Beyond Russian Aggressions v. USA, Same with Poland

Russian helicopters violated Polish air space: report

PR dla Zagranicy
Paweł Kononczuk 18.04.2016 13:10
Three Russian helicopters entered Polish air space last week, flying across the country’s north-eastern border with Russia’s Kaliningrad exclave, a Polish newspaper reported on Monday.
Russian helicopters. Photo: Alan Wilson/Flickr.com The type of choppers involved in the incident last week reported by Gazeta Polska Codziennie was not specified by the paper.

Russian helicopters. Photo: Alan Wilson/Flickr.com The type of choppers involved in the incident last week reported by Gazeta Polska Codziennie was not specified by the paper.

Citing a forestry official whom it described as an eye-witness, Gazeta Polska Codziennie reported that the Russian machines, flying low and in formation, entered several kilometres into Polish territory.

“It wasn’t long before the helicopters returned over the border,” the official was quoted as saying. He added that Polish border guards quickly arrived at the scene.

The reported incident follows a series of controversial manoeuvres by Russian fighter jets over the Baltic Sea that have been condemned by Polish and US officials.

American warship the USS Donald Cook was buzzed on 11 April, while the vessel was carrying out deck landing drills involving a Polish helicopter.

****What is Kaliningrad?

Poland And Lithuania Wary Of Kaliningrad Being Base Of Next Move From Russia

IBTimes: The passage of Crimea’s secession referendum and the peninsula’s likely annexation to Russia brought jubilant crowds into the streets there, but cast a chill over most of Ukraine and its neighbors.

With Vladimir Putin’s Russia seeming intent on redrawing international boundaries, other nations formerly under Soviet power may be wondering if their frontiers are secure.

Kaliningrad by Shutterstock
Russia Ukraine
(Note: Port of Kaliningrad photo by Shutterstock.com.)

Wedged between Lithuania and Poland is the small Russian enclave of Kaliningrad, a snippet of the Soviet past that was left behind in part so Russia could have access to the Baltic Sea, and where it currently keeps its Baltic Fleet. The Russian Navy’s Black Sea Fleet is based at Sevastopol, Crimea, center of the present conflict.    

While the Kaliningrad region doesn’t share the unrest that has troubled Ukraine and the Crimea, which Russia says obliged it to intervene there, it is still a cause for concern to its neighbors. Of particular note to Lithuania are the 170,000 ethnic Russians living within its borders, primarily in the port city of Klaipeda, which is close to Kaliningrad, and Visaginas, which is on the eastern border with Belarus.

While a scenario of intervention similar to Crimea seems unlikely, Lithuanians are concerned, along with Poland, which borders the south of Kaliningrad, and has began military maneuvers with the United States.

Nadia Diuk, vice president of the National Endowment for Democracy, said on a recent PBS show that Kaliningrad could act a base of operations for all kinds of incursions into non-Russian territory. Both Poland, a former Soviet satellite, and Lithuania, a former Soviet republic, are now NATO members, largely because of their fear of Russia.

The Poles have been looking over their shoulders since the Ukraine conflict began, and since Russia accused them of setting up military training camps for the Euromaidan protesters in Kiev. The former head of the Ukrainian security service, Aleksandr Yakimenko, claimed that snipers in the Ukrainian unrest were acting under Polish and American orders.

Just last week, Poland appeared to be fearing the worst, as it invoked a NATO rule allowing a member state to call for military consultations with allies if it feels threatened. Since then Poland and the United States have stepped up military exercises. In additon, the United States supplied additional military aircraft to assist the NATO air defense mission for the Baltic states.

A fragment of the former German East Prussia, Kaliningrad, formerly known as Königsberg under German rule and famous as the birthplace of philosopher Immanuel Kant, was annexed by the Soviets in 1945 and during the Cold War was one of the most secretive and militarized regions of the USSR.

The Russians still consider the Baltiysk naval base, their only ice-free port on the Baltic, a vital asset. Kaliningrad is also home to two Russian air bases. It’s unclear how many soldiers Russia has in the region, but it is known that short-range ballistic missiles have been deployed there since 2012.

US Air Force Plane Intercepted by Russian Jet

No response by the Russians using the GUARD channel? This is the common airband channel for all aircraft regardless of tail number or flag. Essentially this appears to come close to electronic warfare.

