China has Fully Loyalty of Much of America

It does not begin and end with zero consequence of China for all things pandemic….it is much much worse. Consider all the items below and then apply critical thinking on why America is so subservient to the Chinese Communist Party.

The list is hardly complete but here is a good start:

  1. Dr. Fauci –>Source: Adam Hott, who works on the National Institutes of Health (NIH) Clinical Sequencing Evidence-Generating Research group, is also affiliated with the United States Heartland China Association (USHCA). He serves on the controversial group’s education committee, which seeks to “brings together resources in K12 and higher education to apply research, expertise, and new entrants to the workforce to US-China collaboration.”

    The unearthing of the United States Heartland China Association (USHCA) ties to Chinese foreign influence groups follow reports of Chinese Communist Party members and firms buying up American farmland, raising national security concerns among lawmakers.

    In addition to partnering with various branches of the Chinese regime, the USHCA also is “proudly working with” the China-United States Exchange Foundation (CUSEF).

    The organization is an integral component of the Chinese Communist Party’s “United Front,” an effort that seeks to “co-opt and neutralize sources of potential opposition to the policies and authority of its ruling Chinese Communist Party” and “influence foreign governments to take actions or adopt positions supportive of Beijing’s preferred policies,” according to the U.S. government.

  2. Then there is Hunter Biden and the whole Biden family.Source: A grand jury subpoena was issued 17 months before the 2020 election for Hunter Biden’s bank transactions involving the Bank of China, a corruption watchdog has found, raising concerns that damaging material about then-candidate Joe Biden was hidden from voters.

    The order sent by the Department of Justice to JP Morgan Chase bank asked for the records of any international financial transactions for the past five years involving Hunter, his uncle James Biden and former business partners Devon Archer and Eric Schwerin, according to federal documents.

    The anti-corruption nonprofit Marco Polo, founded by former Trump administration official Garrett Ziegler, obtained the filing, which targets the financial ties between the four men and the Bank of China.

    The subpoena was issued by Delaware’s US Attorney David Weiss on May 15, 2019. At the time, Hunter’s father, Joe Biden, was a presidential candidate.

  3. President Joe Biden meets virtually with Chinese President Xi Jinping from the Roosevelt Room of the White House in Washington, Nov. 15, 2021.source
  4. Perhaps the worst of it all –> and it is a long one…sit back and process as you read it. Source: A new, comprehensive report by the Victims of Communism Memorial Foundation, titled “Corporate Complicity Scorecard,” reveals what these companies have traded away and how much their Faustian bargain with the CCP has endangered all of us.The report, produced jointly by VOC and Horizon Advisory, evaluates eight well-known American corporations — Amazon, Apple, Dell, Facebook, GE, Google, Intel, and Microsoft. It presents “broad-ranging assessments of the nature of American corporations’ involvement in China” based on a set of indicators, including compliance with Chinese data regimes and supply chain exposure to forced labor risk. The report assigns a letter grade between A to F to the companies, with Facebook and Google receiving the highest score of “B,” while GE, Intel, and Microsoft got the lowest score of “F.”

    According to the VOC report, these American companies’ complicity endangers everyone else for several reasons. It exposes U.S. indus­trial supply chains to China’s forced labor and other human rights atrocities. It empowers a strategic competitor while hollowing out U.S. industrial capacity. It also makes U.S. industry a conduit for the Chinese gov­ernment’s vast information collection (i.e., surveillance programs). Lastly, it makes U.S. industry a channel for Chinese influence and pro­paganda abroad.

    All eight companies’ complicity is also endangering their long-term survival because through the “Made in China 2025” initiative, the Chinese government has been developing domestic competitors, intending to become “self-reliant” in strategically essential technologies. Shockingly, these American companies seem to fail to recognize that their technology transfers and billions of dollar investment in China will end up creating their own eventual replacements in this market.

    Furthermore, some of these companies have engaged “in political lobbying in the U.S. in ways that ultimately serves Beijing’s interests while potentially undermining the values and principles that undergird the western democratic order.”

    Intel Gets an ‘F’

    Intel sent a letter earlier this year to suppliers advising them not to source from Xinjiang, without mentioning either forced labor or genocide committed by the CCP against Uyghur Muslims and other minorities in the region. Still, the company promptly apologized to China after its letter drew backlash from state media and Chinese nationalists.

