Author Topic: Military Science, Military Issues, and the Nature of War  (Read 432038 times)

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 71378
    • View Profile
WSJ: The Future of Warfare is Electronic
« Reply #1400 on: September 05, 2024, 02:23:28 PM »


The Future of Warfare Is Electronic
An audacious Ukrainian incursion into Russia shows why. Is the Pentagon paying enough attention?
By Porter Smith and Nathan Mintz
Sept. 4, 2024 12:35 pm ET

The Ukrainian army has launched a stunning offensive into Kursk, Russia, under a shield of advanced electronic weapons. The war in Ukraine is demonstrating that 21st-century conflicts will be won or lost in the arena of electronic warfare.

Think of electronic warfare as casting spells on an invisible battlefield. Combatants strive to preserve their own signals, while disrupting those of the enemy. In Kursk, the Ukrainians took advantage of their technical knowledge to achieve a leap in battlefield tactics. Using a variety of electronic sensing systems, they managed to figure out the key Russian radio frequencies along the invasion route. They jammed these frequencies, creating a series of electronic bubbles that kept enemy drones away from Ukrainian forces, allowing reconnaissance units, tanks and mechanized infantry to breach the Russian border mostly undetected. This is the chaotic way of modern combat: a choreography of lightweight, unmanned systems driven by a spiderweb of electronic signals.

During visits to Ukraine over the past year, we observed the convergence of unmanned systems and electronic warfare, increasingly conducted by front-line troops. An island in the Dnipro River delta south of Mykolaiv is held by a contingent of Ukrainian special forces. These units would normally be supported by heavy artillery, attack aviation, and air-defense missiles, and resupplied by traditional maritime assets. Today, short on conventional resources but buoyed by Ukrainian tech entrepreneurs, they are pioneering the development and use of quadcopters and drone boats for resupply, reconnaissance, evacuation and amphibious assaults.

The Russians have so far been unable to dislodge these innovators but have begun using their own jammers to counter the waves of Ukrainian drone fleets supporting them, effectively creating a classic blockade. With the local electronic environment scrambled, Ukrainian drones have difficulty operating. If the Russians succeed, they could isolate the Ukrainian forces on the island. As these struggles reveal, the ultimate prize in modern warfare is spectrum dominance: ensuring one’s own control of drone networks while detecting and denying the adversary’s.

Connectivity has become as important to war as supply lines. Three decades of innovation have transformed cell phones from a luxury to some 15 billion internet-linked devices today. War zones are jam-packed with electronic brains. Unlike Cold War jets, tanks and ships, each system is primarily controlled by software and relies on the same connectivity found in doorbell security cameras, electric vehicles and consumer mobile apps. The value of a smartphone isn’t necessarily the aluminum rectangle in your hand, but the software it contains and the network to which it’s connected. This is also now true of military devices.

America has a reputation as a global innovator, yet it trails in the dark arts of electronic warfare. Improvised jamming systems and dozens of counter-drone systems have created a spectral environment that the U.S. military isn’t yet prepared to navigate. American drones and munitions frequently can’t overcome the jamming of their guidance systems. Yet we send them to Ukraine, where the Russians often scramble them before they reach their targets.

Our core jamming platforms, such as the EA-18G Growler and antiradiation missiles, are effective but expensive and difficult to build at speed and scale. Using a $1 million missile to destroy a $10,000 jammer and clear the way for a $1,000 drone is absurd. With our current platforms, it will be the norm.

The Ukrainians outside Mykolaiv solved their electronic-warfare woes, however temporarily, without seven-figure munitions. Their marines dangled direction-finding antennas inside PVC piping from a first-person view drone for rough triangulations of Russian jammers using tested, decades-old signals techniques, before using artillery to strike the locations. When we asked why a marine unit, which doesn’t typically specialize in electronic warfare, was running improvised hunter-killer missions on jamming sites, the Ukrainians reacted with surprise. Their electronic intelligence expert explained, “You can’t do anything in this war without first figuring out the jamming.”

