Rogue Nations Competing with the X-37B

The Air Force’s X-37B Orbital Test Vehicle Mission 5 successfully landed at NASA’s Kennedy Space Center Shuttle Landing Facility Oct. 27, 2019. The X-37B OTV is an experimental test program to demonstrate technologies for a reliable, reusable, unmanned space test platform for the U.S. Air Force. (Courtesy photo) source

America’s four greatest adversaries are investing in systems that can take out satellites on orbit, including funding laser systems, nuclear power and satellites that shadow American space vehicles.

Russia, China, Iran and North Korea are each researching counterspace capabilities — kinetic or nonkinetic ways to taking out systems in space — according to the annual Global Counterspace Capabilities report, released by the Secure World Foundation.

Defense News was given an exclusive preview of the report, which will available later today and was edited by Brian Weeden and Victoria Samson.

For the first time, the report includes data on the space situational awareness (SSA) capabilities of countries — that is, the ability of nations to track what is moving in various orbits. Japan and India are two nations investing heavily in that area, according to the report, while Iran appears to lag behind.

“This is important because you can’t protect [against] what you can’t see,” said Samson, the organization’s Washington office director. “This doesn’t mean that developing an SSA capability is an indication of an offensive counterspace program, as there are many reasons why you would want that capability. But it is needed if you want to go offensive.”

  The Indian Space Research Organisation’s (ISRO) GSAT-9 on board the Geosynchronous Satellite Launch Vehicle (GSLV-F09), launches in Sriharikota in the state of Andhra Pradesh on May 5, 2017. / AFP PHOTO / ARUN SANKAR (Photo credit should read ARUN SANKAR/AFP/Getty Images)

She also highlighted the fact that in the last year, four of the countries with counterspace investments — India, Japan, France and the U.S. — have launched new military organizations specifically to deal with space-related issues, including a focus, at least in part, on counterspace efforts. In addition, the NATO alliance declared space an “operational domain” in December.

The vast majority of counterspace capabilities continue to reside with Russia, China and the United States, but other nations are funding programs as well. France, India, Japan, Iran and North Korea are all known to be at least investing some money in counterspace efforts, whether through ballistic missile programs or non-kinetic means such as cyberattacks.

The most prominent counterspace example of the last year came from India, which in March controversially launched a missile at one of its satellites, blowing it up and spewing shrapnel around low-earth orbit.

So is a counterspace arms race underway? The authors say no, at least in the context of the nuclear arms race where each country is trying to match the other capability for capability.

Instead, “this is about developing a range of offensive and defensive capabilities to go after an opponent’s space assets while protecting your own,” said Weeden, the organization’s director of program planning. “And I think that’s unfortunately inevitable because more and more countries are using space for military purposes. That drives increased interest in how to counter those uses.”

Added Samson, “it now seems that if you want to be considered a major space power, it’s not enough to have your own satellites, or the ability to launch them, or even the ability to launch other country’s satellites. You want your own counterspace capability.”

The big three

When Pentagon and White House officials talked about the need for a Space Force last year, leaders emphasized a growing threat in space.

“For all their posturing about who’s ‘weaponizing’ space, the big three are all working on a lot of the same technologies and doing a lot of the same things,” particularly rendezvous and proximity operations (RPO) where satellites can maneuver near another nation’s system, said Weeden.

The big three in this case are China, Russian and the United States.

China has run multiple maneuvers with its space-based systems that may be RPO-related, but it’s hard to know whether those capabilities are being developed for counterspace use as opposed to intelligence gathering, the report said.

When it comes to Chinese capabilities, Weeden said to focus on the ground-based anti-satellite weaponry — perhaps not a surprise, given China declared itself a player in counterspace technology by destroying one of its own satellites in 2007.

Beijing is investing in at least one, and perhaps as many as three, kinetic anti-satellite capabilities, “either as dedicated counterspace systems or as mid-course missile defense systems that could provide counterspace capabilities,” according to the report.

