Affichage des articles dont le libellé est F-35. Afficher tous les articles
Affichage des articles dont le libellé est F-35. Afficher tous les articles

vendredi 15 mars 2019

Tech Quisling: Google’s work in China benefits Beijing’s military

  • America’s top two defense officials slammed Google’s work with China, saying it has benefited Beijing’s military.
  • Marine Corps Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff: “We watch with great concern when industry partners work in China knowing that there is that benefit.” 
  • The latest revelation comes as the U.S. trade battle with China marches on, with intellectual property theft proving to be a major sticking point between the enemies.
By Amanda Macias

Acting U.S. Secretary of Defense Patrick M. Shanahan and Marine Corps Gen. Joe Dunford, chairman of the Joint Chiefs of Staff, give testimony on the Department of Defense budget posture in review of the Defense Authorization Request for Fiscal Year 2020 and the Future Years Defense Program at the Dirksen Senate Office Building, March 14, 2019.

WASHINGTON — America’s top two defense officials slammed Google’s work with China on Thursday saying it has “indirectly benefited” Beijing’s military.
“We watch with great concern when industry partners work in China knowing that there is that indirect benefit,” Marine Corps Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, told members of the Senate Armed Services Committee hearing.
“The work that Google is doing in China is indirectly benefiting the Chinese military,” Dunford said. “The way I describe it to industry partners is, ‘look we’re the good guys and the values that we represent and the system we represent is the one that will allow and has allowed you to thrive,’” he said.
Dunford’s comments come in the wake of the tech giant’s decision not to pursue some of the Pentagon’s lucrative contracts while considering projects in China.
In October, Google said it would no longer compete for the Pentagon’s Joint Enterprise Defense Infrastructure, or JEDI, cloud computing contract, an award that could be worth $10 billion. Google said that the contract may conflict with its corporate values.
In addition, the company also said it would not renew a Pentagon contract that analyzed aerial drone imagery for the military.
Meanwhile, it was revealed last year that the tech giant was studying the idea of working with the Chinese government on “Project Dragonfly,” a censored search engine that would block certain sites and search terms. 
More recently, after pushback from politicians and activists, Google said it had dropped those plans.
But Google Chief Executive Sundar Pichai has said the company will continue to invest in China while also considering projects with the U.S. government.
Acting Secretary of Defense Patrick Shanahan, also speaking before the Senate committee, echoed concerns that China has gamed American innovation.
”$5 trillion of their [China’s] economy is state-owned enterprises. So the technology that has developed in the civil world transfers to the military world, it’s a direct pipeline. Not only is there a transfer, there is systemic theft of U.S. technology that facilitates even faster development of emerging technology,” he said.
“The talent is in this country, we need to use the talent in this country and the talent in this country needs to support our great power competition,” Shanahan added.
The criticism comes as the U.S. trade battle with China marches on, with intellectual property theft proving to be a major sticking point between the world’s two largest economies.
U.S. officials have long complained that intellectual property theft has cost the economy billions of dollars in revenue, thousands of jobs and threatens national security.
“If China successfully captures these emerging industries of the future, America will have no economic future and its national security will be severely compromised,” White House trade advisor Peter Navarro said in June.
For the Pentagon, there is no better example of Navarro’s comments than the most expensive U.S. weapons system: the F-35 Joint Strike Fighter.

Lockheed Martin’s F-35 Lightning II fighter jet 

On Oct. 26, 2001, the Pentagon awarded Lockheed Martin a contract worth more than $200 billion to build the next-generation stealth strike fighter.
As America’s next fighter jet came to life, some of its sensitive design and electronics data were compromised in 2009.
Chinese hackers were behind the cyberintrusion since its stealth Shenyang J-31 jet bears a remarkably striking resemblance to the F-35.
And before the J-31 mimicked the F-35, there was the curious case of the J-20 and the F-22.
In another instance of industrial espionage, the prototypes of China’s Chengdu J-20 stealth fighter jet looked suspiciously similar to the sleek design of Lockheed’s F-22 Raptor.
While the U.S.-made Lockheed Martin jets are believed to have better computer software, more sophisticated sensors and sensitive stealth coating, the theft of intellectual property gives adversaries the opportunity to avoid the expense and delays involved with research and development.
Last March, President Donald Trump signed an executive memorandum that penalized China for trade practices such as industrial espionage.
The measures impose retaliatory tariffs on about $60 billion in Chinese imports.
On hand for the signing was Lockheed Martin CEO Marillyn Hewson, who oversees the F-35 Joint Strike Fighter.
Hewson said intellectual property is the “lifeblood” of the defense industry and welcomed the action taken by the Trump administration.
“This is a very important moment for our country, in that we are addressing a critical area for the aerospace and defense industry and that is protecting our intellectual property,” she said.
Meanwhile, on Wednesday, President Donald Trump said he was in no hurry to come to a trade deal with China and gave no indication of when he would meet with Chinese dictator Xi Jinping.
“I’m in no rush. I want the deal to be right ... I am not in a rush whatsoever. It’s got to be the right deal. It’s got to be a good deal for us and if it’s not, we’re not going to make that deal,” Trump told reporters at the White House.
Trump decided in February that he would not increase tariffs on Chinese goods at the beginning of March.

jeudi 7 mars 2019

China Threat

The message to China behind Singapore's US F-35 jet plan
By Brad Lendon

Hong Kong -- They are at the cutting-edge of America's elite stealth jet technology, capable of seamlessly connecting pilots for co-ordinated missions.
And now Singapore wants to become the fourth country to enmesh US F-35 warplanes above and around the South China Sea -- a move likely to be greeted with trepidation in Beijing.
In a speech before Parliament last week, Singaporean Defense Minister Ng Eng Hen announced a plan to buy up to 12 F-35 warplanes from the US.
If the deal goes through, Singapore will become the fourth American ally in the Pacific to own them.
The purchase would require US congressional approval, but Ng said that both the Trump administration and the Pentagon favored the deal.

A US Marine Corps F-35B flies above the East China Sea, Oct. 23, 2018.

"Next Gen Singapore Armed Forces will be more lethal in all domains," read a graphic shown to legislators during the defense minister's presentation.
It showed dozens of pieces of military hardware Singapore plans to have in its arsenal by 2030 as it ramps up its defense capabilities.
The US stealth fighters are the crown jewel on the list.
The Pentagon touts the F-35, with the world's most advanced avionics, engines and weaponry, as the "the most affordable, lethal, supportable and survivable aircraft ever to be used."

Regional stability
Singapore sits on the western approaches to the South China Sea.
Analysts say the country's decision to acquire F-35 technology is indicative of growing concerns within Asia regarding China's regional ambitions.
"Singapore probably does not trust China's assurances that its South China Sea claims are benign, without military intentions and will not result in China taking control of air and sea commerce," said Carl Schuster, a former director of operations at the US Pacific Command's Joint Intelligence Center.
China has claimed almost the entire 1.3-million-square-mile South China Sea as its sovereign territory.
It has aggressively asserted its stake in recent years in the face of conflicting claims from several Southeast Asian nations, building up and fortifying islands in the Spratly and Paracel chains.
The US has steadfastly contested those claims, sending warships on freedom of navigation operations near the islands and regularly flying reconnaissance -- and sometimes bomber -- flights over the South China Sea.
When it acquires the F-35s, Singapore will join US allies Australia, Japan and South Korea in operating the jets in the Pacific.
The US also has F-35s based in Japan, and they can operate off US Navy ships moving through the region.
Even the United Kingdom said earlier this year it would send an aircraft carrier with F-35s into the region in 2020.
US officials have previously dismissed the idea they are pursuing a cold war or containment policy in regards to China in the Pacific, but Singapore's decision to join the list of F-35 capable countries risks strengthening that divide between the US and China.
"Beijing should see in this development evidence that there remains strong demand in the Asia-Pacific region for a US presence," said Timothy Heath, senior defense analyst at the RAND Corp.
"The network of air forces that employ the F-35 expands the possibility that these militaries could work together in a coalition if necessary. This development can provide a robust deterrence message to China regarding its behavior in the South and East China seas," Heath said.

Coordination among allies
The F-35's advanced electronic warfare suite can allow seamless integration among allied users and that could be cause for concern in Beijing.

A new F-35B fighter jet is prepped for take off from the deck of the United Kingdom's aircraft carrier HMS Queen Elizabeth in 2018. The jet's electronics enable close coordination between allied air forces.

