Category Archives: War

The New Opium War: How the World Got Addicted to China

 A fundamental axiom of economics is that when two individuals or countries trade, both are better off. In the decades after World War II, the U.S. was the world’s largest exporter and economy and as it grew, it imported more, helping its partners. As they grew, they bought more of what the U.S. made. Expanding trade helped everyone specialize, leading to more competition, innovation and choice, and lower costs.

China is now the world’s second-largest economy and its largest exporter, but its philosophy is quite different. It has never believed in balanced trade nor comparative advantage. Even as it imported critical technology from the West, its long-term goal was always self-sufficiency. In 2020, Chinese leader Xi Jinping codified this approach as “dual circulation.” This would, he said, “tighten the international industrial chain’s dependence” on China while ensuring China’s production was “independent” and “self-sustaining.”

And as China expands into high-end manufacturing such as aircraft and semiconductors, Xi has decreed it must not relinquish low-end production such as toys and clothes. Beijing has discouraged Chinese companies that invest abroad from transferring key know-how, such as in the production of iPhones and batteries. Xi has rejected fiscal reforms that would tilt its economy away from investment, exports and saving and toward household consumption and imports.

Excerpt from Greg Ip, World Pays a Price for China’s Growth, WSJ, Dec. 6, 2025

The Silent Spying Device in Your Pocket: Who is Afraid of Pegasus?

NSO Group, the Israeli company behind Pegasus spyware, says a group of investors led by Hollywood producer Robert Simonds has acquired a controlling stake in the firm, which has named a former Trump official to lead an effort to restore its battered reputation. The company, which has faced lawsuits and U.S. government sanctions since revelations that its technology was used to spy on political dissidents, human-rights advocates, journalists and American officials, declined to disclose the purchase price.

NSO’s new executive chairman, David Friedman, a former U.S. ambassador to Israel and onetime bankruptcy lawyer for President Trump, said he wants to use his ties to the Trump administration to help rebuild the company’s spyware business in the U.S…NSO’s flagship product, Pegasus, has used WhatsApp to infiltrate phones without the target having to do or tap on anything. The spyware has also been sent to phones via links in messages, according to security researchers. Pegasus can turn a smartphone into a silent spying device by gaining access to its files, messages, microphone and camera, they say.

In 2021, the Biden administration placed NSO on an export-prohibition list that restricted the firm from obtaining some types of technology from the U.S. In 2023, President Biden signed an executive order banning government agencies and departments from using commercial spyware that “poses risks to national security or has been misused by foreign actors to enable human rights abuses around the world.” Unless Biden’s executive order is rescinded, it is unlikely U.S. government agencies would do business with NSO.

Intelligence agencies such as the U.S. National Security Agency and the U.K.’s Government Communications Headquarters routinely use hacking tools. NSO often sells such cyber capabilities to countries that don’t have their own. Friedman said his pitch to the U.S. government is that NSO’s products will make America safer. NSO says its products can be used by government agencies to fight terrorism and crime by allowing them access to encrypted messaging systems such as WhatsApp….

In 2019, WhatsApp’s parent company, now called Meta, sued NSO over what it alleged was a breach of its servers to install NSO’s malware on target devices. In July 2025, the six-year trial came to an end, with a federal jury in California ordering NSO to pay Meta $168 million in damages. In October 2025, the U.S. District Court for the Northern District of California reduced the fine NSO was ordered to pay Meta down to $4 million. But in the same ruling, the judge ordered NSO to stop targeting WhatsApp, in a move that the company said during its defense could put it out of business. NSO is appealing the decision against targeting WhatsApp, and is filing for a stay.

Excerpt from Dov Lieber, Israeli Spyware Maker NSO Gets New Owners, Leadership and Seeks to Mend Reputation, WSJ, Nov. 9, 2025

The Underground War

Israeli troops are mapping out the tunnels of eastern Rafah [December 2025], where the local Hamas brigade is trapped, and using massive drills to dig into the underground system and destroy it with explosives, according to Israeli military statements. Israel estimates there were around 100 to 200 fighters in the tunnels when the cease-fire began in October 2025…In some areas, Israel is flooding tunnels with water to push out the trapped fighters…

Rafah, where Hamas first began digging tunnels around two decades ago, has a particularly complicated underground system. Despite having full control above ground in Rafah, Israel’s military is still struggling to fully map out the underground network where the Hamas fighters are hiding…

Excerpt from Summer Said, srael Closes In on Hamas Fighters Trapped in Tunnels, Testing Cease-Fire, WSJ, Dec. 7, 2025

How Does it Feel to Beg China? Netherlands Knows

Dutch chipmaker Nexperia has publicly called on its China unit to help restore supply chain operations, warning in an open letter published on its website  on November 28, 2025 that customers across industries are reporting “imminent production outages.” Nexperia’s Dutch unit said that is open letter followed “repeated attempts to establish direct communication through conventional channels” but did not have “any meaningful response.” The letter marks the latest twist in a long-running saga that has threatened global automotive supply chains and stoked a bitter battle between Amsterdam and Beijing over technology transfer.

In a statement, Wingtech Technology, Nexperia’s Chinese parent stated that Nexperia’s true intent is to buy time ” to construct a ‘de-China-ized’ supply chain and permanently strip Wingtech of its shareholder rights.”

The situation began in September 2025, when the Dutch government invoked a Cold War-era law to effectively take control of Nexperia. The highly unusual move was reportedly made after the U.S. raised security concerns.

Beijing responded by moving to block its products from leaving China, which, in turn, raised the alarm among global automakers as they faced shortages of the chipmaker’s components.

In an apparent reprieve on November 19, 2025, however, the Dutch government said it had suspended its state intervention at Nexperia following talks with Chinese authorities…But while the measures to seize the Dutch Nexperia subsidiary have been lifted, the restoration of the corporate structure and relation with parent company Wingtech has yet to be accomplished.

Excerpt from Sam Meredith, What’s going on at Nexperia? China’s Wingtech escalates war of words with Dutch chipmaker, CNBC, Nov. 28, 2028

Back to 2030: Nuclear Race is Hot Again

The new nuclear race has begun. But unlike during the Cold War, the U.S. must prepare for two peer rivals rather than one—at a time when it has lost its clear industrial and economic edge. China, which long possessed just a small nuclear force, is catching up fast, while Russia is developing a variety of new-generation systems aimed at American cities…Russian President Vladimir Putin has already used nuclear saber-rattling to throttle American support for Ukraine. He has deployed nuclear weapons to Belarus and, in 2025, tested a nuclear-powered missile and a nuclear-powered submarine drone that he claims are impervious to American defenses.

While Russia and the U.S. are still abiding by some arms-controls limit…China, unconstrained by any commitments, is quietly but rapidly leaping ahead. According to American estimates, Beijing will reach rough parity with the U.S. in deployed nuclear warheads by the mid-2030s.

Chinese leader Xi Jinping for the first time showcased China’s nuclear triad—its land, sea and air-launched ballistic nuclear missiles—at a Beijing parade honoring the 80th anniversary of victory over Japan in September 2025. Putin, sitting to his right atop the Gate of Heavenly Peace, took note. So did North Korea’s Kim Jong Un, sitting to his left.

Excerpt from Yaroslav Trofimov, The Nuclear-Arms Race Is Now a Three-Way Contest, WSJ, Nov. 16, 2025

Who is Afraid of China? the United States Army

China plans to ease the flow of rare earths and other restricted materials to the U.S. by designing a system that will exclude companies with ties to the U.S. military while fast-tracking export approvals for other firms…The “validated end-user” system, or VEU, would enable Chinese leader Xi Jinping to follow through on a pledge to President Trump to facilitate the export of such materials while ensuring that they don’t end up with U.S. military suppliers, a core concern for China…  The VEU mechanism that Beijing is considering is modeled on U.S. laws and procedures, as is much of Beijing’s export-control architecture.

Under the American version of the VEU system, which has been active since 2007, certain Chinese companies are cleared to buy sensitive goods under a general authorization—essentially a simplified export-approval mechanism—instead of needing individual licenses for each purchase. This makes it easier to import controlled goods such as chemicals or chip-making equipment, but requires companies to put up with U.S. government inspections of their facilities, among other steps, to verify compliance with the program…

Companies in the U.S. and Europe have complained of reduced access to rare-earth magnets from China. Though China has periodically agreed to relax magnet restrictions, Chinese rare-earth magnet exports to the U.S. declined 29% in September 2025 from the month before

Excerpt from Jon Emont et al, China Hatches Plan to Keep U.S. Military From Getting Its Rare-Earth Magnets, WSJ, Nov. 10, 20215

Can the United States Drown in Disease? China has the Answer

While drugs sold in U.S. pharmacies or over the counter typically don’t say “made in China,” the country often supplies active pharmaceutical ingredients in the drugs or precursor chemicals used to make those active ingredients. Most of the acetaminophen and ibuprofen imported into the U.S. comes from China. Those are the active ingredients in Tylenol and Advil, respectively. China is also a significant producer of antibiotic ingredients. The U.S. imports many branded drugs from Europe, while for generics, it relies heavily on India. Still, a significant amount of the active ingredients used in India-made generics originates in China.

Perhaps aware of the sensitivity of turning medicine into a political tool, China hasn’t often threatened to cut off drug supplies to the U.S. Still, it signaled awareness of its leverage early in the Covid-19 pandemic, when the world faced shortages of masks and personal protection equipment owing to supply disruptions from China. In March 2020, the official Xinhua News Agency said that if China were to restrict exports of medical goods, the “U.S. will be plunged into the vast ocean of coronavirus.”

Excerpt from Yoko Kubota, How China’s Chokehold on Drugs, Chips and More Threatens the U.S., WSJ, Nov.  4, 2025

Why and How Dubai Conquered Sudan

U.S. intelligence agencies say the United Arab Emirates sent increasing supplies of weapons including sophisticated Chinese drones to a major Sudanese militia in 2025 bolstering a group that has been accused of genocide and pouring fuel on a conflict that has created one of the world’s worst humanitarian crises…It is the latest example of how the wealthy Gulf state is quietly projecting power to influence the course of conflicts and assert its interests in a region dominated by much larger power brokers, from Saudi Arabia to Turkey and Iran.

A key U.S. partner, the U.A.E. has shipped arms into Sudan to shore up the Rapid Support Forces (RSF) of Sudan after a string of setbacks that culminated with the militia losing control of the capital, Khartoum, in March 2025. Rearmed, the militia survived that potential turning point in the war and launched a renewed offensive against the government that triggered some of the worst destruction of the two-year war. The RSF’s campaign included an expanded assault on North Darfur state, where the militia tightened an 18-month siege of the regional capital of El Fasher, cutting off tens of thousands of people from adequate food and medicine…“The war would be over if not for the U.A.E.,” said Cameron Hudson, a former chief of staff to successive U.S. presidential special envoys for Sudan. “The only thing that is keeping them in this war is the overwhelming amount of military support that they’re receiving from the U.A.E.,” he said of the RSF…The U.A.E. is betting on the RSF to help protect Emirati interests in Sudan. The country is strategically located on the Red Sea, where the Sudanese government canceled a $6 billion Emirati port deal in 2024, and has vast resources of gold, much of which has historically been exported to Dubai. The U.A.E. has invested billions of dollars in the country.

Excerpt from Jared Malsin at al., How U.A.E. Arms Bolstered a Sudanese Militia Accused of Genocide, WSJ, Oct. 28, 2025

Why Arab Men Rape Black Women in Darfur

Sudan’s civil war is taking a jarring turn in Darfur, where an Arab-led militia is now using state-of-the-art drones and execution squads to dominate the region’s Black population. Rights researchers already are warning that the killings have the potential to surpass the genocide that played out in Rwanda just over 30 years ago. The group behind the violence, the Rapid Support Forces (RSF), led by Lt. Gen. Mohamed Hamdan Dagalo, has previously been accused by the U.S. of pursuing a genocide of Darfur’s Black population. Two decades ago, its predecessor was involved in the killing of more than 200,000 people in Darfur.

This time, the killings are the work of a closely-drilled and well-armed rebel force that already has established a parallel government to run Darfur, an expanse of western Sudan roughly the size of Spain. RSF fighters are armed with bomb-carrying Wing Loong II and FeiHong-95 drones, made in China, and supplied by the United Arab Emirates to help expand its own interests in the region.

The RSF have been conducting door-to-door searches, picking out non-Arab men and boys before executing them… Witnesses and residents say militia members swept through the city, raping Black women, detaining aid workers and forcing the last remaining residents to leave… Black women with long hair are systematically separated and raped, according to interviews with multiple aid workers and victims.

According to Eric Reeves, a fellow with the Nairobi-based Rift Valley Institute: “The fierce ethnic animus of the RSF toward non-Arab civilians is equal to that of the Hutus toward the Tutsis in Rwanda. The obscene violence is clearly comparable.”

Excerpt from Nicholas Bariyo, Sudan Militia, Armed With Drones, Hunts Down Black Population of Darfur, WSJ, Oct. 31, 2025

While United States Hibernated, China Salivated

When China tightened restrictions on rare-earth exports in October 2025, stunning the United States, it was the latest reminder of Beijing’s control over an industry vital to the world economy. China’s dominance was decades in the making. Since the 1990s, China has used aggressive tactics to build up and maintain its lock over rare-earth minerals, which are essential to making magnets needed for cars, wind turbines, jet fighters and other products. Beijing provided financial support to the country’s leading companies, encouraged them to snap up rare-earth assets abroad, and passed laws preventing foreign companies from buying rare-earth mines in China. It eventually consolidated its domestic industry from hundreds of businesses into a few giant players, giving it further leverage over prices…

In 1995, Chinese state-linked companies received U.S. government approval to buy the rare-earth materials and magnet business started by General Motors, called Magnequench. In the following years, the Chinese ownership shut down all its rare-earth plants in the U.S. and shipped the equipment to China. Top American engineers were offered opportunities to go to China and set up new plants there.  “There were some colleagues that were dead set against it, saying they would never help China learn our technology,” said one magnet expert who ultimately agreed to go to China. “When I arrived, I could not believe what I was seeing. The number of new factories being built, and the rate at which they were being built, was mind-blowing,” he said….  By the mid-2000s, the U.S. rare-earth industry had been all but wiped out. Mountain Pass, America’s major rare-earth mine, had been shut down, as had virtually all American facilities that processed rare earths and turned them into magnets. China produced around 97% of the world’s rare earths, giving it what was effectively a global monopoly…

By 2021, the U.S. government was growing more worried about China’s ability to weaponize rare earths, causing prices to jump. Washington began offering large-scale funding for new rare-earth plants, including a refinery in Texas to be built by Lynas, an Australian rare-earth company. But in 2021, the Association of China Rare Earth Industry issued a warning: to China’s leadership If Beijing wanted to maintain “China’s absolute dominant position,” the country needed to relax state production quotas. Beijing responded in 2022 by pushing up output by 25%, the most in years, with another large increase the following year. Prices tanked, hitting the bottom lines of Western producers and leading some to unload assets…Beijing also introduced new measures preventing the transfer of its rare-earth processing technology abroad.

Excerpt from Jon Emont, How China Took Over the World’s Rare-Earths Industry, WSJ. Oct. 19, 2025

Overlords of the Internet: Botnet Warfare

U.S. Federal authorities disrupted in August 2025 a network of hacked devices used by criminals in some of the largest online attacks yet seen… Law-enforcement agencies and technology companies are waging a war against increasingly powerful networks of hacked devices, called botnets, that can knock websites offline for a fee. They are used for extortion and by disreputable companies to knock rivals offline… These botnets are leveraging new types of internet-connected devices with faster processors and more network bandwidth, offering them immense power. The criminals controlling the botnets now have the capabilities to move beyond website takedowns to target internet connectivity and disrupt very large swaths of the internet.“Before the concern was websites; now the concern is countries,” said Craig Labovitz, head of technology with Nokia’s Deepfield division. 

Apprehending botnet criminals in August 2025 appeared to have an unwanted consequence: freeing up as many as 95,000 devices to be taken over by new botnet overlords. That led to a free-for-all to take over the machines “as fast as possible,” said Damian Menscher, a Google engineer. The operators of a rival botnet, called Aisuru, seized control of more than one-fourth of them and immediately started launching attacks that are “breaking records,” he said.

On Sept. 1, 2025 the network services company Cloudflare said it had measured an attack that clogged up computer networks with 11.5 trillion bits of junk information per second. That is enough to consume the download bandwidth of more than 50,000 consumer internet connections. Cloudflare declared this attack, known as a distributed denial of service, or DDoS, a “world record” in terms of intensity. Some analysts see it almost as an advertisement of the botnet’s capabilities…

Botnets such as Aisuru are made up of a range of internet-connected devices—routers or security cameras, for example—rather than PCs, and often these machines can only join one botnet at a time. Their attacks can typically be fended off by the largest cloud-computing providers. One massive network that Google disrupted in 2025 had mushroomed from at least 74,000 Android devices in 2023 to more than 10 million devices in two years. That made it the “largest known botnet of internet-connected TV devices,” according to a July 2025 Google court filing.

Excerpts from Robert McMillan, The Feds Destroyed an Internet Weapon, but Criminals Picked Up the Pieces, WSJ, Sept. 15, 2025

Which Tech Companies Work for the Military? All

Companies including Nokia, Dell, and Oracle are eager to apply decades of experience in civilian technology to the rapidly evolving battlefield. Drones, bodycams and digital sensors now stream real-time intelligence in volumes no human can digest. Military headquarters are crunching through that using artificial intelligence and pumping back to troops situational updates, tactical guidance and battle plans, constantly updated on computer screens and hand-held devices.  “We understand that the future weapon is data,” said Giorgi Tskhakaia, an adviser to Ukraine’s minister of digital transformation 

The first step is connectivity….Nokia is packaging 5G technology for ultra-secure use on battlefields and in national-security applications. It has developed backpacks with small 5G nodes and vehicle-based systems that can handle up to 1,000 users for a sort of tactical communications bubble. In 2025, it announced partnerships with military-equipment giants Lockheed Martin and Rheinmetall to integrate 5G communications into their systems.

Ericsson, the West’s only other maker of 5G networks and a producer of military radios going back to World War II, is also pushing into digital defense applications.

NATO is now working to adopt 5G as a military-communications standard across its 32 members. Alliance experts say the volume of military data is so great that 5G is best for transmission because the standard has at least 10 times the data capacity of earlier systems. It is also much more resilient against jamming

The second step is the extraction of data….Ukraine has spent three years developing AI systems to churn through all it collects… The Pentagon in 2017 launched a significant effort to adopt AI, Project Maven, tapping machine learning to digest mountains of data. Google’s role in the work sparked employee protests at the time…

Oracle, like many of its rivals, is no stranger to working with governments and militaries. The company began in 1977 out of a Central Intelligence Agency program—Project Oracle. But for decades it focused on corporate customers. Now, it and other cloud providers including Google, Amazon.com and IBM are applying to government and national-security work many lessons from their fierce commercial competition to move and process data fastest.

The final step in exploiting battlefield data is delivering it to fighters via gear that can handle combat conditions. Screens are proliferating on the battlefield, just as they did in offices and homes several decades ago, but warfare puts demands on equipment unlike any other environment…One Dell laptop is built to Pentagon standards for resistance to shocks, dust, sand, water and “explosive atmosphere,” meaning it won’t ignite flammable vapor. It can handle temperatures between minus 20 degrees and 145 degrees Fahrenheit.

Excerpt from Daniel Michaels, That 1990s Tech Brand? Its New Gig Is in Battlefield Data, WSJ, Sept. 9, 2025

Big Tech and Military: Microsoft – Israel Force

Microsoft terminated in September 2025 the Israeli military’s access to technology it used to operate a powerful surveillance system that collected millions of Palestinian civilian phone calls made each day in Gaza and the West Bank, according to Guardian. Microsoft told Israeli officials that Unit 8200, the military’s elite spy agency, had violated the company’s terms of service by storing the vast trove of surveillance data in its Azure cloud platform.

Equipped with Azure’s near-limitless storage capacity and computing power, Unit 8200 had built an indiscriminate new system allowing its intelligence officers to collect, play back and analyze the content of cellular calls of an entire population.

The project was so expansive that, according to sources from Unit 8200 – which is equivalent in its remit to the US National Security Agency – a mantra emerged internally that captured its scale and ambition: “A million calls an hour.

The enormous repository of intercepted calls – which amounted to as much as 8,000 terabytes of data – was held in a Microsoft data center in the Netherlands. Within days of the Guardian publishing, Unit 8200 appears to have swiftly moved the surveillance data out of the country.

Excerpt from Harry Davies and Yuval Abraham, Microsoft blocks Israel’s use of its technology in mass surveillance of Palestinians, Guardian, Sept. 25, 2025

The New Underworld Order: Invincible Cartels

Nemesio “Mencho” Oseguera spent decades building his Jalisco New Generation Cartel into a transnational criminal organization fierce enough to forge a new underworld order in Mexico, displacing the Sinaloa cartel, torn by warring factions, as the world’s biggest drug pusher. The Sinaloans, Mexico’s top fentanyl traffickers, got caught in the crosshairs of the Trump administration, which promised to eradicate the synthetic opioid. The crackdown has left an open field for Jalisco and its lucrative cocaine trade, elevating Oseguera to No. 1.

The Jalisco cartel transports the cocaine by the ton from Colombia to Ecuador and then north to Mexico’s Pacific coast via speedboats and so-called narco subs…The U.S. has a $15 million bounty on Oseguera, but he rarely leaves his mountain compound, according to authorities. Few photos of him circulate. The cadre of men protecting Oseguera, known as the Special Force of the High Command, carry RPG 7 heat-seeking, shoulder-fired rocket launchers capable of piercing a tank, people familiar with cartel operations said. Visitors to the drug lord’s stronghold are hooded before they embark on the six-hour car trip through terrain sown with land mines, those people said. Locations of the pressure-activated explosives are known only by members of Oseguera’s inner circle.

The Jalisco cartel, which controls ports on Mexico’s Pacific coast, now uses routes and tunnels into the U.S. that are controlled by the sons of imprisoned drug kingpin Joaquín “El Chapo” Guzmán….
 
The cartel acts as a parallel government in the southwestern state of Jalisco and other parts of Mexico, taxing such goods as tortillas, chicken, cigarettes and beer, security experts said. It controls construction companies that build roads, schools and sewers for the municipal governments under cartel control.  A booming black market for fuel is another cash cow. Gasoline and diesel stolen from Mexican refineries and pipelines—or smuggled into Mexico from the U.S. without paying taxes—is sold at below market prices to small and large businesses.. The head of the Jalisco cartel’s fuel division is nicknamed “Tank” for his prowess at stealing and storing millions of gallons of fuel. 

Excerpst from Steve Fisher et al., America Loves Cocaine Again—Mexico’s New Drug King Cashes In, WSJ, Sept. 16, 2025

Is Violence Necessary for the Protection of Environment?

Six million antelope swarm across an area the size of Illinois,in Sough Sudan, a mass movement of mammals…African Parks, the Johannesburg-based conservation group that manages natural areas on behalf of South Sudan’s government, allowed The Wall Street Journal access to the 58,000-square-mile wilderness on the eastern bank of the White Nile….Although scientists and, of course, locals have known about the migration for years, only recently have researchers understood its staggering dimensions. In 2023, African Parks conducted an aerial survey revealing the movement included some 5.1 million white-eared kob, which generally move in a U shape in and around Boma National Park, sometimes crossing into Ethiopia’s Gambella National Park…

The interethnic violence that plagues South Sudan has, to a degree, helped protect the animal migration…South Sudanese rebels fought for decades to break away from Sudan. The South, mostly animist and Christian, finally won independence from the largely Muslim North in 2011, but quickly descended into civil war along ethnic lines. The war ended in 2020, but fighting in 2025 suggests stability remains a distant hope.

Among the region’s ethnic groups, the heavily armed Murle people in and around Boma National Park are known for stealing cattle and children from the Dinka and Anuak. Fighting is a way of life for Murle men, who divide themselves into age sets. Younger men gain status by taking on the men above them, with sticks and AK-47s, sometimes with lethal effect. Their torsos sometimes bear decorative scars resembling assault rifles…The Murle are so intimidating that other ethnic groups keep their distance to the extent possible. That has created a sort of no-man’s-land both in the parks and the places in between. “You’ve got this massive space that has allowed the migration to flourish,” says John Vogel, manager of Badingilo park.

With war, however, have come guns, and the temptation to poach is strong. Increasingly, hunters armed with military-grade weapons have been mowing down entire herds of antelope and just taking what they can carry to market on motorcycles. In a single month this year, African Parks counted 14,000 antelope carcasses passing through the town of Bor, where each animal sells for about $50, a vast amount to a poor rural family…

Excerpt from Michael M. Phillips, Researchers Track World’s Biggest Animal Migration, WSJ, Sept. 6, 2025

How China Plans to Destroy the U.S. AI Industry

China’s restrictions on rare-earth materials announced on October 9, 2025 would mark a nearly unprecedented export control*** that stands to disrupt the global economy, giving Beijing more leverage in trade negotiations and ratcheting up pressure on the Trump administration to respond.

The rule, put out by China’s Commerce Ministry, is viewed as an escalation in the U.S.-China trade fight because it threatens the supply chain for semiconductors. Chips are the lifeblood of the economy, powering phones, computers and data centers needed to train artificial-intelligence models. The rule also would affect cars, solar panels and the equipment for making chips and other products, limiting the ability of other countries to support their own industries. China produces roughly 90% of the world’s rare-earth materials.

Global companies that sell goods with certain rare-earth materials sourced from China accounting for 0.1% or more of the product’s value would need permission from Beijing, under the new rule. Tech companies will probably find it extremely difficult to show that their chips, the equipment needed to make them and other components fall below the 0.1% threshold, industry experts said. The rules could cause a U.S. recession if implemented aggressively because of how important AI capital spending is to the economy… “It’s an economic equivalent of nuclear war—an intent to destroy the American AI industry,” said Dmitri Alperovitch, co-founder of the Silverado Policy Accelerator think tank.

Excerpt from Amrith Ramkumar,et al., China’s Rare-Earth Escalation Threatens Trade Talks—and the Global Economy, WSJ, Oct. 9, 2025

***The new export controls mark the first time China has applied the foreign direct product rule (FDPR)—a mechanism introduced in 1959 by the United States and long used United States to restrict semiconductor exports to China. The FDPR enables the United States to regulate the sale of foreign-made products if they incorporate U.S. technology, software, or equipment, even when produced by non-U.S. companies abroad. In effect, if U.S. technology appears anywhere in the supply chain, the United States can assert jurisdiction. See CSIS

Blackmail and Espionage: rogue AI

Today I am reading on how AI models can blackmail and spy.

See How LLMs could be insider threats

DECEPTION IN LLMS: SELF-PRESERVATION AND AUTONOMOUS GOALS IN LARGE LANGUAGE MODELS

Chilling…

While United States Sleeping, China Made Ships

A $16 billion merger of two state-controlled shipbuilders in China was set for completion the week of August 11, 2025 creating the world’s biggest shipbuilder while the U.S. searches for a path back into the business.  American shipbuilders are playing catch-up after decades of maritime-industry decline…but Trump’s threat to impose higher fees on ships made in China is giving South Korean and Japanese rivals an opening to win back market share.

The Chinese champion is called China State Shipbuilding, or CSSC. In August 2025, it is scheduled to absorb its merger partner, China Shipbuilding Industry, and take the sole listing on the Shanghai Stock Exchange… Beijing is currently looking to consolidate state-led companies in sensitive industries, particularly those connected with the military. CSSC’s main business is commercial, but it is also an important contractor for the Chinese navy. China Shipbuilding Industry designed and built China’s first homegrown aircraft carrier, the Shandong.

Beijing set its sights on dominating the shipbuilding industry decades ago, and now Chinese shipbuilders make up more than half of the global market. China-built ships accounted for about 55% of global tonnage in 2024, compared with less than 0.05% for the U.S. China possesses 232 times the shipbuilding capacity of the U.S., according to the U.S. Navy…


Meanwhile, smaller rivals in Japan are looking to reclaim market share after decades of being pushed into a corner by lower-cost Chinese and South Korean rivals. A proposal in June in 2025 from Japan’s ruling Liberal Democratic Party calls for extensive subsidies for local shipyards to protect national security, including a $6.7 billion public-private fund. “If we fail to act now, Japan risks losing its shipbuilding industry entirely, as Europe and the United States did,” the party said.

Excerpt from China Creates World’s No. 1 Shipbuilder, Driven by Rivalry With U.S., WSJ, Aug. 11, 2025

Secrecy in Space

A Pentagon spaceplane called X-37B zoomed into orbit this week for its eighth mission. When it will come back is a secret. The uncrewed vehicle can spend months or years in space before it re-enters the atmosphere.. That combination of flexibility and endurance has made it a favorite tool for military officials looking to quickly deploy new technologies on the final frontier. A SpaceX rocket launched X-37B on August 21, 2025 from Florida’s Kennedy Space Center. Government and commercial engineers have spent years experimenting with lasers that allow satellites to share large amounts of data in space. The Pentagon is also testing tools like the inertial sensor, which could help improve navigation in situations where Global Positioning System signals aren’t available.

The spacecraft has spent the last five months on Earth after a 434-day mission that included tests of orbital maneuvers known as “aerobraking.” The move helps the vehicle use the drag from the planet’s atmosphere to change its orbit without using much fuel.  Military officials haven’t disclosed many details about the payloads that X-37B carries, but past missions included testing different materials in orbit and an experiment that transmitted solar energy to the ground. Its fifth flight released three small satellites that government officials didn’t acknowledge until they had fallen back to Earth. There’s a global strategic interest in saying what you’re putting in space,” said Jonathan McDowell, a researcher at the Harvard-Smithsonian Center for Astrophysics. If the U.S. hides its satellites, “then the Chinese are going to start doing it too, and that’s not in our interest.”

China now fields more than 1,000 satellites and has developed a range of radio jammers, antisatellite missiles and other weapons capable of targeting Pentagon assets, according to a U.S. Air Force document released in May 2025. It also operates a competing spaceplane, called Shenlong, that has flown several missions.]

Excerpt from Drew FitzGerald, The Pentagon’s Mysterious X-37B Space Plane Embarks on New Mission, WSJ, Aug. 22, 205

The End of Taiwan? The End of U.S. and Europe Combined

Prosecutors in Taiwan indicted  in August 2025 three people in a case about sensitive chip technology, alleging they stole information from Taiwan Semiconductor Manufacturing (TSMC) to help one of TSMC’s top equipment suppliers, Tokyo Electron, win more orders…Taiwanese officials say the theft of trade secrets has grown over the past decade and point most of the blame at China. Over the past couple of years, Taiwan’s investigation bureau has probed more than 120 cases involving trade-secret theft. “If Taiwan’s technology hub falls or its technologies are lost, the impact will extend beyond Taiwan to the U.S., Europe and the rest of the world,” Sun Chen-yi, deputy director general of the investigation bureau at Taiwan’s Ministry of Justice, said in an interview before his retirement in July 2025.

Excerpt from Yang Jie et al., Three Accused of Stealing TSMC Chip Secrets to Aid Japanese Supplier, WSJ, Aug. 28, 2025

Paranoia: What Happens When the Enemy Can See You Naked

During the 2025 Israel/U.S. war against Iran, Israeli authorities, and a pro-Israeli hacking group called Predatory Sparrow, targeted financial organizations that Iranians use to move money and sidestep the U.S.-led economic blockade…Predatory Sparrow…crippled Iran’s state-owned Bank Sepah, which services Iran’s armed forces and helps them pay suppliers abroad, knocking out its online banking services and cash machines…The group also breached Nobitex, Iran’s largest cryptocurrency exchange, popular with locals for transferring money overseas. The hackers extracted about $100 million in funds and forced the platform to shut down, according to the exchange.

Iran’s government pulled the plug on much of the country’s online activities to prevent further attacks… Non-Iranian websites were blocked. Citizens were warned against using foreign phones or messaging platforms that it claimed could collect audio and location data for Israeli spies. Government officials were banned from using laptops and smartwatches.

Paranoia swept through the Iranian population as the attacks, both physical and cyber, mounted. “It’s better to cut [the internet] off. Israel can see everything,” said Mohammad Ghorbaniyan, a Tehran-based money changer whom the U.S. sanctioned several years ago for allegedly aiding Iranian hackers…Predatory Sparrow has been wreaking havoc on Iran since at least 2021. In earlier hacks, the group disabled gas-station payment systems across the country and triggered a fire at an Iranian steel plant. 

For their operation against Nobitex, the hackers managed to obtain the keys for the exchange’s cryptocurrency wallets, which were held by key personnel within the company…Predatory Sparrow then “burned” the stolen $100 million by sending the tokens to other digital wallets the group itself couldn’t access. These wallets’ addresses, which are made up of long strings of numbers and letters, contained profane phrases like “F—IRGCterrorists.”

Excerpt from Angus Berwick, How Israel-Aligned Hackers Hobbled Iran’s Financial System, WSJ, June 29, 2025

Climate Change Can Wait: China’s Greed for Oil

China’s thirst for oil drove global demand for decades…Chinese officials have long worried that the U.S. and its allies could hamstring the nation’s economy by choking off its supply of foreign oil. So China has poured hundreds of billions of dollars into weaning itself off the imported stuff by reviving domestic production and swiftly building the world’s leading electric-vehicle industry. “The energy rice bowl must be held in our own hands,” Chinese leader Xi Jinping has said.

In a remote corner of China. the Tarim Basin, called the “sea of death” for its harsh conditions, oil workers are trying to coax more crude out of the ground by drilling holes as deep as Mt. Everest is high. State-owned PetroChina reported $38 billion of capital expenditures in 2024, nearly as much as Exxon Mobil’s and Chevron’s combined. China’s desire for energy independence dates all the way back to former leader Mao Zedong, who once dispatched tens of thousands of workers to search for oil in China’s northeast to ensure China wouldn’t be dependent on imports…

In July 2018, Xi personally ordered state-owned companies to revive domestic oil production to safeguard national security. Three state-owned oil majors invested an additional $10 billion the following year in exploration and production. They zeroed in on offshore areas such as the South China Sea and the Bohai Sea off the country’s northeast coast, as well as remote reserves near China’s western border with Kyrgyzstan, in a region called the Tarim Basin

In the deserts of the Tarim Basin crews are exploring some of the nation’s deepest reserves. Summer temperatures can top 120 degrees, and in the winter they can hit minus 20. Such ultradeep exploration is expensive, with some wells costing three times as much as shallower traditional wells, a Chinese oil executive told state media.  In 2023, Xi held a video call with Tarim Basin oil workers, praising their “indispensable contributions” to the nation. About 5% of China’s total oil and gas output in 2024 came from the basin’s deep reservoirs, a number Chinese oil executives intend to increase.

