Thursday, November 26, 2015

Daily Archives: May 6, 2013


    Testimony from victims of the conflict in Syria suggests rebels have used the nerve agent, sarin, a leading member of a UN commission of inquiry has said. Carla Del Ponte told Swiss TV that there were “strong, concrete suspicions but not yet incontrovertible proof”. The BBC reports.

    Ms Del Ponte did not rule out the possibility that government forces might also have used chemical weapons. Later, the commission stressed that it had “not reached conclusive findings” as to their use by any parties. “As a result, the commission is not in a position to further comment on the allegations at this time,” a statement added. According to the BBC the statement was terse and shows that the UN was taken by surprise at Ms Del Ponte’s remarks.

    “This is not the first time rebel forces in Syria have come under suspicion for using chemical weapons.” BBC Diplomatic correspondent, Bridget Kendall commented, “The Syrian government has accused them, and some independent commentators have speculated some groups could conceivably have got hold of stocks when storming government facilities.” Kendall added that the recent allegations coming from a senior UN official is a different matter. “Carla del Ponte is a former war crimes prosecutor and serves on a UN commission looking into human rights abuses in Syria. So any comments from her carry weight.”

    The responsibility on chemical attacks attributed to the Syrian regime was one of the main causes for the shift in the west toward backing the Syrian rebels, with growing openness to actively supporting the rebels with arms and training. The news about the use of the use of such weapons will likely cool off such initiatives.

      Prof. Warren M. Garrison Jr., Carnegie Mellon University (CMU)

      Carnegie Mellon University (CMU) has developed an ultra-strength steel of high fracture toughness that is significantly less expensive to manufacture than existing products. The new material also has high fracture toughness, particularly during stress corrosion cracking in salt water, making it applicative for the manufacturing of critical parts auch as landing gear for naval aircraft. Defense-Update reports.

      When the process is commercialised, the new steel would be more affordable, compared to specialty steels currently used in applicable aerospace industries. This steel contains no cobalt and only a relatively small amount of nickel and therefore is much less expensive than other ultra-high strength steels of high fracture toughness — all of which contain large amounts of cobalt and nickel. While the alloy was developed with Navy aircraft applications in mind, given its low cost and high toughness, it could be used for other applications. The next step in the development would be to assess its properties in commercial scale heats.

      One of the objectives of the STTR program was the development of an inexpensive, ultra-strength steel with high fracture toughness that could be used in Navy aviation applications. The new steel also has excellent resistance to crack growth during stress corrosion cracking in salt water. “The rate of crack growth during stress corrosion cracking of the new steel is comparable to that of other ultra-high strength steels of high fracture toughness and is much better than that of low alloy steel 300M, which is the steel used in the landing gear of most commercial aircraft,” said Garrison, who has a patent pending for the new steel.

      The new material was developed by Warren M. Garrison Jr., a professor of materials science and engineering at CMU. The company in charge of the STTR program was Navmar Applied Sciences Corporation of Warminster, Pa., which specializes in engineering and technical support for the Department of Defense, the U.S. government and private industry. Garrison worked with Jeffrey Waldman, the scientist in charge of the program at Navmar, and William Frazier, chief scientist at the Air Vehicle Engineering Department of the Naval Air Systems Command. The new material resulted from a U.S. Navy funded Small Business Technology Transfer (STTR) Program.

      Source: Defense-Update

      “Shore-based testing allows our combined Navy/Northrop Grumman team to control test conditions before taking the aircraft to the ship,” said Matt Funk, Navy UCAS test team lead. “We are gradually building up to the maximum load conditions we expect to see during an arrested landing aboard an aircraft carrier.” Photo: US Navy
      “Landing an unmanned aircraft on an aircraft carrier will be the greatest singular accomplishment for the UCAS demonstration and will serve as the culmination of over a decade of Navy unmanned carrier integration work”, said Capt. Jaime Engdahl, Navy UCAS program manager. Photo: US Navy
      “Landing an unmanned aircraft on an aircraft carrier will be the greatest singular accomplishment for the UCAS demonstration and will serve as the culmination of over a decade of Navy unmanned carrier integration work”, said Capt. Jaime Engdahl, Navy UCAS program manager. Photo: US Navy

      The U.S. Navy’s X-47B Unmanned Combat Air System (UCAS) demonstrator performed its first arrested landing at Patuxent River, Naval Air Station in Maryland, on May 4. The landing using arresting gear was a key step in maturing the system for its upcoming carrier-based tests later this month. The X-47B is scheduled to begin sea-based carrier flight testing on the USS George H.W. Bush (CVN 77). These tests will include launching from the carrier deck via catapult and, potentially completing landings aboard. Defense-Update reports.

      “Landing an unmanned aircraft on an aircraft carrier will be the greatest singular accomplishment for the UCAS demonstration and will serve as the culmination of over a decade of Navy unmanned carrier integration work”, said Capt. Jaime Engdahl, Navy UCAS program manager. “Shore based arrested landing testing here at NAS Patuxent River is our final check that the X-47B can meet that objective.”

      During Saturday’s test, the X-47B used a tailhook on the aircraft to catch a carrier representative cable, known as the MK-7 arresting gear, to quickly stop the aircraft. This is known as an arrested landing, the type of recovery required aboard aircraft carriers. The MK-7 arresting gear is an underground installation of actual carrier equipment that accommodates structural tests and aircraft/arresting gear compatibility studies with all models of U.S. Navy carrier aircraft.

      “Shore-based testing allows our combined Navy/Northrop Grumman team to control test conditions before taking the aircraft to the ship,” said Matt Funk, Navy UCAS test team lead. “We are gradually building up to the maximum load conditions we expect to see during an arrested landing aboard an aircraft carrier.”

      “The entire system has performed very well across a large set of shore-based testing events including aircraft performance, flying qualities, navigation performance, catapult launches, and precision landings designed to stress system operation,” Engdahl said. “Our final carrier-landing software simulation shows excellent performance, flight test results are very good, and we are confident the X-47B will perform well on the ship.”