“It was robustly tested and appears to be operationally deployed,” Weeden said of those capabilities. “As long as the U.S. still relies on small numbers of very expensive satellites in LEO, I think it will prove to be a significant deterrent.”

While China often becomes the focus of public comments from Defense officials, Weeden said to keep an eye on Moscow, as he was “a bit shocked by the breadth of Russian counterspace programs. For all the concern and hype in the U.S. about China, Russia seems to be putting the most into counterspace.”

Those efforts include the Nudol, a ground-launched ballistic missile designed to be capable of intercepting targets in low-earth orbit; three different programs focused on RPO capabilities; the rebirth of an 1980s era program involving a large laser, to either dazzle or damage a satellite, carried about an IL-76MD-90A transport aircraft; a newly-discovered program called Ekipazh, which involves a nuclear reactor to power a large payload of on-orbit jammers; and what Weeden describes as a “massive” upgrade to SSA capabilities.

“All of that spells a very potent, more operationally-integrated, and more battle-tested package than what I’m seeing in China,” he warned. He added that he believes the public focus on China to be “part of the broader narrative the Trump administration is trying to push with China being the long-term threat they want to focus on. It also helps sell the narrative they’re trying to push on human spaceflight and exploration as well.”

As for the United States, the military has focused more on SSA and defensive counterspace capabilities, a trend Weeden says is due to America being the most reliant on space of the three countries, and hence must “protect its capabilities if it hopes to win a future conflict against Russia or China.” America’s SSA capabilities, in particular, remain well ahead of the rest of the world.

Which isn’t to say the U.S. is skipping out on counterspace investments either. America has a number of options for electronic warfare in space, including proven capabilities to jam enemy receivers within an area of operations; assets with RPO capabilities; and operational midcourse missile defense interceptors that have been demonstrated against low orbit satellites. In addition, there are plans to invest in prototyping directed energy capabilities for space.

One capability to keep an eye on is the X-37B, a spaceplane program that has made five trips into orbit and back to earth. In total, the spacecrafts have spent 2,865 days on orbit cumulatively over its five missions, with its last trip consisting of 780 days in space — more than two years.

The Air Force has been secretive about X-37B missions, often talking broadly about it conducting experiments in space; analysts have long believed that the mission set has at least something to do with counterspace capabilities. That belief was only strengthened by what happened during its last trip during which researchers believe it was used to launch a trio of small cubesats which were not registered in international tracking databases.

“The secret deployment of multiple small satellites raises additional questions about the mission of the X-37B. It suggests that the X-37B may have a mission to serve as a covert satellite deployment platform. The secrecy surrounding both the X-37B and the deployment may indicate they are part of a covert intelligence program, but it may also indicate the testing of offensive technologies or capabilities,” the authors wrote in the report. “The failure to even catalog the deployed satellites, something that is done even for classified U.S. military and intelligence satellites, calls into question the trustworthiness of the public SSA data provided by the U.S. military.”

And that creates potential diplomatic issues, at a time that the need for open discussions about space capabilities across nations should be growing, warned Samson.

“The Russians and Chinese have always pointed at the secrecy surrounding the X-37B program as evidence of malevolent intentions by the United States,” she said. “The fact that the U.S. released objects from the X-37B and didn’t register them feeds absolutely into that narrative and causes ripple effects that harm other multilateral discussions on space security and stability.”

Govt Report on Prevention of Nationwide Cyber Catastrophe

A good first step for sure, however there needs to be a government-wide decision on cyber attacks being an act of war and how to respond.

***

The Cyberspace Solarium Commission’s proposes a strategy of layered cyber deterrence. Our report consists of over 80 recommendations to implement the strategy. These recommendations are organized into 6 pillars:
  1. Reform the U.S. Government’s Structure and Organization for Cyberspace.
  2. Strengthen Norms and Non-Military Tools.
  3. Promote National Resilience.
  4. Reshape the Cyber Ecosystem.
  5. Operationalize Cybersecurity Collaboration with the Private Sector.
  6. Preserve and Employ the Military Instrument of National Power.

