Apple Bans 39,000 Apps After Demands by the CCP

And counting…including the newly launched conservative open free speech social media site Parler.

HONG KONG (Reuters) – Apple removed 39,000 game apps on its China store Thursday, the biggest removal ever in a single day, as it set year-end as deadline for all game publishers to obtain a license.

The takedowns come amid a crackdown on unlicensed games by Chinese authorities.

Including the 39,000 games, Apple removed more than 46,000 apps in total from its store on Thursday. Games affected by the sweep included Ubisoft title Assassin’s Creed Identity and NBA 2K20, according to research firm Qimai.

Qimai also said only 74 of the top 1,500 paid games on Apple store survived the purge.

Apple did not immediately respond to a request for comment.

Apple initially gave game publishers an end-of-June deadline to submit a government-issued licence number enabling users to make in-app purchases in the world’s biggest games market.

Apple later extended the deadline to Dec. 31. Cases still pending.

China’s Android app stores have long complied with regulations on licenses. It is not clear why Apple is enforcing them more strictly this year.

Analysts said the move was no surprise as Apple continues to close loopholes to fall in line with China’s content regulators, and would not directly affect Apple’s bottom line as much as previous removals.

“However, this major pivot to only accepting paid games that have a game license, coupled with China’s extremely low number of foreign game licenses approved this year, will probably lead more game developers to switch to an ad-supported model for their Chinese versions,” said Todd Kuhns, marketing manager for AppInChina, a firm that helps overseas companies distribute their apps.

In December, shares of Apple (NASDAQ:AAPL) were down a bit after the company removed thousands of paid game apps from its China App Store. Meanwhile, Disney (NYSE:DIS) stock rose after the company reportedly plans a price increase for its ESPN+ streaming service.

The Wall Street Journal reported last week that tech giant Apple planned to remove thousands of game apps from its App Store in China due to government pressure. Apple reportedly warned Chinese developers earlier this month that paid gaming apps were at risk of removal.

China requires paid video games to be licensed before being released, a policy that has been in effect for the past four years. However, app developers have been able to get around that rule on Apple’s platform. Apple began closing the loophole this year, the Journal reports.

On Thursday, Apple followed through by removing 39,000 game apps from its China App Store, according to Reuters. These include popular titles like Assassin’s Creed Identity and NBA 2K20. Just 74 of the top 1,500 paid game apps on the China App Store are still available, according to research firm Qimai.

The license requirement applies to paid games and games with in-app purchases, so the move by Apple could push more developers to opt for an ad-supported model. Apple takes a cut from sales of apps and in-app content, so such a shift would hurt Apples sales in China. source

*** Expect more stock price decline given the recent anti-trust cases in the legal pipeline against Apple and other big tech corporations. Apple and Google both take a cut of the revenue of the apps on their respective stores.

***

The factory in China where Apple products, specifically iPhones, undergo final assembly has approximately 230,000 workers. In the US, there are only 83 cities that have the same population as this factory’s number of employees. Meaning the number of possible workers in the US is not enough to cover Apple’s needs.

In China, an estimated quarter of their workforce lives in company-owned dormitories. These barracks are located on factory property. Many people are living and working at the factory. Such jobs are in high demand in China, and they can hire many people overnight. These examples prove that the measure, speed, and efficiency of Chinese manufacturing surpass anything the US is presently capable of. (read slave labor)

'Made in China 2025': is Beijing's plan for hi-tech ...

Apple is a willing partner in the China 2025 plan. You will then understand the China policy of President Trump and Secretary of State, Mike Pompeo.

Continue reading…you need to understand the past implications and those when Biden takes office.

When the US and ultimately the rest of the Western world began to engage China, resulting in China finally being allowed into the World Trade Organization in the early 2000s, no one really expected the outcomes we see today.

There is no simple disengagement path, given the scope of economic and legal entanglements. This isn’t a “trade” we can simply walk away from.

But it is also one that, if allowed to continue in its current form, could lead to a loss of personal freedom for Western civilization. It really is that much of an existential question.

Doing nothing isn’t an especially good option because, like it or not, the world is becoming something quite different than we expected just a few years ago—not just technologically, but geopolitically and socially.