      The X-47B is a tailless, autonomous aircraft designed with unique features for an unmanned aircraft, such as carrier suitable landing gear and structure.While the X-47B itself will not be used for operational use, the UCAS-D program is developing a concept of operations and demonstrating technologies for use in follow-on unmanned carrier based aircraft programs.

      “This actual demonstration of the X-47B unmanned carrier operations is a first, essential step toward developing a carrier-based unmanned system for the U.S. Navy,” said Rear Adm. Mat Winter, who leads the Program Executive Office for Unmanned Aviation and Strike Weapons. “A carrier-based unmanned aircraft will increase carrier strike group relevance, provide opportunities for training and readiness cost avoidance and enable our future forward deployed carrier air wings to provide continuous intelligence, surveillance and reconnaissance capability.”

      Source: Defense-Update

      “Shore-based testing allows our combined Navy/Northrop Grumman team to control test conditions before taking the aircraft to the ship,” said Matt Funk, Navy UCAS test team lead. “We are gradually building up to the maximum load conditions we expect to see during an arrested landing aboard an aircraft carrier.” Photo: US Navy

        dozen organizations and agencies gathered at the Admiral Faye Gassama Naval Base in Dakar to explore maritime security issues as part of Exercise Saharan Express 2013. Photo: AFRICOM
        dozen organizations and agencies gathered at the Admiral Faye Gassama Naval Base in Dakar to explore maritime security issues as part of Exercise Saharan Express 2013. Photo: AFRICOM

        The US must increase its intelligence- gathering capacity in Africa 15-fold in the short term to counter the threat posed by regional Islamic extremist groups and maritime piracy, particularly in the Gulf of Guinea, according to a top US general. I-HLS Reports

        US Army Gen. David Rodriguez paid his first visit to the continent as head of US Africa Command (AFRICOM) this month, visiting the US Army base at Camp Lemonnier in Djibouti. The visit came as the US, Britain and some European partners consider plans to increase anti-piracy operations in the Gulf of Guinea while ramping up the training and equipping of West African partner armies to crack down more effectively on the maritime piracy crisis.

        General David M Rodriguez,  Commander, U.S. Africa Command
        General David M Rodriguez, Commander, U.S. Africa Command. Photo: AFRICOM

        According to Defense News security analysts say there is a possible link between piracy in the Gulf of Guinea and the financing of regional Islamist terrorist groups such as al-Qaida in the Islamic Maghreb (AQIM), Ansar Al Dine, Movement for Oneness and Jihad in West Africa (MUJAO), Boko Haram and the National Movement for the Liberation of Azawad, all of which operate in the wider Sahel desert region covering Nigeria, Mali, Niger, Algeria, Morocco and Mauritania.

        The Gulf of Guinea is a key international shipping lane off the Atlantic coast of West Africa and is considered one of the world’s most dangerous security zones due to a surge in maritime crimes such as piracy, robbery, hijackings, arms and narcotics smuggling, kidnappings and oil theft in the past three years. The “pirate zone,” which had been limited to territorial waters off the coasts of Nigeria and Benin, now covers the West African region from the Atlantic coast of the Democratic Republic of Congo in Central Africa up to Ivory Coast, according to the latest report from the International Maritime Bureau.

        Rodriguez said expanding the command’s ISR capabilities includes an urgent need for unmanned aircraft and more spy satellites for image collection over the continent.

        The US, Britain, Spain, France and Belgium have taken part in several regional maritime security and naval exercises and provided training for some African forces while leaving territorial water patrols to local forces. Concerned that money generated from piracy operations in the Gulf of Guinea could be used to finance terrorist groups, US defense officials are examining more practical ways of clamping down on piracy in West Africa.

        This year, naval and marine forces drawn from several African nations participated in the US-led Exercise Obangame Express 2013 in which naval specialists from Britain, France, Belgium, the Netherlands and Canada led training.

        Concerned by the spread of terrorism in the Sahel and piracy in the Gulf of Guinea, the US Army this year opened its first West African drone base in the capital of Niger, Niamey.

        From that base, Predators operate on intelligence-gathering and surveillance missions. Since 2011, when Sahelian terrorism became a serious threat, AFRICOM has evolved into a more offensive force, creating a special purpose Marine air ground task force to provide limited crisis-response capability and conduct counter­terrorism training on the continent.

        In line with its shift to more combat-oriented duties, AFRICOM has dedicated special operations units, including a rapid reaction force set up after last year’s Benghazi attacks.

        Source: i-HLS ISRAEL Homeland Security 


        The handset maker announced that its Knox-enabled mobile devices have been approved by the Pentagon for government use. Samsung’s Knox software offers high-level encryption, a VPN feature, and a way to separate personal data from work data. The software also enables IT administrators to manage a mobile device through specific policies.

        A little earlier , the Pentagon gave the same approval to BlackBerry devices with the BlackBerry 10 operating system, which translates into its Q10 and Z10 smartphones and Playbook tablets.

        In the past, BlackBerry was the only hand held with high-level security on its devices. But Apple and Android have begun carving out of a chunk of this lucrative market. Samsung in particular is aiming to muscle in on BlackBerry’s territory with help from its Knox software.

        The Pentagon approval means that the S4 and future Knox devices can be used by U.S. government and military departments that tap into the Department of Defense networks. Access to these networks requires high security standards, and the S4 is the first Android phone to meet the requirements, according to Samsung. For now, the Galaxy S4 is the only Samsung device equipped with Knox. But the company promises that other smartphones as well as tablets will receive the security software.

        The new security clearance also opens up certain types of businesses as potential new customers for Samsung.

        Samsung KNOX addresses platform security with a comprehensive three-pronged strategy to secure the system: Customizable Secure Boot, ARM TrustZone-based Integrity Measurement Architecture (TIMA), and a kernel with built-in Security Enhancements for Android (SE for Android) access controls.

        i-HLS ISRAEL Homeland Security 

        Royal Navy warship HMS Montrose fires a Harpoon anti-ship missile off the coast of Scotland. Photo: Crown Copyright
        Royal Navy warship HMS Montrose fires a Harpoon anti-ship missile off the coast of Scotland. Photo: Crown Copyright
        Royal Navy warship HMS Montrose fires a Harpoon anti-ship missile off the coast of Scotland. Photo: Crown Copyright

        The Royal Navy conducted a test firing of Harpoon anti-ship missile from HMS Montrose at the Scottish exercise areas in the Northern sea. HMS Montrose, a Duke Class Type 23 frigate is based at Devonport Naval Base, fired the Harpoon missile during a specialist training week following her participation in Exercise Joint Warrior – a multinational exercise off the coast of Scotland. One of the aims of the firing was to put into practice some of HMS Montrose’s pre-deployment training, prior to a seven-month deployment overseas this summer.