Click here to download the full report.

A much-anticipated government report aimed at defending the nation against cyber threats in the years to come opens with a bleak preview of what could happen if critical systems were brought down.

“The water in the Potomac still has that red tint from where the treatment plants upstream were hacked, their automated systems tricked into flushing out the wrong mix of chemicals,” the Cyberspace Solarium Commission wrote in the opening lines of its report.

“By comparison, the water in the Lincoln Memorial Reflecting Pool has a purple glint to it. They’ve pumped out the floodwaters that covered Washington’s low-lying areas after the region’s reservoirs were hit in a cascade of sensor hacks,” it continues.

So begins the report two years in the making from a congressionally mandated commission made up of lawmakers and top Trump administration officials, pointing to the vulnerabilities involved with critical systems being hooked up to the internet.

The report, which includes more than 75 recommendations for how to prevent the cyber doomsday it spells out, and the commission that made it were both mandated by the 2019 National Defense Authorization Act (NDAA).

The commissioners, who include co-chairmen Sen. Angus King (I-Maine) and Rep. Mike Gallagher (R-Wis.), highlight a range of issues to address, but zero in on election security as “priority.”

“The American people still do not have the assurance that our election systems are secure from foreign manipulation,” King and Gallagher wrote in the report. “If we don’t get election security right, deterrence will fail and future generations will look back with longing and regret on the once powerful American Republic and wonder how we screwed the whole thing up.”

The focus on shoring up election security, and the agreed-upon recommendations for how to do this, sets the report apart from the approach to the subject on Capitol Hill, where it has been a major issue of contention between Republicans and Democrats since Russian interference in the 2016 presidential election.

Beyond election security, the commissioners call for overarching government reform to address cyber vulnerabilities. Chief among these is calling on the White House to issue an updated national strategy to address cyber threats and to establish a national cybersecurity director position to coordinate efforts.

In terms of congressional action, commissioners recommend that Congress create cybersecurity committees in both the House and Senate, establish a Bureau of Cybersecurity Statistics, and establish an assistant secretary position at the State Department to lead international efforts around cybersecurity.

“While cyberspace has transformed the American economy and society, the government has not kept up,” commissioners wrote in calling for reforms.

The commission also zeroed in on “imposing costs” to adversaries who attempt to attack the U.S. online. In order to do so, it recommended that the Department of Defense conduct vulnerability assessments of its weapons systems, including nuclear control systems, and that it make cybersecurity preparedness a necessity.

The Cybersecurity and Infrastructure Security Agency, the Department of Homeland Security’s cyber agency, would be empowered as the “lead agency” at the federal level.

The report’s recommendations were debated on and pinpointed by a group of high-ranking commissioners who also included FBI Director Christopher Wray, Deputy Secretary of Defense David Norquist, Transportation Security Administration Administrator David Pekoske, Sen. Ben Sasse (R-Neb.), and Rep. James Langevin (D-R.I.).

Langevin said in a statement on Wednesday that the report is intended to shore up the nation’s cyber “resiliency for years to come.”

“Our charge in drafting this report was to prevent a cyber event of significant national consequence, and we know that the short- and long-term recommendations we crafted will better position us to realize the promise of the Internet, while avoiding its perils,” Langevin said. “The sooner our recommendations are implemented, the better positioned the country will be to prevent and respond to incidents that can disrupt the American way of life.”

The report’s recommendations may soon have real-world consequences on Capitol Hill.

Rep. John Katko (R-N.Y.), the ranking member on the House Homeland Security Committee’s cyber panel, told The Hill this week that there “definitely will be some legislation” stemming from the report’s recommendations, and that hearings would likely be held.

Katko noted that he had talked with Senate Homeland Security Committee Chairman Ron Johnson (R-Wis.) about the Senate also taking action around the report.

“This report screams of the need for bipartisan action on this, and I hope that we can leave the politics out of it, and I hope we can attack these problems quickly and effectively,” Katko said.