China and the West

Let’s begin with how we got here.

My generation came of age during the Cold War. China was a huge, impoverished odd duck in those years. In the late 1970s, China began slowly opening to the West. Change unfolded gradually but by the 1990s, serious people wanted to bring China into the modern world, and China wanted to join it.

Understand that China’s total GDP in 1980 was under $90 billion in current dollars. Today, it is over $12 trillion. The world has never seen such enormous economic growth in such a short time.

Meanwhile, the Soviet Union collapsed and the internet was born. The US, as sole superpower, saw opportunities everywhere. American businesses shifted production to lower-cost countries. Thus came the incredible extension of globalization.

We in the Western world thought (somewhat arrogantly, in hindsight) everyone else wanted to be like us. It made sense. Our ideas, freedom, and technology had won both World War II and the Cold War that followed it. Obviously, our ways were best.

But that wasn’t obvious to people elsewhere, most notably China. Leaders in Beijing may have admired our accomplishments, but not enough to abandon Communism.

They merely adapted and rebranded it. We perceived a bigger change than there actually was. Today’s Chinese communists are nowhere near Mao’s kind of communism. Xi calls it “Socialism with a Chinese character.” It appears to be a dynamic capitalistic market, but is also a totalitarian, top-down structure with rigid rules and social restrictions.

So here we are, our economy now hardwired with an autocratic regime that has no interest in becoming like us.

China’s Hundred-Year Marathon

In The Hundred-Year Marathon, Michael Pillsbury marshals a lot of evidence showing the Chinese government has a detailed strategy to overtake the US as the world’s dominant power.

They want to do this by 2049, the centennial of China’s Communist revolution.

The strategy has been well documented in Chinese literature, published and sanctioned by organizations of the People’s Liberation Army, for well over 50 years.

And just as we have hawks and moderates on China within the US, there are hawks and moderates within China about how to engage the West. Unfortunately, the hawks are ascendant, embodied most clearly in Xi Jinping.

Xi’s vision of the Chinese Communist Party controlling the state and eventually influencing and even controlling the rest of the world is clear. These are not merely words for the consumption of the masses. They are instructions to party members.

Grand dreams of world domination are part and parcel of communist ideologies, going all the way back to Karl Marx. For the Chinese, this blends with the country’s own long history.

It isn’t always clear to Western minds whether they actually believe the rhetoric or simply use it to keep the peasantry in line. Pillsbury says Xi Jinping really sees this as China’s destiny, and himself as the leader who will deliver it.

To that end, according to Pillsbury, the Chinese manipulated Western politicians and business leaders into thinking China was evolving toward democracy and capitalism. In fact, the intent was to acquire our capital, technology, and other resources for use in China’s own modernization.

It worked, too.

Over the last 20–30 years, we have equipped the Chinese with almost everything they need to match us, technologically and otherwise. Hundreds of billions of Western dollars have been spent developing China and its state-owned businesses.

Sometimes this happened voluntarily, as companies gave away trade secrets in the (often futile) hope it would let them access China’s huge market. Other times it was outright theft. In either case, this was no accident but part of a long-term plan.

Pillsbury (who, by the way, advises the White House including the president himself) thinks the clash is intensifying because President Trump’s China skepticism is disrupting the Chinese plan. They see his talk of restoring America’s greatness as an affront to their own dreams.

In any case, we have reached a crossroads. What do we do about China now?

Targeted Response

In crafting a response, the first step is to define the problem correctly and specifically. We hear a lot about China cheating on trade deals and taking jobs from Americans. That’s not entirely wrong, but it’s also not the main challenge.

I believe in free trade. I think David Ricardo was right about comparative advantage: Every nation is better off if all specialize in whatever they do best.

However, free trade doesn’t mean nations need to arm their potential adversaries. Nowadays, military superiority is less about factories and shipyards than high-tech weapons and cyberwarfare. Much of our “peaceful” technology is easily weaponized.

This means our response has to be narrowly targeted at specific companies and products. Broad-based tariffs are the opposite of what we should be doing. Ditto for capital controls.