WASHINGTON (AFP) –  A US Air Force reconnaissance plane was intercepted by a Russian SU-27 jet in an “unsafe and unprofessional” manner while flying a routine route in international airspace over the Baltic Sea, the Pentagon said.

“The US aircraft was operating in international airspace and at no time crossed into Russian territory,” said Laura Seal, a Pentagon spokeswoman.

The incident comes shortly after Russian aircraft repeatedly buzzed the USS Donald Cook this past week, including an incident Tuesday in which a Russian Su-24 flew 30 feet (nine meters) above the ship in a “simulated attack profile,” according to the US military’s European Command.

Russia has denied the action was reckless or provocative.

“This unsafe and unprofessional air intercept has the potential to cause serious harm and injury to all aircrews involved,” Seal said of Thursday’s incident.

“More importantly, the unsafe and unprofessional actions of a single pilot have the potential to unnecessarily escalate tensions between countries.”

The US aircraft in question was an RC-135.

***

FreeBeacon: Navy Captain Hernandez said the U.S. aircraft, a militarized Boeing 707 jet, was operating in international airspace “and at no time crossed into Russian territory.”

“This unsafe and unprofessional air intercept has the potential to cause serious harm and injury to all aircrews involved,” he said. “More importantly, the unsafe and unprofessional actions of a single pilot have the potential to unnecessarily escalate tensions between countries.”

According to Hernandez, the Su-27 carried out “erratic and aggressive maneuvers” by approaching the RC-135 at a high rate of speed from the side.

The Russian jet “then proceeded to perform an aggressive maneuver that posed a threat to the safety of the U.S. aircrew in the RC-135U,” the spokesman said.

 

“More specifically, the SU-27 closed within 50 feet of the wing-tip of the RC-135 and conducted a barrel roll starting from the left side of the aircraft, going over the top of the aircraft and ended up to the right of the aircraft,” he said.

The U.S. government is protesting all the incidents this week to the Russian government through diplomatic channels, he said.

The RC-135U, an electronic intelligence-gathering aircraft, is normally operated by five air crew and up to 16 electronic warfare officers and six or more regional specialists.

The dangerous aerial incident came two days after a simulated Russian aerial assault against the guided missile destroyer USS Donald Cook in the Baltic Sea. Washington called the simulated assault a military provocation, and said it nearly caused an international shootout.

Two Russian fighter-bombers, identified as Su-24s, made close passes over the Cook, including one jet that came within 30 feet of the warship.

A Navy officer said the buzzing was the most reckless flyover of a U.S. warship by either a Russian or Chinese warplane since the Cold War. “I’ve been in a lot of those situations and I’ve never seen any plane come that close,” the officer said.

The aerial harassment appears to be part of a Russian military campaign of intimidation against the United States and NATO.

Moscow has adopted hostile military policies toward the United States over U.S. deployment of missile defenses in Europe, which Moscow says threaten its missile forces. The Russians also have been upset by Western sanctions against its military annexation of Ukraine’s Crimea.

Strategically, Russian leader Vladimir Putin has been seeking to regain control and influence over what Moscow calls the “near abroad”—former Soviet republics and Eastern Bloc nations along the periphery of Russia’s borders in Eastern Europe.

The policy has led to military aggression against the Republic of Georgia in 2008 and Ukraine in 2014, where Russian troops took over the Crimean peninsula and are continuing to fuel separatist activity in eastern Ukraine.

In response, the United States and NATO are bolstering U.S. and allied military forces in Eastern Europe, with a specific emphasis of increasing military forces and troops near the Baltic states of Latvia, Estonia and Lithuania, as well as in Poland.

The recent Russian military provocations coincide with military activities by Moscow in the Russian enclave of Kaliningrad, which remains a major subject of U.S. monitoring. Russia in the past has threatened to deploy nuclear-capable Iskander short-range missiles in the enclave on the Baltic Coast between Poland and Latvia.

Earlier this week, Brian McKeon, principal undersecretary of defense for policy, told a House subcommittee hearing that Russia has prevented U.S. and allied flights over Kaliningrad that are allowed under the Open Skies Treaty.

