkeley. Salto… has the agility to bounce over uneven surfaces and also to climb staircases…
Bouncing over the rubble of a collapsed building is not the only way to explore it. Another is to weave through the spaces between the debris. Researchers at the Biomimetic Millisystems lab are working on that, too. Their solution resembles a cockroach.
Getting into a building, whether collapsed or intact, is one thing. Navigating around it without human assistance is quite another. For this purpose MAST has been feeding its results to the Defence Advanced Research Projects Agency (DARPA)… The next challenge…is getting the robots to swarm and co-ordinate their behavior effectively.
Excerpt from Miniature Robots: Bot Flies, Economist, Dec. 16, 2017
Underground settings are becoming increasingly relevant to global security and safety. Rising populations and urbanization are requiring military and civilian first responders to perform their duties below ground in human-made tunnels, underground urban spaces [e.g. mass transit, water infrastructure] and natural cave networks. Recognizing that innovative, enhanced technologies could accelerate development of critical lifesaving capabilities, DARPA today announced its newest challenge: the DARPA Subterranean Challenge.
The DARPA Subterranean or “SubT” Challenge aims to explore new approaches to rapidly map, navigate, and search underground environments. Teams from around the world will be invited to propose novel methods for tackling time-critical scenarios through unknown courses in mapping subsurface networks and unpredictable conditions, which are too hazardous for human first responders.
“One of the main limitations facing warfighters and emergency responders in subterranean environments is a lack of situational awareness; we often don’t know what lies beneath us,” said Timothy Chung, program manager in DARPA’s Tactical Technology Office (TTO). “The DARPA Subterranean Challenge aims to provide previously unimaginable situational awareness capabilities for operations underground.”
“We’ve reached a crucial point where advances in robotics, autonomy, and even biological systems could permit us to explore and exploit underground environments that are too dangerous for humans,” said TTO Director Fred Kennedy.“Instead of avoiding caves and tunnels, we can use surrogates to map and assess their suitability for use. Through the DARPA Subterranean Challenge, we are inviting the scientific and engineering communities—as well as the public—to use their creativity and resourcefulness to come up with new technologies and concepts to make the inaccessible accessible.”
Excerpts from DARPA Subterranean Challenge Aims to Revolutionize Underground Capabilities, Dec. 21, 2017
President Trump agreed in September 2017 to send more of the Pentagon’s “strategic assets” to South Korea on a rotational basis to deter North Korean provocations, but what exactly that means remains something of a mystery.
The U.S. assets — typically defined as submarines, aircraft carriers, nuclear weapons or bombers — have long been involved in the standoff that began with the 1953 Korean Armistice Agreement after open warfare subsided between the two Koreas.
The U.S. Navy typically keeps the movements of its submarines secret, but it also has periodically sent them to port in South Korea. The USS Michigan, an Ohio-class nuclear-powered submarine, has appeared at Busan Naval Base in South Korea at least twice in 2017. It is capable of carrying cruise missiles and elite Navy SEALs, although not ballistic missiles.
More recently, the Navy announced last week it has plans for a massive exercise involving three aircraft carriers — the USS Nimitz, the USS Theodore Roosevelt and the USS Ronald Reagan — and their associated strike groups, each of which include dozens of aircraft and thousands of sailors and Marines.
Excerpts from Dan Lamothe, In standoff with North Korea, the U.S. keeps deployment of ‘strategic assets’ mysterious, Washington Post, Oct. 29, 2017
China’s Tsinghua Unigroup Ltd., a state-owned firm is spending $24 billion to build the country’s first advanced memory-chip factories. It’s part of the Chinese government’s plan to become a major player in the global chip market and the move is setting off alarms in Washington. When Unigroup tried to buy U.S. semiconductor firms in 2015 and 2016, Washington shot down the bids. It is considering other moves to counter Beijing’s push.
China is aiming “to take over more and more segments of the semiconductor market,” says White House trade adviser Peter Navarro, who fears Beijing will flood the market with inexpensive products and bankrupt U.S. companies. Unigroup’s CEO Zhao Weiguo says he is only building his own factories due to Washington’s refusal to let him invest in the U.S. “Chinese companies have faced discrimination in many areas,” of technology, he says. “Abnormal discrimination.”
Semiconductors—the computer chips that enabled the digital age and power the international economy—have long been among the most globalized of industries, with design and manufacturing spread across dozens of countries.
Today, the industry is riven by a nationalist battle between China and the U.S., one that reflects broad currents reshaping the path of globalization. Washington accuses Beijing of using government financing and subsidies to try to dominate semiconductors as it did earlier with steel, aluminum, and solar power. China claims U.S. complaints are a poorly disguised attempt to hobble China’s development. Big U.S. players like Intel Corp. and Micron Technology Inc. find themselves in a bind—eager to expand in China but wary of losing out to state-sponsored rivals…
The new semiconductor battle marks a shift toward nationalism, trade battles and protected markets…The U.S. estimates China will eventually spend $150 billion [on developing s its indigenous semiconductor industry] a figure equal to about half of global semiconductor sales annually.