Peter Layton, defense analyst at the Griffith Asia Institute in Australia, says the F-35's stealth and electronic warfare capabilities make it a "force multiplier."
F-35s are able to sneak past air defenses and send detailed targeting information to trailing planes carrying long-range missiles or to land-based anti-ship missile systems, he added.
"The acquisition may spur China to think about how it can improve its air defense network in the South China Sea and on ships to detect and target stealth aircraft such as Singapore's F-35," said Layton.
Previous F-35 purchases from US allies have prompted bravado from Chinese media.
A January report in the state-sponsored Global Times brushed away any threat from "the US F-35 friends circle" in the Asia-Pacific, with Chinese analysts saying the F-35 was no match for China's fifth-generation stealth jet, the J-20.
Yet even though the F-35 procurement sends strong signals to China, analysts agree that Singapore is sending them carefully.
Defense Minister Ng did not mention China when revealing purchase plans last week.
His presentation to Parliament said only that the jets "will significantly contribute to the (air force's) ability to safeguard Singapore's sovereignty and security."
He also said the country was being deliberate in how it acquired them, buying four with its first order and then adding up to eight others if the first batch fit requirements.

Singapore Air Force F-15SGs fighter aircraft flay as part of the National Day Parade in 2018. The jets would work in concert with the county's F-35s in the future.

'Low-key player'
The F-35s would eventually work in concert with Singapore's US-built F-15s when they replace the country's F-16s, which will be obsolete in a decade, the defense minister said.

Two Singaporean F-16s fly in formation with an F-15 in 2017. The country's defense minister says the F-16s will be obsolete by 2030.

While Singapore has been a close and longtime US ally -- it even hosts a US Navy facility -- it tends to be a low-key player in military matters.
"Despite good relations with the United States, Singapore generally remains reluctant to take a leadership role in challenging Chinese power due to its small size and depth of economic ties with China," Heath said.
Schuster added: "Singapore does not want to anger China... Singapore tends to act quietly and with nuance and subtlety."
However, the subtle approach should not be mistaken for military weakness.
Australia's Lowy Institute ranked Singapore's military power 10th among 25 Asian nations last year -- just behind Australia and ahead of larger countries like Vietnam, Indonesia and Malaysia.
Singapore boasts quality military hardware and strong defense relationships in the region.
"Singapore sees its role as a facilitator of regional security and stability, not as a member of any alliance directed at any particular nation," said Schuster.

vendredi 12 octobre 2018

HOW THE US FORCED CHINA TO TEMPORARILY QUIT STEALING—USING A CHINESE SPY

For years, China has systematically looted American trade secrets. Here's the messy inside story of how DC got Beijing to clean up its act for a while.
By Garrett M. Graff
Chinese spy Su Bin

KEVIN AND JULIA Garratt had spent nearly all of their adult lives in China.
A devout Christian couple in their fifties with an entrepreneurial streak, they operated a café called Peter’s Coffee House, a popular destination in the city of Dandong, according to Trip­Advisor.
Dandong is a sprawling border town that sits just across the Yalu River from North Korea. 
For tourists and expats, the Garratts’ coffee shop—just a short walk from the Sino-­Korean Friendship Bridge—was a hub of Western conversation and comfort food. 
“After time in North Korea a decent cup of coffee was one of those things I was really looking forward to,” one Australian tourist wrote in early 2014. 
“Peter’s was a perfect place.”
The Garratts had come to China from Canada in the 1980s as English teachers. 
They lived in six different Chinese cities over the years, raising four children along the way, before settling in Dandong. 
From their perch near the border, they helped provide aid and food to North Korea, supporting an orphanage there and doing volunteer work around Dandong itself. 
The Garratts had a strong social network in the city, so it didn’t seem odd to either of them when they were invited out to dinner by Chinese acquaintances of a friend who wanted advice on how their daughter could apply to college in Canada.
The meal itself, on August 4, 2014, was formal but not unusual. 
After dinner, the Garratts got into an elevator that took them from the restaurant down to a lobby. 
The doors opened onto a swarm of bright lights and people with video cameras. 
The Garratts initially thought they’d stumbled into a party of some kind, maybe a wedding. 
But then some men grabbed the couple, separated them, and hustled them toward waiting cars. Everything happened fast, and very little made sense. 
As the vehicles pulled away, neither Kevin nor Julia had any idea that it was the last they’d see of one another for three months.
It wasn’t until the two arrived at a police facility that they each realized they were in real trouble. 
And it wasn’t until much later still that the couple would understand why they had been taken into custody. 
After all, before their detainment, they’d never even heard of a Chinese expat living in Canada named Su Bin.

WHEN THE GARRATTS first arrived in China, in 1984, the country was still transitioning away from collective farms.
Shanghai had only just opened up to foreign investment; the future megacity Shenzhen still had just a few hundred thousand inhabitants.
Over the ensuing three decades, the couple would watch as China hurtled from eighth-largest economy in the world to second-largest, powered, famously, by mass migrations of people into new industrial cities and the erection of a vast manufacturing and export sector.
But especially in the later years of the Garratts’ career as expats, the country’s growth was also propelled by a more invisible force: a truly epic amount of cheating.
China has become one of the world’s most advanced economies overnight through the rampant, state-sponsored theft of intellectual property from other countries. 
This extended campaign of commercial espionage has raided every highly developed economy. (British inventor James Dyson has complained publicly about Chinese theft of designs for his eponymous high-end vacuums.)
But far and away its biggest targets have been the trade and military secrets of the United States. From US companies, Chinese hackers and spies have purloined everything from details of wind turbines and solar panels to computer chips and even DuPont’s patented formula for the color white. 
When American companies have sued Chinese firms for copyright infringement, Chinese hackers have turned around and broken into their law firms’ computer systems to steal details about the plaintiffs’ legal strategy.
Each theft has allowed Chinese companies to bypass untold years of precious time and R&D, effectively dropping them into the marathon of global competition at the 20th mile. 
China’s military has gotten a leg up too.
Coordinated campaigns by China’s Ministry of State Security and the People’s Liberation Army have helped steal the design details of countless pieces of American military hardware, from fighter jets to ground vehicles to robots. 
In 2012, National Security Agency director Keith Alexander called it the “greatest transfer of wealth in history,” a phrase he has regularly repeated since.
And yet, despite a great deal of restlessness in the ranks of law enforcement and intelligence agencies, the United States was, for years, all but paralyzed in its response to Chinese hacking.
China simply denied any hand in the thefts, professing to take great umbrage at the idea.
American diplomats were skittish about upsetting a sensitive bilateral relationship. 
And American companies, in turn, were often inclined to play dumb and look the other way: Even as they were being robbed silly, they didn’t want to jeopardize their access to China’s nearly 1.4 billion consumers.
John Carlin, who served as assistant attorney general for national security during the Obama administration, recalls one meeting with executives from a West Coast company whose intellectual property was being stolen by Chinese hackers.
The executives even projected that, in seven or eight years, the stolen IP would kill their business model; by that point, a Chinese competitor would be able to undercut them completely with a copycat product.
But the company’s general counsel still didn’t want the government to step in and take action.
“We are going to be coming back to you and complaining,” the general counsel said.
“But we’re not there yet.”
Finally, between 2011 and 2013, the US began to reach a breaking point.
Private cybersecurity firms released a string of damning investigative reports on China’s patterns of economic espionage; the US government started to talk more publicly about bringing charges against the country’s hackers.
But it was far from clear how any government or company might successfully turn back the tide of Chinese incursions.
Obama pressed the issue of cyberthefts in his first meeting with Xi Jinping in 2013, only to be met with more denials.
This is the story of how the US finally achieved some leverage over China to bring a stop to more than a decade of rampant cybertheft, how a Canadian couple became bargaining chips in China’s desperate countermove, and how the game ended happily—only to start up again in recent months with more rancor and new players.

ON MONDAY, MAY 19, 2014, nearly three months before the Garratts were whisked away into the Dandong night, the US Justice Department called a press conference at its headquarters in Washington, DC.
Attorney general Eric Holder took the podium to announce charges against five hackers for breaking into the systems of several US companies, including U.S. Steel, Westinghouse, and a renewable-energy outfit called SolarWorld.
The FBI had mocked up a bunch of “Wanted” posters, which made it strikingly clear that the hackers all shared an employer: the Chinese army.
Two of the men were even pictured in their crisp dress uniforms.
The press conference marked the first time the US had ever indicted individual foreign agents for cyber intrusions.
It made front-page headlines across the country, instantly bumping the issue of Chinese economic espionage off the back burner of public consciousness.
But the news came with an inevitable caveat: “The move by the Justice Department was almost certainly symbolic,” The New York Times wrote, “since there is virtually no chance that the Chinese would turn over the five People’s Liberation Army members named in the indictment.”
A few days later, Carlin and a Justice Department prosecutor named Adam Hickey were flying back from a meeting with the victims of the PLA hackers.
At the Pittsburgh airport, Carlin lamented the obvious: None of the hackers would face a US courtroom anytime soon.
Everyone at the Justice Department knew it would take more than a single “name and shame” campaign to change the calculus of Chinese behavior; the US needed to apply pressure on multiple fronts, perhaps building up to a threat of sanctions.
Now that they’d made their opening gambit, prosecutors needed a next move, preferably one that would actually put someone in handcuffs.
Sitting in the terminal Carlin said, “The next case, we need a body.”
Hickey smiled. “Actually, I’ve got a case I want to talk to you about,” he said.

