Skip to content
TRENDING:
Advertisement

The Washington Times

NATSEC-TECH THURSDAY: Every Thursday’s edition of Threat Status highlights the intersection between national security and advanced technology, from artificial intelligence to cyber threats and the great power battle for global data dominance.

Share Threat Status and the weekly NatSec-Tech Wrap with friends who can sign up here. Send tips to National Security Editor Guy Taylor or lead Tech Correspondent Ryan Lovelace.

The intelligence community spotted an uptick in Russian active measures and is warning that Iran is targeting President-elect Donald Trump.

… The U.S. government conducted a test launch of an unarmed Minuteman III intercontinental ballistic missile on election night. 

… China’s J-35A fighter jet, which U.S. officials say was built with help from stolen American military tech, will be shown in public for the first time at the annual Zhuhai air show, scheduled to begin Tuesday.

… WikiLeaks assesses control of the coming Trump administration will be a contest between former Secretary of State Mike Pompeo, also a former CIA director, and Elon Musk. 

… Two of Mr. Musk’s companies — Tesla and SpaceX — have held more than $15 billion in government contracts over the past decade. Now the tech dynamo’s major political bet on Mr. Trump appears to have paid off.

… Speculation swirls over how Mr. Trump will approach the looming U.S. ban on TikTok, but the company’s employees were surprisingly disengaged heading into this week’s election.

… Scale AI has introduced “Defense Llama,” a large language model the San Francisco-based firm says is “available exclusively in controlled U.S. government environments” and “fine-tuned” to support national security missions.

… The Pentagon says it can neither confirm nor deny reports that the suspected North Korean troops in Russia are “gorging on pornography.” 

… And here’s a look inside the $15.6 million fine that the South Korean government leveled this week against Meta.

U.S. intel: Iran targeting Trump while Russian influence ops continue

Republican presidential nominee former President Donald Trump speaks at a campaign rally at Van Andel Arena, Tuesday, Nov. 5, 2024, in Grand Rapids, Mich. (AP Photo/Evan Vucci)

The prospect of foreign adversaries using technology and social media to stoke division and violence is now spreading into the post-election period.

On the night before Election Day, the U.S. intelligence community issued a joint warning that Iran may seek to spur violence and is targeting Mr. Trump. The Office of the Director of National Intelligence, the FBI and the Cybersecurity and Infrastructure Security Agency reiterated earlier findings that Iran has sought to breach the digital defenses of the president-elect.

“We previously reported that Iran … remains determined to seek revenge against select former U.S. officials whom it views as culpable for the death of Islamic Revolutionary Guard Corps-Qods Force Commander [Qassem] Soleimani in January 2020,” the agencies said. “It has repeatedly highlighted former President Donald Trump among its priority targets for retribution.”

The intelligence community also spotted a rise in Russian active measures ahead of Election Day. Officials said they had evidence that Russia was manufacturing videos and fake news articles to undermine the legitimacy of the election.

FBI called out fake warnings of terror threats to election

Voters are reflected in a window near an American flag as they mark their ballots during early voting in the general election, Friday, Nov. 1, 2024, at City Hall in Providence, R.I. (AP Photo/Steven Senne) **FILE**

The FBI has said on Election Day that it detected false videos designed to trick people into thinking federal officials warned of a terrorist threat to polling places and that elections were rigged, with inmates in prison among those voting illegally.

The bureau said in a statement that one video fabricated a news clip carrying a fake FBI alert of terrorist activity. Another video displayed a fictitious FBI announcement to the media about inmates voting. The FBI also continued to call attention to the perceived forgeries, including additional videos and a statement falsely attributed to the bureau.

It is unclear whether the fakeries and others had any effect or reached an audience before the FBI and its colleagues in the U.S. intelligence community identified them. U.S. intelligence officials have previously said they are not trying to measure the success or failure of foreign influence efforts.  

In addition to the manipulative fake content, the FBI said it was aware of fake bomb threats to polling locations. “The FBI is aware of bomb threats to polling locations in several states, many of which appear to originate from Russian email domains,” the bureau said, adding that it worked with state and local law enforcement to respond to all election threats as “election integrity is among our highest priorities.”

