An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Yet Another American Caught Spying for China

It is an epidemic, only no one will admit that. Mr. Hansen’s charges are found here.

WASHINGTON (Reuters) – A former officer with the U.S. Defense Intelligence Agency was arrested over the weekend for allegedly trying to spy on the United States for China, the Justice Department said on Monday.

The Federal Bureau of Investigation took Ron Rockwell Hansen, 58, into custody on Saturday while he was on his way to the Seattle-Tacoma International Airport to get a connecting flight to China.

The department said he has been accused of trying to transmit national defense information to China and with receiving “hundreds of thousands of dollars” while acting illegally as an agent for the Chinese government.

Reuters could not immediately learn who may be representing Hansen in the case.

Hansen is the latest person in a string of former U.S. intelligence officers to be swept up in criminal probes related to spying for the Chinese.

Earlier this year, former CIA case officer Jerry Chun Shing Lee was indicted for conspiring to gather or deliver national defense information to China.

Another former U.S. intelligence employee named Kevin Mallory is on trial in Virginia, also in connection with selling secrets to China.

In the new case announced Monday, prosecutors said that Hansen speaks fluent Mandarin-Chinese and Russian.

He served as a case officer for the Defense Intelligence Agency while on active military duty from 2000-2006, and later continued that line of work as a civilian employee and a contractor.

He also held a top secret clearance for years.

The government said that between 2013 and 2017, he traveled between the two countries attending conferences and provided the information he learned to China’s intelligence service.

He was paid via wire transfers, cash and credit cards. He also allegedly improperly sold export-controlled technology.

“His alleged actions are a betrayal of our nation’s security and the American people and are an affront to his former intelligence community colleagues,” said John Demers, the head of the Justice Department’s National Security Division.

According to court records, the FBI started investigating his activities in 2014. He was unaware of the probe, and participated in nine voluntary meetings with federal agents in Salt Lake City. Utah.

Prosecutors say that during his meetings, he told the FBI that Chinese intelligence had tried to recruit him, offered to cooperate as a source and even provided thumb drives to the FBI that contained classified materials he was not authorized to have.

Hansen appeared before a magistrate judge in Seattle on Monday, and is charged in a 15-count complaint.

Mr Hansen, who lives in Syracuse, Utah, was charged with attempting to gather or deliver national defense information to aid a foreign government.

Other charges – there are 15 in total – include acting as an unregistered foreign agent for China, bulk cash smuggling, structuring monetary transactions and smuggling goods from the US.

photo, Mallory

*** Now about those phones and Kevin Mallory:

The phone the Chinese intelligence operatives gave Kevin Mallory was a specialized spy gadget. If it had worked like it was supposed to, he might be a free man today.

The former CIA officer, on trial in Alexandria federal court on espionage charges, freely told his old colleagues that he had been approached by those spies on social media in February of 2017. He said he had been invited on two trips to China and given a Samsung Galaxy phone with special encryption capabilities.

What he didn’t tell his U.S. intelligence contacts, and, according to prosecutors, what he thought they would never learn, was that he also traded classified documents to the Chinese agents in exchange for $25,000.

Mallory, a 61-year-old from Leesburg, Va., who also served in the Defense Intelligence Agency, State Department and U.S. Army, was arrested last spring. While prosecutors say he was selling secrets, he contends he was trying to expose the Chinese spies. Whatever jurors decide, the veteran intelligence operative’s trial is offering a glimpse into some of the inner workings of both Chinese espionage and American attempts to counter it.

It’s “very rare” for a foreign intelligence service’s device “to be revealed like that,” FBI agent Paul Lee testified on Thursday. The phone would have cost the Chinese government a lot of money to develop, he had told Mallory last year.

Mallory explained in meetings with the CIA and FBI, which were recorded and played for the jury, that the phone contained an app designed to facilitate steganography, or the hiding of information inside of an image. Documents were merged into a file that appeared as an image — in this case, the Chinese chose horses grazing in front of a mountain range.