    The VOC report provides insights into Intel’s engagement in China. The company has a prominent presence in the country, including 17 campuses, at least two production sites, and “a series of innovation and R&D centers across China.” The company has built extensive ties to Chinese government agencies. For instance, the company has partnered with the Chinese Academy of Sciences Institute of Automation (CASIA), a “core contributor to China’s military and military-civil fusion programs.”

    Intel also collaborated with China’s Ministry of Industry and Information (MIIT), a “leading state entity charged with implementing China’s military-civil fusion national strategy.” The report finds “Intel executives continue to engage with MIIT rep­resentatives in fields relevant to military-civil fusion, even as tensions between the US government and China escalate and risks posed by Beijing’s military-civil fusion strategy become more evident.”

    Intel’s partnership with Chinese companies is also problematic. The company is a long-time major supplier to Hikvision, a Chinese state-owned manufacturer and sup­plier of surveillance equipment. The two companies launched a com­prehensive partnership in artificial intelligence in 2017.

    After the Trump administration added Hikvision to the U.S. Department of Commerce’s Entity List and barred it from buying restricted components from the United States in 2019, former Intel Chief Executive Officer Bob Swan reportedly vowed to use “Intel’s global operating capabilities to reduce the impact on customers.” Later that year, several U.S. technology firms, including Intel and Microsoft, issued a joint statement “calling for then-President Trump not to impose tariffs on Chinese lap­tops and tablets.”

    The VOC report also finds that “Intel technology was being used in surveillance systems in Xinjiang” and “Intel had invested in and provided technologies to a company embedded in Xinjiang and supported by the Chinese Ministry of Public Security.” Intel essentially plays a critical role in enabling the Chinese government to build a digital prison in Xinjiang and monitor every move by millions of Uyghur Muslims.

    Microsoft Also Gets an ‘F’

    Microsoft also received a grade of “F.” The VOC report finds that “Microsoft has a significant, and growing, network of innovation centers, data centers, joint laboratories, and other technology hubs in China. Many of these have been established in partnership with the Chinese government or gov­ernment-tied entities.”

    For example, Microsoft has built at least 10 data centers in China, all operated by a local Chinese partner, 21Vianet. In compliance with China’s data security laws, all data collected at these centers are accessible to the Chinese government.

    Microsoft has also partnered with Chinese companies to tailor its products to meet the Chinese government’s needs. A 2021 report from Top10VPN found that many Chinese government surveillance and censorship organs “use Windows prod­ucts in their security and surveillance systems.”

    Like Intel, Microsoft has established strategic cooperation agreements with Chinese companies that “the US government has identified as tied to the Chinese military or as an export restriction concern.” For example, one of Microsoft’s strategic partners is Dajing Innovations (DJI), a leader in civilian drones and imaging technology. The Trump administration put DJI on the Department of Commerce’s sanctioned Entity List in 2020. Microsoft has yet to sever its business ties with DJI.

    At least three Chinese suppliers of Microsoft were found to involve forced labor in Xinjiang. However, Microsoft has maintained business relationships with these suppliers. In addition, the company continues to invest in R&D in China “even as tensions between the US and China escalate—and Beijing’s technological ambi­tions have become broadly recognized as posing risks for global human rights and security.”

    Why GE Received an ‘F’

    GE is the third company that receives an “F.” Similar to Intel and Microsoft, GE’s many partnerships in China “appear to involve technology-sharing, including with core players in China’s military, military-civil fusion, and surveillance system. Those partnerships have also granted military-tied Chinese players positions of leverage in GE’s supply chains, critical to both America’s national security and its manufac­turing base.”

    Since GE is also a key contractor for the U.S. Department of Defense, these partnerships and technology-sharing agreements are especially troubling.

    Losing Strategy

    The VOC report gave the other five companies slightly better scores than “F.” But make no mistake, all of these companies have similarly “supported Beijing’s military modernization, the surveillance state, and human rights violations in exchange for access to China’s market.”

    As the great power competition between the U.S. and China intensifies, corporations cannot pretend this is business as usual. Whether they like it or not, corporations are increasingly at the center of the Sino-U.S. geopolitical conflict. These American companies should never forget what made them successful in the first place.

    In the words of former Attorney General William Barr, American companies are beneficiaries of “the American free enterprise system, the rule of law, and the security afforded by America’s economic, technological, and military strength.” China’s authoritarian regime is not a “hospitable one for institutions that depend on free markets, free trade, or the free exchange of ideas,” Barr said.

