Showing posts with label military. Show all posts
Showing posts with label military. Show all posts

Wednesday, July 18, 2012

If Damascus falls, Israel and its gas fields feared threatened


DEBKAfile  Exclusive Report

Syrian military forces were gathered in Tuesday, July 17, to save Damascus.

Tanks and armored vehicles were positioned in strength in the capital’s center and around government buildings. However, the noise and fury of battle in the Syrian capital Tuesday, July 17, were produced, debkafile’s military sources report, by six battalions of Bashar Assad’s loyal Allawite militia in clashes with the rebels who captured the two southern suburbs of Meidan and Tadmon Monday. They are trying to pound the enemy into extinction before its forces reach central Damascus.

The two beleaguered districts are home to a quarter of the capital’s 1.8 million inhabitants.

The Syrian general staff has withdrawn its command headquarters to a well-fortified complex on Shuhada Street in the capital’s center.

If Damascus falls and Assad is cornered, the entire region stands in peril of wider repercussions, because neither he nor Tehran will take defeat lying down.

debkafile’s military sources report their campaign will be paced and scaled according to the momentum of the Syrian rebels’ advance on Bashar Assad’s door-step, which could be drawn out and bloody.

On the Iranian-Hizballah list are Middle East oil installations as well as Israeli, US, Turkish, Saudi and Jordanian strategic targets.

Saturday, the Cypriot police captured a Hizballah terrorist before he could blow up an Israeli El Al flight and tourist buses in Limassol.

Tehran is feared to be focusing on the Mediterranean island as part of a plot to set Israel’s Mediterranean gas field Tamar on fire. The field is 80 kilometers west of Haifa
It would be a spectacular curtain-raiser for the closure of the Strait of Hormuz and for strikes against Gulf oil installations.

Navy Commander, Maj. Gen. Ram Rothberg called last week for an extra five warships and submarines to safeguard Israel’s burgeoning gas fields at the cost of a billion dollars.

The Syrian ruler has stoked up the menace by moving out of storage missiles and shells armed with mustard gas, sarin nerve gas and cyanide stockpiled for years.

They are on operational readiness at Homs, Latakia and Aleppo and, according to Nawaf Fares,
Syrian ex-ambassador to Iraq who defected to the opposition, may already have been used against rebel concentrations.

The longer the battle for Damascus goes on, the greater the danger that the Syrian ruler will release his poison-tipped missiles against Israel, Turkey and Jordan.

Saturday, July 7, 2012

Clinton: Russia and China will 'pay price' for supporting Assad




Russia rejects in the strongest possible terms allegations that it supports President Assad in the Syrian conflict. US Secretary of State Hillary Clinton said Moscow and Beijing must 'pay a price' for backing Assad.

“I do not believe that Russia and China are paying any price at all – nothing at all – for standing up on behalf of the Assad regime. The only way that will change is if every nation represented here directly and urgently makes it clear that Russia and China will pay a price,” Clinton warned.­

Russia’s Deputy Foreign Minister Sergey Ryabkov said the west is operating within a friend-or-foe framework that he called outmoded.

“We categorically reject that such a question would even be posed regarding the current situation in Syria and Russia’s ‘backing’ of President Bashar Assad. This is not a question of supporting certain political figures or leaders. This is a question of managing a crisis situation in the country within a normal political framework,” Ryabkov said.

“Unfortunately, we’re unable to get a basic understanding from our western partners. The west is still appealing to “friend-or-foe” terms. We considered such terminology to be a thing of the past,” Ryabkov explained.

Russia and China once again opted not to attend the “Friends of Syria” meeting. Neither Moscow nor Beijing believe the meeting in the French capital will be helpful in uniting the Syrian opposition “on a constructive basis”.

“We have frankly laid out the reasons why we have restrained from joining the mechanism, the very name of which has a contradiction between the word and the deed,” Russia’s Foreign Minister Sergey Lavrov said earlier this week.

The US Secretary of State further criticized Russia for the maintenance of Syria’s Soviet-made helicopters. Two weeks ago Hillary Clinton lashed out at Russia for repairing three Syrian helicopters, saying their presence “will escalate the conflict quite dramatically.”

The Russian Foreign Ministry swiftly refuted the allegations.

“In 2008 there was a contract to repair them. They are still to be assembled after delivery'', Lavrov said. ''That entire process will take at least three months. So to speak about something we have just sold to Syria, which is then to be used in action, is not true at all,” he added.

Meanwhile, Kofi Annan called on the West and Russia to lay aside their differences and work towards a sooner end to the Syrian bloodshed, which according to the UN latest estimates, has taken some 15,000 lives.

