No response by the Russians using the GUARD channel? This is the common airband channel for all aircraft regardless of tail number or flag. Essentially this appears to come close to electronic warfare.
WASHINGTON (AFP) – A US Air Force reconnaissance plane was intercepted by a Russian SU-27 jet in an “unsafe and unprofessional” manner while flying a routine route in international airspace over the Baltic Sea, the Pentagon said.
“The US aircraft was operating in international airspace and at no time crossed into Russian territory,” said Laura Seal, a Pentagon spokeswoman.
The incident comes shortly after Russian aircraft repeatedly buzzed the USS Donald Cook this past week, including an incident Tuesday in which a Russian Su-24 flew 30 feet (nine meters) above the ship in a “simulated attack profile,” according to the US military’s European Command.
Russia has denied the action was reckless or provocative.
“This unsafe and unprofessional air intercept has the potential to cause serious harm and injury to all aircrews involved,” Seal said of Thursday’s incident.
“More importantly, the unsafe and unprofessional actions of a single pilot have the potential to unnecessarily escalate tensions between countries.”
The US aircraft in question was an RC-135.
***
FreeBeacon: Navy Captain Hernandez said the U.S. aircraft, a militarized Boeing 707 jet, was operating in international airspace “and at no time crossed into Russian territory.”
“This unsafe and unprofessional air intercept has the potential to cause serious harm and injury to all aircrews involved,” he said. “More importantly, the unsafe and unprofessional actions of a single pilot have the potential to unnecessarily escalate tensions between countries.”
According to Hernandez, the Su-27 carried out “erratic and aggressive maneuvers” by approaching the RC-135 at a high rate of speed from the side.
The Russian jet “then proceeded to perform an aggressive maneuver that posed a threat to the safety of the U.S. aircrew in the RC-135U,” the spokesman said.
“More specifically, the SU-27 closed within 50 feet of the wing-tip of the RC-135 and conducted a barrel roll starting from the left side of the aircraft, going over the top of the aircraft and ended up to the right of the aircraft,” he said.
The U.S. government is protesting all the incidents this week to the Russian government through diplomatic channels, he said.
The RC-135U, an electronic intelligence-gathering aircraft, is normally operated by five air crew and up to 16 electronic warfare officers and six or more regional specialists.
The dangerous aerial incident came two days after a simulated Russian aerial assault against the guided missile destroyer USS Donald Cook in the Baltic Sea. Washington called the simulated assault a military provocation, and said it nearly caused an international shootout.
Two Russian fighter-bombers, identified as Su-24s, made close passes over the Cook, including one jet that came within 30 feet of the warship.
A Navy officer said the buzzing was the most reckless flyover of a U.S. warship by either a Russian or Chinese warplane since the Cold War. “I’ve been in a lot of those situations and I’ve never seen any plane come that close,” the officer said.
The aerial harassment appears to be part of a Russian military campaign of intimidation against the United States and NATO.
Moscow has adopted hostile military policies toward the United States over U.S. deployment of missile defenses in Europe, which Moscow says threaten its missile forces. The Russians also have been upset by Western sanctions against its military annexation of Ukraine’s Crimea.
Strategically, Russian leader Vladimir Putin has been seeking to regain control and influence over what Moscow calls the “near abroad”—former Soviet republics and Eastern Bloc nations along the periphery of Russia’s borders in Eastern Europe.
The policy has led to military aggression against the Republic of Georgia in 2008 and Ukraine in 2014, where Russian troops took over the Crimean peninsula and are continuing to fuel separatist activity in eastern Ukraine.
In response, the United States and NATO are bolstering U.S. and allied military forces in Eastern Europe, with a specific emphasis of increasing military forces and troops near the Baltic states of Latvia, Estonia and Lithuania, as well as in Poland.
The recent Russian military provocations coincide with military activities by Moscow in the Russian enclave of Kaliningrad, which remains a major subject of U.S. monitoring. Russia in the past has threatened to deploy nuclear-capable Iskander short-range missiles in the enclave on the Baltic Coast between Poland and Latvia.
Earlier this week, Brian McKeon, principal undersecretary of defense for policy, told a House subcommittee hearing that Russia has prevented U.S. and allied flights over Kaliningrad that are allowed under the Open Skies Treaty.
Mark Schneider, a former Pentagon strategic forces analyst who specializes in Russian affairs, said the recent incidents over the Baltic Sea, including the simulated attack of a U.S. warship, are fundamentally different from past Russian provocations.
“It is a major escalation of Russian aggressiveness although it fits into a pattern of Russian activity that goes back years,” Schneider said. “The Russian Defense Ministry reaction was blatantly dishonest.”
Schneider said the likely U.S. response to these provocations are what former Pentagon official Richard Perle once dubbed “demarche-mellows,” or very weak, pro forma protests.
“If so, incidents like this will probably continue to escalate,” Schneider said.
Thursday’s aerial encounter involving the RC-135 was at least the second time this year that Russian jets have conducted a dangerous intercept of a reconnaissance aircraft.