As of May 2024, PetroChina’s parent company, China National Petroleum, said it had drilled 193 wells in the Tarim Oilfield at least 5 miles deep. In the U.S., many wells are a mile or two deep.

Excerpt from Brian Spegele, How China Curbed Its Oil Addiction—and Blunted a U.S. Pressure Point, WSJ, July 21,2025

Who Trusts Microsoft? The Locked-In

In 2024, the Department of Homeland Security released a scathing report detailing Microsoft’s mistakes during a 2023 hack in which China stole thousands of emails from top government officials. Two years before that, China-linked cyberattackers compromised more than 250,000 Microsoft Exchange servers. In response to the 2024 report, Nadella, the CEO of Microsoft, promised to rededicate Microsoft to protecting its products and its customers from bad actors…

Shortly after Nadella took the reins, Microsoft eliminated the group that had companywide responsibility for Microsoft’s security work, pushing security decisions to the individual business units. Around the same time, Microsoft changed the way it developed software, laying off many of the test engineers charged with uncovering bugs before products ship to customers…

With regard to the July 2025 Microsoft hack, researchers said more than 400 SharePoint servers had been hacked—many of them belonging to government entities—and Microsoft had linked some of the attacks to the Chinese government

In previous episodes, such as the massive 2021 hack of the Microsoft Exchange email system, China pulled off impressive technical feats before being caught…

Regarding the 2025 SharePoint cyberattack, Eye Security researchers discovered, on July 18, 2025 an unauthorized script on a SharePoint server belonging to one of their customers. As the Eye team dug in, they started finding the same script on about 150 other SharePoint servers all over the internet…The script opened a back door to the SharePoint servers, creating an encryption key that could be used later to run commands on the machine. “It was just like a door key left on the street,” said Kerkhofs. “It was accessible for everybody. We just started scanning and we grabbed all the keys.”…Microsoft, learning that hackers were exploiting the bugs, called in its security team.

Eventually the Eye team discovered 80 infected organizations. European government agencies were compromised, as were U.S. federal agencies, municipalities and universities…

On July 20, 2025, the Energy Department confirmed that it was a victim… News of the compromise was reported by Bloomberg, which said that the National Nuclear Security Administration was specifically victimized.

Excerpt from Robert McMillan, A Failed Microsoft Security Patch Is the Latest Win for Chinese Hackers, WSJ, July 25, 2025

How to Kill Scientists and Get Away with It

When Israel’s attacks on Iran began before dawn on June 13, 2025 explosions shattered the homes of some of Iran’s top scientists… All nine were killed in near-simultaneous attacks to prevent them from going into hiding…The attack on the scientists was considered so fantastical by even its planners that it was called “Operation Narnia,” after the fictional C.S. Lewis series…A week after the June 13 attacks, Israel used a drone to kill another scientist who was being kept in what was supposed to be a safe house in Tehran. The person hasn’t been named…The deadly airstrikes were the first to target Iran’s nuclear scientists since 2020, when Mohsen Fakhrizadeh was gunned down with a remote-controlled weapon. Israel has never denied or confirmed its role in the deaths of five Iranian scientists between 2010 and 2020.

Among the most important targets was Fereydoon Abbasi-Devani, the former head of the Atomic Agency of Iran and one of the founders of Iran’s nuclear weapons-related work…Another killed scientist was Mohammad Mehdi Teranchi, who led a unit under Fakhrizadeh focusing on high explosives, which are needed to detonate a nuclear weapon…

Iran has used universities like Shahid Beheshti, the Sharif University of Technology and Malek Ashtar University to keep alive its nuclear-weapons expertise over the past two decades….At these universities, Iran often matches up its nuclear scientists on experiments and other studies with younger students. Two of the scientists killed on June 13, Ahmadreza Zolfaghari and Abdulhamid Minouchehr, published an article in the Annals of Nuclear Energy in June 2024 that used advanced computer modeling to show how neutron sources behave in a chain reaction. That information can be used for civilian purposes, like building a nuclear reactor, or to help trigger a chain reaction in a nuclear weapon. 

Excerpt from Laurence Norman, How Israel Killed Iran’s Top Nuclear Scientists, WSJ, June 29, 2025

Nvidia CEO Has a Magic Needle

Nvidia’s market share in China fell to 50% from 95% over the past four years under U.S. restrictions, Huang, Nvidia’s CEO,  said in May 2025.  He visited China at least three times in 2025 to reassure Chinese tech executives and government officials that Nvidia was committed to the market…. Huang has met with top executives of Chinese cloud-computing leader Alibaba, smartphone and automaker Xiaomi and OpenAI challenger MiniMax.People in China’s tech industry said they appreciated Huang’s efforts to modify his chips so they could be sold in China. Engineers there nicknamed him “Magic Tailor” for his skill in designing chips to thread the needle of U.S. regulations.

Knowing the importance of the Chinese market to Nvidia, Beijing increased pressure on the company: China’s cybersecurity regulator recently summoned Nvidia representatives to discuss alleged security risks of the H20 chips, citing comments by U.S. lawmakers about the need for a bill to require tracking capabilities for advanced chips sold abroad….

Excerpt from Lingling Wei et al, With Billions at Risk, Nvidia CEO Buys His Way Out of the Trade Battle, WSJ, Aug. 11, 2025

 

Getting Raped as a Way of Life

Kanzira Kihanga, a woman who lives in Congo, says she wasn’t surprised to learn in May 2025 that she was infected by the virus that causes AIDS. The 21-year-old believes she contracted the virus after back-to-back rapes by armed men. After the first attack, she went to a clinic but was only given half a dose of the PEP medication.* Two weeks later, she was raped again as she walked to the clinic to pick up the remainder of the dosage.

*Post-exposure prophylaxis (PEP) refers to HIV medicines that are taken after a possible exposure to prevent HIV infection.

Excerpt from Nicholas Bariyo, Congo Braces for HIV Surge After U.S. Funding Stops, WSJ, July 4, 2025

If There is Hell, it Must Be Like This

On 6 August 1945, the United States dropped an atomic bomb on the Japanese city of Hiroshima, killing 80,000 people in a single day, and tens of thousands more in the subsequent months. “If there is a hell,” survivor Ōiwa Kōhei recalled thinking of the aftermath, “it must be just like this.” Kōhei, 13-years-old at the time, was plagued for months by radiation poisoning, and forever by the psychological trauma. The hibakusha — the Japanese term for atomic-bomb survivors — “will not be with us for much longer, so it is essential that their irreplaceable living testimony should continue to be diligently and accurately recorded while it is still available”, writes historian Mordecai Sheftall. Their testimony must be preserved not for historical record, but so that current and future generations will take the lessons of their experiences to heart, says Sheftall.

Excerpt from Mordecai Sheftall, The Sun had fallen to Earth’ — a survivor’s recollection of the Hiroshima bombing, Nature, August 5, 2025

When a State Collapses, Who Survives: the case of Iran

In mid-June 2025, Iran flew at least four civilian aircraft to the Omani capital of Muscat for safekeeping. One of the planes included Iran’s presidential Airbus A340, which landed in Muscat on June 18, 2025 according to flight trackers. 

Arab officials were surprised to learn the planes were empty of passengers. Instead, they said, they carried cash and assets, which Iranians weren’t allowed to offload because of sanctions. The planes themselves were also valuable as emergency exits for top officials. The precautions show the level of pressure on Iran’s rulers during the war (Israel-Iran war of 2025). They had to find a way forward with no control of their own airspace and no help from their militias

Excerpt from S. Raghavan et al., Life in Iran After the Strikes: Executions, Arrests and Paranoia, WSJ, June 28, 2025

Israel’s Killing Machine and the Enemies Within

Israel stunned and hobbled Iran starting on June 13, 2025 when it pulled off an intelligence and military operation years in the making that struck high-level targets with precision. Guided by spies and artificial intelligence, the Israeli military unleashed a nighttime fusillade of warplanes and armed drones smuggled into Iran to quickly incapacitate many of its air defenses and missile systems. With greater freedom to fly over Iran, Israel bombarded key nuclear sites and killed top generals and scientists. By the time Iran mustered a response hours later, its ability to retaliate — already weakened by past Israeli strikes — was greatly diminished.

The Mossad and the military worked together for at least three years to lay the operational groundwork…To further diminish Iranian air defenses and missile systems, Mossad agents had smuggled precision weapons into Iran that were prepositioned to strike from close range…Those weapons included small, armed drones, which agents snuck into the country in vehicles…Mossad agents stationed weapons close to Iranian surface-to-air missile sites…To analyze information gathered from various sources, Israel used the latest artificial-intelligence…AI was used to help Israelis quickly sift through troves of data they had obtained….An investigation by The Associated Press conducted in early 2025 uncovered that the Israeli military uses U.S.-made AI models in war to sift through intelligence and intercept communications to learn the movements of its enemies. It’s been used in the wars with Hamas in Gaza and with Hezbollah in Lebanon.

In addition to AI, the Mossad relied on spies to identify top nuclear scientists and members of Iran’s Revolutionary Guard… At least eight members of the Guard, including the head of its missile program, were killed in a single Israeli strike on an underground bunker.

Another facet of the attack was to strike Iranian vehicles used to transport and launch missiles. The strategy was similar to a Ukrainian operation earlier this month in Russia. In that operation, nearly a third of Moscow’s strategic bomber fleet was destroyed or damaged with cheaply made drones snuck into Russian territory…In an interview with Iranian state-run television, the country’s police chief, Gen. Ahmadreza Radan, said “several vehicles carrying mini-drones and some tactical drones have been discovered.” ….

In the 2000s, Iranian centrifuges used for enriching uranium were destroyed by the so-called Stuxnet computer virus, believed to be an Israeli and American creation….In 2018, Israel stole an archive of Iranian nuclear research that included tens of thousands of pages of records…In July 2024, Israel killed a senior leader of Hamas, Ismail Haniyeh, with a bomb in a bedroom of a government guesthouse in Tehran.

Excerpts from JULIA FRANKEL and SAM MEDNICK, How Israel used spies, smuggled drones and AI to stun and hobble Iran, AP, June 17, 2025

Why U.S. Government Invented the UFOs

Evidence is emerging in June 2025 that US  government efforts to propagate UFO disinformation date back all the way to the 1950s. The WSJ account is based on interviews with two dozen current and former U.S. officials, scientists and military contractors involved in the inquiry, as well as thousands of pages of documents, recordings, emails and text messages.  At times, military officers spread false documents to create a smokescreen [of flying extraterrestrial saucers] for real secret-weapons programs. In other cases, officials allowed UFO myths to take root in the interest of national security—for instance, to prevent the Soviet Union from detecting vulnerabilities in the systems protecting nuclear installations…

Investigators are still trying to determine whether the spread of disinformation was the act of local commanders and officers or a more centralized, institutional program. The Pentagon omitted key facts in the public version of the 2024 report it released about UFOS that could have helped put some UFO rumors to rest, both to protect classified secrets and to avoid embarrassment… The Air Force in particular pushed to omit some details it believed could jeopardize secret programs and damage careers…

As Sean Kirkpatrick head of the All-domain Anomaly Resolution Office (AARO) pursued his investigation between 2022 and 2023, he started to uncover a hall of mirrors within the Pentagon, cloaked in official and nonofficial cover. On one level, the secrecy was understandable. The U.S., after all, had been locked in an existential battle with the Soviet Union for decades, each side determined to win the upper hand in the race for ever-more-exotic weapons….But Kirkpatrick soon discovered that some of the obsession with secrecy verged on the farcical. A former Air Force officer was visibly terrified when he told Kirkpatrick’s investigators that he had been briefed on a secret alien project decades earlier, and was warned that if he ever repeated the secret he could be jailed or executed. The claim would be repeated to investigators by other men who had never spoken of the matter, even with their spouses. It turned out the witnesses had been victims of a bizarre hazing ritual.  For decades, certain new commanders of the Air Force’s most classified programs, as part of their induction briefings, would be handed a piece of paper with a photo of what looked like a flying saucer. The craft was described as an antigravity maneuvering vehicle. …Many never learned it was fake.

Kirkpatrick found the practice had begun decades before, and appeared to continue still. The defense secretary’s office sent a memo out across the service in the spring of 2023 ordering the practice to stop immediately, but the damage was done. 

Excerpt from Joel Schectman et al., The Pentagon Disinformation That Fueled America’s UFO Mythology, WSJ, June 6, 2025

The New Trump Doctrine: Kiss the Hand you Cannot Bite

Four US major automakers are racing to find workarounds to China’s stranglehold on rare-earth magnets, which they fear could force them to shut down some car production within weeks. Several traditional and electric-vehicle makers—and their suppliers—are considering shifting some auto-parts manufacturing to China to avoid looming factory shutdowns, people familiar with the situation said.

Ideas under review include producing electric motors in Chinese factories or shipping made-in-America motors to China to have magnets installed. Moving production to China as a way to get around the export controls on rare-earth magnets could work because the restrictions only cover magnets, not finished parts, the people said.

If automakers end up shifting some production to China, it would amount to a remarkable outcome from a trade war initiated by President Trump with the intention of bringing manufacturing back to the U.S.  “If you want to export a magnet [from China] they won’t let you do that. If you can demonstrate that the magnet is in a motor in China, you can do that,” said a supply-chain manager at one of the carmakers.

China in April 2025 began requiring companies to apply for permission to export magnets made with rare-earth metals, including dysprosium and terbium. The country controls roughly 90% of the world’s supply of these elements, which help magnets to operate at high temperatures. Much of the world’s modern technology, from smartphones to F-35 jet fighters, rely on these magnets….In May 2025, industry groups representing most major automakers and parts suppliers told the Trump administration that vehicle production could be reduced or shut down imminently without more rare-earth components from China.

Excerpt from Sean McLain et al., Automakers Race to Find Workaround to China’s Stranglehold on Rare-Earth Magnets, WSJ, June 4, 2025

Two days after the publication of this WSJ article, Trump announced, on June 6, 2024, that Xi agreed to let rare earth minerals flow to US (in exchange of? not revoking Chinese student visas? what else?)

To Pollute is to Own: U.S. and Greenland

 NASA scientists discovered in 2024 remnants of Camp Century, a Cold War-era U.S. military base, under Greenland’s ice sheet. Project Iceworm, a clandestine Pentagon plan, aimed to build nuclear-missile launch sites beneath the Arctic ice. The underground site, which was designed to store 600 medium-range ballistic missiles, reveals the extent of U.S. involvement in Greenland going back over half a century. 

Camp Century, as the outpost was called, was partially constructed in 1959, and abandoned in 1967 after the ice sheet was deemed too unstable to support the proposed missile-launch network. Over the years, ice accumulated and the facility is now buried under at least 100 feet of ice…

The presence of U.S. nuclear weapons has historically been a source of friction with Denmark. The U.S. military at the time didn’t disclose Camp Century’s nuclear-related purpose to Copenhagen, a self-declared nuclear-free zone…In 1968, a nuclear-armed B-52 bomber crashed near the Thule Air Base, causing the payload to rupture and disperse, leading to radioactive contamination of the sea ice. The incident led to public controversy in Denmark, as did the revelation that the U.S. stored nuclear weapons at the Thule Air Base without informing Copenhagen or Greenland.

Excerpt from Sune Engel, The U.S. Nuclear Base Hidden Under Greenland’s Ice, WSJ, May 14, 2025

What is the Real Trump Card of China

Chinese officials acknowledged in a secret December 2024 meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate. The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan, the people, who declined to be named, said.  …The Chinese official’s remarks at the December meeting were indirect and somewhat ambiguous, but most of the American delegation in the room interpreted it as a tacit admission and a warning to the U.S. about Taiwan, a former U.S. official familiar with the meeting said.

Excerpts from Dustin Volz, In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks, WSJ, Apr. 10, 2025

The Scramble for Congo 21st Century Style

During the 19th century’s Scramble for Africa, European countries raced to secure territory and wealth across the continent. Now, African powers are grabbing resources from a neighbor crippled by infighting and ill-equipped to defend itself. Caught in the middle is the Democratic Republic of Congo, a country the size of Western Europe whose forests conceal a wealth of gold, diamonds and coltan, a key component in smartphones and computers. These mineral riches are turning what was already a region plagued by militia violence into a battleground, as Rwanda and its local allies seize coltan supplies while Uganda and its proxies move to take over gold mines to the northeast, according to United Nations and Ugandan officials…Ugandan President Yoweri Museveni and Rwandan President Paul Kagame are pouring troops and weapons into Congo, while their Congolese allies, who control strategic border crossings, secure smuggling routes to move more minerals to the global markets.

In 2024, Rwanda-backed M23 rebels seized the coltan-mining town of Rubaya, where fighters bring in around $800,000 each month by taxing traders. Rebel fighters have doubled diggers’ wages to encourage them to keep working, and they rely on forced labor to widen roads to accommodate trucks transporting coltan into Rwanda along with gold. According to the U.N., some 4,000 Rwandan soldiers are fighting inside Congo, a report that Rwandan authorities have denied.

Excerpt from While War Rages, Congo’s Neighbors Smuggle Out Its Gold and Mineral Wealth, WSJ, Apr. 7, 2025

North Korea: Hacking Superpower — Crypto Billionaire

At 11:49 a.m. on July 18, 2024, North Korean hackers pounced on a major cryptocurrency exchange handling hundreds of millions of dollars. The hackers slipped into the exchange’s virtual vault, took control and then started pilfering cryptocurrency tokens. Within a little more than an hour, the hackers had disappeared—and with them, more than $200 million for the Kim Jong Un regime. 

The shocking theft at WazirX, India’s largest cryptocurrency exchange, along with several other major recent heists, has made it clear: North Korea is now the world’s most dangerous crypto thief. It has swiped more than $6 billion in cryptocurrency over the past decade—a sum so large that no one else compares. The country’s hackers are both patient and brazen, according to investigators. To get into companies’ computers, they comb through employees’ Facebook and Instagram pages and invent tailor-made stories to trick them into clicking on links with viruses. Some North Korean hackers have even become employees themselves, fooling U.S. companies into hiring them as remote IT workers and gaining access to their networks.

After grabbing their bounty, North Korean hackers are masters at escaping. At WazirX, investigators believe they used algorithms to spread funds through global crypto networks faster than any human could, making it almost impossible for authorities to catch up. Once the crypto is dispersed, North Koreans often lie low until investigators lose interest and move on, waiting months or years to convert their haul into traditional money that can be spent….Pyongyang’s crowning achievement came in February with a $1.5 billion raid of Bybit, one of the world’s biggest cryptocurrency exchanges, in the largest-ever such heist. That followed several hackings in 2024, when North Korea stole more than $6 out of every $10 lost by the cryptocurrency industry, according to Chainalysis, which tracks crypto theft.

North Korea’s success reflects the major resources dedicated to the task. The regime commands more than 8,000 hackers as though they were in a military unit, with the country’s brightest minds. State support means its hackers can wait months or years to exploit a single slip in a company’s digital security. Pyongyang’s desperation for cash, and its lack of concern for diplomatic blowback, have fueled its drive to be better than anyone else. 

Excerpts from How North Korea Cheated Its Way to Crypto Billions, WSJ, Apr. 3, 2025

The Undeclared War in the Baltic

In January 2025, NATO launched the operation, dubbed Baltic Sentry, after a string of undersea cables and pipelines were damaged by ships—many with links to Russia—that had dragged their anchors.  “We are functioning as security cameras at sea,” said Kockx, the Belgian commander, whose usual duty is clearing unexploded mines from the busy waterway… New undersea drones are keeping a watchful eye on pipes and cables. NATO surveillance planes from the U.S., France, Germany and occasionally the U.K. take turns scanning the seaway from high above. NATO has also strengthened its military presence on the Baltic…NATO’s goal is to prevent more damage to subsea infrastructure and respond faster if something occurs…

The Baltic, a central theater in two world wars, is littered with wrecks and explosives that still pose danger. Surrounding NATO members are world leaders in finding and disposing of sea mines, officials say….Commercial traffic on the Baltic ranks among the world’s densest, with more than 1,500 ships plying its waves on any day, so policing it all is difficult. Further complicating NATO’s sentry duty initially was a lack of comprehensive information about all the critical infrastructure snaking across the sea’s muddy bottom. Details of pipes and cables have traditionally been kept by national governments or private companies. Nobody had a picture of everything...NATO’s new undersea infrastructure center in 2024 assembled the first unified map of the Baltic’s floor.

Excerpt from Daniel Michaels, How NATO Patrols the Sea for Suspected Russian Sabotage, Mar. 31, 2025

The Cat-and-Mouse Game: US-China, Chip Giants

The U.S. on March 28 2025 added dozens of Chinese companies to a trade blacklist over national security concerns. American businesses seeking to sell technology to these companies will need approval from the government. Among those added were subsidiaries of Inspur Group, China’s largest server maker and a major customer for U.S. chip makers such as Nvidia, Intel and Advanced Micro Devices. Companies linked to China’s largest supercomputer maker, Sugon, were also added…

Nearly 80 companies were put on the Commerce Department’s blacklist, known as the entity list…including the U.S. server maker Aivres Systems that is wholly owned by Inspur Electronic. The latter is one-third owned by Inspur Group, according to corporate records. Aivres has been assembling high-end artificial-intelligence equipment for Nvidia. The AI-chip giant has said that Aivres will make servers using chips in the Blackwell family, Nvidia’s newest and most powerful processors.  Aivres advertises on its website that it sells servers and infrastructure powered by Blackwell chips, which are banned from sale into China…About two months after Inspur Group was added to the trade blacklist in March 2023, California-based Inspur Systems changed its name to Aivres Systems.

Excerpts from Liza Lin, Trump Takes Tough Approach to Choking Off China’s Access to U.S. Tech, WSJ, Mar. 26, 2025

Mapping the Seafloor: Why Is It Important for War?

China’s fleet has triggered protests from Japan, India and others, but that hasn’t stopped Beijing from launching long missions to map the sea floor. The data they obtain has numerous applications, from science to the emerging industry of deep-sea mining, but it is the Chinese government’s commandeering of civilian research for military use that threatens American allies.

India’s navy drove a Chinese research ship away in 2019, but more have returned. In recent weeks, two of China’s most advanced research vessels, the Xiang Yang Hong 01 and the newer Dong Fang Hong 3 have conducted lawnmower-style sweeps across vast stretches of the eastern Indian Ocean.

Chinese civilian vessels are pursuing expeditions around the world—there are as many as a dozen or so active at any given time. The data they gather, including on currents, temperature and salinity, can have an array of applications. Detailed scanning of the seabed, for instance, can provide information about the visibility of naval mines and the accuracy of sonar.  The surveys can also help determine what minerals could be extracted…Recent missions have spurred complaints by at least half a dozen governments. China says its marine research activities fully comply with the United Nations Convention on the Law of the Sea, the international treaty that established the legal regime for the world’s oceans….

The U.S. Navy also carries out maritime surveys for military purposes…. Under the U.N. convention, coastal states have jurisdiction over research in their exclusive economic zones, which extend 200 miles from the coast. The U.S., which recognizes but hasn’t ratified the convention, argues that military surveys are exempt and U.S. Navy oceanographic ships regularly conduct studies near China. China appears to be moving closer to the American stance, “as they’re doing more oceanographic research without the permission of coastal states.”

Excerpts from Austin Ramzy, China Is Mapping the Seabed to Unlock New Edge in Warfare, WSJ, Mar. 12, 2025

The Drone Experiment of Ukraine

U.S. startups have spent billions of venture-capital dollars in hopes of developing the small drones that the Pentagon says it needs for future conflicts, but many have produced only expensive aircraft that don’t fly very well. Ukrainian drone makers, meanwhile, have mastered mass-producing drones despite limited resources and are looking for new customers and capital…

“No U.S. company is keeping up with Ukraine,” said CX2 co-founder Nathan Mintz. “You know their stuff works. They’ve got the ultimate high-stakes laboratory meant to battle-proof all this stuff.”

The U.S. has the capacity to build up to 100,000 drones a year, according to one Defense Department estimate. In 2024, Ukraine built more than two million drones. Some of the Ukraine-built drones that the Defense Department wants can fly hundreds of miles with explosives and have been used in attacks inside Russia…“Ukraine has made it pretty clear that they intend on being the drone capital of the planet once this war is over,” said Derek Whitley, co-founder of startup Vivum, which sells its AI software for autonomous systems to the Defense Department.

Ukrainian drones often sell for one-tenth the price of American options. They have proven on the battlefield that they can work when radio and satellite communication is blocked by electronic jamming…American startups are slower to build, deliver and update their drones, which also have often failed to weather severe electronic warfare. Many U.S. companies that brought their drones to Ukraine watched them fall out of the sky or fail to complete missions.

Excerpt from Heather Somerville, America Turns to Ukraine to Build Better Drones, WSJ, Mar. 11, 2025

 

To Own Means Nothing-To Do Means More: Metals and Minerals of the World

Trump wants to secure the minerals the U.S. needs for everything from smartphones to jet fighters by striking deals in Ukraine, Greenland and even Russia. But even if the Trump administration secures more mines for American companies through agreements like the mineral-rights deal being discussed with Ukraine, it may have to send much of the minerals to China—its main geopolitical rival—to be processed…

In truth, the U.S. already has abundant supplies of rare earths, but it relies on China to refine them. That is because the U.S. has lost much of its capacity to process minerals, while China has become the world’s dominant refiner of rare earths, cobalt, copper and many other metals.

Until the 1990s, the U.S. was a major refiner of minerals and metals. But then China emerged as the dominant player, powered by its cheap labor force and looser environmental regulations of a sector that can be highly polluting. The voracious need of Chinese manufacturers for raw materials during the country’s years of explosive growth was also a boon for Chinese refiners. Today, the sheer scale of China’s refining industry makes it difficult for others to compete. According to industry estimates, the cost of building a refinery plant in China is a third of the cost in the U.S.

Excerpts from  Jon Emon, How China Beat Out the U.S. to Become the Top Player in Rare-Earths Refining, WSJ, Mar. 25, 2025

The Shadow War: Cutting Underwater Data Cables

The North Atlantic Treaty Organization (NATO) mounted its first coordinated response to the suspected sabotage campaign against critical infrastructure, after another underwater data cable was severed in the Baltic Sea in 2025. NATO vessels raced to the site of a damaged fiber-optic cable in Swedish waters on January 26, 2025 where a trio of ships carrying Russian cargo, including one recently sanctioned by the U.S., were nearby. All three vessels are now being investigated as part of a probe into suspected sabotage of the fiber optic cable.

The incident is the latest in a string of alleged underwater attacks in the region that prompted NATO to announce earlier this month the formation of a surveillance mission called Baltic Sentry. It includes regular naval patrols, as well as enhanced drone, satellite and electronic surveillance of Baltic areas that are crisscrossed by critical infrastructure such as data and power cables, along with gas pipelines and offshore wind farms…Under international maritime law, a ship in international waters is under the jurisdiction of the country of its registration and can be boarded by foreign enforcement officials only with explicit permission of its owner or flag country. The captain of the Pskov, one of the ships suspected to have cut the undersea cables, cited the international law of the sea when he argued against an official request to steer his ship into a port in Finland…

In December 2024, Finland detained a vessel called Eagle S, an oil tanker belonging to Russia’s shadow fleet that is registered in the Cook Islands, on suspicion that it had deliberately used its anchor to cut a power cable connecting Finland and Estonia. In a midnight raid, Finnish special forces dropped from a helicopter onto the deck of Eagle S and captured the ship and its crew, which have since been detained in a Finnish port. 

In November 2024, an investigation was launched against a Chinese bulk carrier called Yi Peng 3, which cut two data cables in the Baltic after dragging its anchor for several hours, according to investigators. The vessel was loaded with Russian fertilizer. The probe continues. 

Excerpt from Bojan Pancevski, Suspected Sabotage of Deep-Sea Cable Triggers First NATO-Led Response, WSJ, Jan. 27, 2025

Like a Lamb to the Slaughter: DeepSeek Collects Personal Data–Nobody Cares

Amid ongoing fears over TikTok, Chinese generative AI platform DeepSeek says it’s sending heaps of US user data straight to its home country, potentially setting the stage for greater scrutiny. The United States’ recent regulatory action against the Chinese-owned social video platform TikTok prompted mass migration to another Chinese app, the social platform “Rednote.” Now, a generative artificial intelligence platform from the Chinese developer DeepSeek is exploding in popularity, posing a potential threat to US AI dominance and offering the latest evidence that moratoriums like the TikTok ban will not stop Americans from using Chinese-owned digital services…In many ways, DeepSeek is likely sending more data back to China than TikTok has in recent years, since the social media company moved to US cloud hosting to try to deflect US security concerns “It shouldn’t take a panic over Chinese AI to remind people that most companies set the terms for how they use your private data” says John Scott-Railton, a senior researcher at the University of Toronto’s Citizen Lab. “And that when you use their services, you’re doing work for them, not the other way around.”To be clear, DeepSeek is sending your data to China. The English-language DeepSeek privacy policy, which lays out how the company handles user data, is unequivocal: “We store the information we collect in secure servers located in the People’s Republic of China.”

In other words, all the conversations and questions you send to DeepSeek, along with the answers that it generates, are being sent to China or can be. DeepSeek’s privacy policies also outline the information it collects about you, which falls into three sweeping categories: information that you share with DeepSeek, information that it automatically collects, and information that it can get from other source…DeepSeek is largely free… “So what do we pay with? What… do we usually pay with: data, knowledge, content, information.” …

As with all digital platforms—from websites to apps—there can also be a large amount of data that is collected automatically and silently when you use the services. DeepSeek says it will collect information about what device you are using, your operating system, IP address, and information such as crash reports. It can also record your “keystroke patterns or rhythm.”…

Excerpts from John Scott-Railton, DeepSeek’s Popular AI App Is Explicitly Sending US Data to China, Wired, Jan. 27, 2025

 

The Under-the-Hood Cyberattacks

The Biden administration sanctioned a Chinese company in January 2025  it said was behind the vast cyber intrusions into U.S. telecommunications networks that swept up phone calls of scores of U.S. government officials as well as those of incoming President Donald Trump.

The U.S. Treasury Department said that Sichuan Juxinhe Network Technology Co. was directly involved in the deep compromises of the telecommunications firms, which U.S. officials and lawmakers have said is a historically damaging espionage campaign carried out on behalf of the Chinese government. The firm is based in the Sichuan province of China and advertises itself as a technology-services and cybersecurity company.

Separately, U.S. authorities sanctioned a Shanghai-based hacker, Yin Kecheng, whom they allege was involved in an unrelated breach of sensitive systems within the Treasury Department itself. Neither Sichuan Juxinhe nor Yin Kecheng could immediately be reached for comment.

The sanctions… are the most direct public response to the telecom hacks, which were first revealed by The Wall Street Journal in 2024 and have been attributed to a hacking group dubbed Salt Typhoon. The sanctions will block U.S. transactions with Sichuan Juxinhe and allow for the seizure of any property or interests the firm has within the U.S. It couldn’t be immediately established whether the firm, for which little information was available online, had any U.S.-held assets or property.

Hackers compromised at least nine American telecommunications firms, scooping up enormous amounts of call-log data and the unencrypted texts and call audio from several dozen specific high-value targets. They also accessed wiretap-surveillance systems at victim companies Verizon Communications and AT&T in an apparent effort to learn how much the FBI and others understood about Beijing’s spies operating in the U.S. and internationally, according to investigators.

In the Treasury Department hack, China is believed to have accessed unclassified files located on compromised work computers of a range of senior officials, including Secretary Janet Yellen… The intrusion occurred through a hacked third-party software vendor called BeyondTrust, which was able to remotely access virtually any Treasury work computer, the people said. The department’s sanctions office itself—the same one that imposed penalties—was breached in the hack, as were other offices that possess sensitive nonpublic information. 

Excerpt from The U.S. Sanctions Beijing Firm Behind Major ‘Salt Typhoon’ Telecom Hacks, WSJ, Jan. 17, 2025

The Battle to Block Access to AI

The U.S. is imposing some of its strongest measures yet to limit Chinese advances in artificial intelligence, requiring companies to get government approval to export certain information about their AI models and set up large AI computing facilities overseas.

The rules, in January 2025, are a final push by the Biden administration in a yearslong effort to use export controls to stem China’s advances in chip-making and AI, and they have sparked a backlash from companies including Nvidia. The rules impose caps on how many advanced AI chips can be exported to certain countries and require a license to export the data that underpins the most sophisticated AI systems.

Strict sales restrictions on these chips are already in place for China, Iran and other U.S. adversaries, and the new rules carve out exemptions for a group of 18 close U.S. allies and partners. These include countries such as the U.K., France and Germany, a senior administration official said. But a broad category of more than 120 other countries, including U.S. allies in the Middle East and Asia, are set to face new hurdles in setting up huge AI computing facilities.

While the impact of the rules isn’t yet clear, they threatened to limit sales of AI chips from Nvidia, which has built a large business out of satisfying demand for AI infrastructure in countries such as the United Arab Emirates and Saudi Arabia. Company officials said they expected to bring in almost $10 billion of revenue last year from so-called “sovereign AI,” where countries around the world increasingly see AI computing facilities as national assets.

Under the new rules, companies that produce AI models—the likes of OpenAI and Google—would need export licenses to send the “weights” attached to those models to many foreign countries. Model weights are the secret sauce in advanced AI systems like ChatGPT, a series of digital knobs that fine-tune their performance.

Excerpts from Asa Fitch and Liza Lin U.S. Targets China With New AI Curbs, Overriding Nvidia’s Objections, WSJ, Jan. 13, 2025

Satellites Reveal Depth of Destruction Vietnam War

During the Vietnam War, the United States dropped more than 8 million tons of bombs and sprayed 74 million liters of Agent Orange and other herbicides in Vietnam, Cambodia, and Laos. Nearly 50 years after the war’s end, the deadly impacts of these campaigns persist: Unexploded ordnance continues to maim and kill, while hot spots of dioxin, a potent toxin in the herbicides, might still be contributing to cancers and birth defects today. Now, using declassified military satellite photos, scientists have identified the likely locations of these hidden dangers, which could help direct remediation and cleanup efforts based on research, presented on December 11, 2024 at the annual conference of the American Geophysical Union (AGU)

Identifying these risky areas in the modern landscape is challenging. Tenacious vegetation growth has long since hidden the scars of war, and historical records of bombing and herbicide spraying are both incomplete and imprecise. That’s why Philipp Barthelme, a graduate student in geoscience at the University of Edinburgh, and his colleagues turned to declassified satellite photos from the KH-9 HEXAGON and KH-4a/b CORONA missions, which were sharp enough to reveal details as small as 0.6 meters.