A military that can’t build a dynamic electronic shield around its own forces will likewise be unable to maneuver in the coming drone wars. Modern electronic-warfare systems mounted on low-cost drones are now as necessary as munitions. New companies are in the early stages of building the right weapons but need the Pentagon to recognize the same future—and spend accordingly.

We aren’t the only ones watching Ukraine. China moves at the speed of war, while the U.S. moves at the speed of bureaucracy. If we retool our approach to electronic warfare, America will tip the scales in favor of deterrence and, if necessary, victory. If not, we will be subject to the harsh lessons inevitably faced by those who fight the last war.

Mr. Smith is a former U.S. Army attack aviator and officer of the 160th Special Operations Aviation Regiment. Mr. Mintz, an aerospace engineer, was founding CEO of the defense startups Epirus, Spartan Radar and now CX2.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 2832
    • View Profile
Defense Contractor Exports Sensitive Data to US Threat Countries ...
« Reply #1401 on: September 12, 2024, 06:12:10 AM »
... and imports perhaps inferior or compromised parts used in critical military systems and weaponry, recieving a pro-forma fine for it:

State Department Fines RTX While US Security is Compromised
Many of the Violations Happened at Rockwell Collins, now Collins Aerospace, an RTX company

STEPHEN BRYEN
SEP 11, 2024

The State Department has let RTX corporation off the hook on serious violations of US export control laws that resulted in the compromise of major US military systems.  The transactions involved China, Iran and Russia among others and procurement of important parts for defense systems from China.


The RTX chalet at the 2023 Paris Air Show shows off both the rebranded company name and its older Raytheon Technologies title. (Aaron Mehta/Breaking Defense)
Despite reporting more than 750 violations, RTX was fined $200 million, although the real fine is only half that amount. No other action was taken.  Apparently no referrals were made to the Department of Justice.  No estimate was made of damages to US security.  The fine is just a number pulled out of a hat and is, in fact, a meaningless action given the severity of the violations.  RTX revenues are around $69 billion annually.

According to the State Department, most of the violations happened in the Collins Aerospace division of RTX, but there also were export violations in other parts of RTX.


Officials from Collins Aerospace and CASC at the contract signing ceremony.
The State Department says that its response was not harsher because the company voluntarily disclosed the violations and cooperated with the State Department on strengthening export compliance.

The violations include Iran, Lebanon, Russia and China.  China was used as a parts subcontractor for US defense systems and received export controlled technical data and design information so they could manufacture components.

These transactions allowed Collins, now a division of RTX, to buy cheap and potentially inferior components from China.  Collins has operations in Shanghai and is partnered with China Aerospace Systems Corporation

The US has three systems for controlling US exports.  The State Department administers the Arms Export Control Act and publishes regulations known as the International Traffic in Arms regulations (ITAR).  Defense companies know that most of what they produce is covered under ITAR regulation.

The Commerce Department administers Export Administration Regulations and publishes regulations known as the Commodity Control List (CCL).  CCL covers includes national security, foreign policy, short-supply, nuclear non-proliferation, missile technology, chemical and biological weapons, regional stability, crime control, and terrorist concerns.

The Treasury Department administers various US export sanctions managed by the Office of Foreign Asset Controls.  The US has sanctions on Russia, China and Iran. All three countries also run aggressive spying operations against the United States including extensive cyber hacking, often described as an “advanced persistent threat.”

While the above three agencies administer the programs there is sometimes overlap and controversy over categories, and there are interagency mechanisms to sort them out.  In addition other agencies, most notably the Defense Department, the Department of Energy (especially for nuclear-related technology) and US Intelligence (mainly the CIA) participate in establishing technology controls, tracking adversaries, and adjudicating export license applications.