China to unveil J-35 jet built with stolen U.S. tech

Chinese J-35 fighter (Credit: Chinese Ministry of National Defense) ** FILE **

China’s J-35A will be declassified and shown for the first time at the annual Zhuhai air show scheduled to begin Tuesday. The aircraft, which a Chinese military spokesman this week described as a “medium-weight, stealth multi-role fighter” jet, will be on display alongside other new military equipment at the air show, including the HQ-19 surface-to-air missile and a new type of reconnaissance and strike drone.

U.S. officials say Beijing built the J-35A with the help of stolen American military technology. It is the second radar-evading stealth jet in the Chinese military arsenal, after the J-20. Both jets are viewed as an effort by China to match the U.S. military’s F-35 and F-22. The J-35 will also be used on China’s growing fleet of aircraft carriers. Two are deployed, and a third is being built.

The Pentagon’s most recent annual report on the Chinese military said the J-35 and J-20 are the most advanced warplanes among the 1,300 fourth- and fifth-generation fighters China has fielded. A defense official said the J-35 is an export-oriented, low-end stealth aircraft that includes technology used in the J-20. Documents disclosed by former National Security Agency contractor Edward Snowden a decade ago revealed that the J-20 was built with stolen American technology that was also used in the F-35.

U.S. approves $5 billion plan to sell early-warning aircraft to South Korea

A Royal Australian Air Force E-7A Wedgetail takes off from Perth Airport in Perth, Australia, Saturday, April 5, 2014. (AP Photo/Rob Griffith)

The State Department agreed this week on a plan for South Korea to purchase four military jets that will be used to detect and monitor ships and other aircraft. The nearly $5 billion deal for the Boeing-made E-7 airborne early-warning and control aircraft is often referred to as the Wedgetail.

“This proposed sale will support the foreign policy goals and national security objectives of the United States by improving the security of a major ally that is a force for political stability and economic progress in the Indo-Pacific region,” the Defense Security Cooperation Agency (DSCA) said in a statement.

DSCA officials said the sale is expected to increase the South Korean Air Force’s “command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) interoperability with the United States.”

Beltway brothel scandal spurs questions about possible 'honey pot' spying operation

Fairfax County Commonwealth's Attorney Steve Descano speaks during a news conference outside the county courthouse in Fairfax, Va., on Oct. 15, 2020. (AP Photo/Matthew Barakat, File)

Federal prosecutors say rich and powerful clients — including tech executives, politicians, military officers and government contractors with security clearances — are among those who’ve frequented two alleged brothels in Northern Virginia. They have thus far successfully avoided prosecution.

The Justice Department described the clients of brothels in Virginia and Massachusetts last year. Concerns are swirling over whether the Virginia brothels had been used to steal government secrets or perhaps gather information for blackmail, serving as foreign “honeypot” schemes to entice powerful johns and obtain sensitive information.

Mr. Lovelace has a deeper look, noting the alleged brothels are short drives away from the campuses of U.S. military and intelligence agencies and their contractors in Northern Virginia. Brothel operators are alleged to have communicated with the prostitutes over a Korean messaging application, according to court documents.

Events on our radar

• Nov. 8-10 — IISS Prague Defense Summit 2024, International Institute for Strategic Studies

• Nov. 17-20 — 2024 PRIM&R Annual Conference, PRIM&R

• Nov. 21 — Competition Policy 2024: Urgent Questions Emerging within Digital Markets, Chatham House

• Nov. 22-24Halifax International Security Forum

• Dec. 7 — 2024 Reagan National Defense Forum, Ronald Reagan Presidential Foundation & Institute

Thanks for reading NatSec-Tech Thursdays from Threat Status. Don’t forget to share it with your friends who can sign up here. And listen to our weekly podcast available here or wherever you get your podcasts.

If you’ve got questions, Guy Taylor and Ryan Lovelace are here to answer them.