ARSTRAT IO Newsletter

advertisement
Information Operations
Newsletter
Compiled by: Mr. Jeff Harley
US Army Strategic Command
G39, Information Operations Division
The articles and information appearing herein are intended for educational and non-commercial purposes to promote discussion of research in
the public interest. The views, opinions, and/or findings and recommendations contained in this summary are those of the original authors and
should not be construed as an official position, policy, or decision of the United States Government, U.S. Department of the Army, or U.S.
Army Strategic Command.
Table of Contents
ARSTRAT IO Newsletter on OSS.net
Page 1
Table of Contents
Vol. 9, no. 07 (30 January – 10 March 2009)
1.
NATO’s Cyber Defence Warriors
2.
CAC-CDID Completes Transition to Objective Model
3.
Electronic Warfare Proponent: Changes by Adversaries, Advances in Technology Drive EW's
Operational Importance
4.
Army Creates Electronic Warfare Career Field
5.
Tinker Airmen Deploy With Bomb-Jamming Radio Device
6.
Wireless Electricity Is Here (Seriously)
7.
German Federal Armed Forces Develop Secret Cyberwar Troop
8.
Der CyberKrieg
9.
National Defense in Cyberspace
10. U.S. Spy Agency May Get More Cybersecurity Duties
11. New Cyber-Threats -- Part 1
12. Northrop Grumman Begins Study of Electronic Warfare System of the Future
13. Tactical Success, Strategic Defeat
14. Tactical Success, Strategic Defeat (Updated)
15. Taking the “D’oh!” Out of Operational Security
16. Colonies of 'Cybots' May Defend Government Networks
17. America's Wired Warrior
18. Behind The Estonia Cyberattacks
19. Do Journalists Make Good Public Affairs Officers?
20. Army Developing Teams for Electronic Warfare
21. Public Diplomacy in the Digital Age, Part 2
ARSTRAT IO Newsletter on OSS.net
Page 2
NATO’s Cyber Defence Warriors
By Frank Gardner, BBC News, 3 February 2009
Nato officials have told the BBC their computers are under constant attack from organisations and
individuals bent on trying to hack into their secrets.
The attacks keep coming despite the establishment of a co-ordinated cyber defence policy with a
quick-reaction cyber team on permanent standby.
The cyber defence policy was set up after a wave of cyber attacks on Nato member Estonia in
2007, and more recent attacks on Georgia - so what are they defending against and how do they
do it?
Tower of Babel
Nato's operational headquarters in Mons is a low, drab three-storey building - part of a sprawling
complex set in rolling farmland south of Brussels.
The blue and white flag of the 26-nation alliance flutters in the cold breeze alongside the spangled
banner of the EU.
Inside the canteen it is like a Tower of Babel with almost every language of Europe competing to be
heard above the clatter of trays and dishes.
Our escort, a German army officer in immaculate uniform, leads us down a corridor to a hushed
room where 20 or so military analysts sit hunched over computers; their desert boots and
camouflage fatigues strangely out of place for a windowless room in Belgium.
This, explains Chris Evis, is the Incident Management Section, which he heads.
"We face the full gamut of threats. It varies from your kiddie who's just trying to gain street cred
amongst his friends to say he's just defaced a Nato system to more focused targeted attacks
against Nato information".
Cyber attacks are not new - websites were being hacked into and brought down during the Kosovo
war 10 years ago.
But when Estonia came under sustained cyber attack from Russian sympathisers in 2007, the
alliance realised it needed a proper cyber defence policy and fast.
Suleyman Anil, a Turkish IT expert from the Nato Security Office is the man driving much of that
policy.
"Estonia was the first time, in a large scale, [that we saw] possible involvement of state agencies;
that the cyber attack can bring down a complete national service, banking, media... the other
particular trait everyone is struggling to deal with... is lots of cyber espionage going on".
Mr Anil reveals that there has been more than one incidence of Nato officials being socially profiled,
and then subjected to "targeted trojans".
He explains how their unseen adversaries gather as much information as possible about the
individual then send them an email purporting to come from a friend or a relative.
Trojan horse
If they open the attachment then a sophisticated "worm" or "trojan" can, in theory, take over their
computer, scan its files, send them on, delete them, or perhaps most damagingly, alter them
without the user knowing.
This sort of activity goes on every day in the commercial world but for a military organisation like
Nato there are obvious risks.
Chris Evis is at pains to point out that any material classified as "secret" is transmitted only
internally, by secure intranet, rather than using the world wide web.
But what happens, I ask, when someone mistakenly sends secret material over the internet?
Page 3
The answer, it seems, is sitting in the corner of the room.
An Italian sergeant, who looks young enough to still be at school, is painstakingly scanning emails
that have been automatically quarantined because they contain buzzwords like "Nato secret".
A glance over his shoulder reveals emails to and from Sarajevo, Baghdad and Kabul, evidence of
Nato's newly expanded horizons.
They look innocuous enough and most of the time, explains the sergeant, it is a false alarm but
sometimes even quite senior officers have transgressed and they get a serious talking to about
online security.
Serious threats
When it comes to cyber espionage, Nato officials refuse to say who they think is behind the
attacks, in fact our escorts can hardly wait to steer us off the subject.
Even if they were certain that they were originating, say, in China or Russia, it would be very hard
for them to prove, so tortuous is the trail in cyberspace.
Instead, Chris Evis is happy to talk about how the threat is being tackled, explaining that they have
a number of analysts who are constantly reviewing information, looking for the more serious
threats.
"We have [about] 100 sensors at the moment deployed at something close to 30 different sites
across the Nato countries... one of these sensors could be on the east coast of the United States,
one could be in London, one could be in Iraq and a number of them could be in Afghanistan. All
that information is simultaneously feeding back to us at the centre here."
So is cyber warfare the future of warfare?
Chris Evis says he believes it will be a factor within any future conflict.
"I think the gravest cyber threat to Nato is somebody altering the data without our knowing about
it and [our] finding out too late in the action," he says.
"So when it's quiet it's probably too quiet, because there's always activity out there."
Table of Contents
CAC-CDID Completes Transition to Objective Model
By Christopher L. Kessel, Capability Development Integration Directorate, Leavenworth Lamp, 5 February 2009
A little less than one year after the Combined Arms Center commanding general approved its
formation, the Combined Arms Center - Capability Development Integration Directorate completed
the final steps on Feb. 1 to transition to the objective CDID model. This last organizational
adjustment will bring to a close eleven months of hard work and patience as CAC-CDID has not
only accomplished its mission tasks, but also managed the dissolution and establishment of several
major CAC organizations.
Late February of last year the CAC commander approved the formation of the CAC-CDID as a
major subordinate organization. CDID's establishment was part of the broader CAC restructuring
effort that created organizations such as the CAC-Knowledge, CAC-Training and CAC-Leadership
Development and Education.
In the area of capability development, the problem was far from novel: how do you balance an
increasing reliance on combined arms capability development with decreasing or minimal
resources? The solution, as indicated above, was to adopt the Training and Doctrine Command
approved CDID model. This new model reduces redundant efforts by providing a central location for
capability development.
Previously, there were several different CAC organizations that developed capabilities - including
the Force Management Directorate, Battle Command Integration Directorate, U.S. Army Computer
Network Operations Electronic Warfare Proponent and U.S. Army Information Operations Proponent
- but their efforts were disjointed. A centralized location for capability development ensures CAC's
Page 4
development efforts are synchronized across the combined arms spectrum and the doctrine,
organization, training, materiel, leader development, personnel and facilities domains. And while
these organizations have been dissolved, their missions continue within the CAC-CDID construct.
It is within this new construct that CAC-CDID manages the development and integration of CAC
proponent responsibilities in the areas of information, battle command, computer network
operations and electronic warfare, to name a few. These CAC proponent responsibilities are now
efficiently developed within CDID's Concept, Requirement, Experimentation and Warfighter
Interface, commonly known by the acronym TRADOC Capabilities Manager, or TCM, model.
Recently what these efforts have translated into is a way ahead for an Electronic Warfare Career
Field, the publication of Field Manual 3-36, Electronic Warfare in Operations, Feb. 26; FM 3-13,
Information, later this year; and exercises involving Security Force Assistance. These efforts are of
no small significance. FM 3-13, Information, addresses the paradigmatic shift of FM 3-0,
Operations, that information "is as important as lethal action in determining the outcome of
operations." Additionally, the SFA exercises involve more than a hundred participants from various
commands throughout the United States, as well as multinational partners from Canada, United
Kingdom and Australia.
CAC-CDID is looking ahead to its responsibilities under the new structure. Thomas Jordan, who has
directed the organization from its planning to execution phases, is confident about the future and
the benefits of the TRADOC CDID model.
"The TRADOC CDID model has been adopted by other Centers of Excellence and has shown
promise," Jordan said. "Without a doubt, this will increase the effectiveness and efficiency of CAC's,
and thereby TRADOC and the Army's, combined arms development efforts."
To find out more information about CAC-CDID, visit CAC's Web site at
http://usacac.army.mil/cac2/.
Table of Contents
Electronic Warfare Proponent: Changes by Adversaries, Advances in
Technology Drive EW's Operational Importance
By George Marsec, Leavenworth Lamp, 5 February 2009
Electronic warfare has been around since there have been electronics. Hollywood movies have
painted society's historical view of EW with the good guys intercepting the bad guys' radio signals
and each side trying to jam each other's radar systems. Today's EW reality is far more
technologically complex and constantly evolving.
The job of providing doctrinal structure to the U.S. Army for all things EW rests on the shoulders of
the U.S. Army Computer Network Operations and Electronic Warfare Proponent at Fort
Leavenworth.
EW is "our (the U.S. Army) ability to use the electromagnetic spectrum and also to affect our
enemies' ability to use the electromagnetic spectrum by either attacking their ability or denying
their ability through the electromagnetic spectrum," said Lt. Col. John Bircher, USACEWP deputy
director for Futures,
A key component of the USACEWP's doctrinal guidance is Field Manual 3-36, Electronic Warfare in
Operations, due for release in late February.
USACEWP Director Col. Wayne Parks said FM 3-36 is the Army's first keystone EW document of its
kind. Previous EW doctrine was localized to divisions and "corps and above" or was technically
oriented. The new doctrine is the first effort to build an overarching concept of EW operations that
is nested in overall operational Army doctrine as described in FM 3-0, Operations.
The USACEWP was born in 2006 after several years of changes and advances on the EW front.
Page 5
"From 2003-2005 we started to see our adversaries using the spectrum against us in ways we
never predicted," Bircher said. "Radio controlled IEDs, cellular communications, the Internet ... all
using the electromagnetic spectrum in ways we weren't prepared to deal with.
"In 2006, the Department of the Army authorized the formation of the EW Proponent," Bircher
said, "taking the responsibility of electronic warfare for ground forces out of the Information
Operations arena."
In 2007 DA authorized the merging of the Computer Network Operations function with the EW and
formed what is now the USACEWP. The joining of the two disciplines grew from the Army's
increasing need to understand, operate in and manipulate cyberspace.
"In the operational environment, the lines between CNO and EW are blurred," Bircher said. "We can
use EW to disable our enemies' cellular phone device or we can use CNO to deny the device's
access to its network."