Though Republicans and Democrats are at odds on many economic policy issues, they’re unified on this. An interagency working group on semiconductors, started by the Obama administration in 2015, has continued meeting under President Donald Trump. The group is weighing policies to make it more difficult for China to scoop up U.S. technology, according to people involved in the discussions.
One idea is tightening the rules covering U.S. approval of foreign investments to make it tougher for Chinese firms seen as security risks. Other options include trade sanctions, stricter export controls and added federal research spending…
The U.S. views China as its biggest semiconductor challenge since Japan in the late 1980s. The U.S. triumphed then through trade sanctions and technological advances. Japanese firms couldn’t match U.S. microprocessor technology, which powered the personal computer revolution, and fell behind South Korea in low-margin memory chips.
China has advantages Japan didn’t. It is the world’s biggest chip market, consuming 58.5% of the global $354 billion semiconductor sales in 2015 according to PricewaterhouseCoopers LLP. That gives Beijing power to discriminate, if it wants, against overseas suppliers…Beijing’s semiconductor program shifted into high gear in 2012, when the value of its chip imports surged past its bill for crude oil for the first time…
Nearly 90% of the $190 billion worth of chips used in China are imported or produced in China by foreign-owned firms…The top 10 chip vendors in China by revenue are foreign.
“We cannot be reliant on foreign chips,” said China’s vice premier, Ma Kai in 2017…Beijing created a $20 billion national chip financing fund—dubbed the “Big Fund”— and set goals for China to become internationally competitive by 2030, with some companies becoming market leaders. Local governments created at least 30 additional semiconductor funds, with announced financing of more than $100 billion. If all these projects are realized, the global supply of memory chips would outstrip demand by about 25% in 2020, estimates Bernstein Research, pushing prices down and battering profits of semiconductor companies globally… Beijing has been consolidating 600 small Chinese chip makers, many unprofitable, into a handful of larger companies China wants to compete internationally.
When the Big Fund financed an acquisition blitz, Unigroup was in the lead, bidding in 2015 for memory-chip maker Micron Technology, and then for a 15% stake in data storage firm Western Digital Corp.Some bids were so overvalued U.S. government officials joked the Chinese were willing to pay an “espionage premium.” After a Chinese plan to buy a Royal Philips NV semiconductor-material unit fell apart, Phillips sold the unit to a U.S. private-equity group for about half the earlier price. Philips declined to comment.
The bids spooked Washington and the industry. In private meetings, Micron, Intel and others warned they faced an “existential threat” from China, say industry and government officials. The companies feared they were trapped in a prisoner’s dilemma. Each company was under pressure to sell to China for fear its competitors would sell if it didn’t.
In July 2017, Germany approved restrictions on foreign technology purchases, aimed at China, and the European Union also is considering barriers… The U.S. Committee on Foreign Investment in the U.S (CFIUS), an interagency review group, made clear most proposed acquisitions wouldn’t pass muster.
According to Rhodium Group, only about $4.4 billion in Chinese semiconductor acquisitions were completed since 2015. Unigroup’s bid for Micron fell apart. South Korea, Taiwan and Japan also blocked Chinese acquisition bids…
Mr. Trump proposed a 13% decrease in federal funding for basic research to $28.9 billion in fiscal year 2018, but semiconductor lobbyists say they hope to eke out an increase for chip-related research.
Chinese chip executives argue South Korea is a bigger threat to the U.S. chip industry due to its advanced technology.
After Unigroup’s plan to acquire Micron fell apart, it hired Charles Kau, the former head of Micron’s Taiwan joint-venture, and other experts from the island. It announced it would build its own memory chip facility—the mammoth Wuhan factories—at about the same price it would have paid for Micron. Unigroup now has a new plan for Micron. It says it no longer wants to buy the firm, recognizing the chances of regulatory approval in the U.S. are nil, but says the two should work together to battle market leader Samsung Electronics Co. The combination of Micron technology and Chinese capital would help both companies take on the South Koreans, says Mr. Zhao, the Unigroup CEO.
Micron says the Federal Bureau of Investigation has begun investigating whether Micron employees in Taiwan who went to work for other firms, including Unigroup, have taken Micron technology with them.”
Excerpts from Bob Davis and Eva Dou, CHINA’S NEXT TARGET: U.S. MICROCHIP HEGEMONY, Wall Street Journal, July 28, 2017
The mysterious hacking group that supplied a critical component of the WannaCry “ransomware” software attack that spread across the globe in mid-May 2017 has been releasing alleged National Security Agency secrets for the past eight months. Former intelligence officials now fear that the hackers, who go by the name Shadow Brokers, are taking a new tack: exposing the identities of the NSA’s computer-hacking team. That potentially could subject these government experts to charges when traveling abroad.
The Shadow Brokers on April 14, 2017 posted on a Russian computer file-sharing site what they said were NSA files containing previously unknown attack tools and details of an alleged NSA hack affecting Middle Eastern and Panamanian financial institutions.