Mark Schneider, a former Pentagon strategic forces analyst who specializes in Russian affairs, said the recent incidents over the Baltic Sea, including the simulated attack of a U.S. warship, are fundamentally different from past Russian provocations.

“It is a major escalation of Russian aggressiveness although it fits into a pattern of Russian activity that goes back years,” Schneider said. “The Russian Defense Ministry reaction was blatantly dishonest.”

Schneider said the likely U.S. response to these provocations are what former Pentagon official Richard Perle once dubbed “demarche-mellows,” or very weak, pro forma protests.

“If so, incidents like this will probably continue to escalate,” Schneider said.

Thursday’s aerial encounter involving the RC-135 was at least the second time this year that Russian jets have conducted a dangerous intercept of a reconnaissance aircraft.

On Jan. 25, a Russian Su-27 came within 20 feet of an RC-135 over the Black Sea in what Navy Capt. Daniel Hernandez said was an “unsafe and unprofessional” action.

Unlike Thursday’s encounter, the Russian jet in January did not do a barrel roll, but instead made an aggressive, high-speed banking turn away from the intelligence aircraft.

The maneuver disturbed the pilot’s control of the RC-135.

The dangerous Su-24 overflight of the Cook on April 12 came a day after two other Russian Su-24s flew over the ship 20 times, including a dangerous pass as an allied helicopter was being refueled, causing a delay in flight operations until the Su-24s left the area.

The same day, a Russian Ka-27 Helix helicopter flew around the Cook, which had finished a port visit to Poland and had a Polish helicopter on board.

“The Russian aircraft flew in a simulated attack profile and failed to respond to repeated safety advisories in both English and Russian,” the European Command said in a statement.

The Pentagon released video of the encounter showing the close pass, which created a wake in the water.

Secretary of State John Kerry on Thursday criticized the Russian military provocation, though he declined to say what steps the United States would take in response.

The State Department lodged formal protests with Russia.

“We condemn this kind of behavior. It is reckless. It is provocative. It is dangerous. And under the rules of engagement that could have been a shoot-down,” Kerry told CNN and the Miami Herald.

“People need to understand that this is serious business and the United States is not going to be intimidated on the high seas. … We are communicating to the Russians how dangerous this is and our hope is that this will never be repeated,” Kerry said.

The Cook is equipped with anti-aircraft defenses including the Close-In Weapons System, an automated air defense gun that can destroy aircraft with 25-millimeter rounds. The weapon was not readied because the ship was operating under the U.S.-Russian agreement not to illuminate each other’s aircraft.

“We have deep concerns about the unsafe and unprofessional Russian flight maneuvers,” the European command said in a statement.

“These actions have the potential to unnecessarily escalate tensions between countries, and could result in a miscalculation or accident that could cause serious injury or death.”

Kerry on Friday discussed the Cook incident with Russian Foreign Minister Sergey Lavrov, a State Department spokesman said.

Moscow sought to play down the incident involving the Cook. Russian Defense Ministry spokesman Igor Konashenkov told the state-run Interfax news agency that the Russian pilots acted within safety guidelines.

The incidents violated the bilateral U.S.-Russian agreement designed to prevent incidents at sea. The accord prohibits conducting simulated attacks and also limits the use of automated anti-aircraft guns.

Other incidents in recent months included a near collision between a Russian fighter and an RC-135 over the Black Sea on May 30, and on April 7, 2015, a Su-27 flew within 20 feet of an RC-135 over the Baltic Sea.

Additionally, last October, two Russian Tu-142 bombers made low passes near the aircraft carrier USS Reagan as it sailed in the Sea of Japan near the Korean peninsula. And on July 4, 2015, two Tu-95 nuclear-capable bombers approached within 40 miles of the California coast and radioed a “happy birthday” message to intercepting U.S. pilots.

The July 4 provocation occurred the same day President Obama held a telephone call with Putin.

Russia also has sent Tu-95 bombers to circle the Pacific island of Guam several times. The island is a major military hub and central to the U.S. military’s pivot to Asia.

 

 

China’s Cyber Attack on Pentagon Missile Defense Daily

So, where are the strongly worded letters, the condemnation, the sanctions the counter-measures?

Cyber-warfare, industrial espionage, economic warfare.