Kevin and Julia Garratt

THE FBI REMAINS cagey today about where and how the conspirators first appeared on the agency’s radar.
The bureau will say only that it opened its investigation after seeing emails between them.
Reading between the lines, the case likely began with intercepts from the NSA, passed through the intelligence community from Fort Meade to the FBI.
Eventually, in late summer 2012, a trove of emails between three Chinese agents landed on the desk of supervisory special agent Justin Vallese, who runs a squad of cyber agents in the FBI’s Los Angeles field office.
“From day one, we knew it was bad,” Vallese says.
“The contents of those emails are pretty explosive.”
One message, which bore an attachment entitled “C-17 Project Reconnaissance Summary,” appeared to suggest a broad outline of the project therein: a successful, long-term effort by hackers to steal the design secrets of one of America’s most advanced cargo aircraft, the C-17 military transport.
A $202 million-per-unit craft developed by Boeing, the C-17 had been one of the most expensive military planes ever developed by the US Air Force, costing more than $31 billion to create in the 1980s and ’90s.
Since its completion, the C-17 had become a key means of delivering troops, vehicles, and supplies to the front lines of the wars in Afghanistan and Iraq, as well as delivering humanitarian supplies the world over.
It’s also used to transport the president’s armored limousines around the globe.
American intelligence agencies knew that, for years, the Chinese had been struggling to build their own large cargo plane, a necessary tool for any modern military that wants to project its power over a large area.
Now Beijing was evidently making some headway—by raiding Boeing’s trade secrets to build what was essentially a Chinese version of the C-17.
Right away, the FBI alerted Boeing to the intrusions. (Boeing declined to comment on this story.) After that, agents in Los Angeles began wading through encrypted attachments and translating each message from Chinese.
The emails would ultimately give them an incredibly detailed picture of the inner workings of a Chinese espionage operation.
Not only that, they realized, it might also give them a chance to actually arrest someone.
Two of the conspirators—the ones who did the actual hacking—were out of reach in China.
But the third was a successful businessman named Su Bin, and he was based right here in North America, just a three-hour flight from the agents’ offices in LA.
Su, who in the West went by Stephen, owned an 80-employee Chinese aviation-technology firm called Lode-Tech and, according to The Globe and Mail, had a comfortable $2 million house in Richmond, British Columbia.
He had two kids, both born in Canada; his wife had been a gynecologist, and his oldest son went to college in Switzerland.
In 2012, he was interviewed by The Wall Street Journal as part of a story about wealthy Chinese decamping for the West.
He said he was the son of an army officer and that he had made millions as an aerospace entrepreneur.
He told the Journal that he found the rules of the West less restrictive.
“Regulations [in China] mean that businessmen have to do a lot of illegal things,” Su said at the time.
From what the agents could reconstruct, the hacking conspiracy had begun as early as 2009. 
Su’s contributions as a spy, the agents realized, were intimately tied to his work as an entrepreneur. 
“Su Bin was what we’d call in the traditional espionage world a spotter—someone who would tee up targets for a nation-state,” explains Luke Dembosky, one of the prosecutors overseeing the case.
Through Lode-Tech, Su had a deep network of industry contacts, and his team’s espionage began with mining his knowledge of the field: He would direct his hacker colleagues toward particularly interesting engineers and corporate personnel in the aerospace industry. 
Then the hackers likely used basic techniques—standard phishing emails—to attempt to penetrate company executives’ email accounts and, from there, access restricted corporate networks.
According to court records, once the hackers got inside a network—through “painstaking labor and slow groping,” as they put it—they went back to Su Bin. 
They would send him lists of the files they’d uncovered; he would then highlight in yellow the most valuable documents that they should exfiltrate, guiding them through what they were uncovering. (Investigators came to enjoy the secret irony in Lode-Tech’s tagline, printed in big letters on its website: “We will track the world’s aviation advanced technology.”)
It was tedious work.
Some of the file directories ran to thousands of pages; in one dump of nearly 1,500 pages, Su meticulously highlighted 142 files that seemed most likely to be useful to his Chinese Army contacts—files with names like C17Hangar Requirements 112399.pdf and Critical Safety Item(CSI) Report_Sep2006.pdf.
In another 6,000-page ­directory, he picked out the 22 most promising file folders—hitting on one that FBI agents later calculated contained more than 2,000 files related to the C-17.

ALL TOLD, ACCORDING to their own accounting, Su and his two Chinese partners stole 630,000 files related to the C-17, totaling about 65 GB of data. 
“We safely, smoothly accomplished the entrusted mission in one year, making important contributions to our national defense scientific research development and receiving unanimous favorable comments,” the team wrote.
The C-17 wasn’t the hacker’s only target; they filched information about other aircraft as well. Investigators believe they pillaged 220 MB of data related to the F-22 Raptor, as well as files related to the F-35, including its flight test protocols, which Su carefully translated into Chinese. 
The thefts would be critical to helping the Chinese understand—and copy—the world’s most advanced multirole fighter plane, which had cost $11 billion to develop.
The more they dug, the more the agents realized what a uniquely valuable conspirator Su Bin was, perhaps even sui generis as a spy. 
He was conversant with the aerospace community, and he spoke English, Chinese, and the technical jargon of aviation in both languages, able to translate the complex world of industrial design schematics, plans, and handbooks.
“I don’t know how many Su Bins there are,” Vallese says.
Su’s hacking effort provided a staggering return on investment for the Chinese government: According to court documents, the operation cost China around $1 million—an absolute pittance compared to the decades of engineering knowledge, military technology, and construction details that Su and his team were able to steal from Boeing and the US Air Force. 
The team’s overseers ran such a tight ship that Su griped in an email about the difficulty of getting ­reimbursed for expenses.
According to court documents, the hackers covered their tracks by pinballing stolen files through a sophisticated international server network, with machines planted in the US, Singapore, and Korea. 
They carefully disguised documents as they stole them, so as to circumvent the internal intrusion alarms at Boeing.
Then they were careful to move their digital contraband through at least three foreign countries, ensuring that at least one had unfriendly relations with the United States, to throw pursuers off China’s scent.
Ultimately, the files would be deposited on machines near Hong Kong and Macau.
There, officials would pick them up and transfer them back to China—in person, further covering all tracks between the United States and China.
But the evidence the FBI had collected left no doubt that the ultimate customer was the Chinese military—and that Su Bin’s partners were members of the military themselves. 
While the two hackers in China have not been charged publicly, the US government knows who they are; according to court records, investigators intercepted an email that one of the hackers had received with a copy of his own ID card, which included his photo, name, and date of birth.
Similarly, emails the FBI traced to the other hacker, one with the subject line “boss,” included photos of both men in Chinese military uniforms.
By late spring 2014, around the time Carlin was sitting in the Pittsburgh airport with Hickey, the FBI had assembled everything it needed to make a case against Su Bin; as it happened, the timing coincided with the Justice Department’s newfound desire to charge someone with Chinese espionage. “We were fortunate to get Su into a place where there was an interest and an appetite for an arrest,” Vallese says.
“We had the right subject and had the ability to put hands on him.”
To actually arrest Su, the FBI needed the cooperation of Canadian authorities.
Once again, timing may have worked in the case’s favor.
Around the same time when the FBI was asking for the Royal Canadian Mounted Police’s help in detaining Su Bin, according to The Globe and Mail, Canada was responding to a massive attack by state-sponsored Chinese hackers who had penetrated the network of its National Research Council, which leads the country’s research and development efforts.
Given the chance to help break up a Chinese hacking ring, authorities north of the border were perhaps unusually motivated to help.
In any case, they said yes.
By June 2014, the investigative teams knew that Su Bin was planning to leave the country for China—though no one knew for how long.
They decided that now was the time to act.
A few days before his scheduled trip, Canadian authorities pulled Su Bin over and arrested him.
Right away, China knew that one of its most valuable intelligence assets had been caught.
While the “Wanted” posters and Eric Holder’s indictment of five military hackers had certainly made an impression on Beijing, Carlin says that the follow-up case against Su Bin—which actually brought a spy into custody—helped shape the Chinese response even further.
“The Su Bin case, all but unnoticed by the public, had a large impact on Chinese thinking,” says Carlin, who has coauthored with me a new history of the government’s approach to cyberthreats.
“In the space of barely a month, the United States had taken overt steps against two major Chinese economic espionage operations.”
Vallese says the FBI expected it would be an ordeal to get Su Bin back from Canada.
International extraditions, even from close partners and allies, are always complicated.
“We weren’t under any impression this was going to be easy,” Vallese says.
As Su Bin prepared for his initial court appearances, China quickly decided to send a not-so-subtle message to Canada.
To make America’s northern neighbor think twice about allowing the extradition of Su Bin to the United States, it appears the Ministry of State Security had Kevin and Julia Garratt invited to dinner in Dandong.