"Do we use CNO or EW to deny our adversary, and does it matter to the tactical commander?"
Bircher continued, "and in our conceptual research we found that it didn't matter. What's important
is controlling the data, the bandwidth and the electromagnetic spectrum."
Staying on the leading edge of cyber communications technology is a daunting task, for not only
the USACEWP but for communications professionals across both military and civilian organizations.
To keep up with the latest, the proponent has reached out to form partnerships with other leading
communications entities.
Parks said the USACEWP took a big step toward cementing these partnerships when they hosted an
information and cyberspace symposium in September.
"The symposium was successful in leveraging the expertise and perspectives from subject matter
experts across the joint, interagency, and intergovernmental communities as well as academia and
industry," he said.
Some key participants in the symposium included representatives from Big-12 universities and
major telecommunications firms. Parks said the relationships formed with these partners give the
USACEWP the luxury of "articulating our concepts and bouncing them off of our partners, and viceversa. The relationships work both ways."
USACEWP will continue to lead the Army's CNO and EW doctrine and development, but soon will
have a new look and a new name.
According to a Combined Arms Center - Capability Development Integration Directorate release,
"The USACEWP will transition to the TRADOC Capabilities Manager Computer Network Operations
Electronic Warfare on Feb. 1 due to CAC-CDID's internal refinement. This refinement will distribute
CNO and EW expertise, previously restricted to just the USACEWP, throughout the entire CAC-CDID
organization, thus making the overall development process more efficient."
Table of Contents
Army Creates Electronic Warfare Career Field
By Jamie Findlater, Army News Service, 6 February 2009
WASHINGTON (Army News Service, Feb. 6, 2009) -- The Army has announced approval for the
establishment of a new Electronic Warfare 29-series career field for officers, warrant officers and
enlisted personnel.
The new career field will eventually give the Army the largest electronic warfare manpower force of
all the services. Nearly 1,600 EW personnel, serving at every level of command, will be added to
the Army over the next three years. The Army is also considering adding an additional 2,300
personnel to the career field in the near future as personnel become available, officials said.
The Army's EW personnel will be experts not only in fighting the threat of improvised explosive
devices, but will also provide commanders and their staffs guidance on how the electromagnetic
Page 6
spectrum can impact operations, officials said, and how friendly EW can be used to gain an
advantage in support of tactical and operational objectives across the full spectrum of operations.
"The new administration has already declared they will be emphasizing technical investments
across the federal government, but in particular, electronic warfare capabilities and other
technological innovations," said Col. Laurie G. Buckhout, the Army's chief of electronic warfare.
"The Army is leaning forward now to address the very complex challenge of controlling the
electromagnetic environment in land warfare. The creation of a large cadre of full-time EW
specialists is a critical step in the right direction."
Gen. Peter W. Chiarelli, Army vice chief of staff, and former commanding general of Multi-National
Corps-Iraq, recognized this vital need for greater EW capability in 2006 when he placed Navy
electronic warfare officers with ground combat units in Iraq to manage the complicated
electromagnetic spectrum.
"We learned the hard way in 2006 how to leverage EW skill sets from the joint community to
counter the emerging remote-controlled IED threats," Chiarelli said.
America's enemies are now using the electromagnetic spectrum against it and its Soldiers. By
creating an electronic warfare career field, the Army is better capable of mitigating that threat,
Chiarelli said.
"One of the enduring features of any future battlefield will be determined (by) resourceful enemies
attempting to undermine our will by leveraging the electronic spectrum," Chiarelli said. "Building an
EW structure within the Army will greatly enhance our ability to proactively counter these threats.
A commitment to EW allows us to tightly integrate non-kinetic and kinetic capabilities across the
Army and as part of joint operations."
Approval for the career field was based on an extensive study conducted by the Combined Arms
Center at Fort Leavenworth, Kan. The study concluded that the Army EW expertise is not only
necessary for counterinsurgency efforts like OIF and OEF, but against the full range of potential
adversaries and should therefore be institutionalized as an enduring core competency.
To develop EW experts, Fort Sill, Okla., is now conducting a series of pilot EW Courses. Warrant
officer and enlisted pilot courses are expected to begin in spring 2009. The third officer functional
area pilot course is scheduled to begin June 29.
The career management field identifiers will be Functional Area 29 for officers, Military
Occupational Specialty 290A for warrant officers, and Military Occupational Specialty 29E for
enlisted personnel.
Table of Contents
Tinker Airmen Deploy With Bomb-Jamming Radio Device
By 1st Lt. Kinder Blacke, 552nd ACW Public Affairs, Tinker Take Off, 6 February 2009
Radio Controlled Improvised Explosive Devices are a common threat to lives in deployed locations,
yet the casualties due to these RCIED’s are becoming fewer as Airmen from Tinker step up to help.
Several members from the 552nd Air Control Wing have voluntarily deployed to some of the most
dangerous areas of the world to operate and maintain the Counter Radio-Controlled Improvised
Explosive Device Electronic Warfare systems.
The CREW system, which consists of a control box, a receiver/transmitter box, and various
antennas, is mounted onto a Humvee, or other military vehicle.
It jams transmitted signals from everyday items like car-door remotes, garage-door openers, or
cell phones, all things that can be rigged to trigger an explosive device.
Preventing a signal from reaching its receiver inhibits the detonator from being triggered on an
explosive device, said Senior Master Sgt. Richard Hunter, 960th Airborne Air Control Squadron, who
deployed to Iraq for six months as the first Air Force Senior Non-Commissioned Officer to be
certified as an Army Battalion Electronic Warfare Officer.
Page 7
To put it simply “the CREW system is designed to cut off communication between the remote
control and the receiver used to detonate IED’s placed by insurgents to blow up our convoys that
are patrolling or travelling throughout the area. It basically provides an electronic shield around the
convoy to protect it from any radio controlled IEDs,” said Maj. Joemar Rodrigo, instructor electronic
combat officer, 552nd Training Squadron.
Because of their background and training in electronic warfare with the E-3 Sentry Airborne
Warning and Control System, several Airmen from the 552nd ACW eagerly volunteered when the
opportunity arose for Air Force members to deploy with an Army battalion as their Electronic
Warfare Officer.
As EWOs for Army battalions, the Airmen were tasked with operating and maintaining the CREW
system, as well as conducting training, mission planning and providing threat analysis for combat
patrols, and advising leadership, said Capt. Chris Hess, 963rd Airborne Air Control Squadron, who
deployed to Afghanistan for eight months in support of the counter-RCIED mission.
In order to fulfill the roll as EWO, most Airmen attend the Tactical Electronic Warfare Operations
Course at Fort Huachuca, Ariz., for three weeks, then attend Ground Combat Training in Fort
Jackson, S.C., for two weeks, and finally the Counter RCIED Electronic Warfare Course in Camp
Victory, Baghdad, Iraq for two weeks, said Master Sgt. Steve Sutton, 965th Airborne Air Control
Squadron, who served as an EWO for seven months. Despite the extensive training, operating the
CREW system is not without daily challenges.
“I had almost 500 systems under my control at one time and it was my responsibility to ensure
that they were all operational,” said Major Rodrigo.
“Desert heat and sands are the biggest challenge,” he said. “Although it is designed for use in that
type of environment, it can and will overheat, especially in the summer. And it is still a computer
with moving parts, therefore you have to be careful that sand does not build up and get inside the
system itself.”
Captain Hess added that “CREW is still in a testing and evaluation process and thus EWOs must
constantly conduct threat analysis and expediently provide corrective measures for new issues that
arise within the system.”
Sergeant Hunter said it was also difficult to keep the CREW systems updated with the latest
software in order to combat the enemies’ ever-changing tactics, and doing so with rockets and
mortar rounds hitting the base on a daily basis is an extra challenge.
Yet, having a Soldier come up and thank him for helping to keep him or her safe made it all worth
it to Sergeant Hunter.
“It gave me a tremendous sense of job satisfaction,” he said. “I also have a much better
appreciation for what the Soldiers and Marines do,” he added, a sentiment shared by his fellow
CREW system EWO’s.
Major Rodrigo is happy to report that “the CREW system has been attributed to the significant
decline of casualties due to RCIEDs.”
“Because of this equipment, people are still alive,” said Sergeant Sutton. “During the time I was in
country, my units combined for over 15,000 combat missions and travelled over 60,000 miles of
Iraq with zero loss of life or limb due to IEDs.”
Likewise, in the six months that Capt. Robert Desautels, 963rd Airborne Air Control Squadron, was
in Iraq, neither of the battalions he worked with had a loss of life. “I was able to see everyday how
what I did impacted the war effort,” he said.
“Electronic warfare, or jamming, does indeed ‘work’ and is not magic,” said Captain Hess.
Researchers are continually striving to make the system more “soldier-friendly,” said Captain Hess,
and a new and improved device is in the testing and evaluation phase.
Page 8
It was unanimous that the Airmen who have filled a CREW tasking found it to be fulfilling and
enjoyable despite the austere conditions. Sergeant Sutton sums it up saying, “it was the most
rewarding experience of my Air Force career.”
Table of Contents
Wireless Electricity Is Here (Seriously)
By Paul Hochman, Fast Company
I'm standing next to a Croatian-born American genius in a half-empty office in Watertown, Mass.,
and I'm about to be fried to a crisp. Or I'm about to witness the greatest advance in electrical
science in a hundred years. Maybe both.
Either way, all I can think of is my electrician, Billy Sullivan. Sullivan has 11 tattoos and a voice
marinated in Jack Daniels. During my recent home renovation, he roared at me when I got too
close to his open electrical panel: "I'm the Juice Man!" he shouted. "Stay the hell away from my
juice!"
He was right. Only gods mess with electrons. Only a fool would shoot them into the air. And yet,
I'm in a conference room with a scientist who is going to let 120 volts fly out of the wall, on
purpose.
"Don't worry," says the MIT assistant professor and a 2008 MacArthur genius-grant winner, Marin
Soljacic (pronounced SOLE-ya-cheech), who designed the box he's about to turn on. "You will be
OK."
We both shift our gaze to an unplugged Toshiba television set sitting 5 feet away on a folding table.
He's got to be kidding: There is no power cord attached to it. It's off. Dark. Silent. "You ready?" he
asks.
If Soljacic is correct -- if his free-range electrons can power up this untethered TV from across a
room -- he will have performed a feat of physics so subtle and so profound it could change the
world. It could also make him a billionaire. I hold my breath and cover my crotch. Soljacic flips the
switch.
Soljacic isn't the first man to try to power distant electronic devices by sending electrons through
the air. He isn't even the first man from the Balkans to try. Most agree that Serbian inventor Nikola
Tesla, who went on to father many of the inventions that define the modern electronic era, was the
first to let electrons off their leash, in 1890.
Tesla based his wireless electricity idea on a concept known as electromagnetic induction, which
was discovered by Michael Faraday in 1831 and holds that electric current flowing through one wire
can induce current to flow in another wire, nearby. To illustrate that principle, Tesla built two huge
"World Power" towers that would broadcast current into the American air, to be received remotely
by electrical devices around the globe.
Few believed it could work. And to be fair to the doubters, it didn't, exactly. When Tesla first
switched on his 200-foot-tall, 1 million-volt Colorado Springs tower, 130-foot-long bolts of
electricity shot out of it, sparks leaped up at the toes of passers-by, and the grass around the lab
glowed blue. It was too much, too soon.