But something went largely unnoticed outside the intelligence community. Buried in the files’ “metadata”—a hidden area that typically lists a file’s creators and editors—were four names. It isn’t clear whether the names were published intentionally or whether the files were doctored. At least one person named in the metadata worked for the NSA, a person familiar with the matter said. Additionally, the hacking group in April, 2017 sent several public tweets that seemingly threatened to expose the activities of a fifth person, former NSA employee Jake Williams, who had written a blog post speculating the group has ties to Russia… Security experts who have examined the documents believe they contain legitimate information, including code that can be used in hacks, as well as the names of the files’ creators and editors.
Because nation-state hackers might run afoul of other countries’ laws while discharging their duties, they could, if identified, face charges when outside their country. So, to keep their own people safe, governments for decades have abided by a “gentleman’s agreement” that allows government-backed hackers to operate in anonymity, former intelligence officials say….
Some former intelligence officials suggested the U.S. prompted the outing of state-sponsored hackers when it indicted five Chinese military hackers by name in 2014, and more recently brought charges against two officers with Russia’s Federal Security Service over a 2014 Yahoo Inc. breach. By exposing cyberagents, the Shadow Brokers appear to be taking a page from the U.S. playbook, said Mr. Williams, who worked for the NSA’s Tailored Access Operations hacking group until 2013. An NSA spokesman said the agency doesn’t comment about “most individuals’ possible current, past or future employment with the agency.” “We’ve fired first,” Mr. Williams said, referring to the U.S. charging the alleged Chinese hackers by name. “This is us taking flak.”…
The documents revealed jealously guarded tactics and techniques the NSA uses to access computer systems…For example, the files include source code for software designed to give its creators remote access to hacked machines, and to evade detection from antivirus software. If the code was created by the NSA, it now gives security professionals a digital fingerprint they can use to track the NSA’s activities prior to the leak.
That could prove disruptive to NSA activities, forcing the agency to consider pulling its software from others’ networks and taking other steps to erase its tracks. And while the information could help companies determine whether they have been hacked by the NSA, it could also be used to create more malicious software. The Shadow Brokers tools, for example, are now being used to install malicious software such as WannaCry on corporate networks.
Mr. Williams initially thought the Shadow Brokers had access only to a limited set of NSA tools. His assessment changed after three tweets directed at him April 9, 2017 included terms suggesting the group had “a lot of operational data or at least operational insight” into his work at the NSA, he said. The tweets, which are public, are cryptic. They express displeasure over an article Mr. Williams wrote attempting to link the Shadow Brokers to Russia. They also mention apparent software code names, including “OddJob” and “Windows BITS persistence.”…..OddJob is a reference to software released by the Shadow Brokers five days after the tweets. “Windows BITS persistence” is a term whose meaning isn’t publicly known.
Excerpts from In Modern Cyber War, the Spies Can Become Targets, Too, Wall Street Journal, May 25, 2017
Understanding and assessing the readiness of the warfighter is complex, intrusive, done relatively infrequently, and relies heavily on self-reporting. Readiness is determined through medical intervention with the help of advanced equipment, such as electrocardiographs (EKGs) and otherspecialized medical devices that are too expensive and cumbersome to employ continuously without supervision in non-controlled environments. On the other hand, currently 92% of adults in the United States own a cell phone, which could be used as the basis for continuous, passive health and readiness assessment. The WASH program will use data collected from cellphone sensors to enable novel algorithms that conduct passive, continuous, real-time assessment of the warfighter.
DARPA’s WASH [Warfighter Analytics using Smartphones for Health] will extract physiological signals, which may be weak and noisy, that are embedded in the data obtained through existing mobile device sensors (e.g., accelerometer, screen, microphone). Such extraction and analysis, done on a continuous basis, will be used to determine current health status and identify latent or developing health disorders. WASH will develop algorithms and techniques for identifying both known indicators of physiological problems (such as disease, illness, and/or injury) and deviations from the warfighter’s micro-behaviors that could indicate such problems.
Excerpt from Warfighter Analytics using Smartphones for Health (WASH)
Solicitation Number: DARPA-SN-17-4, May, 2, 2018
A SpaceX Falcon rocket lifted off from the Kennedy Space Center in Florida on May , 2017 to boost a classified spy satellite into orbit for the U.S. military, then turned around and touched down at a nearby landing pad.
It was the 34th mission for SpaceX, but its first flight for the Department of Defense, a customer long-pursued by company founder Elon Musk. The privately owned SpaceX once sued the Air Force over its exclusive launch services contract with United Launch Alliance (ULA), a partnership of Lockheed-Martin and Boeing.) The liftoff of a classified satellite for the National Reconnaissance Office (NRO) officially broke ULA’s 10-year monopoly on launching U.S. military and national security satellites.