On Jan. 25, a Russian Su-27 came within 20 feet of an RC-135 over the Black Sea in what Navy Capt. Daniel Hernandez said was an “unsafe and unprofessional” action.
Unlike Thursday’s encounter, the Russian jet in January did not do a barrel roll, but instead made an aggressive, high-speed banking turn away from the intelligence aircraft.
The maneuver disturbed the pilot’s control of the RC-135.
The dangerous Su-24 overflight of the Cook on April 12 came a day after two other Russian Su-24s flew over the ship 20 times, including a dangerous pass as an allied helicopter was being refueled, causing a delay in flight operations until the Su-24s left the area.
The same day, a Russian Ka-27 Helix helicopter flew around the Cook, which had finished a port visit to Poland and had a Polish helicopter on board.
“The Russian aircraft flew in a simulated attack profile and failed to respond to repeated safety advisories in both English and Russian,” the European Command said in a statement.
The Pentagon released video of the encounter showing the close pass, which created a wake in the water.
Secretary of State John Kerry on Thursday criticized the Russian military provocation, though he declined to say what steps the United States would take in response.
The State Department lodged formal protests with Russia.
“We condemn this kind of behavior. It is reckless. It is provocative. It is dangerous. And under the rules of engagement that could have been a shoot-down,” Kerry told CNN and the Miami Herald.
“People need to understand that this is serious business and the United States is not going to be intimidated on the high seas. … We are communicating to the Russians how dangerous this is and our hope is that this will never be repeated,” Kerry said.
The Cook is equipped with anti-aircraft defenses including the Close-In Weapons System, an automated air defense gun that can destroy aircraft with 25-millimeter rounds. The weapon was not readied because the ship was operating under the U.S.-Russian agreement not to illuminate each other’s aircraft.
“We have deep concerns about the unsafe and unprofessional Russian flight maneuvers,” the European command said in a statement.
“These actions have the potential to unnecessarily escalate tensions between countries, and could result in a miscalculation or accident that could cause serious injury or death.”
Kerry on Friday discussed the Cook incident with Russian Foreign Minister Sergey Lavrov, a State Department spokesman said.
Moscow sought to play down the incident involving the Cook. Russian Defense Ministry spokesman Igor Konashenkov told the state-run Interfax news agency that the Russian pilots acted within safety guidelines.
The incidents violated the bilateral U.S.-Russian agreement designed to prevent incidents at sea. The accord prohibits conducting simulated attacks and also limits the use of automated anti-aircraft guns.
Other incidents in recent months included a near collision between a Russian fighter and an RC-135 over the Black Sea on May 30, and on April 7, 2015, a Su-27 flew within 20 feet of an RC-135 over the Baltic Sea.
Additionally, last October, two Russian Tu-142 bombers made low passes near the aircraft carrier USS Reagan as it sailed in the Sea of Japan near the Korean peninsula. And on July 4, 2015, two Tu-95 nuclear-capable bombers approached within 40 miles of the California coast and radioed a “happy birthday” message to intercepting U.S. pilots.
The July 4 provocation occurred the same day President Obama held a telephone call with Putin.
Russia also has sent Tu-95 bombers to circle the Pacific island of Guam several times. The island is a major military hub and central to the U.S. military’s pivot to Asia.
Category Archives: Military
There Goes 9 More Gitmo Detainees
Oh, late Friday night, cloak and daggar? No White House announcement from the podium?
Since most of the remaining detainees are from Yemen, 9 were released to Saudi Arabia. Think about that for a moment. Saudi has been at war in recent months in Yemen and the United States had to literally flee during the first days of the war, terminating our CIA staff and our major drone operation against al Qaeda Arabian Peninsula, AQAP.
This is a headscratcher….unless….well nevermind.
ABC: Authorities say the U.S. has released nine prisoners from Guantanamo Bay and sent them to Saudi Arabia for resettlement.
All nine are Yemeni but have family ties to Saudi Arabia. None of the men had been charged and all but one had been cleared for release from the U.S. base in Cuba since at least 2010. One was approved for release by a review board last year.
They could not be sent to their homeland because of instability there.
The prisoners include a frequent hunger striker whose weight had dropped to as low as 74 pounds (34 kilograms) at one point.
The release announced Saturday in a Pentagon statement brings the Guantanamo prisoner population to 80, including 26 cleared men expected to leave by the end of the summer.
****
Stripes: The nine Yemenis include Tariq Ba Odah, a frequent hunger striker whose weight dropped to a dangerously low 74 pounds (34 kilograms) at one point as the military fed him with liquid nutrients to prevent him from starving to death. His lawyers at the Center for Constitutional Rights had urged the U.S. to free him earlier due to his health.
Eight of the prisoners, including Ba Odah, had been cleared for released from Guantanamo since at least January 2009, when an Obama administration task force evaluated all of the prisoners held at that time. The ninth, Mashur Abdullah Muqbil Ahmed Al-Sabri, was cleared by a review board last year.
