China and Russia Military Collaboration Against the West

Imagine the conversations in meetings between respective military officers of these two countries. As the United States has very little in the way of remote espionage in China and due to the expulsion of U.S. diplomatic personnel from Russia, the U.S. has even less intelligence officers in and around Russia….so, what could be coming that we may soon miss?
CHINA’S EVOLVING OVERSEAS ACCESS
China is expanding its access to foreign ports to pre-position the necessary logistics support to regularize and sustain deployments in the “far seas,” waters as distant as the Indian Ocean, Mediterranean Sea, and Atlantic Ocean. In late November, China publicly confirmed its intention to build military supporting facilities in Djibouti “to help the navy and army further participate in United Nations peacekeeping operations (PKO), carry out escort missions in the waters near Somalia and the Gulf of Aden, and provide humanitarian assistance.” This Chinese initiative both reflects and amplifies China’s growing geopolitical clout, extending the reach of its influence and armed forces.
China’s expanding international economic interests are increasing demands for the PLAN to operate
in more distant seas to protect Chinese citizens, investments, and critical sea lines of communication
(SLOC).
China most likely will seek to establish additional naval logistics hubs in countries with which it has a
longstanding friendly relationship and similar strategic interests, such as Pakistan, and a precedent for hosting foreign militaries. China’s overseas naval logistics aspiration may be constrained
by the willingness of countries to support a PLAN presence in one of their ports.
So far, China has not constructed U.S. – style overseas military bases in the Indian Ocean. China’s leaders may judge instead that a mixture of preferred access to overseas commercial ports and a limited number of exclusive PLAN logistic facilities—probably collocated with commercial ports—
most closely aligns with China’s future overseas logistics needs to support its evolving naval requirements.
Preferred access would give the PLAN favored status in using a commercial port for resupply,
replenishment, and maintenance purposes. A logistics facility would represent an arrangement in
which China leases out portions of a commercial port solely for PLAN logistics operations.
Such a logistics presence may support both civilian and military operations. China’s current naval logistics footprint in the Indian Ocean is unable to support major combat operations in South Asia. A greater overseas naval logistics footprint would better position the PLAN to expand its participation in non-war military missions, such as non-combatant evacuation operations (NEO), search-and-rescue (SAR), humanitarian assistance/disaster relief (HA/DR), and sea lines of communication (SLOC) security. To some extent, a more robust overseas logistics presence may also enable China to expand its support to PKO, force protection missions, and counterterrorism initiatives.
For example, in 2015, the PLAN’s naval escort task forces performing counterpiracy escort duties in the Gulf of Aden were able to utilize Djibouti and Oman for basic resupply and replenishment. The 156 page report is here.
*** http://www.combataircraft.net/wp-content/uploads/sites/5/2016/03/CA-Mar-12-Pic-12-1.jpgElectronic attack J-16
A dedicated electronic warfare (EW) version of the Shenyang J-16 fighter completed its maiden flight on December 18 last year. The first images of the aircraft — sometimes described as the J-16D or even J-16G — reveal several changes compared to the standard J-16 fighter-bomber: most obviously, two large EW pods on the wingtips that are very similar in appearance to the AN/ALQ-218 tactical jamming receivers used by the Boeing EA-18G Growler. The aircraft also features a new, shorter radome and the standard 30mm cannon and the optical sensor in front of the starboard side of the windshield have been removed. In addition, several conformal dielectric EW arrays can be seen around the fuselage, front section (behind the radome), and intakes. Photo
In the wake of Russia’s demonstrations of advanced electromagnetic spectrum and communications jamming capabilities, most recently displayed in their incursion into Ukraine, China also is upping its game in this space, demonstrating similar capabilities in the Pacific.

The U.S. Department of Defense, in an annual report to Congress on China’s military and security developments, assessed that the country is placing greater importance upon EW, on par with traditional domains of warfare such as air, ground and maritime.

“The [People’s Liberation Army] sees EW as an important force multiplier, and would likely employ it in support of all combat arms and services during a conflict,” the 2016 report asserts. “The PLA’s EW units have conducted jamming and anti-jamming operations, testing the military’s understanding of EW weapons, equipment, and performance. This helped improve the military’s confidence in conducting force-on-force, real-equipment confrontation operations in simulated EW environments.”

According to the report, China’s EW weapons include “jamming equipment against multiple communication and radar systems and GPS satellite systems. EW systems are also being deployed with other sea- and air-based platforms intended for both offensive and defensive operations.”More here.