They are blunt instruments that may feel good to swing, but they hurt the wrong people and may not accomplish what we want.

We should not be using the blunt tool of tariffs to fight a trade deficit that is actually necessary. The Chinese are not paying our tariffs; US consumers are.

Importing t-shirts and sneakers from China doesn’t threaten our national security. Let that kind of trade continue unmolested and work instead on protecting our advantages in quantum computing, artificial intelligence, autonomous drones, and so on.

The Trump administration appears to (finally) be getting this. They are clearly seeking ways to pull back the various tariffs and ramping up other efforts.

China’s Military Takes Charge of War Powers

Primer:HONG KONG — Jailed Hong Kong pro-democracy activist Joshua Wong was arrested on a new charge under the national security law on Thursday while an American rights lawyer who was detained in a sweeping crackdown was granted bail. Friends and family of Wong, who is serving a 13 1/2-month prison sentence for organizing and participating in an unauthorized protest in 2019, were informed that he had been arrested on suspicion of violating the national security law and was taken away to give a statement on the new charge, according to a post on his Facebook page.

The post also stated that Wong’s lawyer was unable to meet with him, and that Wong had been transferred back to prison after giving the statement, which was not disclosed.

Separately, John Clancey, an American human rights lawyer who works at law firm Ho Tse Wai & Partners, was granted bail, his associate said. He was one of 53 activists arrested Wednesday under the national security law. He couldn’t be reached for comment.

At least some of the others were released on bail late Thursday from various police stations where they had been held. One, veteran activist and former lawmaker Leung Kwok-hung, unfurled a banner that blasted the national security law as he left.

China has expanded the power of its Central Military Commission
Has China gone into stealth mode with its military-civil fusion plans? |  South China Morning Post
(There is hardly an expectation that the Biden administration will take any aggressive action against China or would maintain existing current China policy under the Trump/Pompeo architecture. At risk especially is Taiwan and Hong Kong.)
Read on as President Xi is asserting more power during the power transition underway in the United States.
(CMC) – headed by President Xi Jinping – to mobilise military and civilian resources in defence of the national interest, both at home and abroad.

Revisions to the National Defence Law, effective from January 1, weaken the role of the State Council – China’s cabinet – in formulating military policy, handing decision-making powers to the CMC.

For the first time, “disruption” and protection of “development interests” have been added to the legislation as grounds for the mobilisation and deployment of troops and reserve forces.The legislation also specifically stresses the need to build a nationwide coordination mechanism for the mobilisation of state-owned and private enterprises to take part in research into new defence technologies covering conventional weapons, as well as the non-traditional domains of cybersecurity, space and electromagnetics.

Military and political analysts said the amendments aimed to strengthen the country’s military leadership under Xi, providing it with the legal grounds to respond to the challenges of accelerating confrontations between China and the US.

Deng Yuwen, a former deputy editor of the Communist Party publication Study Times,said the amendments aimed to legalise and formally apply the “special” nature of China’s political and defence system when dealing with situations that could harm the regime at home and abroad.“China’s political nature is very different from many countries … it’s not surprising for Beijing to enhance the leadership of the CMC when the PLA is going out to defend China’s national interests across the world,” said Deng, who is now an independent political commentator in the US.

China’s success at controlling the Covid-19 pandemic has been seen by Beijing as an endorsement of the Communist Party’s authoritarian rule, particularly as many Western countries are still struggling with rising numbers of infections.

Chen Daoyin, an independent political commentator and former professor at the Shanghai University of Political Science and Law, said the changes showed the regime had gained the confidence to legitimise its long-standing principle that “the party commands the gun” and stamp its “absolute leadership over armed and reserved forces”.

“The move to include ‘development interests’ as a reason for armed mobilisation and war in the law would provide legal grounds for the country to launch war in the legitimate name of defending national development interests,” Chen said.

Zeng Zhiping, a military law expert at Soochow University, said one of the big changes of the law was the downgrading of the State Council’s role in formulating the principles of China’s national defence, and the right to direct and administer the mobilisation of its armed forces.

“The CMC is now formally in charge of making national defence policy and principles, while the State Council becomes a mere implementing agency to provide support to the military,” said Zeng, who is also a retired PLA lieutenant colonel.