AFTER THEIR DETENTION, the Garratts found themselves caught in China’s Kafkaesque justice system, interrogated regularly but with nothing to confess.
Their family retained James Zimmerman, an American lawyer with the firm Perkins Coie, who had spent nearly two decades working in Beijing.
He began to piece together the case against the couple.
The Chinese government, he realized, was leveling charges against Kevin Garratt that were almost a mirror image of the US charges against Su Bin.
The Chinese Foreign Ministry told The New York Times that the Garratts were being investigated for stealing intelligence “about Chinese military targets and important national defense research projects, and engaging in activities threatening to Chinese national security.”
As if that weren’t menacing enough, on February 19, 2016, China amended the indictment against Kevin to include more serious charges.
The “evidence” against Kevin, though, appeared mainly to be that he had a history of taking fairly unremarkable photographs in public places—going to Tiananmen Square, say, and filming the soldiers marching around and raising the flag, Zimmerman says.
“Getting caught up with China’s politically driven criminal justice system can be a bleak, depressing experience,” Zimmerman says.
“Due process in China is a different animal than in most Western judicial systems. While the investigators are not allowed to torture the suspects, mistreatment is a matter of definition.”
He spent months shuttling back and forth between meetings with the Chinese Ministry of Foreign Affairs, the Ministry of Commerce, and Canadian embassy officials.
“My goal was to plead to them that this case was not good for China given the dearth of evidence and the potential for a public backlash.”
Later, Kevin Garratt would precisely recall the outline of the cell he shared with as many as 14 prisoners in China: “About 12 paces by five and a half.”
But even if the diplomatic aftermath of Su Bin’s hacking operation was spinning wildly out of control, the operation’s military objective was just coming to fruition.
In November 2014, while Su Bin and the Garratts sat behind bars, the Chinese rolled out their own knockoff military cargo plane at an annual air show in Zhuhai.
At the show, the Xi'an Y-20—codenamed Kunpeng after a mythical ancient Chinese bird capable of flying long distances—was parked across the tarmac from an American C-17.
Aviation enthusiasts noted how similar the two planes looked, right down to the design of their tail fins.
The Chinese plane had met its American doppelgänger, just feet apart.

TO ANYONE MONITORING the traffic of Chinese cyberthefts, the one-two punch of the PLA indictments and the Su Bin arrest seemed to make a real difference.
“Since mid-2014, we have seen a notable decline in China-based groups’ overall intrusion activity against entities in the US and 25 other countries,” the cybersecurity firm FireEye concluded in one report.
Many inside the government had worried that the Justice Department’s newly aggressive stance would backfire.
But as it turned out, it was the Garratts who suffered the negative repercussions; otherwise the indictments and Su Bin’s arrest seemed to have compelled China to put the brakes on its hacking.
Because the sky hadn’t fallen, the Obama administration felt emboldened to keep pushing harder. China, they figured, saw its economic espionage—like all espionage—via the lens of cost-benefit analysis.
With the indictment and arrest of Su Bin, the Americans felt that they had begun to change one side of that equation—and now it was time for them to up the ante.
Xi Jinping was scheduled to make his first state visit to Washington at the end of September 2015.
In the weeks leading up to the visit, the Obama administration set out to bring the tensions between the two nations to a head.
In August 2015, The Washington Post ran an article warning that the US government was getting ready to issue sanctions targeting China for its hacking.
In September, Obama addressed a group of business leaders: “We are preparing a number of measures that will indicate to the Chinese that this is not just a matter of us being mildly upset but is something that will put significant strains on the bilateral relationship if not resolved. We are prepared to take some countervailing actions in order to get their attention.”
Other officials, including national security adviser Susan Rice, pressed the message behind closed doors: China’s behavior had to change.
The warnings, both public and private, got through.
Just days before Xi’s visit, Beijing dispatched a large, high-level delegation to Washington.
“The Chinese saw they had a big potential embarrassment brewing,” Justice Department deputy assistant attorney general Luke Dembosky recalls.
No one on the Chinese side wanted Xi’s first state visit to become a showdown over cybersecurity. “They had to let the air out of the balloon.”
The conversations, which included Department of Homeland Security secretary Jeh Johnson and White House cybersecurity coordinator Michael Daniel, began with a firm message from the Americans: Don’t even bother denying this is your typical behavior. Let’s move past that.
For days, the negotiations were tense and stilted.
But finally, on the night before the delegation was set to return home, the Chinese called the White House for a final set of talks.
“I was all set to go home, and I got a call at 6:30: ‘Can you be at the White House at 8?’ ” Dembosky recalls.
It turned out to be too late to arrange access to the White House, so the groups met at the Omni Shoreham Hotel instead, perched on the edge of Rock Creek Park.
Aides from the White House, the Justice Department, the Department of Homeland Security, and the State Department, among others, talked through the night with the much-larger Chinese delegation. All of them were aware that the Chinese had a deadline to make their 7:30 am flight home.
“It was one of the most constructive dialogs I’ve ever been part of. For a brief moment, the stars were aligned. They were highly motivated to do the right thing,” Dembosky says.
By morning, they’d worked out an agreement for the two presidents to sign later in Washington.
A few days later, on September 25, 2015, Barack Obama and Xi Jinping met privately.
As Obama recapped the meeting to the press, he said he had “raised once again our very serious concerns about growing cyberthreats to American companies and American citizens. I indicated that it has to stop. The United States government does not engage in cyber-economic espionage for commercial gain.”
Then the president made an announcement in the Rose Garden that many US leaders had never thought they’d hear: “Today, I can announce that our two countries have reached a common understanding on the way forward. We’ve agreed that neither the US or the Chinese government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information for commercial advantage. In addition, we’ll work together, and with other nations, to promote international rules of the road for appropriate conduct in cyberspace.”

THE WORLD’S TWO largest superpowers had broken new ground, but the travails of the Garratts and Su Bin dragged on.
Julia had been released on bail but was ordered to stay in China, and in January 2016 the Chinese government announced it would try Kevin for espionage.
“Chinese authorities also found evidence that implicates Garratt in accepting tasks from Canadian espionage agencies to gather intelligence in China,” the Xinhua news agency reported.
Behind the scenes, though, the Chinese acknowledged that the charges were absurd—and that there was an easy path for the Garratts’ release, says the couple’s lawyer.
As Zimmerman told The New York Times, “The Chinese made it clear that the Garratt case was designed to pressure Canada to block Su Bin’s extradition to the US.”

STOLEN SECRETS
The C-17 isn't the only product to have its design lifted by hackers. 
Over the past decade, Chinese economic espionage has affected thousands of businesses worldwide, from vacuum-makers to paint manufacturers. —Andrea Powell

  • Dyson: Since 2011, British inventor James Dyson has been accusing China of hacking the trade secrets of his eponymous fan and vacuum empire.
  • DuPont: In 2014, a man in California was convicted of stealing DuPont’s formula for titanium dioxide—a white pigment used in everything from paint to Oreos—on behalf of the Chinese government.
  • American Superconductor: This maker of wind turbines lost more than a billion dollars after its Chinese partner company, Sinovel, used a spy to steal source codes for the machines.
  • Westinghouse: In 2010, while Westinghouse was building a few power plants in China, a hacker stole specs for how the company designs and routes the pipes running through its generation facilities.
  • Military Projects: In addition to helping Chinese hackers steal plans for the C-17, Chinese-Canadian businessman Su Bin was also charged with pilfering specs for the F-22 stealth fighter plane.