To send the files through the secure version of the app, which was a customized version of the Chinese messaging service WeChat, both parties had to be online and type in a password. (The one built into the application, Mallory told the officials, was the word “password,” in English.)

Mallory told the FBI that the Chinese spies told him they had found a “special way” to make the app safer.

But their system was flawed. James Hamrock, an engineer who analyzed the phone for the FBI, said he believes the encrypted application crashed at one point, creating an unintentional log of Mallory’s communications with one of the Chinese spies.

If the app had not crashed, Hamrock testified, he likely would not have been able to see Mallory’s communications. Instead, as Mallory and FBI agents met in a hotel room in Ashburn, Va., last May to look at the phone, they saw conversations in which Mallory had discussed delivering “more documents,” including something related to a foreign intelligence service. (The name of that service was redacted from exhibits shown in court).

“I’m — I’m surprised it kept this much,” Mallory told the agents as they examined the phone.

But defense attorneys stressed that U.S. law enforcement would never have known about the phone — let alone have been able to examine it — had Mallory not brought it to them.

Mallory maintains that as soon as he realized the Chinese recruiters who had approached him on LinkedIn were spies, he decided to deliver them to American hands.

“Kevin Mallory has worn a white hat throughout his career, and he did not take it off for a relatively small amount of money,” public defender Geremy Kamens said in his opening statement. “If he was motivated by money, he would have kept his mouth shut.”

Instead, Mallory caught the attention of authorities because he repeatedly contacted a CIA employee from his church and a CIA contractor he worked with from 2010 to 2012 to say he believed he was in touch with Chinese intelligence.

In a text to the contractor, a covert operative who testified from behind a screen under the pseudonym John Doe, Mallory said the operatives “asked me a few questions that could have only come from our side of the house.”

Doe testified that he took that to mean that the Chinese had penetrated the CIA.

Doe said Mallory’s request to be put in touch with someone in the agency’s East Asia Division “seemed odd.”

Ralph Stevenson, a CIA resources officer, agreed. When Mallory contacted him in a similar manner, Stevenson said, he deleted the texts and responded with a terse email.

At the Montgomery Chinese Branch of the Mormon Church that weekend, Stevenson upbraided Mallory. Read more here.

*** One last item:

China’s influence in New Zealand is so extensive that it threatens the traditionally close intelligence contacts between New Zealand and its Western allies, according to a report written by the Canadian spy agency.

The report, entitled China and the Age of Strategic Rivalry, was authored by experts at the Canadian Security Intelligence Service (CSIS). It contains a summary of views expressed by participants at an academic outreach workshop that was organized in Canada by the CSIS. In a section focusing on Chinese “interference in democratic systems”, the report suggests that, despite its small size, New Zealand is “valuable to China […] as a soft underbelly through which to access Five Eyes intelligence”. In recent years, claims the report, Beijing has adopted “an aggressive strategy” that has sought to co-opt political and economic elites in New Zealand as a means of influencing political decision making in the country. As part of that process, China seeks to gain advantages in trade and business negotiations, suppress negative views of China, facilitate espionage and control the views of the Chinese expatriate community in New Zealand, according to the report. Ultimately, Beijing seeks to “extricate New Zealand from […] its traditional [military and intelligence] partners]” as a means of asserting its regional and —eventually— global influence, the report concludes.

In a separate but connected development, it emerged this week that China expert Peter Mattis told an American Congressional committee last month that New Zealand’s position in the Five Eyes alliance was tenuous due to China’s influence. Mattis, a former China analyst for the United States Central Intelligence Agency, was speaking before the US-China Economic and Security Review Commission, a group of experts that advise the US Congress. He told the Commission that the influence of the Chinese Communist Party in New Zealand is so deep that it raises questions about whether the Pacific Ocean country can continue to share intelligence with the other members of the Five Eyes alliance.