Rep. Cedric Richmond (D-La.), the cyber subcommittee’s chairman, opened a hearing on Wednesday by praising the report’s recommendations and saying he looked forward to working to “codifying” the ideas alongside House Homeland Security Committee Chairman Bennie Thompson (D-Miss.).

Industry groups also reacted positively to the report’s recommendations. Tom Gann, the chief public policy officer of cybersecurity firm McAfee, told The Hill in a statement that he agreed with most of the report’s findings and hoped that they are “acted upon with speed.”

Protect Our Power, a nonprofit with the goal of protecting the electric grid, also praised the report.

“These are compelling recommendations, echoing issues we have highlighted for several years now, and action is long overdue,” Jim Cunningham, executive director of the group, said in a statement. “Without a reliable supply of electricity before, during and following a disabling cyberattack, none of our critical infrastructure can function.”

While there may be legislative action soon – and praise from industry groups – both Gallagher and King emphasized in the report that their main aim was for it to open the eyes of Americans to the dangers posed by cyberattacks on critical systems.

“The status quo is inviting attacks on America every second of every day,” the co-chairmen wrote. “We all want that to stop. So please do us, and your fellow Americans, a favor. Read this report and then demand that your government and the private sector act with speed and agility to secure our cyber future.”

Operation Mega Flex

From July to September last year, Customs and Border Patrol in that 3 month period seized 1061 shipments of counterfeit goods at our cargo ports of entry. Items from Louis Vuitton bags to sports equipment with faulty parts. Other items included children’s toys, drug paraphernalia, deadly opioids, and really scary were (are) counterfeit drivers’ licenses. Recreational drugs, clothing, jewelry and even food and nutritional items (may contain toxins) are part of the counterfeit items affecting likely every American and business.

Image result for cbp counterfeit

Unlike legitimate drug manufacturers that are subject to inspections by the U.S. Food and Drug Administration, labs that manufacture counterfeits have no such oversight. According to a 2019 Better Business Bureau study, “companies based in China, Hong Kong, Singapore, and India shipped 97 percent of the counterfeit medicines seized in the U.S.”In March 2019, Europol, the European Union’s law enforcement agency, seized 13 million doses of counterfeit medicine ranging from opioids to heart medication. Europol noted that this type of counterfeiting is on the rise due to the relatively low risk of criminal detection.

Check those items in retail operations of all sorts and locations and what you purchase in the e-commerce realm, not the from the street vendor at the corner and when purchasing books, movies or music, you could be in real trouble for a transaction that violates copyright protected work.

Image result for cbp counterfeit

Watches and jewelry follow at 13 percent of total seizures. During the Mega Flex operation on August 21, 2019, for example, CBP officers seized counterfeit Rolex watches valued at over $1.4 million. Handbags and wallets represented nearly 11 percent of all seizures, including counterfeits of luxury brands such as Louis Vuitton, Michael Kors, and Gucci. Consumer electronicsrepresented 10 percent of seizures, including products such as iPhones, hover boards, earbuds, microchips, and others. Pharmaceuticals and personal care items account for only 7 percent of total seizures. However, as discussed in the next section, many of the products in these categories pose significant dangers to the consumer. Fake prescription drugs can lack active ingredients, contain incorrect dosages, or include dangerous additives. Fake personal care items such as cosmetics have been found to contain everything from harmful bacteria to human waste. Between 2017 and 2018, CBP and ICE Homeland Security Investigations (HSI) seized over $31 million in fake perfumes from China.

Law enforcement officials have uncovered intricate links between the sale of counterfeit goods and transnational organized crime. A study by the Better Business Bureau notes that the financial operations supporting counterfeit goods typically require central coordination, making these activities attractive for organized crime, with groups such as the Mafia and the Japanese Yakuza heavily involved. Criminal organizations use coerced and child labor to manufacture and sell counterfeit goods. In some cases, the proceeds from counterfeit sales may be supporting terrorism and dictatorships throughout the world.