Collins Aerospace

Rockwell Collins was acquired by United Technologies Corporation (UTC) on November 27, 2018 for $30 billion and now operates as part of Collins Aerospace, a subsidiary of the RTX Corporation (formerly Raytheon Technologies). A significant part of the company's business is commercial aviation (but many of the same products are used in military aviation).  In terms of defense projects Rockwell Collins was involved with the Common Avionics Architecture System (CAAS), Joint Tactical Radio System (JTRS), Tactical Targeting Network Technology (TTNT), Defense Advanced GPS Receiver (DAGR), and Future Combat Systems. Importantly, Collins Aerospace, the successor division of RTX, specializes in integrated battlefield management.  As the company says, "With our long history of providing software-defined radios, gateway solutions and communication systems, we know what it will take to connect the battlespace. We’re bringing new technologies and capabilities to allied forces faster with innovative solutions that integrate legacy and new assets, open systems architecture, digital engineering and militarized commercial technologies."  Collins Aerospace has revenues of $26.2 billion.

According to the State Department, since 2020 there have been 27 voluntary disclosures concerning Collins Aerospace. "In at least two cases, such unauthorized exports resulted in the manufacture of thousands of defense articles (comprising approximately 45 distinct part numbers) in the PRC [China], importation of those defense articles into the United States, and the eventual integration of those defense articles into multiple U.S. and partner military platforms. In 16 cases, Respondent [Collins? or RTX?] or its foreign affiliates exported or reexported without authorization defense articles related to military aircraft and missile system programs..."  The State Department contends that most of these violations occurred before Rockwell Collins was acquired by UTC in 2018.

It is especially disturbing that the State Department took no action for four years after being informed about these violations that included purchases of Chinese products for US defense systems.  Was the US military informed about Chinese parts showing up in its military systems?  There is no information in the State Department report.

The State Department "Charging Document" also reveals that the US AWACS (Airborne Warning and Control System) was also compromised. "In two disclosures that Respondent initially submitted to the Department in 2021 and 2022, it disclosed unauthorized exports that occurred at Respondent’s facility in Cedar Rapids, Iowa, in the form of unauthorized releases of USML [US Munitions List, namely the ITAR] ... technical data related to the Boeing E-3 Sentry Airborne Early Warning and Control Aircraft and the Embraer KC-390 Millennium Medium Weight Transport Plane to a Chinese foreign-person employees (FPE)."  There is no comment why a Chinese citizen was employed by Collins Aerospace or any other follow up regarding other Chinese employees of the company.  Are these employees still in Cedar Rapids?

Collins, through its subsidiary in Shanghai, China also sought Chinese-company bids for an aluminum display housing components for the US stealth F-22 fighter bomber.  At least two Collins Chinese employees were involved. Collins also also "contemporaneously and separately exported without authorization the same technical data to four entities in the PRC."

In another disclosure in 2023 RTX reported that Collins "released certain circuit card assemblies" to PRC companies.  These are printed circuit boards that are covered under ITAR rules (e.g. specially designed for military use).  Collins claims they were inadvertently mis-classified as falling under Commerce Department Export Administration Act rules.  No information is given that the Commerce Department actually issued any license to Collins, so we are left with the impression that Collins treated the transaction as a commercial transaction not requiring an export license.  The Charging Document does not reveal what defense products were involved.

According to the Charging Document Rockwell Collins also sought printed wiring circuits (printed circuit boards) from China for the following US systems:

• VC-25 Presidential Transport Aircraft (Air Force One)

• A-10 Thunderbolt II Close Air Support Attack Aircraft

• B-1B Lancer Supersonic Strategic Heavy Bomber

• B-52 Stratofortress Strategic Bomber

• C-17 Globemaster III Strategic Airlifter

• C-130J Super Hercules Military Transport Aircraft

• CH-53 Super and King Stallion Cargo Helicopter

• F-15 Eagle Fighter Aircraft

• F-16 Fighting Falcon Fighter Aircraft

• F/A-18 Hornet Fighter Aircraft

• KC-46 Pegasus Tanker Aircraft

• KC-130 Tanker Aircraft

• KC-135 Stratotanker Tanker Aircraft

• MQ-4 Triton Surveillance Unmanned Aerial Vehicle (UAV)