***
Collaboration on Satellites
….uh huh…. Joint military operation locations:
Before Russia and China began their recent series of bilateral exercises, the key tie between Moscow and Beijing was arms sales and military technology cooperation — totaling about $26 billion from 1992 to 2006 — according to estimates cited in the report.

Moscow sold Beijing, “export versions of the Su-27 and Su-30 fighter, the S-300 SAM defense system, Sovermennyy-class guided missile destroyer, and Kilo-class diesel-electric submarine,” the report said, citing data from the Stockholm International Peace Research Institute.
Fears of China copying Russian systems led to a drop off in arms sales between the two countries – especially higher end weapon systems. Chinese arms manufactures are notorious for taking, modifying and reproducing weapon designsMore here.

Russia and China are planning to merge their satellite tracking systems, RT.com is reporting.

The giant system will be able to cover most of an area including China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, Uzbekistan, India and Pakistan. according to RT, the Russian-funded news outlet.

The two nations will reportedly negotiate terms of the merger in May during a conference in China.

Russia and China will be able to share data on positions of navigation satellite groups and to improve efficiency in a real-time environment, RT reported.

The merger was initiated by Chinese officials.

“If the project is implemented, it will allow for an improvement in accuracy for both systems,” a spokesman for the Russian Federal Space Agency, Roscosmos was quoted.

Japan and India are getting set for their own regional navigation satellite systems, RT reported. The system is expected to be operational by the end of the year.

 

4 Days of Food Left…Panic? National Grid Hacked

If there is no transportation, there is no food, medicine or basic supplies….what country is ready to deal with this?

British cities would be uninhabitable within days and the country is only a few meals from anarchy if the National Grid was taken down in a cyber attack or solar storm, disaster and security experts have warned.

Modern life is so reliant on electricity that a prolonged blackout would quickly lead to a loss of water, fuel, banking, transport and communications that would leave the country “in the Stone Age”.

Russia plot to cut off UK with hackers taking down ... photo

The warning comes weeks after the Defence Secretary, Gavin Williamson, said Russia had been spying on the UK’s energy infrastructure and could cause “thousands and thousands and thousands” of deaths if it crippled the power supply.

***

The U.S. government has just released an important cybersecurity alert that confirms Russian government cyberattacks targeting energy and other critical infrastructure sectors in the United States.

While there has recently been a significant rise in cyberattacks in these industries, up to now we’ve only been able to speculate on who the actors are, or what their motives may be. In this case the threat actor and their strategic intent has been clearly confirmed, something the U.S. government rarely does publicly.

In addition, the US-CERT alert provides descriptions of each stage of the attack, detailed indicators of compromise (IOCs), and a long list of detection and prevention measures. Many of the attack tactics are like Dragonfly 2.0, so much so that one might call this an expanded playbook for Dragonfly. The Nozomi Networks solution ships today with an analysis toolkit that identifies the presence of Dragonfly 2.0 IOCs.

This article is intended to help you gain perspective on this recent alert, provide additional guidance on what security measures to take, and describe how the Nozomi Networks solution can help.

Russian-Cyberattacks-on-Infrastructure

U.S. energy facilities, like this one, are one of the critical infrastructure targets of the Russian cyberattacks.

Multi-Stage Campaigns Provide Opportunities for Early Detection

The US-CERT alert characterizes this attack as a multi-stage cyber intrusion campaign where Russian cyber actors conducted spear phishing and gained remote access into targeted industrial networks. After obtaining access, the threat vectors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).

This pattern of behavior is typical of APTs (Advanced Persistent Threats). APTs occur over an extended period, meaning there is an opportunity to detect and stop them before damage is done. With the right technology monitoring the industrial network, it is much harder for them to go unobserved before their final attack.

In this case the Russian cyberattacks started by infecting staging targets, which are peripheral organizations, such as trusted third-party suppliers, as pivot points for attacking the final intended targets.

The attackers used a multitude of tactics involving information relevant to industrial control professionals for initial infection of the staging targets. Examples include:

  • Altering trade publication websites
  • Sending emails containing resumes for ICS personnel as infected Microsoft Word attachments
  • Analyzing publicly available photos that inadvertently contained information about industrial systems

The credentials of staging targets’ staff were in turn used to send spear phishing emails to the staff of the intended targets. They received malicious .docx files, which communicated with a command and control (C2) server to steal their credentials.