 

November 2015:

WASHINGTON (Reuters) – The U.S. military on Sunday hailed the success of a complex $230 million test of the U.S. missile defense system that it said showed the ability of the Aegis and THAAD weapons systems to identify and destroy ballistic and cruise missiles at once.

The test was conducted near Wake Island in the western Pacific Ocean around 11:05 p.m. EDT by the U.S. Missile Defense Agency, U.S. European Command, U.S. Pacific Command, the Ballistic Missile Defense System Operational Test Agency and the Joint Functional Component Command for Integrated Missile Defense.

“This was a highly complex operational test of the BMDS which required all elements to work together in an integrated layered defense design to detect, track, discriminate, engage, and negate the ballistic missile threats,” MDA said in a statement released late Sunday.

The Missile Defense Agency website.

Admiral: China Launching Cyber Attacks on Missile Defense Nets ‘Every Day’

Cyber threat comparable to Iranian, North Korean missile danger

FreeBeacon: Chinese military hackers are conducting cyber attacks on the Pentagon’s Missile Defense Agency networks on a daily basis and will soon shift to hacking into networks of missile defense contractors, the admiral in charge of the agency told Congress on Thursday.

Vice Adm. James D. Syring, the MDA chief who is in charge of building multi-billion dollar anti-missile defenses, told a House hearing that while his networks are successfully fighting off the cyber attacks, missile defense contractors need to improve their network security.

The three-star admiral said the threat of Chinese cyber attacks was equal to North Korean and Iranian missile threats.

“I view the cyber threat that I specifically face with MDA and the systems we are fielding on par with any ballistic missile threat that either Iran or North Korea possess,” Syring said.

Asked by Rep. Mike Rogers (R., Ala.), the chairman of the House Armed Services subcommittee on strategic forces, if he is fighting off cyber attacks from Chinese military hackers, Syring answered: “Yes, sir.” He limited his comments and said he would provide details of the cyber threats during a later closed-door session of the subcommittee.

“We have taken inordinate steps to protect both our classified and unclassified networks from attack, [with] constant 24/7 monitoring with teams in place plus good material protections of those systems,” he said.

“My biggest concern remains in our cleared defense contractor base and their protections,” Syring added, noting that Chinese efforts to break into missile defense networks are relentless.

“They are continuing to try and attack my government networks, every day, classified and unclassified,” he said. “But where they’re going next and we’ve gotten examples of this is to my cleared defense contractors with the unclassified controlled technical information.”

Bolstering the network security of contractors is a high priority across the entire ballistic missile defense system, he said.

Foreign states are seeking to penetrate missile defenses and other weapons systems to steal technology and data for use in their own weapons. They also seek to disrupt or destroy the systems in the event of a crisis or conflict.

A report by the Defense Science Board warned in 2013 that critical U.S. weapons and other military systems are vulnerable to cyber attack.

“The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a ‘full spectrum’ adversary,” the report concluded.

Syring said in prepared testimony his agency is deploying upgraded command and control systems with better security against cyber attacks. Missile defense personnel also are being trained to prevent cyber intrusions.

“We know that malicious cyber actors are constantly attempting to exfiltrate information from U.S Industry,” Syring stated. “We will continue to work with the defense industrial base, the FBI, and other partners to identify these issues and raise the costs of this behavior to those responsible, in coordination with national authorities and in accordance with national policy.”

Syring said a key objective is hardening U.S. missiles defenses for future conflicts, which will likely involve cyber attacks against its networks.

“We must build resilient cyber defenses that are capable of detecting and mitigating threats without impeding operations in order to ‘fight through’ the cyber threat,” he said.

Two exercises simulating cyber attacks on missile defense networks were held last year. Another exercise is set for next month.

To prevent cyber attacks through equipment and parts, MDA is tightening the security of its suppliers.

“We also have a rigorous cyber and supply chain risk management inspection program to examine everything about our systems, from the truck to supply chain, to the fielded operational ability,” Syring said.

Chinese agents were detected spying on the U.S. missile defense interceptor base at Fort Greely, Alaska, several years ago, according to defense officials.

Barry Pike, executive officer for the U.S. Army’s missiles and space program, said during the House hearing that foreign military threats are growing with the emergence of synchronized air, missile, cyber, and electronic warfare attacks.