    The VOC scorecard reminds these American companies that acquiescing to Beijing is a lose-lose strategy and will endanger all of us in the long run.

    Microsoft in ChinaBack in 2007, Bill Gates told Fortune that he expected China to be Microsoft’s biggest market, “though it might take 10 years.”. Those comments were made during a visit to Beijing when Gates was awarded an honorary degree from Tsinghua University and met with four members of China’s ruling Politburo. More detail

Meanwhile, Microsoft Details the Russian Hack of Ukraine

The Windows maker’s Threat Intelligence Center (MSTIC) is tracking the cluster under the moniker ACTINIUM (previously as DEV-0157), sticking to its tradition of identifying nation-state activities by chemical element names.

The Ukrainian government, in November 2021, publicly attributed Gamaredon to the Russian Federal Security Service (FSB) and connected its operations to the FSB Office of Russia in the Republic of Crimea and the city of Sevastopol. Details.

***

Gamaredon APT Improves Toolset to Target Ukraine Government, Military |  Threatpost source

The Gamaredon APT was first spotted in 2013 and in 2015, when researchers at LookingGlass shared the details of a cyber espionage operation tracked as Operation Armageddon, targeting other Ukrainian entities. Their “special attention” on Eastern European countries was also confirmed by CERT-UA, the Ukrainian Computer Emergency Response Team.

The discovered attack appears to be designed to lure military personnel: it  leverage a legit document of the “State of the Armed Forces of Ukraine” dated back in the 2nd April 2019. Source

For this reason, Cybaze-Yoroi ZLAB team dissected this suspicious sample to confirm the possible link with Russian threat actors.

***

There are several outside government cyber experts that are reporting much the same as Microsoft as noted here.

Source: While Gamaredon has mainly targeted Ukrainian officials and organizations in the past, the group attempted an attack on January 19 that aimed to compromise a Western government “entity” in Ukraine, researchers at Palo Alto Networks’ Unit 42 organization reported Thursday. Gamaredon leadership includes five Russian Federal Security Service officers, the Security Service of Ukraine said previously.

Microsoft threat researchers released their own findings on Gamaredon in the blog post today, disclosing that the group has been actively involved in malicious cyber activity in Ukraine since October 2021.

While the hacker group has been dubbed “Gamaredon” by Unit 42, Microsoft refers to the group by the name “Actinium.”

“In the last six months, MSTIC has observed ACTINIUM targeting organizations in Ukraine spanning government, military, non-government organizations (NGO), judiciary, law enforcement, and non-profit, with the primary intent of exfiltrating sensitive information, maintaining access, and using acquired access to move laterally into related organizations,” the threat researchers said in the post. “MSTIC has observed ACTINIUM operating out of Crimea with objectives consistent with cyber espionage.”

Evading detection

Tactics used frequently by the group include spear-phishing emails with malicious macro attachments, resulting in deployment of remote templates, the researchers said. By causing a document to load a remote document template with malicious code—the macros—this “ensures that malicious content is only loaded when required (for example, when the user opens the document),” Microsoft said.

“This helps attackers to evade static detections, for example, by systems that scan attachments for malicious content,” the researchers said. “Having the malicious macro hosted remotely also allows an attacker to control when and how the malicious component is delivered, further evading detection by preventing automated systems from obtaining and analyzing the malicious component.”

The Microsoft researchers report that they’ve observed numerous email phishing lures used by Gamaredon, including those that impersonate legitimate organizations, “using benign attachments to establish trust and familiarity with the target.”

In terms of malware, Gamaredon uses a variety of different strains—the most “feature-rich” of which is Pterodo, according to Microsoft. The Pterodo malware family brings an “ability to evade detection and thwart analysis” through the use of a “dynamic Windows function hashing algorithm to map necessary API components, and an ‘on-demand’ scheme for decrypting needed data and freeing allocated heap space when used,” the researchers said.

Meanwhile, the PowerPunch malware used by the group is “an agile and evolving sequence of malicious code,” Microsoft said. Other malware families employed by Gamaredon include ObfuMerry, ObfuBerry, DilongTrash, DinoTrain, and DesertDown.

‘Very agile threat’

Gamaredon “quickly develops new obfuscated and lightweight capabilities to deploy more advanced malware later,” the Microsoft researchers said. “These are fast-moving targets with a high degree of variance.”