• MQ-8 Fire Scout UAV Helicopter

• MQ-9 Reaper Combat UAV

• MQ-25 Stingray Refueling UAV

• P-8 Poseidon Maritime Patrol Aircraft

• U-2 Reconnaissance Aircraft

The Charging Document does not reveal information about the "wiring boards" beyond saying that Collins was trying to subcontract them to China.

The company also disclosed that it reexported and retransferred to 25 countries including China items (not otherwise described) that are parts of the following military systems:

• Aegis Ballistic Missile Defense System

• B-2 Spirit Bomber Aircraft

• F/A-18 E/F Super Hornet Fighter Aircraft

• F-15 Eagle Fighter Aircraft;

• F-16 Fighting Falcon Fighter Aircraft

• F-22 Raptor Fighter Aircraft

• F-35 Lightning II Fighter Aircraft

• National Advanced Surface-to-Air Missile System

• PATRIOT Air Defense System

• Phalanx Close-In Weapons System

• RIM-116 Rolling Airframe Missile

Iran and Russia

"In March 2019, an employee hand carried a company-issued laptop, which contained ITAR-controlled technical data, to Iran. The company detected the employee’s attempt to use the laptop to connect to the internet while in Iran and initiated a “freeze” in response, restricting access to the laptop’s hard drive.

Following the employee’s return to the United States, the company determined that the laptop contained USML Category...  technical data related to the B-2 Spirit Bomber Aircraft and F-22 Raptor Fighter Aircraft," according to the Charging Document.  The employee's name is not included, nor what division of the company employed this person.

Similarly, in 2021 an RTX employee traveled to St. Petersburg, Russia with a company issued laptop. Unlike the Iranian laptop which the company was able to "freeze," that did not happen in St. Petersburg, as the cyber team in RTX decided that the use of the laptop in St. Petersburg, Russia was a "false positive."  It isn't clear if this trip was for personal reasons but the Document says the employee made four personal trips to Russia to see his fiancé.  The laptop contained highly sensitive information. The laptop hosted 152 files that contained technical data "related to the F-15 Eagle Fighter Aircraft, F/A-18 Hornet Fighter Aircraft, the F-22 Raptor Fighter Aircraft, the F-35 Lightning II Fighter Aircraft, and the U-2 Reconnaissance Aircraft."

It is well known that the Russians and the Iranians have extensive cyber-hacking capabilities.

Conclusion

RTX was fined $200 million, but the State Department allowed that half that amount could be used by the company for export compliance.  One hundred million dollars for export compliance does not make any sense, since a few million invested in compliance would be more than enough, even in a large company.  We can thus conclude that the actual fine is $100 million and the $200 million figure is just for public relations purposes.

No effort was made to determine the actual cost to the US in compromised security systems or in illegal Chinese products stuffed into US weapons.

The fact that the State Department has been sitting on this information for years is greatly disturbing. 

The lack of prosecutions and punishments is equally problematic. No one is being held accountable.

Nor do we know if the voluntary disclosures actually cover what happened, since there is not a shred of evidence that the State Department investigated any of the disclosures to see if they truly reflected what took place.