"They [the West] accuse the Russians of arming the [Syrian] government. The Russians accuse them of arming the opposition and flooding the place with weapons. This is instead of coming together to see what can be done," Annan told the Guardian on Friday.

US to seek another UN Security Council resolution­

The Paris conference wrapped up with a six-point resolution, affirming that more definitive UN Security Council action is required to resolve the 16-month conflict in Syria.

Hillary Clinton said the lack of compliance with Annan’s peace plan or obstruction to the transition should be punished with further sanctions.

"We should go back and ask for a resolution in the Security Council that imposes real and immediate consequences for non-compliance, including sanctions," ranging from economic measures to military force, she said.

Two previous UNSC resolutions have been vetoed by China and Russia.

Friends of Syria’s meeting also concluded with an agreement that the Syrian opposition should receive broader support, while those “who carry out and support repression” must face tougher and wider sanctions.

In the meeting, French President Francois Hollande demanded Assad step down. The Syrian opposition also called for humanitarian corridors and a no-fly zone to be implemented.

The Friends of Syria gathering comes just a week after a UN-led summit in Geneva where the international community endeavored to reach a consensus on the conflict. They agreed to get behind UN envoy Kofi Annan’s plan for a transition government in Syria.

However, Russia said that western powers were purposely distorting the terms of the agreement to push for the removal of Assad.

US Secretary of State Hillary Clinton claimed that the agreement said Assad must leave office, whereas Moscow claims that the original accord made no allusion to the removal of the Syrian president.

Tuesday, June 26, 2012

US military surveillance future: Drones now come in swarms?



A small insect or a mosquito over your ear may now be much more than simply annoying. Those could easily be micro drones which now come in a swarm of bug-sized flying spies.

­In an effort to create a hard-to-detect surveillance drone that will operate with little or no direct human supervision in out of the way and adverse environments, researchers are mimicking nature.

The University of Pennsylvania GRASP Lab showed off a network of 20 nano-quad rotors capable of agile flight, which could swarm and navigate in an environment with obstacles.

This is another step away from bulky heavily armed aerial vehicles or humanoid robots to a much smaller level of tiny remote-control devices. While current drones lack manoeuvrability, can’t hover and move fast enough, these new devices will be able to land precisely and fly off again at speed. One day the military hope they may prove a crucial tactical advantage in wars and could even save lives in disasters. They can also be helpful inside caves and barricaded rooms to send back real-time intelligence about the people and weapons inside.

A report in NetworkWorld online news suggests the research is based on the mechanics of insects, which potentially can be reverse-engineered to design midget machines to scout battlefields and search for victims trapped in rubble.

In an attempt to create such a device, scientists have turned to flying creatures long ago, examining their perfect conditions for flight, which have evolved over millions of years.

Zoologist Richard Bomphrey has told the British Daily Mail newspaper he has conducted research to generate new insight into how insect wings have evolved over the last 350 million years.

“By learning those lessons, our findings will make it possible to aerodynamically engineer a new breed of surveillance vehicles that, because they are as small as insects and also fly like them, completely blend into their surroundings," the newspaper quotes him as saying.

The US Department of Defense has turned its attention to miniature drones, or micro air vehicles long ago.



­As early as in 2007 the US government was accused of secretly developing robotic insect spies when anti-war protesters in the US saw some flying objects similar to dragonflies or little helicopters hovering above them. No government agency has admitted to developing insect-size spy drones though some official and private organizations have admitted that they were trying.

In 2008, the US Air Force showed off bug-sized spies as "tiny as bumblebees" that would not be detected when flying into buildings to "photograph, record, and even attack insurgents and terrorists."

The same year US government's military research agency (DARPA) conducted a symposium discussing 'bugs, bots, borgs and bio-weapons.'

Around the same time the so-called Ornithopter flying machine based on Leonardo Da Vinci’s designs was unveiled and claimed they would be ready for roll out by 2015

Lockheed Martin's Intelligent Robotics Laboratories unveiled "maple-seed-like" drones called Samarai that also mimic nature. US troops could throw them like a boomerang to see real-time images of what's around the next corner.

The US is not alone in miniaturizing drones that imitate nature: France, the Netherlands and Israel are also developing similar devices.

Thursday, June 21, 2012

Is that really just a fly? Swarms of cyborg insect drones are the future of military surveillance


By Daily Mail Reporter

The kinds of drones making the headlines daily are the heavily armed CIA and U.S. Army vehicles which routinely strike targets in Pakistan - killing terrorists and innocents alike.

But the real high-tech story of surveillance drones is going on at a much smaller level, as tiny remote controlled vehicles based on insects are already likely being deployed.

Over recent years a range of miniature drones, or micro air vehicles (MAVs), based on the same physics used by flying insects, have been presented to the public.