Payloads analyzed by the researchers show a major emphasis on obfuscated VBScript (Visual Basic Script), a Microsoft scripting language. “As an attack, this is not a novel approach, yet it continues to prove successful as antivirus solutions must consistently adapt to keep pace with a very agile threat,” the researchers said.

Unit 42 had reported Thursday that Gamaredon’s attempted attack against a western government organization in January involved a targeted phishing attempt.

Instead of emailing the malware downloader to their target, Gamaredon “leveraged a job search and employment service within Ukraine,” the Unit 42 researchers said. “In doing so, the actors searched for an active job posting, uploaded their downloader as a resume and submitted it through the job search platform to a Western government entity.”

Due to the “steps and precision delivery involved in this campaign, it appears this may have been a specific, deliberate attempt by Gamaredon to compromise this Western government organization,” Unit 42 said in its post.

Unit 42 has said it’s not identifying or further describing the western government entity that was targeted by Gamaredon.

No connection to ‘WhisperGate’ attacks

The attempted January 19 attack by Gamaredon came less than a week after more than 70 Ukrainian government websites were targeted with the new “WhisperGate” family of malware.

However, the threat actor responsible for those attacks appears to be separate from Gamaredon, the Microsoft researchers said in the post today. The Microsoft Threat Intelligence Center “has not found any indicators correlating these two actors or their operations,” the researchers said.

The U.S. Department of Homeland Security (DHS) last month suggested it’s possible that Russia might be eyeing a cyberattack against U.S. infrastructure, amid tensions between the countries over Ukraine.

Estimates suggest Russia has stationed more than 100,000 troops on the eastern border of Ukraine. On Wednesday, U.S. President Joe Biden approved sending an additional 3,000 U.S. troops to Eastern Europe.

 

Could it be that Europe has more Guts in Suing Google than the U.S.?

Shame on our Congress but more…shame on the Justice Department for dragging it’s feet when it comes to anti-trust cases against big tech, especially Google.

Google is big…really big but perhaps $2.4 billion will get their attention…and that is just Europe. But then again, maybe not as Google just announced the following:

Google has completed the latest phase of construction at its data center in Council Bluffs, Iowa, bringing its total investment in its Iowa campus to $5 billion.

A herd of deer outside the equipment yard of the Google data center campus in Council Bluffs, Iowa. (Photo: Google)

The investment milestone by Google is the latest data point on the extraordinary growth of the data center industry in Iowa, which is also home to Meta’s largest cloud campus and a massive build-out by Microsoft in West Des Moines. The Iowa cloud cluster shows the prominent role of the Midwest in cloud geography, providing a data distribution hub in the center of the United States.

***

Google-owner Alphabet faces a massive lawsuit in Europe.

It’s being sued by price-comparison firm PriceRunner for around $2.4 billion.

The Swedish company alleges the tech giant manipulated search results.

PriceRunner wants Google to pay compensation for profits it claims it has lost in the UK since 2008; and Sweden and Denmark since 2013.

A Google spokesperson said the company would defend the lawsuit in court.

It claimed changes made to shopping ads five years ago have worked successfully.

It also said PriceRunner chose not to use shopping ads on Google, so may not have seen the same successes as others.

But PriceRunner said it was ready to fight for years, with financing in place and steps prepared in the event it does not win.

In November Google lost an appeal against a fine of over $2.7 billion imposed by the European Commission in 2017.

It found that the search giant used its own price comparison shopping service to gain an unfair advantage over smaller European rivals.

The seven-year investigation came about due to complaints that Google distorted internet search results in favour of its own shopping service.

PriceRunner is currently in the process of being bought by payments firm Klarna.

***

Pricerunner sues Google for SEK 22 billion - Gamingsym

Source: PriceRunner said Monday that it plans to take Google to court in Stockholm. It’s seeking compensation for damages in relation to a 2017 ruling from the European Commission that Google breached antitrust laws by giving preference to its own shopping comparison product, Google Shopping, through its popular search engine.

After a seven-year investigation into the practices, the EU executive body dealt Google a historic $2.7 billion fine. Google appealed the penalty, but in November 2021, the decision was upheld by the EU’s General Court. The verdict can still be appealed and taken to the EU’s highest court.

PriceRunner CEO Mikael Lindahl said the company launched its lawsuit following “extensive and thorough preparations.”