But in February 2016, Su Bin himself foiled China’s bargaining position.
He waived extradition, deciding he would go freely to the US to face charges.
His lawyer later told a US court that Su Bin knew that his extradition proceedings might last longer than the time he’d serve in a US prison.
FBI agents flew to Vancouver and prepared to take custody of Su; Vallese and several colleagues waited next to the FBI’s Gulfstream jet as a Canadian police motorcade pulled onto the tarmac.
“Su was in the backseat of the SUV, sandwiched between two Canadian law enforcement officers,” Vallese recalls.
“All of us got chills.”
On the flight back to California, Vallese says the talk among the agents and Su turned to aviation.
He complimented the FBI’s plane.
Making chitchat, one of the agents asked him if he had a favorite jet.
“Not the C-17,” Su deadpanned.
On March 22, 2016, Su Bin pleaded guilty.
His 35-page agreement was perhaps the most detailed firsthand explanation of China’s spying apparatus ever released in public.
“It was the first time we’d had that kind of success—the first time we’d had someone owning their part in an intrusion like this,” Vallese says.
Su Bin declined to speak publicly, though, in court: “I lost my words now,” he said at his sentencing, where a judge handed him 46 months in federal prison and ordered him to pay a $10,000 fine.
With time served, he was released in October 2017.
The case against the Garratts rapidly unraveled in the wake of Su Bin’s decision to waive extradition. Julia was able to leave China in May 2016, and Kevin was released that September, though he had to pay nearly $20,000 in fines and penalties—money that had been partly designated for a North Korean orphanage project and other aid work.
This spring, FBI director Christopher Wray stated in public what people in cybersecurity circles had been seeing for a while: China is back to its old tricks. 
It is once again infiltrating US computer systems and stealing information at a massive scale. 
“There’s no country that’s even close,” Wray told NBC News in March this year.
“We’re talking about big damages,” President Trump recently told Reuters.
“We’re talking about numbers that you haven’t even thought about.”
“There’s been a massive pickup in the last year and a half,” says Dmitri Alperovitch, cofounder of the cybersecurity firm CrowdStrike.
For a variety of reasons, the 2015 truce between China and the United States didn’t hold—in a way, it’s because both countries have ceased to acknowledge it.
President Donald Trump’s trade war against China has largely been couched as a way to punish China for its years of rampant intellectual property theft. 
“After years of unsuccessful US-China dialogs, the United States is taking action to confront China,” wrote the US Trade Representative’s office.
Between 2005 and 2014, the main force behind China’s campaign of cybertheft was the People’s Liberation Army.
In turn, after the outing of the five PLA soldiers in 2014, that agency bore most of the embarrassment and blame for China’s weakened hand in negotiations with the US.
Since 2016, for a host of reasons, the army has had its wings clipped politically by Xi Jinping, both through a reorganization and through anticorruption drives that have seen numerous government officials sidelined, imprisoned, and, in at least one case, even sentenced to death.
Into the vacuum left behind by the PLA, the Chinese Ministry of State Security—a powerful agency that combines elements of the CIA, the FBI, and the NSA—has apparently stepped in and become China’s new central office for cybertheft.
“The PLA have stepped back significantly, but the MSS and their affiliated contractors have stepped into that void,” Alperovitch says.
These new hackers with the Ministry of State Security have evidently learned from the PLA’s mistakes.
“They’ve gotten steadily better,” Alperovitch says.
“They’re thinking much harder about how to be more stealthy.”
After all, no Chinese hacker wants to be the next one splashed across an FBI “Wanted” poster.

Adapted from Dawn of the Code War: Inside America’s Battle Against Russia, China, and the Rising Global Cyber Threat, by John P. Carlin, with Garrett M. Graff (PublicAffairs), published October 2018.

vendredi 15 juin 2018

Ex-Rolls-Royce engineer nicked on suspicion of giving F-35 info to China

73-year-old taken in by counter-terror cops 
By Gareth Corfield

Chinese spy Bryn Jones, a father-of-five, delivered lectures on aeronautics at a Chinese university
A British F-35B in flight.

A former Rolls-Royce engineer has been arrested on suspicion of breaching the Official Secrets Act by handing British F-35 engine secrets to China.
Rolls-Royce's one-time chief combustion technologist Bryn Jones, 73, was arrested at his Derbyshire, UK, home by the Metropolitan Police's Counter Terrorism Command on Tuesday.
MI5 has received intelligence that "classified defence information" have been passed to China as part of a plot involving Jones. 
Jones was apprehended during an "ultra discreet" police operation that included a search of a nearby office.
The Sun reported that the engineer, who left Rolls-Royce in 2003 for academic and consultancy roles, had 40 years' experience "in the development of new combustion technology for aero gas turbines and aero derivative engines".
Jones is a visiting professor in gas turbine combustion at China's Aeronautical University of Xi'an.
The F-35B, which is the short takeoff and vertical landing (STOVL) variant of the supersonic stealth fighter, has a lift fan that rotates its jet engine's thrust through 90 degrees for takeoffs and landings. The lift fan mechanism was mostly designed by Rolls-Royce, building on the original design work for the Pegasus engine that powered the Harrier jump-jet. 
It makes up a significant chunk of the 15 per cent of each F-35B that is built in Britain.
Exact details of the lift fan's design and construction are highly classified, not least because such details could not only give an adversary key information about radar and infrared signatures but also let them copy the design. 
China has already put together a visual replica of the F-35A, variously named in Western media as the J-31 or FC-31, and a STOVL version of that aircraft could cause headaches for Western militaries in years to come.
A Met Police spokesman said: "At approximately 1425 hours on Tuesday officers arrested a man in Derbyshire as part of an investigation under the Official Secrets Act. The man, who is in his 70s and worked within private industry, has been taken to a police station in Derbyshire where he remains in custody."
The Daily Telegraph later reported that Jones had been released from police custody.
In other news, Rolls-Royce announced this morning it is shedding 4,600 jobs
The company has been struggling with faults in its Trent 1000 engines, which power certain models of the Boeing 787 Dreamliner. 

samedi 9 juin 2018

Chinese hackers secured a trove of highly sensitive data on submarine warfare

Chinese Hackers Steal Unclassified Data From Navy Contractor
By Helene Cooper
Defense Secretary Jim Mattis recently disinvited the Chinese military from a large, multinational naval exercise this summer.

WASHINGTON — China has stolen sensitive data related to naval warfare from the computers of a Navy contractor, American officials said on Friday, in another step in the long-running cyberwar between two global adversaries.
The breach occurred this year, the officials said, when Chinese government hackers infiltrated the computers of a company working on a Navy submarine and underwater programs contract. 
The company, which was not identified, was doing work for the Naval Undersea Warfare Center, which is based in Newport, R.I.
Officials said that the data gleaned by China was unclassified.
Navy officials declined to speak publicly about the hack, which was first reported by The Washington Post.
But in a statement, Lt. Marycate Walsh, a Navy spokeswoman, cited “measures in place that require companies to notify the government when a cyberincident has occurred that has actual or potential adverse effects on their networks that contain controlled unclassified information.”
She said it would be “inappropriate to discuss further details at this time.”
China and the United States have been locked in an escalating fight over cyber and military technology, with Beijing making rapid gains in recent years. 
American officials — from both the Trump administration and the Obama administration before it — concede that Washington has struggled to deter Chinese hacking, and have predicted the cyberattacks will increase until the United States finds a way to curb them.
The theft of the Navy system is hardly the largest, or the most sensitive, of the designs and systems stolen by Chinese hackers over the years. 
But it underscores a lesson the American government keeps learning: No matter how fast the government moves to shore up it cyberdefenses, and those of the defense industrial base, the cyberattackers move faster.
The plans for the F-35, the nation’s most expensive fighter jet in history, were taken more than a decade ago, and the Chinese model looks like an almost exact replica of its American inspiration.
A People’s Liberation Army unit, known as Unit 61398, was filled with skilled hackers who purloined corporate trade secrets to benefit Chinese state-owned industry. 
But many of its targets were defense related as well. 
Members of the unit were indicted in the last two years of the Obama administration, but none are likely to come back to the United States to stand trial.
The most sophisticated hack of American data took place at the Office of Personnel Management. 
It lost the files of about 21.5 million Americans who had filed extensive questionnaires for their security clearances. 
The forms listed far more than Social Security numbers and birth dates. 
They detailed medical and financial histories; past relationships; and details about children, parents and friends, particularly non-United States citizens.
The office stored much of the data at the Interior Department and encrypted nearly none of it. 
So when the Chinese copied it in a highly sophisticated operation, they were prepared to use big data techniques to draw a map of the American elite, who worked on which projects and who knew whom. 
The loss was so severe that American intelligence agencies canceled the deployment of new officers to China.
Lieutenant Walsh said that the Navy treated “the broader intrusion against our contractors very seriously.”
“If such an intrusion were to occur, the appropriate parties would be looking at the specific incident, taking measures to protect current info, and mitigating the impacts that might result from any information that might have been compromised,” she said.
The United States and China are wrangling over trade issues but also jointly looking to rein in North Korea’s nuclear ambitions. 
Donald Trump is headed to Singapore this weekend for a June 12 summit meeting with North Korea’s leader, Kim Jong-un.
The United States and China are also tangling over Beijing’s militarization of disputed islands in the South China Sea.
Last week, Defense Secretary Jim Mattis harshly criticized the Chinese government for continuing to militarize a string of islands in the South China Sea, calling the presence of advanced military equipment and missiles there a flagrant show of military power.
To add muscle to American complaints, Mr. Mattis recently disinvited the Chinese military from a large, multinational naval exercise this summer — in part because of the anti-ship and surface-to-air missiles, and other weapons, that China has positioned on the Spratly Islands.
A United States official, speaking on the condition of anonymity because he was not allowed to be identified in discussing the issue, said the Navy was investigating the breach with the help of the F.B.I.

lundi 30 avril 2018

U.S. Fighters for Taiwan

The island democracy needs advanced air power to deter China.
The Wall Street Journal

A Chinese armed helicopter assaults targets with rocket projectiles in a live-fire exercise off China's southeast coast, April 18. 