        Although this class of frigate was designed primarily for the anti-submarine warfare role, Montrose is now designated as a “general purpose frigate” and is fitted with a broad suite of the latest sonar, radar and communications systems. HMS Montrose carries a Lynx helicopter and Sting Ray torpedo. Air defence is provided by a Vertical Launch Sea Wolf weapon system. Surface armaments include the Harpoon missile and the 4.5inch gun for naval fire support.

        The missile is around 15ft long, about 1ft diameter and is launched from Type 23 frigates. A booster rocket helps launch the Harpoon before the turbojet then powers it along at Mach .9 – just under the speed of sound. Commanding Officer of HMS Montrose, Commander James Parkin, said: “Of all the times I have said ‘command approved’ in my career so far, it was this one that I enjoyed the most. A successful firing of our Harpoon missiles has proven that my professional team of highly trained sailors are at the top of their game, and that we are ready for any tasking that we are given.”


          INSS LogoBy Frank J. Cilluffo, Sharon L. Cardash, and  George C. Salmoiraghi
          INSSCyber Warfare Program

          19176446_sn many ways, deterrence in cyberspace is eminently more complicated than deterrence in the Cold War. The nature of the domain makes it so. Even the most sophisticated theories behind nuclear deterrence will prove inadequate for dealing with the complexities of a man-made domain with a virtually infinite number of constantly changing actors, motivations, and capabilities.” i-hls reports.

          Cyber threats pose a real and growing problem, and to date, United States efforts to counter them have lagged. While the ability to defend against an attack or intrusion must be maintained, the US, like any country, would be well served by deterring its adversaries from acting in the first place – at least when it comes to the most serious of actions, namely cyber warfare. Clearly not all hostile behavior can be deterred, but it is important to identify priorities in this regard and determine how best to address those that lead the list. Despite animated discussions, development of a grand unified solution has remained elusive, in part because the complexity and crosscutting nature of cyber deterrence requires a comprehensive and cohesive solution that encompasses stakeholders in both the private and public sectors.

          Cyber threats pose a real and growing problem, and to date, United States efforts to counter them have lagged. While the ability to defend against an attack or intrusion must be maintained, the US, like any country, would be well served by deterring its adversaries from acting in the first place – at least when it comes to the most serious of actions, namely cyber warfare. Clearly not all hostile behavior can be deterred, but it is important to identify priorities in this regard and determine how best to address those that lead the list. Despite animated discussions, development of a grand unified solution has remained elusive, in part because the complexity and crosscutting nature of cyber deterrence requires a comprehensive and cohesive solution that encompasses stakeholders in both the private and public sectors.

          In order to help structure the debate and advance toward the goal, we propose a framework that examines the issue critically and looks to dissuade, deter, and compel both state and non-state hostile actors. Placing potential threats into conceptual relief this way helps clarify the sources of danger and serves as a starting point for determining and attaching responsibility for hostile action(s) against a country or its allies. This then allows the relevant players who have been targeted by hostile actors to proceed with necessary discussions and action as both a precursor to, and actual execution of, appropriate and effective response measures. The rubric thus yields a further corollary benefit by aiding to identify areas that would benefit from or even require cooperation among affected/targeted entities. In short, this framework provides a starting point to explore ways to deter hostile actors, and as such offers a conceptual lens that can be of value to the US and its allies alike. Neither the range of actors nor their potential activities detailed below is meant to be exhaustive. It is instead a snapshot, and a rough one at that, intended to help convey a sense of who, what, how, why, and so on, as a prelude to a more in-depth discussion of strategy and policy in the area of cyber deterrence.

          State Actors

          Foreign militaries may engage in computer network attack/computer network exploitation (CNA/CNE) to limit, degrade, or destroy another country’s abilities, in furtherance of a political agenda. Foreign militaries are increasingly integrating CNA and CNE capabilities into their war fighting and military planning and doctrine. Such efforts have conventional battlefield applications (i.e., enhancing one’s own weapon systems and platforms, and/or stymieing those of others); and unconventional applications, as cyberspace extends the battlefield to incorporate broader civilian and societal elements. Cyber domain activity may cover intelligence preparation of the battlefield, to include the mapping of critical infrastructures of perceived adversaries.

          Foreign intelligence and security services: Exploits may include political, military, economic, and industrial espionage; theft of information from or about another government; or theft of intellectual property, technology, trade secrets, and so on in the hands of private corporations and universities. Many foreign intelligence services are engaged in industrial espionage in support of private companies.   Ultimate aims of activities by this actor category include the desire to influence decisions, and affect the balance of power (regionally, internationally, and so on). Convergence of human and technical intelligence is especially notable in this category, and includes the “insider” threat.

          Hybrid aspects: Elements of state capability may be integrated to achieve a whole that is greater than the sum of its parts. Alliances (state-to-state) may be invoked for a similar effect. Joint activity in this respect may include collection of information, sharing of findings obtained by a single party, and joint execution of field operations (attacks). States may also seek and enlist the assistance of non-state actors, such as hackers for hire who do not feel bound or restricted by allegiances.

          Non-State Actors

          Non-state terrorist organizations may conduct CNA/CNE in furtherance of a specific political agenda. They place high value on the internet (to recruit, train, fundraise, plan operations, and so on).    US and allied counterterrorism efforts yielding success in the physical world may lead al-Qaeda and their ilk to enter the cyber domain ever more deeply. The latter might try to learn lessons from (or even “surf” in the wake of) the actions of “Anonymous” and other “hacktivists” who use the cyber domain to bring attention to the cause they espouse.