Although the satellite data alone cannot identify unexploded bombs, the researchers surmised they are most likely to be found in regions that were heavily bombarded. The craters from the exploded bombs stand out in the satellite images as bright white splotches. The researchers used machine learning, a kind of artificial intelligence, to pinpoint more than 500,000 such craters in Vietnam’s Quang Tri province, which was the most heavily bombed during the war, as well as a region near the borders of Vietnam, Laos, and Cambodia.

In collaboration with the nonprofit Conflict and Environment Observatory, Barthelme also used satellite data to study herbicide spraying in southern Laos. The U.S. sprayed these compounds in secretive wartime campaigns to destroy crops and improve visibility by defoliating the lush jungles. However, the dioxin in the herbicides killed and debilitated hundreds of thousands of people…The zones of defoliation from the herbicides appear in satellite data as bright, sinuous lines….

Excerpts from Maya Wei-Haas, Declassified satellite photos reveal impacts of Vietnam War, Science, Dec. 14, 2024

How the Drug War has Fueled Sudan’s Conflict

The war in Sudan between the country’s military and the rebel Rapid Support Forces (RSF) has turned in 2024 into a battleground for more foreign powers, drawing in fighters and weapons from as far as Latin America and Europe. Several regional governments are vying to assert their influence as the fighting escalates, led by the United Arab Emirates on one side and Egypt on the other—with devastating consequences for Sudan’s 48 million people, some of whom are now in the grip of famine. At stake is control of Red Sea shipping lanes, some of Africa’s largest gold reserves and the contested waters of the Nile.

The Colombian fighters seized in November 2024 in Darfur were hired earlier this year by an Abu Dhabi-based company called Global Security Services Group (GSSC)…The company describes itself as the only armed private security provider to the Emirati government and lists as its clients the Gulf state’s ministries of presidential affairs, interior and foreign affairs.  In Uganda, where GSSG has trained local troops in counterterrorism operations and VIP protection, the company presented itself as acting on behalf of the Emirati government, an army spokesman said. 

With its large stock of drug-war veterans trained on American weapons, Colombia has long been a target for recruiters from overseas security and mercenary groups. A decade ago, the U.A.E., through military contractors, sent Colombians to fight in the civil war in Yemen. In September 2024, a Bogotá, Colombia-registered recruitment company called International Services Agency, or A4SI, began posting ads on its website looking for drone operators, cybersecurity specialists and bodyguards to deploy in Africa…

By some estimates, as many as 150,000 people have been killed in Sudan. About 25 million, more than half of the population, are suffering crisis levels of hunger and one in four Sudanese have been forced from their homes. Famine has been declared in a Darfur camp hosting between 500,000 and a million displaced people.

Excerpts from Benoit Faucon and Gabriele Stein, The Global War Machine Supplying Colombian Mercenaries to Fight in Sudan, WSJ, Dec. 11, 2024

People are Still Assassinated for Witchcraft

More than 180 people were killed in Haiti’s capital on December 7 and 8, 2024 as a powerful warlord ordered the slaying of elderly slum residents he suspected of giving his son a severe illness through witchcraft, the United Nations and Haitian human-rights groups said Monday.  Gang boss Monel Felix directed his followers to kill residents with guns, knives and machetes after he was advised by a voodoo priest that elderly people practicing sorcery had caused his son to be stricken with a fatal sickness, the National Human Rights Defense Network, a Haitian rights group, said in a report. The ill child died Saturday December 8  as Felix’s gang carried out the killings, the group said. 

Excerpt from Kejal Vyas, Haiti Gangs Kill More Than 180 Mostly Elderly People in Capital, WSJ, Dec. 9, 2024

Crossing the Pacific: the Logistics of War

Every two weeks since 2023, US officers convene a classified intelligence briefing about fighting in the Red Sea. The attendees aren’t politicians, policymakers or spies. They are private shipping executives. The meetings are part of a push by the Pentagon’s Transportation Command, or Transcom, to integrate shipping lines as crisis supply lines. The policy stems from a dire need in an unloved but vital corner of America’s military behemoth. A House select committee in February 2024 called Transcom’s sea-cargo capacity “woefully inadequate.” The U.S. is investing heavily in new weapons systems, but missiles, warships and jet fighters are only a fraction of what the military worries about. Troops sent to battle also need food and water. Their equipment devours fuel and spare parts. Guns without ammunition are dead weight. Wounded fighters require evacuation.

Moving all of that—and keeping supplies flowing for months or years—demands vast and complex support infrastructure, broadly termed logistics. If it doesn’t function, even a battle-proven force will grind to a halt…China’s rise has exposed America’s shipping weakness. Beijing isn’t just Washington’s biggest military rival. It is also by far the world’s biggest logistics operation. Within China’s centrally directed economy, the government controls commercial shippers, foreign port facilities and a globe-spanning cargo-data network that in a conflict could be repurposed for military aims or to undermine the U.S., including on home soil. Transcom’s fleet of planes and cargo ships, meanwhile, is aging and insufficient.

In conflict with China, the Pentagon would send roughly 90% of its provisions by sea. Among 44 government-owned ships for moving vehicles that Transcom can tap, 28 will retire within eight years. Replacements have faced repeated delays. But military logistics isn’t “just logistics” because in wartime, supply lines are prime targets. During Russia’s assault on Kyiv in 2022, Ukrainians crippled Moscow’s forces by destroying their provisions.

Robust logistics, in contrast, can deter attacks. If adversaries believe the U.S. can quickly mobilize a massive response, they are less likely to initiate hostilities. During the Cold War, North Atlantic Treaty Organization allies routinely made a show of flooding Europe with American troops and gear before exercises.

The U.S. has decades of experience working with NATO allies to send military supplies to Europe for a potential conflict with Russia. Cargo ships generally need about two weeks to cross the Atlantic. For a conflict with China, logistics would be more complicated because distances are far greater. Crossing the Pacific takes much longer than the Atlantic, and shipping routes could face greater danger of attack.

In 1990, at the Cold War’s end, the U.S. had roughly 600 available merchant ships. In 1960, it had more than 3,000. China today has more than 7,000 commercial ships. Chinese entities own every sixth commercial vessel on the seas—including ships flying other countries’ flags—a share comparable only to Greece.

Excerpts from Daniel Michaels and Nancy A. Youssef, Pentagon’s limited capacity to support a potential China conflict forces planners to tap private cargo companies, WSJ, Nov. 1, 2024

When Phones Become Useless: the Attack on US Telecommunications Infrastructure

The Consumer Financial Protection Bureau  has issued a directive to employees to reduce the use of their phones for work matters because of China’s recent hack of U.S. telecommunications infrastructure. In an email to staff sent November 7, 2024, the chief information officer at the Consumer Financial Protection Bureau warned that internal and external work-related meetings and conversations that involve nonpublic data should only be held on platforms such as Microsoft Teams and Cisco WebEx and not on work-issued or personal phones.

“Do NOT conduct CFPB work using mobile voice calls or text messages,” the email said, while referencing a recent government statement acknowledging the telecommunications infrastructure attack. “While there is no evidence that CFPB has been targeted by this unauthorized access, I ask for your compliance with these directives so we reduce the risk that we will be compromised,” said the email, which was sent to all CFPB employees and contractors.

The alert is the latest demonstration of concerns within the federal government about the scale and scope of the hack, which investigators are still endeavoring to fully understand and have attributed to a group dubbed Salt Typhoon.  The hackers are said to have compromised data about calls and in some cases recorded phone audio from certain high-value targets, including individuals affiliated with both the Trump and Harris presidential campaigns… A directive to avoid cellphone use in response to a specific threat is rare for a government agency and reflects the level of concern among investigators about the severity of the breaches of telecommunications companies, including Verizon and AT&T…U.S. investigators believe hackers tied to a Chinese intelligence agency are responsible for the breaches and that they have targeted an array of senior national security and policy officials across the U.S. government in addition to politicians.

Excerpts from Anna Maria Andriotis and Dustin Vole, US Agency Warns About Chinese Phone Hacks, WSJ, Nov. 8, 2024

Under the Radar: How the U.A.E. is Colonizing Africa

The petrostate, United Arab Emirates, has invested billions of dollars on the other side of the Arabian peninsula, in Africa, where it is now emerging as a significant player, at times muscling out China and annoying the U.S. and others. It has taken sides in local wars and spent heavily on buying farmland, ports and other projects that could help reduce its own dependence on oil in the decades to come.

The U.A.E. government says investments in Africa amounted to about $110 billion over the past decade….Its portfolio includes renewable-energy projects in Egypt, leased rice and wheat farmlands in the muddy plains of northern Angola and a majority stake in one of Zambia’s largest copper mines. U.A.E.-backed port projects are dotted around the coasts of the Atlantic, the Red Sea and the Indian Ocean. The Gulf state is also trying to become a key supplier of the minerals used in a new generation of batteries.  

The Wall Street Journal has reported that the U.A.E. shipped weapons including antiaircraft missiles and drones, to Sudan’s Rapid Support Forces, which is waging a civil war against the Iran-backed Sudanese military and has perpetrated a series of well-documented atrocities against civilian populations, especially in Darfur. It also sold armed drones to Ethiopia’s government, while the U.S. was pushing for a peace deal with Ethiopian rebel groups. Before that, U.N. investigators say it transferred arms to Libyan militia leader Khalifa Haftar in violation of a United Nations Security Council arms embargo…

There are signs of pushback in parts of Africa, too. In Chad, local Zaghawa communities have repeatedly staged protests against the U.A.E.’s use of Amdjarass airport in the east of the country to ship supplies to the RSF, according to activists and videos shared online. .

Excerpts from Nicholas Bariyo, The New Investment Superpower Outflanking China and the U.S. in Africa, WSJ, Nov. 6, 2024

The Never-Ending Nuclear Arms Race

The United States Los Alamos National Laboratory (LANL) announced in October 2024 it had manufactured its first plutonium “pit”—used in the core of a thermonuclear warhead to initiate an nuclear explosion—since the United States largely halted such production in 1989. Under a nuclear arsenal modernization plan launched in 2008, the lab will scale up production to 30 pits per year, with an additional 50 to be produced annually starting in the mid-2030s at the Savannah River Site in South Carolina. But the work faces opposition from critics who say it could help fuel a new international nuclear arms race and also risks the health of workers and the environment. In September 30 2024, opponents won a ruling in federal district court in South Carolina when a judge ruled the U.S. Department of Energy failed to adequately consider other options for locating the production facilities. The judge is considering a request to pause production at LANL. The United States halted pit manufacturing in 1989 at the Rocky Flats Plant, near Denver, after an inspection revealed hazardous waste contamination.

Excerpt from U.S. resumes making nuke triggers, Science, Oct. 11, 2024

Get Down and (Very) Dirty: How to Break Free from China’s Grip on Rare Earths and Minerals

The Biden administration held talks with three firms in the fall of 2024 about purchasing one of the world’s largest non-Chinese cobalt producers…The talks over Chemaf, a mining company based in the Democratic Republic of Congo, are part of a push by the administration to secure global supplies of a metal used in everything from jet fighters and drones to electric-vehicle batteries. For more than a decade, Chinese companies have spent billions of dollars buying out U.S. and European miners in Congo, which produces nearly 75% of the world’s cobalt supply. That has put China in a dominant position in both the production and processing of the mineral.

It has been difficult for the U.S. government to interest American investors in any sector in Congo because of the country’s poor infrastructure, limited skilled labor, resource nationalism and reputation for government corruption. U.S. government officials have spoken with mining and artificial-intelligence company KoBold Metals, copper miner First Quantum Minerals and investment firm Orion Resource Partners about participating in a deal to acquire Chemaf, either separately or jointly…

Chemaf, which says its mines could produce 20,000 tons of cobalt annually—making it one of the world’s largest cobalt producers—was put up for sale in 2023 by its founder, Shiraz Virji…When The Wall Street Journal visited Chemaf’s Mutoshi mine in 2018, freelance Congolese miners could be seen descending underground without helmets, shoes or safety equipment. Miners were using picks, shovels and bare hands to unearth rocks rich with the metal. Water sometimes rushed into holes and drowned people, and an earth mover buried one alive, said local workers and mine officials…

In June 2024, Chemaf agreed to sell itself to Chinese state-backed Norin Mining. Shortly after, U.S. pressure helped block the sale

Excerpts from  Alexandra Wexler and Julie Steinberg, How the U.S. Is Trying to Challenge China’s Cobalt Chokehold, WSJ, Oct. 15, 2024

Who is Ready for Q-Day?

It isn’t certain when quantum computers will be able to break the encryption used to protect the world’s most sensitive data, but corporate technology leaders need to assess the risks of this scenario now…Even the most powerful traditional computers use binary digits, or bits, which can either be 0s or 1s. Quantum computers use quantum bits, or qubits, which represent and store information in both 0s and 1s simultaneously, known as superposition. Such machines have the potential to sort through a vast number of possible solutions to a problem within a fraction of a second to come up with a likely answer…

A fault tolerant quantum computer will be able to hammer away at problems indefinitely, giving them wherewithal to break encryption algorithms that companies and governments use to protect their most price-sensitive and important information… That moment might reasonably occur by around 2035

Why worry about a scenario that’s looming perhaps a decade or more in the future? Because of a scenario some call “harvest now, decrypt later.” It envisions hackers stealing encrypted data today and sitting on it for years, hoping to realize its value at some point in the future when quantum computers are able to decrypt the information…Quantum computing has already progressed enough that companies can begin strategizing now for Q Day, the point at which quantum computers can break classic encryption…In August 2024, the National Institute of Standards and Technology (NIST), an agency of the Commerce Department, published three new algorithms for post-quantum encryption. Some companies are already moving ahead, including IBM and Apple….

Excerpts from Steven Rosenbush, Q Day’ Is Coming. It’s Time to Worry About Quantum Security, WSJ, Oct. 9, 2024

How Murder, Torture and Rape Fuel the Technological Revolution

Congo is the world’s leading producer of coltan, from which tantalum is extracted. Tantalum is in hot demand because of its growing use in consumer products, from smartphones to laptops and it is critical for the defense industry (e.g., Apple iPhones, SpaceX rockets, IBM computers).

Coltan is mined in the country’s restive east, a region that has been engulfed in a decadeslong war between rebel groups and the Congolese army…A powerful militia backed by neighboring Rwanda has taken over swaths of eastern Congo, driving some two million people from their homes as fighters kill, torture and rape civilians. The militia, known as M23, has also seized control of Congo’s coltan production and transport, according to United Nations investigators, supply-chain experts, researchers and local traders. 

Now, a network of smuggling routes is increasingly being used to move ore illegally from militia-controlled mines in eastern Congo to neighboring Rwanda. From there, it is sold as Rwandan, and hence “conflict-free,” to smelters around the world, but primarily in China. 

M23 fighters levy taxes on informal coltan miners, who dig the ore from the ground, mostly by hand. The fighters also tax the movement of coltan, providing the militia with revenue to purchase weapons and other supplies. Overall, the trade generates around $300,000 a month for the fighters, according to Bintou Keita, the head of the U.N. mission in Congo….U.S. lawmakers have sought to prevent minerals commonly mined in eastern Congo—tin, tungsten, tantalum and gold—from financing conflict in the region. Legislation embedded in the 2010 Dodd-Frank Act requires U.S.-listed companies to disclose their use of the minerals, known as the 3TGs, as well as steps they are taking to prevent inadvertently financing armed groups. It doesn’t, however, oblige companies to remove potentially tainted materials from their supply chains…

Other armed groups are also profiting from the illegal coltan trade, including an alliance of militias that is helping the Congolese military fight M23, according to rights groups and U.N. researchers. The alliance, known as the Wazalendo, which U.N. investigators say is armed by Congo’s military, includes groups that are under international sanctions for war crimes. M23 and the Wazalendo are both recruiting child soldiers, raping women and girls, looting, murdering civilians and committing other atrocities, according to rights groups and U.N. investigators. Like M23, the Wazalendo are collecting illegal taxes on coltan at roadblocks along transportation routes, as well as from some mining sites. 

Excerpt from Alexandra Wexler, How This Conflict Mineral Gets Smuggled Into Everyday Tech,  WSJ, Oct. 6, 2024

How to Become Biosecure

A bill approved by the House of Representatives in September 2024 would make it difficult for U.S. drug companies to contract with five major Chinese biotechnology companies. Academic researchers say they, too, would be hampered. The new rules could threaten projects that rely on sequencing in China or involve Chinese scientists who use services or machines from the companies. It would also cut off one source of genome sequencers used in U.S. labs. The Senate is considering a similar measure, raising the odds the rule could become law. “It could have a chilling effect on science,” says Gene Robinson, director of the Carl R. Woese Institute for Genomic Biology at the University of Illinois Urbana-Champaign.

Known as the Biosecure Act, the legislation would prevent federal funds from going to biotech companies linked to five “foreign adversaries”: China, Russia, Iran, North Korea, and Cuba. It bans purchases from five specific Chinese companies—BGI, MGI, WuXi Biologics, Wu Xi AppTec, and Complete Genomics—beginning in 2032. It would also prevent federal funds from going to other organizations that use services and equipment from the companies. The White House Office of Management and Budget would update the list of companies of concern at least once a year.

The act’s proponents argue that the named biotech companies are stealing intellectual property from U.S. biotech equipment makers or are directing health and genetic data to centers affiliated with the Chinese Communist Party (CCP) and other adversaries. “This bill is a necessary step towards protecting Americans’ sensitive health care data from the CCP before these companies become more embedded in the U.S. economy, university systems, and federal contracting base,” said Representative James Comer (R–KY) on the House floor before the bill passed 306 to 81 with broad bipartisan support.

The biggest impact, says Aaron Cummings, a lobbyist with Crowell & Moring, is likely to be felt by U.S. biotech and pharmaceutical companies. Beyond genome sequencing, Chinese firms such as WuXi AppTec provide services that support clinical research, such as manufacturing pharmaceutical ingredients and cell therapies, as well as providing research cell lines. According to a survey released in May by BIO, a biotech industry trade group, 79% of 124 biopharma companies surveyed have at least one Chinese biotech contractor. Academic scientists, for their part, worry they will be forced to sever valuable research collaborations with Chinese scientists at the companies of concern or with academic groups that use their equipment or services.

Excerpts Robert F. Service from Bill Targeting Chinese Firms Worries US Researchers, Science, Sept. 13, 2024
 
 
 
 
 

What Happens When 48 Women are Raped Every Hour?

Congo is considered the rape capital of the world. On average, 48 women are raped every hour. Gang rapes, genital mutilation, and sexual violence are committed by armed groups, gangs, and government and police forces. Many of the victims are children and babies. Rape victims and children born of rape are often rejected by their families. HIV is rampant, and cases often go untested and untreated. Rapists almost always go unpunished.

The Magic of Tether: Why the United States Tolerates Tether Land?

A giant unregulated currency is undermining America’s fight against arms dealers, sanctions busters and scammers. Almost as much money flowed through its network in 2024 as through Visa cards. And it has recently minted more profit than BlackRock, with a tiny fraction of the workforce. Its name: tether. The cryptocurrency has grown into an important cog in the global financial system, with as much as $190 billion changing hands daily. In essence, tether is a digital U.S. dollar—though one privately controlled in the British Virgin Islands by a secretive crew of owners, with its activities largely hidden from governments.  Known as a stablecoin for its 1:1 peg to the dollar, tether gained early use among crypto aficionados. But it has spread deep into the financial underworld, enabling a parallel economy that operates beyond the reach of U.S. law enforcement. Wherever the U.S. government has restricted access to the dollar financial system—Iran, Venezuela, Russia—tether thrives as a sort of incognito dollar used to move money across borders.

Russian oligarchs and weapons dealers shuttle tether abroad to buy property and pay suppliers for sanctioned goods. Venezuela’s sanctioned state oil firm takes payment in tether for cargoes. Drug cartels, fraud rings and terrorist groups such as Hamas use it to launder income. Yet in dysfunctional economies such as Argentina and Turkey, beset by hyperinflation and a shortage of hard currency, tether is also a lifeline for people who use it for quotidian payments and as a way to protect their savings.

Tether is arguably the first successful real-world product to emerge from the cryptocurrency revolution that began over a decade ago. It has made its owners immensely rich. Tether has $120 billion in assets, mostly risk-free U.S. Treasury bills, along with positions in bitcoin and gold. Last year it generated $6.2 billion in profit, out-earning BlackRock, the world’s largest asset manager, by $700 million.

The company behind tether, Tether Holdings, issues the virtual coins to a select group of direct customers, mostly trading firms, who wire real-world dollars in exchange. Tether uses those dollars to purchase assets, mostly U.S. Treasurys, that back the coin’s value. Once in the wider market, tether can be traded for other tokens or traditional currencies through exchanges and local brokerages. In Iran, for example, a crypto exchange called TetherLand allows Iranians to swap rials into tether. Tether vets the identities of its direct customers, but much of its vast secondary market goes unpoliced. The tokens can be pinged near-instantaneously along chains of digital wallets to obfuscate the source. A United Nations report in January 2024 said tether was “a preferred choice” for Southeast Asian money launderers. 

The company says it can track every transaction on public blockchain ledgers and can seize and destroy tether held in any wallet. But freezing wallets is a game of Whac-A-Mole. Between 2018 and this June, Tether blacklisted 2,713 wallets on its two most popular blockchains that had received a total of about $153 billion, according to crypto data provider ChainArgos. Of that massive sum, Tether could only freeze $1.4 billion because the rest of the funds had already been sent on.

Excerpts from Angus Berwick & Ben Foldy, The Shadow Dollar That’s Fueling the Financial Underworld, WSJ, Sept. 10, 2024

Can Your Smartphone Kill You? You Bet.

On September 17, 2024, nine people, including a child, have been killed after handheld pagers used by members of the armed group Hezbollah to communicate exploded across Lebanon, the country’s health minister says. Iran’s ambassador to Lebanon was among 2,800 other people who were wounded by the simultaneous blasts in Beirut and several other regions. Hezbollah, which is backed by Iran, said the pagers belonged “to employees of various Hezbollah units and institutions” and confirmed the deaths of eight fighters…Hours before the explosions, Israel’s security cabinet said stopping Hezbollah attacks on the north of the country to allow the safe return of displaced residents was an official war goal.

Hezbollah said an unspecified number of pagers – which the group relies on heavily for communications due to the risk of mobile phones being hacked or tracked – exploded at around 15:30 local time (12:30 GMT) (September 17, 2024) in the capital Beirut and many other areas. One CCTV video showed an explosion in a man’s bag or pocket at a supermarket. He is then seen falling backwards to the ground and crying out in pain as other shoppers run for cover. Hours later, ambulances were still rushing to hospitals overwhelmed with the number of casualties, 200 of whom the health minister said were in a critical condition. Most of the wounds were at the level of the waist, face, eyes and hands, he said, adding: “A lot of casualties have lost fingers, in some cases all of them.”

Overheated lithium-ion batteries can catch fire, but experts said hacking into the pagers and making them overheat would not usually cause such explosions. A former British Army munitions expert, who asked not to be named, told the BBC the pagers would have likely been packed with between 10g and 20g of military-grade high explosive, hidden inside a fake electronic component. Once armed by a signal, called an alphanumeric text message, the next person to use the device would have triggered the explosive, the expert said.

On September 18, 2024, walkie-talkies detonated in Lebanon, killing at least 20 people and wounding 450 in a fresh attack targeting Hezbollah, a day after pager blasts killed at least 12 people, including children, and injured thousands across the country

Excerpt from David Gritten, Hezbollah blames Israel after pager explosions kill nine and injure thousands in Lebanon, BBC, Sept. 18, 2024

What does Silicon Valley and the Israeli Army have In Common

Members of Unit 8200 of the Israeli Army, known for its advanced cybersecurity and cyberwarfare capabilities, have founded dozens of cybersecurity companies in the United States. Others have become influential venture capitalists in their own rights and are mentors to entrepreneurial graduates.  There are at least five tech companies started by Unit 8200 alumni publicly traded in the U.S., together worth around $160 billion. Private companies started by ex-8200 soldiers are worth billions more.  The largest, cloud-security company Wiz, in July 2024 came close to signing a $23 billion deal to be bought by Google. It would have been Google’s biggest acquisition ever. After the talks fell apart, Wiz Chief Executive and 8200 veteran Assaf Rappaport told employees he wants to hit $1 billion in revenue before planning a public-market listing. 

Wiz and the 8200 alumni are targeting a massive business problem—how to keep big companies secure—with skills and an intensity they learned from their time in the military. They and the companies they’ve built have become hot commodities as more industries move huge amounts of business documents to the cloud—which is constantly under attack from opportunistic hackers. While Unit 8200 alumni once talked about their service in hushed tones, they now tout it in press releases to attract clients and investment money for their startups.

Palo Alto Networks, the biggest publicly traded cybersecurity company, and itself a product of the 8200 pipeline, has purchased several companies led by alumni of the unit in recent years. Greylock Partners and Sequoia Capital, two of Silicon Valley’s most storied venture-capital firms, have recently hired Israel-based partners…

Elsewhere, alumni of other Israeli military units founded cybersecurity company NSO Group. It created software called Pegasus, which has been used by governments to access the devices of journalists and embassy workers, according to the U.S. Department of Commerce. The department put NSO Group on an export prohibition list three years ago, a decision its executives are working to reverse. This means exports from the U.S. to the company of both hardware and software will be blocked, unless the Commerce Department grants a license for a transaction.  

Excerpt from Miles Kruppa and Alex Perry, Silicon Valley in Love with Israeli Army, WSJ, Aug. 31, 2024

The Role of Telegram in the Russia-Ukraine War

Russian authorities have reacted with unusual fury to the arrest of Telegram founder Pavel Durov by French authorities on August 2024. Telegram is more than a mere social-media app to Moscow. Russian soldiers and spies depend on it for battlefield communications, including the guidance of artillery, the coordination of movements and intelligence gathering. “Many are joking that the arrest of Pavel Durov is essentially the arrest of the chief signals officer of the Russian armed forces,” said Aleksey Rogozin, a Russian parliament adviser and former senior military industry executive.

“As wild as it sounds, the transmission of intelligence, the targeting of artillery, the broadcasting of drone feeds and many other things are currently very frequently done via Telegram,” Rogozin said on Telegram… 

Both the Russian and the Ukrainian militaries started relying on commercial platforms. While the Ukrainians prefer Western providers such as Signal or Discord, the Russians chose Telegram because it is based in the United Arab Emirates, which maintains good relations with Moscow. They think the app is more impervious to Western signals intelligence.

Russian volunteers who supply drones, night-vision scopes, vehicles and other aid to military units operate almost exclusively through Telegram. The service also has offered a lucrative social-media platform to Russian war propagandists, with millions of subscribers, who work in close cooperation with the Russian Ministry of Defense.

“The detention of Durov, by itself, wouldn’t have necessarily caused such a resonance in Russia, except for one circumstance. De facto, it is the main messenger of this war, an alternative to the classified military network,” Andrey Medvedev, a correspondent for Russian state TV and a deputy chair of the Moscow city council, wrote on Telegram…

The Russian government has reacted to Durov’s detention in France with far more outrage and fury than would be expected given the circumstances of the entrepreneur’s departure from Russia in 2014…The director of Russia’s SVR external intelligence service, Sergey Naryshkin, said recently that he expects Durov not to share with French and other Western governments any information that would harm the Russian state. “I very much count on him not to allow it,” the Russian spymaster said in an interview with TASS news agency.

Excerpt from Yaroslav Trofimov, Telegram Arrest Sows Russian War Worries, WSJ, Aug. 31, 2024

Cold War Tactics: Taunting America in its Backyard

In  June 2024, China renewed a multibillion-dollar portion of a currency swap, alleviating concerns that Argentina would need to pay back the funds from its depleted reserves. Argentine President Javier Milei, who often derided China during his presidential campaign, calling its leaders “assassins,” thanked Beijing, saying the extension provided financial relief. His office said mutual respect with China is vital to Argentina’s development and prosperity. Milei, an unshakable opponent of communism, has taken a more pragmatic approach to Beijing, saying Chinese investments and trade are essential to Argentina’s future, while maintaining closer relations with the U.S. China has deepened its ties with Argentina in key economic sectors, from the lithium mining companies in the arid north to the agricultural industry on the farm belt’s vast open plains… 

China is Argentina’s second biggest trade partner, after neighboring Brazil, racking up about $20 billion in commerce in 2023, compared with $14 billion for the U.S. Argentina’s exports to China have increased eightfold over the past two decades, as the Asian country invested in mining, oil and gas, finance and construction. China’s stock of foreign direct investments is up 500% since 2015, to more than $3 billion,

Argentina recently bought U.S.-made jet fighters, forgoing an offer to purchase Chinese ones. A Chinese company, Shaanxi Coal and Chemical Industry Group, reached a deal in 2022 with officials in the province of Tierra del Fuego to build a port in Argentina’s far south, giving Beijing a strategic location for accessing Antarctica and a crucial shipping route through the Strait of Magellan. That project has now been shelved, an adviser to the Milei government said….

Particularly worrisome to Washington has been a Chinese space station in the windswept plains of Neuquén that has little oversight from the Argentine government. U.S. military officials worry the remote base, which has a 35-meter-wide antenna, could be used for global surveillance by targeting U.S. satellites. 

Excerpt from Ryan Dubé, Argentina’s Milei Finds It Hard to Decouple From China, WSJ, Aug. 18, 2024

US-China Locked in Perpetual Cat and Mouse Game

Chinese artificial-intelligence developers have found a way to use the most advanced American chips without bringing them to China. They are working with brokers to access computing power overseas, sometimes masking their identity using techniques from the cryptocurrency world. The tactic comes in response to U.S. export controls that have prevented Chinese companies from directly importing sought after AI chips developed by U.S.-based Nvidia. While it is still possible for Chinese users to physically bring Nvidia’s chips to China by tapping a network of gray-market sellers, the process is cumbersome and can’t supply all the needs of big users.

One entrepreneur helping Chinese companies overcome the hurdles is Derek Aw, a former bitcoin miner. He persuaded investors in Dubai and the U.S. to fund the purchase of AI servers housing Nvidia’s powerful H100 chips. In June 2024, Aw’s company loaded more than 300 servers with the chips into a data center in Brisbane, Australia. Three weeks later, the servers began processing AI algorithms for a company in Beijing. “There is demand. There is profit. Naturally someone will provide the supply,” Aw said.

Renting far away computing power is nothing new, and many global companies shuffle data around the world using U.S. companies’ services such as Google Cloud, Microsoft Azure and Amazon Web Services. However, those companies, like banks, have “Know Your Customer” policies that may make it difficult for some Chinese customers to obtain the most advanced computing power.

The buyers and sellers of computing power and the middlemen connecting them aren’t breaking any laws, lawyers familiar with U.S. sanctions say. Washington has targeted exports of advanced chips, equipment and technology, but cloud companies say the export rules don’t restrict Chinese companies or their foreign affiliates from accessing U.S. cloud services using Nvidia chips. The Commerce Department in January 2014 proposed a rule that seeks to prevent malicious foreign entities from using U.S. cloud computing services for activities including training large AI models. U.S. cloud companies argue that the rule won’t prevent abuse and could instead undermine customer trust and weaken their competitiveness.

In platforms used by Aw and others, the billing and payment methods are designed to give the participants a high degree of anonymity. Buyers and sellers of computing power use a “smart contract” in which the terms are set in a publicly accessible digital record book. The parties to the contract are identified only by a series of letters and numbers and the buyer pays with cryptocurrency. The process extends the anonymity of cryptocurrency to the contract itself, with both using the digital record-keeping technology known as blockchain. Aw said even he might not know the real identity of the buyer. As a further mask, he and others said Chinese AI companies often make transactions through subsidiaries in Singapore or elsewhere.

The service of selling scattered computing power is called a decentralized GPU model.

Excerpts from Raffaele Huang, China’s AI Engineers Are Secretly Accessing Banned Nvidia Chips, WSJ, Aug. 26, 2024

The Devil’s Scenario: Drone Striking Nuclear Power Plant

The International Atomic Energy Agency (IAEA) was informed on August 22, 2024 by Russia that the remains of a drone had been found within the Kursk nuclear power plant. Russian President Vladimir Putin on Thursday accused Ukraine of trying to strike the Kursk nuclear power plant in an overnight attack. The nuclear plant is located in western Russia, where fighting is raging between Russian and Ukrainian forces, is especially vulnerable to a serious accident because it lacks a protective dome that could shield it from missiles, drones or artillery, the head of IAEA said on August 27, 2024.

The nuclear plant– the same model as the Chernobyl plant in Ukraine that witnessed the world’s worst civilian nuclear disaster in 1986 – lacks the containment dome and protective structure that is typical of modern nuclear power stations. According to Grossi, director-general of the IAEA: “This means that the core of the reactor containing nuclear material is protected just by a normal roof. This makes it extremely exposed and fragile, for example, to an artillery impact or a drone or a missile,” So this is why we believe that a nuclear power plant of this type, so close to a point of contact or a military front, is an extremely serious fact that we take very seriously.”

Excerpt from UN watchdog says Russian nuclear plant ‘extremely exposed’ if attacked, Reuters, Aug. 27, 2024

Who is Ready for War with China in 2027: Venture Capitalists

Anduril Industries—named after a magical sword from J.R.R. Tolkien’s “Lord of the Rings” novels—is central to Silicon Valley’s quest to take on weapons makers like Lockheed Martin and Northrop Grumman. Since its founding in 2017, Anduril has raised $3.7 billion in venture funding, incl The newcomers’ hope is that the Pentagon will eventually kill off what Luckey, the CEO of Anduril, calls “old legacy zombie programs,” like expensive jet fighters and attack helicopters, and instead buy autonomous weapons, like drones and uncrewed submarines. The U.S. military, Luckey and others say, needs large numbers of cheaper and more intelligent systems that can be effective over long stretches of ocean and against a manufacturing and technological power like China. 

