NATO Analysts Complain of Inability to Spy on Russia
USA – April 08, 2019
Following the Yankee Empire’s “aggressive abroad” foreign policy, Dutch, Spanish, Canadian, Turkish, Romanian and Bulgarian frigates from Standing NATO Maritime Group Two (SNMG2) entered the Black Sea on March 28.
“#SNMG2 enters the Black Sea for a #NATO deployment in which we exercise with Allies and Partners. #Evertsen, #SantaMaria, #Toronto, #Drazki, #Yildirim and #RegeleFerdinand are looking forward to exercise #SeaShield and to our work with our Ukrainian and Georgian partners,” the commander of a NATO maritime group Boudewijn Boots tweeted.
#SNMG2 enters the Black Sea for a #NATO deployment in which we exercise with Allies and Partners. #Evertsen, #SantaMaria, #Toronto, #Drazki, #Yildirim and #RegeleFerdinand are looking forward to exercise #SeaShield and to our work with our Ukrainian and Georgian partners. pic.twitter.com/Ytspjus5pt— Boudewijn Boots (@BoudewijnBoots) March 28, 2019
The warships are part of NATO’s defense cooperation exercises taking place on April 8-12.
HMCS Toronto plans to conduct a Passing Exercise with Ukrainian Navy ships in the Black Sea to enhance interoperability among Allied and Partner nation ships, according to MARCOM - Allied Maritime Command.
ADM Foggo: The United States and #NATO are active, with more ships in the #BlackSea region. We provide deterrence through our military presence, our exercises and the training we conduct with #allies and #partners there. #podcast #OnTheHorizon— U.S. Naval Forces Europe-Africa/U.S. 6th Fleet (@USNavyEurope) March 30, 2019
Listen: https://t.co/Mnt1PpyjLc pic.twitter.com/6bZpigEFAB
Royal Netherlands Navy frigate HNLMS Evertsen along with group members Bulgarian frigate BGS Drazki, Romanian frigate ROS Regele Ferdinand and Turkish frigate TCG Yildirim are conducting a port visit to Poti, Georgia. Georgia is another NATO Partner on the Black Sea.
Patrols by NATO Maritime Groups increased in 2018 to three patrols for each group for a total of 120 days of NATO Group presence over the year, compared to two patrols for each group and a total of 80 days in 2017.
This is not the first time in 2019 that the U.S. has gathered the NATO forces close to Russian borders. Earlier in January, the U.S. Navy-guided missile destroyer Donald Cook entered the region. The Russian Black Sea fleet began monitoring the warship at the time as well.
On April, 5 USAF RQ-4 Global Hawk FORTE10 and Boeing P-8A Poseidon, US Navy (VP-26), with tail number 168852, conducted a reconnaissance flight along the Black Sea coast of Russia at 7:15 pm local time (16:00 GMT), PlaneRadar reported.
However, these spying and reconnaissance activities against Russia appeared to be ineffective, as Business Insider has pointed out. According to a recent report from experts with the group C4ADS, Russia widely deploys a broad range of GPS spoofing and jamming systems, such as Krasukha-4 EW, Samarkand, R-330M1P Diabazol automated jamming system, as well as mobile electronic countermeasure systems, including the Shipovnik-4800M and the Shipovnik-M.
By examining maritime location data, which is publicly available, researchers at C4ADS were able to provide the first estimate of the widespread impact of Russian spoofing activities. Between February 2016 and November 2018, C4ADS recorded 9,883 spoofing instances affecting 1,311 vessels, indicating that Russian spoofing is both more widespread and more indiscriminate than was previously understood, Business Insider wrote.
The locations affected by GPS spoofing and documented by C4ADS include areas around Crimea, St. Petersburg, Moscow, in the far east of Vladivostok, and around Russian military bases in Syria.
Using signal recordings from a GPS receiver based on the International Space Station (ISS) in low-Earth-orbit (LEO), C4ADS characterized, mapped, and identified potential basing locations and equipment involved in Global Navigation Satellite System (GNSS) spoofing activities in Syria.
C4ADS is the Center for Advanced Defense Studies, located Washington, DC. The University of Texas at Austin also partnered with C4ADS in this report, as well as Palantir Foundry, C4ADS’s technology partner. Palantir Technologies is a private American software company, founded by Peter Thiel, Nathan Gettings, Joe Lonsdale, Stephen Cohen, and Alex Karp. Peter Thiel is also a co-founder of PayPal and invested in a plethora of startups including Facebook, famous for regular data breaches, repressions against honest media outlets or common users. Palantir's original clients were federal agencies of the United States Intelligence Community (USIC). A document leaked to media revealed that Palantir's clients as of 2013 included at least twelve groups within the U.S. government, including the CIA, DHS, NSA, FBI, CDC, the Marine Corps, the Air Force, Special Operations Command, West Point and others.
Russian Federation is growing a comparative advantage in the targeted use and development of GNSS spoofing capabilities to achieve tactical and strategic objectives at home and abroad.
“However, our research indicates that Russia continues to act as a pioneer in this space, exposing its willingness to not only deploy these capabilities in protection of VIPs and strategically-important facilities, but also to leverage these techniques to promote its ventures at frontiers in Syria and Russia’s European borders. Russia’s continued development and deployment of systems designed to spoof GNSS and counteract NATO’s decisive advantage in Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance (C4ISR) capabilities at forward-operating locations in Syria and Kaliningrad presents a unique challenge to the security of critical national infrastructure,” NATO’s analysts complain.