But strap on your rubber boots; Tesla's dream has come true. After more than 100 years of dashed
hopes, several companies are coming to market with technologies that can safely transmit power
through the air -- a breakthrough that portends the literal and figurative untethering of our
electronic age. Until this development, after all, the phrase "mobile electronics" has been a lie: How
portable is your laptop if it has to feed every four hours, like an embryo, through a cord? How
mobile is your phone if it shuts down after too long away from a plug? And how flexible is your
business if your production area can't shift because you can't move the ceiling lights?
The world is about to be cured of its attachment disorder.
Page 9
Wireless juice: A primer
TECH 1: Inductive Coupling
Availability: April
>> THE FIRST WIRELESS POWERING SYSTEM to market is an inductive device, much like the one
Tesla saw in his dreams, but a lot smaller. It looks like a mouse pad and can send power through
the air, over a distance of up to a few inches. A powered coil inside that pad creates a magnetic
field, which as Faraday predicted, induces current to flow through a small secondary coil that's built
into any portable device, such as a flashlight, a phone or a BlackBerry. The electrical current that
then flows in that secondary coil charges the device's onboard rechargeable battery. (That iPhone
in your pocket has yet to be outfitted with this tiny coil, but, as we'll see, a number of companies
are about to introduce products that are.)
The practical benefit of this approach is huge. You can drop any number of devices on the charging
pad, and they will recharge -- wirelessly. No more tangle of power cables or jumble of charging
stations. What's more, because you are invisible to the magnetic fields created by the system, no
electricity will flow into you if you stray between device and pad. Nor are there any exposed "hot"
metal connections. And the pads are smart: Their built-in coils are driven by integrated circuits,
which know if the device sitting on them is authorized to receive power, or if it needs power at all.
So you won't charge your car keys. Or overcharge your flashlight.
The dominant player in this technology for the moment seems to be Michigan-based Fulton
Innovation, which unveiled its first set of wirelessly charged consumer products at the 2009
International Consumer Electronics Show in Las Vegas early this year. Come April, Fulton's new
pad-based eCoupled system will be available to police, fire-and-rescue and contractor fleets -- an
initial market of as many as 700,000 vehicles annually. The system is being integrated into a truck
console designed and produced by Leggett & Platt, a $4.3 billion commercial shelving giant; it
allows users to charge anything from a compatible rechargeable flashlight to a PDA. The tools and
other devices now in the pipeline at companies such as Bosch, Energizer and others will look just
like their conventional ancestors. Companies such as Philips Electronics, Olympus and Logitech will
create a standard for products, from flashlights to drills to cell phones to TV remotes, by the end of
this year.
TECH 2: Radio-frequency Harvesting
Availability: April
>> THE INDUCTION SYSTEMS are only the beginning. Some of the most visually arresting
examples of wireless electricity are based on what's known as radio frequency, or RF. While less
efficient, they work across distances of up to 85 feet. In these systems, electricity is transformed
into radio waves, which are transmitted across a room, then received by so-called power
harvesters and translated back into low-voltage direct current. Imagine smoke detectors or clocks
that never need their batteries replaced. Sound trivial? Consider: Last November, to save on labor
costs, General Motors canceled the regularly scheduled battery replacement in the 562 wall clocks
at its Milford Proving Ground headquarters. This technology is already being used by the
Department of Defense. This year, it will be available to consumers in the form of a few small
appliances and wireless sensors; down the road, it will appear in wireless boxes into which you can
toss any and all of your electronics for recharging.
TECH 3: Magnetically Coupled Resonance
Availability: 12-18 months
>> INVENTED BY MIT'S SOLJACIC (who has dubbed it WiTricity), the technique can power an
entire room, assuming the room is filled with enabled devices. Though WiTricity uses two coils -one powered, one not, just like eCoupled's system -- it differs radically in the following way:
Soljacic's coils don't have to be close to each other to transfer energy. Instead, they depend on socalled magnetic resonance. Like acoustical resonance, which allows an opera singer to break a
glass across the room by vibrating it with the correct frequency of her voice's sound waves,
Page 10
magnetic resonance can launch an energetic response in something far away. In this case, the
response is the flow of electricity out of the receiving coil and into the device to which it's
connected. The only caveat is that receiving coil must be properly "tuned" to match the powered
coil, in the way that plucking a D string on any tuned piano will set all the D strings to vibrating,
but leave all other notes still and silent. (This explains why Soljacic considers the machinery that
create these frequencies, and the shape of the coils, top secret.)
Importantly, then, WiTricity doesn't depend on line of sight. A powered coil in your basement could
power the rest of the house, wirelessly. Will the cat be OK? "Biological organisms are invisible to,
and unaffected by, a magnetic field," Soljacic says. While I am mulling that statement, he tells me
the company will not yet reveal the name of its partners because those partnerships haven't been
formalized, but they include major consumer electronics brands and some U.S. defense customers.
As has been the tradition since Tesla and Thomas Edison angrily parted ways in 1885, the
enormous consumer demand for wireless electricity is begetting intense competition. Last
November, a consortium of manufacturers coalesced around Fulton's eCoupled system. But Fulton
and WiTricity aren't the only companies fighting to bring wireless electricity to market. WiPower, in
Altamonte Springs, Fla., has also created an induction system and says it, too, is close to
announcing partnerships. And Pittsburgh-based Powercast, an RF system, sells wireless Christmas
ornaments and is testing industrial sensors for release this summer.
Just as Tesla derided his doubters as "nothing more than microbes of a nasty disease," some
name-calling is inevitable in this increasingly heated battle. WiPower, for example, insists that the
eCoupled technology approach has several problems. "Their system is very sensitive to alignment,
and I've heard there's a heating issue," says CEO Ryan Tseng. "Our system is more elegant, much
less expensive, and easier for manufacturers to integrate." Meanwhile, Powercast calls Dave
Baarman, Fulton Innovation's director of advanced technologies, "irresponsible" for wondering
aloud whether RF power solutions could be dangerous around pacemakers and powered
wheelchairs. "It's competitive drivel," says Steve Day, Powercast's VP of marketing and strategic
planning. "Baarman has been saying this for a couple of years, because what we do will eventually
replace what he does."
But as I stand, covering myself, in that featureless suburban conference room, such bickering fades
to background noise. Because with Tesla's 100-foot-long lightning bolts and blue grass vivid in my
mind, I have a big question: Will Soljacic, the MacArthur Foundation fellow, be able to turn on that
Toshiba TV from across the room? Or will I be bathed in a magnetic field so intense my molecules
all align to face true north?
After he flips the switch, the little television, 5 feet away, springs to life. Wirelessly. The DVD player
inside spins up to a low whine. Colors flicker on the moving screen. And Soljacic's eyes dance with
the reflected light of the image
Table of Contents
German Federal Armed Forces Develop Secret Cyberwar Troop
Translated from Spiegel Online, 7 Feb 2009 (original version)
Substantial attacks on chancellorship and Ministries up-frightened the Federal Government: With a
German Federal Armed Forces special unit it wants to meet the electronic emergency now after
Spiegel sources. The hackers in uniform are to also learn to explore and destroy stranger nets.
Berlin - the German Federal Armed Forces would forearm yourself with so far a not well-known unit
for future Internet conflicts.
After information MIRRORS [Spiegel] work those at present 76 coworkers of the “department of
information and computer network operations” in the structure strictly bulkheaded in the Tomburg
barracks in Rhine brook close Bonn and should up to the coming year be fully operational.
Page 11
The hackers in uniform, who stand under the command of Brigadier General Friedrich Wilhelm
Kriesel belongs and organizational to the command strategic clearing-up, train for an electronic
emergency, as there was it last with the Cyber attacks on Estonia and Georgien.
The soldiers are particularly recruited from the specialist areas for computer science at the German
Federal Armed Forces universities. They concern themselves also with the newest methods to
penetrate in stranger of networks to explore it to manipulate or destroy – digital attacks on strange
server and nets including.
Parallel the Federal Government invests far away unnoticed into the improvement of own ITsecurity. After solid attack waves with harming programs on Federal Ministries and the Office of the
Federal Chancellor in the spring and summers 2007, which attributed investigators to servers in the
Chinese province Lanzhou, is to be revalued Bonn Federal Office for security in the information
technology (BSI) to a Cyber Verteidigungsagentur for the authorities.
Already in the middle of January adopted the Federal Cabinet a bill for the “stabilization of the
information security of the federation”. According to it the BSI more money receives, personnel and
clearly extended powers. So it is the data streams of the authorities in the future automated to
supervise and for them concrete IT-Sicherheitsvorgaben make. So far Bonn security experts only
the recommendations may express.
At the beginning of March is to advise the Bundestag over the law. The “special express needyness”
results from the “necessary security of government communication”, is called it in the reason.
Table of Contents
Der CyberKrieg
By Stuart Fox, Popular Science, 11 February 2009
Just outside the small town of Rheinbach, the German army has begun preparations for a new kind
of war. Following on the heels of attacks against the Internet infrastructure of Estonia, Georgia and
Kyrgyzstan, as well as a large scale hacking attack by China against a number of European
countries, the German army, or Bundeswehr, has established its first unit dedicated solely to cyber
war. According to a new article in Der Speigel, the unit is still considered secret, and will work on
both defensive and offensive operations.
But a technologically advanced nation developing a unit for cyber war is not itself unique. Rather,
the fact that even Germany plans on developing these capabilities signals that the age of cyber war
has finally arrived.
“Other than Britian and France, European countries have not been very out front about their warmaking capabilities,” said Martin Libicki, author of Conquest in Cyberspace and a senior policy
research at the Rand Corporation. “Since Germany is very careful about these things, the fact that
they actually announced that they're doing it may mean it’s not as everyday as it seems.”
Instead, the creation of the secret unit signals that Germany will join the larger shift by many
militaries towards acknowledging the importance of cyber war. According to Scott Borg, Director
and Chief Economist of the US Cyber Consequences Unit, a non-profit founded by the US
government that now independently consults with the government and businesses, about a dozen
countries have developed cyber war capabilities.
With the Russian cyber attack that took out Estonia’s banking, government ministries and Internet
for several days in 2007, the wired world joined the land, sea and air as a standard battlefield in
modern war. After the 2007 Estonia incident, Russians launched cyber attacks against Georgia
during their 2008 war, and then took down the Internet of Kyrgyzstan on January 18th of this year.
Since 2007, cyber attacks have been used in the Israeli-Palestinian conflict, between Indian and
Pakistan, and between China and Taiwan and Japan.
Der Speigel said that the Bundeswehr unit, lead by Brigadier General Friedrich Wilhelm Kriesel,
consists of 79 computer scientists recruited from the Bundeswehr’s universities and training
centers.
Page 12
And while the unit won’t become fully operational until next year, Germany has a long history of
cyber war. According to James Lewis, Director and Senior Fellow, Technology and Public Policy
Program at the Center for Strategic and International Studies, the first case of cyber war in history
occurred when the KGB hired German hackers to break into the US Department of Defense (DoD)
computer system.