“Across all Army [air and missile defense] programs, we are improving our resilience and ability to mitigate cyber and electronic warfare attacks,” he stated in prepared testimony.

Rogers, the subcommittee chairman, said in opening remarks at the hearing that after eight years of President Obama’s administration “our nation’s security is in more jeopardy than any time in recent memory.”

“North Korea, Iran, Pakistan, Russia, and China are all advancing their ballistic and cruise missile programs, along with weapons of mass destruction programs, to put our military, our allies, and our homeland at risk,” Rogers said.

“At the same time, President Obama has cut missile defense practically every year he’s been in office,” he added. “America’s enemies know an opportunity when they see one; our allies see they are on their own.”

Disclosure of the Chinese hacking against missile defenses comes as Syring and other military leaders revealed the Pentagon is working on its own cyber weapons that could be used to disable or destroy missiles prior to launch.

Details about what the Pentagon calls “left-of-launch” measures remain classified but are said to include cyber attacks and other electronic warfare measures against missile launch controls and other information systems.

Pre-launch cyber attacks against missiles are designed to bolster other missile defenses, including lasers and anti-missile interceptors, that can attack enemy missiles in the early, middle, and late stages of flight, while decreasing costs.

China is developing both missile defenses and anti-satellite missiles that employ similar technologies and are known to be targeting U.S. and allied computer networks to steal technical information useful in developing its weapons.

China also has targeted U.S. and foreign suppliers that provide equipment and material used in missile defenses.

A briefing in 2014 by Joyce Corell, a senior U.S. counterintelligence official, identified numerous pathways used by foreign states to penetrate the U.S. supply chain.

“We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts,” she stated in a briefing slide.

Pentagon Launching Cyber Bombs on ISIS

FNC: The U.S. has ramped up its fight against the Islamic State terror group’s online capabilities, dropping so-called “cyber bombs” on the militants, a top Pentagon official said Tuesday.

“Those guys are under enormous pressure. Every time we have gone after one of their defended positions over the last six months, we have defeated them. They have left, they have retreated,” Deputy Defense Secretary Robert Work told Reuters.

Defense Secretary Ash Carter gave some explanation for the concept of “cyber bombs” in a February NPR interview.

“We are using cyber tools, which is really a major new departure… These are strikes that are conducted in the warzone using cyber essentially as a weapon of war, just like we drop bombs,” Carter said.

Analysts say ISIS has frequently used the Internet to spread its message, regularly releasing photos and videos on social media. The latest edition of its magazine “Dabiq” went online this week.

Meanwhile, the U.S. has helped Iraqi forces as they prepare operations to retake the northern city of Mosul. While they got off to a slow start, there have been some recent advances, and officials say momentum has been growing in the fight against ISIS.

Secretary of State John Kerry, during a visit to Baghdad last Friday, pledged $155 million in new U.S. aid to Iraq and offered a show of political support to Iraq’s beleaguered Prime Minister Haider al-Abadi.

****

DefenseSystems: Given the classifications and operational security surrounding cyber operations, details on anti-ISIS activity in this domain are scant, though Carter added some information in a Pentagon press conference with reporters on Monday, saying the cyber component is aimed at disrupting ISIS’s command and control to cause them to lose confidence in their networks, as well as overloading their networks to limit their operational functionality. But given that the cyber tools are new, Carter said details are being kept under wraps, especially considering they are applicable to other conflicts globally.

Chairman of the Joint Chiefs of Staff Gen. Joseph Dunford reiterated the point that DOD does not want to provide operational details in hopes of keeping the element of surprise. Dunford did say that, conceptually, DOD is trying to isolate ISIS in the same way it is trying to so in the physical space.

Both Dunford and Carter said that the capabilities being used against ISIS, and others globally, are exactly why the U.S. Cyber Command was established in the first place. Dunford said the command is building an inventory of tools to be used in cyberspace going forward.

Carter has said previously that the Defense Department will look to take the fight to ISIS in the cyber domain, even resorting to targeting members of ISIS’s hacking cadre with bombs. However, it is still believed that ISIS’ cyber capabilities remain low, limited to merely website defacements and denial-of-service attacks.