Chinese bombers and warships conducted exercises near Taiwan this month, a show of force that officials in Beijing called a warning not to pursue formal independence. 
Last year the number of Chinese air patrols off Taiwan’s east coast quadrupled, and Beijing under Xi Jinping has stepped up pressure on the island democracy to “reunify” with the motherland.
China’s bullying is raising alarms in the U.S., which is obligated to help Taiwan defend itself under the Taiwan Relations Act
The mainland People’s Liberation Army is deploying new jets, ships and other weapons in such numbers that the island’s defenses are in danger of being overwhelmed. 
Past U.S. Administrations failed to sell Taiwan the weapons it needs, and much of its arsenal is outdated.
The island’s most pressing need is air power. 
The mainstay of Taiwan’s fighter force is a fleet of 144 F-16s bought in the mid-1990s. 
Fewer than half the planes are ready for combat at any time, thanks to the maintenance required by aging aircraft and upgrades. 
Taiwan is pleading for new fighters to counter China’s advanced planes such as the Russian-made Su-35.
China also deploys more than 1,500 ballistic missiles within range of Taiwan, some highly accurate. They could damage airfields and destroy planes on the ground in minutes. 
Taiwan has bought advanced versions of the Patriot system to counter this threat, but the number and sophistication of Chinese missiles means many would get through. 
A 2009 Rand study said China could likely achieve air superiority over the island within days.
U.S. Senators John Cornyn and James Inhofe asked Donald Trump last month to support Taiwan’s request to buy the vertical takeoff version of the new F-35 fighter
They wrote, “The survivability of the F35B and modern long-range sensors could help Taiwan intercept Chinese missiles, promoting deterrence well into the next decade.”
In a crisis the F-35B can be based almost anywhere, making it hard for Chinese missiles to destroy on the ground. 
Its stealth and other capabilities mean Chinese military planners couldn’t count on air superiority in a conflict.
There are several reasons the U.S. is unlikely to sell Taiwan the F-35B right away. 
One is the difficulty of getting the consortium of nations behind the F-35 to agree amid China’s inevitable howls of outrage. 
Another concern is China’s success in recruiting spies within Taiwan’s armed forces, meaning the plane’s secrets could be stolen.
One solution would be to sell Taiwan the latest version of the F-16 and lease some used fighters as a stopgap. 
Over the next few years, the U.S. could lay the groundwork for the F-35B sale as well as another layer of missile defense, the Terminal High Altitude Area Defense or Thaad. 
That would give President Tsai Ing-wen time to follow through on her promise to increase military spending, a key requirement if Taiwan is to strengthen its defenses.
Beijing keeps pressing the U.S. to abandon Taiwan. 
Last December a Chinese diplomat in Washington threatened war if a U.S. Navy ship visits a Taiwanese port. 
But the threats and intimidation are backfiring, fostering a consensus in Washington that Taiwan needs more U.S. arms and closer security cooperation to deter Chinese adventurism. 
A sizable sale of fighter aircraft this year would shore up a democratic ally and reduce the chance of conflict in the Taiwan Strait.

mercredi 28 mars 2018

Sina Delenda Est

Give Taiwan the F-35 to deter China, top senators tell Trump
By Joe Gould  

An F-35B lands on the flight deck of the amphibious assault ship Wasp as part of a routine patrol in the Indo-Pacific region.

WASHINGTON — Two key GOP senators are pressing U.S. President Donald Trump to share Lockheed Martin’s F-35 or F-16V fighter jet to upgrade Taiwan’s aging air power and deter China.
Sens. John Cornyn and Jim Inhofe sent the letter to Trump on Monday, days after Taiwan defense officials confirmed their long-standing interest in the F-35.
Cornyn, of Texas, is the Senate’s No. 2 Republican, and Inhofe, of Oklahoma, is the Senate Armed Services Committee’s No. 2 Republican.
The F-16V — billed as the most advanced fourth-generation fighter — would be a cost-effective alternative to the fifth-generation F-35, the letter argues.
The lawmakers also said it would address the “quantitative and qualitative challenges” of Taiwan’s air defense fleet.
Of 144 F-16s Taiwan bought from the U.S. in 1993, 15 are in the U.S. for training purposes and 24 more will be offline for upgrades on a rolling basis through 2023.
That means Taiwan is likely able to field only 65 F-16s at any given time in defense of the island — “not enough to maintain a credible defense,” the letter reads.
“If Taiwan’s air defense fleet is allowed to degenerate in number and quality, I am concerned that it would be destabilizing and would encourage Chinese aggression to ensue,” the letter reads. “Additionally, I am concerned that Taiwan’s military weakness and the inability to mount a credible air force would place an undue burden on forward-deployed U.S. forces in North East Asia.”
Those upgrades include fitting the F-16 with the active electronically scanned Northrop Grumman AN/APG-83 Scalable Agile Beam Radar, a new mission computer and an electronic warfare suite.
Taiwan is reportedly interested in the F-35B short-takeoff-and-vertical-landing version, through which Taiwan would aim to maintain air power if China attacked its runways in a first strike.
“The survivability of the F-35B and modern long-range sensors could help Taiwan intercept Chinese missiles, promoting deterrence well into the next decade,” the letter reads.
“The F-35B would not only provide a modern fifth-generation fighter, but would also bolster their capabilities in next-generation warfare.”
Earlier this month, Xi Jinping issued a warning to Taiwan, which China views as a breakaway province.
However, Washington provides arms to Taipei under the 1979 Taiwan Relations Act, and Trump days ago signed a bill to make it easier for the U.S. and Taiwan to exchange official visits.
In June, China demanded Washington reverse its decision to sell Taiwan $1.42 billion worth of arms, saying it contradicted a “consensus” that Xi reached with Trump during talks in Florida last year.
Inhofe in February completed a congressional trip to the Asia-Pacific region, which included a visit to Taiwan.

mardi 20 mars 2018

Sina Delenda Est


China, not North Korea, to dominate Japan military planning
By Tim Kelly, Nobuhiro Kubo

A Japan Self-Defense Forces (JSDF) soldier takes part in a drill to mobilise their Patriot Advanced Capability-3 (PAC-3) missile unit in response to a recent missile launch by North Korea, at U.S. Air Force Yokota Air Base in Fussa on the outskirts of Tokyo, Japan August 29, 2017.

TOKYO -- North Korea’s growing missile arsenal might be the most obvious and immediate military threat facing Japan, but defense planners in Tokyo are focused on a much larger and more challenging foe as they prepare for the years ahead.
China has stepped up military spending and already dominates the South China Sea, through which Japan’s trade with major markets including Europe and the Middle East flows.
Now, Japanese military experts are worried Beijing may be on the brink of opening access to the Pacific through a Japanese island chain that has marked the limit of China’s military influence for decades.
Tokyo sees unfettered passage for Chinese warships and warplanes through the Okinawan island chain as a threat to vital sea lanes. 
For China that access is part and parcel of becoming a global superpower.
“Now, we are evenly matched but the reality Japan faces is that it is becoming the underdog,” said Nozomu Yoshitomi, a professor at Nihon University in Tokyo who advised Japan’s government as a Self Defence Forces military analyst.

CHINESE AMBITION

In addition to having Asia’s second-largest military, Japan is also defended by U.S. forces that have used the country as their main Asia base since the end of World War Two. 
Under a security treaty, Washington is obliged to aid Tokyo if its territory is attacked.
China has “essentially established de facto control over the South China Sea and the East China Sea is next,” said a retired senior U.S. military commander on condition he wasn’t identified. 
“The United States, for its part, has been in relative retreat in the Western Pacific for a decade.”
Beijing is ramping up military spending to build a world-class fighting force by 2050 with advanced kit, including stealth jets and, according to state-run media, a nuclear-powered aircraft carrier.
In 2018, Beijing plans to spend 1.11 trillion yuan ($175 billion) on its armed forces, more than three times as much as Japan.
That would also be around a third of what the United States pays for the world’s most powerful military, including 30,000 marines in Okinawa and a navy carrier attack group based near Tokyo.
“The pace of Chinese activity in waters around Japanese territory has expanded and accelerated,” Japan’s Minister of Defence Itsunori Onodera said this month. 
“China is building the capacity to operate in distant seas and that can be see with China’s acquisition of its first carrier and its construction of a second flat top.”
China says its military is for defensive purposes and its intentions in the region are peaceful. 
China’s Defence Ministry did not respond to a request for comment.