On Wednesday, New Zealand’s Prime Minister Jacinda Ardern emphatically dismissed questions about her country’s role in the Five Eyes alliance. She told reporters in Wellington that the issue of New Zealand’s Five Eyes membership had “never been raised” with her “or anyone else” by Five Eyes partners. Ardern added that her government received its information “from official channels, not opinions expressed at a workshop”.

 

 

Fed Gov Spent $76 Billion in 2017 for Cyber Security, Fail v Success

Go here for the Forum Part One

Go here for the Forum Part Two

Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.

David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.

NSA Built Own 'Google-Like' Search Engine To Share ... photo

When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.

With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.

Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.

** NSA 'building quantum computer to crack security codes ...  photo

Beyond NSA, DHS as with other agencies have cyber divisions. The DHS cyber strategy is found here. The fact sheet has 5 pillars:

DHS CYBERSECURITY GOALS
Goal 1: Assess Evolving
Cybersecurity Risks.
We will understand the evolving
national cybersecurity risk posture
to inform and prioritize risk management activities.
Goal 2: Protect Federal Government
Information Systems.
We will reduce vulnerabilities of federal agencies to ensure they achieve
an adequate level of cybersecurity.
Goal 3: Protect Critical
Infrastructure.
We will partner with key stakeholders
to ensure that national cybersecurity
risks are adequately managed.
Goal 4: Prevent and Disrupt Criminal
Use of Cyberspace.
We will reduce cyber threats by
countering transnational criminal
organizations and sophisticated cyber
criminals.
Goal 5: Respond Effectively to Cyber
Incidents.
We will minimize consequences from
potentially significant cyber incidents
through coordinated community-wide
response efforts.
Goal 6: Strengthen the Security and
Reliability of the Cyber Ecosystem.
We will support policies and activities
that enable improved global cybersecurity risk management.
Goal 7: Improve Management of
DHS Cybersecurity Activities.
We will execute our departmental
cybersecurity efforts in an integrated
and prioritized way.

Related reading:National Protection and Programs Directorate

NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive.  NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.

Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.

The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.

The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.

Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.

By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.

Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.

“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”

Crimes or War, the Body Collectors in Mosul

Imagine the other cities in Iraq and Syria. Mosul was part of Assyria as early as the 25th century BC. Of note, in 2008, there was a sizeable exodus of Assyrian Christians. They sought sanctuary in Syria and Turkey due to threats of murder unless they converted to Islam.

Related reading: Aleppo: Tell Our Story After we are Gone

Turkish Airlines New Flight Route to Mosul photo

Iraq Mosul picture, Iraq Mosul photo, Iraq Mosul wallpaper photo

Inside the killing rooms of Mosul

Warning: Graphic images

MOSUL, Iraq — In March, VICE News returned to Mosul for the first time since the war against ISIS was declared over eight months ago.

While life may be returning to normal in the eastern half of the city, on the other side of the river — where the fighting was most intense — the scale of rebuilding that needs to be done is monumental. It’s estimated there are still 8 million tons of conflict debris that need to be moved before reconstruction can start, equivalent to three times the size of the Great Pyramid of Egypt. About 75 percent of that rubble is in West Mosul, and it’s mixed with so much unexploded ordnance that experts say this is now one of the most contaminated spots on the planet.

In the Old City, where ISIS made its last stand, residents have slowly started to come back – a few business owners hoping to repair shops, and families who have no other option but to live in their damaged homes. Some water tanks have been trucked in, and electricity cables have been temporarily patched together along some streets, but the place feels deserted, and in some ways the scene was not that different from how it looked shortly after the fighting.

Eight months on, there are hundreds or perhaps thousands of bodies still under the rubble, making life unbearable for the families who have returned.

The putrefied corpses are mainly Islamic State fighters or their families, since many of the non-ISIS civilian bodies have been dug out and reclaimed by family members or civil defense workers. The bodies that remain are a severe health hazard, but there’s little political will to deal with them, and removing them is risky given the unexploded munitions littering the area. Nevertheless, teams of citizen volunteers are going house-to-house carrying out this gruesome, dangerous work on a daily basis.