In FY 2018, 12 percent of DHS seizures included counterfeit versions of critical technological components, automotive and aerospace parts, batteries, and machinery. Each of these industrial sectors have been identified as critical to the defense industrial base, and thus critical to national security. One example drawn from a 2018 study by the Bureau of Industry and Security within the Department of Commerce featured the import of counterfeit semiconductors or “Trojan chips” for use in defense manufacturing and operations. Such Trojan chips can carry viruses or malware that infiltrate and weaken American national security. The problem of counterfeit chips has become so pervasive that the Department of Defense has referred to it as an “invasion.” Companies from China are the primary producers of counterfeit electronics.

According to a 2019 report, Instagram and Counterfeiting, nearly 20 percent of the posts analyzed about fashion products on Instagram featured counterfeit or illicit products. More than 50,000 Instagram accounts were identified as promoting and selling counterfeits, a 171 percent increase from a prior 2016 analysis. Instagram’s Story feature, where content disappears in twenty-four hours, was singled out as particularly effective for counterfeit sellers.

For the full report, go here.

 

 

Iran to be Blacklisted as a Country

Financial Action Task Force, a Paris based organization will take blacklisting action on Iran this week. Finally, it appears Europe is joining the United States in this effort even while former Secretary of State John Kerry and a democrat U.S. Senate delegation met with Iranian leaders in a secret setting.
The task force designation will encompass 39 member countries and organizations where this calls for sanctions on Iran due to money-laundering, financing of terror organizations, corruption politicians, international crime, illegal arms trade and drug trafficking. It is unclear if the United Nations has offered any resistance or comment. The only other country under this full designation is North Korea, yet another 12 countries are subject to the same scrutiny and punitive actions by the task force. Banking and access to international trade will be limited or terminated in many cases completely.

Meanwhile, Russia and China have stepped in to provide more support and aid to Iran.
In an effort to preserve trade and revenue, Iran was construction a rail system into Central Asia connecting the Caspian countries of Azerbaijan, Kazakhstan, Azerbaijan, Russia, Kazakhstan and Turkmenistan. Due to US sanctions, Iran has been in a financial tailspin and construction has essentially stopped and the costs were escalating due to the difficult mountainous regions and regional politics. Enter China and Russia.

source

The project is expected to cost 1.2 billion euros ($1.5 billion) and is being financed by an export credit that Moscow has extended to Tehran. It will involve the electrification of 495 kilometers of existing line, including 203 kilometers in mountainous areas, and the updating of 31 stations and 95 tunnels. This railway segment is projected to carry up to ten million tons of cargo annually upon completion, in 2024. Russian and Iranian officials are jubilant: “All this creates conditions for the growth of goods traffic along the International North–South Transport Corridor and the intensification of economic ties in the Caspian region,” they say (Casp-geo.ru, February 18). The reasons are obvious: if this rail project is completed, Russia and Iran will be able to control much of the trade coming through or out of Central Asia, thus limiting the freedom of action of the states of that region and giving Moscow and Tehran a greater voice in Chinese decisions there (Casp-geo.ru, November 28, 2019; Ru.irna.ir, November 13, 2019).

***

Development of Xinjiang

For China, the project is extremely important due to several factors. First, it will stimulate the economic development of the Xinjiang Uygur Autonomous Region. This autonomous region of China plays a significant role in rail freight transportation on the New Silk Road. The majority of container trains from central, eastern and southern China to Europe run via Xinjiang. Its capital, Urumqi, is also an important railway hub on the corridor towards Europe.

Kashgar, one of the westernmost cities in China, could be another junction in Xinjiang. The Chinese government is discussing the construction of two railway lines from Kashgar: one westward to Kyrgyzstan and Uzbekistan, and another southward. The latter heads to Pakistan, where China Overseas Port Holding Company operates Gwadar Deep Sea Port, and where China intends to build its second, after Djibouti, overseas naval base.