Many teams inside Anduril are building only weapons that can be completed by 2027—the year Chinese President Xi Jinping has said his country should be prepared to invade Taiwan. The fictional sword for which Anduril is named is also called the “Flame of the West.” For decades, the U.S. government funded defense companies, like Lockheed Martin, to develop new weapons, ranging from stealth aircraft to spy satellites. But as the private-sector money available for research and development has outstripped federal-government spending, particularly in areas like AI, a new cohort of defense startups is using private capital to develop technology for the Pentagon. The amount of private capital flowing into the venture-backed defense-tech industry has ballooned, with investors spending at least 70% more on the sector each of the past three years than any prior year. From 2021 through mid-June 2024, venture capitalists invested a total of $130 billion in defense-tech startups, according to data firm PitchBook. The Pentagon spends about $90 billion on R&D annually.

The Pentagon is credited with helping to create Silicon Valley by plowing money into tech companies in the 1950s and ’60s, investing in electronics and buying microchips used in nuclear-missile guidance systems, satellites, and computers. That investment, says Paul Bracken, an emeritus professor of management and political science at Yale University, led the Defense Department to become, in effect, the “mother of all venture-capital firms.

Excerpt from Sharon Weinberger, Tech Bros Are Betting They Can Help Win a War With China, WSJ, Aug. 9, 2024

How to Celebrate a Kid’s Birthday: the ISIS approach

In Syria, in 2024, American commandos are scrambling to contain a resurgence of Islamic State where the militant group once imposed its violent religious fervor on vast territories and millions of people. Islamic State is mustering forces in Syria’s Badiya desert, training young recruits to become suicide bombers, directing attacks on allied troops and preparing to resurrect its dream of ruling an Islamist caliphate, according to officers from the U.S. and the Syrian Democratic Forces (SDF), Kurdish-led troops whom the U.S. helped to defeat the militant group five years ago.

Militant fighters have doubled their pace of attacks in Syria and Iraq in 2024. They have targeted security checkpoints, detonated car bombs and plotted to free thousands of comrades jailed since the SDF and a U.S.-headed Western coalition recaptured the last Islamic State-held town. In a little-publicized campaign, American aircraft conduct airstrikes and provide live aerial surveillance to SDF ground forces who conduct raids on suspected Islamic State cells. While they usually stay a safe distance from the fighting, elite U.S. troops sometimes conduct missions on their own to kill or capture senior Islamic State leaders…

During the first six months of 2024, Islamic State claimed responsibility for 153 attacks in Syria and Iraq. It is building its ranks by surreptitiously indoctrinating youngsters in camps that hold thousands of wives and children of detained Islamic State fighters…

Some 9,000 Islamic State fighters remain in jails across northeastern Syria, however, and the group has made no secret of its intention to free its comrades so they can return to the battlefield…There are also some 43,000 Syrian, Iraqi and other displaced people living in camps in northeastern Syria, including many wives and children of jailed Islamic State fighters whom the SDF and U.S. see as potential recruits for the next generation of militants.

At the al-Hol camp, children draw in coloring books with images of hand grenades, AK-47 rifles and explosive suicide vests. U.S. soldiers have obtained photos of Islamic State-themed children’s birthday parties, the militants’ black-and-white flag hung on the wall amid the balloons. 

Excerpt from Michael M. Phillips, In Syria’s Hinterlands, the U.S. Wages a Hidden Campaign Against a Resurgent Islamic State, WSJ, Aug. 13, 2024

Why Americans Love Chinese Drones

China’s DJI drones  have been labeled a national-security risk by Republicans and Democrats, military officials and federal regulators. The U.S. government has placed tariffs on the drones and largely prohibited federal agencies from using DJIs. 

Yet DJI accounts for around 70% to 90% of the American commercial, local government and hobbyist drone market. Real-estate agents, movie producers, firefighters, roof inspectors, utilities and law enforcement have all come to depend on the brand. The Secret Service bought more than 20 of them in 2022 just before restrictions were put in place, according to federal purchasing records…Small drones have become essential tools in U.S. commerce and emerged as critical weapons in modern combat, handing the world’s largest supplier—DJI—enormous power. National-security experts say reliance on Chinese drones creates a dangerous dependency that China could exploit in a conflict.  Ukrainians have relied on DJI, while American models have often failed on the front lines—although soldiers have had to contend with security vulnerabilities…

American drones are in short supply with long wait times. Drone buyers say they sometimes have to wait close to five months for a U.S. drone, while DJIs are available immediately. “Are American drone companies ready to fill the void?” said Trevor Perrott, chief executive of Florida drone maker Censys Technologies. “No, we’re not ready. But DJI may very well be a Band-Aid we need to rip off for long-term gain.” 

Excerpts from Heather Somerville, Why First Responders Don’t Want the U.S. to Ban Chinese Drones, WSJ, Aug. 8, 2024

The US-China Supercomputer Rivalry

For decades, American and Chinese scientists collaborated on supercomputers, tennis-court-size machines essential to improving artificial intelligence, developing vaccines and predicting hurricanes. But Chinese scientists have become more secretive as the U.S. has tried to hinder China’s technological progress, and they have stopped participating altogether in a prominent international supercomputing forum.

The new secrecy also makes it harder for the U.S. government to answer a question it deems essential to national security: Does the U.S. or China have faster supercomputers? Some academics have taken it upon themselves to hunt for clues about China’s supercomputing progress, scrutinizing research papers and cornering Chinese peers at conferences.

Supercomputers have become central to the U.S.-China technological Cold War because the country with the faster supercomputers can also hold an advantage in developing nuclear weapons and other military technology. “If the other guy can use a supercomputer to simulate and develop a fighter jet or weapon 20% or even 1% better than yours in terms of range, speed and accuracy, it’s going to target you first, and then it’s checkmate,” said Jimmy Goodrich, a senior adviser for technology analysis to Rand Corp., a think tank.

The forum that China recently stopped participating in is called the Top500, which ranks the world’s 500 fastest supercomputers. While the latest ranking, released in June 2024, says the world’s three fastest computers are in the U.S., the reality is probably different. Officially, the fastest computer on the Top500 sits at the Energy Department-sponsored Oak Ridge National Laboratory, in Tennessee. Called Frontier, it is about the size of two tennis courts, cost $600 million to construct and has an electricity bill of about $20 million a year, said Dongarra, who also works at Oak Ridge. It uses tens of thousands of computer chips.

Dongarra doesn’t think Frontier is actually the world’s fastest supercomputer. Scientific papers suggest that certain Chinese machines are better. One has been referred to in state media as a prototype Tianhe-3, after a Chinese term for the Milky Way galaxy, while the other is a model in the Sunway series of supercomputers.

Excerpts from Stu Woo ,US China Rift Hits Supercomputer Ties, WSJ, July 24, 2024

China-Is-The-Virus: the Secret Propaganda Campaign of the United States

At the height of the COVID-19 pandemic, the U.S. military launched a secret campaign to counter what it perceived as China’s growing influence in the Philippines, a nation hit especially hard by the deadly virus. The clandestine operation has not been previously reported. It aimed to sow doubt about the safety and efficacy of vaccines and other life-saving aid that was being supplied by China, a Reuters investigation found. Through phony internet accounts meant to impersonate Filipinos, the military’s propaganda efforts morphed into an anti-vax campaign. Social media posts decried the quality of face masks, test kits and the first vaccine that would become available in the Philippines – China’s Sinovac inoculation. Reuters identified at least 300 accounts on X, formerly Twitter, that matched descriptions shared by former U.S. military officials familiar with the Philippines operation. Almost all were created in the summer of 2020 and centered on the slogan #Chinaangvirus – Tagalog for China is the virus.

The U.S. military’s anti-vax effort began in the spring of 2020 and expanded beyond Southeast Asia before it was terminated in mid-2021, Reuters determined. Tailoring the propaganda campaign to local audiences across Central Asia and the Middle East, the Pentagon used a combination of fake social media accounts on multiple platforms to spread fear of China’s vaccines among Muslims at a time when the virus was killing tens of thousands of people each day. A key part of the strategy: amplify the disputed contention that, because vaccines sometimes contain pork gelatin, China’s shots could be considered forbidden under Islamic law.

The military program started under former President Donald Trump and continued months into Joe Biden’s presidency, Reuters found – even after alarmed social media executives warned the new administration that the Pentagon had been trafficking in COVID misinformation. The Biden White House issued an edict in spring 2021 banning the anti-vax effort, which also disparaged vaccines produced by other rivals, and the Pentagon initiated an internal review, Reuters found….

Excerpts from CHRIS BING and JOEL SCHECTMAN, Pentagon ran secret anti-vax campaign to undermine China during pandemic, Reuters, June 14, 2024

 

Who Will be the First to Colonize the Solar System?

A Chinese spacecraft touched down on grasslands in China’s Inner Mongolia region in June 2024, carrying the first-ever rock samples from the far side of the moon. A scientific breakthrough in itself, the success also advanced China’s plan to put astronauts on the moon by 2030 and build a lunar base by 2035. Such momentum is worrying American space officials and lawmakers, who have their own ambitions to build moon bases.

Unlike the original space race between the Americans and the Soviets, the goal of the U.S. and China isn’t just to make a short trip to the moon. It is to build permanent human outposts on its most strategic location, the lunar south pole. And as both nations gear up to build stations there one day, it is looking likely that tensions in orbit will mirror those on Earth.

Some U.S. officials fear China is planning a land grab. Chinese officials suspect the same of the Americans and are teaming up with Russia and other friendly nations for its south-pole outpost. The successful completion of the Chang’e 6 mission shows that, by one measure, China is ahead for now. Its lunar program has now soft-landed on the moon four times since 2013, the latest mission scooping up rocks near the south pole with robotic arms…

Meanwhile, after a decades-long moon-landing hiatus, two U.S. companies this year launched lunar-surface missions under NASA contracts. One lander tipped on its side after touching down. The other didn’t try to land because of technical problems. At least two more private missions, with funding from NASA, are slated to try to get to the moon later this year….All this is piling pressure upon the world’s most storied space agency. Through its Artemis exploration program, the National Aeronautics and Space Administration plans to conduct multiple landings in the coming years, develop a logistics station in lunar orbit and eventually build permanent camps on the moon’s surface. But Artemis has faced repeated delays and cost overruns while relying on a complex mix of government workers and private contractors…

“Unlike the U.S.-Soviet space race of the 20th century, this new round of competition centers on the water ice at the lunar south pole, with its extraction and use as a common goal,” wrote four scientists affiliated with China’s Academy of Sciences in a paper published in May. “The ability to collect and utilize lunar resources is a mark of national prestige and geopolitical influence. “We’re talking about colonizing the solar system,” said Greg Autry, a NASA official during the Trump administration.

Excerpts from Stu Woo, Historic Moon Mission Moves China Ahead in Space Race With U.S., WSJ, June 25, 2024

Who Terrifies an American President?

Though tensions between Iran and the U.S. have ratcheted up since the Oct. 7, 2024 attacks on Israel by Tehran-backed Hamas, exports from Iran surpassed 1.5 million barrels a day in 2024 starting in February, substantially more than at the start of the Biden presidency. Most of that oil is bought by small Chinese refineries at discounted prices. The U.S. and its allies have been “very, very careful not to go too far and damage the ability of Western economies to function,” when it comes to sanctions, said John Smith, partner at Morrison Foerster and former head of the U.S. Treasury Department’s Office of Foreign Assets Control.

U.S. diplomats and energy officials have for decades worked around the globe to keep oil flowing, often involving uncomfortable alliances and accommodations. When the Treasury department hit Moscow with a wave of sanctions on June 12, 2024 over the Ukraine war, it targeted banks but left the country’s oil industry largely untouched. There is frustration among some staffers in the U.S. Treasury Department over the lack of action against oil-trading networks that ferry Russian and Iranian oil, including one that officials are currently investigating, according to U.S. diplomats and some of the energy-industry players briefed by current officials. The network is operated by a little-known trader from Azerbaijan who emerged as the premier middleman for Russia’s Rosneft Oil, The Wall Street Journal reported.

When the Treasury imposed sanctions on Russia’s state tanker owner, Sovcomflot, it also issued licenses exempting all but 14 of the company’s fleet, which data provider Kpler estimates totals 91 ships. Industry players said the exemption licenses were a green light to oil traders to do business with those ships, minimizing the risk that they would be targeted by future sanctions. The National Economic Council, led by Lael Brainard, and others within the administration worried that broader measures would lead to logistical problems in the oil market and boost inflation, said people familiar with the matter. Rising oil output from sanctioned countries is one reason crude prices have fallen from their highs earlier this year, analysts said…

In another example of the collision of foreign and energy policies, earlier this year, Washington asked Ukraine to stop attacking some Russian refineries with drones after the damage rattled global diesel and gasoline markets….

“Nothing terrifies an American president more than a gasoline-pump price spike,” said Bob McNally, president of consulting firm Rapidan Energy Group and former White House policy official under George W. Bush. “They will go to great lengths to prevent this, especially in an election year.”

Excerpts from Anna Hirtenstein et al., Biden Wants to Be Tough With Russia and Iran—but Wants Low Gas Prices Too, WSJ, June 26, 2024

 

What Ails the West: the Forgotten Art of Industrialization

For the past few years, the West has been trying to break China’s grip on minerals that are critical for defense and green technologies. Despite their efforts, Chinese companies are becoming more dominant, not less. They are expanding operations, supercharging supply and causing prices to drop. Their challengers can’t compete. Take nickel, which is needed for electric-vehicle batteries. Chinese processing plants that dot the Indonesian archipelago are pumping out vast quantities of the mineral from new and expanding facilities, jolting the market. Meanwhile, Switzerland-based mining giant Glencore is suspending operations at its nickel plant in New Caledonia, a French territory, concluding it can’t survive despite offers of financial help from Paris. The U.K.’s Horizonte Minerals, whose new Brazilian mine was expected to become a major Western source, said last month that investors had bailed, citing oversupply in the market. Lithium projects in the U.S. and Australia have been postponed or suspended after a surge in Chinese production at home and in sub-Saharan Africa. 

The only dedicated cobalt mine in the U.S. also suspended operations last year, five months after local dignitaries attended its opening ceremony. Its owners say they are struggling against a flood of Chinese-produced cobalt from Indonesia and the Democratic Republic of Congo.

Last year, non-Chinese production of refined cobalt declined to its lowest level in 15 years… The share of lithium mining done within China or by Chinese companies abroad has grown from 14% in 2018 to 35% this year… Over the same time, lithium processing done within China has risen from 63% in 2018 to 70%…China has many advantages in the race to lock up minerals. Its miners are deep-pocketed and aggressive, making bets in resource-rich countries that Western companies have long viewed as corrupt or unstable, such as Indonesia, Mali, Bolivia and Zimbabwe. State banks provide financing for power plants and industrial parks abroad, paving the way for further private Chinese investment.

China’s rapid industrial development also means its companies have spent decades fine-tuning the art of turning raw ore into metals. They can set up new facilities quickly and cheaply. A paper published in February by the Oxford Institute for Energy Studies pegs the costs of building a lithium refinery outside China as three to four times higher than building one within the country. In eastern Indonesia, Chinese companies have built a fleet of highly efficient nickel and cobalt plants over the past few years after mastering a technology Western miners long considered glitchy and expensive. The plants run on coal power, some of it new, at a time when the world is looking to phase out dirty energy. “It’s just a simple, straightforward engineering capability that the Chinese have that has been lost in the rest of the world,” said Jim Lennon, managing director for commodities strategy at Macquarie, an Australian bank. “The Chinese have this overwhelming competitive advantage now that can’t really be addressed.”….

Excerpts from Jon Emont, China Is Winning the Minerals War, WSJ, June 19, 2024

The Chemical Fingerprints of Trees and the Fight against Deforestation

Scientists are embarking on an effort to keep sanctioned Russian timber out of Europe by mapping the unique chemical fingerprints of trees, a process that could be used to vet corporate supply chains for other banned commodities. The project aims to bring science to bear in a fight by companies and governments to stop illegal wood from seeping into timber supply chains—complex, difficult-to-police networks of logging companies, sawmills, wood manufacturers and traders.

To start, a team led by the Washington-based nonprofit World Forest ID set its sights on sanctions the European Union placed on Russian and Belarusian timber following the invasion of Ukraine. The team analyzed thousands of wood samples of trees, then layered in advanced statistical models and artificial intelligence.  The result was a database allowing customs officials and corporate auditors to verify the origin of timber with a simple, lab-based test. 

Although work on the database is ongoing, furniture giant IKEA has already used it to vet suppliers for sanctioned timber after the war forced it to revamp its supply chain. Belgian authorities have also employed it to seize more than 260 tons of illegally shipped Russian timber.  If scaled up, the project could have broad implications for how companies source a range of other agricultural commodities, such as cotton and cacao, which have been linked to environmental and human rights abuses…

World Forest ID currently uses two tests to identify the chemical composition of wood samples. One measures the ratios of stable isotopes, which vary based on factors such as rainfall or temperature. The other test measures trace elements such as magnesium and copper, which vary based on the soils in which trees grow…The group interpolates results spatially using advanced statistical methods and machine learning. Those innovations on traditional forensic testing methods allow World Forest ID to predict the chemical signatures of trees harvested in areas where the group didn’t take samples.

Excerpts from Dylan Tokar, Keeping Sanctioned Russian Timber Out of the EU Is Tricky. This Nonprofit Has a Solution, WSJ, June 10, 2024

Chewing Gum and the Civil War in Sudan

Around 80% of the world’s gum arabic is harvested from Sudan’s acacia trees, which grow in the desert belt that stretches from Sudan’s western border with Chad to its eastern border with Ethiopia, covering an area of roughly 200,000 square miles. Gum arabic is a tasteless and odorless dried sap used as a stabilizer, thickening agent or emulsifier for many foods, drinks, cosmetics and medicines…The sap has become a key source of funding for both sides in the war, according to Sudanese traders. In addition to the RSF (Rapid Support Forces), a paramilitary group, collecting money through its control of most major agricultural routes, the Sudanese military—which runs the country’s de facto government—levies taxes and other tariffs on the gum arabic trade.

The U.S. has accused both sides in the conflict of committing war crimes. In September, 2023 the State Department slapped sanctions on two senior RSF commanders for their alleged involvement in ethnic killings, sexual violence and the looting and burning of communities, among other abuses. . Around 8.5 million Sudanese have been forced from their homes since the start of the war in April 2023. “Proceeds from the gum arabic exports are directly financing this fighting,” says Rabie Abdelaty, a Sudanese academic who has researched the gum arabic industry.

Despite these concerns, few companies have taken steps to make sure they are avoiding Sudanese gum arabic, based on interviews with manufacturers, suppliers and end-users. 

Excerpts from Alexandra Wexler, How Soda, Chocolate and Chewing Gum Are Funding War in Sudan, WSJ, May 23, 2024

Is Russia Developing Nuclear Anti-Satellite Weapons?

Russia launched a satellite, Cosmos-2553, into space in February 2022 . The satellite is designed to test components for a potential antisatellite weapon that would carry a nuclear device, U.S. officials said, according to the WSJ. The satellite that was launched doesn’t carry a nuclear weapon…The eventual weapon, if and when deployed in orbit, could wipe out satellites in a part of space dominated by American government and commercial assets, they said, including SpaceX’s Starlink constellation, which has proved critical for Ukraine’s war effort.

Excerpt from Warren P. Strobel, Russia Launched Research Spacecraft for Antisatellite Nuclear Weapon Two Years Ago, U.S. Officials Say, WSJ, May 16, 2024

A Spy in Plain Sight: Internet Cables

U.S. officials are privately delivering an unusual warning to telecommunications companies: Undersea cables that ferry internet traffic across the Pacific Ocean could be vulnerable to tampering by Chinese repair ships. State Department officials said a state-controlled Chinese company that helps repair international cables, S.B. Submarine Systems (SSB), appeared to be hiding its vessels’ locations from radio and satellite tracking services, which the officials and others said defied easy explanation.

The warnings highlight an overlooked security risk to undersea fiber-optic cables, according to these officials: Silicon Valley giants, such as Google and Meta Platforms, partially own many cables and are investing in more. But they rely on specialized construction and repair companies, including some with foreign ownership that U.S. officials fear could endanger the security of commercial and military data.

Hundreds of thousands of miles of underwater fiber-optic cables carry almost all the world’s international internet traffic. Dozens of lines lace the Pacific Ocean floor, shuttling data between the Americas, Asia and many island chains. SBSS is part of a regional consortium of companies that provides ships to fix undersea cables, including some belonging to major U.S. companies, by winching them to the surface, resplicing broken fibers that carry internet data and returning the lines to the sea floor… Underwater cables are vulnerable to tampering when they are brought to the surface for repairs, U.S. officials say. Tapping global data flows is still far easier on land, industry experts say. But at-sea repair could still offer an opportunity to install a device to remotely disable a cable or to study the technology in advanced signal repeaters installed by other companies.

SBSS was formed in 1995 as a Chinese-British joint venture. State-owned China Telecom has long held 51% of the business and is in the process of buying the remainder from U.K.-based Global Marine Systems, according to people familiar with the matter. A member of the Chinese Communist Party serves on the SBSS management team, according to the company’s website.

Safeguarding underwater cables has been a focus of U.S. national-security officials since the Cold War, when fears of Soviet espionage were paramount. In the 1970s, the U.S. secretly placed wiretaps on underwater Soviet lines in an intelligence coup known as Operation Ivy Bells….

SubCom, a U.S. cable ship company owned by private-equity giant Cerberus Capital Management, receives $10 million in annual U.S. government payments for participating in the Cable Security Fleet, a program partly overseen by the Pentagon…

Overall, cable owners have few choices with regard to repairing damaged undersea cables, as most repairing is done by an aging fleet of roughly 50 ships around the world…


Excerpts from U.S. Fears Undersea Cables Are Vulnerable to Espionage From Chinese Repair Ships, WSJ, May 19, 2024

How Russia Invaded Microsoft

Microsoft  said in March 2024 a Russian state-sponsored hacking group that stole information from its senior leadership team is still using that information to gain unauthorized access to its internal systems. The technology company disclosed in January  2024 that the group, which it has identified as Midnight Blizzard, had extracted information from a small percentage of employee email accounts, including members of its senior leadership team and employees in its cybersecurity and legal teams. Since that disclosure, the group has used that information to gain access to Microsoft’s source code repositories and internal systems. The volume of some aspects of the attack, including password sprays, jumped 10-fold in February compared with the already large volume Microsoft encountered in January, it said.

“Midnight Blizzard’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination, and focus,” Microsoft said. The company said that its investigations of Midnight Blizzard activities are continuing and that it is coordinating efforts with federal law enforcement. In a blog post last August 2023, Microsoft said it had detected Midnight Blizzard, previously known as Nobelium, launching targeted social-engineering attacks that used Microsoft Teams chats to phish for credentials. The former Nobelium group has been linked by U.S. authorities to the Foreign Intelligence Service of the Russian Federation and is known for its involvement in the massive SolarWinds hack of 2020.

Excerpts from Dean Seal, Microsoft Says Russian-Sponsored Hackers Still Using Stolen Information, WSJ, Mar. 9, 2024

Darfur Forever: when a country is not a country

Iran unsuccessfully pressed Sudan to let it build a permanent naval base on the African country’s Red Sea coast, something that would have allowed Tehran to monitor maritime traffic to and from the Suez Canal and Israel, according to a senior Sudanese intelligence official. Iran has supplied Sudan’s military with explosive drones to use in its fight with a rebel warlord and offered to provide a helicopter-carrying warship if Sudan had granted permission for the base…

Sudan had close ties with Iran and its Palestinian ally Hamas under longtime strongman Omar al-Bashir. After Bashir’s ouster in a 2019 coup, the leader of the country’s military junta, Gen. Abdel Fattah al-Burhan, initiated a rapprochement with the U.S. in an effort to end international sanctions. He also moved to normalize relations with Israel. Iran’s request to build a base highlights how regional powers are seeking to take advantage of Sudan’s 10-month-old civil war to gain a foothold in the country, a strategic crossroads between the Middle East and sub-Saharan Africa with a 400-mile Red Sea coastline.  Sudan’s military has been fighting the paramilitary Rapid Support Forces (RSF), led by Burhan’s former second-in-command, Lt. Gen. Mohamed Hamdan Dagalo, since mid-April 2023. The conflict has killed tens of thousands of people, displaced millions and triggered one of the world’s worst humanitarian crises The Biden administration has accused both the Sudanese military and the RSF of committing war crimes. The U.S. alleges the RSF also has committed crimes against humanity, including murder, rape and ethnic cleansing in the Darfur region in western Sudan.  U.N. officials have criticized Sudan for aerial bombing of civilian neighborhoods and depriving Sudanese civilians of desperately needed humanitarian aid. U.N. agencies have also accused the RSF of atrocities, including ethnically motivated attacks in Darfur…

The Wall Street Journal reported in October 2023 that Egypt has supplied drones to the Sudanese military and trained Sudanese troops in how to use them. The United Arab Emirates, meanwhile, has been sending weapons to the RSF, the Journal reported in August 2023…Dubai is the biggest importer of Sudanese gold and in 2022 a U.A.E.-based consortium signed a $6 billion deal to build a new port facility on Sudan’s Red Sea coast.

Excerpts from Nicholas Bariyo, Iran Tried to Persuade Sudan to Allow Naval Base on Its Red Sea Coast, WSJ, Mar. 3, 2024

What Do You Do When You Are Up for Sale?

Under an executive order issued on February 28, 2024, specific classes of Americans’ sensitive data, including genomic, biometric, personal health, geolocation, financial and certain types of personal identifiers, will generally be barred from being sold or transferred in vast tranches to “countries of concern” or vendors known to supply data to them. The countries of concern are China, Russia, North Korea, Iran, Cuba and Venezuela, and have a record of misusing data on Americans, an official said.

In 2023, the U.S. intelligence community issued a groundbreaking report acknowledging that the vast amount of Americans’ personal data available for sale, which are often bought and repackaged by data brokers and then resold through a labyrinthine ecosystem of vendors and resellers, has provided a valuable stream of intelligence for the U.S. government and adversaries alike. The report, commissioned by Director of National Intelligence Avril Haines, admitted that such streams created significant threats to privacy, and had rapidly grown in scale such that they had begun to replicate the results of intrusive surveillance techniques, such as hacking, that are typically more targeted.

The executive order is notably silent on the purchasing of commercially available data sets by the U.S. government.

Excerpts from Dustin Volz, U.S. Limits Sales of Americans’ Personal Data to China, Other Adversaries, WSJ, Feb. 129, 2024

Cars as a National Security Risk: Tesla v. BYD

In February 2024, President Biden ordered the Commerce Department to open an investigation into foreign-made software in cars, citing Chinese technology as a potential national-security risk. Chinese efforts to dominate the global auto industry posed clear security risks to the U.S. “Connected vehicles from China could collect sensitive data about our citizens and our infrastructure and send this data back to the People’s Republic of China,” Biden said in a statement. “These vehicles could be remotely accessed or disabled.”

The Biden administration has been trying to reduce the U.S. auto industry’s reliance on China, including using tax credits to boost electric-vehicle sales and pushing automakers away from Chinese suppliers. China became the world’s biggest auto exporter, shipping an estimated 5.26 million domestically made vehicles overseas, according to the China Passenger Car Association. Part of that growth came in the electric-vehicle market, where the country sold more than one million China-made EVs overseas.

Tesla Chief Executive Elon Musk has said Chinese car companies have already had much success outside of China and that they are now the “most competitive” globally.  “If there are not trade barriers established, they will pretty much demolish most other car companies in the world,” Musk said during Tesla’s earnings call in January 2024.

The Chinese government has also raised national-security concerns about Western-designed cars sold to its own citizens, saying they could be used for gathering data and information. In 2021, China restricted the use of Tesla vehicles by military staff and employees of key state-owned companies, saying the car’s cameras record images constantly and obtain data, including when, how and where the vehicles are used.

Excerpts from Gareth Vipers, Chinese Automakers Pose U.S. National-Security Threat, Biden Says, WSJ, Feb. 29, 2024

Underground Empires: Hamas v. Israel

Senior members of Hamas’s leadership in exile met in Doha, Qatar, earlier in February 2024 amid concerns that its fighters were getting mauled by an Israeli offensive in the Gaza Strip. Enemy troops were killing dozens of militants each day as they methodically overran Hamas strongholds. Then a courier arrived with a message from Yahya Sinwar, the head of Hamas in Gaza, saying, in effect: Don’t worry, we have the Israelis right where we want them.  Hamas’s fighters, the Al-Qassam Brigades, were doing fine, the upbeat message said. The militants were ready for Israel’s expected assault on Rafah, a city on Gaza’s southern edge. High civilian casualties would add to the worldwide pressure on Israel to stop the war, Sinwar’s message said, according to people informed about the meeting… 

Hamas fighters are now trying to avoid large firefights and instead use small-scale ambushes—using tools ranging from rocket-propelled grenades to recorded voices of hostages to lure Israeli troops into traps.  The ambushes have little chance of holding territory against Israel’s armored maneuvers. But they’re tailored to Hamas’s limited capabilities…Many in Israel’s military, from senior commanders to ordinary soldiers who spoke to The Wall Street Journal, worry that their accumulation of tactical wins on the battlefield might not add up to a lasting strategic victory. After nearly five months of intense fighting, Israel is still far from its declared war aim of eliminating Hamas as a significant military and political entity. “Fighting the enemy is like a game of whack-a-mole,” said an Israeli reservist in Khan Younis with the 98th Division….

Degrading Hamas’s capabilities is a realistic goal for Israel’s military, said Hussein Ibish, a scholar at the Arab Gulf States Institute, a think tank in Washington. But sustaining it would require fully occupying Gaza, which would give Hamas a target for a never-ending insurgency, he said. “Recent history shows that you can be an effective insurgency on a shoestring,” said Ibish. “Anyone can make an IED,” or homemade bomb, he said. “It’s easy to get a pistol. If you’re willing to die, you can kill soldiers.” 

Hamas… has shifted to hit-and-run attacks by tiny groups of two or three men, sometimes just one individual….Other Hamas ambushes use so-called sticky bombs, improvised explosives that attach themselves to Israeli armored vehicles with magnets or duct tape.…Hamas also tries to kill Israeli troops by putting booby traps in buildings throughout Gaza, many Israeli soldiers say. Booby traps have been widely found in the homes of Hamas operatives, but also in many civilians’ homes, Israeli soldiers said. Early on the explosives were placed around the buildings’ entrances. The Israelis soon stopped using the front door, instead blasting or bulldozing their way through the walls of a house. Hamas has adapted, placing explosive traps in items inside buildings, from gas storage balloons to children’s’ toys, Israeli soldiers said….In other cases, Hamas used voice recordings of hostages begging for help in Hebrew to try to draw soldiers into an ambush…

The Israelis have made only partial progress in finding and destroying Hamas’s vast tunnel network. Israeli officials now estimate that Hamas built around 350 miles of tunnels under Gaza, which is less than 30 miles long and up to 8 miles wide. There are thought to be several hundred tunnels under Khan Younis alone, which occupies an area roughly the size of the Bronx in New York…Hamas uses the tunnels as military headquarters, to maneuver across the enclave’s cities, protect its leaders, hide Israeli and other hostages, manufacture weapons and conduct hit-and-run attacks. The tunnels also contain a fixed-line phone system that Hamas used to communicate earlier in the war, along with walkie-talkies, burner SIMs and satellite phones. But with Israel hacking into those systems, the militants have increasingly shifted to using runners to convey verbal or written messages. 

The Israeli army has found no systematic solution for finding and destroying Hamas’s tunnels, many soldiers said. Tunnel entrances have been found in homes, schools, mosques, courtyards, streets and farm fields. Some are covered by steel doors, others by mattresses in a home. Israeli forces have mostly relied on drones and robots to search tunnels, only sending soldiers in later to avoid firefights in the narrow passages.

Excepts from Marcus Walker, Why Hamas Thinks it Still Could Win the War, WSJ, Feb.29, 2024

Death at Five Times the Speed of Sound: Hypersonics

The U.S. is years behind its biggest rivals in cutting-edge hypersonic missile technology. Silicon Valley is betting it can help the military catch up…Silicon Valley’s entry into the hypersonic race is one of the most ambitious examples of its recent dive into the defense industry…Seth Winterroth, a partner at Eclipse Ventures, a Silicon Valley defense-tech venture firm that backed hypersonic startup Ursa Major, said the enormity of the technical challenge of hypersonic systems requires collaboration between startups, large defense firms and the government…

Hypersonic aircraft and weapons fly at five times the speed of sound or faster, which is at least 3,800 miles an hour. The aircraft must be able to withstand temperatures of thousands of degrees. The major powers of the world are in a race to develop the most sophisticated missiles that can be launched from long distances, evade air defenses, maneuver and strike targets quickly—before the enemy can make preparations or even know they are coming….

Beijing surprised U.S. military leaders when, in 2021, it launched a hypersonic missile over the South China Sea that traveled at speeds of more than 15,000 mph. Russia is using hypersonic missiles against Ukraine, including a new one Moscow says can travel eight times the speed of sound with a 660-pound warhead. 

Excepts from Heather Somerville, Silicon Valley’s Next Mission: Help the U.S. Catch China and Russia in Hypersonic Weapons, WSJ, Feb. 28, 2024

Sinophobia or Rational Paranoia: the Cranes

The Biden administration plans to invest billions in 2024 in the domestic manufacturing of cargo cranes, seeking to counter fears that the prevalent use of China-built cranes with advanced software at many U.S. ports poses a potential national-security risk. The move is part of a set of actions taken by the administration that is intended to improve maritime cybersecurity….Administration officials said more than $20 billion would be invested in port security, including domestic cargo-crane production, over the next five years. The money, tapped from the $1 trillion bipartisan infrastructure bill passed in 2021, would support a U.S. subsidiary of  Mitsui, a Japanese company, to produce the cranes, which officials said would be the first time in 30 years that they would be built domestically.

Cranes at some ports used by the U.S. military were flagged as surveillance threats. Officials also raised the concern that the software on the cranes could be manipulated by China to impede American shipping or, worse, temporarily disrupt the operation of the crane.  “By design these cranes may be controlled, serviced and programmed from remote locations,” said Rear Adm. John Vann, who leads the Coast Guard cyber command, during a press briefing….