The bottom line is that the enforcement agencies really did as little as possible to protect American security interests.

https://weapons.substack.com/p/state-department-fines-rtx-while?r=1qo1e&utm_campaign=post&utm_medium=email&triedRedirect=true


ccp

  • Power User
  • ***
  • Posts: 19322
    • View Profile
Jersey girl - good foddor for a porno movie
« Reply #1403 on: September 16, 2024, 06:47:54 AM »
armed with sea to air missiles, torpedos, and stealth

nicknamed "Jersey Girl"  it includes condoms, birth control medicines and plenty of azithromycin and doxycycline and even ceftriaxone just in case they come against an enemy  third generation  - gonorrhea  .

but we are safe!   :wink:


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 71378
    • View Profile
Today's epiisode in The Evolution of War
« Reply #1405 on: September 18, 2024, 07:56:15 AM »
Hezbollah: Behind the Headlines
Israel infiltrates with exploding pagers, but against what target?
Robert W Malone MD, MS
Sep 18

Hezbollah exploding pager trail runs from Taiwan to Hungary
12 killed, 3,000 wounded in unprecedented security breach

Hezbollah ordered pages months ago; vows retaliation

Pagers made by Europe firm BAC, Taiwan-based firm says

Devices modified by Israel at production, Lebanon security sources say

Israel makes not comment

A new phase of the war between Israel and Hezbollah has begun, another ethical boundary has been breached, and a wide variety of state and non-state actors will now adopt and adapt this strategy. This new battlefront involves personal electronic devices and the integration of triggered explosives into those devices. In the current embodiment, these devices were deployed using non-specific personnel targeting. However, it seems likely that future deployment will involve both non-specific and individually targeted exploding devices. The implications for public transportation (including air transport) and crowded environments are self-evident. Beyond the damage done to an individual, the potential of this strategy to evoke terror, existential fear, and a variety of forms of disruption is immense. To illustrate the point, remember that psychological bioterror strategies and events are associated with 100 to 1000 times the economic and societal damage related to a bioterror agent's actual, physical deployment. In this current example, current reports indicate something in the range of 10 - 20 direct deaths attributable to exploding personal electronic devices and up to 3,000 wounded. However, the indirect psychological effects will be far more damaging. And this is undoubtedly what was intended. Not only Hezbollah fighters, but virtually the whole world now must be alert and actively mitigating the possibility that their personal electronic devices may incorporate explosives capable of killing or maiming them. Of course, this will include pagers, laptops, cell phones, and all other electronic devices.

Please remember that we are rapidly approaching an age of General artificial intelligence, drones, and robot warriors. The lithium batteries that most personal electronic devices employ are notorious for exploding or otherwise burning. It seems highly likely that there will be many variations and derivatives of this strategy. In a sense, this is an extension and escalation of the “Improvised Explosive Device” (IED) tactic that has been so successfully deployed in Afghanistan and throughout the Middle East by insurgent and resistance cells.

The potential economic impacts should not be overlooked, particularly for personal electronic device markets. This will inevitably lead to the need for some packaging and validation solutions to reassure consumers that a purchased device is certified and free of explosive risk, as well as new screening and monitoring processes for air travel. The implications are profound, and I doubt that the Mossad or whatever organization is responsible for this has fully considered the blowback.

Returning to the Reuters wrap-up summary:

BEIRUT, Sept 18 (Reuters) - A Taiwanese pager maker denied on Wednesday that it had produced devices that wounded thousands of Hezbollah operatives in Lebanon when they exploded, an audacious attack that raised the prospect of a full-scale war between the Iran-backed group and arch-foe Israel.

Gold Apollo said the devices were made by under license by a company called BAC, based in Hungary's capital Budapest.

Israel's spy agency Mossad, which has a long history of pulling off sophisticated attacks on foreign soil, planted explosives inside pagers imported by Hezbollah months before Tuesday's detonations, a senior Lebanese security source and another source told Reuters.

The death toll rose to 12, including two children, Lebanese Health Minister Firass Abiad said on Wednesday. The attack wounded nearly 3,000 people, including many of the group's fighters and Iran's envoy to Beirut.

Iran-backed Hezbollah has vowed to retaliate against Israel, whose military declined to comment on the blasts. The two sides have been engaged in cross-border warfare since the Gaza conflict erupted last October, fueling fears of a wider Middle East conflict that could drag in the United States and Iran.