HUNKER DOWN

Japan’s defense outlays for the past five years have risen by just 1 percent a year. 
It will likely grow at around the same pace over the next five year plan as health and welfare spending on an aging population takes priority, a government defense official said.
“Finance is our weakness, but our strength is the resilience of our society,” said another defense ministry adviser, who also asked not to be identified. 
If Japan is able to hunker down long enough, he explained, the threat from China should recede as future internal strife, economic woes or other events prompt a retreat.
To restrain Beijing in the meantime, Japan needs advanced weaponry and new munitions able to strike targets further away, said the sources with knowledge of the plans.
Japan’s defense reviews, which will likely be released in December, may propose it establish its first joint command headquarters to coordinate air, ground and naval forces and strengthen cooperation with Washington, the sources said.
New equipment may include amphibious ships along with aerial drones to monitor Chinese activity and potentially target missiles in the boost phase of any launch.
Japan’s military will get new air and ground missiles able to hit shipping and land targets at greater ranges. 
It will also place fresh orders for Lockheed Martin Corp F-35 stealth fighters including vertical take off and landing versions, the sources said.
The review will lay out plans to train more Ground Self Defence troops (GSDF) in marine fighting tactics and for their wider deployment to Okinawa. 
The GSDF’s unit there will grow to division strength from a battalion, said former defense minister Gen Nakatani.

CHINESE PRESSURE

Yet as Tokyo formulates those plans, Beijing is already testing Japanese defenses.
In a maneuver in January that Japan protested as a “serious escalation”, a Chinese submarine entered waters contiguous to Japanese islands in the East China Sea, the Senkakus.
That followed a series of longer range sorties by People’s Liberation Army Air Force bombers and fighters.
China can “test the readiness and response of Japanese forces, to better understand Japanese defenses, and, over time, to engage in peacetime attrition,” said Toshi Yoshihara, a professor and Senior Fellow at the Center for Strategic and Budgetary Assessments in Washington. 
“If Chinese operations become routine, they force Japan to accept the PLA’s growing presence as a fact of life.”
Tokyo was especially alarmed in November when six Xian H-6 bombers flew through a 290 km (180 mile) gap in Japan’s island chain between Okinawa and Miyakojima, accompanied by an electronic warfare TU-154 and a Y-8 monitoring plane.
One senior defense official said the exercise “looked like a practice strike package on Guam”, another major U.S. military base.
China’s Defence Ministry did not respond to request for comment on the exercise.
“The pace of Chinese activity is faster than we anticipated,” Nakatani said at his Tokyo office, where an arrow scribbled on a map of Japan on the wall highlighted the breach in the island chain. 
“Japan’s security environment has not been this harsh since World War Two.”

mardi 9 mai 2017

Cheap Chinese Aluminum Is a National Security Threat

The U.S. industry has been hollowed out. Just one remaining smelter can produce the material used in F-35s and F-18s.
BY BETHANY ALLEN-EBRAHIMIAN

Cheap Chinese steel has upset U.S. steel producers for years, as Chinese manufacturers have unloaded excess capacity on world markets at unbeatably low prices. 
The Trump administration has even invoked the supposed threat to national security from cheap imports to threaten trade restrictions on steel imports.
But the United States has plenty of steel-manufacturing capacity to meet its defense needs. 
What’s genuinely threatened, however, is another sector altogether: Aluminum. 
A glut of cheap Chinese aluminum has done more than hollow out that industry; it may also actually be jeopardizing national security.
Since China joined the World Trade Organization (WTO) in 2001, cheap Chinese aluminum has flooded American markets, closing factories and putting people out of work. 
The number of aluminum smelters in the United States has fallen from 23 to five in that time. 
Eight smelters have either shut down or scaled back operations since 2015, and about 3,500 aluminum jobs have disappeared in the last 18 months alone.
A bigger worry, however, is national security. 
High purity aluminum is used to make certain kinds of jets, such as Boeing’s F-18 and Lockheed Martin’s F-35, as well as armored vehicles. 
But the United States now has just one domestic manufacturer of high purity aluminum left — Century Aluminum’s Hawesville, Ky. plant, which is currently operating at 40 percent capacity amid dropping prices.
The prospects for importing high purity aluminum, from a geopolitical risk standpoint, aren’t friendly; only a few smelters in the world produce it, and those are located mostly in Russia, the Middle East, and China.
The situation prompted the Trump administration to launch a probe into aluminum imports on April 26, after launching a similar probe on steel earlier in the month.
“It’s very, very dangerous, obviously, from a national defense point of view, to only have one supplier of an absolutely critical material,” said Secretary of Commerce Wilbur Ross at an April 26 press briefing.
The probe invokes a portion of a Cold War-era law, known as section 232, which permits special protections for smelting in industries key to national security. 
The investigation would determine whether or not the United States produces enough high purity aluminum to meet its needs during wartime.
“You’re really left with just a kernel of the industry,” Jesse Gary, executive vice president and general counsel for Century Aluminum, told Foreign Policy. 
“Century Aluminum is only running at 40 percent capacity. As Secretary Ross mentioned, we truly are on the precipice of losing that smelter.”
Punitive tariffs of more than 370 percent have previously been levied on aluminum imports from China. 
In the past year, the Departments of Justice, Commerce, and Homeland Security have coordinated multiple investigations into U.S. companies suspected of illegally dodging tariffs on aluminum.
Relief under section 232 could be broader than tariffs, possibly including quotas or some other kind of remedy. 
But it still wouldn’t address the source of the problem — Chinese overcapacity
In fact, Chinese supply-side growth has continued unabated; it manufactured a new record of 2.95 million tons of aluminum in February.
That overcapacity results from Chinese subsidies to major industries, including not just aluminum but also steel, cement, solar, and glass. 
As the Chinese export-based manufacturing model of economic development has run out of steam over the past decade, the government has feared the loss of jobs and potential unrest that might result if major industries fail. 
As a result, it has provided subsidies to keep factories in production and workers at their jobs.
Chinese aluminum companies could not continue to operate at the size and scale they do without these subsidies.
In fact, that China has an aluminum industry of such gargantuan size in the first place — it currently produces more than half the world’s supply — is something of an anomaly. 
Aluminum production is hugely energy intensive, and so is heavily dependent on access to cheap electricity. 
Iceland, for example, with its abundant geothermal energy, is one of the world’s leading producers of aluminum. 
But the market price for electricity in China is significantly higher than in the United States or Europe; big state-owned smelters in China benefit from subsidized electricity.
Aluminum producing countries have been slow to mobilize. 
Steel production is spread out around the world, as many countries have their own steel industries, so a glut of Chinese steel affects a larger number of countries. 
But aluminum production is concentrated in just a few countries, those with cheap sources of electricity.
“Steel has been much more vocal on this issue. We’ve been a step behind,” said Gary. 
“But the decline of the U.S. aluminum industry has been more steep than anything you’ve seen in steel. The expansion of the Chinese industry and the decline of the U.S. aluminum industry has been much more rapid.”
But the U.S. seems to finally be getting serious about addressing the problem. 
In addition to Trump’s recent probe, in January the Obama administration launched a complaint to the World Trade Organization against Chinese aluminum subsidies. 
It’s the first such complaint filed to the WTO that addresses the root cause of Chinese overcapacity, rather than aiming to apply a band-aid like anti-dumping duties. 
Other aluminum-producing countries, including, Russia, Canada, Japan, and the European Union, have all asked to join that WTO request for consultation.
On March 9, the Aluminum Association submitted a complaint to the World Trade Organization (WTO), requesting that anti-dumping duties be levied on aluminum foil imported from China. Representatives from the China Trade Taskforce, founded in 2015 with members including Aluminum Extruders Council, United Steelworkers Union, and Century Aluminum, traveled to London last week to lobby Britain and the EU for their support.
“It does go to show that this problem is affecting all aluminum producing nations,” said Gary.