          Non-state criminal enterprises, which include theft of intellectual property, identity, and the like, as well as fraud, are generally motivated by profit. Cyber-specific tools and techniques can yield major monetary rewards. The global cybercrime market was valued at $12.5 billion-plus in 2011,  though estimates vary (validity of calculation methodologies and impartiality of certain sources is debated and empirical evidence is difficult to obtain).

          Hybrid aspects: Alliances of convenience are possible among non-state actors (terrorist and criminal groups, and even individuals) to fill capability gaps, generate force multiplier effects, and so on. Similar arrangements of mutual convenience are also possible between state and non-state (terrorist, criminal, lone hacker) entities; a non-state actor serves to expand a state’s skills and capabilities, or acts as a state’s proxy for other purposes. Such arrangements further compound the attribution challenge (who is responsible) and provide for additional plausible deniability.

          Against deterrence in the nuclear realm, the cyber  counterpart bears both similarities and differences. The cyber domain in particular demands a focus on actors, rather than weapons/capabilities alone; hence prioritizing these actors according to the scope, scale, and nature of the threat that they pose is critical. Only after racking and stacking them can we focus on the actors that matter most, and do so in a way that confronts and neutralizes their specific intentions and capabilities.

          Defense and offense are both crucial components of a multilayered and robust US posture and strategy designed to ensure national safety. Deterrence can provide an additional layer of protection by preventing those with interests inimical to the United States from leaving the starting blocks. To preserve as well as further national/homeland security, it is therefore important to think through, develop, and sustain over time in a quickly evolving (technological and security/defense) ecosystem the requisite US capabilities and capacities to support the country, credibly and effectively, in standing ready and being able to dissuade, deter, and compel its adversaries. While concerted efforts directed toward these ends should be pursued in parallel with committed efforts to defend systems, such an approach and stance must not be taken as a substitute for building and maintaining strong additional means of reconstitution that give rise to strong resilience. Indeed, resilience itself may be a powerful deterrent. Reflecting the wisdom of Sun Tzu, the capacity to bounce back after an incident plus the demonstrated will and ability to respond to a cyber attack should serve to strengthen US deterrence efforts and thereby avoid battle and bloodshed: “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.”

          Contours of the Cyber Threat

          The United States and its interests are under daily cyber threat from both state and non-state actors. Potential US targets are many and varied, and extend to critical sectors such as water, power, finance, and telecommunications. According to press reports citing a spokesman for the National Nuclear Security Administration, the US “Nuclear Security Enterprise experiences up to ten million ‘security significantevents’ each day.” Tallies of the Department of Homeland Security reveal tens of thousands of cyber intrusions (actual/attempted) each year, and dozens of attacks on critical infrastructure systems – the latter total increasing by several orders of magnitude from 2010 to 2012. The range of senior officials, past and present, who have sounded the alarm bell is striking, and includes Assistant to the President for Homeland Security and Counterterrorism John O. Brennan; Director of the National Security Agency and Commander of US Cyber Command General Keith Alexander; former Homeland Security Secretary Michael Chertoff; former National Coordinator for Security and Counterterrorism, and former Special Advisor to the President for Cyber Security, Richard Clarke; the Chairman of the Senate Homeland Security Committee, Senator Joseph Lieberman; ranking member on the Senate Armed Services Committee, Senator John McCain; and FBI Director Robert Mueller, who recently predicted that the cyber threat will in the future displace terrorism as the top threat to the country.

          One commentator noted vividly, “Foreign spies and organized criminals are inside of virtually every U.S. company’s network. The government’s top cybersecurity advisors widely agree that cyber criminals or terrorists have the capability to take down the country’s critical financial, energy or communications infrastructure.” Yet in addition to suffering monetary losses that the Office of the National Counterintelligence Executive and other US officials number in the billions due to computer network exploitation in the form of backdoor theft of valuable intellectual property, the country is taking a more ominous hit as the subject of adversarial efforts to engage in the cyber equivalent of intelligence preparation of the battlefield – including China’s mapping of critical US energy and water supply infrastructures, which could later be leveraged so as to deter, dissuade, or compel action on the part of the United States.

          Critical industries in other countries have experienced cyber attacks. Saudi Aramco (state owned and “the world’s biggest oil producer”) saw a virus of external origin infect roughly 30,000 of its computers in August 2012. Shortly thereafter Qatar’s RasGas (“the second largest producer of liquified natural gas in the world”) was also hit. Newspaper reports suggest that the “French nuclear power group Areva was the target of a cyber attack in September [2011].” And the list goes on.

          While countries possess abilities of varying degrees and sophistication, dozens are expanding their cyber capabilities, including the United States and its allies (Israel is a prime player in this domain). Vis-à-vis the United States, China is a key source of “advanced persistent threats,” though state sponsored fingerprints are not always evident on the mouse or touch screen.

          Attribution is all the harder when there is a substantial delay between the event and the victim’s report or request for assistance. Evidence of Chinese intent, though, has existed for more than a decade: in 1999, two Chinese army colonels published a book titled Unrestricted Warfare, which highlighted alternative means to defeat an opponent, distinct from traditional direct military action.

          Russia too is a sophisticated and determined adversary in the cyber domain. In the 2008 conflict between Russia and Georgia, Russia attacked and disrupted Georgia’s communications network. As Ambassador David Smith observes, “Russia has integrated cyber operations into its military doctrine”; though “not fully successfulRussia’s 2008 combined cyber and kinetic attack on Georgia was the first practical test of this doctrine… [and] we must assume that the Russian military has studied the lessons learned.” In 2007, Estonia’s government, banks, and other entities were also the target of “large and sustained distributed denial-of-service attacks (DDoS attacks)many of which came from Russia.” Hackers and criminals based in Russia have made their mark. Cyberspace has proven to be a gold mine for criminals, who have moved ever more deeply into the domain as opportunities to profit there continue to multiply. The value of the global cybercrime market in 2011 has been pegged at over $12.5 billion, with Russia’s slice of the pie being $2.3 billion (close to double of its absolute value compared to the prior year). There are indications, moreover, that the forces of organized crime in the country have begun to join up “by sharing data and tools” to increase their take.