New Silk Road

The second factor of success is the potential of the railway line for the New Silk Road. According to estimations, the Xinjiang – Kyrgyzstan – Uzbekistan route will shorten the route from China to Uzbekistan. Currently, containers going to this Central Asian country must cover long distances and cross the territory of neighbouring Kazakhstan.

Moreover, the railway link between China and Uzbekistan links to Iran (via Turkmenistan) and Turkey, as well as eventually to Europe, especially to Southeast Europe. With this, the route from China to Southeast Europe could be reduced up to 900 kilometres, equal to up to seven or eight days. At the same time, the new railway will allow China to better involve Kyrgyzstan and Uzbekistan into the New Silk Road.

Pelosi Says ‘no war’ but What About the Gerasimov Doctrine?

The 800 lb. gorilla in the room, meaning in Congress is the 2002 AUMF, Authorization for Military Force. That was 18+ years ago and since that time warfare has changed. No longer will we see convention forces take the battlefield that looks that of Ramadi, North Korea or driving the Taliban from power in Afghanistan.

Modern warfare is best described today by the doctrine developed by Russian General Valery Gerasimov. This site has published several items on Gerasimov in recent years where in summary his military paper lays out theories of modern warfare and the new rules. The strategies include politics, cyber, media, leaks, space, fake news, conventional, asymmetric a tactics of extortion and influence.
The United States does not want war but bad guys do and they often get it.
As long as the United States responds and remains defensive on all fronts, we are in a forever war and the bad guys multiply.

The adversaries of our nation watch us more than we watch ourselves, there are divisions, departments, teams, units and various skill sets that are assigned and dedicated to all things United States all to pinpoint our weaknesses and fractures in our systems. They DO find them.
When third in the line of succession to the presidency, Speaker Nancy Pelosi calls President Trump and ‘insecure imposter’ and an ‘assassin’, it becomes one of many jumping off points for our adversaries to exploit. When the media calls Trump a liar, members of Congress use racist, unfit and unstable, the enemy takes delight.

So, taking out General Soleimani was long overdue and as for bad guys multiplying?

Source IISS report

Enter the cyber trolls, the deep fakes, the false news stories, hacks, ransomware, espionage, theft, plants, drones, terrorists embedded with migrants, illicit transfer of goods including weapons, money and people generated by rogue nations.

So, while there is little debate about the AUMF, there is a past due need to update and define all lanes of modern warfare and for a full new unanimous vote on military force which does now include cyber and space.
When Speaker Pelosi announced last week ‘NO WAR’ and the House passed a non-binding resolution to limit President Trump’s war powers against Iran, you can bet Russia was listening as were North Korea, Syria, China and even Iran.

This is a pre-911 mentality regarding foreign policy, United States doctrine and national security. Such was the case several days ago when Iran launched their cyber operation to begin brute force attacks against several targets inside the United States. The Department of Homeland Security’s CISA division (Cybersecurity and Infrastructure Security Agency) sent out several advanced warnings nationally for state and local governments as well as private business and corporations to be on the ready and harden systems with robust firewalls. They are asked for information regarding intrusions and attacks, Well, Texas Governor Abbot did respond. A few Texas state systems were the victims of of brute force cyber hits. The extent of that action appears to be rather minimal but no computer system network ever wants to reveal the damage such that it would or could invite more resulting in more ransomware.

Noted in the Gerasimov Doctrine, hard and soft power across many domains, past and over any boundaries, Russia collaborating with China, Iran and North Korea counter-balance conventional warfare with hybrid tactics and it is cheaper and often missed by experts and media until the real damage is noted.

Congress has held many hearings on what is an act of war against the United States and yet, here we are with a tired and outdated AUMF that does not address gray zone operations. Just ask Ukraine, East Europe and Crimea how Russia was successful in applying hybrid warfare tactics. Maybe we should just rename the Gerasimov Doctrine civilian military operations, perhaps the Democrats and Pelosi would better understand the burdens of the Commander in Chief and that of the Secretary of Defense along with the intelligence agencies. It is an ugly world.