In addition to the NRO’s business, SpaceX has won two Air Force contracts to launch Global Positioning System satellites in 2018 and 2019. For now, the military’s business is a fraction of more than 70 missions, worth more than $10 billion, slated to fly on SpaceX rockets. But with up to 13 more military satellite launches open for competitive bidding in the next few years and ULA’s lucrative sole-source contract due to end in 2019, SpaceX is angling to become a majo launch service provider to the Department of Defense.
A month ago, SpaceX for the first time launched one of its previously flown rockets to send an SES communications satellite into orbit, a key step in Musk’s quest to demonstrate reusability and slash launch costs.
Excertps, SpaceX Launches US Spy Satellite on Secret Mission, Nails Rocket Landing, Space.com, May 1, 2017
A real-estate magnate is financing Google’s and Facebook Inc.’s new trans-Pacific internet cable, the first such project that will be majority-owned by a single Chinese company. Wei Junkang, 56, is the main financier of the cable between Los Angeles and Hong Kong, a reflection of growing interest from China’s investors in high-tech industries. It will be the world’s highest-capacity internet link between Asia and the U.S.
For Alphabet Inc.’s Google and Facebook, the undersea cable provides a new data highway to the booming market in Southeast Asia. Google and Facebook, which are blocked in China but seeking ways back in, declined to comment on market possibilities in China. Google said the project, called the Pacific Light Cable Network, will be its sixth cable investment and will help it provide faster service to Asian customers…
Backers hope to have Pacific Light operating in late 2018. The elder Mr. Wei’s company, Pacific Light Data Communication Co., will own 60%, Eric Wei said, and Google and Facebook will each own 20%. The project cost is estimated at $500 million, and the Chinese company hired U.S. contractor TE SubCom to manufacture and lay the 17-millimeter wide, 7,954-mile long cable…
The cable project requires U.S. government approval, including a landing license from the Federal Communications Commission and a review by Team Telecom, a committee of officials from the departments of defense, homeland security and justice….
Pacific Light will likely face higher scrutiny from Team Telecom due to the controlling interest by a foreign investor, said Bruce McConnell, global vice president of the EastWest Institute and a former senior cybersecurity official with the Department of Homeland Security.
Team Telecom rarely rejects a landing license application, Mr. McConnell said, but cable operators must agree to security terms.“The agreement is usually heavily conditioned to ensure that (U.S.) security concerns are met,” he said.
The terms often require an American operator of the cable to assist U.S. authorities in legal electronic surveillance, including alerting regulators if foreign governments are believed to have accessed domestic data, according to copies of agreements filed with the FCC. The U.S. landing party usually must also be able to cut off U.S. data from the international network if asked…
More than 99% of the world’s internet and phone communications rely on fiber-optic cables crisscrossing continents and ocean floors. That makes these cables critical infrastructure to governments and a target for espionage.
One of the Eric Wei’s businesses is a Chinese alternative to the QR code called a D9 code, which the company promotes as a “safe” alternative to foreign technology.
Excerpts from China Firm Backs Asia-US Cable, Wall Street Journal, Mar. 16, 2017
Built by the Indian Space Research Organisation, the Polar Satellite Launch Vehicle threw itself into the sky at 3.58am GMT on February 15th, 2017 It took with it a record-breaking 104 satellites—88 of which belonged to a single company, Planet, a remote sensing business based in San Francisco. Planet now has 149 satellites in orbit—enough for it to provide its customers with new moderately detailed images of all the Earth’s land surface every single day. The satellites Planet makes—it calls them “doves”—measure 10cm by 10cm by 30cm.
Providing daily updated images of the earth is not enough… Processing the images to answer pressing questions: what has changed since yesterday? Is that illegal logging? What does the number of containers in these ports suggest about trade balances? Planet will be providing more such analysis itself, but there are also third parties eager to play. SpaceKnow, a startup which focuses on turning satellite data into analysis the financial community will pay for, has just raised $4m….
Planet is not the only company using small satellites to produce big data; the launch on February 15th also carried up eight ship-tracking satellites owned by Spire, just a couple of streets away from Planet. The companies hope that, as more and more customers come to see the value of an endlessly updated, easily searchable view of the world, insights from satellites will become ever more vital to the data-analysis market. The more normal their wares start to seem, the more spectacular their future may be
Excerpts from Space Firms: Eyes on Earth ,Economist, Feb. 18, 2017
Raytheon Company and Utilidata have formed a strategic alliance to help power utilities proactively detect, defend against and respond to cyber threats. The effort will combine Utilidata’s experience in the use of real-time data from the electrical grid to detect and respond to cyber attacks and Raytheon’s expertise in proactive cyber threat hunting, automation and managed security services to provide world-class cybersecurity, analytics and other innovative technologies….
[According to] Scott DePasquale, chairman and CEO of Utilidata. “With more and more devices and systems connected to the internet, and all of them needing electrical power, these challenges are increasing exponentially. This new alliance will help define the future of cybersecurity in the power utilities sector.” In December 2015, a cyber attack shut down a large section of the Ukrainian power grid – an incident that the Department of Energy identified in the 2017 installment of the Quadrennial Energy Review as an ‘indicator of what is possible.’