Jordan's Foreign Minister Ayman Safadi accused Israel of pushing the Middle East to the brink of a regional war by orchestrating a dangerous escalation on many fronts.

"Hezbollah wants to avoid an all-out war. It still wants to avoid one. But given the scale, the impact on families, on civilians, there will be pressure for a stronger response," said Mohanad Hage Ali of the Carnegie Middle East Center.

Hezbollah, Iran's most powerful proxy in the Middle East, said in a statement it would continue to support Hamas in Gaza and Israel should await a response to the pager "massacre" which left fighters and others bloodied, hospitalized, or dead.

One Hezbollah official said the detonation was the group's "biggest security breach" in its history.

Footage from hospitals reviewed by Reuters showed men with various injuries, some to the face, some with missing fingers, and gaping wounds at the hip where the pagers were likely worn.

The plot appears to have been many months in the making, several sources told Reuters. It followed a series of assassinations of Hezbollah and Hamas commanders and leaders blamed on Israel since the start of the Gaza war.

TRAIL LEADS TO BUDAPEST

The senior Lebanese security source said the group had ordered 5,000 pagers from Gold Apollo, which several sources say were brought into the country earlier this year.

Gold Apollo founder Hsu Ching-Kuang said the pagers used in the explosion were made by a company in Europe that Gold Apollo named in a statement as BAC.

"The product was not ours. It was only that it had our brand on it," Hsu told reporters at the company's offices in the northern Taiwanese city of New Taipei on Wednesday.

The stated address for BAC Consulting in Hungary's capital Budapest was a peach building on a mostly residential street in an outer suburb. The company name was posted on the glass door on an A4 sheet.

A person at the building who asked not to be named said BAC Consulting was registered there but did not have a physical presence. The CEO of BAC Consulting, Cristiana Barsony-Arcidiacono, says on her LinkedIn profile that she has worked as an adviser for various organizations, including UNESCO. She did not respond to emails from Reuters.

BAC's registered activities are wide-ranging, from computer game publishing to IT consulting to crude oil extraction.

The senior Lebanese security source identified a photograph of the model of the pager, an AR-924. Hezbollah fighters have been using pagers as a low-tech means of communication in an attempt to evade Israeli location-tracking.

Gold Apollo AR924 Rugged Pager


The senior Lebanese source said the devices had been modified by Israel's spy service "at the production level." Israeli officials did not immediately respond to Reuters requests for comment.

"The Mossad injected a board inside of the device that has explosive material that receives a code. It's very hard to detect it through any means," the source said.

The source said about 3,000 of the pagers exploded when a coded message was sent to them, simultaneously activating the explosives.

Another security source told Reuters that up to three grams of explosives were hidden in the new pagers and had gone "undetected" by Hezbollah for months.
« Last Edit: September 18, 2024, 12:33:21 PM by Crafty_Dog »

Body-by-Guinness

  • Power User
  • ***
  • Posts: 2832
    • View Profile
Re: Today's epiisode in The Evoluion of War
« Reply #1406 on: September 18, 2024, 08:45:28 AM »

Hezbollah: Behind the Headlines
Israel infiltrates with exploding pagers, but against what target?
Robert W Malone MD, MS
Sep 18

Hezbollah exploding pager trail runs from Taiwan to Hungary
12 killed, 3,000 wounded in unprecedented security breach

Hezbollah ordered pages months ago; vows retaliation

Pagers made by Europe firm BAC, Taiwan-based firm says

Devices modified by Israel at production, Lebanon security sources say

Israel makes not comment


I will note this Rubicon was long ago crossed by the US, China, and others where insertion of passive spyware etc. was concerned, and indeed the high speed uranium enrichers (bet that phrase will attact NSA attention) that rotated themselves into high speed oblivion were a result of stuxnet insertion. In short, not quite the Brave New World the above indicates....