The other prisoners in this release were identified as: Ahmed Umar Abdullah Al-Hikimi; Abdul Rahman Mohammed Saleh Nasir; Ali Yahya Mahdi Al-Raimi; Muhammed Abdullah Muhammed Al-Hamiri; Ahmed Yaslam Said Kuman; Abd al Rahman Al-Qyati; and Mansour Muhammed Ali Al-Qatta.
The last time Barack Obama was to be with the Saudis was at a Camp David Gulf Nation Summit, where he was snubbed. Furthermore in recent days there has been other hostilities over the 28 missing pages of the 9/11 report where there is text that at least one Saudi diplomatic had met with two of the hijackers in California providing them with material and monetary support. Anyway, Obama starts this coming week with his trip to Saudi Arabia mostly to meet on the fight against Islamic State.
ABC: resident Barack Obama will strategize with his Middle Eastern and European counterparts on a broad range of issues during a weeklong trip to Saudi Arabia, England and Germany with efforts to rein in the Islamic State group being the common denominator in all three stops.
Obama, who begins traveling next week, recently said defeating IS his No. 1 priority. He paid a rare visit to CIA headquarters this week for a national security team meeting focused on countering the group.
The president is scheduled to arrive in the Saudi capital of Riyadh on Wednesday, where he will hold talks with King Salman. Obama will also attend a summit hosted by leaders of six Persian Gulf countries that are members of the Gulf Cooperation Council: Saudi Arabia, Kuwait, the United Arab Emirates, Qatar, Bahrain and Oman.
The summit follows a similar gathering that Obama hosted with the Gulf leaders last year at the Camp David presidential retreat. The White House arranged last year’s meeting largely to reassure Gulf leaders who were unnerved by a deal the U.S. and other world powers negotiated with Iran to ease economic sanctions in exchange for limits on its nuclear program.
The Iran deal is now in force, and the meeting next week will focus on defeating the Islamic State militants and al-Qaida, as well as regional security issues that include Iran.
Obama will spend most of his time in England. He is scheduled to meet again with Queen Elizabeth II over lunch at Windsor Castle on April 22, a visit that coincides with her 90th birthday a day earlier.
Obama will also meet with British Prime Minister David Cameron, who is campaigning for his country to continue its membership in the European Union. Britons are scheduled to vote on its EU membership in a June 23 referendum, the first vote ever by a nation on whether to leave the 28-member, post-World War II bloc.
Obama is not expected announce a position on the referendum, although aides have voiced support for a strong United Kingdom as a member of the E.U.
“He’ll make clear that this is a matter the British people themselves will decide when they head to the polls in June,” Ben Rhodes, Obama’s deputy national security adviser, said Thursday as he outlined the trip for reporters.
Cameron has also been stung by criticism over his investment in an offshore trust run by his late father. The revelation was part of the recent dump of more than 11 million documents from a Panama law firm that is one of the leaders in setting up offshore bank accounts for the rich and powerful.
Obama also plans a town hall-style, question-and-answer session with young adults, which has become a staple of his foreign trips. Additional stops were being planned for London.
In Germany, the final stop on Obama’s three-country trip, the president will hold talks and a news conference Sunday with Chancellor Angela Merkel. Merkel’s popularity has suffered after she angered Germans by allowing a massive resettlement of refugees from Syria and other war-torn countries. She recently helped broker a deal between the EU and Turkey to stem the refugee flow to Europe.
Obama also plans to join Merkel to open the Hannover Messe, the world’s largest trade show for industrial technology.
Before departing for Washington, Obama has scheduled a speech reviewing U.S.-European collaboration during his tenure and looking ahead to future joint efforts.
Cables: Taliban, Haqqani, Kidnapping and Bergdahl
Facts are funny things and the CIA is fearless. Dates matter too.
For the additional details on the attack on the CIA base mentioned in the body of this post, go here.
Supporters “Are in the Oil Industry”: Declassified DIA Cables Show Haqqani Network Revenue Streams
NSAArchive: Less than a dozen men were running the militant Islamist Haqqani Network (HQN) by the time the State Department declared it a Foreign Terrorist Organization in 2012, and this extremely small group continues to determine which illicit activities the organization engages in to fund its fight against US-led forces in Afghanistan. Defense Intelligence Agency documents dated from 2008 through 2010 recently obtained by the National Security Archive in response to a FOIA request offer a window into a transitional period for the organization, before the State Department declared the group a terrorist organization and the US Treasury designated Haqqani leaders as Specially Designated Global Terrorists in 2014, subjecting them to sanctions. The documents illuminate the group’s efforts to diversify its funding away from the foreign sources it relied on during the Cold War, including the CIA and Pakistani intelligence services, and towards more traditionally criminal activity – and show squabbles over the sharing of ransom money, dispersal of funds to suicide bombers, financial links between HQN and the Karzai government, and Taliban funding for the group’s activities.