Excerpts from Raytheon, Utilidata to deliver defense-grade cybersecurity for utilities, PRNewswire, Feb. 8, 2017
The ships that lay electronic cables across the ocean floor look like cargo vessels with a giant fishing reel on one end. They move ponderously across the open water, lowering insulated wire into shallow trenches in the seabed as they go. This low-tech process hasn’t changed much since 1866, when the SS Great Eastern laid the first reliable trans-Atlantic telegraph cable, capable of transmitting eight words per minute. These days, the cables are made of optical fiber, can carry 100 terabits of data or more in a second, and aren’t owned only by telephone companies.
Among the newcomers are a few of the world’s leading internet companies, which have concluded that, given the cost of renting bandwidth, they may as well make their own connections. Facebook and Microsoft have joined with Spanish broadband provider Telefónica to lay a private trans-Atlantic fiber cable known as Marea. The three companies will divide up the cable’s eight fiber strands, with Facebook and Microsoft each getting two. The project, slated to be completed by the end of 2017, marks the first time Facebook has taken an active role in building a cable, rather than investing in existing projects or routing data through pipes controlled by traditional carriers. Marea will be Microsoft’s second private cable; a trans-Pacific one is scheduled to come online in 2017.
In June 2016, Google said it had finished a data pipeline running from Oregon to Taiwan, and it has at least two more coming: one from the U.S. to Brazil; the other, a joint project with Facebook, will connect Los Angeles and Hong Kong. Amazon.com made its first cable investment in May, announcing plans for a link between Australia and New Zealand and the U.S. Worldwide, 33 cable projects worth an estimated $8.1 billion are scheduled to be online by 2018, according to TeleGeography. That’s up from $1.6 billion worth of cables in the previous three years. And bandwidth demand is expected to double every two years. ..
Cables are just one way to increase the supply of bandwidth and cut costs, says Chetan Sharma, an analyst and telecom consultant. Facebook is also working on satellites, lasers, and drones to deliver internet access to remote places, and Google has experimented with hot air balloons. So far, undersea cables remain the best option for crossing oceans—they’re cheaper, far more reliable, and largely unregulated. The United Nations treats ocean cables in much the same manner as boat traffic, meaning companies can lay and repair cables in international waters pretty much wherever they please, provided they don’t damage existing ones.So Silicon Valley will continue to pour money into technology pioneered in the telegraph era. “It’s about taking control of our destiny,” says Mark Russinovich, chief technology officer for Microsoft’s cloud services division, Azure. “We’re nowhere near being built out.”
Excerpt from Bet you Own Broadband, Bloomberg, Oct. 20, 2016
Free-Speech advocates were aghast—and data-privacy campaigners were delighted—when the European Court of Justice (ECJ) embraced the idea of a digital “right to be forgotten” in May 2014. It ruled that search engines such as Google must not display links to “inadequate, irrelevant or no longer relevant” information about people if they request that they be removed, even if the information is correct and was published legally.
The uproar will be even louder should France’s highest administrative court, the Conseil d’État, soon decide against Google. The firm currently removes search results only for users in the European Union. But France’s data-protection authority, CNIL, says this is not enough: it wants Google to delete search links everywhere. Europe’s much-contested right to be forgotten would thus be given global reach. The court… may hand down a verdict by January.
The spread of the right to be forgotten is part of a wider trend towards the fragmentation of the internet. Courts and governments have embarked on what some call a “legal arms race” to impose a maze of national or regional rules, often conflicting, in the digital realm
The internet has always been something of a subversive undertaking. As a ubiquitous, cross-border commons, it often defies notions of state sovereignty. A country might decide to outlaw a certain kind of service—a porn site or digital currency, say—only to see it continue to operate from other, more tolerant jurisdictions.
As long as cyberspace was a sideshow, governments did not much care. But as it has penetrated every facet of life, they feel compelled to control it. The internet—and even more so cloud computing, ie, the storage of vast amounts of data and the supply of myriad services online—has become the world’s über-infrastructure. It is creating great riches: according to the Boston Consulting Group, the internet economy (e-commerce, online services and data networks, among other things) will make up 5.3% of GDP this year in G20 countries. But it also comes with costs beyond the erosion of sovereignty. These include such evils as copyright infringement, cybercrime, the invasion of privacy, hate speech, espionage—and perhaps cyberwar.
IIn response, governments are trying to impose their laws across the whole of cyberspace. The virtual and real worlds are not entirely separate. The term “cloud computing” is misleading: at its core are data centres the size of football fields which have to be based somewhere….
New laws often include clauses with extraterritorial reach. The EU’s General Data Protection Regulation will apply from 2018 to all personal information on European citizens, even if the company holding it is based abroad.