“We are of course seeking compensation for the damage Google has caused us during many years, but are also seeing this lawsuit as a fight for consumers who have suffered tremendously from Google’s infringement of the competition law for the past fourteen years and still today,” Lindahl said in a statement.

A Google spokesperson said the company looks forward to defending its case in court. The company made a number of changes in 2017 aimed at addressing the commission’s concerns.

“The changes we made to shopping ads back in 2017 are working successfully, generating growth and jobs for hundreds of comparison shopping services who operate more than 800 websites across Europe,” the spokesperson said in an emailed statement.

“The system is subject to intensive monitoring by the EU Commission and two sets of outside experts. PriceRunner chose not to use shopping ads on Google, so may not have seen the same successes that others have.”

PriceRunner alleges Google has not complied with the commission’s ruling and is still abusing its dominant position among internet search engines. It expects the final damages to be “significantly higher” than the interim sum of 2.1 billion euros.

The company, which in November agreed to be taken over by Swedish fintech firm Klarna, wants Google to pay compensation for profits it lost in the U.K. since 2008, and in Sweden and Denmark from 2013 onward.

Klarna spokeswoman Aoife Houlihan said the company was “aware and supportive of this suit.”

“It is fundamental that all tech companies no matter where they operate, compete on the basis of their own merit with the best product and service and then gain consumers’ trust,” Houlihan told CNBC.

“European consumers have been denied real choice in shopping services for many years and this is one step to ensuring this ends now.”

PriceRunner says it’s the largest independent price comparison service in the Nordic region, with over 3.7 million products to select from 22,500 stores across 25 different countries.

Eastern Europe under Extraordinary Threat from Russia

In part: Russia has been chipping away at the country since at least 2014, when the pro-Russian President of Ukraine, Viktor Yanukovych, lost an election, and Putin invaded the Crimea, the peninsula that sticks out into the Black Sea and separates it from the Sea of Azov to its northeast.

Stealth war

As part of Putin’s campaign, a war that isn’t quite a war, most authorities agree that Russian-based hackers mounted a cyberattack called NotPetya back in 2017.  It was aimed primarily at Ukrainian institutions, but it also affected thousands of other systems as well.  The White House later estimated that NotPetya caused about $10 billion worth of damage worldwide.

Now we come down to this week.  On January 15, dozens of Ukrainian government computer systems were infected with malware disguised as ransomware.  An infected computer displayed a demand for a certain ransom to be paid in Bitcoin, but what really happened is that the malware “renders the computer system inoperable,” ransom or no ransom.

Microsoft issued a statement saying that they observed these attacks aimed primarily at Ukrainian government agencies and closely-allied organisations, and that they had issued updates that will address the problems.  But in the meantime, the Ukraine is suffering yet another cyberattack which appears to be instigated by Russia, although no firm evidence of the source has yet been forthcoming.

***

The head of Ukraine’s defense intelligence agency told Military Times in November that Russia could launch an attack through Belarus.

source

Then there is the matter of Putin working to install a pro-Russian regime in Ukraine.

The UK Foreign, Commonwealth and Development Office (FCDO) named former Ukrainian MP Yevhen Murayev as a potential Kremlin candidate and once again warned Russia of “severe costs” of activities to subvert Ukraine.

“The information being released today shines light on the extent of Russian activity designed to subvert Ukraine, and is an insight into Kremlin’s thinking,” UK foreign secretary Liz Truss said in a statement on Saturday.

Russia rejects UK claim

Russia on Sunday rejected a British claim that Russia was seeking to replace Ukraine’s government with a pro-Moscow administration.

“The disinformation spread by the British Foreign Office is more evidence that it is the Nato countries, led by the Anglo-Saxons, who are escalating tensions around Ukraine,” Russian foreign ministry spokeswoman Maria Zakharova said on the Telegram messaging app on Sunday. “We call on the British Foreign Office to stop provocative activities, stop spreading nonsense.” source

***

Some other disturbing details:

  1. The Russian Navy has announced plan gunnery and missile firing 160 nautical miles off Mizen Head. The exercises, from February 3rd to 8th, are just on the edge of the drop-off into deep water. It is also within Ireland’s Exclusive Economic Zone (EEZ). Coming at a time of heightened tension between Russia and the West, this highlights Ireland’s strategic position.

    Of all the world’s ocean, it is interesting that Russia selected this small area in the Irish EEZ. It is far from Russia’s operating bases and regular training areas. So the location seems chosen for strategic or political reasons.