The U.S. military has been concerned about the cranes for years and has made efforts to skirt ports with the China-made cranes as best as possible, according to the senior U.S. military commander who oversees the military’s logistics operations.The Chinese can track the origin, destination and other data of the U.S. military’s containerized materiel to determine exactly where the military is shipping it, Cranes made by China-based ZPMC contain sensors that can register and track the origin and destination of containers…

China’s military doctrine gives priority to targeting “systems that move enemy troops,” including harbors and airports, Craig Singleton, a senior fellow at the Foundation for Defense of Democracies, a Washington think tank, said during congressional testimony in February 2023…“Increasingly, the Chinese are not merely seeking access to our networks; they are pre-emptively positioning to compromise and control them,” Singleton said in his testimony. “As a result, China is poised to impede the mobilization of American military forces, foment a state of disarray, and redirect national attention and resources in both war and short-of-war scenarios.”

Excerpts from Dustin Volz, U.S. to Invest Billions to Replace China-Made Cranes at Nation’s Ports, WSJ, Feb. 21, 2024

Guess Who Benefits from the Russo-Ukrainian War?

In the two years since Russia invaded Ukraine, the U.S. defense industry has experienced a boom in orders for weapons and munitions. Business is coming from European allies trying to build out their military capabilities as well as from the Pentagon, which is both buying new equipment from defense manufacturers and replenishing military stocks depleted by deliveries to Ukraine. Industrial production in the U.S. defense and space sector has increased 17.5% since Russia launched its full-scale invasion of Ukraine two years ago, according to Federal Reserve data.  Biden administration officials say that of the $60.7 billion earmarked for Ukraine in a $95 billion supplemental defense bill, 64% will actually flow back to the U.S. defense industrial base.  Recent spending by European governments on U.S. jet fighters and other military hardware represents “a generational-type investment. The past few years are equal to the prior 20 years,” said Myles Walton, a military industry analyst at Wolfe Research….Poland has placed orders worth about $30 billion for Apache helicopters, High Mobility Artillery Rocket Systems, or Himars, M1A1 Abrams tanks and other hardware, the department said. Germany spent $8.5 billion on Chinook helicopters and related equipment, while the Czech Republic bought $5.6 billion of F-35 jets and munitions.

The boost to the U.S. defense industry is just one way the fragmentation of the world economy along geopolitical lines is tightening U.S.-European relations, often to the benefit of the U.S. The U.S. became the world’s largest LNG exporter in 2023, and its LNG exports are expected to almost double by 2030 on already-approved projects. Around two-thirds of those exports go to Europe….

 The Ukraine war served as a warning for American defense strategists, said Cynthia Cook, a defense industry expert at the Center for Strategic and International Studies, a Washington-based think tank. “What Russia’s war pointed out relatively quickly is the constraints in the U.S. defense industrial base especially in terms of surging production rapidly. The good news is that this lesson has been learned when the U.S. is not directly at war.”

Excerpts from Tom Fairless, How War in Europe Boosts the U.S. Economy, WSJ, Feb. 20, 2024

The Under-Our-Noses Nasty Wars

Christopher Wray warned in February 2023 that Beijing’s efforts to covertly plant offensive malware inside U.S. critical infrastructure networks is now at “a scale greater than we’d seen before,” an issue he has deemed a defining national security threat. Citing Volt Typhoon, the name given to the Chinese hacking network that was revealed in 2023 to be lying dormant inside U.S. critical infrastructure, Wray said Beijing-backed actors were pre-positioning malware that could be triggered at any moment to disrupt U.S. critical infrastructure. Officials have grown particularly alarmed at Beijing’s interest in infiltrating U.S. critical infrastructure networks, planting malware inside U.S. computer systems responsible for everything from safe drinking water to aviation traffic so it could detonate, at a moment’s notice, damaging cyberattacks during a conflict.

The Netherlands’ spy agencies said in February 2024 that Chinese hackers had used malware to gain access to a Dutch military network in 2023. The agency, considered to have one of Europe’s top cyber capabilities, said it made the rare disclosure to show the scale of the threat and reduce the stigma of being targeted so allied governments can better pool knowledge.

A report released in February 2024 by agencies including the FBI, the Cybersecurity and Infrastructure Agency and the National Security Agency said Volt Typhoon hackers had maintained access in some U.S. networks for five or more years, and while it targeted only U.S. infrastructure directly, the infiltration was likely to have affected “Five Eyes” allies…

Excerpts from  Joe Parkinson, BI Director Says China Cyberattacks on U.S. Infrastructure Now at Unprecedented Scale, WSJ, Feb. 19, 2024

The Future of Political Assassination

The Pentagon killed a Kataib Hezbollah leader in downtown Baghdad in February 2024 using a weapon that employs six long blades to shred its target and minimize civilian casualties, defense officials said. The modified Hellfire missile, which inside the military is referred to colloquially as “the flying Ginsu,” recalling the popular knives sold on TV infomercials in the 1970s, was used to target Abu Baqr al-Saadi, the leader of Kataib Hezbollah in Syria. The U.S. use of the Ginsu in the Baghdad strike hasn’t been previously disclosed. …The weapon, formally known as the R9X and sometimes referred to as the Ninja bomb, is an inert Hellfire missile designed by the Pentagon and the CIA to kill terrorist leaders. It was employed, in part, because of concerns that killing innocent bystanders could inflame an already tense political situation in Iraq, which hosts roughly 2,500 American troops, the officials said. 

Imagery of the strike on al-Saadi, showing the remnants of a burning but largely intact vehicle, was reminiscent of others involving the Ginsu. A weapon with an explosive warhead, like the traditional Hellfire missile, would have likely destroyed the vehicle.  The U.S. has developed a variant of the Hellfire missile that replaces an explosive warhead with a ring of blades.

Excerpts from Pentagon Used Six-Bladed ‘Ginsu’ Weapon to Kill Iraqi Militia Leader, WSJ, Feb. 14, 2024

The Secret Fight over the Atlantic

In August 2023, Ali Bongo, then-president of the Central African nation of Gabon, made a startling revelation to a top White House aide: During a meeting at his presidential palace, Bongo admitted he had secretly promised Chinese leader Xi Jinping that Beijing could station military forces on Gabon’s Atlantic Ocean coast. Alarmed, U.S. principal deputy national security adviser Jon Finer urged Bongo to retract the offer, according to an American national security official. The U.S. considers the Atlantic its strategic front yard and sees a permanent Chinese military presence there—particularly a naval base, where Beijing could rearm and repair warships—as a serious threat to American security. “Any time the Chinese start nosing around a coastal African country, we get anxious,” a senior U.S. official said…

 China is conducting a backroom campaign to secure a naval base on the continent’s western shores, American officials say. And, for more than two years, the U.S. has been running a parallel effort to persuade African leaders to deny the People’s Liberation Army Navy a port in Atlantic waters. It’s a battle American officials say they are winning. So far, no African country with an Atlantic coastline has signed a deal with China, U.S. officials say. Authorities in Equatorial Guinea, a repressive, family-run oil state, have “consistently assured us that they will not have the P.R.C. construct a base,” the official said…

Only one African port, however, serves as a permanent base for Chinese ships and troops: The P.L.A.’s seven-year-old facility in Djibouti, which overlooks the strategic Red Sea where the U.S. and its allies are currently defending shipping routes against attacks from Iran-backed Houthi rebels from Yemen. The Chinese base, capable of docking an aircraft carrier or nuclear submarines, sits a short drive from the largest American base in Africa, Camp Lemonnier, a hub for the U.S. campaign against al-Shabaab, the virulent al Qaeda affiliate operating in Somalia.

Excerpt from Michael M. Phillips, U.S.-China Tensions Have a New Front: A Naval Base in Africa, WSJ, Feb. 10, 2024

Great Fear and Uphill Struggle: US, Japan and China

In Japan’s glory days of the the late 1980s, the country accounted for about half of the global semiconductor industry, and the U.S. was left to beg, plead and threaten as it tried to get a small slice of the Japanese market. A bestselling book in Japan during the Cold War’s waning days called “The Japan That Can Say No” suggested that Tokyo could leverage its dominance in semiconductors to control the world’s military balance—and perhaps help the Soviet Union instead of the U.S.

Today, the great fear driving chip investments in both U.S. and Japan is China. The U.S. policy calls for helping allies such as Japan build a supply chain that is less exposed to risks posed by a hostile Beijing. While the U.S. is expanding its own chip production through the Chips and Science Act, which includes some $53 billion of spending, people involved in the Rapidus project (between U.S. and Japan) said the U.S. needed further global diversification. ..The Rapidus project aims to get Japan back into the heart of the business of chip making by building facilities on the northern island of Hokkaido, known for its ski resorts. Rapidus says it wants to begin pilot production in 2025 and full-scale production in 2027. Some 6,000 workers are being drafted to put up the factory.

Japan’s Ministry of Economy, Trade and Industry has said that it intends to help Rapidus achieve its goals, and that it wants the Japanese semiconductor industry to have revenue of some $100 billion in 2030, triple the 2020 figure. The ministry is pitching in billions of dollars for additional projects in Japan. TSMC is building an $8.6 billion factory on the southern island of Kyushu and is in talks about a second. Assuming it gets the money, Rapidus still has to master a level of manufacturing technology attained so far by only two companies, TSMC and South Korea’s Samsung Electronics. Both are projected to have the ability to mass-produce 2-nanometer chips by 2025.

Excerpts from Peter Landers and  Yang Jie, Japan’s Plan to Become a Chipmaking Champ Hinges on This Football-Loving Engineer, WSJ, July 6, 2023

Food Security: The Silicon Valley of Seeds

The Communist Party’s top disciplinary body—after punishing graft in the military, domestic security organs and the financial sector—is now hunting officials, merchants and farmers it suspects of harvesting illicit profits from trade in grains and seeds. Tasked with being more forceful in safeguarding the nation’s “seed security,” authorities have investigated dozens of cases involving seed-related misconduct and, in several instances, imprisoned grain-sector officials on corruption charges…Officials say the goal is to stop the proliferation of fake and substandard seeds that could jeopardize food production and safety, while punishing officials, merchants and farmers who siphon agricultural subsidies and peddle low-grade seeds.

Xi has often highlighted food security as a national interest, calling on officials to ensure that China can fully nourish its 1.4 billion people. His demands have taken on greater urgency in recent years as he pushed to prepare his country for a potential confrontation with the U.S.—a major source of Chinese grain imports, including soybeans and corn—and forestall disruptions to food supplies for one of the world’s most populous nations…Today, Beijing sees the seed sector as one of several strategic industries where Western powers could flex their technological superiority to strangle a lagging China. Demonstrating his personal interest in this field, Xi has twice visited a seed-breeding base in the island province of Hainan that officials call the “Silicon Valley” of China’s seed industry.

China is the world’s largest grain producer, growing one-quarter of global supply on less than 10% of the world’s arable land. But its ability to feed its own people has slipped over recent decades by some estimates. ..Officials and state media have taken to comparing seeds to advanced semiconductor chips, a technology that China has pledged to master in its quest for a national renaissance…While China’s seed industry is strong enough to survive foreign strangulation, the country still falls behind in seed quality, according to the Farmers’ Daily, which recommended measures including “resolutely cracking down” on the trading of fake and mislabeled seeds, whereby officials and merchants defraud farmers with counterfeit or lower-grade goods marked as top-quality seeds….

Excerpts from China’s Corruption Hunters Target Produce Aisle in Push for Seed Security, WSJ, July 25, 2023

Whoever Controls Space Controls Everything

The U.S. military wants allies to train and plan together for space operations, in the same way that they already do in ground, air and naval combat, Gen. Chance Saltzman, chief of space operations, said in an interview in July 2023. The move comes amid concerns about China and Russia’s ability to disrupt the West’s satellites and new technology the two countries have developed, including satellites that can grab others

Russia, for instance, has conducted operations to disrupt Ukraine’s space-enabled communications. Saltzman said that Russia has been sending satellites “irresponsibly close” to those of other nations to shadow them. Moscow has “nesting doll” satellites, which can release an object that can be used to attack other objects in space, while China has tested robotic arms that can be used to grab other satellites. Both countries have demonstrated missiles that can destroy orbiting satellites…

“Quantity is a quality in itself,” he said, using an expression often employed in the military. For example, the satellites of a large coalition would be harder to target than those of one nation, he added.

Excerpt from Alistair MacDonald, U.S. Pushes Military Cooperation in Space, WSJ, July 18, 2023

Planning for the Invasion: Taiwan

If China were to invade Taiwan, it might start by severing the 14 undersea internet cables that keep the island connected to the world. Taiwan is adding cables and planning how to defend their landing points. But it is also testing antennae in 700 locations, including some outside Taiwan. These would be able to send and receive signals by means of satellites in low orbit, like the ones Starlink uses. The goal is to make the antennae “as mobile as possible” to survive an attack…China has the capability to shoot down satellites. But Starlink developed by SpaceX (Elon Musk) is made up of over 4,000 of them and aims eventually to have tens of thousands…Unsurprisingly, Taiwan is looking to reduce its dependence on others including Starlink. Its space agency is developing its own low-orbit communication satellites. The first is expected to be launched in 2025.

China’s low-orbit ambitions are much larger. In 2020 the government filed papers with the International Telecommunication Union, a UN body, for a 12,992-satellite constellation. A year later the government established China Satellite Networks Group Limited and tasked it with developing satellite internet. At least seven state-owned and private Chinese companies are building satellite factories, with the expectation that they will soon be able to produce several hundred small communications satellites per year.

Officials in Beijing have developed a space-race mentality. Specific orbits and radio frequencies are “rare strategic resources” that Starlink wants to “monopolize”, warned the Liberation Army Daily in 2022….The Liberation Army Daily complains that there is only room for 50,000 satellites in low-Earth orbit and that Starlink may eventually take up more than 80% of that space. But the calculation is not that straightforward, says Juliana Suess of the Royal United Services Institute, a think-tank in Britain. Imagine low orbit as a highway, she says. What needs to be calculated is how many moving cars that highway can safely accommodate. Much will depend on the size of satellites and their trajectories.” But at this moment, there is lack of norms surrounding traffic in low orbit.

Spacex has an important advantage. Satellites in low orbit don’t last very long, so the company replaces them on a regular basis. That entails a large number of rocket launches. Spacex has the world’s best system for that, the partially reusable Falcon 9 rocket. Now it is working on a much larger, fully reusable spacecraft called Starship which could launch hundreds of satellites at a time. Some Chinese companies appear to be trying to build knock-offs.

Excerpts from China in Space: A New Mandate in the Heavens, Economist, May 20, 2023


Who is Ready for the Future Global War?

The Economist magazine estimates that the new defense commitments of all countries …will generate over $200bn-$700bn in extra defense spending globally each year…
China’s defense budget has grown by about 75% in real terms in the past ten years. It wants to “basically complete modernization” of its forces by 2035, and become a “world class” military power by 2049. America thinks China wants the capability to invade Taiwan as early as 2027… Overall America’s advantage over its rivals has eroded in the past century…During the first, second and cold wars America’s adversaries had much smaller economies than America did. No longer. Today China’s GDP alone is nearly 80% of America’s.

In the decades after the cold war, the thinking was that to spend less on armies meant to spend more on infrastructure and public services and to lower debt or taxes. Since the 1960s the world has “released” about $4trn a year of spending at current prices in this way, equivalent to the global government budget for education. Now the peace dividend is turning into a “war tax”. How heavy will it be?…

America, by far the world’s largest defense spender, is devoting growing sums to research and development of future weapons. This includes hypersonic missiles, to catch up with China and Russia; “directed energy” such as powerful lasers to shoot down drones and missiles; and artificial intelligence and robotics. It is also buying as many munitions as its factories can produce—from 155mm artillery shells to anti-ship missiles. The war in Ukraine has exposed the extraordinary quantities of munitions needed in a conflict, as well as the inability of peacetime production lines to meet such demand.

America, Russia and China are investing in their nuclear arsenals, too. America is upgrading all legs of its “triad” of ground-, air- and submarine-launched nukes. Russia is working on esoteric weapons, such as the long-distance, nuclear-powered Poseidon torpedo designed to set off an underwater nuclear explosion that, propagandists boast, can cause destructive tidal waves. China is quickly expanding its arsenal, from several hundred warheads to 1,500 by 2035, according to the Pentagon…

Cyber-security, drones and satellite technology straddle both the civilian and military worlds. SpaceX, founded by Elon Musk, has launched American military satellites. Ukrainian warriors make extensive use of his Starlink constellation of satellites. It all amounts to a change of cultural mindset from tech firms that once shunned defense as morally tainted. A defense-tech ecosystem has sprung up in America…

One way or another, a new era of rearmament beckons. As General Mark Milley, chairman of America’s joint chiefs of staff, told the Senate recently: “Preventing great-power war through readiness and deterrence is very expensive, but not as expensive as fighting a war.” And the only thing more costly than that, as he explained, is losing one.

Excerpts from Farewell peace dividend: The Cost of the Global Arms Race, Economist, May 27, 2023 

Squeezing the U.S.–China’s Foothold in Latin America

China has gone from from hardly trading with Latin America at the turn of the century to overtaking the United States to become the top trading partner for South America, and the second almost everywhere else in Latin America. Annual goods trade between China and Latin America rose to $445bn in 2021, up from $12bn in 2000…. Latin America is increasingly useful to China in geopolitical terms, too.

On June 8th, 2023 the Wall Street Journal reported that the Communist government of Cuba had secretly agreed to allow China to set up an electronic-spying facility in the country. At first American and Cuban officials denied the story. Two days later the White House admitted that a base has existed for some time…China has long been thought to have a small military presence in Cuba and access to listening stations. It has several satellite ground-stations in Latin America, which are believed to also have spying purposes. A space observatory in Argentina is run by the Chinese army and its activities are opaque.

Deepening geopolitical ties follow closer economic ones. China is a big source of cash for the region. Between 2005 and 2021 Chinese state-owned banks loaned $139bn to Latin American governments. It has invested billions of dollars in the region, mainly in energy and mining. Some 21 countries in Latin America and the Caribbean have signed up to China’s Belt and Road Initiative, a massive global infrastructure-building spree.

Latin American countries are also turning to the yuan for trade and to include in their central-bank reserves. On June 2nd, 2023 Argentina doubled its currency-swap line with China, meaning that around a third of its central-bank reserves, which stand at $32bn, will effectively be in yuan. Last year, the yuan surpassed the euro to become the second-most important foreign currency in Brazil’s central-bank vaults… In April 2023 a Chinese state-owned power company reached an agreement to purchase two power suppliers in Peru that would give China a near-monopoly over the country’s energy grid. Some fret over Chinese construction of ports in the region, such as the Chancay megaport near Lima in Peru, fearing that they could be repurposed to military ends….China…has trained police forces from countries including Argentina and Brazil, donated cars and investigative equipment to Nicaragua and Costa Rica, and sold surveillance equipment to Ecuador….

Excerpts from China and Latin America: Comrades Across Continents, Economist, June 15, 2023

Squeezing China: the Asian NATO

In defense terms, America’s “pivot to Asia” is not a single move, but a weaving of initiatives—with overlapping bi-, tri-, quadri- and multilateral deals—to create an ever-thickening lattice on China’s periphery. Some deals are modest; many are uncertain if tested in war. But they amount to the “fortification of America’s forward defense perimeter in the western Pacific.”…Despite its pacifism, Japan is greatly boosting defense spending. American marines in Okinawa are practicing how to scatter and defend the islands and sea passages. The next link, Taiwan, is under intense strain, given China’s aim to retake the self-governing island by force if necessary. America may soon announce the first “drawdown” of weapons from its own arsenal, pre-emptively strengthening Taiwan much as it has armed Ukraine. The Philippines, the next link, is weaker but has agreed to give America access to nine bases in the country; in return America is helping to beef up its forces….

America is devising ways to disperse its jets in wartime and hardening the defense of Guam. It wants to project more power from Australia, where it rotates air force and marine units. It is working with Britain to supply nuclear-powered submarines to Australia under the aukus deal; the three are also working on new weapons, including hypersonic missiles. Farther afield, the Quad—America, Australia and Japan working with India—is not a formal security grouping, but their navies exercise together. Across the region, American-led war-games are becoming bigger and more sophisticated. Sometimes America’s security arrangements are limited, for instance its new defense deal with Papua New Guinea; or its efforts to help littoral states improve “maritime domain awareness” to, say, curb illegal fishing by Chinese fleets. This, too, helps enmesh America in the region…

China accuses America of building an “Asian NATO”. But the reality is a looser system. America’s friends and allies in the “Indo-Pacific” have no mutual-defense commitments akin to NATO’s Article 5, under which an attack on one is an attack on all, nor integrated multinational commands.

Excerpts from America and China: The Chain, Economist, June 15, 2023

Invisible CyberAttack: Volt Typhoon

Cybersecurity agencies in the U.S., the U.K., Canada, Australia and New Zealand—an intelligence-sharing group of countries known as the Five Eyes—said a Chinese state-sponsored actor is employing a tactic known as “living off the land,” which involves using built-in network administration tools to gain access to systems. The activity blends in with normal Windows system activities, allowing the actor to evade detection. The campaign is impacting communications, manufacturing, transportation, maritime and other sectors in parts of the U.S. and Guam, the American territory that hosts major military installations in the Pacific, according to a blog post from Microsoft, publisher of the Windows operating system. The tech giant said the Chinese actor, known as Volt Typhoon, is pursuing capabilities that could disrupt communication infrastructure between the U.S. and Asia in a future crisis.

China has consistently denied carrying out cyberattacks and has accused the U.S. of being the biggest culprit of such efforts…By gaining access to a system through the “living off the land” approach—and maintaining that access while remaining undetected—hackers can glean intelligence about how the system operates. It could also give them the ability to disrupt the system later with no warning—though the intent could just be information gathering…

Excerpts from Mike Cherney and Austin Ramzy, Hack Hurts Bid for Beijing Reset, WSJ, May 26, 2023

What Eats Alive the Global Banks of China

Eight years after Chinese leader Xi Jinping and his counterparts from Brazil, Russia, India and South Africa established the New Development Bank, with headquarters in Shanghai, it has all but stopped making new loans and is having trouble raising dollar funds to repay its debts…The New Development Bank is the lesser-known of two China-based multilateral lenders. Its larger cousin, the Asian Infrastructure Investment Bank (AIIB), in June 2023 landed in the middle of a public-relations crisis after a disgruntled executive accused it of being controlled by members of China’s Communist Party

Trouble at both banks, as well as at China’s giant Belt and Road infrastructure push, which has seen China spend $1 trillion to expand its influence across Asia, Africa and Latin America, spotlights growing difficulties for Beijing’s strategy to rearrange an international order it considers biased in favor of the West.  Both the AIIB and the New Development Bank were set up in large part to reduce developing countries’ dependence on dollar-based funding—alternatives to the International Monetary Fund that would help finance development in some of the world’s fastest-growing economies. 

The AIIB operates on a much larger scale than the New Development Bank, counting many Western countries such as the U.K. and Canada among its more than 100 members. The bank found itself in a political firestorm this week after its Canadian communications chief resigned and accused the bank’s management of being “dominated by the Communist Party,” allegations that the AIIB called baseless. Nonetheless, Canada’s government said it would halt all activity with the bank while it reviews the allegations, and the bank said it would conduct an internal review.

Meanwhile, the New Development Bank is fighting for its very survival, threatened by its own reliance on the U.S. currency. Two-thirds of the bank’s borrowings are dollar-denominated—hardly in line with the bank’s stated aim to break its members’ reliance on the dollar. 

Soon after Russian troops marched into Ukraine in February 2022, the bank froze all new lending to Russia to assure investors that it was complying with Western sanctions. However, Wall Street quickly became wary of lending to a bank nearly 20% owned by Russia. Xi’s deepening alignment with Russian President Vladimir Putin was another deterrent. Since then, the bank has had to take on increasingly expensive debt to service old borrowings and stay current with its own liquidity requirements. To bolster its resources, the bank is in talks with Saudi Arabia, Argentina and Honduras about becoming members…

Excerpts from Alexander Saeedy and Lingling Wei, A Bank China Built to Challenge the Dollar Now Needs the Dollar,  WSJ, June 17, 2023
 

The Law of the Jungle for Personal Data: Who Benefits?

The vast amount of Americans’ personal data available for sale has provided a rich stream of intelligence for the U.S. government but created significant threats to privacy, according to a newly released report by the U.S.’s top spy agency. Commercially available information, or CAI, has grown in such scale that it has begun to replicate the results of intrusive surveillance techniques once used on a more targeted and limited basis, the report found. “In a way that far fewer Americans seem to understand, and even fewer of them can avoid, CAI includes information on nearly everyone that is of a type and level of sensitivity that historically could have been obtained” through targeted collection methods such as wiretaps, cyber espionage or physical surveillance, the report concluded. 

In recent years, data brokers’ offerings have grown from basic address history and demographic information to include the trail of information generated by smartphone devices and apps, social-media platforms, automobiles and location trackers such as fitness watches. Such detailed information can now “cause harm to an individual’s reputation, emotional well-being, or physical safety,” said the report, which urged the intelligence community to develop better policies, procedures and safeguards around its acquisition of such information.  Virtually anyone can purchase the data, and the marketplace is loosely regulated in the U.S., which has no comprehensive national privacy law. 

Much of that data is sold to the government by vendors who claim it is “anonymized”—stripped of personal information such as names or addresses. But privacy advocates and researchers say that in the case of geolocation information on phones or cars, a name can often be inferred: Individuals typically park their cars at night and set down their phones at their homes. In the case of certain internet data, browsing behavior also can reveal personal information.

“If the government can buy its way around Fourth Amendment due-process, there will be few meaningful limits on government surveillance,” Wyden said in a statement, referring to the U.S. Constitution’s protections against “unreasonable searches and seizures.”

Excerpts from Byron Tau and Dustin Volz, U.S. Spy Agencies Buy Vast Quantities of Americans’ Personal Data, WSJ,, June 13, 2023

Perpetual Attack: 25-Year Cyberattack, Russia v. US

They US Federal Bureau of Investigation (FBI)  disabled a piece of malware Russia’s intelligence agency has allegedly used for two decades (!) to steal documents from NATO-allied governments and others, in an operation that highlights the FBI’s increasing efforts to go beyond arresting hackers and find new ways to disrupt cyberattacks.

In an affidavit filed in federal court in Brooklyn, a Federal Bureau of Investigation agent said the bureau had identified a long-running cyber-espionage campaign by officers in a unit of Russia’s Federal Security Service, or FSB, to take documents from other governments’ defense and foreign ministries, journalists and others, and route them through infected computers in the U.S. to cover their tracks. Security researchers have sometimes referred to the group of hackers as “Turla,” who are known to use a malware called “Snake.”

FBI agents identified U.S. computers infiltrated with the Snake malware, including in Oregon, South Carolina and Connecticut, and obtained court approval to issue commands to the malware to permanently disable it on those computers, officials said. The operation is the latest example of the FBI using an obscure legal authority to proactively disrupt Russian or Chinese cyberattacks by essentially infiltrating their systems. Investigators tracked the group’s daily activities to an FSB facility in Ryazan, outside Moscow.

Cybersecurity experts and U.S. officials said that Turla’s espionage activities can be traced back more than 25 years, though with rare exception the group’s hackers are adept at infiltrating systems without being noticed. For example, the group was linked to a major breach of U.S. classified systems in the late 1990s that compromised the Pentagon, other government agencies and defense contractors and was considered a watershed cyberattack that demonstrated the national security threat posed by Russian government hackers. In that case, it took years before the U.S. discovered the campaign (!).

Aruna Viswanatha and Dustin Volz, FBI Disables Malware Russia Allegedly Used to Steal Documents from NATO Allies, WSJ, May 9, 2023

The Problem with Military Efficiency

United States military suppliers consolidated at the Cold War’s end, under pressure to reduce defense costs and streamline the nation’s industrial base. Over the past three decades, the number of fixed wing aircraft suppliers in the U.S. has declined from eight to three. During the same period, major surface ship producers fell from eight to two, and today, only three American companies supply over 90% of the Pentagon’s missile stockpile. 

Lower-tier defense firms are often the sole maker of vital parts—such as black powder—and a single crisis can bring production to a standstill. Today that’s emerging as a gnawing problem for the U.S., whether in supplying weapons and ammunition to Ukraine or in restocking reserves to prepare for a potential confrontation with China in the new era of great-power competition…The Pentagon describes this vulnerability  as the “single source” problem. Only one foundry in the U.S. makes the titanium castings used in howitzers, and only one company makes the rocket motor used in the Javelin antitank weapon widely used in Ukraine…

U.S. defense contractors’ inability to quickly replenish weaponry such as missiles and munitions for Ukraine has led Pentagon officials to argue that industry consolidation has gone too far and raised questions about how prepared America is for conflict. 

Excerpts from Gordon Lubold, US Military Has Explosive Problem, WSJ, Apr. 27, 202

How to Track 1,000 People at the Same Time

DARPA is striving to help the military keep track of up to 1,000 targets on earth through the development of new satellite software–a program called ‘Oversight.’

From the DARPA website: DARPA, the U.S. Space Force, and the Space Development Agency (SDA) are developing new satellite constellations to increase the tactical capabilities of U.S. space systems…’Oversight’ seeks software solutions to enable autonomous constant custody, or knowledge of target location within accuracies necessary for mission needs, of up to 1,000 targets from space assets through management of available satellite hardware resources. The project aims to support both peacetime and wartime monitoring of high value targets in contested environments where resources and targets may be highly dynamic.

Current practices require human operators for exquisite satellite solutions. This arrangement does not scale well for the numbers of targets that Oversight is considering. Reliance on individual ground station operators significantly increases latency and minimizes tactical utility of satellite sensor data. Oversight will develop the autonomy necessary to track targets with the operator overseeing at an aggregate level. It will also leverage existing and/or state-of-the-art networks to provide collaboration between satellite and ground resources.

Why China Lags Behind in Artificial Intelligence

China is two or three years behind America in building foundation models of AI. There are three reasons for this underperformance. The first concerns data. A centralized autocracy should be able to marshal lots of it—the government was, for instance, able to hand over troves of surveillance information on Chinese citizens to firms such as SenseTime or Megvii that, with the help of China’s leading computer-vision labs, then used it to develop top-notch facial-recognition systems.

That advantage has proved less formidable in the context of generative AIs, because foundation models are trained on the voluminous unstructured data of the web. American model-builders benefit from the fact that 56% of all websites are in English, whereas just 1.5% are written in Chinese, according to data from w3Techs, an internet-research site. As Yiqin Fu of Stanford University points out, the Chinese interact with the internet primarily through mobile super-apps like WeChat and Weibo. These are “walled gardens”, so much of their content is not indexed on search engines. This makes that content harder for ai models to suck up. Lack of data may explain why Wu Dao 2.0, a model unveiled in 2021 by the Beijing Academy of Artificial Intelligence, a state-backed outfit, failed to make a splash despite its possibly being computationally more complex than GPT-4.

The second reason for China’s lackluster generative achievements has to do with hardware. In 2022 America imposed export controls on technology that might give China a leg-up in AI. These cover the powerful microprocessors used in the cloud-computing data centrers where foundation models do their learning, and the chipmaking tools that could enable China to build such semiconductors on its own.

That hurt Chinese model-builders. An analysis of 26 big Chinese models by the Centre for the Governance of ai, a British think-tank, found that more than half depended on Nvidia, an American chip designer, for their processing power. Some reports suggest that SMIC, China’s biggest chipmaker, has produced prototypes just a generation or two behind TSMC, the Taiwanese industry leader that manufactures chips for Nvidia. But SMIC can probably mass-produce only chips which TSMC was churning out by the million three or four years ago.

Chinese AI firms are having trouble getting their hands on another American export: know-how. America remains a magnet for the world’s tech talent; two-thirds of ai experts in America who present papers at the main ai conference are foreign-born. Chinese engineers made up 27% of that select group in 2019. Many Chinese AI boffins studied or worked in America before bringing expertise back home. The covid-19 pandemic and rising Sino-American tensions are causing their numbers to dwindle. In the first half of 2022 America granted half as many visas to Chinese students as in the same period in 2019.

The triple shortage—of data, hardware and expertise—has been a hurdle for China. Whether it will hold Chinese ai ambitions back much longer is another matter.

Excerpts from Artificial Intelligence: Model Socialists, Economist,  May 13, 2023, at 49

Dirty Air: the Lack of Cross-Border Cooperation

An airshed is a geographical area where local topography and meteorology limit the dispersion of pollutants away from the area. Research and practice has shown that regulating pollution by taking into account airsheds, rather the arbitrary boundaries of cities and towns, can be a cost-effective way of fighting pollution.

Managing air pollution by taking into account the airsheds has done successfully in Europe and China, whose capital was once as synonymous with smog as New Delhi, India, is today. Beijing’s air is now cleaner chiefly thanks to the creation in 2013 of a powerful airshed-wide authority responsible for the capital, the city of Tianjin and 26 adjacent prefectures. In 2017 pm2.5 levels in Beijing were half those of the previous year.

India is trying to follow this example in and around Delhi. In 2021 it launched a pollution-control agency, called the Commission for Air Quality Management, with responsibility for a 55,000-square-km area, encompassing the capital and parts of Haryana, Rajasthan and Uttar Pradesh… Yet a decisive way to deal with air pollution in India will require a major expansion of this approach, according to the World  Bank.

The World Bank has identified six regional airsheds of South Asia. They are vast areas, covering multiple urban, provincial and national jurisdictions. Significantly, four of the six cross national borders. One stretches from eastern Iran into western Afghanistan and southern Pakistan; another covers much of northern India and western Bangladesh. According to the World Bank’s modelling, the more coordinated the pollution controls adopted in these airsheds, the more cost-effective and beneficial they would be.

The ideal scenario, it suggests, would be for authorities within a given airshed to co-operate, across national borders, on data-sharing and policy formulation, while each working towards a locally determined target. This would allow them to prioritize relatively easy or low-cost forms of pollution control—such as regulating brick kilns—over more difficult or expensive sorts, such as closing coal-fired power stations. The World Bank reckons that in this scenario South Asian life expectancies would rise, infant mortality would drop and health-care expenditure would fall. For a cost of $5.7bn, it estimates the approach could bring economic benefits worth $52.5bn by 2030.

The idea of Bangladesh, India and Pakistan—let alone Afghanistan and Iran—working together to such an extent… might almost seem absurd. South Asia is one of the most unneighborly, least-integrated regions in the world. It is haunted by a history of war and mutual suspicion. Its cross-border linkages are meagre. Trade within the region is just 5% of its members’ total trade…

Excerpts from, South Asia’s Filthy Air: Choked and Gasping, Economist, Feb. 18, 2023.