**

One volunteer team is led by Sroor al-Hosayni, a 23-year-old former nurse. Many of her group are even younger; some are medical students, but most have no formal training in handling corpses. So far, they say they’ve pulled and bagged more than 350 bodies that no one else was willing to deal with. They laid them in white plastic body bags where municipal trucks can easily collect them, labeling them for any potential explosives found with the corpse.

“We saw that there were bodies everywhere, in the alleys and inside the houses,” Hosayni said. “I took my team and started implementing this idea by going to help municipality and government workers in removing these bodies before summer comes and disease spreads in the city.”

At first the authorities complained, telling her: “‘You don’t have to move ISIS bodies. Leave them there; the dogs will eat them.”

Hosayni replied, “But one or two dogs can’t eat them; there are thousands of bodies.”

A suspected execution room inside the basement of a collapsed building Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team say there are more than 100 rotting corpses here. So far they have pulled more than 30 bodies from this room n the last few weeks. (Adam Desiderio/VICE News)

After filming Hosayni’s team at work near the destroyed Al Nuri mosque, we followed them to Al Maydan — the Old City neighborhood where ISIS made its last stand — where they had been working on one particular site for weeks.

Bulldozers have started clearing a path where Souk Al-Samak Street once ran along the river, but almost nothing else has changed since the air bombardment flattened this district.

The ruins of arched and intricately carved stone doorways open onto inner courtyards like dioramas of the war, frozen in time: Human corpses in varying degrees of decay lying amid stray ordnance, broken china, plastic toy trucks, and discarded military apparel.

Two hundred yards up the street and on the right, the team pointed us to a building on the banks of the Tigris River. Scrambling through the collapsed masonry, we emerged into two mostly intact basement rooms with barred windows looking out onto the river. In the far room, buzzing with flies and inescapable stench, were dozens and dozens of corpses, stacked too deep to count, one on top of another. It seemed to be the remains of a mass execution.

The body collectors told us there were at least 100 bodies in here; the team had already cleared more than 30 but had barely made a dent in the mound of corpses.

23 year-old Sroor al-Hosayni, a former nurse, leads a team of volunteer body collectors pulling corpses out of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Hosayni and her team of volunteers have been pulling bodies from what they say is an execution room in the basement of this building. (Adam Desiderio/VICE News)

We saw what appeared to be the bodies of children, though it was difficult to verify given the level of decay. We saw no weapons or military gear on the bodies. The team told us they could see bullet wounds to their heads.

There are reports that ISIS locked large numbers of people in rooms like this, using them as human shields during the final days of the conflict. Many of those families died in coalition airstrikes — but this room was intact. It’s possible they could have been executed by ISIS fighters as government forces closed in. But it’s not clear why ISIS would kill or dispose of civilians in this way.

There are also reports of Iraqi forces executing captured ISIS members in this exact neighborhood. Beards and long hair were still visible on some of the corpses, leading the body collectors to believe some could be men who may have been affiliated with ISIS. But speaking to VICE, a senior Iraqi military official rejected any notion that Iraqi forces may have been responsible for the killings and told us that the site had already been investigated, without providing further details.

One international organization that has documented instances where Iraqi security forces have been accused of carrying out executions is Human Rights Watch.

Belkis Wille, the lead Iraq investigator at Human Rights Watch, visited the site soon after we did. She told us she was unaware of any investigation having been done at this particular site, and that — whoever was responsible for the deaths — the removal of evidence was troubling given that this was potentially the site of a war crime.

**

“Sites like that need the proper forensic teams securing the site and conducting the analysis needed to determine whether this is indeed the site of a crime,” Wille told VICE News. “Despite promises by the prime minister at the end of the battle to investigate abuses, we haven’t seen any sign of that leading to teams coming in and doing the investigations necessary. And the question really is, at what point do these sites potentially lose their forensic value and lose the evidence?”