“It’s a big contrast when compared with developed countries like Israel, Germany and France, which prefer to put their armed forces under civilian leadership. Even in the US, the civilian-led defence ministry plays a more important role than their military top brass, the Joint Chiefs of Staff.”

Taipei-based military expert Chi Le-yi said the amendments highlighting the use of armed forces to suppress national disruption would be used to target independence-leaning forces in Taiwan, which Beijing regards as part of its territory.

Chi said the ultimate goal of the amended defence law could be seen as Beijing’s latest response to the US policy of comprehensive strategic containment of a rising China.

“The Chinese Communist Party now has strong crisis awareness as it faces various new security challenges, pushing the PLA to come up with a new defence policy soon after completing the establishment of top-down commanding and coordinating systems under Xi’s leadership,” Chi said.

“The law revision is also a symbolic battle call by the party to warn all Chinese people to be combat-ready for a nationwide defence mobilisation, which the party has never done since [it came to power] in 1949.”

The amendments were passed by the National People’s Congress on December 26, after two years of deliberation. Three articles were removed, more than 50 were amended, while there were six additions. In a media conference earlier in December, a spokesperson for the CMC’s legislative affairs bureau said the changes gave the PLA a clear direction in its modernisation and development goals.

 

China Used ‘Mass Surveillance’ on Thousands of Americans’ Phones

Is the Caribbean Smartphone Market Closer to Asia than America? - Droid  Island

Newsweek reports: A mobile security expert has accused China of exploiting cellphone networks in the Caribbean to conduct “mass surveillance” on Americans.

China Regional Snapshot: The Caribbean - Committee on Foreign Affairs

Gary Miller, a former vice president of network security at California-based analytics company Mobileum, told The Guardian he had amassed evidence of espionage conducted via “decades-old vulnerabilities” in the global telecommunications system.

While not explicitly mentioned in the report, the claims appear to be centered around Signaling System 7 (SS7), a communications protocol that routes calls and data around the world and has long been known to have inherent security weaknesses.

According to Miller, his analysis of “signals data” from the Caribbean has shown China was using a state-controlled mobile operator to “target, track, and intercept phone communications of U.S. phone subscribers,” The Guardian reported.

Miller claimed China appeared to exploit Caribbean operators to conduct surveillance on Americans as they were traveling, alleging that attacks on cell phones between 2018 to 2020 likely affected “tens of thousands” of U.S. mobile users in the region.

“Once you get into the tens of thousands, the attacks qualify as mass surveillance,” the mobile researcher said, noting the tactic is “primarily for intelligence collection and not necessarily targeting high-profile targets.” Miller continued: “It might be that there are locations of interest, and these occur primarily while people are abroad.”

A previous analysis paper covering 2018-2019, also titled Far From Home, contained a series of similar espionage claims about SS7, alleging that “mass surveillance attacks” in 2018 were most prevalent by China and Caribbean mobile networks. More here.

But hold on…. it does not stop there….we also have the Channel Islands…

Pin on Guernsey Island

Remarkable investigative details here.

The Bureau: Private intelligence companies are using phone networks based in the Channel Islands to enable surveillance operations to be carried out against people around the world, including British and US citizens, the Bureau of Investigative Journalism can reveal following a joint reporting project with the Guardian.

Leaked data, documents and interviews with industry insiders who have access to sensitive information suggest that systemic weaknesses in the global telecoms infrastructure, and a particular vulnerability in Jersey and Guernsey, are being exploited by corporate spy businesses.

These businesses take advantage of some of the ways mobile phone networks across the world interact in order to access private information on targets, such as location information or, in more sophisticated applications, the content of calls and messages or other highly sensitive data.

The spy companies see phone operators in the Channel Islands as an especially soft route into the UK, according to industry experts, who say the attacks emanating from the islands appear to be targeted at individuals rather than cases of “mass” surveillance. The Bureau understands that the targets of this surveillance have been spread across the globe, and included US citizens as well as people in Europe and Africa.