One concern, whether from nation-states or groups such as ISIS should they gain cyber acumen, is the targeting of U.S. critical infrastructure. “Although it’s not a popular target for people trying to make a profit – that’s good and bad, because the flip side is that the adversaries who are interested in potentially targeting critical infrastructure could potentially be more sophisticated adversaries,” Isaac Porche, associate director of the Forces and Logistics Program at RAND, told a panel of lawmakers last week. “So critical infrastructure today might have to deal with a more sophisticated threat than, let’s say, a hardware store might have to.”

Military and U.S. intelligence officials in the past have been careful about what, in their minds, the term “attack” connotes in cyberspace, potentially allowing conclusions to be drawn regarding current U.S. activity against ISIS. “Terminology and lexicon is very important in this space,” Adm. Michael Rogers, the head of the National Security Agency and Cyber Command, told the House Intelligence Committee last year.“And many times I’ll hear people throw out ‘attack’ and ‘act of war’ and I go, ‘That’s not necessarily in every case how I would characterize the activity that I see’.”

Director of National Intelligence James Clapper has said previously that the hack and theft of millions of records from the Office of Personnel Management did not constitute an attack, because it did not result in the destruction of systems, infrastructure or data.

“We generally look at all cyber events and we define it as an attack. In many cases you can do reconnaissance, you can do espionage, you can do theft in this domain we call cyberspace,” Director of the Defense Intelligence Agency Lt. Gen. Vincent Stewart told lawmakers recently. “But the reaction always is, whether it’s an adversary doing reconnaissance, an adversary trying to conduct a [human intelligence] operations in this domain, we define it as an attack and I don’t think that’s terribly helpful.”

Mossack Fonseca Offices Raided, and Spies too?

Panama raids offices of Mossack Fonseca law firm

Reuters:Panama’s attorney general late on Tuesday raided the offices of the Mossack Fonseca law firm to search for any evidence of illegal activities, authorities said in a statement.

The Panama-based law firm is at the center of the “Panama Papers” leaks scandal that has embarrassed several world leaders and shone a spotlight on the shadowy world of offshore companies.

The national police, in an earlier statement, said they were searching for documentation that “would establish the possible use of the firm for illicit activities.” The firm has been accused of tax evasion and fraud.

Police offers and patrol cars began gathering around the company’s building in the afternoon under the command of prosecutor Javier Caravallo, who specializes in organized crime and money laundering.

Mossack Fonseca, which specializes in setting up offshore companies, did not respond to requests for comment on Tuesday.

Earlier, founding partner Ramon Fonseca said the company had broken no laws, destroyed no documents, and all its operations were legal.

Governments across the world have begun investigating possible financial wrongdoing by the rich and powerful after the leak of more than 11.5 million documents, dubbed the Panama Papers, from the law firm that span four decades.

The papers have revealed financial arrangements of prominent figures, including friends of Russian President Vladimir Putin, relatives of the prime ministers of Britain and Pakistan and of China’s President Xi Jinping, and the president of Ukraine.

There are more details. From Joseph FITSANAKIS of IntelNews in part:

The Süddeutsche Zeitung said on Monday that senior intelligence officials from Rwanda and Colombia are listed as Mossack Fonseca customers, but did not report the names of the individuals. It did, however, single out the late Sheikh Kamal Adham, who was director of Saudi Arabia’s General Intelligence Directorate in the 1960s and 1970s. During his 14-year directorship of the GID, the agency became a leading intermediary between the CIA and Arab intelligence agencies, notably those of Egypt and Iraq. Sheikh Adham was also a personal friend of CIA Director George Bush, who was later elected US president.

According to the Süddeutsche Zeitung, Sheikh Adham is one of many individuals with close CIA links whose names appear in the Panama Papers. Another is Farhad Azima, an Iranian-born American businessman, who is rumored to have leased aircraft to the CIA in the 1980s. The American intelligence agency is said to have used the aircraft, which belonged to Azima’s Kansas City, Missouri-headquartered Global International Airways, to transport weapons to Iran. The secret transfers were part of what later became known as the Iran-Contra scandal, in which US officials secretly sold weapons to Iran in return for the release of American hostages held by Iran-linked groups in the Middle East. The funds acquired from these weapons sales were then secretly funneled to the Contras, a medley of anti-communist paramilitary groups fighting the Sandinista-led government of Nicaragua.