In many cases, laws seek to keep data within, or without, national borders. China has pioneered the blocking of internet addresses with its Great Firewall, but the practice has spread to the likes of Iran and Russia. Another approach is “data localisation” requirements, which mandate that certain types of digital information must be stored locally or remain in the country. A new law in Russia, for instance, requires that the personal information of Russian citizens is kept in national databases…Elsewhere, though, data-localisation polices are meant to protect citizens from snooping by foreign powers. Germany has particularly stringent data-protection laws which hamper attempts by the European Commission, the EU’s civil service, to reduce regulatory barriers to the free flow of data between member-states.
Fragmentation caused by government action would be less of a concern if other factors were not also pushing in the same direction–new technologies, such as firewalls and a separate “dark web”, which is only accessible using a special browser. Commercial interests, too, are a dividing force. Apple, Facebook, Google and other tech giants try to keep users in their own “walled gardens”. Many online firms “geo-block” their services, so that they cannot be used abroad….
Internet experts distinguish between governance “of” the internet (all of the underlying technical rules that make it tick) and regulation “on” the internet (how it is used and by whom). The former has produced a collection of “multi-stakeholder” organisations, the best-known of which are ICANN, which oversees the internet’s address system, and the Internet Engineering Task Force, which comes up with technical standards…..
Finding consensus on technical problems, where one solution often is clearly better than another, is easier than on legal and political matters. One useful concept might be “interoperability”: the internet is a network of networks that follow the same communication protocols, even if the structure of each may differ markedly.
Excerpts from Online governance: Lost in the splinternet, Economist, Nov. 5, 2016
Three billion dollars sounds a lot to spend on a map. But if it is a map of two-thirds of Earth’s surface, then the cost per square kilometre, about $8.30, is not, perhaps, too bad. And making such a map at such a cost is just what an organisation called the General Bathymetric Chart of the Oceans (GEBCO) is proposing to do. GEBCO, based in Monaco, has been around since 1903. Its remit, as its name suggests, is to chart the seabed completely. Until now, it has managed less than a fifth of that task in detail. But means of mapping the depths have improved by leaps and bounds over recent decades. So, with the aid of the Nippon Foundation, a large, Japanese philanthropic outfit, GEBCO now proposes to do the job properly. It plans to complete its mission by 2030….
Despite water’s apparent transparency, the sea absorbs light so well that anywhere below 200 metres is in pitch darkness. Radio waves (and thus radar) are similarly absorbed. Sound waves do not suffer from this problem, which is why sonar works for things like hunting submarines. But you cannot make sonic maps from a satellite. For that, you have to use the old-fashioned method of pinging sonar from a ship. Which is just what GEBCO plans to do.,,,
[The technique used to map the sea floor] is “echo sounding”, using sonar reflected from the seabed. Marie Tharp and Bruce Heezen of Columbia University, in New York, pioneered the technique in the 1950s and 1960s by using technology developed during the second world war. With it, they mapped part of the Mid Atlantic Ridge, an underwater mountain chain…
Cable-laying companies, oil firms, academic oceanography laboratories, national hydrographic surveys and the world’s navies all have oodles of sounding data. One of GEBCO’s jobs is to gather this existing information together and sew it into a new database, to create a coherent portrayal of the known ocean floor. The organisation is also keen to include data collected by helpful volunteers. A new digital platform overseen by America’s National Oceanic and Atmospheric Administration encourages the crowdsourcing of bathymetric data, letting mariners upload their findings easily. Recent political initiatives, such as a deal made in Galway in 2013 between America, Canada and the European Union to support transatlantic floor-mapping, will also boost efforts. National icebreakers are gathering information in parts of the ocean too frozen for other vessels to reach. And GEBCO is trying to persuade governments and companies with proprietary data on the sea floor to share them. One such firm, a cable-laying outfit called Quintillion, has already agreed to do so…
[A] accurate map of the seabed may help open this unknown two-thirds of Earth’s surface to economic activity. ..[T]he world’s navies (or, at least, those among them with submarine capability) will also take an interest—for an accurate seabed map will both show good places for their boats to hide and suggest where their rivals’ vessels might be secreted. Whether they will welcome GEBCO making this information public is a different question
Excerpt from Bathymetry: In an octopus’s garden, Economist, Oct. 29, 2016
Seeking to cut dependence on companies such as Google, Microsoft, and LinkedIn, Putin in recent years has urged the creation of domestic versions of everything from operating systems and e-mail to microchips and payment processing. Putin’s government says Russia needs protection from U.S. sanctions, bugs, and any backdoors built into hardware or software. “It’s a matter of national security,” says Andrey Chernogorov, executive secretary of the State Duma’s commission on strategic information systems. “Not replacing foreign IT would be equivalent to dismissing the army.”
Since last year, Russia has required foreign internet companies to store Russian clients’ data on servers in the country. In January 2016 the Kremlin ordered government agencies to use programs for office applications, database management, and cloud storage from an approved list of Russian suppliers or explain why they can’t—a blow to Microsoft, IBM, and Oracle. Google last year was ordered to allow Android phone makers to offer a Russian search engine. All four U.S. companies declined to comment.