Ron Wyden, the Oregon senator and privacy advocate, described the use of foreign telecom assets to spy on people in the US as a national security threat.

“Access into US telephone networks is a privilege,” he said in response to the Bureau’s findings. “Foreign telecom regulators need to police their domestic industry – if they don’t, they risk their country being cut off from US roaming agreements.”

Markéta Gregorová, the European Parliament’s chief negotiator on trade legislation for surveillance technology, called for “immediate regulatory, financial and diplomatic costs on companies and rogue jurisdictions” that enabled these practices.

“Any commercial or governmental entity, foreign or domestic which enables the facilitation of warrantless cyber-attacks on European citizens deserves the full force of our justice system,” she told the Bureau.

Increased Alarm over Intrusion into U.S. and Sandia/Los Alamos

WASHINGTON (AP) — Federal authorities expressed increased alarm Thursday about an intrusion into U.S. and other computer systems around the globe that officials suspect was carried out by Russian hackers. The nation’s cybersecurity agency warned of a “grave” risk to government and private networks.

The Cybersecurity and Infrastructure Security Agency said in its most detailed comments yet that the intrusion had compromised federal agencies as well as “critical infrastructure” in a sophisticated attack that was hard to detect and will be difficult to undo.

CISA did not say which agencies or infrastructure had been breached or what information taken in an attack that it previously said appeared to have begun in March.

“This threat actor has demonstrated sophistication and complex tradecraft in these intrusions,” the agency said in its unusual alert. “CISA expects that removing the threat actor from compromised environments will be highly complex and challenging.”

President Donald Trump, whose administration has been criticized for eliminating a White House cybersecurity adviser and downplaying Russian interference in the 2016 presidential election, has made no public statements about the breach.

President-elect Joe Biden said he would make cybersecurity a top priority of his administration, but that stronger defenses are not enough.

“We need to disrupt and deter our adversaries from undertaking significant cyberattacks in the first place,” he said. “We will do that by, among other things, imposing substantial costs on those responsible for such malicious attacks, including in coordination with our allies and partners.”

The cybersecurity agency previously said the perpetrators had used network management software from Texas-based SolarWinds t o infiltrate computer networks. Its new alert said the attackers may have used other methods, as well.

Over the weekend, amid reports that the Treasury and Commerce departments were breached, CISA directed all civilian agencies of the federal government to remove SolarWinds from their servers. The cybersecurity agencies of Britain and Ireland issued similar alerts.

A U.S. official previously told The Associated Press that Russia-based hackers were suspected, but neither CISA nor the FBI has publicly said who is believed be responsible. Asked whether Russia was behind the attack, the official said: “We believe so. We haven’t said that publicly yet because it isn’t 100% confirmed.”

Another U.S. official, speaking Thursday on condition of anonymity to discuss a matter that is under investigation, said the hack was severe and extremely damaging although the administration was not yet ready to publicly blame anyone for it.

“This is looking like it’s the worst hacking case in the history of America,” the official said. “They got into everything.”

The official said the administration is working on the assumption that most, if not all, government agencies were compromised but the extent of the damage was not yet known.

This hack had nothing to do with President Trump firing Director Krebs at CISA even though Associated Press keeps suggesting. But things just took a turn for the bad bad side –>

Sandia National Laboratories - From the Manhattan Project to a National Lab Sandia

Texas A&M System part of team awarded lucrative Los Alamos National Lab  contract | The Texas Tribune Los Alamos

The Energy Department and National Nuclear Security Administration, which maintains the U.S. nuclear weapons stockpile, have evidence that hackers accessed their networks as part of an extensive espionage operation that has affected at least half a dozen federal agencies, officials directly familiar with the matter said.

On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation and the Richland Field Office of the DOE. The hackers have been able to do more damage at FERC than the other agencies, the officials said, but did not elaborate.

Federal investigators have been combing through networks in recent days to determine what hackers had been able to access and/or steal, and officials at DOE still don’t know whether the attackers were able to access anything, the people said, noting that the investigation is ongoing and they may not know the full extent of the damage “for weeks.”

Spokespeople for DOE did not immediately respond to requests for comment.