One of the early financial challenges for Jalaluddin Haqqani, the group’s founder, was coping with the end of the Cold War and the drying up of American resources. Barbara Elias notes in 2009’s “The Taliban File” that Haqqani received tens of thousands of dollars and weapons from the CIA between 1986 and 1994. CIA funding ended by the mid-1990s, although Haqqani’s relationship with the US only deteriorated in earnest in the late-1990s after the US bombed an HQN-linked training camp in retaliation for al-Qaida attacks on the US embassies in Kenya and Tanzania and Haqqani’s relationship with Osama bin Laden deepened.
A Confidential June 12, 1998, State Department cable, first published in Elias’s 2012 “The Haqqani History,” notes that Jalaluddin advocated for bin Laden within the Taliban, and that bin Laden’s increased power was due at least in part to “the growing strength of his supporters within the Taliban movement.” The US’s growing concern with bin Laden is shown in a May 24, 1999, cable summarizing a meeting between Haqqani and US officials, during which Haqqani agrees that bin Laden is “a problem,” but insists that “maybe the best solution is what is taking place now with him remaining in the country.” Haqqani also says that “he was deeply appreciative of U.S. assistance during the ‘jihad’ (holy war) against the Soviets and the (Afghan) communists,” but remains antagonistic over US destruction of a terrorist camp in Khost, Afghanistan, in August 1998. Haqqani even initiates the meeting by “joking” that it was “good to meet someone from the country which had destroyed my base, my madrassh [sic], and killed 25 of my mujahideen.”
Despite the historical ties between the groups, al-Qaida funding is not a major source of income for HQN; a September 24, 2009, DIA cable shows that when al-Qaida funding was received, it was relatively small amounts that were “generally provided by Al Qaida leader Shaykh Said al-Masri through Sirajudding Haqqani and Jan Baz Zadran, who is a HQN commander in Miram Shah, PK, in amounts of approximately 3,000 – 5,000 USD.”
West Point’s Combatting Terrorism Center (CTC) notes in a 2012 report that Jalaluddin was also motivated to decrease his organization’s dependence on Pakistani financing, and began vigorous fundraising efforts in the Gulf States in the 1990s to do so. A newly released April 8, 2010, DIA cable shows this practice continues. According to the cable, a well-connected individual “travels on behalf of the Haqqani network to a city in the vicinity of Dubai to collect charitable donations which are used to fund unspecified Haqqani network operations.”
However, a series of DIA cables (from January 11, 2010, and February 6, 2010) show that some funding for Haqqani attacks are still provided by the Pakistan Inter-Services Intelligence Directorate, including $200,000 for the December 30, 2009, attack on the CIA facility at Camp Chapman.
During Jalaluddin’s tenure the group also offered microloans to those living in its territory in North Waziristan, Pakistan, in a move that fostered goodwill and “really made a difference in these communities.” The attempts at public relations under Jalaluddin is not entirely unsurprising; a 1997 State Department cable reports Jalaluddin to be “more liberal” in his opinions on social policy, such as women’s rights, and seems to have understood the importance of maintaining credibility with the local community.
Jalaluddin was forced to retire in 2005, however, and his son Sirajuddin assumed the leadership, marking an increase in the group’s illicit activity.
Protecting smuggling enterprises in the border areas under its control, as well as engaging in its own, has become an important source of income for HQN under Sirajuddin. Interestingly, according to the CTC report, HQN imports “the precursor chemicals used to process raw opium into morphine base and heroin, including lime, hydrochloric acid and acetic anhydride (AA). If true, this may indicate that the Haqqanis have a non‐competition agreement with the Kandahari Taliban in the heroin business, or it could simply suggest that Haqqani leaders have realized that smuggling precursors is less risky and often more lucrative, since a glut in poppy production drives down wholesale opium prices.”
These sustained efforts have ensured that the group remains financially autonomous from the Taliban, although it receives a monthly stipend from the Quetta branch “to cover operational costs, and the budget shifts depending on the season and the funding capacity of the Taliban leadership.”
A September 24, 2009, DIA cable notes that the Quetta branch remains a stable source of HQN funding, saying that “A large majority of the Haqqani Network (HQN) funding comes from the Quetta, Pakistan-based Taliban leadership.” The cable goes on to say that “HQN pays fighters who conduct successful attacks against coalition forces (CF) Afghan National Army (ANA) or Afghan National Police (ANP), with larger amounts paid for killing a coalition member. A key point in the dispersal and receiving of funds within the HQN is the videotaping of attacks.”
One of the shifts that occurred along with the change in leadership was HQN’s increase of kidnap-for-ransom, a “growth industry” in which HQN cooperates “seamlessly” with other militant groups, but one that seems to have effected HQN’s credibility. Bowe Bergdahl is perhaps HQN’s most famous kidnapping victim, and would have undoubtedly been on HQN’s list of “legitimate targets,” which include “government officials and security personnel; those who cooperate with government; foreigners; transporters servicing NATO; and alleged spies.” New York Times journalist David Rohde and Afghan diplomat Haji Khaliq Farahi were also targets. The CTC report notes, however, that such behavior “appears to have lowered the network in the public estimation.”