And a state-backed group called the Institute of Internet Development is holding a public contest for a messenger service to compete with text and voice apps like WhatsApp and Viber. Russia’s Security Council has criticized the use of those services by state employees over concerns that U.S. spies could monitor the encrypted communications while Russian agencies can’t,,
On Nov. 10, 2016, Russia’s communications watchdog said LinkedIn would be blocked for not following the data-storage rules….. That same day, the Communications Ministry published draft legislation that would create a state-controlled body to monitor .ru domains and associated IP addresses. The proposal would also mandate that Russian internet infrastructure be owned by local companies and that cross-border communication lines be operated only by carriers subject to Russian regulation…
The biggest effect of the Kremlin’s internet campaign can be seen in the Moscow city administration, which is testing Russian-made e-mail and calendar software MyOffice Mail on 6,000 machines at City Hall. The city aims to replace Microsoft Outlook with the homegrown alternative, from Moscow-based New Cloud Technologies, on as many as 600,000 computers in schools, hospitals, and local agencies….“Money from Russian taxpayers and state-controlled companies should be spent primarily on domestic software,” Communications Minister Nikolay Nikiforov told reporters in September. “It’s a matter of jobs, of information security, and of our strategic leadership in IT.”
Excerpts from Microsoft Isn’t Feeling Any Russian Thaw, Bloomberg, Nov. 17, 2016
It was May 2014 when a small team of American airmen monitoring a Russian satellite launch saw something they had never seen before. An object the team thought was a piece of debris from the launch suddenly came to life. “The one object that we assumed was a piece of debris started to maneuver in close proximity to the (rocket) booster,” recalled Lt. Gen. David Buck …at Vandenberg Air Force Base in California. Buck… said the deliberate maneuvers the mystery object made close to the rocket’s booster were a red flag. Getting that close to another object in space is a complex feat, as objects can move as fast as 17,500 miles per hour….[W]hat the US military was witnessing was not debris at all, but instead a satellite with a dangerous capability, one that could allow it to cozy up next to another satellite and potentially destroy it….
The Russian satellite is officially known as Kosmos 2499 but it has been given a more daunting nickname: “kamikaze,” a spacecraft expressly designed to maneuver up close to another satellite to disable or destroy it. In other words, it’s a satellite that could go on the attack.Retired Gen. William Shelton, the former commander of Air Force space command, likened the satellite to a space Trojan horse. “You could have something on orbit that, for all intents and purposes, looks like a communications satellite, when in actuality, it is also a weapon,” said Shelton.
Kosmos 2499 is far from the only threat. In September 2014, just a few months after Kosmos was placed in orbit, Russia launched an additional satellite named Luch with both maneuvering and spying capabilities. “This satellite has been maneuvering through geosynchronous space … cozying up close to various communications satellites, listening to what traffic is flowing over those,” said Paul Graziani, CEO of civilian satellite tracker Analytical Graphics, Inc. (AGI).
Over the course of a year, Graziani’s team has watched as Luch parked itself next to three US commercial satellites and one European satellite. The Russians flew the satellite close enough to collect both civilian and, possibly, sensitive military information. Graziani was charged with delivering the bad news to US-owned commercial satellite company Intelsat…
“If the operators of this spacecraft so chose, they could direct it to actually hit another spacecraft,” said Graziani. Like Kosmos, Luch’s ability to maneuver has the potential to make it into a satellite killer.
Launched in 2013, the Shiyan, meaning “experiment” in Chinese, was “experimenting” shadowing the smaller satellite, according to AGI. But then something unexpected happened: The smaller satellite repeatedly disappeared and then reappeared on their screens.“We saw the approach, we saw the larger spacecraft come close to the smaller spacecraft, and then we no longer saw the smaller spacecraft,” said Graziani.
The only reasonable explanation, experts say, is that the Shiyan has a robotic arm that was repeatedly grabbing and then releasing its smaller partner. The Chinese government acknowledged the satellite’s robotic arm, saying the satellite is “mainly used in space debris observation,” according to the state-run Xinhua News Agency.
But space watchers like Graziani see a more sinister application. “You could grab and hold of a satellite and maneuver it out of its mission,” said Graziani If true, it would be a new threatening capability, allowing the Shiyan to essentially kidnap another satellite….
Lasers: “You can aim a laser at a satellite’s sensor and try to make it hard to see,” said Laura Grego, a scientist with the Union of Concerned Scientists. “Like someone shining a flashlight in your eyes.”With power dialed up high that same laser could permanently fry the satellite’s sensor. But “very expensive and important satellites should have shutters” to block this kind of threat, said Grego, who considers these types of activities more of a nuisance than a space attack.