Inside the remains of Great Mosque of al-Nuri in Mosul, Iraq where ISIS leader Abu Bakr al-Baghdadi declared an Islamic State caliphate in 2014. (Adam Desiderio/VICE News)

But for the body collectors — and for many residents of Mosul — with the heat of summer approaching, the overwhelming priority right now is to clean up this city and begin rebuilding. The need to properly document and investigate potential war crimes isn’t at the top of the agenda.

“It’s time to focus on the living, not the dead,” was the mantra we heard from authorities and from many families trying to rebuild their shattered lives.

Nevertheless, the question of what happened in neighborhoods like Al Maydan and others in those final stages before victory was announced, and in the days shortly afterward, refuses to disappear.

In the ultimate stages of the battle to extinguish the last pockets of ISIS from Mosul last summer, access to the “fight zone” became increasingly restricted.

Baghdad declared the conflict officially over on July 10. The announcement, broadcast live on state television, came as a surprise to many, since there were explosions and gunfire still echoing out from the Old City where the last dregs of the Islamic State terrorist group were refusing to surrender.

Just a day before that, VICE News was one of the few outlets that managed to get past the cordon to join a general from Iraq’s elite counterterrorism brigade and an advance team of his men as they carefully picked their way across the booby-trapped rooftops of collapsed buildings in the district of Al Maydan to plant an Iraqi flag on the banks of the Tigris.

It was a journey through hell. The neighborhood had been pulverized by airstrikes and shelling throughout the campaign, but the intensity had grown as ISIS fell back to these ancient, narrow streets lined with buildings dating back to the 12th century. There was hardly a structure still intact, ordnance and bodies lined the route, some fresh, some bloated and badly decomposed from days or weeks in the sun.

Reaching the river was a symbol of having decisively broken through ISIS defensive lines, a long-awaited moment of triumph for the soldiers. But as the flag was raised and the soldiers took selfies, gunfire from a sniper still alive among the rubble sent the party scattering for cover. In those final days, as different units of Iraq’s security forces held impromptu victory celebrations after liberating neighborhoods, the question lingered of what the end of hostilities actually looks like when the enemy is hell-bent on fighting to the death.

We will likely never know who killed the people in the basement room of the house on Al-Samak Street — but as long as claims persist that extrajudicial killings by Iraqi security forces may have taken place, the stakes of not investigating those could be high. While there is little sympathy for ISIS right now in the devastated neighborhoods of Mosul, a culture of impunity for any abuses that were committed could set the stage for the same kinds of grievances that contributed to the group’s rise in the first place.

Cover image: The basement of a collapsed building in Al Maydan, the district of the Old City where ISIS made its last stand. Volunteers have been pulling bodies from what they say is an execution room filled with more than 100 corpses in the basement of this building. (Adam Desiderio/VICE News)

 

List of Issues for Talks Between Trump and Kim Jung Un

North Korea is holding up to 120,000 political prisoners in “horrific conditions” in camps across the country, according to estimates from a newly released State Department report.

The department on Tuesday issued its annual International Religious Freedom Report for 2017, which covers 200 countries and territories, documenting religious freedom and human rights abuses.

The findings on North Korea come as the Trump administration is working to engage the isolated regime. The White House says the administration continues to “actively prepare” for a possible summit with Kim Jong Un.

The report, though, addressed the brutal conditions festering inside Kim’s kingdom. It revealed 1,304 cases of alleged religious freedom violations in the country last year, while detailing the harsh treatment of political and religious prisoners — and persecution of Christians.

Secretary of States Mike Pompeo is meeting with 4 Star General and head of the military intelligence, Kim Yong Chol is a longtime spy chief and vice chairman of the ruling Workers’ Party was responsible for hacking Sony. More here.

North Korea Releases 3 US Citizens Ahead of Trump-Kim ... photo

Then North Korea has 2 satellites in orbit and more planned in 2018-2019.