Kidnapping-for-ransom, however, remains a way for unpaid Haqqani militants to make money. Low-ranking militants earn little, if any, money, and operate with a great deal of autonomy – making the occasional moonlighting – and tension over it – all but inevitable. A Secret September 29, 2009, DIA cable recounts one such ransom dispute. “As of late September 2009, Spera District Haqqani Network (HQN) commander Hamid (Rahman) had strained relations with the HQN leadership, including senior commander Siraj (Haqqani), over ransom money embezzled by Rahman. Rahman and an unidentified Iraqi Al-Qaida associate had kidnapped a road construction worker in Spera District for ransom and neglected to send the ransom money obtained to HQN leadership in Pakistan. As a result, Siraj Haqqani ordered Rahman to return to Miram Shah/[redacted] north Waziristan, PK, in order to account for the money. Rahman ignored the order and did not travel to Miram Shah due to fear that he would be killed by HQN leadership for his transgression.”
Donations and fundraising continue to be an important for HQN. A Secret March 22, 2009, DIA cable provides an example of a routine donation for HQN. It notes, “As of mid-February 2009, the Hadika ta Uloom madrassa in Dera Ismail Khan, PK was facilitating financial support for the Haqqani Network (HQN). The leader of the mosque, Maulawi din Mohammad (Khalifa), was facilitating contact between HQN commanders and local businessmen willing to donate money and assistance to the HQN.” The five businessmen contacted, all from the oil industry, provided a total of $17,000 USD.
HQN leaders also recognize the importance of a good media campaign. The CTC report finds that “Just as Jalaluddin before them, network leaders today conduct fundraising road shows, visiting large mosques around the region where they ask for alms from worshipers. As in the past, the Haqqanis appear to realize the importance of publicity materials to communicate their successes and to help to generate donations at these events. The network publishes considerable multi‐media material concerning its activities, and appears to consider publicity a core aspect of financial operations.”
HQN’s complicated relationship with the Afghan government, and its financial payoffs, are also highlighted in a Secret August 31, 2010, cable. The cable explains how a security manager in Khost province, Qabool Khan, simultaneously provides HQN with intelligence on US bases in Salerno and Chapman, while providing HQN with money and the license plate numbers of US vehicles of military personnel and contractors that serve on the two bases. Khan obtained his position with the security company – which posted private security guards on US bases – through Mahmoud Karzai, brother of Afghan president Hamid. “Khan receives $800.00 U.S. dollars per guard, per month, in which $200.00 U.S. dollars goes to the guard, $300.00 U.S. dollars to Khan, and $300.00 U.S. dollars is given to the Haqqani network… in return Khan is not attacked by Haqqani operatives leaving the American base or Khan’s personal residence. Khan leaves his window down when leaving the American base as a signal to Haqqani operatives not to attack his vehicle.”
These documents were requested under the FOIA as part of the Archive’s Afghanistan, Pakistan and Taliban project, and we will continue to post on interesting documents as they come in.
(General) Susan Rice, Declares War Policy on ISIS
Cant make this up……
Consider again this interview with the three previous Secretaries of Defense under Barack Obama…..
Rice Details U.S. Whole-of-Government Approach to Defeating ISIL
By Jim Garamone DoD News, Defense Media Activity
DOWNLOAD HI-RES / PHOTO DETAILS President Barack Obama talks with National Security Advisor Susan E. Rice in the Oval Office prior to a phone call with Russian President Vladimir Putin, Feb. 10, 2015. White House photo by Pete Souza
Susan E. Rice told the cadets and faculty that defeating ISIL is “at the very top of President Obama’s agenda.”
While the terror group is not an existential threat to the United States, she said, it is a danger to Americans and U.S. allies around the globe. Rice pointed to the ISIL attacks in Brussels, Paris, Istanbul, San Bernardino, Jakarta, Nigeria and others. She also highlighted ISIL in Syria and Iraq and the danger it poses to millions of people under its rule.
Dangerous Hybrid
What makes the group dangerous is that “it is essentially a hybrid,” the national security advisor said. ISIL is a terror organization that exploited the chaos of civil war in Syria to attack and occupy large swaths of Syria and Iraq. “At the same time, they have harnessed the power of social media to recruit fighters and inspire lone-wolf attacks,” Rice said.
ISIL is an enormous danger to civilians in the region and is an incredibly destabilizing force in the Middle East, she said, but members of the group are not 10 feet tall.
“This is not World War III or the much-hyped clash of civilizations,” Rice said. “On the contrary, we alienate our Muslim friends and allies — and dishonor the countless Muslim victims of ISIL’s brutality — when people recklessly and wrongly cast ISIL as somehow representative of one of the world’s largest religions.”
ISIL is simply “a twisted network of murderers and maniacs, and they must be rooted out, hunted down and destroyed,” she said, and all aspects of the U.S. government are part of the process to stop them.