lundi 8 mai 2017

Trump's Mongolism Syndrome

Taiwan arms deal in limbo as Trump courts China
By Josh Rogin 
Résultat de recherche d'images pour "Trump's Mongolism Syndrome"
For almost four decades, the United States has upheld its commitment to help Taiwan provide for its own self-defense against China — but the Trump administration has yet to affirm it. 
As a planned arms-sales package lingers in limbo, officials, lawmakers and experts worry that Trump may be granting yet another unreciprocated concession to Beijing.
The relatively small sale to Taiwan — worth just more than $1 billion — was set to go in late 2016, but the Obama administration never pulled the trigger
After some early pro-Taiwan signals from Trump, including a phone call with its president, most Taiwan watchers expected the new administration to move the package forward quickly. 
Now, administration and congressional officials say, the deal is stalled due to a lack of administration consensus and the fear that angering Beijing could complicate Trump’s top Asia priority: solving the North Korean crisis.
Those inside the government and on Capitol Hill say the administration risks giving in to China on one of its top priorities in exchange for nothing concrete, while putting the safety of the island democracy in increased danger.
“I think it’s important we keep our commitments under the Taiwan Relations Act and under Ronald Reagan’s ‘Six Assurances,’ ” House Foreign Affairs Committee Chairman Edward R. Royce (R-Calif.) told me. 
“This helps keep the peace and stability in the Taiwan Strait.”
The 1979 law to which Royce referred states that U.S. policy will be to “provide Taiwan with arms of a defensive character,” and Reagan’s 1982 “assurances” made clear that there was no end date for U.S. arms sales to Taiwan and that the United States is not required to consult with Beijing on the issue. 
These two documents have been the bedrock of bipartisan U.S. strategy on Taiwan ever since.
Following the summit between Trump and Xi Jinping last month, many expected the administration to quickly approve the still-pending package and notify Congress. 
Now, administration and congressional officials say the White House has not provided clear policy direction to the national-security agencies or Congress, causing significant confusion.
Adding to those concerns were the president’s comments last month that he would consult with Xi before speaking again with the Taiwanese president. 
Trump said he would not want to be “causing difficulty” for Xi while seeking his help with North Korea.
One possibility is that the administration is preparing to bundle the limited Obama Taiwan arms package with more robust weapons. 
The Taiwanese government is expressing interest, for example, in acquiring the F-35 Joint Strike Fighter. 
But doing so might complicate the surrounding diplomacy even more and cause further delays.
Some U.S. officials want Trump to move forward with the smaller arms package now, to establish that the United States is still committed to aiding Taiwan’s defenses in the Trump era. 
Many are advocating for a return to a more regular process whereby requests are considered and sales notified on an annual basis.
“This is the only way to avoid the speed bumps of the U.S.-China relationship stalling arms packages for years on end,” one U.S. defense official said. 
The State Department said it does not comment on pending arms sales. 
The White House did not respond to requests for comment.
No matter which route the Trump administration takes, congressional support is assured. 
“I will strongly support any arms package the Trump administration will put forward for our friend and ally, Taiwan,” said Sen. Cory Gardner (R-Colo.), who chairs the Senate Foreign Relations subcommittee on East Asia.
Gardner was one of seven senators who visited Taiwan last year and pressed President Tsai Ing-wen to increase Taiwan’s own defense spending to 3 percent of its gross domestic product. 
Lawmakers worry that U.S. calls for Taiwan to spend more on defense will ring hollow if Washington won’t sell Taiwan the defense items it needs.
Even if Tsai reaches her goal, Taiwan cannot keep pace with Beijing. 
Taiwan will spend about $11.6 billion on defense this year, compared with $146 billion spent by the Chinese government, according to official figures. 
The Pentagon’s 2016 report on China’s military states that the nation’s “primary emphasis” is to develop capabilities for a potential conflict with Taiwan.
China must be reminded that it cannot push the United States away from its commitments to partners in the region with vague promises of help on North Korea that may never come. 
If China really does believe that helping to solve that crisis is in its interest, no Taiwan arms package will change that.
The Trump administration must resist the temptation to sacrifice long-term objectives for short-term aspirations. 
There will always be some imperative with Beijing that seems more urgent. 
But as Reagan well understood, the U.S. commitment to Taiwan’s defense is too important to deal away.

jeudi 16 mars 2017

Chinese Peril

Espionage risk to US heightened as China's military presses its domestic tech firms
By Jeff Daniels

A J-20 stealth fighter of China flies at the 11th China International Aviation and Aerospace Exhibition in Zhuhai, south China's Guangdong Province, Nov. 1, 2016.

China is taking a page from the Pentagon's playbook under the Obama administration: it's partnering with tech companies to develop more cutting-edge weapons.
But China's innovation-focused strategy could elevate the espionage risk to the U.S.
Ironically, this new threat emerges as the Trump administration is expected to slow its outreach to the tech firms.
Over the weekend, Xi Jinping made an address to the country's national legislature where he urged the People's Liberation Army "to speed up" the application of advanced technologies, according to the Chinese military's official web portal. 
Jinping sees "integrated military and civilian development" as one of the drivers of science-tech innovation and key to upgrading China's military capabilities.
"If you were to look at reports like Chinese military power over time, it's obvious that China is closing the gap more quickly than, for example, we probably would have estimated five or three years ago," said Anthony Cordesman, a national security expert and Arleigh A. Burke Chair in Strategy at the Center for Strategic and International Studies think tank in Washington, D.C.
The communist nation's military has made major technology strides in the past decade in missile, laser weapon, advanced sensor and stealth aircraft development with the help of Chinese firms in the civilian sector.
Its rapidly developing missile technology is seen as a threat to the West
Other major strides have been made in stealth aircraft design and follow state-sponsored cyber and industrial espionage.
"China's overall effort toward civil-military integration will provide great benefits to China's already very aggressive espionage programs," said Richard Fisher, a senior fellow on Asian military affairs at the International Assessment and Strategy Center in Alexandria, Virginia.
According to Fisher, the close ties between military development and the civilian side of China's economy "is one of the highest policies" of the central government in Beijing. 
As an example, Xi Jinping was named earlier this year to chair a new central commission to promote this effort.

Xi Jinping (L) and Li Keqiang attend the third plenary session of the fifth session of the 12th National People's Congress (NPC) at the Great Hall of the People in Beijing on March 12, 2017.

There are "vast new incentives as well as requirements for the actors in the civilian economy to come up with ways to examine anything innovative that they come up with that can be applied to the military," Fisher said.
A year ago, Su Bin, a Chinese identified as "a businessman in the aviation and aerospace fields" pleaded guilty in the U.S. to participating in a conspiracy to hack into computer networks of major American defense contractors to steal military and export-controlled data. 
Court documents show the conspiracy group's targets included the Boeing C-17 military cargo aircraft as well as Lockheed Martin's F-22 and F-35 fighters.
Su Bin admits hacking US defence firms to steal plans for fighter jets. He conspired with two other Chinese and translated stolen data.

"It's fairly obvious from patterns of industrial espionage that it isn't always the government which has been, for example, seeking data on defense activities in the United States and Europe," said Cordesman. 
He added that in some cases it appears "to be people with some kind of private sector or industrial ties."
The espionage organs in China set the priorities and come up with lists of targets. 
If a civilian company offers possible linkages to military companies, then the espionage leadership is likely to pursue those leads.
China's major investment in its military comes at a time when President Donald Trump also is calling for "one of the largest increases in national defense spending in American history." 
Trump had previously been critical of the Obama administration for "deep cuts in our military, which only invite more aggression from our adversaries."
Given Trump's animosity to Barack Obama's policies, it's probably no surprise that the billionaire president has shied away from endorsing the past administration's so-called Third Offset concept, an innovation push and outreach to Silicon Valley firms. 
The initiative was designed under Ashton Carter, the former Defense secretary, to promote cutting-edge tech innovation and give the Pentagon more expertise outside the traditional defense industrial sector.
However, one Pentagon official who was hired in the Obama administration said this week during a South by Southwest panel in Austin, Texas, that the military needs to work and learn from the non-defense side.
"Once we have those bridges built, we're going to have to keep them strong and treat them as a strategic resource," Will Roper, the director of the Pentagon's Strategic Capabilities Office, said during a Wired panel at SXSW on Monday. 
Roper, who has held the post since 2012, indicated that the U.S. military's learning could include something as basic as a better understanding of total logistics from a package delivery company or capabilities in development by major tech firms.
Even so, Trump's Defense Secretary James Mattis — a retired Marine general — appears more focused these days in the nuts and bolts of military readiness rather than an outreach to tech.
To be clear, China's outreach to the civilian side is broader than the Obama administration's Third Offset, which included setting up so-called Defense Innovation Unit Experimental (or DIUx) tech hubs in Silicon Valley, Austin and Boston. 
China's military-civilian industry efforts include working in at least eight regions of the country with companies engaged in everything from advanced chip production and information technology to aerospace manufacturing.
One area where DIUx could make a major difference is helping the U.S. military develop technology to better protect against cyber attacks and breaches from adversaries such as China and Russia.
The rapid development of stealth fighter aircraft by China's military coincided with reports back in 2009 of a cyber breach of sensitive national security information from Lockheed's F-35 Joint Strike Fighter program.
The F-35 stealth fighter is the Pentagon's costliest weapons program and includes the acquisition of aircraft for all three of the U.S. military services. 
Foreign allies such as Japan, the U.K., Italy, Israel and others also are participating in buying the aircraft.
"China has already copied major sub-systems for the F-35, especially its advanced optical detection systems, which until recently helped give it a major combat advantage," said Fisher. 
"These optical systems appear to now be in production in China."
As a result, Fisher expects the overall advantage the F-35 will give American and allied forces will be "much less" over time than might have been originally anticipated.
Several reports last week indicated that China's new J-20 stealth fighter entered into service, a major milestone for China's military. 
The J-20 resembles the F-22 Raptor air-to-air combat aircraft introduced into the U.S. Air Force in 2005.
Also, China's smaller stealth fighter called the FC-31 Gyrfalcon in development is seen as a knockoff of the F-35. 
Then again, some observers suggest even the Russians have had their Su-35 Flanker fighter copied by Chinese state-owned firms.