Space drone: Moving further into the realm of science fiction, the US military has developed the first space drone, the X-37B. Bearing a striking resemblance to the space shuttle, the drone is officially a reusable spacecraft for carrying payloads into space…Its other missions are classified, but the drone’s maneuverability, payload space and ability to stay in orbit for hundreds of days have space watchers and countries like Russia and China wondering whether the X-37B would one day be used as a space fighter jet,
Excerpts from Jim Sciutto and Jennifer Rizzo War in space: Kamikazes, kidnapper satellites and lasers, CNN, Nov. 29, 2016
On November 25, 2016, WikiLeaks released the Yemen Files.The Yemen Files are a collection of more than 500 documents from the United States embassy in Sana’a, Yemen. Comprising more than 200 emails and 300 PDFs, the collection details official documents and correspondence pertaining to the Office for Military Cooperation (OMC) located at the US embassy. The collection spans the period from 2009 until just before the war in Yemen broke out in earnest during March 2015.
Julian Assange said: “The war in Yemen has produced 3.15 million internally displaced persons. Although the United States… is deeply involved in the conduct of the war itself reportage on the war in English is conspicuously rare.”
Yemen is of significant strategic interest as Yemen controls a narrow choke-point to the Red Sea and the Suez Canal through which 11% of the world’s petroleum passes each day. In addition, Yemen borders Saudi Arabia (to the north) and Oman (to the east) and has access to the Arabian Sea, through which another 20% of the world’s petroleum passes from the Strait of Hormuz (including the oil of Saudi Arabia and Iran). Saudi Arabia seeks to control a port in Yemen to avoid the potential constriction of its oil shipments byIran along the Strait of Hormuz or by countries which can control its other oil shipment path along the Red Sea.The Yemen Files offer documentary evidence of the US arming, training and funding of Yemeni forces in the years building up to the war. The documents reveal, among other things, procurement of many different weapon types: aircraft, vessels, vehicles, proposals for maritime border security control and Yemeni procurement of US biometric systems.
See also Yemen File
National security critically depends on space, and the Defense Advanced Research Projects Agency (DARPA) is focused today on creating the capabilities needed to help make that environment a real-time operational domain, DARPA Director Dr. Arati Prabhakar…
“The questions we ask ourselves at DARPA about the space domain … is what would it take to make the space domain robust for everything that we need militarily and for intelligence, and what would it take to make space a real-time operational domain, which it’s not at all today,” the director said, noting that many other nation-states now are active in orbit and space is a domain where conflict is becoming a real possibility.
Through a national security lens, she added, nothing needed from an intelligence or military perspective can be done effectively without access to space. Something as simple as navigation completely depends on GPS in nearly every part of the world and in every operating regime.
In an era of declining budgets and adversaries’ evolving capabilities, quick, affordable and routine access to space is increasingly critical for national and economic security. Today’s satellite launch systems require scheduling years in advance for a limited inventory of available slots and launches often cost hundreds of millions of dollars each. The Defense Advanced Research Projects Agency created its Experimental Spaceplane, or XS-1, program to help overcome these challenges and reduce the time to get capabilities to space. DARPA artist-concept graphics “Because of the demands on launch, from the day you know you have to put an asset on orbit to the time you can plan on a launch today is still unacceptably long,” Prabhakar said.
Commercial capabilities will help, she added, “but if in a time of war we imagine if we could go to space not in a month or next week but tomorrow, think about how that would completely change the calculus for an adversary that’s thinking about [using an antisatellite] weapon to take out one of our satellites
”With that ambition in mind, DARPA is now starting Phase 2 of its Experimental Spaceplane, or XS-1.“It’s a reusable first stage that’s designed to be able to put 3,000 or 5,000 pounds into low earth orbit … at a very low cost point — a few million dollars — but very significantly the objective on the DARPA program is by the end of the program to fly that spacecraft 10 times in 10 days,” Prabhakar said, “something that’s inconceivable with any of the spacecraft we have today.”
A second piece of the puzzle is what can be done in orbit, she added, referring to low earth orbit, or LEO, an orbit around Earth whose altitude is between 99 and 1,200 miles.
“We’re doing some amazing work with geo[synchronous]-robotics and rethinking [geostationary Earth orbit]-architectures once you have an asset that would allow you to extend the life or do inspection or simple repairs at GEO, which is something you can’t do today. GEO [geostationary orbit]is a stable region of space 22,370 miles from Earth. And because GEO is a stable environment for machines — but hostile for people because of high radiation levels — DARPA thinks the key technology there is space robotics. DARPA’s Phoenix program seeks to enable GEO robotics servicing and asset life extension while developing new satellite architectures to reduce the cost of space-based systems.
The program’s goal is to develop and demonstrate technologies that make it possible to inspect and robotically service cooperative space systems in GEO and to validate new satellite assembly architectures. Phoenix has validated the concept that new satellites could be built on orbit by physically aggregating “satlets” in space, according to DARPA.
Satlets are small independent modules that can attach together to create a new low-cost, modular satellite architecture, DARPA says. Satlets incorporate essential satellite functionality — power supplies, movement controls, sensors and others — and share data, power and thermal management capabilities. DARPA now is working to validate the technical concept of satlets in LEO [Low earth orbit an orbit around Earth whose altitude is between 99 and 1,200 miles.]
Excerpts from Cheryl Pellerin Director: DARPA Space Projects Critical to Shifting Trajectories , US DOD News, Nov. 22, 2016