The impetus for creating this unit came from a spate of recent cyber attacks against Germany. In
2007, attempts by Chinese hackers to conduct industrial espionage against Germany became so
bad that during a state visit to Germany, German chancellor Angela Merkel publicly asked Chinese
officials to stop. Additionally, Germany has engaged in some spats over gas pipelines with Russia, a
country that has launched cyber attacks every year since 2007.
“Russia has demonstrated the willingness to use cyber space, and I'm sure Germany is concerned
about Russia's use of cyber force as a negotiating tactic,” said O. Sami Saydjari, chairman of the
Professionals for Cyber Defense.
Of course, the creation of this new German unit isn’t the only sign that countries are paying more
attention to the Internet battlefield. Just last month, the DoD published its Quadrennial Roles and
Missions Report. The Report, which the DoD uses to help Congress formulate the military budget
for the coming years, highlighted four areas of particular importance. Three of the areas were the
obvious choices of counter-insurgency, unmanned aerial vehicles and supply. The forth area was
cyber war. Looks like Germany might not be the only country increasing its focus on fighting this
popular new kind of war.
Table of Contents
National Defense in Cyberspace
By John Goetz, Marcel Rosenbach and Alexander Szandar, Spiegel, 11 February 2009
Germany's military, the Bundeswehr, trains its own hackers -- and it's not the only official effort to
defend a nation from denial-of-service attacks. Governments around the world are preparing for
the future of war.
This is what an officially appointed hacker looks like: A man with gray hair and a moustache,
wearing a blue German Air Force uniform. His name is Friedrich Wilhelm Kriesel, and he's 60 years
old, a brigadier general and the head of the Bundeswehr's Strategic Reconnaissance Unit.
Kriesel has been deployed to the front lines of a battle that has recently come in for special
attention from the Bundeswehr. The general's task is to prepare for the wars of the future, parts of
which could be waged on the Internet. Kriesel seems to be the right man for the job. With about
6,000 soldiers under his command, his unit already operates like an intelligence service.
Strictly isolated from the publicat the Tomburg barracks in Rheinbach, a picturesque town near
Bonn, 76 members of his staff are busy testing the latest methods of infiltrating, exploring and
manipulating -- or destroying -- computer networks. The unit, known by its harmless-sounding
official name, Department of Information and Computer Network Operations, is preparing for an
electronic emergency, which includes digital attacks on outside servers and networks.
The uniformed hackers from Rheinbach are Germany's answer to a growing threat which has begun
to worry governments, intelligence agencies and military officials around the world. Now that
computers have made their way into practically every aspect of life, their susceptibility to attacks
has risen dramatically. In the United States, experts have been warning for years against an
"electronic Pearl Harbor," a "digital Sept. 11" or a "Cybergeddon."
Estonia was the first NATO member state to fall victim to this form of digital attack. In the spring of
2007, banks, government agencies and political parties in Estonia came under massive electronic
attack. The Baltic republic was essentially offline for a while, making it the scene of the first "cyber
war." Officials there suspect the attack came from neighboring Russia, because Estonia was
embroiled in serious diplomat disputes with Moscow at the time.
Page 13
The use of the term "war" in the Estonian case was controversial from the start, and rightfully so,
since there were no dead or wounded. Nevertheless, the attack shows that assaults on the virtual
world can also have disastrous consequences. The Internet has developed into a virtual battlefield,
which can mirror conflicts in the real world.
Many countries are now preparing for similar threats. The Americans alone plan to invest billions of
dollars in a national cyber-defense program. Western intelligence agencies and military officials are
convinced that their enemies are in the East, just as they were in the Cold War -- in Russia and
China. A report submitted to the US Congress last fall concluded that China is "aggressively"
expanding its cyber-warfare capabilities and may soon possess an "asymmetric advantage."
According to the report, "these advantages would reduce the conventional superiority of the United
States in a conflict situation."
The Germans have also had adverse experiences with China in this field. Just two years ago, the
Federal Office for Protection of the Constitution (BfV), Germany's domestic intelligence agency,
informed the government that servers from Lanzhou province in China had attacked several
German ministries and the chancellery with malicious software aimed at tapping sensitive
information.
In mid-January the cabinet approved draft legislation to "strengthen the information security of the
federal government." The draft legislation is now being reviewed by the Bundesrat, the upper
house of the German parliament. So far it's gone largely unnoticed by the public, but the draft will
be submitted to the lower house, or Bundestag, in early March. The "special urgency" of the
legislation stems from the "need to safeguard government communication." The corresponding
government agency, the Federal of Security in Information Technology (BSI) in Bonn, is to be
expanded into something resembling a data watchdog for government agencies.
Defense Minister Franz Josef Jung ordered Bundeswehr officials to develop a cyber force for the
military three years ago. It was the birth of Kriesel's unit.
The 76 German Internet warriors are mainly graduates of the computer science departments at the
Bundeswehr's internal universities. Last Tuesday General Kriesel gave a proud report on his unit's
successes -- including electronic surveillance activities in Afghanistan -- to Inspector General
Wolfgang Schneiderhan and the chiefs of staff of the army, air force and navy. Then he discussed
his top-secret group. Kriesel's cyber unit will be ready to start operations next year, when it will be
asked to demonstrate its capabilities -- in a simulated attack on a real target, known as a
penetration test.
The soldiers use the same methods employed by criminals. The future digital warriors learn how to
load malicious software onto outside computers, unbeknownst to their users, through e-mail,
external media like a CD-ROM disk or simply "while surfing by" on a prepared Internet site.
Infected computers can then download additional malicious programs, such as a letter recorder
that reads every keystroke on the machine, which can record whole e-mail messages, Internet
addresses and passwords. Then program inconspicuously sends the collected entries to a remote
computer.
The training agenda in the unit's offensive division is even more difficult and exotic. The Rheinbach
soldiers no longer fight with tanks, fighter jets and assault rifles. Their weapon is the computer,
and their simulations sound like science fiction or scenarios from a computer game. But Kriesel's
soldiers study two major types of cyber assaults -- "denial of service" or "botnet" attacks -- based
on real-life attacks on Estonia and Georgia.
Science Fiction from the Real World
In Estonia, a political conflict over the relocation of a Soviet memorial spilled over into the Internet
after only a few hours in the spring of 2007. The Estonians had removed a bronze statue during the
night, planning to move it from downtown Tallinn to a more remote military cemetery. A symbol of
occupation for many Estonians, the statue represented the Soviets' victory over Nazi Germany on
behalf of the nation's Russian minority.
Page 14
In less than 24 hours, the first wave of attacks were recorded on Web sites for the Estonian prime
minister, the parliament and various political parties. Hackers placed a false apology for the
decision to relocate the statue on the sites. They also gave the prime minister a Hitler mustache on
one of his Web pages.
Various Russian Internet forums also posted instructions on how individual users could express
virtual displeasure with the Estonian decision. The forums provided descriptions in Russian of how
to flood Estonian Web sites and servers with test signals -- instructions for a classic denial-ofservice attack.
The instructions produced the desired effect, as the volume of data traffic rose dramatically on
Estonian networks. Experts with the Estonia Computer Emergency Response Team detected
orchestrated attacks on individual targets coming from more than one million computers. The
attacks emanated from so-called "botnets," or linked computers that have been infected with
malicious software and can thus be used for criminal purposes, unbeknownst to their owners,
whenever the owners are online.
The consequences were devastating. The Estonian parliament had to shut down its e-mail system
for half a day. Internet providers temporarily cut off their customers' connections, and several
Estonian banks were unreachable online for an extended period of time.
After that, one Estonian network provider counted a total of 128 attacks, including 36 on the
websites of the government and parliament, 35 on the Estonian police and another 35 on the
finance ministry.
For military officials and intelligence agencies around the world, Estonia is considered a precedent
with an unsettling message. According to a Swedish study, the Estonian case conclusively
demonstrates "that an individual attacker or a group can, with relative ease, significantly disrupt
the normal business operations of government agencies and economic activity in another country - and successfully conceal its involvement." In fact, it is still not clear who was behind the Estonian
cyber-attack. Nevertheless, authorities know that the botnets involved had already attacked the
Web site of a Russian opposition party in the past.
The attacks on Georgia last summer followed a similar pattern, although in that case they
accompanied a real invasion by Russian troops. Once again, it was Russian-language Internet
forums that provoked the attack, also providing a list of worthwhile Georgian targets. On
"stopgeorgia.ru," a website set up for this purpose, users could download a malicious program
called "war.bat," tailored for the attack on Georgian networks.
Because of the attacks a site for the Georgian president had to be taken offline for a day, and on
orders from the national bank, Georgia's financial institutions cancelled all electronic banking for 10
days. Hackers also manipulated the contents of Web sites in Georgia. The foreign ministry's home
page, for example, suddenly contained a collage of portraits of Georgian President Mikheil
Saakashvili and Adolf Hitler.
In the Georgian case, many trails also lead to Russia. A NATO report, however, says there is "no
conclusive evidence" of official involvement by the Russian government.
Warfare or Not Warfare?
Analyzing these incidents raises a number of serious questions for the Bundeswehr and German
politicians. Were these situations in fact "cyber wars," that is, the shifting of a conventional war
between two nations onto the Internet? Or were they simply new forms of "asymmetric conflict," in
which countries are attacked by digital guerilla groups?
Should they be treated as a violation of the European Council's Convention on Cyber Crime, which
23 countries have ratified? Or are they a military action that justifies retaliatory attacks? For
instance, if the Bundeswehr has identified a server controlling a botnet, does it have the authority
to destroy it? Will it ultimately need its own botnet of maliciously-programmed computers?
These questions have been the subject of heated debate among military leaders and diplomats
since the Estonia incident. At last year's NATO summit in Bucharest, the heads of state agreed to a
Page 15
joint cyber defense concept and strengthened the security precautions for their own networks, for
which a NATO agency in the Belgian city of Mons is responsible. In addition, the alliance established
a "Center of Excellence on Cyber Defense," in the Estonian capital Tallinn. The new institute has
produced an analysis of the attacks on Georgia, in which it points to "attacks in a gray zone."
According to the report, "the current question of whether cyber attacks should be treated as armed
attacks remains unresolved." It will "take time to achieve international consensus on the legal
issues of cyber defense," the report concludes.
Germany, at any rate, is apparently unwilling to wait that long. The draft legislation prepared by
the interior ministry, now headed to the Bundestag for debate, proposes upgrading the BSI into
something of a civilian cyber defense agency. In the future, it would employ automated technology
to monitor the flows of data at the Federal Chancellery and ministries, so that abnormalities can be
detected and corrective steps taken more quickly. In addition, the small Bonn agency would no
longer simply issue recommendations to reluctant government institutions, but would have the
authority to issue concrete "guidelines," such as to reduce the number of unmonitored points of
access to the Internet.
In a previously unpublished report on the situation of IT security in Germany in 2009, the security
experts warn that both the number and level of sophistication of attacks is rising. They predict not
only a growing threat stemming from botnet attacks, but also from attacks on major systems that
control critical infrastructures, such as those of nuclear power plants or traffic guidance systems.
Meanwhile, the uniformed hackers at Rheinbach are battling a particularly treacherous adversary:
German criminal law, which has banned the preparation of computer sabotage since 2007. If the
German cyber warriors did in fact launch test attacks on outside networks they would, strictly
speaking, be breaking the law. The penalty for serious computer sabotage is a prison sentence of
up to ten years.