          The potential for cooperation between and among actors with substantially different motivations is of serious concern. For instance, states that lack indigenous capabilities but wish to do harm to the United States or its allies may co-opt or simply buy/rent the services and skills of criminals and hackers to help design and execute cyber attacks. Do-it- yourself code kits for exploiting known vulnerabilities are easy to find, and even the Conficker worm (variants of which still lurk, forming a botnet of approximately 1.7 million computers) was rented out for use.

          Thus, lack of access to the infrastructure or backing of a powerful state is not prohibitive. Proxies for cyber capabilities are available. There exists an arms bazaar of cyber weapons. Adversaries do not need capabilities, just intent and cash. This is a chilling prospect, bearing in mind that al- Qaeda has called for electronic mujahidin to attack the US government and critical US infrastructure. Rear Admiral Samuel Cox at Cyber Command noted that al-Qaeda operatives are actively pursuing the means to attack US networks, a capability that they could buy from criminal hackers. In addition, cyber capabilities (however acquired) may be used as a force multiplier in a conventional attack.

          Other notable actors of concern in this context include North Korea and Iran. What both of those countries may currently lack in capability they make up for in abundance of intent. Iran is investing heavily to expand and deepen its cyber warfare capacities. The country has also long relied on proxies such as Hizbollah, which now boasts a companion organization called Cyber Hizbollah, to strike at perceived adversaries. Law enforcement officials note that Cyber Hizbollah’s goals and objectives include training and mobilizing pro-regime (meaning pro-government of Iran) activists in cyberspace. In turn and in part, this involves schooling others in the tactics of cyber warfare. Hizbollah is deftly exploiting social media tools such as Facebook to gain intelligence and information. Each such exploit generates additional opportunities to gather yet more data, as new potential targets are identified, and tailored methods and means of approaching them are developed.

          In addition, elements of Iran’s Revolutionary Guard Corps (IRGC) have openly sought to pull hackers into the fold. There is evidence that at the heart of IRGC cyber efforts one will find the Iranian political/criminal hacker group Ashiyane; and the Basij, who are paid to do cyber work on behalf of the regime, provide much of the manpower for Iran’s cyber operations. In the event of a conflict in the Persian Gulf, Iran could combine electronic and computer network attack methods to degrade US and allied radar systems, complicating both offensive and defensive operations of the US and its allies. In Hizbollah’s own bid to deter, moreover, Hizbollah leader Hassan Nasrallah has stated publicly that there will be no distinction drawn between Israel and the United States in terms of retaliation, should Israel attack Iran to halt its progress toward a nuclear weapons capacity: “If Israel targets Iran, America bears responsibility.”

          In sum, states are exploiting cyberspace to advantage, furthering their own interests by gathering information, gaining the ability to degrade the capabilities of perceived adversaries, and so on. Non-state actors, terrorists, and criminals are also leveraging cyberspace to their own ends, benefiting from a domain that levels the playing field and allows smaller and even individual actors to have a disproportionate impact. This asymmetry gives rise to an ecosystem that is fraught with a range of perils that did not previously occupy the focus and energies of major powers. Hence the concerns of the major powers, for the impact of certain scenarios raised above could significantly undermine, if not shatter, trust and confidence in the system (be it American or another).

          Nor is the threat unique to the United States. Asymmetric warfare is of course one of the defining features of the Israeli experience on both the kinetic and virtual battlefields. Consider also other (arguably) lesser known casualties of the cyber struggle. As outlined by the Office of the National Counterintelligence Executive in its 2011 Report to Congress:

          Germany’s Federal Office for the Protection of the Constitution (BfV) estimates that German companies lose $28 billion-$71 billion and 30,000-70,000 jobs per year from foreign economic espionage. Approximately 70 percent of all cases involve insiders.

          South Korea says that the costs from foreign economic espionage in 2008 were $82 billion, up from $26 billion in 2004. The South Koreans report that 60 percent of victims are small- and medium-sized businesses and that half of all economic espionage comes from China.

          Japan’s Ministry of Economy, Trade, and Industry conducted a survey of 625 manufacturing firms in late 2007 and found that more than 35 percent of those responding reported some form of technology loss. More than 60 percent of those leaks involved China.

          Observations by French Senator Jean-Marie Bockel, recorded in an “information report” of France’s Senate Committee on Foreign Affairs, Defence and Armed Forces, are equally striking:

          In France, administrative authorities, companies and vital service operators (energy, transport, health, etc.) are victims daily of several million cyber attacks.These cyber attacks may be carried out by computer hackers, activist groups, criminal organisations, as well as by competitor companies, or even by other States. The finger of suspicion often points towards China or Russia, even if it is very difficult to identify the authors of these attacks precisely.

          So too the assessment of Jonathan Evans, Director General of the United Kingdom’s Security Service:

          Britain’s National Security Strategy makes it clear that cyber security ranks alongside terrorism as one of the four key secu- rity challenges facing the UK. Vulnerabilities in the internet are being exploited aggressively not just by criminals but also by states. And the extent of what is going on is astonishing – with industrial-scale processes involving many thousands of people lying behind both State sponsored cyber espionage and organised cyber crime….One major London listed com- pany with which we have worked estimates that it incurred revenue losses of some £800m as a result of hostile state cyber attack – not just through intellectual property loss but also from commercial disadvantage in contractual negotiations. They will not be the only corporate victim of these problems.

          Evans has reasoned further as follows:

          So far, established terrorist groups have not posed a signifi- cant threat in this medium, but they are aware of the potential to use cyber vulnerabilities to attack critical infrastructure and I would expect them to gain more capability to do so in future.

          The necessary question is, therefore, what should be done.

          Cyber Deterrence and Multidimensional Response

          Given the manifold and disturbing evidence of cyber capability and hostile intent on the part of both state and non-state actors, the United States must carefully chart and craft a way forward that comes to terms powerfully and proportionately with the facts and realities of concern that characterize the cyber domain today (and are unlikely to disappear any time soon). It would be false comfort to think that the US or its allies can firewall a way out of this problem. Instead, and in order to help shore up both cyber security and the protection of critical infrastructure, the US should formulate, articulate, and implement a cyber deterrence strategy.