Comprehensive Strategy
“For the past year and a half, the president has been leading a comprehensive strategy to destroy ISIL and its ideology of hate,” Rice said. “And, I do mean comprehensive. When we’re sitting around the situation room table, we’re using all aspects of our power — military, diplomacy, intelligence, counterterrorism, economic, development, homeland security, law enforcement. Ours is truly a whole-of-government campaign.”
And it is a global effort, the national security advisor emphasized. “We’ve assembled a broad coalition of 66 partners — from Nigeria and the Arab League to Australia and Singapore,” Rice said.
The anti-ISIL campaign represents an evolution in America’s broader strategy of confronting and defeating terrorism, she said, noting that since 9/11, the United States has learned that not every conflict requires large numbers of ground troops. “Our fight against ISIL is not like Afghanistan or the Iraq War,” she said.
In Syria and Iraq, coalition forces are helping to train indigenous forces, she said. “And, this increasingly dynamic campaign is ideally suited for airpower and the Air Force, utilized smartly in support of our partners on the ground,” Rice added.
The counter-ISIL strategy has four facets, she said. First, it calls for attacking ISIL’s core in Syria and Iraq. Second, the coalition is targeting ISIL’s branches. Third, the coalition is working to disrupt ISIL’s global network. Fourth, the United States is working around the clock to protect the homeland.
Substantial Progress
“It is a complex effort,” the national security advisor said. “It will not be accomplished fully in just a few weeks or months, or even a few years. But day by day, mile by mile, strike by strike, we are making substantial progress. And … we’re going to keep up the momentum.”
Rice detailed the coalition’s plans to continue the pressure on ISIL, beginning with continuing to hammer at the terrorist organization in Iraq and Syria — the so-called core ISIL. Coalition forces have conducted more than 11,500 strikes against core ISIL since starting operations in 2014, she said.
“Due, in large part, to our unprecedented visibility of the battlefield, the coalition air campaign is having a real impact,” Rice said. “Every few days, we’re taking out another key ISIL leader, hampering ISIL’s ability to plan attacks or launch new offensives.”
The strikes also are squeezing ISIL’s finances, which flow from their control of vast oil resources, their extortion and taxation of local populations and their looting and illicit sale of our cultural heritage, she said.
On the Ground
On the ground, the coalition will continue to support local forces in Iraq as they roll back ISIL, the national security advisor said. “So far, they have retaken more than 40 percent of the populated territory that ISIL once held,” she said.
“This fight will continue to require the courage and perseverance of the Iraqi people,” Rice continued. “It will also require the sustained financial support of the international community. It is not enough to win this fight; we must also win the eventual peace.”
Ending the civil war in Syria will go a long way to destroying ISIL, she said. An interagency team of diplomats, military and intelligence officers, working alongside Russia and other international partners facilitated a cessation of hostilities in the country, Rice noted. “This cessation has largely held, but in recent days, we’ve seen a significant uptick in fighting,” she said. “We’re increasingly concerned that the regime’s persistent violations of the cessation — and al-Nusrah’s hostile actions — will undermine efforts to quiet the conflict.”
Assad Must Go
Syrian President Bashar Assad may continue trying to disrupt and delay the good-faith efforts of the international community and the Syrian people to broker a political transition, the national security advisor said. “But he cannot escape the reality that the only solution to this conflict — the only way this ends — is through a political process that brings all Syrians together under a transitional government, a new constitution and credible elections that result in a new government without Assad,” Rice said.
340th EARS Refuel Strike Eagles
But core ISIL is only part of the problem, she noted. ISIL will flourish in fragile states and lawless regions, Rice said, citing ISIL ally Boko Haram in Nigeria and ISIL’s branches in Libya, on the Arabian Peninsula, in West Africa, in Afghanistan and Pakistan. ISIL has sent envoys “to provide their affiliates with money, fighters — even media training,” Rice said.
In Libya, ISIL threatens not only North African stability, but also sub-Saharan Africa and Europe as well, the national security advisor said.
In Afghanistan and Pakistan, ISIL has established a branch calling itself ISIL in the Khorasan — largely composed of former Afghan and Pakistani Taliban members. “They’ve gained territory in the east and launched attacks in major cities like Jalalabad, though a combination of U.S., Afghan, and Taliban pressure has limited ISIL’s gains,” she said. “As part of the U.S. counterterrorism mission in Afghanistan, President Obama has authorized the Department of Defense to target ISIL in the Khorasan.”
ISIL Affiliates in Yemen
In Yemen, ISIL affiliates have taken advantage of ongoing instability to attack mosques and nursing homes. In Saudi Arabia, ISIL has targeted security forces and civilians. “To address these offshoots, we are deepening our security cooperation with countries in the region,” Rice said. “When President Obama attends the U.S.-Gulf Cooperation Council Summit in Riyadh [Saudi Arabia] next week, ISIL will be at the top of our agenda.”