Table of Contents
U.S. Spy Agency May Get More Cybersecurity Duties
By Randall Mikkelsen, Reuters, Feb 25, 2009
WASHINGTON (Reuters) - The spy agency that ran the Bush administration's warrantless
eavesdropping program may get more responsibility for securing U.S. computer networks,
President Barack Obama's intelligence chief told Congress on Wednesday.
Director of National Intelligence Admiral Dennis Blair said the National Security Agency, which is
responsible for codebreaking and electronic spying, should assume a greater role in cybersecurity
because of its technological prowess and current role in detecting attacks.
"There are some wizards out there ... who can do stuff. I think that capability should be harnessed
and built on," Blair said in testimony to the House of Representatives intelligence committee.
Blair acknowledged that many Americans distrust the agency, which operated former President
George W. Bush's secret program of warrantless electronic spying on some Americans' overseas
phone calls.
"The NSA is both intelligence and military, two strikes out in terms of the way some Americans
think about a body that ought to be protecting their privacy and civil liberties," Blair said.
Government concern over computer network vulnerability has risen as computer hackers become
more sophisticated.
"A number of nations, including Russia and China, can disrupt elements of the U.S. information
infrastructure," Blair said. "Cyber-defense is not a one-time fix; it requires a continual investment."
Billions of dollars are at stake. Defense contractors Northrop Grumman Corp, Lockheed Martin and
Boeing Co are working on classified cybersecurity projects for the U.S. government.
Software and telecommunications companies also are likely to play a major role, said Democratic
Representative Dutch Ruppersberger, whose Maryland district includes the NSA.
Page 16
Earlier this month, President Barack Obama ordered a 60-day cybersecurity review and named
Melissa Hathaway, the top cyber official with the intelligence director's office, to a White House post
overseeing the effort.
Some lawmakers have said the Homeland Security Department, which plays a leading role in U.S.
computer security and is in charge of protecting federal civilian networks, is not up to the job.
Blair said he agreed: "The National Security Agency has the greatest repository of cyber talent."
"They're the ones who know best about what's coming back at us, and it is defenses against those
sorts of things that we need to be able to build into wider and wider circles."
Table of Contents
New Cyber-Threats -- Part 1
By James Jay Carafano and Eric Sayers, UPI Outside View Commentators, 10 Feb 2009
WASHINGTON, Feb. 10 (UPI) -- Cybersecurity, cyber competitiveness and cyber warfare have
weighed heavily on the minds of policymakers as the severity and complexity of malicious
cyberattacks have intensified over the past decade. These attacks, directed against both the public
and private sectors, are the product of a heterogeneous network of state and non-state actors
whose actions are motivated by a host of factors. Helping to ensure that the federal government
achieves a high level of competency on cybersecurity issues is an imperative for the next U.S.
Congress.
Indicative of how important cybersecurity has become, U.S. Director of National Intelligence Mike
McConnell raised this issue for the first time in February 2008 as part of his testimony on the 2008
Annual Threat Assessment.
When asked if he believed the United States was prepared to deal with cybersecurity threats to the
civilian and military infrastructure, McConnell noted that the country is "not prepared to deal with
it. The military is probably the best protected, the federal government is not well protected, and
the private sector is not well protected. So the question is: How do we take some of the things that
we've developed for the military side, scale them across the federal government? And then the key
question will be: How do we interact with the private sector?"
Properly answering these questions begins with developing cyber-strategic leadership skills in the
U.S. government and private sector.
Even as Washington wrestles with issues concerning organization, authorities, responsibilities and
programs to deal with cyber competition, it must place more emphasis on developing leaders who
are competent to engage in these issues.
This will require a professional development system that can provide a program of education,
assignment and accreditation to develop a corps of experienced, dedicated service professionals
who have an expertise in the breadth of issues related to the cyber environment. This program
must be backed by effective public-private partnerships that produce cutting-edge research,
development and capabilities to operate with freedom, safety and security in the cyber world.
What is at stake is the heartbeat of America. Over the past quarter-century, the cyberspace domain
has rapidly expanded to dominate almost every aspect of human interaction. Americans now
depend on cyberspace more than ever to manage their banking transactions, investments, work
and personal communication, shopping, travel, utilities, news and even social networking.
Table of Contents
Northrop Grumman Begins Study of Electronic Warfare System of
the Future
From GlobeNewswire, Feb. 23, 2009
BETHPAGE, N.Y., Feb. 23, 2009 (GLOBE NEWSWIRE) -- Northrop Grumman Corporation has been
awarded a study contract by the U.S. Navy to investigate a Next Generation Jammer to replace its
Page 17
aging ALQ-99 airborne electronic attack system. The Navy is seeking to counter the diverse
electronic weapons, communications and enemy air defenses that our warfighters may face in the
future.
The six-month Next Generation Jammer study is valued at approximately $6 million. It is the first
major step toward the development and production of a modular, scalable jamming system for
multiplatform, multiservice use. When developed and in production, the Next Generation Jammer
program could potentially be worth several hundred million dollars.
"Northrop Grumman defined airborne radar jamming with its Intruder aircraft in the early 1960s
and successfully expanded the concept with its Prowlers, Ravens and the latest system for the EA18G Growler. Our new ICAP III system in Navy EA-6B Prowlers is performing a critical troop
protection mission in the electronic battlefield over Iraq every day," said Patricia McMahon, vice
president of the Information Operations and Electronic Attack integrated product team.
"No company can match the combat-proven airborne electronic attack system design and
operational experience of Northrop Grumman," McMahon said. "That experience gives us great
confidence that we can significantly reduce the risk of the Next Generation Jammer development
efforts and maximize the investment the Navy will make in this critical capability."
Today, Northrop Grumman is delivering ICAP (Improved Capability) III systems for incorporation
into Marine Corps EA-6B Prowlers and a derivative of that system for the EA-18G Growlers. The
Growler is now in production and undergoing operational evaluation by the Navy, which plans to
stand up the first two fleet Growler squadrons later this year.
Northrop Grumman Corporation is a leading global security company whose 120,000 employees
provide innovative systems, products, and solutions in aerospace, electronics, information systems,
shipbuilding and technical services to government and commercial customers worldwide.
Table of Contents
Tactical Success, Strategic Defeat
Afghan Outrage at U.S. Raid Highlights Challenges Facing New Military Push
By Pamela Constable, Washington Post, March 2, 2009
FORWARD OPERATING BASE ALTIMUR, Afghanistan -- The U.S. soldiers entered the sleeping village
in Logar province in the dead of night on Feb. 20, sure of their target and heavily armed. They
surrounded a mud-walled compound, shouting commands, and then kicked down the gate as cries
of protest erupted within.
Exactly what happened next is disputed, but shots were fired and a man inside fell dead. Four
other men were grabbed and arrested. Then the soldiers departed, leaving the women to calm the
frightened children and the rumors to spread in the dark.
By midmorning, hundreds of angry people were blocking the nearby highway, burning tires and
shouting "Death to America!" By mid-evening, millions of Afghan TV news viewers were convinced
that foreign troops had killed an unarmed man trying to answer his door.
"We are afraid of the Taliban, but we are more afraid of the Americans now," said Abdul Ghaffar, a
truck driver in the raided village. "The foreign forces are killing innocent people. We don't want
them in Afghanistan. If they stay, one day we will stand against them, just like we stood against
the Russians."
Tactically, the U.S.-led night raid in the village of Bagh-i-Soltan was a success. U.S. military officials
said the dead man and an accomplice now in custody were bombmakers linked to recent insurgent
attacks. They said that they had tracked the men for days and that one was holding an assault rifle
when they shot him.
Strategically, however, the incident was a disaster. Its most incriminating version -- colored by
villagers' grief and anger, possibly twisted by Taliban propaganda and magnified by the growing
Page 18
influence of independent Afghan TV -- spread far faster than U.S. authorities could even attempt to
counter.
Worse, it happened in an area where the Obama administration has just launched an expensive
military push, focusing on regions near Kabul, the capital, where Islamist insurgents are trying to
gain influence. Several U.S. bases have been set up in Logar and adjacent Wardak province, and
3,000 troops have arrived since January. Their mandate is to strengthen security, facilitate aid
projects and good government, and swing local opinion against the insurgents.
A Wide Gulf
Logar sits in a historically peaceful valley an hour's drive south of Kabul, surrounded by craggy
mountains. Brown and bleak in winter, it is green and bucolic in summer, with wheat fields,
orchards and honey that beekeepers sell beside the road. It is also a gateway from southeastern
Afghanistan to the capital, straddling one of the few paved highways in the region.
In the past 18 months, Taliban forces have established strongholds in several nearby provinces and
a low-key but intimidating presence in Logar. Officials say most Logaris, though frustrated by poor
government services, have not yet decided where their loyalties lie. Politically, Logar is still up for
grabs.
"This is a fertile area for us to plant the seeds of opportunity, but there are a lot of fence-sitters,
and everyone is vying for the populace," said Lt. Col. Daniel Goldthorpe, who commands the U.S.
Army base at Altimur in Logar, about 30 miles south of Bagh-i-Soltan.
The newly built base is a cluster of heated tents and wood cabins on a rocky plain, surrounded by
dirt-filled barricades and a distant cordon of snowcapped mountains. It houses about 600 troops
from the 3rd Brigade Combat Team, 10th Mountain Division, whose duties include search raids,
security patrols and goodwill missions in nearby villages.
Goldthorpe acknowledged that the fallout from the raid in Bagh-i-Soltan was a surprising setback
for the U.S. forces' image here. But he attributed the public unrest to superior Taliban propaganda
efforts and strongly denied that any misconduct occurred during the raid.
"We did everything to the letter, but their media was a lot faster than ours," he said. "When a tree
falls in the forest, the first to report the sound gets their version out. This was a huge learning
curve for us and an important exercise in credibility."
But interviews with local residents, Afghan officials and U.S. military officers since the raid suggest
that the problem was more complex than one side putting out a quicker news flash. The incident
occurred amid deepening national hostility to American and NATO forces and growing complaints
about coalition bombings and night raids.
Logar officials, like area residents, seemed inclined to believe the worst. U.S. officials said some
were afraid to publicly side with the Americans, and other local officials said they had not been told
of the raid by their superiors in Kabul, whom U.S. officials said they had briefed.
U.S. officials were also constrained from fully explaining their actions or making amends afterward.
Intelligence sources could not be revealed. Daytime visits to villages required advance security
planning and transport in monster vehicles armored against roadside bombs and rockets,
hampering the troops' ability to make personal contact quickly.
A week after the raid, even though U.S. officials had by then met with village elders and released
all but one detainee, emotions in Bagh-i-Soltan were still running high, and the raided compound
was full of condolence callers. The gulf between the resentful residents and the eager-to-help
soldiers seemed as wide as the brown winter plain.
Divergent Accounts
The first version of the raid, and the one that has stuck in the public mind, came from Mullah Abdul
Mateen, the owner of the raided house. He told reporters the next day that heavily armed
Americans had burst into the sleeping household, shot at his younger brother, herded the women
and children into a room, then handcuffed and taken away several more brothers and a cousin.