The attack on DOE is the clearest sign yet that the hackers were able to access the networks belonging to a core part of the U.S. national security enterprise. The hackers are believed to have gained access to the federal agencies’ networks by compromising the software company SolarWinds, which sells IT management products to hundreds of government and private-sector clients.

DOE officials were planning on Thursday to notify the House and Senate Energy committees, House and Senate Energy and Water Development subcommittees, House and Senate Armed Services committees, and the New Mexico and Washington State delegations of the breach, the officials said.

The FBI, Cybersecurity and Infrastructure Security Agency, and Office of the Director of National Intelligence acknowledged the “ongoing” cybersecurity campaign in a joint statement released on Wednesday, saying that they had only become aware of the incident in recent days.

“This is a developing situation, and while we continue to work to understand the full extent of this campaign, we know this compromise has affected networks within the federal government,” the statement read.

NNSA is responsible for managing the nation’s nuclear weapons, and while it gets the least attention, it takes up the vast majority of DOE’s budget. Similarly, the Sandia and Los Alamos National Labs conduct atomic research related to both civil nuclear power and nuclear weapons. The Office of Secure Transportation is tasked with moving enriched uranium and other materials critical for maintaining the nuclear stockpile.

Hackers may have been casting too wide a net when they targeted DOE’s Richland Field Office, whose primary responsibility is overseeing the cleanup of the Hanford nuclear waste site in Washington state. During World War II and the Cold War, the U.S. produced two- thirds of its plutonium there, but the site hasn’t been active since 1971.

The attack on the Federal Energy Regulatory Commission may have been an effort to disrupt the nation’s bulk electric grid. FERC doesn’t directly manage any power flows, but it does store sensitive data on the grid that could be used to identify the most disruptive locations for future attacks.

Space Command Alarmed at Russia’s Anti-Satellite Weapons Test

WASHINGTON — Russia conducted its second test this year of a direct ascent anti-satellite missile test, according to a U.S. Space Command, yet again drawing sharp criticism from the U.S.

“Russia has made space a war-fighting domain by testing space-based and ground-based weapons intended to target and destroy satellites. This fact is inconsistent with Moscow’s public claims that Russia seeks to prevent conflict in space,” said Space Command head Gen. James Dickinson in a statement. “Space is critical to all nations. It is a shared interest to create the conditions for a safe, stable and operationally sustainable space environment.”

U.S. SPACECOM nominee Dickinson says countries must be ...

Space Command said the direct-ascent anti-satellite missile tested is a kinetic weapon capable of destroying satellites in low Earth orbit. A similar anti-satellite missile test by India in March 2019 that destroyed the nation’s own satellite on orbit drew criticism from observers, who noted that the debris created from the threat could cause indirect damage to other satellites.

Russia has completed tests of its Nudol ballistic-missile system several times in recent years, including in April of this year. Nudol can be used as an anti-satellite weapon and is capable of destroying satellites in low Earth orbit. According to the CSIS Aerospace Security Project’s “Space Threat Assessment 2020,” Russia conducted its seventh Nudol test in 2018.

Under the Trump administration, the U.S. has used the development and testing of anti-satellite weapons by Russia and China as a justification for creating both Space Command and the U.S. Space Force in 2019.

“The establishment of U.S. Space Command as the nation’s unified combatant command for space and U.S. Space Force as the primary branch of the U.S. Armed Forces that presents space combat and combat support capabilities to U.S. Space Command could not have been timelier. We stand ready and committed to deter aggression and defend our nation and our allies from hostile acts in space,” Dickenson said.

Acting Secretary of Defense Christopher C. Miller made similar comments last week as the White House released a new National Space Policy, which calls for the U.S. to defeat aggression and promote norms of behavior in space

“Our adversaries have made space a war-fighting domain, and we have to adapt our national security organizations, policies, strategies, doctrine, security classification frameworks and capabilities for this new strategic environment. Over the last year we have established the necessary organizations to ensure we can deter hostilities, demonstrate responsible behaviors, defeat aggression and protect the interests of the United States and our allies.”