The SMB (Server Message Block) network protocol was used throughout the spear phishing phases to communicate with external servers, as was described for the Dragonfly 2.0 attacks.This is a distinctive tactic. SMB is usually only used to communicate within LANs, not for outbound communications. Now that this is known, asset owners should ensure their firewalls are locked down for outbound service restrictions.

The credentials of the intended targets were used to access victim’s networks. From there, the malware established multiple local administrator accounts, each with a specific purpose. The goals ranged from creation of additional accounts to cleanup activity. For the report, click here.

***

What Is Known

Forensic analysis shows that the threat actors sought information on network and organizational design and control system capabilities within the organization. In one instance, the report says, the threat actors downloaded a small photo from a publicly accessible human resource page, which, when expanded, was a high-resolution photo that displayed control systems equipment models and status information in the background. The threat actors also compromised third-party suppliers to download source code for several intended targets’ websites. They also attempted to remotely access corporate web-based email and virtual private network (VPN) connections.

Once inside the intended target’s network, the threat actors used privileged credentials to access domain controllers via remote desktop protocols (RDP) and then used the batch scripts to enumerate hosts and users, as well as to capture screenshots of systems across the network.

The threat is inside. US-CERT on March 15 warned that threat actors associated with the Russian government had infiltrated ICS and SCADA systems at power plants using a variety of tactics. This image is a DHS reconstruction of a screenshot fragment of a human machine interface (HMI) that the threat actors accessed. Source: US-CERT

The threat is inside. US-CERT on March 15 warned that threat actors associated with the Russian government had infiltrated ICS and SCADA systems at power plants using a variety of tactics. This image is a DHS reconstruction of a screenshot fragment of a human machine interface (HMI) that the threat actors accessed. Source: US-CERT

Along with publishing an extensive list of indicators of compromise, the DHS and FBI recommended that network administrators review IP addresses, domain names, file hashes, network signatures, and a consolidated set of YARA rules for malware associated with the intrusion authored by the National Cybersecurity and Communications Integration Center. YARA is an open-source and multiplatform tool that provides a mechanism to exploit code similarities between malware samples within a family.

When Biden and Kerry Concocted a Shady Equity Firm

Keep this post in your bookmarks as we enter into the 2020 general election….

Primer:

1. China plants industrial espionage operatives in the U.S. that steal government contract secrets and sell them back to China. FBI caught at least one.

2. Through cyber espionage, China has stolen much of the F-35 technology, more than 50 terabytes.

3. John Kerry and Joe Biden did exactly the same thing as Hillary…sold access for money while exploiting it all as diplomatic missions with the title(s) of bi-lateral agreements.

4. Subpoena former Treasury Secretary Jack Lew and ask him about the CFIUS approvals of Chinese back enterprises. We may surely need to go back to former Treasury Secretary, Tim Geithner, did he set the table for all this with Obama’s approval creating that ‘Asia Pivot‘?

5. What does Congress know about foreign investments and when do they know it? They get reports, but who is asking questions, anyone?

http://commonsensenation.net/wp-content/uploads/2018/03/Biden.jpg photo

NYP: Joe Biden and John Kerry have been pillars of the Washington establishment for more than 30 years. Biden is one of the most popular politicians in our nation’s capital.

His demeanor, sense of humor, and even his friendly gaffes have allowed him to form close relationships with both Democrats and Republicans. His public image is built around his “Lunch Bucket Joe” persona. As he reminds the American people on regular occasions, he has little wealth to show for his career, despite having reached the vice presidency.

One of his closest political allies in Washington is former senator and former Secretary of State John Kerry. “Lunch Bucket Joe” he ain’t; Kerry is more patrician than earthy. But the two men became close while serving for several decades together in the US Senate. The two “often talked on matters of foreign policy,” says Jules Witcover in his Biden biography.

So their sons going into business together in June 2009 was not exactly a bolt out of the blue.

But with whom their sons cut lucrative deals while the elder two were steering the ship of state is more of a surprise.

What Hunter Biden, the son of America’s vice president, and Christopher Heinz, the stepson of the chairman of the Senate Committee on Foreign Relations (later to be secretary of state), were creating was an international private equity firm. It was anchored by the Heinz family alternative investment fund, Rosemont Capital. The new firm would be populated by political loyalists and positioned to strike profitable deals overseas with foreign governments and officials with whom the US government was negotiating.

Hunter Biden, Vice President Joe Biden’s youngest son, had gone through a series of jobs since graduating from Yale Law School in 1996, including the hedge-fund business.