“The Unha launcher can put maybe 100 kilograms [220 lbs.] into a pretty low orbit, maybe 400 or 500 kilometers [250 to 310 miles]” above the Earth’s surface, Wright said. “By increasing the thrust, it allows North Korea to lift satellites to higher altitudes, or to carry a greater payload to longer distances if it is a ballistic missile.”

Wright noted that the earlier, Nodong engine was essentially a scaled-up version of the one in the Scud, the Soviet missile that Iraq often used during the Gulf War of the 1990s. Whereas the Nodong used Scud-level propellants instead of ones used in more modern rockets, Wright noted that the color of the flame coming from the new engine in photos of the test suggest that this missile uses more advanced propellants that can generate higher thrust. [Top 10 Space Weapons]

“The surprise has been why North Korea has stuck with Scud propellants for so long,” Wright said. “There have been reports for 15 years now that North Korea had bought some submarine-launched missiles from the Soviet Union after it collapsed that used more advanced propellants, yet in all this time, we didn’t see them launch missiles with anything but Scud propellant.

In 2016, At United States Strategic Command, controllers likely had a high-workload evening as STRATCOM monitored the launch of a Russian Soyuz rocket from the Plesetsk Cosmodrome just eight minutes prior to North Korea’s launch, as is typical for launches from Russia’s military launch site. The ascending Unha rocket was tracked using the Space-Based Infrared System in Geostationary Orbit, capable of detecting the infrared signature of ascending rockets from ground level all the way into orbit. This allows the U.S. military to track the vehicle’s trajectory in real time before relying on ground-based radars to track any objects that entered orbit. More here .

Ah but there is but one more issue at least. Yes, North Korea imploded their nuclear test site at Punggye-ri. But…there are 4 more locations.

nk map amanda photo

The most important is Yongbyon, while the other locations appear to have slight or no activity.

Further, North Korea maintains a rather advanced air defense system, listed among the top in the world.

However, while North Korean technology is relatively primitive—the nation’s air defenses are coordinated.

“They do have an old Soviet computerized anti-aircraft command and control system. Most of the radars are old, but they did receive some newer Iranian phased array radars,” Kashin said. “This is what I know, the anti-aircraft units are extensively using underground shelters for cover—not easy to destroy.”

Thus, while generally primitive, North Korean defenses might be a tougher nut to crack than many might expect. Moreover, while their technology is old, North Korea’s philosophy of self-reliance means it can produce most of its own military hardware. More here.

North Korea has a fairly robust chemical and biological weapons program. The 46 page report is found here.

Lastly but hardly finally is the cyber weapons produced and applied by North Korea.

Most recently is: May 29, 2018, The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) released a joint Technical Alert (TA) that identifies two families of malware—referred to as Joanap and Brambul—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

In conjunction with the release of this TA, NCCIC has released a Malware Analysis Report (MAR) that provides analysis on samples of Joanap and Brambul malware.

NCCIC encourages users and administrators to review TA18-149A: HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm and MAR-10135536-3 – RAT/Worm.

While there has been recent discussions about applying the Libya model to North Korea for removing nuclear weapons, you can bet Kim Jung Un is going to demand the Pakistan model.

 

 

US Warships Challenge Chinese Islands: FONOP

combatindex.com: DDG 76 : USS HIGGINS USS Higgins

The US Navy sent two warships to a disputed archipelago in the South China Sea on May 28 in its latest symbolic protest against China’s claims there.

Reuters first reported that the USS Higgins and the USS Antietam ventured within 12 miles of the Paracel Islands in a demonstration the Pentagon calls a “freedom of navigation operation” or FONOP. The move signals US rejection of China’s claims of political control in the South China Sea.

The objective of their sail-by was a speck of land called “Woody Island,” where China has developed airstrips and port facilities in recent years as part of a broader strategy of establishing bases in these islands to demonstrate and exercise its political claims. This spring, China landed strategic bombers capable of carrying nuclear weapons on the island, a symbolic display of its deterrent power, and satellite imagery showed the arrival of surface-to-air missiles this month.