Late Paranoia Better than None: US v. Chinese Cranes

In recent years, U.S. national-security officials have pointed to a range of equipment manufactured in China that could facilitate either surveillance or disruptions in the U.S., including baggage-screening systems and electrical transformers, as well as broader concerns about China’s growing control of ports around the world through strategic investments. China makes almost all of the world’s new shipping containers and controls a shipping-data service. In that context, the giant ship-to-shore cranes have drawn new attention. The $850 billion defense policy bill lawmakers passed in December requires the Transportation Department’s maritime administrator, in consultation with the defense secretary and others, to produce an unclassified study by the end of this year on whether foreign-manufactured cranes pose cybersecurity or national-security threats at American ports.

ZPMC cranes entered the U.S. market around two decades ago, offering what industry executives described as good-quality cranes that were significantly cheaper than Western suppliers. In recent years, ZPMC has grown into a major player in the global automated-ports industry, working with Microsoft Corp. and others to connect equipment and analyze data in real time…Today, ZPMC says it controls around 70% of the global market for cranes and has sold its equipment in more than 100 countries. A U.S. official said the company makes nearly 80% of the ship-to-shore cranes in use at U.S. ports…

The huge cranes are generally delivered to U.S. ports fully assembled on ships and are operated through Chinese-made software. In some cases, U.S. officials said, they are supported by Chinese nationals working on two-year U.S. visas, factors they described as potential avenues through which intelligence could be collected…Early in the Trump administration, officials in the National Security Council’s strategic planning office came to consider cranes as a unique point of interest, said Sean Plankey, a former cybersecurity official who was involved in those discussions. “Where would someone attack first and how would they do it?” he asked, characterizing the discussion. He said the officials determined that if Beijing’s military could access the cranes, they could potentially shut down U.S. ports without drawing on their navy.

A National Maritime Cybersecurity Plan, released in December 2020, found that no single U.S. agency had responsibility for maritime network security, leaving port directors without enforceable standards on cybersecurity and generally free to buy equipment from any vendor.

Excerpts from Aruna Viswanatha, Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools, WSJ, Mar. 6, 2023.

Visible and Vulnerable: the Power Grid and Terrorism

Physical attacks on the U.S. power grid rose 71% last year compared with 2021 and will likely increase this year, according to a confidential industry analysis viewed by The Wall Street Journal. A division of the grid oversight body known as the North American Electric Reliability Corporation found that ballistic damage, intrusion and vandalism largely drove the increase. The analysis also determined that physical security incidents involving power outages have increased 20% since 2020, attributed to people frustrated by the onset of the pandemic, social tensions and economic challenges.

The NERC division, known as the Electricity Information Sharing and Analysis Center, or E-ISAC, recorded the sharp increase in incidents in 2022, driven in part by a series of clustered attacks on infrastructure in the Southeast, Midwest and Pacific Northwest. One of the most significant incidents occurred in early December 2022 when attackers targeted several substations in North Carolina with gunfire, leaving roughly 45,000 people in the dark…The number of politically or ideologically motivated attacks appears to be growing though it is difficult to identify the reasons for each one.  There seems to be a pattern where people are targeting critical infrastructure, probably with the intent to disrupt. In 2013, snipers targeted a large-scale transmission substation near San Jose, Calif., and raised fears that the country’s power grid was vulnerable to terrorism. The attack took out 17 transformers critical to supplying power to Silicon Valley, authorities said. A former federal regulator at the time called the event “the most significant incident of domestic terrorism involving the grid that has ever occurred.”

Excerpts from Katherine Blunt, Power-Grid Attacks Surge and Are Likely to Continue, Study Finds, WSJ, Feb. 22, 2023

Under Wraps: US-China Hostilities

The mid-air crash in 2001 between an American EP3 spy plane and a Chinese fighter jet that left the Chinese pilot dead and 24 American crew members in detention after an emergency landing in China.

China seized an American underwater drone in the South China Sea in 2016. The U.S. sent radio messages requesting that the drone be returned, but the Chinese ship merely acknowledged the messages and ignored the request. The US subsequently demanded the drone’s return.

The Military Internet: DARPA, Amazon and Space X

Satellites are crucial military infrastructure for spying and communications. They are also vulnerable to attack and disruption. In November 2021, three months before it invaded Ukraine, Russia fired a missile into a defunct satellite. Then, in October, a Russian diplomat declared even commercial satellites could be legitimate targets. Satellite systems used by Ukraine have been hacked and jammed. Ground antennae have been attacked.

In light of this sort of thing, America’s military establishment is worried that its satellite network is not up to snuff. But it has a plan. The Space-Based Adaptive Communications Node (Space-BACN, or “Space Bacon”) will, if successful, create a laser-enabled military internet in orbit around Earth by piggybacking on a number of satellites that would have been launched anyway.

Space Bacon is a brainchild of DARPA, the special-projects research arm of the Department of Defense, and is an intriguing orbiting echo of the original, terrestrial ARPNET, which evolved into the internet…The plan is to fit as many newly launched satellites as possibly with laser transceivers that will be able to communicate with counterparts as far away as 5,000km. Satellite owners will pay for these transceivers, but will then receive payments from the American government for their use.

Space Bacon promises many benefits. Unlike radio, the normal mode of communication with and between satellites, transmissions by laser beam are hard to intercept and almost impossible to jam. Indeed, adversaries might not even know when a transmission is taking place, a bonus for operational secrecy.

DARPA wants Space Bacon to cost a maximum of $100,000 a satellite, the better to encourage participation. It bodes well that Amazon, SpaceX and Viasat are all designing command-and-control architectures for Space Bacon.

Excerpts from DARPA, lasers and an internet in orbit, Economist, Feb. 11, 2023

How Countries Dissolve: the Conquest of Africa

As Wagner fighters, a Russian mercenary group, play a central role in Russia’s war in Ukraine, the group is quietly expanding its alliances in Africa, penetrating new mineral-rich areas, exploiting the exit of Western powers and creating alliances with local fighters. Wagner fighters and instructors are working with the government of the Central African Republic in a bid to seize areas rich with precious minerals that could be exported through Sudan, say Western security officials. Wagner is also looking to expand its influence in Burkina Faso and Ivory Coast, while consolidating its relationship with the military junta in Mali

With an estimated 5,000 men stationed across Africa, Wagner’s footprint is now almost as large as the U.S.’s 6,000 troops and support personnel on the continent. ..The push aims to create a corridor from Wagner-controlled mines in the Central African Republic through Sudan, where the group works closely with a local strongman, and onto the mineral trading hub of Dubai.

In January 2023,  Mr. Prigozhin, head of Wagner, stressed that sending fighters to Africa was “absolutely necessary.” “There are presidents to whom I gave my word that I would defend them,” he said on his Telegram channel. “If I now withdraw one hundred, two hundred or five hundred fighters from there, then this country will simply cease to exist.”  

Excerpts from Benoit Faucon & Joe Parkinson, Wagner Group Aims to Bolster Putin’s Influence in Africa, WSJ, Feb. 14, 2023

Sanctions Busters for Russia

In the year since the war in Ukraine began, once-dominant Western firms have pulled back from trading, shipping and insuring Russian oil. In their place, mysterious newcomers have helped sell the country’s crude. They are based not in Geneva, but in Hong Kong or Dubai. Many have never dealt in the stuff before. The global energy system is becoming more dispersed, divided—and dangerous.

Russia’s need for this alternative supply chain, present since the war started, became more pressing after December 5th, 2022 when a package of Western sanctions came into effect. The measures ban European imports of seaborne crude, and allow Russian ships to make use of the West’s logistics and insurance firms only if their cargo is priced below $60 a barrel. More sanctions on diesel and other refined products will come into force on February 5th, 2023 making the new back channels more vital still.

The Economist has spoken to a range of intermediaries in the oil market, and studied evidence from across the supply chain, to assess the effect of the sanctions and get a sense of what will happen next. We find, to the West’s chagrin and Russia’s relief, that the new “shadow” shipping and financing infrastructure is robust and extensive. Rather than fade away, the grey market stands ready to expand when the next set of sanctions is enforced.

As expected, China and India are picking up most of Russian embargoed oil barrels. Yet there is a surprise: the volume of cargo with unknown destinations has jumped. Russian oil, once easy to track, is now being moved through more shadowy channels….Battered tankers as much as half a century old sail to clandestine customers with their transponders off. They are renamed and repainted, sometimes several times a journey. They often transit via busy terminals where their crude is blended with others, making it harder to detect. Recently, several huge tankers formerly anchored in the Gulf were spotted taking cargo from smaller Russian ships off Gibraltar. Oman and the United Arab Emirates (UAE), which imported more Russian oil in the first ten months of 2022 than in the previous three years combined, seem to have blended and re-sold some to Europe. Malaysia is exporting twice as much crude to China as it can produce. Much of it is probably Iranian, but ship-watchers suspect a few Russian barrels have snuck in, too.

Most of Russia’s crude runs through grey networks which do not recognize the price cap but are not illegal, because they use non-Western logistics and deliver to countries that are not part of the blockade. friendlier locations…More than 30 Russian trading outfits have set up shop in Dubai—some under new names—since the war started. As Western traders have withdrawn, newcomers have emerged to sell to India, Sri Lanka, Turkey and others. Most have no history of trading Russian oil, or indeed any oil; insiders suspect the majority to be fronts for Russian state firms….

For Russia, growth in the grey trade has advantages. It puts more of its export machine outside the control of Western intermediaries. And it makes pricing less transparent.  Meanwhile, Russia’s sanctions-dodging will have nasty side-effects for the rest of the world. A growing portion of the world’s petroleum is being ferried by firms with no reputation, on ageing ships that make longer and dicer journeys than they have ever done before. Were they to cause an accident, the insurers may be unwilling or unable to cover the damage. Ukraine’s allies have good reasons for wanting to wash their hands of Russian oil. But that will not prevent debris from nearby wreckages floating to their shores. 

Excerpts from the The Economic War: Ships in the Night, Economist, Feb. 4, 2023

The Chinese Balloon and the American Psyche

The U.S. blacklisted six Chinese companies on February 10, 2023  that it said were involved in Beijing’s surveillance-balloon program, in a move taken in retaliation for the suspected spy balloon that traversed the U.S. The companies blacklisted are Beijing Nanjiang Aerospace Technology; China Electronics Technology Group Corporation 48th Research Institute; Dongguan Lingkong Remote Sensing Technology; Eagles Men Aviation Science & Technology Group; Guangzhou Tian-Hai-Xiang Aviation Technology; and Shanxi Eagles Men Aviation Science & Technology Group.

The Commerce Department’s Bureau of Industry and Security said the Chinese entities were added over their support for the People’s Liberation Army’s aerospace programs, including airships and balloons and related materials and components.  “The PLA is utilizing High Altitude Balloons (HAB) for intelligence and reconnaissance activities,” it said….  While many national-security analysts have been sounding the alarm about China’s surveillance practices in recent years, the balloon offered the American public a visible picture of the Chinese threat as it crossed much of the nation.

The newly formed House Select Committee on the Strategic Competition Between the U.S. and the Chinese Communist Party is likely to press for tougher U.S. measures to slow China’s advance, said Emily Benson, a senior fellow at the Center for Strategic and International Studies. “This is a really concrete example of an issue that Washington has so far not succeeded in penetrating the American public’s mind,” Ms. Benson said. “This could be kind of a pivotal moment for the American psyche to really start to realize that China is important and that this is a policy area they should be tuning in to.”

Excerpts from Ian Talley and Vivian Salama, U.S. Blacklists Chinese Companies It Links to Balloon Program, WSJ, Feb. 11, 2023

Money and Power: First Spaceport in Africa Built by China in Djibouti

When China began building its first overseas military outpost—a naval base in Djibouti—America and its allies were alarmed. The facility, which opened in 2017, sits just 13km (eight miles) from America’s largest base in Africa. France, Japan and Italy have bases there, too. Before long the Americans accused China’s forces of shining lasers at their pilots. China complained that Western aircraft were overflying its outpost to photograph it.

That friction has since lapsed into grudging coexistence in the former French colony, which is not much bigger than New Jersey. But a new threat to this uneasy balance has emerged with the announcement on January 9, 2023 that a Hong Kong-based company with links to Huawei, a Chinese telecoms giant, will build and operate a spaceport covering at least ten square kilometers (four square miles) in Djibouti.

The facility will include seven launch-pads and three rocket-testing pads, says Hong Kong Aerospace Technology Group Ltd (HKATG), which signed a memorandum of understanding on the project with Djibouti’s government and a Chinese company that operates a special economic zone there. In March they will sign a contract for the deal, which allows construction of power stations, water plants, roads and seaports.

Ismail Omar Guelleh, Djibouti’s president, said on Twitter that the $1bn spaceport will take five years to build and be transferred to the government after 30 years. If completed, the spaceport offers Djibouti a chance to claim a piece of the multi-billion-dollar global space industry. There are about two dozen active spaceports worldwide. Africa has none…Djibouti has much to offer. It is not far from the equator, where the Earth rotates fastest, giving rockets a boost. Access to the sea would enable clients to import rockets and other bulky equipment by ship. They could also launch eastwards over the ocean, minimizing risks for people in surrounding areas while taking advantage of the Earth’s rotation.

For China, which hopes to develop a private space industry to rival America’s, Djibouti could provide an alternative to the four launch sites on its own soil. These are operating at capacity…

Excerpts from China, Africa and Space: Preparing for Launch, Economist, Jan. 21, 2023

Rebranding Saudi Arabia as a Nuclear Superpower

Saudi Arabia plans to use domestically-sourced uranium to build up its nuclear power industry, energy minister Prince Abdulaziz bin Salman said in January 2023. Saudi Arabia has a nascent nuclear programme that it wants to expand to eventually include uranium enrichment, a sensitive area given its role in nuclear weapons. Riyadh has said it wants to use nuclear power to diversify its energy mix. It is unclear where its ambitions end, since Crown Prince Mohammed bin Salman said in 2018 that the kingdom would develop nuclear weapons if regional rival Iran did.

“The kingdom intends to utilize its national uranium resources, including in joint ventures with willing partners in accordance with international commitments and transparency standards,” Abdulaziz bin Salman said. He told a mining industry conference in Riyadh that this would involve “the entire nuclear fuel cycle which involves the production of yellowcake, low enriched uranium and the manufacturing of nuclear fuel both for our national use and of course for export“.

Fellow Gulf state the United Arab Emirates (UAE) has the Arab world’s first multi-unit operating nuclear energy plant. The UAE has committed not to enrich uranium itself and not to reprocess spent fuel. Atomic reactors need uranium enriched to around 5% purity, but the same technology in this process can also be used to enrich the heavy metal to higher, weapons-grade levels. This issue has been at the heart of Western and regional concerns about Iran’s nuclear program, and led to the 2015 deal between Tehran and global powers that capped enrichment at 3.67%.

Excerpts from Ahmed Yosri, Saudi Arabia plans to use domestic uranium for nuclear fuel, Reuters, Jan. 11, 2023

Space Control in the Future of War: Ukraine

The Starlink constellation of SpaceX currently consists of 3,335 active satellites and has become an integral part of Ukraine’s military and civil response to Russia’s invasion…Appropriately enough, the story started with a tweet, one sent by Mykhailo Fedorov, Ukraine’s minister of digital transformation, two days after the invasion:

@elonmusk, while you try to colonize Mars —Russia try to occupy Ukraine! While your rockets successfully land from space—Russian rockets attack Ukrainian civil people! We ask you to provide Ukraine with Starlink stations and to address sane Russians to stand.

Mr Musk replied to him within hours, saying that the Starlink service had been turned on over Ukraine and that the hardware would follow. Within days lorries full of the pizza-sized flat dishes used to access the satellites began to arrive in Ukraine.

By May 2022 around 150,000 people were using the system every day. The government quickly grew to rely on it for various communication needs, including, on occasion, the transmission of the nightly broadcast by Volodymyr Zelensky, Ukraine’s president. Because the dishes and their associated terminals are easily portable and can be rigged to run off a car battery, they are ideal for use in a country where the electricity and communication networks are regularly pounded by Russian missiles. When Kherson was liberated in November 2022 Starlink allowed phone and internet services to resume within days.

Crucially, Starlink has become the linchpin of what military types call C4ISR (command, control, communications, computers, intelligence, surveillance and reconnaissance). Armies have long relied on satellite links for such things…But Most satellite communications make use of big satellites which orbit up at 36,000km. Perched at such a height a satellite seems to sit still in the sky, and that vantage allows it to serve users spread across very large areas. But even if such a satellite is big, the amount of bandwidth it can allocate to each user is often quite limited.

The orbits used by Starlink’s much smaller satellites are far lower: around 550km. This means that the time between a given satellite rising above the horizon and setting again is just minutes. To make sure coverage is continuous thus requires a great many satellites, which is a hassle. But because each satellite is serving only a small area the bandwidth per user can be high. And the system’s latency—the time taken for signals to get up to a satellite and back down to Earth—is much lower than for high-flying satellites. 

Franz-Stefan Gady, of the International Institute for Strategic Studies, a think-tank, recently visited the Ukrainian front lines and saw an example of what cheap, ubiquitous connectivity makes possible: a sort of Uber for howitzers. .. “Ukrainian military operations are hugely dependent on having access to the internet,” says Mr Gady, “so Starlink is a most critical capability.” A Ukrainian soldier puts it more starkly. “Starlink is our oxygen,” he says. Were it to disappear “Our army would collapse into chaos.”…

Starlink signals are strong compared with those from higher flying satellites, which makes jamming them harder. And the way that the dishes use sophisticated electronics to create narrow, tightly focused beams that follow satellites through the sky like invisible searchlights provides further resistance to interference…

If its signals cannot be jammed, the system itself could be attacked instead….Cyber-attacks like the one aimed at Ukraine’s legacy satellite system on February 24, 2022 are one possibility. So far, though, similar sallies against Starlink appear to have been ineffective, in part thanks to SpaceX’s ability to quickly update the system’s software. Dave Tremper, director of electronic warfare for the Office of the Secretary of Defense, has said the speed of the software response he witnessed to one attack was “eye-watering”.

And then there are the satellites themselves. America, China, India and Russia have missiles that can shoot satellites out of the sky. Again, though, using them would seem a severe escalation. It would also be a lot less useful against a constellation like Starlink than against older systems. Knocking out a single Starlink would achieve more or less nothing. If you want to damage the space-based bit of the system, you need to get rid of lots of them…

In 2020 China filed documents with the International Telecommunication Union, a UN body, for a 13,000-satellite constellation of its own.

Excerpts from The Satellites that Saved Ukraine, Economist, Jan. 7, 2023

Banning Anti-Satellite Missiles

The UN General Assembly has overwhelmingly approved the US-proposed resolution calling on states to commit to a moratorium on testing of destructive anti-satellite missiles, with 155 countries voting yes, nine voting no including Russia, China and Iran, and nine nations abstaining including India.  The UN vote to support the resolution does not commit individual nations to the moratorium, but signals that there is widespread support for the concept. Canada, New Zealand, Germany, Japan, the United Kingdom, South Korea, Switzerland, Australia and, France have now made such pledges…

France and Germany are Europe’s two biggest European space players, but Italy is also a major space operator of both civil and military satellites, and so far Rome has remained uncommitted. Luxembourg also is emerging as a European space hub and has yet to sign up.

Excerpts from THERESA HITCHENS, US call for halting kinetic anti-satellite tests gets boost from UN vote, Reuters, Dec. 9, 2022 

How Come Space is Full of Human Junk?

Getting rid of the deadly debris orbiting the Earth should become a priority for firms trying to do business there. If only they knew exactly where it is. The space race comes with a growing litter problem: U.S. officials expect the number of satellites to increase almost tenfold to 58,000 by 2030, many of them with lifespans not much longer than five years.

Space trash could potentially trigger devastating chain reactions, posing a significant threat to a space economy that is forecast by Morgan Stanley to generate $1 trillion in revenues by 2040. Only three big collisions have happened to date, but close calls are increasingly common. In November 2021, denizens of the International Space Station (ISS) had to take refuge in their capsules after a Russian antisatellite missile test created a cloud of wreckage.

In September 2022, the U.S. Federal Communications Commission ruled that operators of satellites in the “low Earth orbit,” or LEO—below 1,200 miles of altitude—will, in two years’ time, be required to remove them “as soon as practicable, and no more than five years following the end of their mission.” The National Aeronautics and Space Administration, or NASA, did ask for space junk to be disposed of within 25 years, but these were voluntary guidelines. NASA said in a 2021 report that compliance has averaged under 30% over the past decade. Yet 90% compliance would be required just to slow the pace at which dead satellites, rocket bodies and loose fragments are accumulating. There may be little choice but to mount a cleanup operation. The main questions are who will do it and how the junk will be found.

With only limited interest from big aerospace companies, startups have stepped up. Months after its inception in 2018, Switzerland’s ClearSpace signed a €86.2 million ($86.3 million) contract with the European Space Agency, or ESA, to eliminate remains of a Vega rocket by 2025. ClearSpace will use a robot to get hold of the debris and burn it in the atmosphere. Then there is Tokyo-based Astroscale, which has raised $300 million in venture capital since its inception nine years ago. This September, the U.K. Space Agency awarded £4 million, equivalent to $4.6 million, to both companies to remove defunct British satellites by 2026.

The LEO revolution unleashed by Elon Musk’s SpaceX, which has launched over 3,000 of its miniaturized Starlink satellites, may suddenly turn this into a viable commercial market. Officials are getting spooked by all the extra clutter. In orbits lower than 375 miles, re-entry into the Earth naturally happens after a few years, but these will be crowded by Starlink alone. Many players will need to go higher, and set up “deorbit” plans that regulators—and sustainability-minded investors—find solid.

That still leaves satellite operators and trash-removal firms with a fundamental problem: Their information on an object, including position, shape and mass, involves a lot of guesswork. Most observations come from ground radars, which firms access through government agencies like the U.S. Space Command. But this data is often several hours old and can miss the mark by miles, so satellites and stations can’t swerve out of the way of approaching debris with full confidence. For removal missions, this will mean accommodating extra fuel and allowing for the possibility that an object is spinning faster than estimated, making it impossible to grab.

And this is for pieces larger than 10 centimeters, which according to the ESA number above 30,000 and are the only ones visible from Earth. Mathematical models suggest there are a million additional fragments measuring between one and 10 centimeters, and 100 million even smaller than that, often traveling many times faster than a bullet. Yet the ISS’s “Whipple shield” can be pierced by anything larger than one centimeter…

[A]ny company aspiring to profit from the final frontier will need to better understand the risks of the terrain. The alternative is a true tragedy of the commons that ends a promising new space age before it has really begun.

Excerpts from Jon Sindreu, The Difficult Search for Dangerous Space Junk, WSJ, Nov. 14, 2022

Geo-engineering Wars and Termination Shock

What if a country experiencing the bad effects of climate change—crop failures, perhaps, or serious flooding—were to begin, unilaterally and perhaps quietly, to try to modify the climate? Such a project, reckons DARPA, a research arm of America’s defence department, is possible. But it could trigger chaos, and not just of the meteorological sort. The agency, the overall objectives of which include preventing “strategic surprise”, has therefore recently begun to pay for research into how such an event might happen, and how to react to it.

DARPA’s assumption is that any attempt at unilateral geoengineering would use a technique called stratospheric aerosol injection (SAI). This would employ aircraft to disperse sulfuric acid, or its precursor sulfur dioxide, into the upper atmosphere, to form tiny sulfate particles that would reflect sunlight back into space. This would probably work (big volcanic eruptions, which do something similar, have a measurable effect on global temperatures). The costs, though, could be considerable—and not just directly in dollars.

A poorly designed SAI program might break down ozone, a form of oxygen that shields organisms, people included, from harmful ultraviolet radiation. Patterns of precipitation would also change, for cooler air absorbs less moisture, and these effects would undoubtedly vary from region to region. Another problem is the acid rain that would result.

Perhaps most pertinent, though, is that SAI would serve only to mask the effects of greenhouse gases rather than ending them. That brings the risk of “termination shock”, for the injected sulfate is constantly washed out of the atmosphere in rain and snow. The closure of and SAI program, particularly a long-lasting one, might thus cause a sudden heat jolt more difficult to deal with than the existing, gradual, warming.

That is one reason why Joshua Elliott, head of DARPA’s AI-assisted Climate Tipping-point Modelling (ACTM) program, says “we do not want to be caught flat-footed”. Modelling how Earth’s various climactic subsystems might react to SAI is no easy matter. Dr Elliott, however, reckons that better computer simulations would help. They might even, he says, eventually highlight “signatures” in climate data that would suggest that such geoengineering is afoot.

Nor is the risk of someone doing something stupid a fantasy. In 2019 Massimo Tavoni, a game theorist at Milan Polytechnic who is unaffiliated with DARPA organized six games played by 144 students. Participants were given a variety of ideal climate outcomes and allowed to spend toy money they were given on geoengineering projects to achieve them…Some players tried to counter efforts at cooling which they deemed excessive with attempts to warm the planet, resulting in a chaotic outcome that Dr Tavoni calls “geoengineering wars”. In the end, he says, “everybody loses.”…

DARPA is also developing “early warning” code to detect people undertaking geoengineering mischief on the sly, and testing it by running pairs of parallel simulations, one of which has been tweaked to reflect an SAI program being under way…SAI could even, conceivably, be undertaken by “self-authorizing” billionaires.

Areas which suffer most from rising temperatures would have greater incentives to take the plunge…including Algeria, Australia, Bangladesh, Egypt, India, Indonesia, Libya, Pakistan, Saudi Arabia and Thailand.

Excerpts from America’s defense department is looking for rogue geoengineers, Economist, Nov. 5, 2022

The Act of Successful Sabotage: cables and pipelines

On October 12, 2022 Vladimir Putin, Russia’s president, gave an ominous warning. Energy infrastructure around the world was now “at risk”, he said. Mr Putin’s warning came a month after explosions tore through Nord Stream 1 and 2, a pair of gas pipelines running from Russia to Europe under the Baltic Sea. The pipes were not in use at the time. But the ruptures left plumes of methane bubbling to the surface for days…

Subsea pipelines and cables have proliferated since the first one was laid, in 1850…There are more than 530 active or planned submarine telecoms cables around the world. Spanning over 1.3m kilometers they carry 95% of the world’s internet traffic. In November 2021, cables serving underwater acoustic sensors off the coast of northern Norway—an area frequented by Russian submarines—were cut.

Western officials say that a particular source of concern is Russia’s Main Directorate of Deep-Sea Research, known by its Russian acronym GUGI. It has a variety of spy ships and specialist submarines—most notably the Belgorod, the world’s biggest submarine, commissioned in July 2022—which can work in unusually deep water. They can deploy divers, mini-submarines or underwater drones, which could be used to cut cables. 

Cable chicanery, though, is not a Russian invention. One of Britain’s first acts during the first world war was to tear up German telecoms cables laid across the Atlantic. Germany responded with attacks on Allied cables in the Pacific and Indian Oceans.

More recently, espionage has been the order of the day..I.n 2013 Edward Snowden, a contractor for the National Security Agency (NSA), America’s signals intelligence agency, revealed an Anglo-American project had tapped at least 200 fiber-optic cables around the world. Yet the seabed is not amenable to control. A paper published in 2021 noted that Estonia and other Baltic states had only a limited grasp of what was going on under the Baltic because of quirks of hydrology, scarce surveillance platforms and limited information-sharing between countries. It concluded, perhaps presciently: “It would be difficult to prevent Russian [drones] deployed in international waters from damaging critical undersea infrastructure.”…

The first step in a sabotage mission is finding the target. With big, heavy pipelines, which are typically made from concrete-lined metal sections, that is relatively easy. Older communication cables, being smaller and lighter, can shift with the currents. Newer ones are often buried, It is also increasingly possible for operators to detect tampering, through  “distributed fiber-optic sensing”, which can detect vibrations in the cable or changes in its temperature. But that will not reveal whether the problem is a geological event or an inquisitive drone—or which country might have sent it. Underwater attribution is slow and difficult.

Determined attackers, in other words, are likely to get through. The effects of a successful attack will differ. Pipelines and subsea electricity cables are few in number. If one is blown up, gas, oil or electricity cannot easily be rerouted through another. Communication cables are different. The internet was designed to allow data to flow through alternative paths if one is blocked. And at least when it comes to connections between big countries, plenty of alternatives exist. At least 18 communication cables link America and Europe…There is significant redundancy on these routes. But  “There’s no collective institution that records all the incidents that are going on, and what is behind them—we don’t have any statistics behind it.” according to  Elisabeth Braw of the American Enterprise Institute.

Excerpts from Sabotage at Sea: Underwater Infrastructure, Economist, Oct. 22, 2022

Unbeatable Fusion: Big Tech and US Armed Forces

Big tech equips the armed forces and United States law enforcement with cloud storage, databases, app support, admin tools and logistics. Now it is moving closer to the battlefield. Alphabet, Amazon, Microsoft and Oracle are expected to divvy up the $9bn five-year contract to operate the Pentagon’s Joint Warfighting Cloud Capability (JWCC). In 2021 Microsoft was awarded a $22bn contract to supply its HoloLens augmented-reality headset to simulate battles for army training for up to ten years. It is also helping develop the air force’s battle-management system, which aims to integrate data sources from across the battlefield. In June 2022 Alphabet launched a new unit, Google Public Sector, which will compete for the DOD’s battle-networks contracts. In a departure from Google’s earlier wariness of the Pentagon, its cloud chief, Thomas Kurian, has insisted: “We wouldn’t be working on a programme like JWCC purely to do back-office work.”

Except from  Defense Technology: Can Tech Reshape the Pentagon, Economist, Aug. 13, 2022

Military Uses of Dolphins

The U.S. NAVY MARINE MAMMAL PROGRAM: Since 1959, the U.S. Navy has trained dolphins and sea lions  to help guard against threats underwater….Dolphins naturally possess the most sophisticated sonar known to science. Mines and other potentially dangerous objects on the ocean floor that are difficult to detect with electronic sonar, especially in coastal shallows or cluttered harbors, are easily found by the dolphins. Both dolphins and sea lions have excellent low light vision and underwater directional hearing that allow them to detect and track undersea targets, even in dark or murky waters. They can also dive hundreds of feet below the surface, without risk of decompression sickness or “the bends” like human divers. Someday it may be possible to complete these missions with underwater drones, but for now technology is no match for the animals…Dolphins are trained to search for and mark the location of undersea mines that could threaten the safety of those on board military or civilian ships..
How do the animals travel to remote work sites? By airplanes and helicopters (yes!)

Excerpt from US Naval Information Warfare Center

God’s Channels: How to Hear Whales and Bomb Explosions

About 1 kilometer under the sea lies a sound tunnel that carries the cries of whales and the clamor of submarines across great distances. Ever since scientists discovered this Sound Fixing and Ranging (SOFAR) channel in the 1940s, they’ve suspected a similar conduit exists in the atmosphere. But few have bothered to look for it, aside from one top-secret Cold War operation.

Today by listening to distant rocket launches with solar-powered balloons, researchers say they have finally detected hints of an aerial sound channel, although it does not seem to function as simply or reliably as the ocean SOFAR. If confirmed, the atmospheric SOFAR may pave the way for a network of aerial receivers that could help researchers detect remote explosions from volcanoes, bombs, and other sources that emit infrasound—acoustic waves below the frequency of human hearing.

After geophysicist Maurice Ewing discovered the SOFAR channel in 1944, he set out to find an analogous layer in the sky. At an altitude of between 10 and 20 kilometers is the tropopause, the boundary between the troposphere, the lowest layer of the atmosphere (where weather occurs), and the stratosphere. Like the marine SOFAR, the tropopause represents a cold region, where sound waves should travel slower and farther. An acoustic waveguide in the atmosphere, Ewing reasoned, would allow the U.S. Air Force to listen for nuclear weapon tests detonated by the Soviet Union. He instigated a top-secret experiment, code-named Project Mogul, that sent up hot air balloons equipped with infrasound microphones. The instruments often malfunctioned in the high winds, and in 1947, debris from one balloon crashed just outside of Roswell, New Mexico; that crash sparked one of the most famous UFO conspiracy theories in history. Soon after, the military disbanded the project. But the mission wasn’t declassified for nearly 50 years…

[Today] researchers plan to listen to launches of rockets with multiple solar-powered balloons staggered at different altitudes to figure out where the channel’s effects are strongest. They also plan to test the range of the signals and investigate the mysterious background noise. Understanding how the channel functions could help lay the groundwork for a future aerial infrasound network, which would monitor Earth constantly for major explosions and eruptions.

Excerpts from Zack Savisky, Balloon Detects First Signs of a ‘Sound Tunnel’ in the Sky, Science, Apr. 27, 2022

The Best Opportunity for Nuclear Industry

[After the war on climate change….]Russia’s war in Ukraine has created the “best opportunity” for Japan’s nuclear industry to stage a comeback since the 2011 Fukushima disaster, according to the country’s largest reactor maker. Akihiko Kato, nuclear division head at Mitsubishi Heavy Industries, said in an interview with the Financial Times…” Japan’s heavy reliance on Russian gas imports has rekindled a debate over nuclear power in the country more than a decade after regulators took most plants offline following one of the worst nuclear disasters in history. The world’s third-largest economy has been plunged into a power crisis exacerbated by the soaring cost of liquefied natural gas and oil. Japan imports about 9 per cent of its LNG from Russia, putting it in a difficult diplomatic position as its western allies impose sanctions on Moscow.

But in contrast with the US, which sources close to a quarter of its processed uranium from Russia, Japan imports about 55 per cent of its processed uranium from western European countries, according to Ryan Kronk, a power markets analyst at Rystad Energy. Kato’s remarks underscored a shift in the country’s nuclear narrative, with an industry that had been in retreat now emboldened to speak out. His remarks come after Prime Minister Fumio Kishida told investors this month in London that Japan would use nuclear power to “help the world achieve de-Russification of energy”. “

Mitsubishi Heavy expects an increase in orders for components from Europe in the coming years, as countries including the UK and France commit to building new nuclear plants.  

Excerpts from Ukraine war is ‘best opportunity’ for nuclear comeback since Fukushima, industry says, FT, May 15, 2022

Everybody and their Watch Box: State Surveillance

Aerial surveillance can reach backwards in time, by the expedient of indiscriminately recording everything that is going on in a particular neighborhood, and then looking for useful patterns in the resulting footage. This technique, called wide-area motion imagery (Wami), has been around since 2006. But improvements in both the recording equipment used and the means by which the images are analysed are making it more and more valuable.