***

Kilopower  An illustration of a Kilopower nuclear reactor on the moon. Development of surface nuclear power technologies is a key element of the roadmap included in Space Policy Directive 6. Credit: NASA

The White House released a new space policy directive Dec. 16 intended to serve as a strategic roadmap for the development of space nuclear power and propulsion technologies.

Space Policy Directive (SPD) 6, titled “National Strategy for Space Nuclear Power and Propulsion,” discusses responsibilities and areas of cooperation among federal government agencies in the development of capabilities ranging from surface nuclear power systems to nuclear thermal propulsion, collectively known as space nuclear power and propulsion (SNPP).

“This memorandum establishes a national strategy to ensure the development and use of SNPP systems when appropriate to enable and achieve the scientific, exploration, national security, and commercial objectives of the United States,” the 12-page document states.

SPD-6 sets out three principles for the development of space nuclear systems: safety, security and sustainability. It also describes roles and responsibilities for various agencies involved with development, use or oversight of such systems.

Much of the document, though, is a roadmap for the development of nuclear power and propulsion systems. It sets a goal of, by the mid-2020s, developing uranium fuel processing capabilities needed for surface power and in-space propulsion systems. By the mid to late 2020s, NASA would complete the development and testing of a surface nuclear power system for lunar missions that can be scalable for later missions to Mars.

SPD-6 calls for, by the late 2020s, establishing the “technical foundations and capabilities” needed for nuclear thermal propulsion systems. It also sets a goal of developing advanced radioisotope power systems, versions of radioisotope thermoelectric generators (RTGs) long used on NASA missions, by 2030.

Many of the initiatives outlined in SPD-6 are already in progress. NASA has been working with the Department of Energy (DOE) on a project called Kilopower to develop surface nuclear reactors, including efforts to seek proposals to develop a reactor for use on the moon. NASA has also been studying nuclear thermal propulsion, an initiative backed by some in Congress who have set aside funding in NASA’s space technology program for that effort.

“We have these individual initiatives going on — nuclear thermal power, the Kilopower activities — and what we’re trying to do is pull together a common operating picture for Defense, NASA and DOE,” said a senior administration official, speaking on background about SPD-6.

That roadmap and schedule is also intended to prioritize those activities. Surface nuclear power is needed in the nearer term to support lunar missions later in the decade, particularly to handle the two-week lunar night. Nuclear thermal propulsion, as well as alternative nuclear electric propulsion technologies, are less critical since they are primarily intended to support later missions to Mars.

“Those things are important for going to Mars,” the official said of nuclear propulsion, “but first we’re doing the moon and leveraging terrestrial capabilities and technologies to put that foothold on the moon.”

Another issue addressed in SPD-6 is the use of different types of uranium. Tests in 2018 as part of the Kilopower program used highly enriched uranium, or HEU. That project, and discussions by NASA and DOE to use HEU for flight reactors, raised concerns in the nuclear nonproliferation community. They were worried that it could set a precedent for renewed production of HEU, which is also used in nuclear weapons.

SPD-6 restricts, but does not prohibit, the use of HEU in space nuclear systems. “Before selecting HEU or, for fission reactor systems, any nuclear fuel other than low-enriched uranium (LEU), for any given SNPP design or mission, the sponsoring agency shall conduct a thorough technical review to assess the viability of alternative nuclear fuels,” it states.

“We want to keep those proliferation concerns foremost in our minds,” a senior administration official said. “We don’t want to necessarily rule out HEU if that’s the only way to get a mission about, but we want to be very deliberate about it.”

The policy, an official said, “sets an extremely high bar” for non-defense use of HEU on space systems, citing progress on high-assay low enriched uranium, which can provide power levels similar to HEU systems with only a modest mass penalty.

The White House released SPD-6 a week after it issued a new national space policy during a meeting of the National Space Council. That broader policy briefly addressed space nuclear power and propulsion, discussing roles for various agencies, but did not mention the roadmap or other details found in SPD-6.

Many thought the release of the national space policy would conclude the administration’s work on space policy, making SPD-6 something of a surprise. A senior administration official said work on various space policy directives and the national space policy had been slowed down by the coronavirus pandemic, but wouldn’t rule out additional announcements in the remaining five weeks of the Trump administration.