  2. Germany is actively collaborating with Russian armed aggression against Ukraine. The Estonians will tell the Germans to go to hell and the rest of NATO will back Estonia against the Moscow-Berlin axis.
    The Molotov-Ribbentrop Pact is still in force. The Russian regime of state terrorism and the Putinversteher faction in Germany are allied to destroy the freedom and independence of Eastern Europe.
    Germany has no business being in NATO when it aggressively thwarts the principle of collective security on which the alliance was founded. Germany has gone full Soviet with the new Chancellor.
    Russian ally Germany refuses to permit Estonia to transfer artillery to Ukraine, giving a boost to the Russian army which is mobilized for an offensive.
  3. The U.S. has ordered all family members of its embassy in Ukraine to evacuate amid rising tensions of a possible Russian invasion of Ukraine. The U.S. State Department also said non-essential personnel could also leave the country at the U.S. government’s expense.

One more item. Since President Biden halted the United States from being energy independent which was achieved under President Trump, the United States no longer exports energy to Europe. In fact, conditions are so dire that the United States is actually buying dirty oil from Russia. Think of that. If Russia decides to punish the U.S. even more….you can bet the cost of gasoline at the pump with reach $8.00 to $10.00 a gallon.

Then there is the threat of the United States versus Russia in the Arctic and in Space…imagine escalating hostilities in those battle-spaces…

Meanwhile…Ukrainians are drilling for safety in fallout shelters.

 

China versus Taiwan and the United States, Just the Facts

A hacking group has compromised at least nine global organizations in the fields of technology, defense, energy and other key sectors as part of an apparent espionage campaign. Attribution is still ongoing, specific tools and methods used in the apparent hacking efforts are in line with those used by Chinese cyber-espionage group Emissary Panda, also known as TG-3390, APT 27 and Bronze Union.

While China has indeed surpassed the United States in the size of their Navy, the other concern is the build up of Chinese nuclear weapons.  Meanwhile, the United States has deployed at least 30 U.S.military forces to Taiwan for training.For years, U.S.-Taiwan military exchanges have been thought of as an open secret—also known by the People’s Republic of China (PRC) leadership in Beijing. However, Tsai became the first Taiwanese leader in decades to publicly acknowledge the existence of a training program.

The United States has deployed the Iron Dome missile-defense system for testing in Guam by U.S. military planners concerned about possible Chinese attacks.Chinese President Jinping awarded additional 'War Powers ...

WAR GAMES:

The Chinese military – the People’s Liberation Army – is waging so-called gray-zone warfare against Taiwan. This consists of an almost daily campaign of intimidating military exercises, patrols and surveillance that falls just short of armed conflict. Since that report, the campaign has intensified, with Beijing stepping up the number of warplanes it is sending into the airspace around Taiwan. China has also used sand dredgers to swarm Taiwan’s outlying islands.

Military strategists tell Reuters that the gray-zone strategy has the potential to grind down Taipei’s resistance – but also that it may fall short, or even backfire by strengthening the island’s resolve. They are also envisioning starker futures. While they can’t predict the future, military planners in China, Taiwan, the United States, Japan and Australia are nonetheless actively gaming out scenarios for how Beijing might try to seize the prized island, and how Taiwan and America, along with its allies, might move to stop it.Xi’s options include seizing Taiwan’s outlying islands, blockades or all-out invasion. Some Taiwanese military experts say Beijing’s next step might be to seize the lightly defended and remote Pratas Islands in the north of the South China Sea.  Any of these moves could spin out of control into war between China and America over Taiwan.

Reuters has published a comprehensive report and possible scenarios.

The Chinese military has built targets in the shape of an American aircraft carrier and other U.S. warships in the Taklamakan desert as part of a new target range complex, according to photos provided to USNI News by satellite imagery company Maxar.

The full-scale outline of a U.S. carrier and at least two Arleigh Burke-class destroyers are part of the target range that has been built in the Ruoqiang region in central China. The site is near a former target range China used to test early versions of its so-called carrier killer DF-21D anti-ship ballistic missiles, according to press reports in 2013.

This new range shows that China continues to focus on anti-carrier capabilities, with an emphasis on U.S. Navy warships. Unlike the Iranian Navy’s aircraft carrier-shaped target in the Persian Gulf, the new facility shows signs of a sophisticated instrumented target range.

