Daily Archives: December 16, 2011
Buccaneer Energy Limited today said that it has executed a gas sales contract with ConocoPhillips, to supply natural gas to ConocoPhillips’ LNG facility located on the Kenai Peninsula approximately 10 miles north-west of Buccaneer’s 100% owned Kenai Loop project.
The contract with ConocoPhillips commences when Kenai Loop # 1 starts production in December 2011. The contract is expected to conclude on 30 April 2012, with the potential to end earlier, if construction of the Cook Inlet Natural Gas Storage (CINGSA) facility is completed prior to this date.
Once the CINGSA facility is on line, Buccaneer has a gas sales contract in place with ENSTAR – the largest gas utility in Alaska. ENSTAR will purchase the Kenai Loop gas and inject into CINGSA for storage and use at a later date.
Buccaneer said in a statement that is not obligated to sell any gas under the ConocoPhillips contract, however it gives the Company both flexibility and surety as it will allow the Kenai Loop # 1 well to flow continuously from the commencement of production, while being able to sell gas either into the ConocoPhillips gas contract or the daily auction to supply local peak demand requirements during the Northern Hemisphere winter. The daily auction to supply gas does not provide guaranteed daily volumes.
Buccaneer has the ability to sell up to 2.5 BCF to ConocoPhillips under the contract. The pricing as part of the gas sales contract is consistent with recently executed gas contracts.
Buccaneer Director Dean Gallegos said:
“This gas sales contract with ConocoPhillips is another milestone for Buccaneer. With secured contracts for the gas produced at Kenai Loop #1 from the time of first production, and the flexibility to be able to sell into the peak demand daily auction market, places Buccaneer in a strong position with substantial cash flows from December 2011 rather than April 2012.
Further, the ability to flow the well continuously will give us the opportunity of assessing the reservoir performance prior to the commencement of the ENSTAR gas contract in April 2012. If the reservoir performs as testing has indicated, it will give us the ability to increase the production rate from the anticipated minimum of 5.0 MMCFD.”
- Conoco Offers Highest Bid In Mexico Lease Sale (mb50.wordpress.com)
- How Oil Companies Plan to Spend Their Cash in 2012 (dailyfinance.com)
- USA: ConocoPhillips Allocates USD 14 Billion for E&P in 2012 (mb50.wordpress.com)
- ConocoPhillips Sells $2B in Pipeline Assets (mb50.wordpress.com)
- USA: Cheniere Enters into Contract with Bechtel (mb50.wordpress.com)
One day after Iran claimed to have brought down an advanced U.S. RQ-170 Sentinel drone, Public Intelligence received an Air Force report saying the drone suffers from many electronic vulnerabilities (via Jeffrey Carr at Digital Dao).
The report, Operating Next-Generation Remotely Piloted Aircraft for Irregular Warfare was published “For Official Use Only” (FOUO) in April 2011 by the U.S. Air Force Scientific Advisory Board, and addresses electronic threats to the American drone fleet.
The board found a list of problems, including communications vulnerabilities and lost communication events.
From Digital Dao:
Section 2.4.3 “Threat to Communication Links” expands on the state of vulnerabilities for [drones]:
- Jamming of commercial satellite communications (SATCOM) links is a widely available technology. It can provide an effective tool for adversaries against data links or as a way for command and control (C2) denial.
- Operational needs may require the use of unencrypted data links to provide broadcast services to ground troops without security clearances. Eavesdropping on these links is a known exploit that is available to adversaries for extremely low cost.
- Spoofing or hijacking links can lead to damaging missions, or even to platform loss.
Section 2.4.4 “Threat to Position, Navigation, and Guidance”:
- Small, simple GPS noise jammers can be easily constructed and employed by an unsophisticated adversary and would be effective over a limited RPA operating area.
- GPS repeaters are also available for corrupting navigation capabilities of RPAs.
- Cyber threats represent a major challenge for future RPA operations. Cyber attacks can affect both on-board and ground systems, and exploits may range from asymmetric CNO attacks to highly sophisticated electronic systems and software attacks.
This information is particularly interesting given the exclusive interview of an Iranian engineer by Scott Peterson and Payam Faramarzi at the Christian Science Monitor.
The CSM story says an Iranian electronic warfare specialist, and his team, overrode the drones communications systems based on information gleaned from the previously downed U.S. drones in Iran.
Once in control of the Sentinel, Iran reprogrammed the craft’s GPS coordinates to make the drone think it was landing at its home base, when actually it was setting down deep in Iran.
“The GPS navigation is the weakest point,” the Iranian engineer told the Monitor, giving the most detailed description yet published of Iran’s “electronic ambush” of the highly classified US drone. “By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain.”
The “spoofing” technique that the Iranians used – which took into account precise landing altitudes, as well as latitudinal and longitudinal data – made the drone “land on its own where we wanted it to, without having to crack the remote-control signals and communications” from the US control center, says the engineer.
Defense Secretary Leon Panetta refused, however, to say whether the drone could have been brought down by an electronic attack.
- Exclusive: Iran hijacked US drone, says Iranian engineer – The Christian Science Monitor (csmonitor.com)
- Iran Claims They Hacked US Drone GPS System (inquisitr.com)
- Iran alleges GPS spoofing tricked CIA’s lost stealth drone – Electronista (electronista.com)
- U.S. drone hijacked by GPS hack? (news.cnet.com)
- Iran Hacked, Hijacked U.s. Drone…report (colonel6.com)
- How Iran hacked super-secret CIA stealth drone (rt.com)
More damage is being dished out to the US intelligence community as sources in Iran admit to hacking the CIA’s lost drone and bringing it down with not much more than computer navigating know-how.
Engineers with the Iranian military are admitting to the Christian Science Monitor that the dramatic disappearance of a multi-million dollar stealth drone aircraft suffered by the United States two weeks ago was indeed a result of their own doing, claiming now that they managed to hijack the system inside the craft with ease and bring it to a safe landing without incident.
The United States originally denied they lost a drone over Iran before changing their story and insisting that they lost contact with the craft during a surveillance mission over neighboring Afghanistan. Iranian officials quickly corrected Americans by displaying footage of the spy-plane and revealing that it was apprehended over 100 miles from the country’s border with Afghanistan.
RT has reported throughout the ordeal that the downing of the drone could have resulted from a budding cyber war between American and Iranian intelligence. Now officials overseas are insisting that they did indeed hack the craft to quietly bring it down.
Speaking to the CSM, an engineer responsible for the interception speaking on condition of anonymity says that technicians managed to hack into the craft’s GPS navigation, which the official describes as “weak.”
“By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain,” says the source.
In a report out of RT earlier this week, we rehashed an earlier incident at Nevada’s Creech Air Force base in the United States from months earlier that left a key logger-virus installed in the cockpits of the military’s drones. We added to the report on Wednesday this week, citing an investigation out of Univision that linked Iranian officials with Mexican hackers in an alleged cyber war plot to attack the American intelligence community, specifically the Central Intelligence Agency, Pentagon and Department of Defense.
The RQ-170 Sentinel recovered by Iran was flying for the CIA when it was apprehended.
The United States originally laughed at Iran’s interception of the craft, with one American official telling Defense News that the act was equivalent to “dropping a Ferrari into an ox-cart technology culture.” Now Tehran says that they were able to successfully reverse-engineer the craft by using less powerful drones that it has downed in the years prior. To the CSM, officials overseas say that the weaknesses in the GPS navigation of the craft were known by US officials, who did little to fix the patch.
Iranian authorities have hailed the recovery as a great success for the country since announcing that they had obtained the craft, much to the chagrin of the Obama administration. The US president has formally asked Tehran to return the craft to authorities, to which Iran shrugged off.
The company plans to build the export terminal at Corpus Christi in Texas, originally the site for a planned liquefied natural gas import terminal with three 160,000 m3 LNG tanks.
The terminal would have the capacity to export 1.8 Bcm of gas per day and could start operations by 2017.
Corpus Christi site is located on 612 acres on the northern coast of the Corpus Christi Bay, along the La Quinta Ship Channel, a deepwater ship channel dredged to 45 feet.
- Lithuania: Cheniere Eyes LNG Exports by 2015 (mb50.wordpress.com)
- Gas Natural Fenosa Deals with Cheniere Energy to Buy US Shale Gas Sourced LNG (mb50.wordpress.com)
- USA: Cheniere Enters into Contract with Bechtel (mb50.wordpress.com)
- ExxonMobil Eyes North American LNG Exports (mb50.wordpress.com)
- USA: Sempra Files with DOE to Export LNG from Cameron Terminal (mb50.wordpress.com)
- USA: Societe Generale Says Cheniere Can Make Sabine Pass Export Decision After Fenosa Deal (mb50.wordpress.com)