Wami was first employed by American forces in Iraq to track down those placing roadside bombs. When such a bomb went off, it was possible to run the relevant footage in reverse and trace the events that led up to the explosion. That often allowed the bombers to be identified and dealt with…Wami began with an aircraft-borne system called Constant Hawk, which was developed by Lawrence Livermore National Laboratory, in California. Constant Hawk’s success in Iraq begat more powerful versions. Gorgon Stare, carried by drone, was designed by the armed forces themselves…

But there is a problem. Explosions are easy to see. For many tasks, however, an awful lot of staring at screens looking for things that are out-of-the-ordinary is involved. People are bad at this…So AI is here to help…. Chips called graphic-processing units, borrowed from the video-game industry, are helping. So is machine learning, the basis of much modern artificial intelligence. .

l3Harris, a company in Florida, sells Wami sensors for use as automatic sentries. Their software monitors the coming and going of vehicles and pedestrians into and out of so-called watch boxes. These are protected areas surrounded by virtual trip wires, the triggering of which will cause a vehicle or individual of interest to be tracked…This approach can detect immediate threats. It can also, working over a longer period, carry out “pattern of life” analysis by building up a picture of what normal daily traffic looks like in an area. That permits the identification of anomalies which might signal hostile agents whose movements would otherwise be masked by the hurly-burly around them.

The sensors themselves are getting better, too….The latest version includes a so-called hyperspectral sensor, which sees simultaneously across many different wavelengths, including infrared and ultraviolet. It is thus able to distinguish things which the naked eye cannot, such as the difference between camouflage and vegetation. This approach’s real power, however, lies in software which automatically passes data between sensors…Future multi-sensor pods may include other instruments, such as signals-intelligence receivers. These are bits of equipment which can detect radio-frequency communicators like mobile phones and walkie-talkies, enabling particular devices to be identified and located. That would permit the individual carrying the phone, and also those he or she came into contact with, to be tracked and photographed. 

So far, the costs and complexity of Wami have kept it as a predominantly military technology. But that is starting to change. Smaller and more affordable versions are now within the reach of police, fire services and other non-military users…The most famous examples were in Baltimore, where the local cops experimented with the idea twice—first in 2016 and then in 2020. The second time around they made the mistake of monitoring a political protest as well as looking for crimes such as vehicle theft. 

Excerpts from Aerial Surveillance: The Spies in the Sky that See Backwards in Time, Economist, May 7, 2022

Normal Nuclear Accidents

In March 2022, a nearly tragic accident involving India and Pakistan pointed to another path to nuclear war. The accident highlighted how complex technological systems, including those involving nuclear weapons, can generate unexpected routes to potential disaster—especially when managed by overconfident organizations.

India and Pakistan possess more than 300 nuclear weapons between them, and have fought multiple wars and faced many military crises. On March 9,2022 three years after their dispute over Kashmir escalated into attacks by jet fighters, the Pakistan Air Force detected “a high speed flying object” inside Indian territory change course and veer suddenly toward Pakistan.* It flew deep into Pakistan and crashed. The object was a BrahMos cruise missile, a weapon system developed jointly by India and Russia. India soon stated the launch was an accident.

The firing of the BrahMos missile falls within a long history of accidents involving military systems in India. Military aircraft have strayed across the borders during peacetime. India’s first nuclear submarine was reportedly “crippled” by an accident in 2018, but the government refused to divulge any details. Secrecy has prevented the investigation of an apparent failure of India’s ballistic missile defense system in 2016. Engagements between India and Pakistan can arise from such accidents, as in 1999 when a Pakistani military plane was shot down along the border by India, killing 16 people. Pakistan has had its share of accidents, including a Pakistani fighter jet crashing into the capital city in 2020.

All these weapons systems are inherently accident-prone because of two characteristics identified by organizational sociologist Charles Perrow decades ago—interactive complexity and tight coupling—that combine to make accidents a “normal” feature of the operation of some hazardous technologies. The first characteristic refers to the possibility that different parts of the system can affect each other in unexpected ways, thus producing unanticipated outcomes. The second makes it hard to stop the resulting sequence of events. For Perrow, “the dangerous accidents lie in the system, not in the components,” and are inevitable.

Perhaps the best and most troubling proof of this proposition is in the realm of nuclear weapons—which embody all the properties of high-risk technological systems. Despite decades of efforts to ensure safety, these systems have suffered many failures, accidents and close calls. During 1979–1980, for example, there were several false warnings of Soviet missile attacks, some of which resulted in U.S. nuclear forces being put on alert.  

Given the secretive nature of Indian nuclear policymaking, little is known about India’s nuclear command and control system. However, the 1999 Draft Nuclear Doctrine called for “assured capability to shift from peacetime deployment to fully employable forces in the shortest possible time.” The combination of technology and plans for being able to rapidly launch nuclear weapons raises the risk of accidental and inadvertent escalation to nuclear war.  

South Asia’s geography is pitiless. It would only take five to 10 minutes for a missile launched from India to attack Pakistan’s national capital, nuclear weapon command posts or bases….Compounding these dangers is the overconfidence of India’s officials, who displayed no recognition of the gravity of the Brahmos accident.

Excerpt from Zia Mian, M. V. Ramana, India’s Inadvertent Missile Launch Underscores the Risk of Accidental Nuclear Warfare, Scientific American, Apr. 8, 2022
 

How Artificial Intelligence Can Help Produce Better Chemical Weapons

An international security conference convened by the Swiss Federal Institute for NBC (nuclear, biological and chemical) Protection —Spiez Laboratory explored how artificial intelligence (AI) technologies for drug discovery could be misused for de novo design of biochemical weapons.  According to the researchers, discussion of societal impacts of AI has principally focused on aspects such as safety, privacy, discrimination and potential criminal misuse, but not on national and international security. When we think of drug discovery, we normally do not consider technology misuse potential. We are not trained to consider it, and it is not even required for machine learning research.

According to the scientists, this should serve as a wake-up call for our colleagues in the ‘AI in drug discovery’ community. Although some expertise in chemistry or toxicology is still required to generate toxic substances or biological agents that can cause significant harm, when these fields intersect with machine learning models, where all you need is the ability to code and to understand the output of the models themselves, they dramatically lower technical thresholds. Open-source machine learning software is the primary route for learning and creating new models like ours, and toxicity datasets that provide a baseline model for predictions for a range of targets related to human health are readily available.

The genie is out of the medicine bottle when it comes to repurposing our machine learning. We must now ask: what are the implications? Our own commercial tools, as well as open-source software tools and many datasets that populate public databases, are available with no oversight. If the threat of harm, or actual harm, occurs with ties back to machine learning, what impact will this have on how this technology is perceived? Will hype in the press on AI-designed drugs suddenly flip to concern about AI-designed toxins, public shaming and decreased investment in these technologies? As a field, we should open a conversation on this topic. The reputational risk is substantial: it only takes one bad apple, such as an adversarial state or other actor looking for a technological edge, to cause actual harm by taking what we have vaguely described to the next logical step. How do we prevent this? Can we lock away all the tools and throw away the key? Do we monitor software downloads or restrict sales to certain groups?

Excerpts from Fabio Urbina et al, Dual use of artificial-intelligence-powered drug discovery, Nature Machine Intelligence (2022)

Living in the Russian Digital Bubble

Vladimir Putin, Russia’s president, has portrayed his aggression on the Ukrainian border as pushing back against Western advances. For some time he has been doing much the same online. He has long referred to the internet as a “CIA project”. His deep belief that the enemy within and the enemy without are in effect one and the same… Faced with such “aggression”, Mr Putin wants a Russian internet that is secure against external threat and internal opposition. He is trying to bring that about on a variety of fronts: through companies, the courts and technology itself.

In December 2021, VK, one of Russia’s online conglomerates, was taken over by two subsidiaries of Gazprom, the state-owned gas giant. In the same month a court in Moscow fined Alphabet, which owns Google, a record $98m for its repeated failure to delete content the state deems illegal. And Mr Putin’s regime began using hardware it has required internet service providers (ISPS) to install to block Tor, a tool widely used in Russia to mask online activity. All three actions were part of the country’s effort to assure itself of online independence by building what some scholars of geopolitics, borrowing from Silicon Valley, have begun calling a “stack”.

In technology, the stack is the sum of all the technologies and services on which a particular application relies, from silicon to operating system to network. In politics it means much the same, at the level of the state. The national stack is a sovereign digital space made up not only of software and hardware (increasingly in the form of computing clouds) but also infrastructure for payments, establishing online identities and controlling the flow of information

China built its sovereign digital space with censorship in mind. The Great Firewall, a deep-rooted collection of sophisticated digital checkpoints, allows traffic to be filtered with comparative ease. The size of the Chinese market means that indigenous companies, which are open to various forms of control, can successfully fulfil all of their users’ needs. And the state has the resources for a lot of both censorship and surveillance. Mr Putin and other autocrats covet such power. But they cannot get it. It is not just that they lack China’s combination of rigid state control, economic size, technological savoir-faire and stability of regime. They also failed to start 25 years ago. So they need ways to achieve what goals they can piecemeal, by retrofitting new controls, incentives and structures to an internet that has matured unsupervised and open to its Western begetters.

Russia’s efforts, which began as purely reactive attempts to lessen perceived harm, are becoming more systematic. Three stand out: (1) creating domestic technology, (2) controlling the information that flows across it and, perhaps most important, (3) building the foundational services that underpin the entire edifice.

Russian Technology

The government has made moves to restart a chipmaking plant in Zelenograd near Moscow, the site of a failed Soviet attempt to create a Silicon Valley. But it will not operate at the cutting edge. So although an increasing number of chips are being designed in Russia, they are almost all made by Samsung and TSMC, a South Korean and a Taiwanese contract manufacturer. This could make the designs vulnerable to sanctions….

For crucial applications such as mobile-phone networks Russia remains highly reliant on Western suppliers, such as Cisco, Ericsson and Nokia. Because this is seen as leaving Russia open to attacks from abroad, the industry ministry, supported by Rostec, a state-owned arms-and-technology giant, is pushing for next-generation 5g networks to be built with Russian-made equipment only. The country’s telecoms industry does not seem up to the task. And there are internecine impediments. Russia’s security elites, the siloviki, do not want to give up the wavelength bands best suited for 5g. But the only firm that could deliver cheap gear that works on alternative frequencies is Huawei, an allegedly state-linked Chinese electronics group which the siloviki distrust just as much as security hawks in the West do.

It is at the hardware level that Russia’s stack is most vulnerable. Sanctions imposed may treat the country, as a whole,  like Huawei is now treated by America’s government. Any chipmaker around the world that uses technology developed in America to design or make chips for Huawei needs an export license from the Commerce Department in Washington—which is usually not forthcoming. If the same rules are applied to Russian firms, anyone selling to them without a license could themselves risk becoming the target of sanctions. That would see the flow of chips into Russia slow to a trickle.

When it comes to software the Russian state is using its procurement power to amp up demand. Government institutions, from schools to ministries, have been encouraged to dump their American software, including Microsoft’s Office package and Oracle’s databases. It is also encouraging the creation of alternatives to foreign services for consumers, including TikTok, Wikipedia and YouTube. Here the push for indigenization has a sturdier base on which to build. Yandex, a Russian firm which splits the country’s search market with Alphabet’s Google, and VK, a social-media giant, together earned $1.8bn from advertising last year, more than half of the overall market. VK’s vKontakte and Odnoklassniki trade places with American apps (Facebook, Instagram) and Chinese ones (Likee, TikTok) on the top-ten downloads list.

This diverse system is obviously less vulnerable to sanctions—which are nothing like as appealing a source of leverage here as they are elsewhere in the stack. Making Alphabet and Meta stop offering YouTube and WhatsApp, respectively, in Russia would make it much harder for America to launch its own sorties into Russian cyberspace. So would disabling Russia’s internet at the deeper level of protocols and connectivity. All this may push Russians to use domestic offerings more, which would suit Mr Putin well.

As in China, Russia is seeing the rise of “super-apps”, bundles of digital services where being local makes sense. Yandex is not just a search engine. It offers ride-hailing, food delivery, music-streaming, a digital assistant, cloud computing and, someday, self-driving cars. Sber, Russia’s biggest lender, is eyeing a similar “ecosystem” of services, trying to turn the bank into a tech conglomerate. In the first half of 2021 alone it invested $1bn in the effort, on the order of what biggish European banks spend on information technology (IT). Structural changes in the IT industry are making some of this Russification easier. Take the cloud. Its data centres use cheap servers made of off-the-shelf parts and other easily procured commodity kit. Much of its software is open-source. Six of the ten biggest cloud-service providers in Russia are now Russian…The most successful ones are “moving away from proprietary technology” sold by Western firms (with the exception of chips)…

Information Flow

If technology is the first part of Russia’s stack, the “sovereign internet” is the second. It is code for how a state controls the flow of information online. In 2019 the government amended several laws to gain more control of the domestic data flow. In particular, these require ISPS to install “technical equipment for counteracting threats to stability, security and functional integrity”. This allows Roskomnadzor, Russia’s internet watchdog, to have “middle boxes” slipped into the gap between the public internet and an ISPS’ customers. Using “deep packet inspection” (DPI), a technology used at some Western ISPS to clamp down on pornography, these devices are able to throttle or block traffic from specific sources (and have been deployed in the campaign against Tor). DPI kit sits in rooms with restricted access within the ISPS’ facilities and is controlled directly from a command center at Roskomnadzor. This is a cheap but imperfect version of China’s Great Firewall.

Complementing the firewall are rules that make life tougher for firms. In the past five years Google has fielded 20,000-30,000 content-removal requests annually from the government in Russia, more than in any other country. From this year 13 leading firms—including Apple, TikTok and Twitter—must employ at least some content moderators inside Russia. This gives the authorities bodies to bully should firms prove recalcitrant. The ultimate goal may be to push foreign social media out of Russia altogether, creating a web of local content… But this Chinese level of control would be technically tricky. And it would make life more difficult for Russian influence operations, such as those of the Internet Research Agency, to use Western sites to spread propaganda, both domestically and abroad.

Infrastructure

Russia’s homegrown stack would still be incomplete without a third tier: the services that form the operating system of a digital state and thus provide its power. In its provision of both e-government and payment systems, Russia puts some Western countries to shame. Gosuslugi (“state services”) is one of the most-visited websites and most-downloaded apps in Russia. It hosts a shockingly comprehensive list of offerings, from passport application to weapons registration. Even critics of the Kremlin are impressed, not least because Russia’s offline bureaucracy is hopelessly inefficient and corrupt. The desire for control also motivated Russia’s leap in payment systems. In the wake of its annexation of Crimea, sanctions required MasterCard and Visa, which used to process most payments in Russia, to ban several banks close to the regime. In response, Mr Putin decreed the creation of a “National Payment Card System”, which was subsequently made mandatory for many transactions. Today it is considered one of the world’s most advanced such schemes. Russian banks use it to exchange funds. The “Mir” card which piggybacks on it has a market share of more than 25%, says GlobalData, an analytics firm.

Other moves are less visible. A national version of the internet’s domain name system, currently under construction, allows Russia’s network to function if cut off from the rest of the world (and gives the authorities a new way to render some sites inaccessible). Some are still at early stages. A biometric identity system, much like India’s Aadhaar, aims to make it easier for the state to keep track of citizens and collect data about them while offering new services. (Muscovites can now pay to take the city’s metro just by showing their face.) A national data platform would collect all sorts of information, from tax to health records—and could boost Russia’s efforts to catch up in artificial intelligence (AI).

Excerpt from Digital geopolitics: Russia is trying to build its own great firewall, Economist, Feb. 19, 2022

Who Will Save the Red Sea from the Safer Oil Spill?

An oil tanker, the Safer,  tuffed with a load of more than 1 million barrels of crude oil has been left abandoned and rusting off the coast of Hodeidah, Yemen since 2015. Its decaying hulk encompasses the complexity of the civil war in Yemen. The Safer was permanently anchored off Hodeidah in 1987 and used for some four decades as a floating storage unit by Yemen’s state-run oil company to get oil from other tankers onto the mainland. However, the tanker fell into the hands of Houthi insurgents in March 2015 and has since then been – for all intents and purposes – left to rot. As a result, the structural integrity of the ship, which was built in 1976, is now at serious risk. Its firefighting system is out of order, and it has sprung several leaks over the past couple of years.

Experts estimate that the risks of an explosion on the tanker are huge and that the impact of this would be massive, as a full-blown leak in the closed basin of the Red Sea would be four times bigger than the historic Exxon Valdez disaster of 1989. Under the worst-case scenario, all of Yemen’s Red Sea ports would have to shut down, depriving millions of people of food and life-saving humanitarian aid. A spill would also affect the country’s water supply by shutting down its desalination plants…

The question is who will undertake the cost of around $75-100 million needed to defuse the Safer time bomb…On February 16, 2022 the UN under-secretary-general for humanitarian affairs, Martin Griffiths, informed the Security Council of an agreement, in principle, for a UN-coordinated proposal to shift the oil to another ship. Now all eyes are turned to the conference of donors that the UN is holding at the end of March 2022, where various states are expected to offer money to bankroll the operation.

Excerpt from Nikolas Katsimpras, An impending Red Sea disaster and Greece, Ekathimerini, Feb. 23, 2022

See also Greenpeace report

The EU and US Bait and Switch Operation in Ukraine

What Is Bait and Switch?
Bait and switch is a morally suspect sales tactic that lures customers [Ukraine] in with specific claims about the quality or low prices on items [joining NATO and the EU] that turn out to be unavailable in order to upsell them on a similar, pricier item [Russian invasion]. It is considered a form of retail sales fraud, though it takes place in other contexts…From the Investopedia

Sustainability or Lethality: Space

The United States SPACEWERX is the innovation arm of the U.S. Space Force and a part of AFWERX (the Air Force technology accelerator) whose purpose is to increase lethality at a lower cost.

The SPACEWERX has launched Orbital Prime whose purpose is to invigorate the On-orbit Servicing, Assembly, and Manufacturing (OSAM) market using Active Debris Remediation (ADR) as a use case for the foundational technologies. As the congestion of the space domain and  space debris threaten the long-term sustainability of the space domain, Orbital Prime will transition agile, affordable, and accelerated OSAM space capabilities to build the foundation for space logistics while preserving the global commons.

Excerpt from Space Prime

Nuclear Power Invades Space

The Defense Advanced Research Projects Agency (DARPA) is testing a technology known as “nuclear thermal propulsion”… DARPA spacecraft will carry a small nuclear reactor. Inside, uranium atoms will be split to generate tremendous heat…to produce thrust. Such a spacecraft could climb to a geostationary orbit above the Earth, nearly 36,000km up, in mere hours. Satellites that burn normal rocket fuel need several days for the same trip. Nuclear-powered satellites with abundant power would also be hard to destroy—their trajectories could be changed often enough to become unpredictable. DARPA  wants to test its spacecraft, dubbed DRACO  (Demonstration Rocket for Agile Cislunar Operations), in orbit in 2025.

Other proposals are for radioisotope thermoelectric generators (RTGs). These kinds of “nuclear batteries” have long been used to power probes sent into deep space, where solar power is especially feeble. Instead of building a nuclear reactor, an RTG uses devices called thermocouples to produce a modest wattage from heat released by the decay of radioactive isotopes. Plutonium-238, which is a by-product of weapons development, has been used by NASA to power both the Voyager probes, launched in the 1970s and still functioning, as well as the Curiosity rover currently trundling around Mars. Plutonium-238, however, is heavily regulated and in short suppl..Cobalt-60, with a half-life of 5.3 years, is a promising alternative and available commercially.

DARPA Draco Image https://www.youtube.com/watch?v=h3ubR9F55nk

How safe is it, however, to send nuclear devices, especially reactors, into space?…A danger is accidental atmospheric re-entry. The Soviet Union flew at least 33 spy satellites with nuclear reactors for onboard power (but not propulsion). In one accident, the reactor in a satellite named Kosmos 954 failed to ascend into a high-enough “disposal orbit” at the end of its mission. In 1978 it ended up spraying radioactive debris over a swathe of Canada’s Northwest Territories…The fuel for the Soviet Kosmos 954…was 90% uranium-235, similar to the material used in the atom bomb detonated over Hiroshima in 1945…

America is not alone in its nuclear quest. China and Russia are also developing nuclear power for space. China’s wish list includes a fleet of nuclear-powered space shuttles. Russia is designing an electric-propulsion cargo spacecraft called Zeus, which will be powered by a nuclear reactor. Roscosmos, Russia’s space agency, hopes to launch it in 2030. The prospect of more capable satellites will, no doubt, raise suspicions among spacefaring nations. Nuclear spacecraft with abundant electrical energy could be used to jam satellite communications…..

And not all of the interest in nuclear power comes from the armed forces. NASA…wants a nuclear plant to power a base on the Moon

Excerpt from Faster, higher, stronger: Why space is about to enter its nuclear age, Economist, Feb. 5, 2022

Rapes and Razor Blades: Raping Children to Death in War Zones

Sexual abuse of young children happens all around the world. But children living in war-torn countries are at much higher risk. Those in countries recovering from conflict, such as Liberia, may also face greater dangers. The UN has recorded 15,000 cases of rape and sexual violence against children in conflict zones over the past 15 years. This, it warns, is probably a fraction of the true number. Around 72m children live in war zones in which fighters sexually attack children, according to research by Ragnhild Nordås of the University of Michigan and co-authors. That is almost ten times the number in 1990. In 2021, Liberia recorded 1,275 sexual assaults or rapes of people of all ages, according to official figures. Fully 10% of the victims were younger than six and 36% were younger than 13.

At a sexual-violence clinic in Monrovia, the capital, a nurse recounts how an eight-month-old baby was raped by her step father. A soft toy to comfort children perches on the examination table next to a large doll which young victims, often unable to speak, can point at to show what happened to them… In 2020,  another three-year-old was lured away from a water pump by a 15-year-old who used a razor blade to cut open her genital area to penetrate her. That attack caused large protests in Monrovia, which prompted President George Weah to declare rape a “national emergency”.

Why so many men rape young children in war and its aftermath is not well understood. Some experts think that war warps not just morality but also common sense. Between 2013 and 2016 in Kavumu, a village in eastern Congo, at least 11 men kidnapped and raped about 40 girls under the age of ten. Some were as young as 18 months. After each rape the men would take some blood from the victim’s hymen, believing this would protect them from bullets in battle. In 2017 a court convicted the 11 men of murder and rape.

Many of their victims were treated at Panzi Hospital, which was founded by Denis Mukwege, who was jointly awarded the Nobel peace prize in 2018 for his efforts to end sexual violence in war. The number of babies and infants treated for rape at the hospital dipped in the year after the trial, says Sylvain Mwambali, a doctor who works there. But it soon shot up again, to a higher level than in the three years before the convictions. In the past three years the hospital has treated 103 raped children aged five or younger, or about one every ten days. In 2020 Dr Mwambali treated a baby just a few months old whose vagina and intestines were mutilated by rape. “I could not sleep for weeks,” she says. “How can someone carry on, creating a wound like that? She would have been suffering, crying, they destroyed her vulva, up until the anus, yet they continued.”

Sometimes rebels may rape children to terrorise and control the population. Other men may copy them, perhaps because it makes them feel powerful. A breakdown in law and order may allow rapists to escape any punishment. “There is a social deterioration,” says Dr Mwambali. “People can rape your mother in front of you…there are rapes in churches.” In Liberia, warped beliefs of a different kind are a common explanation for why men rape young children. Some traditional healers tell people, “If you have intercourse with a young girl, you will become rich,” says Margaret Taylor of Women Empowerment Network, an NGO. “The younger the person is, the more riches they get.”

Excerpt from: The Sexual Abuse of Children: Child rape is far too common in some war-torn African countries, Economist, Feb. 5, 2022

The Nuclear Middle East Kingdom

Russia’s state nuclear energy producer Rosatom is in talks with “several” countries in the Middle East and North Africa to explore development of nuclear power… Saudi Arabia is one of the countries that Rosatom is ready to work with when the kingdom puts out tenders, including to provide the fuel or build the plants…Rosatom was selected to help provide the enriched uranium for the UAE‘s first nuclear power plant, and is building the first nuclear power plants in both Turkey and Egypt.

Egypt’s El-Dabaa project is expected to start production in 2028…The Akkuyu project in Turkey will supply 35 TWh of electricity annually for 60 years, or 10% of Turkey’s consumption. Turkish President Tayyip Erdogan said the plant’s first unit would come online in May 2023.

Excerpt from Claudia Carpenter, Rosatom in talks with ‘several’ Middle East countries about starting nuclear power plants, S&P Global, Jan. 19, 2022

The Secret Nuclear Weapons Capabilities of States

South Korea, like the United States, has long relied on nuclear power as a major source of electric power. As a result, it has amassed large stores of spent nuclear fuel and, as in the United States, has experienced political pushback from populations around proposed central sites for the spent fuel.

South Korea also has a history of interest in nuclear weapons to deter North Korean attack. South Korea’s interest in spent fuel disposal and in a nuclear-weapon option account for the Korea Atomic Energy Research Institute’s dogged interest in the separation of plutonium from its spent fuel. Plutonium separated from spent fuel can be used to make nuclear weapons.

Two US Energy Department nuclear laboratories, Argonne National Laboratory  and the Idaho National Laboratory have encouraged South Korea’s interest in plutonium separation because of their own interests in the process. Now, a secret, leaked, joint South Korean-US report shows deliberate blindness to the economic and proliferation concerns associated with plutonium separation and lays the basis for policies that would put South Korea on the threshold of being a nuclear-weapon state. 

Japan is the only non-nuclear-armed state that separates plutonium. The Korea Atomic Energy Research Institute has domestic political support, however, for its demand that South Korea have the same right to separate plutonium as Japan. 

In 2001 Argonne and Idaho National Laboratories (INL) persuaded an energy-policy task force led by then-Vice President Dick Cheney that pyroprocessing is “proliferation resistant” because the extracted plutonium is impure and unsuitable for nuclear weapons. On that basis, Argonne and INL were allowed to launch a collaboration on pyroprocessing research and development with Korea. The Korea Atomic Energy Research Institute was enthusiastic. It had been blocked from pursuing reprocessing R&D since it had been discovered in 1974 that the institute was part of a nuclear-weapon program.

At the end of the Bush administration, however, nonproliferation experts from six US national laboratories, including Argonne and INL, concluded that pyroprocessing is not significantly more proliferation resistant than conventional reprocessing because it would be relatively easy to remove the weakly radioactive impurities from the plutonium separated by pyroprocessing. The finding that pyroprocessing is not proliferation resistant precipitated a struggle between the Obama administration and South Korea’s government during their negotiations for a new US-Republic of Korea Agreement of Cooperation on the Peaceful Uses of Nuclear Energy. The new agreement was required to replace the existing agreement, which was due to expire in 2014. But the negotiations stalemated when South Korea demanded the same right to reprocess the Reagan administration had granted Japan in 1987. 

At the beginning of September 2021, INL and the Korea Atomic Energy Research Institute submitted a 10-year report on their joint fuel cycle study. Instead of making a policy recommendation on the future of pyroprocessing, however, the Korea-US Joint Nuclear Fuel Cycle Research Steering Committee decided to continue the joint research. A senior US official with knowledge of the situation, told that “at least three or four more years will be necessary for the two governments to be in a position to draw any actual conclusions related to the technical and economic feasibility and nonproliferation acceptability of pyroprocessing on the Korean Peninsula.”

Excerpts from  Frank N. von Hippel, Jungmin Kang, Why joint US-South Korean research on plutonium separation raises nuclear proliferation danger, January 13, 2022

Who Owns the Real Information System

In January 2022, the head of the UK’s armed forces has warned that Russia submarine activity is threatening underwater cables that are crucial to communication systems around the world. Admiral Sir Tony Radakin said undersea cables that transmit internet data are ‘the world’s real information system,’ and added that any attempt to damage then could be considered an act of war.

The internet seems like a post- physical environment where things like viral posts, virtual goods and metaverse concerts just sort of happen. But creating that illusion requires a truly gargantuan—and quickly-growing—web of physical connections. Fiber-optic cable, which carries 95% of the world’s international internet traffic, links up pretty much all of the world’s data centers…

Where those fiber-optic connections link up countries across the oceans, they consist almost entirely of cables running underwater—some 1.3 million kilometers (or more than 800,000 miles) of bundled glass threads that make up the actual, physical international internet. And until recently, the overwhelming majority of the undersea fiber-optic cable being installed was controlled and used by telecommunications companies and governments. Today, that’s no longer the case.

In less than a decade, four tech giants— Microsoft, Google parent Alphabet, Meta (formerly Facebook ) and Amazon —have become by far the dominant users of undersea-cable capacity. Before 2012, the share of the world’s undersea fiber-optic capacity being used by those companies was less than 10%. Today, that figure is about 66%.  In the next three years, they are on track to become primary financiers and owners of the web of undersea internet cables connecting the richest and most bandwidth-hungry countries on the shores of both the Atlantic and the Pacific.

By 2024, the four are projected to collectively have an ownership stake in more than 30 long-distance undersea cables, each up to thousands of miles long, connecting every continent on the globe save Antarctica. In 2010, these companies had an ownership stake in only one such cable—the Unity cable partly owned by Google, connecting Japan and the U.S. Traditional telecom companies have responded with suspicion and even hostility to tech companies’ increasingly rapacious demand for the world’s bandwidth. Industry analysts have raised concerns about whether we want the world’s most powerful providers of internet services and marketplaces to also own the infrastructure on which they are all delivered. This concern is understandable. Imagine if Amazon owned the roads on which it delivers packages.

But the involvement of these companies in the cable-laying industry also has driven down the cost of transmitting data across oceans for everyone, even their competitors….Undersea cables can cost hundreds of millions of dollars each. Installing and maintaining them requires a small fleet of ships, from surveying vessels to specialized cable-laying ships that deploy all manner of rugged undersea technology to bury cables beneath the seabed. At times they must lay the relatively fragile cable—at some points as thin as a garden hose—at depths of up to 4 miles.

All of this must be done while maintaining the right amount of tension in the cables, and avoiding hazards as varied as undersea mountains, oil-and-gas pipelines, high-voltage transmission lines for offshore wind farms, and even shipwrecks and unexploded bombs…In the past, trans-oceanic cable-laying often required the resources of governments and their national telecom companies. That’s all but pocket change to today’s tech titans. Combined, Microsoft, Alphabet, Meta and Amazon poured more than $90 billion into capital expenditures in 2020 alone…

Most of these Big Tech-funded cables are collaborations among rivals. The Marea cable, for example, which stretches approximately 4,100 miles between Virginia Beach in the U.S. and Bilbao, Spain, was completed in 2017 and is partly owned by Microsoft, Meta and Telxius, a subsidiary of Telefónica, the Spanish telecom.  Sharing bandwidth among competitors helps ensure that each company has capacity on more cables, redundancy that is essential for keeping the world’s internet humming when a cable is severed or damaged. That happens around 200 times a year, according to the International Cable Protection Committee, a nonprofit group. 

There is an exception to big tech companies collaborating with rivals on the underwater infrastructure of the internet. Google, alone among big tech companies, is already the sole owner of three different undersea cables

Excerpts from Christopher Mims, Google, Amazon, Meta and Microsoft Weave a Fiber-Optic Web of Power, WSJ, Jan. 15, 2022

After We Vacuum the Earth, We Vacuum the Moon

Chinese nuclear scientists are studying samples carried back by China’s mission to the the moon in 2019. One of those under the microscope at the Beijing Research Institute of Uranium Geology is a 50-milligram rock—approximately the size of a lentil—believed to contain an isotope called helium-3. The isotope… is thought by scientists to have the potential to one day provide safer nuclear energy in a fusion reactor, as it isn’t radioactive. Rare on earth, helium-3 is thought to be abundant on the moon.

While researchers in the U.S. and other nations have studied the isotope, China’s renewed pursuit is part of a decadeslong plan to establish itself as a leading space power, mirroring the country’s rising economic and strategic influence on Earth. Since being shut out of working with the U.S. space agency by law a decade ago, the country has invested heavily in its own program. China is still playing catch-up technologically but is seeking to gain an edge through its moon missions…

China now building the Silk Road to space,” said James Head, a professor of geological sciences at Brown University who has lectured at universities across China in the past few years. 

The theory that the moon might have abundant reserves of helium-3 goes back several decades. In 1986, scientists at the University of Wisconsin estimated that lunar soil could contain a million tons of the isotope, also known as He3. A byproduct of the sun’s intense heat, it is carried through the solar system by solar winds…

In the future, there could be machines that vacuum up the top layer of the moon’s surface, which could then be used to address Earth’s energy needs or to power moon bases for future missions…

Excerpts from Natasha Khan, Moon Dust Fuels China’s Pursuit of Space Power, WSJ, Dec. 14, 2021

How to Microwave People

An international studies professor in Beijing has claimed China used microwave weapons against Indian soldiers during a standoff along the disputed Himalayan border. Jin Canrong, professor of international relations at Renmin University, told his students Chinese forces forced the Indian soldiers to retreat by turning “the mountain tops into a microwave oven”, according to The Times. Microwave weapons work much the same as regular microwaves. The device heats the water in the human target’s skin, causing immense pain and nausea. The weapon is meant to incapacitate enemies through severe pain but isn’t meant to cause lasting damage. Professor Jin claimed the weapon worked “beautifully” on the Indian soldiers, without violating the “no gunfire” agreement between the parties.

“In 15 minutes, those occupying the hilltops all began to vomit,”reportedly told his students during a lecture. “They couldn’t stand up, so they fled. This was how we retook the ground.” Professor Jin said the reason China didn’t publicize the event was because it was so successful, adding that India also kept the incident under wraps because “they lost so miserably”..

Similar microwave technology aimed at incapacitating but not killing targets have been developed by other militaries. The US used the same technology to develop the Active Denial System, which was designed to be used for area denial, perimeter security and crowd control…Recently, Russia was accused of using its own secret microwave weapon to attack two CIA agents in Australia. It comes after American officials in Cuba fell in with what was dubbed “Havana Syndrome”, with victims often hearing strange sounds, before becoming dizzy, suffering headaches, experiencing memory loss and hearing loss.

Excerpts from Ally Foster,  China allegedly used a secret ‘microwave weapon’ on enemy troops, news.com.au, Nov. 19, 2021

The Space Internet: Space Bacon-DARPA

DARPA’s  Space-Based Adaptive Communications Node (Space-BACN) would allow seamless communication between various constellations of satellites that currently cannot talk to each other.