A target in the shape of a U.S. Destroyer in the Taklamakan Desert in Central China. H I Sutton Illustration for USNI News Satellite image ©2021 Maxar Technologies Used with Permission

The carrier target itself appears to be a flat surface without the carrier’s island, aircraft lifts, weapons sponsons or other details, the imagery from Maxar shows. On radar, the outline of the carrier stands out from the surrounding desert – not unlike a target picture, according to imagery provided to USNI News by Capella Space.

There are two more target areas representing an aircraft carrier that do not have the metaling, but are distinguishable as carriers due to their outline. But other warship targets appear to be more elaborate. There are numerous upright poles positioned on them, possibly for instrumentation, according to the imagery. Alternatively these may be used for radar reflectors to simulate the superstructure of the vessel.

The facility also has an extensive rail system. An Oct. 9 image from Maxar showed a 75 meter-long target with extensive instrumentation on a 6 meter-wide rail.

Target range in the Taklamakan desert in Central China. H I Sutton illustration for USNI News

The area has been traditionally used for ballistic missile testing, according to a summary of the Maxar images by geospatial intelligence company AllSource Analysis that identified the site from satellite imagery.

“The mockups of several probable U.S. warships, along with other warships (mounted on rails and mobile), could simulate targets related to seeking/target acquisition testing,” according to the AllSource Analysis summary, which said there are no indications of weapon impact areas in the immediate vicinity of the mockups. “This, and the extensive detail of the mockups, including the placement of multiple sensors on and around the vessel targets, it is probable that this area is intended for multiple uses over time.“

Analysis of historical satellite images shows that the carrier target structure was first built between March and April of 2019. It underwent several rebuilds and was then substantially dismantled in December 2019. The site came back to life in late September of this year and the structure was substantially complete by early October.

Detailed Photos of the mobile target at the Ruoqiang facility. H I Sutton Illustration for USNI News Satellite image ©2021 Maxar Technologies Used with Permission

China has several anti-ship ballistic missile programs overseen by the People’s Liberation Army Rocket Force. The land-based CSS-5 Mod 5 (DF-21D) missile has a range of over 800 nautical miles. It has a maneuverable reentry vehicle (MaRV) to target ships. The larger CSS-18 (DF-26) has a range of around 2,000 nautical miles.

“In July 2019, the PLARF conducted its first-ever confirmed live-fire launch into the South China Sea, firing six DF-21D anti-ship ballistic missiles into the waters north of the Spratly Islands,” according to the Pentagon’s latest annual report on China’s military. The Chinese are also fielding a longer range anti-ship ballistic missile that initially emerged in 2016.

“The multi-role DF-26 is designed to rapidly swap conventional and nuclear warheads and is capable of conducting precision land-attack and anti-ship strikes in the Western Pacific, the Indian Ocean, and the South China Sea from mainland China. In 2020, the PRC fired anti-ship ballistic missiles against a moving target in the South China Sea, but has not acknowledged doing so,” reads the report.

A Nov. 5, 2021 Capella Space synthetic aperture radar image of the target in the shape of a U.S. aircraft carrier in the Taklamakan Desert H I Sutton Illustration for USNI News

In addition to the land-based anti-ship ballistic missiles, China has a program to equip the People’s Liberation Army Navy H-6 bombers with a massive anti-ship ballistic missile. First revealed in 2018, the CH-AS-X-13 will likely be the largest air-launched missile in existence, and would be large enough to accommodate a hypersonic warhead.

Another possible launch platform for anti-ship ballistic missiles is the new Type-055 Renhai Class large destroyer. Described as a guided-missile cruiser, it will be capable of carrying anti-ship ballistic missiles, according to the Pentagon report.

It’s not the first time China has built an aircraft carrier target in the desert. Since 2003, a large concrete pad, roughly the size of a carrier, has been used as a target. The slab, which is part of the Shuangchengzi missile test range, has been hit many times and is frequently repaired. The new site in the Taklamakan desert is 600 miles away and is much more evolved. The newer ship targets are closer approximations of the vessels that they are supposed to represent.

DoD Graphic

While questions remain on the extent of weapons that will be tested at the new facility, the level of sophistication of what can now be seen at the site show the PLA is continuing to invest in deterrents to limit the efficacy of U.S. naval forces close to China – in particular targeting the U.S. carrier fleet.

According to the Pentagon report released last week, a primary objective of the PLARF will be to keep U.S. carriers at risk from anti-ship ballistic missiles throughout the Western Pacific.