Page 19
"We are not terrorists or al-Qaeda. I am not hiding from anyone. There was no reason for the
Americans to do this," Mateen, 35, said in an interview last week. "The Americans got the wrong
information from an Afghan spy. If they continue killing and arresting innocent people, the anger
against them will increase."
The provincial governor, Atiqullah Ludin, also bitterly criticized the U.S. forces, saying they had
promised to avoid civilian casualties and to conduct all house raids accompanied by Afghan troops.
"Now what can I tell the people of Logar?" Ludin said in apparent anguish last week. "We have to
build their trust or the enemies of Afghanistan will take advantage of it."
A very different description of the raid came from U.S. officers who carried it out. They said they
were accompanied by Afghan military and intelligence officers. One was Army Maj. Todd Polk, a
squad leader based at Altimur.
Polk said there was solid evidence that the dead man, identified as Sher Agha, and a second man
detained in the raid possessed explosives-making materials and had helped organize a recent
bomb attack on a French military facility in Logar. He said both men had been tracked to Mateen's
house and a neighboring compound.
"I was there, and I can tell you for a fact what happened," Polk said in an interview last week. He
said Agha "had an AK-47 in his hand and was trying to get away" when he was shot by U.S. forces.
"If he were innocent, he would have sat there."
Like other U.S. officers here, Polk said that the protests afterward were probably instigated by the
Taliban and that residents would not have objected had they known the facts that led to the raid.
He also expressed frustration over the lack of communication between Afghan security officials in
Kabul and Logar.
At a routine meeting with two local police officials last week, Polk was attempting to discuss
highway safety issues when the officers changed the subject. Polite but uneasy, they asked why the
Americans had broken down Mateen's door, why they had shot someone and why no one had
informed their commander in advance about the raid.
"If you had come and asked us, we could have brought him to you, and there would be no trouble,"
Capt. Mohammed Wahidullah told Polk, speaking through an interpreter. "Instead we had to go out
on the highway the next day, with thousands of people shouting and cursing us. You didn't need to
take all those vehicles and people to raid that house. You just needed to make one call."
Polk told the police he would take the suggestion to his superiors, but it was evident that he
remained skeptical of the policemen's sincerity -- and convinced that the Taliban insurgents, with
their ability to intimidate people and whip up Afghans' emotions against foreign armies, were the
real cause of the backlash.
"I know we did the right thing, but the Taliban kicked our butts on the response," the major said,
shaking his head. "Next time, we just have to be faster putting out the truth."
Table of Contents
Tactical Success, Strategic Defeat (Updated)
From Cjmewett blog, 4 Mar 09
[ed. Note: blog discussing the previous article in this newsletter]
The Washington Post ran a story about Afghanistan under this headline yesterday, relating the
fallout from an American raid in Logar Province one night last month. One man was killed and four
were detained by U.S. forces, and angry locals demonstrated the next day. So long as I’m
criticizing Ricks for this “tactical success, strategic defeat” formulation, I might as well use this
example to elaborate on why it’s so meaningless.
In a post on Abu Muqawama shortly after The Gamble was published, Andrew Exum stated his
objection:
Dear Tom,
Page 20
Stop saying the surge worked militarily but failed politically. If it failed politically, it failed militarily.
A better way of expressing what I think you are trying to say is that the surge succeeded tactically
and operationally (and maybe strategically) but failed politically.
This largely sums up my frustrations about the way this is being put, though — as you can see
from last night’s post — I disagree not only with the semantics but also the conclusion. The Post
article repeats the same shaky assertion: that a military operation can be viewed as a success
independently of its second-order effects. This is wrong.
The man killed in the raid in the village of Bagh-i-Soltan was a bomb-maker, American military
sources say, as was at least one of his detained colleagues. So why wouldn’t residents of his village
understand that this targeted violence against one of Afghanistan’s enemies was legitimate?
For what it’s worth, the troops who participated in the 10 February raid were dispatched from the
forward operating base at Altimur, around 30 miles distant from Bagh-i-Soltan. Those members of
the 10th Mountain who are quoted on the subject have largely blamed superior Taliban propaganda
efforts for the success of the enemy’s narrative. But if we read Galula and 24-3 and the rest of the
COIN canon, then we shouldn’t be surprised at the information operations (IO) failure in this
instance. The story reads as a virtual counterfactual to the effective implementation of
counterinsurgency tactics, Duffer’s Drift and Jisr al-Dorea’a rolled into one:
U.S. officials said some were afraid to publicly side with the Americans
…as the populace was not being sufficiently protected to feel secure from recriminations by Taliban
insurgents.
Daytime visits to villages required advance security planning and transport in monster vehicles
armored against roadside bombs and rockets, hampering the troops’ ability to make personal
contact quickly.
…because force protection has — counterproductively — taken precedence over COIN best
practices, the development of relationships with locals, and the abandoning of vehicles which are
frankly almost useless for the Afghan mission. (For more on the inverse relationship between a
force’s mechanization and success in counterinsurgency, see Lyall and Wilson’s “Rage Against the
Machines: Explaining Outcomes in Counterinsurgency Wars.”)
The provincial governor, Atiqullah Ludin, also bitterly criticized the U.S. forces, saying they had
promised to avoid civilian casualties and to conduct all house raids accompanied by Afghan troops.
“Now what can I tell the people of Logar?” Ludin said in apparent anguish last week. “We have to
build their trust or the enemies of Afghanistan will take advantage of it.”
…and they’ll continue to take advantage once we’re gone, which is why building partnership
capacity is so important. T.E. Lawrence said something like “it’s better for the Arabs to do
something marginally well than for you to do it excellently for them,” and this theory obtains
outside the Middle East, as well. As John Nagl will tell you, the development of Afghan National
Army and police is our ticket out of that war.
All of which is why it’s so dispiriting to read about an officer like Maj. Todd Polk, who is quoted
extensively in the Post piece. [I should note here that I'm in no position to judge Maj. Polk's actions
under fire or impressions of events in which he played a part, and can only base my analysis on
what is reported here. This man may be an outstanding officer (and I hope he is), but the
journalistic record leaves room for doubt.] Polk was present during the raid and sees things quite
differently from those Afghans who believe they witnessed the indiscriminate (or at least
irresponsible) use of deadly force.
“I was there, and I can tell you for a fact what happened,” Polk said in an interview last week. He
said Agha “had an AK-47 in his hand and was trying to get away” when he was shot by U.S. forces.
“If he were innocent, he would have sat there.”
You’ll have to forgive me (and what I would imagine to be the many Afghans who agree with me) if
the “innocent men don’t run!” explanation simply doesn’t wash. Whether or not this is true, it
doesn’t strike me as terribly good strategic communications to publicize sentiments like that. I
Page 21
have little doubt that Maj. Polk is telling the truth, and that the man killed in this raid had it coming
to him. I won’t be terribly surprised, however, if the other residents of Bagh-i-Soltan feel less
convinced.
At a routine meeting with two local police officials last week, Polk was attempting to discuss
highway safety issues when the officers changed the subject. Polite but uneasy, they asked why the
Americans had broken down Mateen’s door, why they had shot someone and why no one had
informed their commander in advance about the raid.
And here we come back to letting the Afghans do something tolerably well… Isn’t one of the
fundamental precepts of counterinsurgency that we have to trade a certain degree of force
protection for progress and increased legitimacy with the population? So wouldn’t it seem like a
worthwhile trade to risk allowing one more bomb-maker to stay on the streets in order to reinforce
trust and build the operational relationship with the local leadership and the Afghan security
institutions?
“I know we did the right thing, but the Taliban kicked our butts on the response,” the major said,
shaking his head.
Surely Maj. Polk knows that kill/capture of the bad guys isn’t always “the right thing.” So maybe
“the response” ought to be considered before we decide on the action.
Table of Contents
Taking the “D’oh!” Out of Operational Security
Story by Spc. Howard Alperin, Multi-National Division Baghdad, 4 March 2009
CAMP LIBERTY, Iraq – Homer Simpson does not seem like the perfect picture for military policy.
But, for a subject as important as operational security, “OPSEC” in military slang, he is the ideal
example - of what not to do. Simpson’s tendency to let the cat out of the bag actually made him a
poster boy for a recent OPSEC education product seen around Multi-National Division - Baghdad’s
headquarters.
“The principles of OPSEC haven’t changed much,” said Capt. Jeff Van Cleave, an information
operations officer for MND-B. “Through all wars, the purpose is to deny vital intelligence to the
enemy.”
“Word of mouth is the easiest way to leak information and for others to take that information and
make it into intelligence. OPSEC is an enduring principle of the combat situation.”
Any form of communication that gives the enemy potential information on Soldiers’ movements or
providing any other information on Soldiers’ lives in and out of a combat zone is in violation of
operational security, said Master Sgt. Mario Dovalina, the OPSEC manager for MND-B.
Giving mission-related details and sensitive information to the enemy is the worst kind of error to
make, said Dovolina, a Dallas native. Having situational awareness is as important as any other
skill a Soldier learns.
“Don’t be that guy. Don’t be the one who gives information to the enemy. People can lose their
lives, or people can get injured,” said Dovolina. “No matter where you are; you could be at the PX
[post exchange] and someone could be listening behind the other aisle, or at the mess hall, there’s
someone who could be at a nearby table listening.”
It’s not just careless talk that Soldiers need to watch. Another part of Dovolina’s mission is to
spread the word what gets trashed.
“Shred and burn any and all documents: secret, unclassified and personal; including sticky notes
and mailing labels. If shredding is not possible, than make sure to burn documents.” said Dovolina.
“This protects the Army and its mission and it protects a person’s identity from identity theft.”
According to a 2007 USA Today article, data thieves and con artists have begun to increasingly
target military personnel. In May 2006, thieves stole computers containing sensitive data for nearly
30 million active and retired service members from four Veterans Affairs offices.
Page 22
“It’s very easy to get a person’s last name and “Google” it on the internet. People pick up
information and download pictures from blogs, Myspace and Facebook to get access to personal
information that can lead to identity theft.”
Violating OPSEC has serious consequences. Recently, Soldiers have been fined and received a
reduction of rank for blogging sensitive details and information, said Dovolina.
OPSEC standards accentuate teamwork and are a big part of mission success. Sgt. Eric Weaver, an
MND-B intelligence analyst from Youngstown, Ohio, sees it as an adjustment to the military
lifestyle.
I’ve always been a free speaker, now; I have to be more self-conscious. Work is something I don’t
talk about.”
“We are all Army brothers and sisters, so why would you want to bring harm to your brother or
sister,” emphasized Dovalina. “Everybody needs to do their part and keep each other safe.”
Homer Simpson, the Army’s poster boy for what not to do, got his reputation for having ‘loose lips.’
He brings back memories of the World War II military term, ‘Loose lips sink ships.’ It is a reminder
of how talking out of turn can compromise missions, destroy equipment, or even cause loss of life.
“OPSEC means not slipping with a word or a phrase,” said Weaver. “The costs involved are too
serious. Too much is at stake, especially in theater.”
Table of Contents
Colonies of 'Cybots' May Defend Government Networks
By Joshua Rhett Miller, FOX news, 5 March 2009
The Cybot Age could soon be upon us. But be not afraid; this isn't Star Trek. We're not talking
droves of evil cyborgs bent on galaxy domination.
If all goes as planned, in just a few years colonies of software robots -- "cybots" -- linked into a
"hive" mind could be defending the largest computer systems in America against network
intruders.
Researchers at the Oak Ridge National Laboratory say the program behind the cybots — Ubiquitous
Transient Autonomous Mission Entities (UNTAME) — will be very different from current
cybersecurity systems.
Joe Trien, who leads the team at the lab's Computational Sciences and Engineering Division, said
what will make cybots so useful is that they will be able to form groups, function autonomously and
respond almost immediately.
Trien likened the UNTAME framework to the Borg, a fictitious race of cybernetic organisms in "Star
Trek: The Next Generation" that assimilated other cultures throughout the galaxy.
"The difference between an agent-based system and UNTAME is that the cybots are designed to
function on their own and they can regenerate," he said. "It works with other robots, and what it
does is known by the collective. So when you lose a robot, the collective hasn't lost the information
that robot was able to achieve up until the point it was killed."
And that couldn't come a better time. Cyberattacks on government computer networks spiked 40
percent last year, according to US-CERT, the United States Computer Emergency Readiness Team.
President Obama is now making computer security a priority and is asking Congress for $355
million to make private and public cyber systems more secure, as part of his Comprehensive
National Cybersecurity Initiative.
Consumers lost nearly $240 million as a result of cybercrime in 2007, an all-time high and an
increase of nearly $40 million from 2006, according to a report released by the National White
Collar Crime Center and the FBI.
Trien warned that a coordinated cyberattack today could cripple critical U.S. infrastructures with
"little investment or expertise" on behalf of a hacker.
Page 23
"You could be a cyber-terrorist sitting anywhere around the world, and you could shut down the
United States' economy if you were able to break into critical networks," he said. "We're very
vulnerable."
Not only could UNTAME help save thousands, even millions of dollars lost to cyber criminals, Trien
points out that it will also also be cost-effective because once the system is set up, it runs itself.
"You basically automate the process and do it real-time instead of having an individual doing it,"
Trien said. "What took you hours may now take you seconds."
But the laboratory-tested prototype is at least two years away from private or municipal use,
depending on resources made available through developers, Trien said.
Lawrence McIntyre, one of the project's developers, said several kinks need to worked out before
the program is used in real-world scenarios, including perfecting UNTAME's artificial intelligence
system, which hasn't been "well developed yet," he said.
"You have to make it easy for people to understand and easy for people to use," McIntyre said. "At
this point, it's a very 'researchy-type' software."
Commissioned in part by the U.S. Department of Energy, the project — which began in the early
1990s — was launched to response to security flaws in government computer systems. UNTAME
has already garnered interest from the Air Force Research Laboratory, which leads the way in
military-related computer security.
"We've had several in-depth discussions," Trien said of ongoing talks with Air Force officials. "The
Air Force has established long-range research objectives and we've discussed the possibility of
assisting them in reaching their goals."
Established in 1943, the Oak Ridge National Laboratory in Tennessee is the Department of Energy's
largest multipurpose, nonweapons laboratory.
The 10,000-acre facility, which houses more than 4,000 staffers, initially served as the Manhattan
Project's site to develop nuclear weapons. Following World War II, research efforts at Oak Ridge
shifted to fields like biology, physics, medicine and national security.
"If we don't do something to harden our network security and information, we're vulnerable to
attack,"
Table of Contents
America's Wired Warrior
By Douglas MacMillan, BusinessWeek, 9 March 2009
Major Elden Lacer didn't expect to be sitting in a classroom in Oklahoma this winter. An 18-year
U.S. Army veteran, he has served two tours of duty in Iraq. But Lacer isn't doing standard training.
Instead, he's taking an unusual 11-week training course on electronics, learning such things as
how to turn a garage door opener into a bomb detonator. He's also finding out how insurgents can
turn key fobs into explosives and how tech systems called jammers can be used to disable
electronic weapons. "Whoever can [use this technology] best is going to have a decided
advantage," says Lacer, a former Apache helicopter pilot.
The course is part of a growing push by the U.S. military into high-tech warfare. One leading-edge
strategy is to attack enemies and bolster defenses by disrupting electromagnetic signals in battle.
On Feb. 12, the Army announced it would train 1,600 full-time specialists in the discipline, to
support the thousands of officers like Lacer who have received electronic warfare training in recent
years to complement their normal roles.
While the Defense Dept. has warned of large spending cuts to conventional weapons and vehicle
programs, such as the F-22 fighter aircraft, the Obama Administration is expected to allocate more
funding for equipping soldiers with innovative electronic systems that have proven vital in
nontraditional environments, such as Afghanistan. The government "wants to focus [its budget] on
Page 24
things that will help us win the war against terror in Iraq and Afghanistan and not some conflict 10
years down the pike," says Cai von Rumohr, an analyst at Cowen & Co. in Boston.
The trend presents an opportunity for major defense contractors, such as Boeing, Northrop
Grumman, and Raytheon. But it's also a challenge. They need to figure out how to inject a bit of
Silicon Valley into everything from tanks to machine guns.
The Early Days
The use of sophisticated electronics in warfare dates back to World War II, when radio and radar
systems were used primarily to navigate planes and ships, as well intercept and jam enemy
signals. In the Vietnam War, the U.S. deployed its first electronic warfare officers, who flew aboard
aircraft and helped defend against the new threat of surface-to-air missiles.
In Iraq, electronic weapons proved to be the best defense against improvised explosive devices, or
IEDs. Often used as roadside bombs, these devices have accounted for about 70% of American
combat casualties suffered there. The Pentagon scrambled to order thousands of what it calls
CREW devices (for "counter radio-controlled electronic warfare"), which disrupt the remote
detonators used on many IEDs, and to train frontline soldiers to use them. ITT (ITT), which
acquired EDO in 2007 to become the largest manufacturer of CREW jammers, now commands
some $1.75 billion in government contracts for the devices. "The budgets for counter-IEDs have
grown dramatically as a result of the threat," says John Capeci, ITT's vice-president for business
development.
As a result of the shift to ground-based battles of electronics, the Army has had to train its own
soldiers in the discipline rather than rely on specialists from the Air Force or Marine Corps, as it had
in the past. "We realized we had to do it for ourselves," says Colonel Laurie Buckhout, who became
chief of the Army's new electronic warfare division. She says that since 2007, the service has
trained some 4,000 soldiers in electronics, from low-ranking battalion members all the way up to
four-star generals, who serve as part-time tech experts in their existing units. The 1,600 new
electronic warfare specialists will be spread out so there's at least one in every battalion (which
means roughly 1 for every 300 to 600 soldiers).
Electronic Noise
Unlike previous conflicts, electronic signals are everywhere in Iraq—making it harder for specialists
to root out enemy insurgents. In a typical city block in Baghdad, the electromagnetic spectrum can
be crowded with up to 50 different sources of noise—everything from U.S. radios, friendly-force
radios, GPS systems, and ambulance dispatchers to overhead planes and helicopters. "In the
middle of all that, you might have an insurgent planning an operation to detonate a bomb," says
Buckhout. "So we really need to have much more surgical capabilities that allow us to continue our
use of the spectrum while attacking our enemy."
As weapon and vehicle technology evolves, so will the role of electronics in warfare. "With
electronic warfare, you don't just have the potential of destroying the enemy's systems—you have
the potential for battles of persuasion," says P.W. Singer, a senior fellow at Washington-based think
tank Brookings Institution and author of Wired for War: The Robotics Revolution and Conflict in the
21st Century (Penguin, 2009).
Such a battle of persuasion has powerful implications for the use of robots in war. The U.S. has
already deployed at least 19,000 unmanned ground and aerial vehicles, which are controlled
remotely. Such countries as China and Russia have developed comparable programs. In a war
between robots, electronics engineers will be capable not just of shutting down enemy robots, but
of "making them do things the enemy didn't want them to do," says Singer.
Future Funding
Both electronic warfare and unmanned aerial vehicles were singled out by President Barack Obama
during his campaign, when he referred to such technology as "revolutionary"—a sign that many in
the military community take to mean he plans to push for the swift adoption of more cutting-edge
Page 25
technology. The Administration is expected to submit its budget recommendations to Congress in
April, and the Defense Dept. will draft its Quadrennial Defense Review Report for 2010 by yearend.
"The role of electronic warfare has been proven in protecting people on the ground from IEDs,"
says Representative Joseph Pitts (R-Pa.), a former electronic warfare officer in the Vietnam War
and head of the nonpartisan Electronic Warfare Working Group. "Now we need the leadership and
funding."
Table of Contents
Behind The Estonia Cyberattacks
By Robert Coalson, Radio Free Europe/Radio Liberty, March 06, 2009
In the spring of 2007, a cyberattack on Estonia blocked websites and paralyzed the country's entire
Internet infrastructure. At the peak of the crisis, bank cards and mobile-phone networks were
temporarily frozen, setting off alarm bells in the tech-dependent country -- and in NATO as well.
The cyberattacks came at a time when Estonia was embroiled in a dispute with Russia over the
removal of a Soviet-era war memorial from the center of Tallinn. Moscow denied any involvement
in the attacks, but Estonian officials were convinced of Russia's involvement in the plot.
A new blog post for Ekho Moskvy makes a startling revelation about the 2007 attacks. The post, by
journalist Nargiz Asadova -- a columnist for RIA Novosti based in Washington, and an Ekho Moskvy
host -- describes a March 3 panel discussion between Russian and American experts on information
warfare in the 21st century.
Asadova, who was moderating the discussion, asked why Russia is routinely blamed for the
cyberattacks in Estonia and Georgia, where government sites were seriously disrupted during the
August war.
She might not have been expecting the answer she got from Sergei Markov, a State Duma Deputy
from the pro-Kremlin Unified Russia party: "About the cyberattack on Estonia... don't worry, that
attack was carried out by my assistant. I won't tell you his name, because then he might not be
able to get visas."
Markov, a political analyst who has long been one of Vladimir Putin's glibbest defenders, went on to
explain that this assistant happened to be in "one of the unrecognized republics" during the dispute
with Estonia and had decided on his own that "something bad had to be done to these fascists." So
he went ahead and launched a cyberwar.
"Turns out it was purely a reaction from civil society," Markov reportedly said, adding ominously,
"and, incidentally, such things will happen more and more."
In Russia, Markov's confession is all over the blogosphere, but has yet to be picked up by the
Russian media.
Estonian Defense Ministry officials, meanwhile, have reiterated their certainty that Russia was
behind the cyberattack, but played down Markov's claims, saying the 2007 incident was a highly
coordinated campaign that could not be the work of a single mischievous hacker.
Still, Asadova notes that Markov -- as a member of the Russian delegation to the Parliamentary
Assembly of the Council of Europe -- should know that his assistant could face a lot more trouble
than just problems getting a visa to vacation in Cannes. Turns out that taking down government
sites in Estonia is a crime.
Table of Contents
Do Journalists Make Good Public Affairs Officers?
From C3CBLOG, 8 March 2009
The Information Operations and Influence Activity (IOIA) Symposium, held this week at UK’s
Defence Academy, threw up several enticing cerebral teasers, not least the tension between two
schools of thought regarding public affairs (or as the Brits say ‘media operations’). On the one
Page 26
hand, it is claimed by the old guard that public affairs (PA) merely informs (as can be found in US
doctrine). On the other, the young turks would have it that information is never value-free and
therefore PA will always have an element of influence to it.