Peshmerga soldiers practice tactical movements and clearing a buildings
The United States is working with countries such as Mali, Somalia, Bangladesh, Indonesia and the Philippines, which are countries targeted by the terror group, Rice said. “With smart, sustained investments,” she added, “we have a chance to prevent ISIL from taking root in these disparate corners by assisting our partners in ways as varied as improving local law enforcement, promoting development and countering ISIL’s nefarious narrative.”
ISIL’s narrative is at the heart of dismantling ISIL’s global network, Rice said. The attacks in Paris highlighted the threat of ISIL fighters returning home, she noted. The United States sent “foreign-fighter surge teams” to work with allies as they implement long-term structural reforms to improve intelligence sharing and prevent future attacks, she said.
Homeland Defense
U.S. officials in the homeland are also working to strengthen aviation security and screening, and working with Interpol to share thousands of profiles of suspected fighters, Rice said. “Roughly 45 countries have established mechanisms to identify and flag terrorist travel to Iraq and Syria, and dozens of countries have arrested fighters or aspiring fighters,” she added. “Together with our partners, we’re slowing the flow of foreign terrorist fighters into and out of Iraq and Syria — including sealing almost all the border with Turkey.”
It remains a problem. Since 2011, nearly 40,000 foreign fighters have traveled to Syria from more than 120 countries. “We will continue to do everything in our power to prevent them from returning and launching attacks in our countries,” Rice said.
The United Nations has passed a resolution targeting ISIL’s abuse of the international financial system. The raid last year against Abu Sayyaf, ISIL’s finance chief, yielded a wealth of information on ISIL’s financial vulnerabilities: 7 terabytes of flash drives, CDs, papers and other data, she said. “That’s more than we got out of the bin Laden raid. And, we’re going to continue using that information and other tools to turn off the ISIL funding tap,” Rice said.
Hearts and Minds
The battle against ISIL is a battle for hearts and minds, Rice said. She quoted the president saying, “Ideologies are not defeated with guns; they’re defeated by better ideas.”
The United States is working to expose ISIL’s twisted interpretation of Islam and underscore that ISIL not only is not defending Muslims, but also is killing many innocent Muslims, Rice said. But the United States cannot deliver this message, she said. It has to come from Muslims.
U.S. officials are supporting partners across the globe, including in Saudi Arabia and Malaysia, to get this message across, the national security advisor said. She praised the State Department’s new Global Engagement Center for amplifying anti-ISIL voices internationally, from religious leaders to ISIL defectors.
“Week by week, these voices are eroding ISIL’s appeal,” Rice said. “A new poll shows that nearly 80 percent of young Muslims — from Saudi Arabia to Egypt to Tunisia — are now strongly opposed to ISIL.”
Addressing Conditions
But the president doesn’t want to defeat ISIL only to have another group pop up and take its place, Rice said. “To defeat ISIL’s ideology for good, however, we must acknowledge the conditions that help draw people to ISIL’s destructive message in the first place,” she said. “Around the world, countries and communities — including the United States — must continue working to offer a better, more compelling vision. We must demonstrate, as President Obama has said, that the future belongs to those who build, not those who destroy. Where ISIL offers horror, countries around the world must offer hope.”
White House Conversation
Finally, Rice said, it comes down to protecting the homeland. “We’ve hardened our defenses — strengthening borders, airports, ports and other critical infrastructure,” she said. “We’re better prepared against potential bioterrorism and cyberattacks.”
U.S. borders will remain strong, and counterterrorism experts will remain hyper-vigilant, the national security advisor said. “The enduring source of America’s strength, however, comes from upholding our core values — the same enduring values embodied in each one of you at this academy,” Rice said. “It is when people feel persecuted or disempowered that extremism can take hold, so our commitment to the dignity and equality of every human being must remain ironclad.
“In the face of ISIL’s barbarism,” she continued, “America must remain resilient and defiant in our freedom, our openness, and our incredible diversity.”
China’s Cyber Attack on Pentagon Missile Defense Daily
So, where are the strongly worded letters, the condemnation, the sanctions the counter-measures?
Cyber-warfare, industrial espionage, economic warfare.
November 2015:
WASHINGTON (Reuters) – The U.S. military on Sunday hailed the success of a complex $230 million test of the U.S. missile defense system that it said showed the ability of the Aegis and THAAD weapons systems to identify and destroy ballistic and cruise missiles at once.
The test was conducted near Wake Island in the western Pacific Ocean around 11:05 p.m. EDT by the U.S. Missile Defense Agency, U.S. European Command, U.S. Pacific Command, the Ballistic Missile Defense System Operational Test Agency and the Joint Functional Component Command for Integrated Missile Defense.
“This was a highly complex operational test of the BMDS which required all elements to work together in an integrated layered defense design to detect, track, discriminate, engage, and negate the ballistic missile threats,” MDA said in a statement released late Sunday.
The Missile Defense Agency website.