**

The Vietnamese government protested China’s move as a violation of its sovereign claim to the islands—exactly the language used by China to protest US actions today after sending its own warships to warn away the Americans.

** See more here.

China triggers new storm over military build-up on ... photo

The island is one of many that lay behind the “nine dash line,” a diplomatic term of art for China’s political vision for the South China Sea, which is at the center of a web of claims by nearby nations:

China's claim over the South China Sea is different from its neighbors' interpretations. In March, the US sent a destroyer on a FONOP to the Spratly Islands. In response, China increased its naval activity there, including a parade of warships that was also captured by Planet satellites. Tensions in the South China Sea have been simmering for years, but are now complicated by China’s role in North Korean nuclear talks and growing trade disputes with the Trump administration.

*** Meanwhile in April of 2018:

Surveillance photos suggest it has already broken its promise to not land military aircraft on its artificial islands. And there are claims the facilities have begun jamming US forces.

Philippines news service The Inquirer has obtained an aerial surveillance photo taken back in January which appears to show two Chinese Xian Y-7 twin engine aircraft on the recently constructed artificial island of Mischief Reef — also known as Panganiban Reef.

These are military combat transport aircraft, built to rapidly deploy special forces troops and munitions to a battlefield.

The news comes amid reports that electronic warfare equipment recently installed on the islands were last week directed at disrupting the passage of the United States Navy’s aircraft carrier, the USS Roosevelt.

FAIT ACCOMPLI?

Mischief Reef is within the internationally recognised 370km exclusive economic zone (EEZ) that applies to the Philippines. It is one of seven artificial islands arbitrarily constructed within the disputed Spratly Islands cluster. Three of these have large, 3km long military-grade runways.

China refuses to accept the UN economic zone standard, established after World War II to reduce international tensions, as well as an adverse ruling in 2016 by an international court of arbitration on the matter.

Instead, it insists it holds sovereign territorial rights over the whole 3.5 million-square-kilometre South China Sea, right up to 20km of the coasts of bordering nations including Taiwan, Vietnam, Borneo and Malaysia.

“If they could land transports now, in the future they might want to land more provocative and destabilising types of assets such as fighter jets and bombers,” research fellow Collin Koh at Singapore’s Rajaratnam School of International Studies’ Maritime Security Program, told The Inquirer.

ELECTRONIC MISCHIEF

The Wall Street Journal reports US intelligence officers have identified radar and communications jamming equipment being installed on Beijing’s artificial South China Sea island fortresses.

Such electronic warfare devices are designed to block an opponent’s radar from ‘seeing’ what is going on, and prevent ships and aircraft from communicating with each other and the outside world.

Now, a US Navy pilot appears to have confirmed that these facilities are active.

Serving aboard the USS Roosevelt aircraft carrier which passed through the South China Sea to visit the Philippines last week, he implied the immense warship and its aircraft had been targeted by these disruptive devices.

“The mere fact that some of your equipment is not working is already an indication that someone is trying to jam you.” the pilot told the Philippines’ GMA News Online.

“And so we have an answer to that,” the naval officer cryptically told the journalist invited aboard for a tour of the ship.

DELVE DEEPER: How does China’s military compare with the US?

The USS Roosevelt had passed through the disputed waterway at the same time as a major Chinese naval parade was being staged on behalf of its new President-for-life, Xi Jinping.

The pilot reportedly flew one of the US Navy’s EA-18G Growler aircraft — a modified Super Hornet intended to provide electronic warfare support for accompanying ships and aircraft.

“This is not something that the US will look kindly on or think they can overlook.” military analyst Omar Lamrani at geopolitical think-tank Stratfor told Business Insider .

Lamrani said that even though electronic jamming was nothing like shooting a weapon, such activity was provocative and “could lead to an escalatory pattern that could be negative for both sides.” More here.