As much as CB3 would like to subscribe to the former, the brute force of reality must indicate the
latter to be the case. Even at a most simple level, if one stubbornly keeps to transmitting utterly
‘true’ facts and figures, claiming to only inform - the mere selection of which facts to reveal
introduces a bias, and therefore a degree of sway or influence, even unconsciously.
This raises a further question, one broached at IOIA. If journalists live and die by their adherence
to seeking the truth, informing not influencing and unbiased reporting, can they so easily transfer
themselves into roles which are inherently partisan, promotional and influencing? There is well
documented tension between the arenas of public relations and the media (although they provide
each other with vital life support) - using a market analogy, they are at opposite ends of the
supply-demand equation.
Many journalists make the jump to PR, some very successfully, others less so - it may be their
contact books which are in demand rather than their prowess as flacks. Equally, many journalists
are employed by vitally important reserve military forces (especially in the UK) as public
affairs/media operations officers. Many are consummate operators in both journalism and PA,
proving mental dexterity, but is it time to question the seemingly automatic assumption that a
journalist will be a natural candidate for PA, or wider communication, duties?
This is no way reflects upon the crucial media and PA capability that the reserve forces provide,
supplying resources which often are unavailable from the regular forces.
Table of Contents
Army Developing Teams for Electronic Warfare
By Thom Shanker, New York Times, March 7, 2009
WASHINGTON — Viewed by its sister services as the less brainy branch of the armed forces, the
Army over recent years had neglected to maintain its own ability to fight electronic warfare, relying
instead on the expertise of the Air Force and the Navy. But the ground wars in Iraq and Afghanistan
have introduced deadly new threats and proved how that lack of attention to electronic warfare has
put soldiers directly at risk.
Information-age attacks, like improvised explosive devices detonated by cellphones, radios and
garage door openers, have claimed more lives than any other type. And there are high-tech
benefits that must be managed, including friend-or-foe tracking devices and surveillance drones
that beam video straight to troops in battle.
In response, the Army is developing its own electronic warfare teams. The initial goal is to train
more than 1,600 people from enlisted ranks through the officer corps by 2013, and to double that
in the following years, giving the Army enough of these specialists to rival its sister services and
surpass all of the NATO allies combined.
Gen. Peter W. Chiarelli was the first person to sound an alarm that the Army’s neglect of electronic
warfare was endangering troops. General Chiarelli was serving as the No. 2 commander in Iraq
when he sent a memorandum to Army leadership at the Pentagon in February 2006, warning that
soldiers were unable to operate the new high-tech gear that was being rushed to the war zone to
counter the rising threat of improvised explosive devices, or I.E.D.s.
General Chiarelli also warned Army headquarters that the ability of commanders and troops to
communicate was diminishing as allied and American radios and electronic jamming gear fought for
space on the limited broadcast bands, degrading the quality of transmissions all across the
spectrum.
“When I first got over there in 2004 and in 2005, we didn’t have any Army electronic warfare
capabilities,” said General Chiarelli, who is now the Army vice chief of staff. “It became deadly
Page 27
apparent in 2006, with the rise of I.E.D.s. At the same time, we were having big problems with the
jammers and how to deconflict them with all of the other radio and signals traffic.”
The Army reached out to the other services for help. Adm. Mike Mullen, then the chief of naval
operations but since promoted to chairman of the Joint Chiefs of Staff, immediately ordered to Iraq
hundreds of sailors who specialized in electronic warfare.
“They saved a lot of lives when they came over,” General Chiarelli said. “They became the most
important person in each formation down to the battalion level. They were sought out by soldiers
who knew they had to learn this kind of warfare.”
In the three years since, hundreds of Air Force personnel have also served as electronic warfare
specialists with ground units in Iraq.
In that time, the Army has produced a doctrine on electronic warfare that will join other new field
manuals, including a better known one on counterinsurgency, that are transforming how the
service prepares for and fights wars.
The Army’s new field manual, “FM 3-36, Electronic Warfare in Operations,” instructs commanders in
how to integrate electronic warfare into all tasks, from planning to carrying out military operations.
It also lays out a program for training personnel and sets the requirements for equipment.
“We simply have to look at ways to attack, and to protect ourselves, all across the frequency
spectrum,” said Col. Laurie Moe Buckhout, chief of the Army’s electronic warfare division.
Managing communications, and protecting those transmissions, is complicated enough in the
civilian world, but the problem is magnified in a combat zone, which is cluttered with sometimes
conflicting radio signals from various American and allied units.
Military risk assessments note that potential adversaries, from nation states to terrorist groups, are
seeking to increase their abilities to attack electronic frequencies. The goal would be to scramble
radio and cellphone traffic, block signals from convoys that allow headquarters to track the
movements of troops and supplies, or jam data from satellites that feed vital navigation systems.
“The enemy’s ability to weaponize the spectrum to detonate an I.E.D. was just the tip of the
iceberg,” Colonel Buckhout said.
Electronic warfare is among the military’s most highly classified efforts, routinely carried out in
conjunction with the nation’s intelligence agencies. It focuses on signals carried by radio and
microwave frequencies, and is usually confined to a tactical battlefield setting.
It is separate from the other growing field of combat, cyber warfare, which deals with defending or
attacking computer networks, with local, national and even international impact.
Table of Contents
Public Diplomacy in the Digital Age, Part 2
By Mark Hannah, PBS.org, March 5, 2009
"How could a mass murderer who publicly praised the terrorists of Sept. 11 be winning the hearts
and minds of anyone? How can a man in a cave outcommunicate the world's leading
communications society?" -- Richard Holbrooke, Former US Ambassador to the UN, Get the
Message Out, The Washington Post, October 2001
We're a nation at war. At war not with another nation, but with a hateful ideology violently
expressed: terrorism. Every militaristic move a terrorist makes is designed to intimidate, frustrate,
agitate....in short, communicate. Physical destruction and loss of life, crass as it sounds, are means
to those ends. In this sense, the war of ideas is no longer a metaphor or a figure of speech -- it's a
literal war in which we now find ourselves. And in a war of ideas, public diplomacy will be an
important tool in our national security toolkit.
If you're just joining us -- and haven't yet had a chance to read Part 1 of this post -- public
diplomacy is the practice of influencing public opinion abroad in order to achieve America's foreign
policy goals. It's primarily the responsibility of the State Department and the Broadcasting Board of
Page 28
Governors. As former Under Secretary of State Jim Glassman explained in the comment section of
my last post, it's all about "understanding, informing, engaging and influencing foreign publics." It's
alternately characterized as a "war" of ideas or a "global marketplace" of ideas.
As the modern technology becomes more commonplace, America's enemies will inevitably develop
increasingly destructive armaments. And with the rapid proliferaiton of Internet technology, some
in the national security community are turning their attention to the possibility of large scale online
attacks -- "cyber-terrorism" -- and how public diplomacy may be one way to prevent them.
Public Diplomacy for National Security
There's long been consensus that public opinion is vital to domestic policymakers. President Lincoln
said, "Public sentiment is everything. With public sentiment nothing can fail; without it nothing can
succeed." Later, at the dawn of the information age, President Eisenhower would apply this maxim
to foreign policy as he spoke of "the spreading of ideas through every medium of communication"
as a part of "real psychological warfare." Today, we hear echoes of this rhetoric when foreign
policymakers talk of the "global information battle-space."
Matt Armstrong, who authors a prolific blog, Mountain Runner, on the topic of public diplomacy,
urges us to "reestablish public diplomacy as the tool of national security it must be." Citing
Margaret Thatcher's assertion that "media is the oxygen of the terrorist," he writes:
Being able to communicate ideas and counter misinformation and distortion has always been
essential to peace, stability, and national security in general.
Recognizing that many of the most influential international actors -- friend and foe alike (e.g.,
foundations, NGOs and terrorist organizations) -- are not bound by national borders, Armstrong
proposes a Department of Non-State, more similar to the now-extinct U.S. Information Agency
than the current State Department, which would commandeer public diplomacy responsibilities to
deal with non-state entities. Regardless of whether this specific recommendation is feasible, the
suggestion to "think outside the border" seems sensible enough given these 21st century realities.
A report out this week from the Senate Foreign Relations Committee titled, U.S. Public Diplomacy - Time to Get Back in the Game [PDF] shows that some elected officials are taking the dire state of
public diplomacy seriously (despite its casual title):
It is no secret that support for the United States has dropped precipitously throughout the world in
recent years. Many experts believe this is due not only to various U.S. foreign policy developments
but also to the method by which we conduct our Public Diplomacy...This lack of focus was also
partly due to the belief that, with the collapse of the Soviet Union, we had won the "War of Ideas" - a belief that 9/11 quickly shattered.
The "war of ideas" is -- and will continue to be -- an increasingly important front on the War on
Terror. And much of this war of ideas will be played out on through new media such as the Internet.
Cyber-terrorism
Cyber-security and cyber-terrorism are recent constructs and the subject of significant debate.
Back in 2001, before 9/11, "Security Czar" Richard Clarke dismissed the likelihood of "information
warfare" being used by terrorists, but routinely emphasized our vulnerability:
You can take virtually any major sector of our economy -- or, for that matter, the government -and do a vulnerability analysis and discover that it's relatively easy to alter information, disrupt and
confuse the system, and even shut the system down...shutting the system down has consequences
-- the electric power grid crashes, trains stop running, airplanes crash into each other.
While there have been a few examples of politically motivated hackers attacking certain
government websites (a phenomenon known as "hacktivism"), there have as yet been no incidents
of sabotage on the scale that Clarke described. Also relevant, the hacktivism that we have seen so
far has not been perpetrated by known terrorist organizations.
As a result, some critics think the concept is overblown. Indeed, in his book Terror on the Internet,
Gabriel Weimann is limited to investigating "how modern terrorist organizations exploit the Internet
Page 29
to raise funds, recruit, and propagandize, as well as to plan and launch attacks and to publicize
their chilling results" since there are no examples of direct terrorist attacks via the web. That is,
terrorists have turned the Internet into a battlefield in the war of ideas, but there's little evidence
that these organizations have, in a physical sense, weaponized the Internet.
In a special report published by the United States Institute of Peace, Weimann notes that fears of
cyber-terrorism have been exaggerated, fueled largely by the fact that "two of the greatest fears of
modern time are combined in the term...The fear of random, violent victimization blends well with
the distrust and outright fear of computer technology."
But, in this case, fear itself isn't the only thing we have to fear. Weimann suggests that our military
victories might actually have the effect of making "terrorists turn increasingly to unconventional
weapons such as cyber-terrorism."
So, if our military victories aren't coupled with public diplomacy victories (i.e. winning over mutual
respect and muting hatred), then our foes will be armed with not just the means, but the
motivation to do America harm. Without effectual public diplomacy gains, the specter of cyberterrorism will grow more vivid as a new digitally savvy generation of would-be terrorists comes of
age. Frank Cilluffo, the director of the Homeland Security Policy Institute at George Washington
University, commented, "While Bin Laden may have his finger on the trigger, his grandchildren may
have their fingers on the computer mouse."
Table of Contents
Page 30
Download