“There could be tens of thousands of small satellites launched into Low Earth Orbit over the next decade as the demand around the world for affordable space-based capabilities grows,” said Greg Kuperman, Space-BACN program manager in DARPA’s Strategic Technology Office. “The problem with this growth is that optical communications links are currently engineered to only connect satellites within a given constellation – they can’t dynamically adapt waveforms to communicate with satellites in other constellations. This lack of standardization results in a fragmented, stove-piped ‘Wild West’ space domain with new satellite constellations that can’t interoperate, government satellites that can’t communicate between one another, and government satellites unable to take advantage of emerging commercial communications capabilities.”

Space-BACN envisions an adaptable communications terminal that could be reconfigured on-orbit to talk across different standards, presenting a leap in technology from the current state of the art. Space-BACN will involve inter alia a novel cross-constellation command and control approach to automate interactions between government and commercial satellites

Space-BACN has significant military and civilian uses.

Excerpts from Adaptable Optical Communications to Facilitate Future Low-Earth Orbit Networks

See also DARPA solicitation Nov. 2021a

Companies and institutions that are working on this are: Analog Photonics, Arizona State University; CACI; II-VI Aerospace & Defense; Intel Federal; L3 Harris and Northrop Grumman.

Genocide in the Empire of Mark Zuckerberg

Facebook failed to quickly stop the spread of hate speech and misinformation against the Rohingya people, in turn contributing to the persecution and alleged genocide of the minority community in Myanmar, according to a lawsuit filed in December 2021 in a California court that asks for more than $150 billion in compensation.
 
The class-action lawsuit against Meta, Facebook’s parent company, was brought by a Rohingya woman in Illinois on behalf of the 10,000-plus Rohingya refugees who have resettled in the United States since 2012. It alleges that Facebook’s algorithm amplified hate speech and that the company neglected to remove inflammatory content despite repeated warnings that such posts could foment ethnic violence.
A similar complaint against the tech giant is expected to be filed in a British court.

Myanmar’s military launched a “scorched-earth campaign” in 2017 to push Rohingya residents, who are mostly Muslim, out of Rakhine state. Some 750,000 Muslim men, women and children were driven out in a campaign of rape, murder and razed villages that a top United Nations official called a “textbook example of ethnic cleansing.” That year, Doctors Without Borders estimated that at least 6,700 Rohingya people had been killed as a result of the attacks. Around the same time, influential figures such as nationalist monks and top government officials posted or recirculated slurs against the Rohingya, while spreading falsehoods and doctored images that suggested some Rohingya burned their own villages and then blamed it on Myanmar security forces. Myanmar has denied the genocide accusations and has justified some actions on counterterrorism grounds.
 
In 2018, a U.N. report connected Facebook to the atrocities against the Rohingya people. According to the report:

“Facebook has been a useful instrument for those seeking to spread hate, in a context where, for most users, Facebook is the Internet. Although improved in recent months, the response of Facebook has been slow and ineffective. The extent to which Facebook posts and messages have led to real-world discrimination and violence must be independently and thoroughly examined.” 

After the publication of the UN Report, the region became a priority for the company, which began flooding it with resources in 2018… The platform said that it removed some 64,000 pieces of content in Myanmar that violated its policies against hate speech…“Not until 2018 — after the damage had been done — did Facebook executives … meekly admit that Facebook should and could have done more,” the lawsuit alleges. “Facebook is like a robot programed with a singular mission: to grow. And the undeniable reality is that Facebook’s growth, fueled by hate, division, and misinformation, has left hundreds of thousands of devastated Rohingya lives in its wake.”….

Backed by the Organization of Islamic Cooperation, Gambia asked a U.S. court to force Facebook to turn over data related to accounts it deleted in 2018 that fueled atrocities in Myanmar. After some legal wrangling, a federal judge in D.C. shot down the request  on December 3, 2021.

Excerpt from Amy Cheng, Rohingya refugees sue Facebook for $150 billion, alleging it helped perpetuate genocide in Myanmar, Washington Post, Dec. 7, 2021

The New Alliance: SaudiChina

Saudi Arabia has imported sensitive missile technology from the Chinese military and is manufacturing its own ballistic missiles…The Saudi government has sought help from the missile branch of the Chinese military, the People’s Liberation Army Rocket Force…Ballistic missiles are powered by rockets that propel them in an arch-shaped trajectory upward before descending toward their target on the surface of the earth. They can be used to deploy both conventional and nuclear weapons.

The U.S. has long refused to sell ballistic missiles to Riyadh over proliferation concerns. The kingdom obtained Dong Feng-3 missiles in the 1980s from China and displayed them publicly in 2014. The Chinese military has also transferred multiple batches of finished Dong Feng-series missiles since around 2018 up to as recently as the spring of 2021….China also has helped Saudi Arabia construct a facility to fabricate uranium yellowcake, an early step along the path to a civil nuclear energy program or a nuclear arms capability, the Journal reported last year.

Excerpt from Jared Malsin et al, Saudis Begin Making Ballistic Missiles With Chinese Help, WSJ, Dec. 24, 2021

Israel’s Preemptive Attacks on Chemical Weapons, Syria

Israel twice struck chemical weapons facilities in Syria between 2020 and 2021 in a campaign to prevent Syria from renewing chemical weapons production…Syria’s government denies using chemical arms. In 2013 it promised to surrender its chemical weapons, which it says it has done.

On June 8, 2021, Israeli jets hit three military targets near the cities of Damascus and Homs, all linked to Syria’s former chemical weapons program. In March 2020, Israel targeted a villa and compound tied with the procurement of a chemical that can be used in nerve agents. Whether Israel’s attacks were fully successful in disrupting Syria’s plans is unclear. Israeli officials intended the strikes to be preemptive, knocking out the country’s production capabilities before actual weapons could be made…

Excerpts from Israel hit chemical weapons facilities in Syria over past two years, Reuters, Dec. 13, 2021

To Save the Congo Rainforest, We Must Save the People First

The Special Representative of the Secretary-General in the Democratic Republic of the Congo told the Security Council in December 2021  that “a lasting solution” to the violence” in Congo requires a broader political commitment to address the root causes of conflict.”  Bintou Keita argued that, for stability to return to eastern Congo, “the State must succeed in restoring and maintaining the confidence of the people in state’s ability to protect, administer, deliver justice and meet their basic needs.” 

Starting on November 30, 2021  the Congolese Armed Forces initiated joint military operations with the Ugandan army against the rebel Allied Democratic Forces (ADF) in the east.  In May 2021, the Congolese authorities declared a state of siege in the provinces of Ituri and North Kivu, whose duration has just been extended for the 13th time

But the challenges facing the Government in implementing the state of siege highlight “the limits of a strictly military approach to the protection of civilians and the neutralization of armed groups.”  In fact, the period of the state of siege saw a 10 per cent increase in the number of violations and abuses of human rights in the country.  


According to the Special Representative, the humanitarian situation continues to deteriorate in the restive east, due to insecurity, epidemics, and limited access to basic services.  The number of internally displaced people stands at nearly 6 million, of which 51 per cent are women. This is the highest number of internally displaced people in Africa.  

The Special Representative pointed out the illegal exploitation of natural resources as “a major driver of conflict”, saying it must be addressed, and commended President Tshisekedi’s intervention at the COP26 Summit, where he committed to combat deforestation in the Congo Basin rainforest and reduce greenhouse gas emissions by 21 per cent, by 2030….  

Excerpts from DR Congo: Limitations to ‘strictly military approach’ to stem violence, mission chief warns, UN News, Dec. 6, 2021

The Neck and Neck Race in Africa

Classified American intelligence reports suggest China intends to establish its first permanent military presence on the Atlantic Ocean in the tiny Central African country of Equatorial Guinea. The officials…said the reports raise the prospect that Chinese warships would be able to rearm and refit opposite the East Coast of the U.S.—a threat that is setting off alarm bells at the White House and Pentagon. Principal deputy U.S. national security adviser Jon Finer visited Equatorial Guinea in October 2021 on a mission to persuade President Teodoro Obiang Nguema Mbasogo and his son and heir apparent, Vice President Teodoro “Teodorin” Nguema Obiang Mangue, to reject China’s overtures…

In Equatorial Guinea, the Chinese likely have an eye on Bata, according to a U.S. official. Bata already has a Chinese-built deep-water commercial port on the Gulf of Guinea, and excellent highways link the city to Gabon and the interior of Central Africa….

Equatorial Guinea, a former Spanish colony with a population of 1.4 million, secured independence in 1968. The capital, Malabo, is on the island of Bioko, while Bata is the largest city on the mainland section of the country, which is wedged between Gabon and Cameroon. Mr. Obiang has ruled the country since 1979. The discovery of huge offshore gas and oil reserves in 1996 allegedly allowed members of his family to spend lavishly on exotic cars, mansions and other luxuries…The State Department has accused the Obiang regime of extrajudicial killings, forced disappearances, torture and other abuses. A U.S. Senate committee issued a report in 2004 criticizing Washington-based Riggs Bank for turning “a blind eye to evidence suggesting the bank was handling the proceeds of foreign corruption” in accepting hundreds of millions of dollars in deposits controlled by Mr. Obiang, his wife and other relatives……

Equatorial Guinea relies on American oil companies to extract offshore resources that have made the country the richest on the sub-Saharan mainland, as measured by per capita annual gross domestic product….Chinese state-owned companies have built 100 commercial ports around Africa in the past two decades, according to Chinese government data….

The State Department recently raised Equatorial Guinea’s ranking in the annual assessment of how diligently countries combat human trafficking. The upgrade could allow the Biden administration to offer maritime-security assistance to help win Equatorial Guinea’s cooperation.

Excerpts from MICHAEL M. PHILLIPS, China Seeks First Military Base on Africa’s Atlantic Coast, U.S. Intelligence Finds, WSJ, Dec. 5, 2021

Solar and Chemicals Are Not Enough: Nuclear Reactors in Space

Chinese scientists are currently building a powerful nuclear reactor for their moon and Mars expeditions. Beijing claims its reactor will be 100 times more powerful than the device US space agency NASA wants to set up on the moon’s surface by 2030. ..One Chinese expert claims that to satisfy the objectives of human space exploration, chemical fuel and solar panels will no longer suffice; the hunger for more energy sources is likely to grow dramatically if there are human settlements on the moon or Mars in the future.

In November 2021, NASA has issued a request for proposals for the development of a 10-kilowatt nuclear fission device capable of supporting a long-term human presence on the moon within a decade…The plan is to deploy a fission surface power system by 2026, with a flying system, lander, and reactor in place. The facility will be completely built and integrated on Earth, then thoroughly tested for safety and functionality…In addition, Russia has also indicated its intention to launch a massive spaceship powered by TEM, a megawatt-sized nuclear reactor, before 2030. The spaceship would be able to function in Earth’s lower orbit for more than a decade while conducting more missions to the moon or beyond owing to the nuclear energy.

Democritos, a parallel project led by the European Space Agency, will test a 200kW nuclear space reactor on the ground by 2023. Additionally, NATO secretary-general Jens Stoltenberg says that the alliance will not put weapons in space, but it will be required to safeguard its assets, which include 2,000 satellites in orbit. Space is becoming an “operational domain” for NATO as well…

Excerpts from  Ashish Dangwal, 100 Times More Powerful Than US Tech, China Claims Its Nuclear Reactor For Space Missions Will Outdo NASA Device, Eurasiantimes.com, Nov. 26, 2021

How to Lift Nuclear Submarines from Arctic Seabed

Projects aimed to improve nuclear safety are some of the few successful arenas for cooperation still going strong between the European Union and Russia…especially wiht regard to the two old Soviet submarines K-159 and K-27, both rusting on the Arctic seabed with highly radioactive spent nuclear fuel elements in their reactors…

“The sunken submarines K-27 and K-159 are the potential source of contamination of the Arctic, the riskiest ones,” Ambassador Jari Vilén of Filand explains. “Assessments made by the European Union together with Rosatom show that in 20-30 years’ time the metals will start corroding and there is a genuine risk of leakage. Therefore, lifting them in the coming decade is extremely important.”

“I’m very happy we are making progress and that a decision to make a technical review has been decided by the European Bank for Reconstruction and Development (EBRD) through the Northern Dimension Environmental Partnership. Hopefully, when these technical reviews are done, we will come to a phase where we can make decisions on a lifting operation,” Vilén says with enthusiasm.

Lifting a nuclear submarine from the seabed is nothing new. It is difficult, but doable. In 2002, the Dutch salvage company Mammoet managed to raise the ill-fated “Kursk” submarine from the Barents Sea. A special barge was built with wires attached underneath. The wreak of “Kursk” was safely brought in and placed in a dry-dock where the decommissioning took place.

K-159 is a November-class that sank in late August 2003 while being towed in bad weather from the closed naval base of Gremikha on the eastern shores of the Kola Peninsula towards the Nerpa shipyard north of Murmansk. The two onboard reactors contain about 800 kilograms of spent nuclear fuel, with an estimated 5,3 GBq of radionuclides. A modeling study by the Norwegian Institute of Marine Research said that a pulse discharge of the entire Cesium-137 inventory from the two reactors could increase concentrations in cod in the eastern part of the Barents Sea up to 100 times current levels for a two-year period after the discharge. While a Cs-137 increase of 100 times in cod sounds dramatic, the levels would still be below international guidelines. But that increase could still make it difficult to market the affected fish.

K-27, the other submarine in urgency to lift, was on purpose dumped in the Kara Sea in 1982….

Lifting the dumped reactors from the Kara Sea, a price tag of nearly €300 million has been mentioned. The sum includes K-27 and K-159, but also the other dumped reactors from K-11, K-19 and K-140, as well as spent nuclear fuel from an older reactor serving icebreaker “Lenin”. “The value of the fishing stocks in the area is ruffly €1.4 billion annually,” he says.

Excerpts from Thomas Nilsen, EU willing to co-fund lifting of sunken nuclear subs from Arctic seabed, The Barents Observer, Nov. 22, 2021

A Humane Bombing Campaign? the Baghuz Strike

In the last days of the battle against the Islamic State in Syria, when members of the once-fierce caliphate were cornered in a dirt field next to a town called Baghuz, a U.S. military drone circled high overhead, hunting for military targets. But it saw only a large crowd of women and children huddled against a river bank. Without warning, an American F-15E attack jet streaked across the drone’s high-definition field of vision and dropped a 500-pound bomb on the crowd, swallowing it in a shuddering blast. As the smoke cleared, a few people stumbled away in search of cover. Then a jet tracking them dropped one 2,000-pound bomb, then another, killing most of the survivors.

It was March 18, 2019. At the U.S. military’s busy Combined Air Operations Center at Al Udeid Air Base in Qatar, uniformed personnel watching the live drone footage looked on in stunned disbelief, according to one officer who was there. “Who dropped that?” a confused analyst typed on a secure chat system being used by those monitoring the drone, two people who reviewed the chat log recalled. Another responded, “We just dropped on 50 women and children.”

The Baghuz strike was one of the largest civilian casualty incidents of the war against the Islamic State, but it has never been publicly acknowledged by the U.S. military. The details, reported by the New York Times on November 13, 2021, show that the death toll was almost immediately apparent to military officials. A legal officer flagged the strike as a possible war crime that required an investigation. But at nearly every step, the military made moves that concealed the catastrophic strike. The death toll was downplayed. Reports were delayed, sanitized and classified. United States-led coalition forces bulldozed the blast site. And top leaders were not notified.

The Defense Department’s independent inspector general began an inquiry, but the report containing its findings was stalled and stripped of any mention of the strike. “Leadership just seemed so set on burying this. No one wanted anything to do with it,” said Gene Tate,  a former Navy officer who had worked for years as a civilian analyst with the Defense Intelligence Agency and the National Counterterrorism Center before moving to the inspector general’s office….

The details of the strikes were pieced together by The New York Times over months from confidential documents and descriptions of classified reports, as well as interviews with personnel directly involved, and officials with top secret security clearances who discussed the incident on the condition that they not be named. The Times investigation found that the bombing had been called in by a classified American special operations unit, Task Force 9, which was in charge of ground operations in Syria. The task force operated in such secrecy that at times it did not inform even its own military partners of its actions. In the case of the Baghuz bombing, the American Air Force command in Qatar had no idea the strike was coming, an officer who served at the command center said.

The only assessment done immediately after the strike was performed by the same ground unit that ordered the strike. It determined that the bombing was lawful because it killed only a small number of civilians while targeting Islamic State fighters in an attempt to protect coalition forces, the command said. Therefore no formal war crime notification, criminal investigation or disciplinary action was warranted, it said, adding that the other deaths were accidental.

But the Air Force lawyer, Lt. Col. Dean W. Korsak, believed he had witnessed possible war crimes and repeatedly pressed his leadership and Air Force criminal investigators to act. When they did not, he alerted the Defense Department’s independent inspector general. Two years after the strike, seeing no evidence that the watchdog agency was taking action, Colonel Korsak emailed the Senate Armed Services Committee, telling its staff that he had top secret material to discuss and adding, “I’m putting myself at great risk of military retaliation for sending this.”..

The United States portrayed the air war against the Islamic State as the most precise and humane bombing campaign in its history. The military said every report of civilian casualties was investigated and the findings reported publicly, creating what the military called a model of accountability. The details suggest that while the military put strict rules in place to protect civilians, the Special Operations task force 9 repeatedly used other rules to skirt them. The military teams counting casualties rarely had the time, resources or incentive to do accurate work. And troops rarely faced repercussions when they caused civilian deaths.

On the ground, Task Force 9 coordinated offensives and airstrikes. The unit included soldiers from the 5th Special Forces Group and the Army’s elite commando team Delta Force, several officials said. Over time, some officials overseeing the air campaign began to believe that the task force was systematically circumventing the safeguards created to limit civilian deaths. The process was supposed to run through several checks and balances. Drones with high-definition cameras studied potential targets, sometimes for days or weeks. Analysts pored over intelligence data to differentiate combatants from civilians. And military lawyers were embedded with strike teams to ensure that targeting complied with the law of armed conflict.  But there was a quick and easy way to skip much of that oversight: claiming imminent danger….By late 2018, about 80 percent of all airstrikes Task Force 9 was calling in claimed self-defense, according to an Air Force officer who reviewed the strikes. The rules allowed U.S. troops and local allies to invoke it when facing not just direct enemy fire, but anyone displaying “hostile intent,”… Under that definition, something as mundane as a car driving miles from friendly forces could in some cases be targeted…..

The aftermath of that approach was plain to see. A number of Syrian towns, including the regional capital, Raqqa, were reduced to little more than rubble. Human rights organizations reported that the coalition caused thousands of civilian deaths during the war. Hundreds of military assessment reports examined by The Times show the task force was implicated in nearly one in five coalition civilian casualty incidents in the region…Publicly, the coalition insisted the numbers were much lower. Privately, it became overwhelmed by the volume of civilian casualty claims reported by locals, humanitarian groups and the news media, and a backlog of civilian casualty assessment reports sat unexamined for months, two people who compiled the reports said…..

Excerpts from How the U.S. Hid an Airstrike That Killed Dozens of Civilians in Syria, NY Times, Nov. 13, 2021

Eradicating Old Cities and their Populations

The fighters of Islamic State…raided the tombs of Assyrian kings in Nineveh, blew up Roman colonnades in Palmyra and sold priceless relics to smugglers. But their vandalism was on a modest scale compared with some of the megaprojects that are habitually undertaken by many Middle Eastern government… Iraq’s government began to build the Makhoul dam. Once complete, it is likely to flood Ashur—and another 200 historical sites.

Similar archaeological tragedies have occurred across the region, mainly thanks to the appetite of governments for gigantism in the name of modernization…The re-landscaping displaces people as well as erasing their heritage, sometimes as a kind of social engineering….

Egypt’s dictator, Abdel Fattah al-Sisi, has bulldozed swathes of Cairo, the old capital, to make way for motorways, flyovers and shiny skyscrapers that line the road to the new administrative capital he is building. To ease congestion he has scythed a thoroughfare named Paradise through the City of the Dead, a 1,000-year-old necropolis that is a un-designated world heritage site. Hundreds of tombs were destroyed. He has turfed out tens of thousands of people from their homes in Boulaq, along the Nile, calling it slum clearance. This was where Cairo’s old port prospered in Ottoman times. Instead of rehabilitating it, Mr Sisi is letting property magnates carpet the area with high-rise apartment buildings. Mr Sisi has allowed investors from the United Arab Emirates to build a mini-Dubai on Cairo’s largest green space, a nature reserve on al-Warraq island. Its 90,000 residents will be shunted off, mainly to estates on the city’s edge. Protesters have been condemned as Islamist terrorists and sent to prison, many for 15 years…

Some rulers have security in mind when they bulldoze history. Mr Sisi can send in the tanks faster on wider roads. Removing Egypt’s poor from city centres may curb the risk of revolution. “They know that poor areas revolted in 2011,” says Abdelrahman Hegazy, a Cairene city planner. “They’re afraid of population density.” During Syria’s current civil war, President Bashar al-Assad and his Russian patrons ruined parts of the old cities of Homs and Aleppo, treasure troves of antiquity that were also rebel strongholds, with relentless barrel-bombing….

Excerpts from Bulldozing history: Arab states are wrecking old treasures, Economist, Sept. 4, 2021

How to Exclude China from the Global Technology Base: the Role of IMEC

The Interuniversity Microelectronics Centre (IMEC) located in Leuven, Belgium, does not design chips (like America’s Intel), manufacture them (like TSMC of Taiwan) or make any of the complicated gear (like ASML, a Dutch firm). Instead, it creates knowledge used by everyone in the $550bn chip business. Given chips’ centrality to the modern economy and increasingly to modern geopolitics, too, that makes it one of the most essential industrial research-and-development (R&D) center on the planet. Luc Van den hove, IMEC’s boss, calls it the “Switzerland of semiconductors”.

IMEC was founded in 1984 by a group of electronics engineers from the Catholic University of Leuven who wanted to focus on microprocessor research. In the early days it was bankrolled by the local Flemish government. Today IMEC maintains its neutrality thanks to a financial model in which no single firm or state controls a big share of its budget. The largest chunk comes from the Belgian government, which chips in some 16%. The top corporate contributors provide no more than 4% each. Keeping revenue sources diverse (partners span the length and breadth of the chip industry) and finite (its standard research contracts last three to five years) gives IMEC the incentive to focus on ideas that help advance chipmaking as a whole rather than any firm in particular.

A case in point is the development of extreme ultraviolet lithography (EUV)…It took 20 years of R&D to turn the idea into manufacturing reality. IMEC acted as a conduit in that process… Advanced toolmakers want a way to circulate their intellectual property (IP) without the large companies gaining sway over it. The large companies, meanwhile, do not want to place all their bets on any one experimental idea that is expensive (as chipmaking processes are) and could become obsolete.

IMEC’s neutrality allows both sides to get around this problem. It collects all the necessary gear in one place, allowing producers to develop their technology in tandem with others. And everyone gets rights to the IP the institute generates. Mr Van den hove says that progress in the chip industry has been driven by the free exchange of knowledge, with IMEC acting as a “funnel” for ideas from all over the world…IMEC’s revenues, which come from the research contracts and from prototyping and design services, doubled between 2010 and 2020, to €678m ($773m).

The deepening rift between America, home to some of the industry’s biggest firms, and China, which imported $378bn-worth of chips last year, threatens IMEC’s spirit of global comity. China’s chip industry is increasingly shielded by an overbearing Communist Party striving for self-sufficiency, and ever more ostracized by outsiders as a result of American and European export controls. All this limits the extent to which IMEC can work with Chinese semiconductor companies…IMEC would not comment on individual partnerships but says it has “a few engagements with Chinese companies, however not on the most sensitive technologies, and always fully compliant with current European and US export regulations and directives”.

Excerpts from Neutral but not idle: IMEC offers neutral ground amid chip rivalries, Economist, Sept. 25, 2021

Tracking and Removing Polluting Space Junk

At orbital speeds a tennis-ball-sized piece of space junk packs enough energy to obliterate a satellite…Even tiny bits of debris can do damage. In May 2021 the Canadian Space Agency said an untracked piece of junk had punched a hole 5mm across in Canadarm2, a robotic limb attached to the International Space Station (ISS).

As orbiting objects multiply, the danger grows. Roughly a dozen sizeable pieces of space debris break up every year as a result of collisions, exploding rocket fuel, or the rupturing of pressurized tanks or old batteries. Solar radiation chips off bits of paint and metal…Today there 4,500 active satellites orbiting Earth and this does not include defunct satellites…There could be 100,000 active satellites in orbit by the end of the decade…

Radars operated by the US Department of Defense have improved ‘space situational awareness’…One big advance has been “Space Fence”. This is a system built in the Marshall Islands for America’s air force. It is billed as the world’s most advanced radar…In April 2021, LeoLabs, a firm in Silicon Valley, switched on its fourth debris-tracking radar station. ..LeoLabs sells data to satellite operators, space agencies, America’s armed forces and insurers keen to calculate better actuarial tables for spacecraft….

Besides using radar, debris can also be tracked optically. In collaboration with Curtin University, in Perth, Lockheed Martin runs FireOpal, a system of 20 cheap cameras aimed at the sky from various parts of Australia. For several hours at dawn and dusk, when these cameras are in the dark but sunlight still illuminates debris orbiting above, the cameras take pictures every ten seconds. The closer an object, the more it appears to move relative to the stars, allowing triangulation of its position…fire

Lasers are another option….For finding stuff in high orbits, though, neither lasers nor radars are much help. But telescopes work. ExoAnalytic Solutions, a Californian firm, tracks junk up to 170,000km away—nearly halfway to the Moon—using instruments “just laying on the shelves” at astronomy shops...Northstar Earth & Space, a new firm in Montreal, is to raise money to build, at $25m a pop, three 100kg satellites that will use telescopic cameras to track junk from orbit..

Naturally, this orbital-tracking technology has military value as well. Knowing objects’ orbits can reveal much about an adversary’s capabilities—including, perhaps, orbital combat. Movements that represent any deviation from normal patterns are most telling…To illustrate why, he points to an object that had been considered to be just a piece of debris from a Russian military launch. In May 2014 the “debris” sprang to life. Its movements since then have fuelled fears that it could be an anti-satellite weapon. Whether other such “sleepers” are hidden in plain sight among the clouds of rubbish orbiting Earth remains to be seen. 

Excerpts from Orbital housekeeping: Tracking space debris is a growing business, Economist, Sept. 18, 2021

The Transparency of Oceans and Nuclear Submarines

There are warnings that different technologies will render the ocean “transparent”, so even the stealthiest submarines could be spotted by an enemy force… China has already developed submarine-spotting lasers. CSIRO is working with a Chinese marine science institute that has separately developed satellite technology that can find submarines at depths of up to 500 meters.   But others say submarines are just a base platform for a range of new and evolving technologies. The Australian Strategic Policy Institute’s outgoing head, Peter Jennings, said the nuclear-propelled submarines that Australia will get as part of the Aukus alliance have more space and energy for being “motherships” than conventional submarines.

“They’re significantly bigger and the reactors give you the energy not just for the propulsion but for everything else inside the boat,” he said. “You then have a huge amount of space for weapons, for vertical launch tubes for cruise missiles and for autonomous systems that can be stored on board. Not only is it a fighting unit but you might have half a dozen remote systems fanned out at quite a distance. They’ll be operating a long distance away from potential targets, potentially hundreds of kilometers. According to the taskforce set up under Aukus, the new submarines will have “superior characteristics of stealth, speed, manoeuvrability, survivability, and almost limitless endurance”, with better weapons, the ability to deploy drones and “a lower risk of detection”.

Excerpts from Tory Shepherd, Will all submarines, even nuclear ones, be obsolete and ‘visible’ by 2040?, Oct. 4, 2021

The 17 000 Nuclear Objects Dumped in the Kara Sea


“Having the exact coordinates for the dumped container with the nuclear reactors from K-19 submarine is undoubtedly good news,” says nuclear safety expert Andrey Zolotkov. Zolotkov hopes for risk assessments to be carried out soon with the aim to see how the nuclear reactors could be lifted out of the maritime environment and brought to a yard for safe decommissioning…More than 50 years have passed since the dumping.

In the so-called “White Book” on dumped nuclear objects, originally published by President Boris Yeltsin’s environmental advisor Alexei Jablokov, the dumping of the submarine’s two reactors is listed for the Abrosimova Bay on the east coast of the Kara Sea, but exact location hasn’t been confirmed.

It was in August 2021 that the the crew on “Akademik M. Keldysh” with the help of sonars and submersibles found the container. Both marine researchers, oceanology experts from Russia’s Academy of Science and representatives of the Ministry of Emergency Situations are working together in the expedition team.

K-19 is one of the most infamous nuclear-powered submarines sailing for the Soviet navy’s Northern Fleet. In July 1961 the reactor lost coolant after a leak in a pipe regulating the pressure to the primary cooling circuit. The reactor water started boiling causing overheating and fire. Crew members managed to extinguish the fire but had big problems fixing the leak in an effort to save the submarine from exploding. Many of them were exposed to high doses of radioactivity before being evacuated to a nearby diesel submarine sailing in the same area of the North Atlantic. Eight of the crew members who had worked on the leak died of radiation poisoning within a matter of days.

The submarine was towed to the Skhval shipyard (No. 10) in Polyarny. Later, the reactor compartment was cut out and a new installed. The two damaged reactors, still with spent nuclear fuel, were taken north to the Kara Sea and dumped. Keeping the heavily contaminated reactors at the shipyard was at the time not considered an option.

In the spring of 2021, Russia’s Foreign Ministry invited international experts from the other Arctic nations to a conference on how to recover sunken radioactive and hazardous objects dumped by the Soviet Union on the seafloor east of Novaya Zemlya. Moscow chairs the Arctic Council for the 2021-2023 period. 

The two reactors from the K-19 submarine are not the only objects posing a risk to marine environment. In fact, no other places in the world’s oceans have more radioactive and nuclear waste than the Kara Sea. Reactors from K-11 and K-140, plus the entire submarine K-27 and spent uranium fuel from one of the old reactors of the “Lenin” icebreaker are also dumped in the same sea. While mentality in Soviet times was «out of sight, out of mind», the Kara Sea seemed logical. Ice-covered most of the year, and no commercial activities. That is changing now with rapidly retreating sea ice, drilling for oil-, and gas, and increased shipping…Additional to the reactors, about 17,000 objects were dumped in the Kara Sea in the period from the late 1960s to the early 1990s.

Excerpts from Thomas Nilsen, Expedition finds reactors 56 years after dumping, The Barents Observer, Sept. 2, 2021

Conquering Virgin Digital Lands a Cable at a Time

Facebook  said it would back two new underwater cable projects—one in Africa and another in Asia in collaboration with Alphabet — that aim to give the Silicon Valley giants greater control of the global internet infrastructure that their businesses rely on.

The 2Africa project, a partnership between Facebook and several international telecom operators, said that it would add four new branches: the Seychelles, Comoro Islands, Angola and Nigeria. The project’s overall plan calls for 35 landings in 26 countries, with the goal of building an underwater ring of fiber-optic cables around Africa. It aims to begin operating in 2023… Separately, Facebook that it would participate in a 7,500-mile-long underwater cable system in Asia, called Apricot, that would connect Japan, Taiwan, Guam, the Philippines, Indonesia and Singapore. Google said that it would also join the initiative, which is scheduled to go live in 2024.

Driving the investments are costs and control. More than 400 commercially operated underwater cables, also known as submarine cables, carry almost all international voice and data traffic, making them critical for the economies and national security of most countries…Telecom companies own and operate many of these cables, charging fees to businesses that use them to ferry data. Facebook and Google used so much bandwidth that they decided about a decade ago that it would make sense to cut out the middleman and own some infrastructure directly.

Excerpts from Stu Woo, Facebook Backs Underwater Cable Projects to Boost Internet Connectivity, WSJ, Aug. 17, 2021

From Pegasus to Pariah: Israeli Spying is Not Sexy

When international news organizations revealed that at least ten governments had used Pegasus, a powerful software tool created by Israel’s NSO Group, to hack into the smartphones of thousands of people around the world, including politicians, human-rights activists and journalists, the Israeli government shrugged. None of its ministers has publicly commented….Israeli defence exporters privately expressed ridicule. “Arms companies can’t keep track of every rifle and bullet they sell to legitimate customers,” said one. “Why should we have higher expectations when it comes to software?…Israeli spying is a sexy subject and these reports are the price for doing business.”

Countries that have received Pegasus software include Brazil, Hungary and India, along with Sunni Arab regimes with whom Israel recently established diplomatic relations: Bahrain, Morocco and the United Arab Emirates. Saudi Arabia, a fellow enemy of Iran, is listed, too. “Deals on cyber-surveillance are the kind of sweetener you can throw into a diplomatic package with a foreign leader,” says a former NSO consultant.

Excerpts from Let Pegasus fly: Israel is loth to regulate its spyware exports, Economist, July 31, 2021

Sponsors of War: Captagon at $25 Better than Alcohol

In Saudi Arabial party-goers prefer Captagon pills (to alcohol), nowadays the Gulf’s favorite drug, at $25 a pop. Part of the amphetamine family, it can have a similar effect to Viagra—and conquers sleep. “With one pill,” says a raver, “we can dance all weekend.”

For Syria’s president, Bashar al-Assad, the drug has become a boon—at least in the short run. His country has become the world’s prime pusher of Captagon. As the formal economy collapses under the burden of war, sanctions and the predatory rule of the Assads, the drug has become Syria’s main export and source of hard currency. The Centre for Operational Analysis and Research (COAR), a Cyprus-based consultancy, reckons that last year authorities elsewhere seized Syrian drugs with a street value of no less than $3.4bn. That compares with Syria’s largest legal export, olive oil, which is worth some $122m a year. The drug is financing the central government, says Ian Larson, who wrote a recent report on the subject for COAR…

Chemical plants in the cities of Aleppo and Homs have been converted into pill factories. In the Gulf the mark-up for pills can be 50 times their cost in Syria. Smugglers hide them in shipments of paper rolls, parquet flooring and even pomegranates. Saudi princes use private jets to bring the stuff in

For the Syrians left behind, drugs may destroy what remains of society after a decade of civil war. “Young men who haven’t been killed, exiled or jailed are addicts,” says a social worker in Sweida, a city held by the Assads in the south. 

Excerpt from Pop a pill, save a dictator: Syria has become a narco-state, Economist, July 19, 2021