          A spirited but embryonic policy debate on the subject has already been held in certain select quarters, yet the complex, cross-sector, and multidisciplinary nature of the challenge has so far rendered a strategic, integrated response out of reach. Threats are evolving daily, adding an extra layer of complication, and notwithstanding the pace and volume of the threat stream, information about threat vectors is often not shared across sectors or made public. At the level of principle, this reticence is certainly not beyond reason, as government seeks to protect classified material and industry seeks to protect proprietary information. In practice, though, such reluctance throws sand in the gears of response as well as prevention efforts.

          Against this background the scale of the task is admittedly daunting, but the United States would be well served to elaborate and execute a cyber deterrence strategy and policy that seeks to dissuade, deter, and compel, both as a general matter and in a tailored manner that is actor/ adversary-specific. A solid general posture meaning basic security steps (protection, hygiene, technology), could serve as an 80 percent solution, neutralizing the majority of threats before they manifest fully. This would free up resources (human, capital, technological) to focus in context- specific fashion on the remainder, which constitute the toughest threats and problems, in terms of their level of sophistication and determination. To make such recommendations operational, lines in the sand or, in this case the silicon, must be drawn. Preserving flexibility of US response by maintaining some measure of ambiguity is useful, so long as parameters are made clear by laying down certain markers or selected red lines whose breach will not be tolerated.

          To effectively deter an individual or entity and thereby prevent it from accomplishing its goal – or ideally, prevent it from acting in the first place – it is imperative to understand fully just what the initiating party hopes to achieve. (The idea is a variation on the theme/principle of noted strategist Miyamoto Musashi: “Know your enemy, know his sword.”) This foundational understanding constitutes the first step to dissuade or compel one’s adversary; and taking that step requires examining the situation through the eyes of the other. While bearing in mind that all of the sources of threat referenced above are exploring and exploiting information and systems via cyber means, these various actors have different and distinct objectives. Though using virtual means in a virtual medium, each such actor is after specific real world results and seeks to collect (or worse) from its target(s) accordingly.

          What must the United States do to convince state actors not to engage in computer network exploitation or computer network attack through their military and intelligence services in furtherance of broader goals? Here the US cyber response should be an outgrowth of its broader deterrence strategy relative to a given actor, meaning that the cyber deterrence component should be consistent with and complementary to any preexisting, broader US deterrence strategy for that player. Other countries need to understand and appreciate that the United States can and will impose a proportionate penalty if attacked in a cyber manner and medium, though US response may ultimately be cyber or kinetic, with all options on the table. Regarding cyber response, offensive capability must be demonstrated in such a way as to leave no doubt as to the consequences of breaching a US red line. Such demonstration, however, must be undertaken with full recognition of the fact that any tool, technique, tactic, or procedure employed could subsequently be taken up, tweaked, and used in turn in retaliation, including against allies. Response in this context is predicated on the ability to attribute an attack to one or more specific actors (foreign powers).

          On the intelligence side, since their inception states have been engaged in stealing secrets. Though espionage has gone digital, taking and adapting the world’s second oldest profession to the twenty-first century, foreign governments are using cyber means for the original purpose: to obtain information that can be used to shape and sharpen decision making. Put another way, states are using cyber means (think of Russian and Chinese hackers working in service of their governments, for example) to augment their ability to collect information of interest to their respective policymakers. The question then becomes, what information are these actors interested in obtaining, and why? To the extent that practitioners of cyber deterrence can inject insights and articulate a detailed answer to this double-barreled query, the targeted government (be it US or allied) will be able to defend systems better and tailor deterrence activities correspondingly.

          Industrial espionage is a subset of this type of state sponsored activity. The intent is to increase the economic prosperity or viability of business concerns in a given state. Although the espionage activity is state directed, the ultimate beneficiaries may be private or semi-private entities. On the flip side, from the target’s perspective, the consequences that follow from the theft of trade secrets may be profound and extend beyond economic loss, to diminished national stature in the eyes of the world. In the assessment of US National Counterintelligence executive Robert “Bear” Bryant, cyber-espionage is “a quiet menace to our economy with notably big results….Trade secrets developed over thousands of working hours by our brightest minds are stolen in a split second and transferred to our competitors.”

          US productivity and innovation may also suffer as a result, with further potential knock-on effects for future growth and development. If military relevant information is exposed and extracted, there may also be national security implications. It takes little imagination to conjure up what a hostile party could do, for example, with stolen US technology that holds potential military application.

          Much like states, transnational terrorist organizations seek an asymmetric advantage that they can leverage in trying to enact their desired political agenda. By and large, however, such groups possess fewer resources than states, and have largely eschewed engaging in the political process, favoring instead the use of violence to achieve their aims. From this standpoint it would not be much of a stretch for terrorists to seek more bang for their buck, by turning to digital means as a force multiplier for kinetic action. The more detail that can be learned and discerned about these groups’ tactical cyber and strategic political objectives and aspirations, the more helpful fodder there will be for crafting a cyber deterrent that thwarts them.

          The forces of terror and crime may also converge, merging into a hybrid threat founded on an alliance of convenience, in which each party draws on the other’s skills and assets to further their respective ends. Contrary to their non-state counterparts whose mainstay is crime alone, pure and simple profit is not what makes terrorist groups tick. This difference in kind actually presents an opening of sorts, which could be exploited through skillful exposition and execution of a tailored cyber deterrence strategy.

          Recall that deterrence is a subset of coercion that seeks to cause an adversary to refrain from acting by influencing its belief that the likelihood of success is slight, or that the pain from the response is greater than it is willing to bear. Historically, deterrence has been taken to require “three overt elements: attribution, signaling, and credibility.” In present context, deterrence presupposes that the contours of US red lines are made clear to its adversaries as well as its allies; that it has signaled that breaches of these boundaries will not be tolerated; and that it can and will visit consequences for any such breach upon the party that trespasses. The expected US reaction should be sufficiently threatening to the potential perpetrator to dissuade it from undertaking the activity in the first place.