Admiral: China Launching Cyber Attacks on Missile Defense Nets ‘Every Day’
FreeBeacon: Chinese military hackers are conducting cyber attacks on the Pentagon’s Missile Defense Agency networks on a daily basis and will soon shift to hacking into networks of missile defense contractors, the admiral in charge of the agency told Congress on Thursday.
Vice Adm. James D. Syring, the MDA chief who is in charge of building multi-billion dollar anti-missile defenses, told a House hearing that while his networks are successfully fighting off the cyber attacks, missile defense contractors need to improve their network security.
The three-star admiral said the threat of Chinese cyber attacks was equal to North Korean and Iranian missile threats.
“I view the cyber threat that I specifically face with MDA and the systems we are fielding on par with any ballistic missile threat that either Iran or North Korea possess,” Syring said.
Asked by Rep. Mike Rogers (R., Ala.), the chairman of the House Armed Services subcommittee on strategic forces, if he is fighting off cyber attacks from Chinese military hackers, Syring answered: “Yes, sir.” He limited his comments and said he would provide details of the cyber threats during a later closed-door session of the subcommittee.
“We have taken inordinate steps to protect both our classified and unclassified networks from attack, [with] constant 24/7 monitoring with teams in place plus good material protections of those systems,” he said.
“My biggest concern remains in our cleared defense contractor base and their protections,” Syring added, noting that Chinese efforts to break into missile defense networks are relentless.
“They are continuing to try and attack my government networks, every day, classified and unclassified,” he said. “But where they’re going next and we’ve gotten examples of this is to my cleared defense contractors with the unclassified controlled technical information.”
Bolstering the network security of contractors is a high priority across the entire ballistic missile defense system, he said.
Foreign states are seeking to penetrate missile defenses and other weapons systems to steal technology and data for use in their own weapons. They also seek to disrupt or destroy the systems in the event of a crisis or conflict.
A report by the Defense Science Board warned in 2013 that critical U.S. weapons and other military systems are vulnerable to cyber attack.
“The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a ‘full spectrum’ adversary,” the report concluded.
Syring said in prepared testimony his agency is deploying upgraded command and control systems with better security against cyber attacks. Missile defense personnel also are being trained to prevent cyber intrusions.
“We know that malicious cyber actors are constantly attempting to exfiltrate information from U.S Industry,” Syring stated. “We will continue to work with the defense industrial base, the FBI, and other partners to identify these issues and raise the costs of this behavior to those responsible, in coordination with national authorities and in accordance with national policy.”
Syring said a key objective is hardening U.S. missiles defenses for future conflicts, which will likely involve cyber attacks against its networks.
“We must build resilient cyber defenses that are capable of detecting and mitigating threats without impeding operations in order to ‘fight through’ the cyber threat,” he said.
Two exercises simulating cyber attacks on missile defense networks were held last year. Another exercise is set for next month.
To prevent cyber attacks through equipment and parts, MDA is tightening the security of its suppliers.
“We also have a rigorous cyber and supply chain risk management inspection program to examine everything about our systems, from the truck to supply chain, to the fielded operational ability,” Syring said.
Chinese agents were detected spying on the U.S. missile defense interceptor base at Fort Greely, Alaska, several years ago, according to defense officials.
Barry Pike, executive officer for the U.S. Army’s missiles and space program, said during the House hearing that foreign military threats are growing with the emergence of synchronized air, missile, cyber, and electronic warfare attacks.
“Across all Army [air and missile defense] programs, we are improving our resilience and ability to mitigate cyber and electronic warfare attacks,” he stated in prepared testimony.
Rogers, the subcommittee chairman, said in opening remarks at the hearing that after eight years of President Obama’s administration “our nation’s security is in more jeopardy than any time in recent memory.”
“North Korea, Iran, Pakistan, Russia, and China are all advancing their ballistic and cruise missile programs, along with weapons of mass destruction programs, to put our military, our allies, and our homeland at risk,” Rogers said.
“At the same time, President Obama has cut missile defense practically every year he’s been in office,” he added. “America’s enemies know an opportunity when they see one; our allies see they are on their own.”
Disclosure of the Chinese hacking against missile defenses comes as Syring and other military leaders revealed the Pentagon is working on its own cyber weapons that could be used to disable or destroy missiles prior to launch.
Details about what the Pentagon calls “left-of-launch” measures remain classified but are said to include cyber attacks and other electronic warfare measures against missile launch controls and other information systems.
Pre-launch cyber attacks against missiles are designed to bolster other missile defenses, including lasers and anti-missile interceptors, that can attack enemy missiles in the early, middle, and late stages of flight, while decreasing costs.
China is developing both missile defenses and anti-satellite missiles that employ similar technologies and are known to be targeting U.S. and allied computer networks to steal technical information useful in developing its weapons.
China also has targeted U.S. and foreign suppliers that provide equipment and material used in missile defenses.
A briefing in 2014 by Joyce Corell, a senior U.S. counterintelligence official, identified numerous pathways used by foreign states to penetrate the U.S. supply chain.
“We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts,” she stated in a briefing slide.