By the summer of 2009, the 39-year-old Hunter joined forces with the son of another powerful figure in American politics, Chris Heinz. Senator John Heinz of Pennsylvania had tragically died in a 1991 airplane crash when Chris was 18. Chris, his brothers, and his mother inherited a large chunk of the family’s vast ketchup fortune, including a network of investment funds and a Pennsylvania estate, among other properties. In May 1995, his mother, Teresa, married Senator John Kerry of Massachusetts. That same year, Chris graduated from Yale, and then went on to get his MBA from Harvard Business School.

Joining them in the Rosemont venture was Devon Archer, a longtime Heinz and Kerry friend.

The three friends established a series of related LLCs. The trunk of the tree was Rosemont Capital, the alternative investment fund of the Heinz Family Office. Rosemont Farm is the name of the Heinz family’s 90-acre estate outside Fox Chapel, Pennsylvania.

The small fund grew quickly. According to an email revealed as part of a Securities and Exchange Commission investigation, Rosemont described themselves as “a $2.4 billion private equity firm co-owned by Hunter Biden and Chris Heinz,” with Devon Archer as “Managing Partner.”

The partners attached several branches to the Rosemont Capital trunk, including Rosemont Seneca Partners, LLC, Rosemont Seneca Technology Partners, and Rosemont Realty.

Of the various deals in which these Rosemont entities were involved, one of the largest and most troubling concerns was Rosemont Seneca Partners.

Rather than set up shop in New York City, the financial capital of the world, Rosemont Seneca leased space in Washington, DC. They occupied an all-brick building on Wisconsin Avenue, the main thoroughfare of exclusive Georgetown. Their offices would be less than a mile from John and Teresa Kerry’s 23-room Georgetown mansion, and just two miles from both Joe Biden’s office in the White House and his residence at the Naval Observatory.

Over the next seven years, as both Joe Biden and John Kerry negotiated sensitive and high-stakes deals with foreign governments, Rosemont entities secured a series of exclusive deals often with those same foreign governments.

Some of the deals they secured may remain hidden. These Rosemont entities are, after all, within a private equity firm and as such are not required to report or disclose their financial dealings publicly.

Some of their transactions are nevertheless traceable by investigating world capital markets. A troubling pattern emerges from this research, showing how profitable deals were struck with foreign governments on the heels of crucial diplomatic missions carried out by their powerful fathers. Often those foreign entities gained favorable policy actions from the United States government just as the sons were securing favorable financial deals from those same entities.

Nowhere is that more true than in their commercial dealings with Chinese government-backed enterprises.

Rosemont Seneca joined forces in doing business in China with another politically connected consultancy called the Thornton Group. The Massachusetts-based firm is headed by James Bulger, the nephew of the notorious mob hitman James “Whitey” Bulger. Whitey was the leader of the Winter Hill Gang, part of the South Boston mafia. Under indictment for 19 murders, he disappeared. He was later arrested, tried, and convicted.

James Bulger’s father, Whitey’s younger brother, Billy Bulger, serves on the board of directors of the Thornton Group. He was the longtime leader of the Massachusetts state Senate and, with their long overlap by state and by party, a political ally of Massachusetts Senator John Kerry.

Less than a year after opening Rosemont Seneca’s doors, Hunter Biden and Devon Archer were in China, having secured access at the highest levels. Thornton Group’s account of the meeting on their Chinese-language website was telling: Chinese executives “extended their warm welcome” to the “Thornton Group, with its US partner Rosemont Seneca chairman Hunter Biden (second son of the now Vice President Joe Biden).”

The purpose of the meetings was to “explore the possibility of commercial cooperation and opportunity.” Curiously, details about the meeting do not appear on their English-language website.

Also, according to the Thornton Group, the three Americans met with the largest and most powerful government fund leaders in China — even though Rosemont was both new and small.

The timing of this meeting was also curious. It occurred just hours before Hunter Biden’s father, the vice president, met with Chinese President Hu in Washington as part of the Nuclear Security Summit.

There was a second known meeting with many of the same Chinese financial titans in Taiwan in May 2011. For a small firm like Rosemont Seneca with no track record, it was an impressive level of access to China’s largest financial players. And it was just two weeks after Joe Biden had opened up the US-China strategic dialogue with Chinese officials in Washington.

On one of the first days of December 2013, Hunter Biden was jetting across the Pacific Ocean aboard Air Force Two with his father and daughter Finnegan. The vice president was heading to Asia on an extended official trip. Tensions in the region were on the rise.

The American delegation was visiting Japan, China, and South Korea. But it was the visit to China that had the most potential to generate conflict and controversy. The Obama administration had instituted the “Asia Pivot” in its international strategy, shifting attention away from Europe and toward Asia, where China was flexing its muscles.

For Hunter Biden, the trip coincided with a major deal that Rosemont Seneca was striking with the state-owned Bank of China. From his perspective, the timing couldn’t have been better.

Vice President Biden, Hunter Biden and Finnegan arrived to a red carpet and a delegation of Chinese officials. Greeted by Chinese children carrying flowers, the delegation was then whisked to a meeting with Vice President Li Yuanchao and talks with President Xi Jinping.

Hunter and Finnegan Biden joined the vice president for tea with US Ambassador Gary Locke at the Liu Xian Guan Teahouse in the Dongcheng District in Beijing. Where Hunter Biden spent the rest of his time on the trip remains largely a mystery. There are actually more reports of his daughter Finnegan’s activities than his.

What was not reported was the deal that Hunter was securing. Rosemont Seneca Partners had been negotiating an exclusive deal with Chinese officials, which they signed approximately 10 days after Hunter visited China with his father. The most powerful financial institution in China, the government’s Bank of China, was setting up a joint venture with Rosemont Seneca.

The Bank of China is an enormously powerful financial institution. But the Bank of China is very different from the Bank of America. The Bank of China is government-owned, which means that its role as a bank blurs into its role as a tool of the government. The Bank of China provides capital for “China’s economic statecraft,” as scholar James Reilly puts it. Bank loans and deals often occur within the context of a government goal.

Rosemont Seneca and the Bank of China created a $1 billion investment fund called Bohai Harvest RST (BHR), a name that reflected who was involved. Bohai (or Bo Hai), the innermost gulf of the Yellow Sea, was a reference to the Chinese stake in the company. The “RS” referred to Rosemont Seneca. The “T” was Thornton.

The fund enjoyed an unusual and special status in China. BHR touted its “unique Sino-US shareholding structure” and “the global resources and network” that allowed it to secure investment “opportunities.” Funds were backed by the Chinese government.

In short, the Chinese government was literally funding a business that it co-owned along with the sons of two of America’s most powerful decision makers.

The partnership between American princelings and the Chinese government was just a beginning. The actual investment deals that this partnership made were even more problematic. Many of them would have serious national security implications for the United States.

In 2015, BHR joined forces with the automotive subsidiary of the Chinese state-owned military aviation contractor Aviation Industry Corporation of China (AVIC) to buy American “dual-use” parts manufacturer Henniges.

AVIC is a major military contractor in China. It operates “under the direct control of the State Council” and produces a wide array of fighter and bomber aircraft, transports, and drones — primarily designed to compete with the United States.

The company also has a long history of stealing Western technology and applying it to military systems. The year before BHR joined with AVIC, the Wall Street Journal reported that the aviation company had stolen technologies related to the US F-35 stealth fighter and incorporated them in their own stealth fighter, the J-31. AVIC has also been accused of stealing US drone systems and using them to produce their own.

In September 2015, when AVIC bought 51 percent of American precision-parts manufacturer Henniges, the other 49 percent was purchased by the Biden-and-Kerry-linked BHR.

Henniges is recognized as a world leader in anti-vibration technologies in the automotive industry and for its precise, state-of-the-art manufacturing capabilities. Anti-vibration technologies are considered “dual-use” because they can have a military application, according to both the State Department and Department of Commerce.

The technology is also on the restricted Commerce Control List used by the federal government to limit the exports of certain technologies. For that reason, the Henniges deal would require the approval of the Committee on Foreign Investment in the United States (CFIUS), which reviews sensitive business transactions that may have a national security implication.

According to BHR internal documents, the Henniges deal included “arduous and often-times challenging negotiations.” The CFIUS review in 2015 included representatives from numerous government agencies including John Kerry’s State Department.

The deal was approved in 2015.

Excerpted with permission from “Secret Empires: How the American Political Class Hides Corruption and Enriches Family and Friends,” by Peter Schweizer, published by Harper Collins. The book goes on sale March 20.

Pritzker, Boxer, Sherman and MoveOn.org, the Strike Force

The top person on John Kerry’s Iran JPOA team was Wendy Sherman. But then we have Obama’s dear friend Penny Pritzker in the mix too, along with Barbara Boxer and Hillary’s Jake Sherman all part of this National Security Action team, which is all things against Trump. So, while we do have the Director of MoveOn in the mix…this group likely has some robust funding from Soros.

This is a strike force that even includes Jeremy Bash.

He served as Chief of Staff of the CIA (2009-2011) and Defense Department (2011-2013), was Panetta’s right hand person and perhaps we should remember it was Panetta that allowed Hollywood access to top secret information to make a movie, that Zero Dark Thirty movie.

According to a June 15, 2011, email from Benjamin Rhodes, Deputy National Security Advisor for Strategic Communications, the Obama White House was intent on “trying to have visibility into the UBL (Usama bin Laden) projects and this is likely a high profile one.”

Image result for Ben rhodes jake sherman photo

Ben Rhodes the aspiring novelist became Obama’s top advisor even when Rhodes security clearance was denied.

In early July 2012, Obama’s senior White House adviser on Iran, Puneet Talwar, and Secretary of State Hillary Clinton’s right-hand man, Jake Sullivan, arrived in the sleepy Arabian sultanate of Oman, 150 miles across sparkling Gulf waters from the Iranian coast. It was the first significant back-channel contact with Tehran.

FNC: A group of about 50 former Obama administration officials recently formed a think tank called National Security Action to attack the Trump administration’s national security policies.

The mission statement of the group is anything but subtle: “National Security Action is dedicated to advancing American global leadership and opposing the reckless policies of the Trump administration that endanger our national security and undermine U.S. strength in the world.”

National Security Action plans to pursue typical liberal foreign policy themes such as climate change, challenging President Trump’s leadership, immigration and allegations of corruption between the president and foreign powers.

This organization uses the acronym NSA, which is ironic. Three of its founding members – Ben Rhodes, Susan Rice and Samantha Power – likely were involved in abusing intelligence from the federal NSA (National Security Agency) to unmask the names of Trump campaign staff from intelligence reports and to leak NSA intercepts to the media to hurt Donald Trump politically. This included a leak to the media of an NSA transcript in February 2017 of former National Security Adviser Michael Flynn’s discussion with Russian Ambassador to the U.S. Sergei Kislyak. No one has been prosecuted for this leak.

Given the likely involvement of Rhodes, Rice and Power to weaponize intelligence against the Trump presidential campaign, will their anti-Trump NSA issue an apology for these abuses?

It is interesting that the new anti-Trump group says nothing in its mandate about protecting the privacy of Americans from illegal surveillance, preventing the politicization of U.S. intelligence agencies or promoting aggressive intelligence oversight. Maybe this is because the founders plan to abuse U.S. intelligence agencies to spy on Republican lawmakers and candidates if they join a future Democratic administration.

It takes a lot of chutzpah for this group of former Obama officials, who were part of the worst U.S. foreign policy in history, to condemn the current president’s successful international leadership and foreign policy.

After all, ISIS was born on President Obama’s watch because of his mismanagement of the U.S. withdrawal from Iraq and his “leading from behind” Middle East policy. The Syrian civil war spun out of control because of the incompetence of President Obama and his national security team.

This was a team that provided false information to the American people about the 2012 terrorist attack on the U.S. consulate in Benghazi and the nuclear deal with Iran. I wonder if the anti-Trump NSA will include videos on its website of former National Security Adviser Susan Rice falsely claiming on five Sunday morning news shows in September 2012 that the attack on the Benghazi consulate was “spontaneous” and in response to an anti-Muslim video.

And of course there’s the North Korean nuclear and missile programs that surged during the Obama years due to the administration’s “Strategic Patience” policy, an approach designed to kick this problem down the road to the next president. Because of President Obama’s incompetence, North Korean dictator Kim Jong Un may have an H-bomb that he soon will be able to load onto an intercontinental ballistic missile to attack the United States.

It must appall this group of former Obama national security officials that President Trump is succeeding as he undoes everything they worked on.

ISIS will soon control no territory in Iraq or Syria because of the Trump administration’s intensified attacks on it and arming of Kurdish militias.

In sharp contrast to President Obama, President Trump drew a chemical weapons red line in Syria and enforced it.

North Korea is pushing for talks with the U.S. in response to strong United Nations sanctions the U.S. worked to obtain in 2017. And compliance with the new sanctions has been significantly improved, especially by China, as the result of President Trump’s actions.

President Trump repaired the damage done to U.S.-Israel relations by President Obama and has recognized Jerusalem as the capital of Israel – something several previous presidents promised but failed to do.

Iranian harassment of U.S. ships in the Persian Gulf stopped in 2017, likely due to the more assertive Iran policy of President Trump. This includes the president’s successful effort to build a stronger U.S. relationship with Saudi Arabia.

President Trump is right when he says he inherited a mess on national security from the Obama administration. This is because President Obama and his national security team undermined U.S. credibility and left President Trump a much more dangerous world. I doubt the new anti-Trump National Security Action think tank will succeed in convincing Americans otherwise.

The war on 5G Nationally and Internationally

The first, 1G, was invented by Motorola in 1973. The 1G networks provided basic phone service with analog protocols and speeds of 2.4 kilobits per second. Compare that to today’s 4G network speed of 100 megabits per second and 5G’s proposed 100 gigabits per second. Also in 1973, IEEE Member Robert M. Metcalf invented Ethernet, one of the key enablers of wireless and local Internet access. Ethernet is part of the IEEE 802 suite of standards that underpins wireless networking applications and includes access to the Internet. The 802.11 standard is better known by its trademark name: Wi-Fi. More here.

***

When fourth generation (4G) services launched early this decade, the U.S. led the way. The Federal Communications Commission (FCC) unlocked valuable spectrum, and carriers responded by accommodating a radical, 20-fold growth in global mobile data traffic. The massive investment in wireless network infrastructure rewarded American consumers with faster wireless speeds at affordable prices. In addition to speeding up smartphones in our pockets, the U.S. economy saw an estimated increase in GDP between $73–$151 billion and up to 700,000 new jobs as a result and America was established as the test bed for innovation in the global digital economy.

Now our country faces a similar opportunity and challenge with fifth generation (5G) mobile networks, and it warrants the attention of consumers, the mobile industry, and policymakers. The economic stakes for 5G may be significantly higher than for 4G, led by large-scale job creation and incubation of new devices, applications, and business models that could dramatically stimulate the U.S. economy. More here.

***

As of 2017, development of 5G is being led by several companies, including Samsung, Intel, Qualcomm, Nokia, Huawei, Ericsson, ZTE and others. Huawei and ZTE are part of the Chinese government and all our intelligence agencies have declared they are NOT safe to use in the government realm or the private sector. Canadian media is warning the same due to cyber vulnerabilities. This is all about the expanding digital economy where various cyber currencies will prevail over tangible currency and those respective values cannot be controlled or managed.

***  Image result for 5g photo

President Donald Trump signed an executive order in January calling on federal agencies “to use all viable tools” to build broadband in rural areas on federal lands.

“Those towers are going to go up, and you’re going to have great, great broadband,” Trump said.

But telecom companies don’t have plans to expand 5G to rural areas. Where are they going? To urban and suburban neighborhoods where the business-friendly FCC is considering rules that would limit local governments from having as much of a say over where they go, how they look and how much they can charge for use of public property. Published in partnership with the New York Times 

Small cells, the next generation of wireless technology that telecommunications firms and cell-tower builders want to place on streetlights and utility poles throughout neighborhoods nationwide. The small cells come with a host of equipment, including antennas, power supplies, electric meters, switches, cabling and boxes often strapped to the sides of poles. Some may have refrigerator-sized containers on the ground. And they will be placed about every 500 or so feet along residential streets and throughout business districts.

Telecom companies say the cells will be both unobtrusive and safe, and insist the technology is needed to bring faster internet speeds required by a more connected world.

Telecommunications companies say the current 4G network is becoming overloaded as more people stream more videos and use more data-heavy apps. The advent of driverless cars, smart homes, telemedicine and virtual-reality will create more demand on wireless networks, requiring more bandwidth and faster speeds.

What’s needed, the wireless industry says, is 5G. The next generation network, still in development, is a combination of advanced hardware and standards such as distributed antenna systems, more fiber-optic cable, new data management practices and higher frequencies that will enable the network to carry more data up to 100 times faster than 4G.

5G will depend on so-called millimeter waves. These high-frequency bands, however, don’t travel as far as the signals 4G relies on and are easily blocked by walls, trees and even rain. So the network needs to be dense, with cells placed much closer together. That means way more wireless facilities. More than 300,000 cells are now in operation nationwide, and estimates for the number of small cells needed to make 5G work range from hundreds of thousands to millions more.

The rollout of 5G will be evolutionary, with the standards for the full complement of advanced technologies expected after 2020. Small cells already are being erected with 5G tests in many cities, and as that’s happened, citizens have descended on government meetings to express their anger — from  Woodbury, New York; to Liberty Township, Ohio; to Charlotte; to Pasco County, Florida; to Olympia, Washington.

5G promises to generate huge profits for the wireless companies, with as much as $250 billion in service revenue expected annually by 2025. And 5G will unleash an economic boom, say supporters of pre-empting local rules. They frequently cite a report by the consulting firm Accenture, which concluded that wireless firms will invest $275 billion over the next seven years deploying small cells, creating 3 million jobs and eventually boosting the national economy by $500 billion annually.

The study appears everywhere — mentioned by FCC commissioners in speeches, cited in an official FCC docket, in wireless carriers’ comments, and in statements by the powerful Washington associations that represent them. What most don’t mention is that the study was paid for by the wireless association CTIA, one of Washington’s top lobbying spenders.

The wireless industry argues that localities’ high fees, design requirements and delays in processing permits have effectively prohibited the deployment of broadband, which they argue is a violation of federal law; they’ve asked the FCC to make that clear in reining in cities and counties.

Wireless carriers and the companies that build towers for them have begun flooding city and county permitting offices with applications for attaching small cells to poles and building new ones. Cities that normally see a few dozen such applications yearly began in 2016 to get hundreds, such as Houston.  Montgomery County said it had at one point more applications filed in four months than in the previous 18 years.

Wireless companies complain local governments can’t process the permits fast enough because their systems are set up to review applications for massive cell towers, not the small cells they claim are less intrusive. The process needs to move quickly, they say, because 5G requires so many more cells, and they want to beat other countries to set standards.

The FCC issued a notice in April that it would consider rules to streamline cell deployment by reducing the time cities’ and counties’ have to review applications. The agency also said it would study, with the possibility of proposing rules later, both how the FCC could limit cities’ requirements on the look and design of small cells, and if local fees to attach to poles are excessive. The FCC also asked for ways it could amend its own rules. The agency may consider the proposals by the summer.

Pai, a former attorney for Verizon, also created last year a committee of representatives mostly from the wireless industry to develop model codes that cities and counties can adopt to speed the permitting of small cells and to reduce costs to telecoms. The committee is considering proposals, which it plans to formally submit to the FCC later this spring, that run the gamut, from simply calling on cities and the wireless industry to work together to controversial recommendations such as capping what cities charge to attach to public property.

Mayor Sam Liccardo of San Jose, California, one of the few members on the committee representing local interests and who has been critical of wireless companies’ efforts to weaken local rules, resigned from the group in January, saying the wireless industry “has sought to create a set of rules that will provide it with easy access to publicly-funded infrastructure at taxpayer-subsidized rates, without any obligation to provide broadband access to underserved residents.”

In response, Pai said in a statement that the committee has “brought together 101 participants from a range of perspectives” and he looks forward to working with the committee and others “to remove regulatory barriers to broadband deployment and to extend digital opportunity to all Americans.”

Bipartisan agreement

Congress is also weighing in — in rare bipartisan fashion — on the side of the telecom firms. Numerous bills in both the Senate and House would ease regulations and fees for erecting cells on federal lands, such as a bill the Senate passed last summer that would exempt certain small-cell deployments from environmental and historic reviews. The bill, which the House has yet to consider, is sponsored by South Dakota Sen. John Thune, the Republican chairman of the Commerce, Science and Transportation committee, and Sen. Bill Nelson, D-Fla., the ranking member of the committee.

Also last year, Thune joined Democratic Sen. Brian Schatz from Hawaii to circulate a draft bill that rolls back local government control over wireless facilities including small cells, including shortening the permit review times to 60 days on applications to collocate wireless facilities and 90 days for other wireless applications — the same time frames wireless providers are asking the FCC to consider.

Sens. Roger Wicker, R-Miss., and Catherine Cortez Masto, D-Nev., introduced a bill that would exempt small cells being deployed in a public right of way from environmental and historical reviews under certain circumstances. A companion bill is in the House. Numerous other bills are moving through the House

Wicker and Thune are among the top 25 senators who have received the most campaign contributions from AT&T and Verizon since 2010, pulling in $32,500 and $30,500, respectively, according to the Center for Responsive Politics. Schatz has received $29,000 from the two carriers, the third most among senators since 2014, when he ran his first campaign.

With such bipartisan support in Congress, and with an FCC that is sympathetic to telecoms, cities view their control over small cells as slipping away. That leaves people like King resigned to what is coming.

“A Russian woman stood up to speak at one of these public meetings, and she said that when she lived in Russia, the government slam dunked her and she had no say,” King said. “Now she lives in the United States of America, where she’s getting slam dunked by the government and she has no say. That gives you a window into what’s going on here.”