          When defining US red lines in cyberspace, substantial forethought and caution must be exercised, bearing in mind that activities that approach but do not cross these lines will, as a corollary of boundary definition, be considered from a less punitive perspective. Activities that do not have an otherwise benign purpose, such as efforts to map US critical infrastructure, should be assessed accordingly. Nothing good can come when a foreign country or non-state actor has intimate knowledge of these systems.

          Attribution is crucial to underpin deterrence. One must know who has acted in order to visit consequences upon them. However, it is hard to find a smoking keyboard in cyberspace since the domain is made for plausible deniability. The magnitude and significance of the attribution challenge in the context of cyber attack response has been underscored by prominent analysts, though a contrarian strain does exist. Difficulty aside, being able to attach the action to the actor enables the aggrieved party to react. The possibility of response in kind increases the number of options that a targeted entity can draw upon after the fact, which could include the potential to give better than the original target may have gotten. Concerted effort directed towards developing improved attribution capacities through technological and other means are time and resources well spent.

          So too must adversaries understand and appreciate that the United States stands poised to use the full spectrum, breadth and depth, of its powers to enforce these rules. To credibly convey that message and have it hit home with those who bear hostile intent, there must be a public display of capabilities that is sufficient to make the point, without exposing so much that the display becomes self-defeating because it gives away the store, by permitting adversaries, for example, to reverse engineer (or otherwise mimic) and use the very US means and methods that are on display. The “display” aspect of the exercise is made even trickier by the fact that the laws governing cyber warfare are still nascent, evolving, and thus to some extent unclear. Caution and proceeding with care are therefore warranted on a second level as well.

          Although the United States must demonstrate that it has in its toolkit the requisite items for use against hostile parties when necessary, there has not been a clear cut public demonstration of cyber dominance to date for which the US has definitively taken and actively sought ownership.

          Against this background, should the United States consider engaging in the digital equivalent of an above-ground nuclear test? This is a question for US policymakers, practitioners, and technologists alike, as they seek to define a path forward and elaborate both doctrine and strategy for the cyber domain. The ironic possibility that if conducted with care (commensurate to the enormity of the exercise) the cyber equivalent of such a test may be instrumental to deterring hostile actors and thereby preclude a fight is not to be dismissed out of hand.

          Building Stability through Strength

          It is sometimes said that the best defense is a good offense. According to open source reports, the United States is developing rules of engagement regarding cyber attacks, and the Defense Department is seeking to bolster its arsenal of cyber weapons (though a cyber attack may engender a cyber or kinetic response). As former Vice Chairman of the Joint Chiefs of Staff General James E. Cartwright has observed, efforts and investments of the type just described would help recalibrate the defense to offense ratio – which until relatively recently stood at 90 percent to 10 percent in favor of defense  – and would strengthen and build credence in the US ability to deter effectively adverse action in the cyber domain.

          However, the US cyber security community, like its allied counterparts, remains a work in progress. In the US in particular, the community still has a long way to go before it reaches the level of skill and maturity now displayed by the US counterterrorism community. The synchronization of Titles 10 and 50 of the United States Code, harmonizing military and intelligence functions, has been a major post-9/11 breakthrough that significantly enhanced the US overall ounterterrorism posture. The US can leverage this achievement by tailoring and applying the concept to the cyber context, bearing in mind the (yet-to-be-met) twin challenges of codifying rules of engagement and pursuing a more proactive stance.

          To move forward smartly in the cyber domain, the United States and its allies must demonstrate leadership and possess vision, together with a sound plan of action. For too long, incidents have driven strategy – in effect, tactics masquerading as strategy. While the United States possesses some unique capabilities, these capabilities will not be used to fullest advantage unless and until there is a broader strategic framework in which to embed them. Building on the conceptual framework set out above, certain key tenets emerge that can serve as a foundation for developing and enacting an effective cyber deterrence strategy, capacity, and posture. Those tenets, the beginnings of a blueprint for cyber deterrence, are as follows:

          Calibrate to meet the mission. Capability supports credibility in this context. To the extent that investments and efforts may reflect a defense to offense ratio that suggests an imbalance that could negatively impact on homeland/national security, the existing calibration should be considered carefully and adjusted as necessary. As a prerequisite to imposing consequences, calibration (or recalibration) goes hand in hand with the political will to act, when called upon, to impose sanctions.

          Start and build from a position of strength. To deter or dissuade successfully requires the capacity to convince potential adversaries that the costs of hostile action will exceed the perceived benefits. Developing and signaling the existence of a first strike capability is therefore fundamental.

          Put the accent on speed, surprise, and maneuverability. Nanoseconds can make a difference in cyberspace. Response in close to real time should therefore be the goal. While there should be no doubt about the principle that any breach of red lines will incur consequences, there is value in maintaining a measure of ambiguity about the precise nature of those consequences, so as to keep the object looking constantly over its shoulder. Flexibility plus clarity may seem a non sequitur, but in fact is strategically prudent here.

          Leave no person behind. A first strike capability alone would leave the country vulnerable to and unprepared for a response in kind, should the adversary possess such capacity. As in the Cold War stage of the nuclear era, both prudence and forethought mandate a second strike capability to ensure force protection. Maintaining dominance in science and technology is crucial, since there are technical solutions to even vexing challenges in the cyber domain.

          Know thy adversary. The maxim may be worn and tired, but it still applies. To defeat potential adversaries, a deep understanding of the particular aims and aspirations of each is needed. This insight should then inform the strategy and tactics for that case, allowing these elements to be tailored to a specific opponent, thereby maximizing the potential to thwart them. The so-called “OODA loop” – observe, orient, decide, and act – applies.

          Lead by example. Implicit in the idea of robust cyber deterrence is the presupposition that the entity poised to deter has inoculated itself against that which it may visit upon others (since the possibility of blowback exists). To proceed differently is to jump off the plane without a parachute. The US government should therefore strive to place its own house in order as a crucial corollary to meeting the threat. Moreover, the government should initiate the steps needed to facilitate information sharing so that critical facts reach all key defenders of national assets and resources, including those owned and operated by the private sector (critical infrastructure).