The fear kicked off in 2007 when reports of bizarre flying objects hovering above anti-war protests sparked accusations that the U.S. government was accused of secretly developing robotic insect spies.

Official denials and suggestions from entomologists that they were actually dragonflies failed to quell speculation, and Tom Ehrhard, a retired Air Force colonel and expert on unmanned aerial craft, told the Daily Telegraph at the time that 'America can be pretty sneaky.'

The following year, the US Air Force unveiled insect-sized spies 'as tiny as bumblebees' that could not be detected and would be able to fly into buildings to 'photograph, record, and even attack insurgents and terrorists.'

Around the same time the Air Force also unveiled what it called 'lethal mini-drones' based on Leonardo da Vinci's blueprints for his Ornithopter flying machine, and claimed they would be ready for roll out by 2015.

That announcement was five years ago and, since the U.S. military is usually pretty cagey about its technological capabilities, it raises the question as to what it is keeping under wraps.

The University of Pennsylvania GRASP Lab recently showed off drones that swarm, a network of 20 nano quadrotors flying in synchronized formations.

The SWARMS goal is to combine swarm technology with bio-inspired drones to operate 'with little or no direct human supervision' in 'dynamic, resource-constrained, adversarial environments.'

However, it is most likely the future of hard-to-detect drone surveillance will mimic nature.

Research suggests that the mechanics of insects can be reverse-engineered to design midget machines to scout battlefields and search for victims trapped in rubble.

Scientists have taken their inspiration from animals which have evolved over millennia to the perfect conditions for flight.

Nano-biomimicry MAV design has long been studied by DARPA, and in 2008 the U.S. government's military research agency conducted a symposium discussing 'bugs, bots, borgs and bio-weapons.'

Researchers have now developed bio-inspired drones with bug eyes, bat ears, bird wings, and even honeybee-like hairs to sense biological, chemical and nuclear weapons.

And the U.S. isn't the only country to have poured money into spy drone miniaturisation. France has developed flapping wing bio-inspired microdrones.

The Netherlands BioMAV (Biologically Inspired A.I. for Micro Aerial Vehicles) developed a Parrot AR Drone last year - which is now available in the U.S. as a 'flying video game'.

Not so tiny but a good spy: A ShadowHawk drone with SWAT team members

Zoologist Richard Bomphrey, of Oxford University, has conducted research to generate new insight into how insect wings have evolved over the last 350 million years.

He said last year: 'Nature has solved the problem of how to design miniature flying machines.

'By learning those lessons, our findings will make it possible to aerodynamically engineer a new breed of surveillance vehicles that, because they are as small as insects and also fly like them, completely blend into their surroundings.'

The insect manoeuvrability which allows flies the ability to land precisely and fly off again at speed may one day prove a crucial tactical advantage in wars and could even save lives in disasters.

The military would like to develop tiny robots that can fly inside caves and barricaded rooms to send back real-time intelligence about the people and weapons inside.

Dr Bomphrey said: 'Scary spider robots were featured in Michael Crichton's 1980s film Runaway - but our robots will be much more scaled down and look more like the quidditch ball in the Harry Potter films, because of its ability to hover and flutter.

'The problem for scientists at the moment is that aircrafts can't hover and helicopters can't go fast. And it is impossible to make them very small.

'With insects you get a combination of both these assets in miniature. And when you consider we have been flying for just over a hundred years as opposed to 350 million years, I would say it is they who have got it right, and not us!'

Wednesday, June 20, 2012

U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say



By Ellen Nakashima, Greg Miller and Julie Tate

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed at slowing Iran’s ability to develop a nuclear weapon, according to Western officials with knowledge of the effort.

The massive piece of malware secretly mapped and monitored Iran’s computer networks, sending back a steady stream of intelligence to prepare for a cyber­warfare campaign, according to the officials.

The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in Iran’s nuclear-enrichment equipment.

The emerging details about Flame provide new clues to what is thought to be the first sustained campaign of cyber-sabotage against an adversary of the United States.

“This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber-collection against the Iranian program is way further down the road than this.”

Flame came to light last month after Iran detected a series of cyberattacks on its oil industry. The disruption was directed by Israel in a unilateral operation that apparently caught its American partners off guard, according to several U.S. and Western officials who spoke on the condition of anonymity.

There has been speculation that Washington had a role in developing Flame, but the collaboration on the virus between the United States and Israel has not been previously confirmed. Commercial security researchers reported last week that Flame contained some of the same code as Stuxnet. Experts described the overlap as DNA-like evidence that the two sets of malware were parallel projects run by the same entity.

Spokesmen for the CIA, the NSA and the Office of the Director of National Intelligence, as well as the Israeli Embassy in Washington, declined to comment.

The virus is among the most sophisticated and subversive pieces of malware to be exposed to date. Experts said the program was designed to replicate across even highly secure networks, then control everyday computer functions to send secrets back to its creators. The code could activate computer microphones and cameras, log keyboard strokes, take screen shots, extract geo­location data from images, and send and receive commands and data through Bluetooth wireless technology.

Flame was designed to do all this while masquerading as a routine Microsoft software update; it evaded detection for several years by using a sophisticated program to crack an encryption algorithm.

“This is not something that most security researchers have the skills or resources to do,” said Tom Parker, chief technology officer for FusionX, a security firm that specializes in simulating state-sponsored cyberattacks. He said he does not know who was behind the virus. “You’d expect that of only the most advanced cryptomathematicians, such as those working at NSA.”

Conventional plus cyber

Flame was developed at least five years ago as part of a classified effort code-named Olympic Games, according to officials familiar with U.S. cyber-operations and experts who have scrutinized its code. The U.S.-Israeli collaboration was intended to slow Iran’s nuclear program, reduce the pressure for a conventional military attack and extend the timetable for diplomacy and sanctions.

The cyberattacks augmented conventional sabotage efforts by both countries, including inserting flawed centrifuge parts and other components into Iran’s nuclear supply chain.

The best-known cyberweapon let loose on Iran was Stuxnet, a name coined by researchers in the antivirus industry who discovered it two years ago. It infected a specific type of industrial controller at Iran’s uranium-

enrichment plant in Natanz, causing almost 1,000 centrifuges to spin out of control. The damage occurred gradually, over months, and Iranian officials initially thought it was the result of incompetence.

The scale of the espionage and sabotage effort “is proportionate to the problem that’s trying to be resolved,” the former intelligence official said, referring to the Iranian nuclear program. Although Stuxnet and Flame infections can be countered, “it doesn’t mean that other tools aren’t in play or performing effectively,” he said.

To develop these tools, the United States relies on two of its elite spy agencies. The NSA, known mainly for its electronic eavesdropping and code-breaking capabilities, has extensive expertise in developing malicious code that can be aimed at U.S. adversaries, including Iran. The CIA lacks the NSA’s sophistication in building malware but is deeply involved in the cyber-campaign.

The CIA’s Information Operations Center is second only to the agency’s Counterterrorism Center in size. The IOC, as it is known, performs an array of espionage functions, including extracting data from laptops seized in counter­terrorism raids. But the center specializes in computer penetrations that require closer contact with the target, such as using spies or unwitting contractors to spread a contagion via a thumb drive.

Both agencies analyze the intelligence obtained through malware such as Flame and have continued to develop new weapons even as recent attacks have been exposed.

Flame’s discovery shows the importance of mapping networks and collecting intelligence on targets as the prelude to an attack, especially in closed computer networks. Officials say gaining and keeping access to a network is 99 percent of the challenge.

“It is far more difficult to penetrate a network, learn about it, reside on it forever and extract information from it without being detected than it is to go in and stomp around inside the network causing damage,” said Michael V. Hayden, a former NSA director and CIA director who left office in 2009. He declined to discuss any operations he was involved with during his time in government.

Years in the making

The effort to delay Iran’s nuclear program using cyber-techniques began in the mid-2000s, during President George W. Bush’s second term. At that point it consisted mainly of gathering intelligence to identify potential targets and create tools to disrupt them. In 2008, the program went operational and shifted from military to CIA control, former officials said.

Despite their collaboration on developing the malicious code, the United States and Israel have not always coordinated their attacks. Israel’s April assaults on Iran’s Oil Ministry and oil-export facilities caused only minor disruptions. The episode led Iran to investigate and ultimately discover Flame.

“The virus penetrated some fields — one of them was the oil sector,” Gholam Reza Jalali, an Iranian military cyber official, told Iranian state radio in May. “Fortunately, we detected and controlled this single incident.”

Some U.S. intelligence officials were dismayed that Israel’s unilateral incursion led to the discovery of the virus, prompting counter­measures.

The disruptions led Iran to ask a Russian security firm and a Hungarian cyber-lab for help, according to U.S. and international officials familiar with the incident.

Last week, researchers with Kaspersky Lab, the Russian security firm, reported their conclusion that Flame — a name they came up with — was created by the same group or groups that built Stuxnet. Kaspersky declined to comment on whether it was approached by Iran.

“We are now 100 percent sure that the Stuxnet and Flame groups worked together,” said Roel Schouwenberg, a Boston-based senior researcher with Kaspersky Lab.

The firm also determined that the Flame malware predates Stuxnet. “It looks like the Flame platform was used as a kickstarter of sorts to get the Stuxnet project going,” Schouwenberg said.