          Partner for success. No single component of government or even the government as a whole can go it alone in the cyber domain. Genuine intra- and cross-sector partnerships are essential. Within government, for example, the careful synchronization and harmonization of military and intelligence functions (Titles 10 and 50) for cyber deterrence purposes could prove valuable, as it has in the counterterrorism context. The importance of inoculating ahead of time extends beyond the public sector to critical networks and systems that lie in private hands. Accordingly, the private sector must commit to undertake the steps necessary to reinforce homeland/national security. To ensure that bar is met, federal authorities should reach out to the private sector, taking a carrot and stick approach that combines both positive and negative incentives designed to produce the desired outcome.

          Think and act internationally. Transnational challenges require transnational solutions, and cyberspace is by definition borderless. Trusted partners on the international level can and should bring much to the table in this context. Admittedly, national interests may impede the ability to share the most sensitive of data and information. Nevertheless, it would be self-defeating to refrain from leveraging key bilateral relationships and alliances, from the “Five Eyes” intelligence partnership (Australia, Canada, New Zealand, the United States, and the United Kingdom) to NATO to the EU plus other strategic partners such as in the Mediterranean region and Asia, to include Israel, Singapore, India, and Japan.

          With inspired leadership – the cyber warfare equivalents of Billy Mitchell, Bill Donovan, or George Patton, who truly understood the tactical and strategic uses of new technologies and weapons – the United States can forge and execute a powerful cyber deterrence strategy that looks through its adversaries’ eyes in order to be adequately prepared for cyber events, ideally with just bits and bytes rather than bullets, bombs, and bloodshed.

          INSS Cyber LogoFrank J. Cilluffo is director of the George Washington University Homeland Security Policy Institute (HSPI) and co-director of GW’s Cyber Center for National & Economic Security (CCNES). Sharon L. Cardash is associate director of HSPI and a member of CCNES. George C. Salmoiraghi is an attorney and advisor to HSPI in Washington, D.C.

          This article was first published in Military & Strategic Affairs journal. Volume 4, issue 3.

          To read the full article, press here (link):

          A Blueprint for Cyber Deterrence – Building Stability through Strength


            ISDEF 2013

            Positioned to be the largest defense expo in Israel, the 6th edition of ISDEF defence and security exhibition has become a summit of business and defence. Taking place in Tel Aviv exhibition center in June 4-6, 2013 the event is expected to host 250 exhibiting companies and 15,000 visitors from 60 countries. As a media sponsor, Defense Update will publish a daily coverage of the show highlights and featured products and companies. If you exhibit at ISDEF and would like to add your company or product please contact us.

            Israel is a high potential target market for defense and security and ISDEF has positioned itself as a leading international defence, highlighting the country’s security technologies to foreign visitors and introducing international solutions to the lucrative Israeli market.

            Despite global budgetary restraints and economic uncertainty, the need for defence and security is constant.  This has led to an increase in the number of cooperation agreements and joint ventures between local and foreign defence and security companies. Israel is one of the leading countries to use this joint venture commercial logic, which has become a vital condition to guarantee continued defence industry profitability. This has lead to the creation of established ties of joint production and R&D with companies from many countries.

            In addition to the exhibition, the summit will highlight five professional events and seminars including:

            Civil Security: Financial and municipal leaders will share their ideas and policies for disaster events, discussing economic recovery and emergency response, resilience and continuity of services. This conference is held by the head of Israel’s Civilian Security.

            Negotiation in the war Against Terror: This conference aimed at SWAT negotiating teams, will analyse the changes in strategies, the logic of action and tactics implemented by modern terror and discuss the changes required in negotiation tactics.

            i-hls Big Data Fusion (BDF): This conference will focusing on Israel’s approach to BDF in the defence & HLS arena.

            Israel’s International CBRNe and C-IED: The conference focus on the Israeli approach to CBRNe and C-IED defense, discussed by CBRN First Responders from Israel and the USA, IDF CBRN Special Forces, Israeli and US Government Officials, US Army, UN and more.

            i-hls Video Data Analytics: Focusing on the Israeli approach to video and visual information in the HLS market.

            THis year ISDEF is also introducing the ‘New Innovations Pavilion’, a new themes highlighting the roles of small and medium companies (SME), enterprises which play a pivotal role in the economic development of all countries worldwide, are an indispensable part of the industrial supply chain. It is a preference of OEMs and Prime Contractors to work with SME’s because of their innovative capabilities, flexibility, and lower costs. “Our purpose at ISDEF is to highlight cooperation and innovative technology that has been implemented in defence and security projects” said Neil Margolius International Relations executive at ISDEF.

            One of the attractions at ISDEF will be the live demonstration area, both indoor and outdoor. 74 Sqm of space has been reserved and designed to replicate different combat zones, incorporating a variety of terrain and objects including desert, vegetation, evacuated building, car, gate, etc.

              Marine grade panel PC. Photo: AIS.

              American Industrial Systems (AIS) has launched a new line of marine PCs which come with rugged touch screen interface. the new touch PCs are designed to withstand the harsh maritime environment, has long-term vibration resilience and low sensitivity to electromagnetic interference (EMI). The new touch PCs are suitable for bridge control display, navigation, monitoring and ship automation applications.

              These marine PCs also offer a range of industrial features such as optional optical bonding, wide view angles, and full range dimming. The touchscreen panel is fully integrated with the computer to reduce system integration costs and minimize required footprint. Full support is provided for wide range of panel resolutions in order to meet the specific requirements of many different marine applications. AIS professional high quality design provides marine users with reliable, cost-efficient, and ready to run solutions. AIS COTS rugged marine display computers are offered in screen sizes 10.4”, 12.1”, 15”, 17”, 19” and 24”.

              The new line complies with marine equipment IEC 60945, DNV 2.4, and IACS-E10 standards defining maritime navigation and radio communications equipment and systems. According to AIS, their marine computers are DNV certified for a range of extreme conditions including temperature, humidity, vibration, EMC compatibility and enclosures; with environmental ratings for enclosures based on NEMA 4, 4X, IP65, IP67 type for degree of protection against falling dirt, rain, windblown dust, splashing water, hose-directed water, and corrosion.

              Our Community: