ARSTRAT IO Newsletter

advertisement
Information Operations
Newsletter
Compiled by: Mr. Jeff Harley
US Army Space and Missile Defense Command
Army Forces Strategic Command
G39, Information Operations Division
The articles and information appearing herein are intended for educational and non-commercial purposes to promote discussion of research in
the public interest. The views, opinions, and/or findings and recommendations contained in this summary are those of the original authors and
should not be construed as an official position, policy, or decision of the United States Government, U.S. Department of the Army, or U.S.
Table of Contents
Army Strategic Command.
ARSTRAT IO Newsletter on OSS.net
ARSTRAT IO Newsletter at Joint Training Integration Group for Information Operations (JTIG-IO) Information Operations (IO) Training Portal
Page 1
Table of Contents
Vol. 11, no. 10 (July – September 2011)
1.
"The Coming Cyber Wars"
2.
Chinese Army Targets iPhone, iPad With Propaganda App
3.
U.S. Military Disables Iraqi Insurgent Websites, Book ‘Counterstrike’ Says
4.
Computer Lab’s Chinese-Made Parts Raise Spy Concerns
5.
U.S. EW Threatened By Budget Cutting
6.
How ‘Quiet Americans’ helped defeat Al Shabaab
7.
Chinese Concepts and Capabilities of Information Warfare
8.
Battle Updates Space and Missile Defense Conference on Cyber Huntsville Progress
9.
Army Cyber 2020
10. 10 Years Later: How We Won
11. Information Warfare: A Historical Approach
12. Anti-Israel Turks Erroneously Hack Into Palestinian Sites
13. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
14. 7 Lessons: Surviving a Zero-Day Attack
15. Tactical Information Operations in Contemporary COIN Campaigns
16. The Taliban are winning Afghanistan's information war
17. Arab Protesters and Social Media: Need For Engagement – Analysis
Page 2
"The Coming Cyber Wars"
By Richard Clarke Op-Ed, Boston Globe, July 31, 2011
Obama's cyber strategy is missing the strategy
Imagine if President Kennedy issued a nuclear war strategy in the 1960s that omitted the fact that we had
nuclear weapons, B-52 bombers, and long-range missiles. What if his public strategy had just talked about
fallout shelters and protecting the government? As absurd as that would have been, that is similar to what the
Obama administration just did with regard to the nation's cyber war strategy. The strategy doesn't even admit
that we have cyber weapons.
Under pressure from Congress and commentators to provide a strategy for how the new US Cyber Command
will use its "cyber war fighters," the administration recently issued a strategy that was met with barely stifled
yawns from cyber experts and military strategists. Apparently, that was the intent. The State Department
wanted to avoid charges that the United States was "militarizing" cyberspace, or that we were the first to
conduct cyber war (the attack on the Iranian nuclear facility at Natanz). And the White House wanted to avoid
any public discussion of cyber war or our strategy to fight one.
What got issued were five "strategic initiatives." First, the United States will "treat cyberspace as a domain,"
but only for the purposes of organizing, training, and equipping. There is nothing in the initiative about
treating it as a domain for war fighting.
Second, the Pentagon will employ new defense concepts "to protect" the Department of Defense. Apparently,
those new concepts won't protect the rest of us. Third, Defense will partner with other departments and the
private sector "to enable a whole of government cyber security strategy." It's not a "whole country" strategy,
just government.
Fourth, the Pentagon will build "robust relations" with other countries.
Finally, Defense will "leverage ingenuity" to create an exceptional workforce and make rapid technology
advances.
While it may be difficult to object to those platitudes, it is also hard to call them a strategy. For one thing,
they don't even mention that the United States has an offensive cyber war capability. Somehow that was
omitted from the 13-page unclassified document dribbled out by the Pentagon.
Retiring General James E. Cartwright, the vice chairman of the joint staff, worked on the strategy and has
since said that current approach of just trying to plug the holes in our networks does not punish attackers for
their rampant cyber espionage against us. As head of US Cyber Command, General Keith B. Alexander has
talked about a strategy of "active defense" that suggests that the United States engage in preemptive cyber
attacks. Both generals have bemoaned the inability of the civilian departments and the private sector to
defend critical US networks (like banking, electricity, and transportation) and have suggested the military may
have to defend those networks.
Congress should demand answers to questions like: What is the role of cyber war in US military strategy? Is it
acceptable to do "preparation of the battlefield" by lacing other countries' networks with "Trojan horses" or
"back doors" in peacetime? Would the United States consider a preemptive cyber attack on another nation? If
so, under what circumstances? Does US Cyber Command have a plan to seize control and defend private
sector networks in a crisis? Do the rules of engagement for cyber war allow for military commanders to
engage in "active defense" under some circumstances? Are there types of targets we will not attack, such as
banks or hospitals? If so, how can we assure that they are not the victims of collateral damage from US cyber
attacks?
That last question, about collateral damage, is no longer theoretical. The so-called Stuxnet cyber weapon,
which attacked and destroyed nuclear centrifuges in Iran, escaped into cyberspace. This sophisticated cyber
weapon was then captured by many computer experts around the world and is now freely available for anyone
to download. It raises the specter of whether non-state actors will soon be able to engage in cyber war.
During his confirmation hearings, Secretary of Defense Leon Panetta voiced concern about the possibility of a
"digital Pearl Harbor" that would cripple our electric power grid, banks, and transportation networks.
Now that he is in the Pentagon, he might want to suggest to the State Department and the White House that
it is time to treat the American people like adults and have a real public discussion of our cyber war strategy.
Table of Contents
Page 3
Chinese Army Targets iPhone, iPad With Propaganda App
By Adam Rawnsley, Wired, August 11, 2011
China The U.S. isn’t the only military with designs on invading the smartphone world. China’s armed forces
are starting to fill the app gap with a new iPhone program from the People’s Liberation Army.
China’s Ministry of Defense announced Monday that it was releasing an official app for iPhones and iPads to let
users keep up on People’s Liberation Army (PLA) goings-on. It’s a newsreader app that lets users view press
releases, pictures and video from official military outlets like the PLA Daily newspaper and China’s Ministry of
Defense.
Peng Guangqian, a retired PLA general and a strategist at China’s Academy of Military Science, told the staterun newspaper China Daily that cooperation with a cool company like Apple will help the military be more hip
and transparent.
Despite what Guangqian says, the PLA isn’t exactly cooperating with Apple on its news app. Quite the
opposite, actually. Try looking for it in the app store and you won’t find it. Why? It’s only available on
jailbroken iPhones. Some news outlets speculate that China may have chafed at Apple’s stringent app
development rules for its mobile military mouthpiece.
An app that soaks up official news feeds and spits them out on iPhones probably isn’t what Pentagon officials
had in mind when they pestered China’s military for greater transparency. Not that a lot of American military
types are likely to install the PLA app anyway. China has been suspected of a number of hacking incidents,
from a break-in on an unclassified Pentagon network to a recent attack against mega contractor Lockheed
Martin. Given the history, installing PLA software on your mobile device would likely be a big security faux
pas.
Putting the PLA app on iOS, Apple’s mobile operating system, make sense given the popularity of Apple mobile
devices in China, now the world’s second largest market for iPhone apps. There’s no word yet on a companion
app for the rival Android mobile operating system. (Although the PLA may not want to go there, given China’s
ongoing feud with Android’s developer, Google.)
But don’t worry, America. The Defense Department may not have completely embraced smartphones yet, but
we’re still number one in mobile technology compared to China. The Army and Navy have had their own apps
with news and recruiting info for a while now. Contractors are also looking to sell apps for use on the
battlefield, offering up programs like the SoldierEyes Common Operating Picture and the Raytheon Advanced
Tactical Systems that let troops track the position of their buddies in the field. For it’s part, the Army’s also
toying with its own app store and Android-based smartphone for soldier.
Table of Contents
U.S. Military Disables Iraqi Insurgent Websites, Book ‘Counterstrike’
Says
By Tony Capaccio and Brendan McGarry, Bloomberg, Aug 15, 2011
The U.S. military has hacked and temporarily disabled Iraqi insurgent and terrorist-based websites, a littleknown tactic that’s part of a government “counterstrike” capability, according to a new book.
At least two sites were “knocked off the web” prior to Iraq’s March 2010 national election after “the largest
interagency meetings held since” the September 11, 2001 terrorist attacks, write New York Times reporters
Eric Schmitt and Thom Shanker in “Counterstrike: The Untold Story of America’s Secret Campaign Against AlQaeda.” The book is scheduled for publication tomorrow.
The sites, including one sponsored by a “shadowy organization” called the JRTN “were posting specific
operational information that was considered a clear and emerging threat to the security of the vote,” they
wrote.
At least one site, hosted by a U.S.-based Internet service provider, was shut down after a visit from U.S.
lawyers “presenting snapshots of virulent, extremist and violent web pages carried on their server,” they
wrote. The U.S. provider was not identified.
The book, in chapters called “Terror 2.0” and “The New Network Warfare,” sheds light on offensive U.S. cyber
operations almost never discussed by U.S. officials. The book’s cites tactics such as “overloading,” without
details.
Cyber Deterrence
Page 4
The book’s disclosures contrast with the Pentagon’s public description of its strategy for blunting cyberattacks, which focuses on improving defenses instead of deterring intrusions or threatening retaliation.
Deputy Defense Secretary William Lynn July 14 released the Pentagon’s “Strategy for Operating In
Cyberspace,” which outlines five “strategic initiatives.” One is to partner with other U.S. agencies and private
industry to craft a “whole-of- government” approach.
Left unsaid was that the approach includes a capability to review and approve selective U.S. attacks under a
forum known as the “Strategic Operational Planning Interagency Group for Terrorist Use of The Internet,” the
authors write.
Proposals for attacks are reviewed by what Schmitt and Shanker call a “powerful board of governors assigned
to oversee counterstrikes on the Internet,” under a “three-way agreement” among the Pentagon, intelligence
agencies and the Justice Department “for considering timely attacks on terrorist web sites, with the president
making the final decision on whether to proceed.”
Then-President George W. Bush, in a secret authorization, in effect “declared Iraq an official battle space for
America’s cyberwarriors,” as it became “a real-world laboratory for computer network warfare,” they write.
Postings, Jamming, Scanning
To sow distrust and confusion among jihadists, the U.S. also uses a technique of “webspoofing” called “false
band replacement” where U.S. intelligence infiltrate networks and post their own materials.
The agencies have forged al-Qaeda “web watermarks” that in effect “makes messages posted on these sites
official,” Schmitt and Shanker wrote.
One official told them “we have learned to mimic their watermarks.”
The U.S. military also “had the ability to hack into their phones and we would text message guys” telling them
“another guy is cheating you out of money,” one “senior official” told the reporters.
Radio Jamming
Pentagon and State officials in Kabul devised an “over- broadcast” technique to jam insurgent pirate radio
networks using a strong signal over to block the adversaries’ message and send “counterprogram” coalition
messages on adjacent channels.
“The goal is fuzzing out the militants’ radio broadcasts so everybody has to turn to another station -- and that
station is yours,” said a U.S. official. The commercial technology to track, locate and “overbroadcast a signal”
costs about $10,000 the official said.
Perhaps the U.S. greatest technological advance in the war on terror is the eavesdropping National Security
Agency’s supercomputers that can “collect, analyze, sort and store data from a range of communications, in
particular cell phone conversations, emails and web sites, billions of times faster than humans can.”
The NSA computers scan and store the call history of cell phones turned over by thousands of temporary and
permanent detainees that pass through U.S. camps in Iraq and Afghanistan or voluntary applicants for
government jobs, they write.
“Each of these cell phones can be copied or cloned in seconds” and scanned for any matches to terrorist group
members. “It opens the door to a whole command and control network,” he told the authors.
Table of Contents
Computer Lab’s Chinese-Made Parts Raise Spy Concerns
By Eli Lake, The Washington Times, August 16, 2011
A U.S. supercomputer laboratory engaged in classified military research concluded a recent deal involving
Chinese-made components that is raising concerns in Congress about potential electronic espionage.
The concerns are based on a contract reached this summer between a computer-technology firm and the
National Center for Computational Engineering at the University of Tennessee, whose supercomputers
simulate flight tests for next-generation U.S. military aircraft and spacecraft, and simulate submarine warfare
for the Navy.
The storage system for the contract calls for using software from U.S. cybersecurity firm Symantec installed
over devices made by Huawei Technologies, a Chinese telecommunications giant that U.S. officials have said
has close ties to China’s military. Huawei and Symantec formed a joint venture in 2008, with Huawei owning
51 percent of the shares of the enterprise.
Page 5
Last week, four Republican senators and one member of the House Permanent Select Committee on
Intelligence urged the Pentagon and Energy Department in a letter to review the contract for potential risks to
national security.
The lawmakers’ request highlights tensions between the intelligence community and high-technology
companies on how sensitive computer servers, microchips and software that are designed or produced in
foreign countries can provide foreign intelligence services backdoor access to sensitive information systems.
“Given Huawei’s close ties to the [Chinese] government and its military and intelligence sectors, its history of
alleged corrupt practices and infringement on intellectual-property rights, and concerns it may act as an agent
for a foreign government, Huawei is not an appropriate partner for advanced U.S. research centers especially those working on critical or classified defense projects for the United States government,” the five
lawmakers stated in an Aug. 9 letter to Defense Secretary Leon E. Panetta, Energy Secretary Steven Chu and
Mary Schapiro, chairwoman of the Securities and Exchange Commission.
The lawmakers were Sens. Jon Kyl of Arizona, Jim DeMint of South Carolina and Tom Coburn and Sen. James
M. Inhofe, both of Oklahoma, and Rep. Sue Wilkins Myrick, a North Carolina Republican who chairs the House
Intelligence subcommittee that oversees counterintelligence.
Huawei’s vice president for external affairs, William Plummer, said in an interview Tuesday that the concerns
expressed by the lawmakers are misplaced.
“This letter is just the most recent chapter in what has become a tiresome book promoting fear about China
and slandering Huawei as a proxy,” he said. “The fiction is growing old.”
Huawei was founded in 1988 by Ren Zhengfei, a former engineer for the People’s Liberation Army, the
Chinese military. U.S. intelligence agencies suspect the company of having the capability of bugging
microchips it seeks to install in U.S. networks and equipment that could give China’s government the
equivalent of a listening post inside U.S. telecommunications architecture.
In 2008, the Treasury Department-led Committee on Foreign Investment in the United States blocked a
proposed sale of the software company 3com to Huawei, based on national security grounds. Last year,
representatives of the National Security Agency urged major telecommunications companies such as AT&T and
Sprint to cancel a deal that would put Huawei firmware and hardware on the cell towers of the national 4G
wireless network.
“My understanding is the ownership of Huawei is closely tied to the government of China,” said retired Air
Force Col. John Toomer, who left the service this year as deputy director of the cyber and information
operations directorate.
“We’ve had that fear for a long time, of having chips compromised by intelligence services,” he said. “You are
inviting a risk by using chips manufactured by Huawei at such a sensitive facility.”
Mr. Plummer said in response to that allegation that his company should not be singled out.
“Cybersecurity concerns are real, they are global, they are agnostic to national borders and they apply equally
to the entire information, communication, technology industry supply chain,” Mr. Plummer said. “It is incorrect
to suggest that the gear of one vendor is somehow less secure than the gear of another.”
A 2009 white paper prepared for the congressional U.S.-China Economic and Security Review Commission said
China’s military has “begun employing this capability to mount a large-scale computer-network exploitation
effort for intelligence-gathering purposes against the U.S. and many countries around the world.”
The five lawmakers, in their letter, raised concerns that Huawei is seeking to place its gear inside sensitive
installations by partnering with U.S. vendors. In the case of the University of Tennessee National Center for
Computational Engineering, a company called MPAK Technologies won the bid. That company specializes in
data-storage architecture, and it has sensitive contracts with the FBI and other U.S. government agencies.
In an interview, MPAK founder and CEO Michael Kornblum said his storage architecture was not at risk of
being compromised by an intelligence service. Data for the system would be encrypted, and the storage
system will not be connected to the Internet. He also said the Huawei hardware was not installed on the disc
drives, where the data would be stored.
“If you were to do the kinds of activities the senators are talking about, you would put that technology in the
disk drives because the data lives on the disk drives,” Mr. Kornblum said. “Huawei does not manufacture the
disk drives.”
Jeffrey Carr, the CEO and founder of Taia Global, a cybersecurity firm said, however, that encryption is not
enough.
Page 6
“There are so many alternative ways of compromising a network. It can be done through a thumb drive, a
printer server,” he said. “It could be done through a vendor that seeks to install or to service the equipment,
it could be done through an insider, an alternative communication channel like Bluetooth or another peer-topeer network. It could done through an internal email.”
Mr. Carr, who first wrote about the lab’s contract on his blog last month, said: “If you are targeting an
advanced facility, the bad guy will figure out the layout of the network.”
Another concern expressed by the lawmakers is that Huawei has been subsidized by the Chinese government,
giving it an unfair advantage over U.S. companies such as Cisco Systems.
In the letter, the U.S. lawmakers stated that Chinese policy gives Huawei the ability to offer much lower prices
than their competitors.
Mr. Kornblum said his company’s bid to build the storage system for the supercomputer was “significantly
cheaper.”
“It’s no mystery that Huawei is trying to get into the U.S. market,” he said. “They have done some things to
enter the U.S. market that were less publicized. But they are going to get into the market, and they are going
to eat Cisco’s lunch. Huawei’s technology is superior.”
Huawei’s Mr. Plummer said his company was given $25 billion in credit from 28 banks around the world,
including the Chinese development bank.
Mr. Plummer added: “We are doing business no differently than anyone else does business. We have
customers, and we have partners, and we have suppliers, and that is how business is done.”
Table of Contents
U.S. EW Threatened By Budget Cutting
By David A. Fulghum, Aviation Week, 10 Aug 2011
A clash between the complexity of threats facing the U.S. and the nation’s shrinking resources is under way,
but the Pentagon is losing the battle due to the growing cost of equipment and personnel.
A congressionally driven, debt-reduction compromise—which could trigger defense cuts of as much as $800
billion over a decade—may slow down the military’s upgrading of its electronic warfare, cyberattack, directedenergy and intelligence, surveillance and reconnaissance (ISR) systems, say congressional and military
analysts, just as foreign advances in the field are testing the U.S.’s ability to cope.
Traditionally, in times of funding slowdown, “electronic warfare is the first thing we cut,” says Rep. Rick Larsen
(D-Wash.), who chairs the House electronic warfare working group. But that template may change because
international threats from electronic, directed-energy, information and cyber operations—all now mixed in the
electronic warfare (EW) realm—are growing at lightning speed.
While electronic and cybercombat may dominate future battles, funding is not keeping pace. Moreover, the
military is wearing out its assets, particularly in airborne electronic attack, which could lead to a considerable
EW shortfall, Washington-based analysts contend.
Already, the Air Force has no dedicated high-performance EW platform like the Navy’s EA-18G Growler, points
out Daniel Goure, vice president of the Lexington Institute. And whether the F-35 Joint Strike Fighter will carry
the capability is in question with the anticipated defense budget decline, he says.
The need to transform Air Force electronic attack systems while at the same time spending to upgrade aging
EW systems is presenting a huge financial burden.
“The Air Force cannot sustain systems whose effectiveness does not justify the cost of ownership,” says Col.
Joseph Skaja, chief of Air Combat Command’s combat enabler division for requirements. “Legacy systems
struggle to evolve to meet the challenge,” he says. “[The combat air forces] will spend almost $3 billion to
sustain EW systems. The B-52 systems alone will account for $884 million and the F-15 will soak up a further
$603 million.”
Part of the solution will be changes in what the Pentagon buys, says Jacques Gansler, professor in the
University of Maryland’s School of Public Policy and former undersecretary of defense for acquisition,
technology and logistics.
“Unit cost must be a design requirement,” Gansler says. He points to the Joint Direct Attack Munition as one
of the few programs where that policy applied and notes that cost dropped to $17,000 each from $40,000.
The Pentagon also must stop buying ships, airplanes, tanks and other 20th-century weapons and shift to
intelligence, information, unmanned, anti-missile and networked systems, he says.
Page 7
“An integrated [network-centric] system will include distributed sensors and shooters, rather than requiring
every weapon to be self-sufficient and therefore extremely complex and expensive,” Gansler says. “The lower
cost of individual elements will enable far larger numbers to be acquired.”
The plan to get out from under legacy cost involves focusing investments in the airborne electronic attack (EA)
system of systems, Skaja says. One element is the counter communications electronic attack pod for
communications jamming. The MQ-9 Block 5 Reaper is the platform for testing. Another advance will be the
upgrading of existing EA pods for the F-16 and A-10 using digital radio frequency memory to replace obsolete
parts. The EC-130 Compass Call fleet will be upgraded and enlarged with additional airframes. It will begin
functioning within the Distributed Mission Operations Network. The final component of the upgrading will be
introduction of the Miniature Air-Launched Decoy and Jammer (MALD and MALD-J). The MALD-J provides
stand-in jamming in heavily defended areas. It can degrade and deny the use of radars. An Increment II
improvement is designed to increase the basic jammer payload by a factor of 10. It also will be the vehicle for
high-power microwave attacks to damage enemy electronics.
However, more could be accomplished if the Pentagon and industry cooperate to ensure new investments,
including private funding for EW, and if flag officers in each service are appointed to head EW development
and its associated capabilities and represent the discipline at the highest levels of military and government
decision-making, Larsen says.
The U.S. Army also is trying to move quickly to shore up gaps in its EW capabilities, says Maj. Richard
Savageau of Army Headquarters’ EW division. A total of 29 gaps are being addressed. Among the
improvements planned are linkages to a Joint EW system of systems and the introduction of directed-energy
weapon systems to target improvised explosive devices, unmanned aircraft data links and vehicle electronics.
The jewel in the crown of Army efforts is the Multi-Function EW system that will generate both offensive and
defensive effects against command-and-control communications, indirect fire, radar, electro-optics, infrared
equipment and infrastructure electronics.
Raytheon officials have provided some details about how directed energy—in this case light, inexpensive
lasers—can be introduced to the battlefield.
The services need a cheap, lightweight laser system that operates at slow speeds and low altitudes for
helicopters and unmanned aircraft. Raytheon has integrated a wide range of laser and missile-warning
systems to empirically assess anti-missile capabilities. Company researchers are refining a system that
combines fiber lasers and a seeker from the AIM-9X air-to-air missile.
“This has been pooh-poohed as immature technology,” says Mike Booen, Raytheon’s vice president of
advanced security and directed energy. “It’s not. Part of our preparation is a program with the Air Force that
is called the Quiet Eyes Laser Turret assembly . . . that marries the quantum cascade laser with the turret.
We’ve tested it against real targets . . . through rain and fog and other adverse conditions.”
The scheme to cut costs involves reusing hardware coming off existing production lines and lasers that are
being used for applications in the commercial world. The goal is to offer lightweight, high-reliability hardware
to the Army, Air Force and Navy for new, smaller classes of airborne platforms.
Since unmanned air vehicles, light helicopters and light attack aircraft operating in an ISR or EW role will be
within the threat rings of anti-aircraft missiles, there is interest in lasers that would provide these smaller
platforms maximum operational flexibility and self protection in a lightweight payload.
Table of Contents
How ‘Quiet Americans’ helped defeat Al Shabaab
By Kevin J. Kelley, The East African, 20 Aug 2011
A US-based military training organisation that has been quietly working in Somalia for the past three years is
seen as a key factor behind the recent successes of African Union forces battling the al-Shabaab Islamist
insurgency.
Bancroft Global Development, headquartered on Washington’s Embassy Row, employs about 40 South African
and European trainers who work with the Ugandan and Burundian troops that comprise the AU military
mission in Somalia (Amisom).
Bancroft director Michael Stock told The EastAfrican last week that these mentors are embedded with Amisom
units in Mogadishu and southern and central Somalia. They coach commanders on peace-support operations
strategies, especially on how to predict and defeat the tactics which foreign fighters bring from outside East
Africa and teach to al-Shabaab.
Page 8
The group’s trainers do not carry weapons and have no affiliation with the Pentagon or the CIA, Mr Stock said.
Several have been wounded during Amisom’s battles with Shabaab, but none have been killed, he added.
Mr Stock attributed the survival of his organisation’s employees to Amisom soldiers’ immense courage
protecting Bancroft staff over the past three years. He said this is a very moving sign of the bond between the
mentors and the protégés.”
Mr Stock, a 34-year-old graduate of an Ivy League university, was at pains to distinguish Bancroft from the
private contracting firms that work directly with the US military in Iraq, Afghanistan and other war zones
around the world.
Bancroft, which initially engaged in land mine-clearing operations, is a not-for-profit, non-governmental
organisation, Mr Stock noted. It does not receive funding directly from the US government but is instead paid
by Amisom, which is then reimbursed by the State Department for these outlays.
The Associated Press reports that Bancroft has been paid $12.5 million for its work in Somalia since 2008.
Mr Stock is keen to steer clear of the controversies that have arisen as a result of the Pentagon’s growing
dependence on private contractors. These profit-making firms play essential support roles in US military
operations but they are not subject to public oversight.
Private contractors have become a vital element in Washington’s global strategy because of American political
reluctance or financial inability to assign responsibilities directly to US military personnel. The contractors are
seen as proxies who often work closely with US client forces in the Middle East and elsewhere.
Despite the distinction drawn by Mr Stock, Bancroft is being indirectly funded by the United States in order to
help the Pentagon avoid putting boots on the ground in Somalia.
Obama administration officials have repeatedly said they do not want to insert US troops directly into a war
that Washington does regard as crucial to its counter-terrorism operations worldwide.
Painful memories linger of the sudden US military withdrawal from Somalia in the early 1990s following militia
attacks that took the lives of several American soldiers.
The US relies mainly on Amisom and Somalia’s Transitional Federal Government to counter Shabaab, which
Washington describes as a terrorist organisation with links to al-Qaeda. The US has spent hundreds of millions
of dollars to equip and train Amisom and the TFG’s forces. In addition, the CIA has established a base at
Mogadishu’s airport where it also maintains its own aircraft. The US has also been carrying out its own drone
strikes and special-forces raids against suspected Shabaab targets.
This multi-faceted approach has lately inflicted significant losses on Shabaab, causing it to withdraw from
Mogadishu. Analysts in Somalia suggest that Bancroft deserves some of the credit for this development. Mr
Stock’s organisation is said to have enhanced Amisom troops’ fighting skills and helped the anti-Shabaab
forces gain political support by instructing them in tactics that have reduced civilian casualties in Mogadishu.
On his part, Mr Stock says Uganda and Burundi sent capable, experienced soldiers to Amisom from the
beginning of the mission. Bancroft mentors who have experience in such operations from other parts of the
world helped to transform the conventional combat forces into a much more sophisticated peace-support
operations capability.
The Amisom troops have become truly impressive,” Mr Stock declares. Bancroft is committed to remaining in
Somalia as long as there are humanitarian and development needs and as long as the Somali government and
people want Bancroft to be there, he adds.
Well-placed analysts of the military situation in Somalia caution that Shabaab is likely to adopt a strategy of
assassinations and bombings with the aim of returning Mogadishu to a condition of chaos and thereby
discrediting Amisom and the TFG.
Table of Contents
Chinese Concepts and Capabilities of Information Warfare
By Vinod Anand, Strategic Affairs, Volume 30 Issue 4, October 2006
The People’s Liberation Army (PLA) has been sensitive to continuous changes in geo-political and geo-strategic
contexts, as well as the changing nature of warfare. It has fashioned its responses by evolving appropriate
military doctrines and strategies to meet future threats and challenges. Thus, China’s military doctrine has
over the years undergone a transition from people’s war to ‘people’s war under modern conditions’ and
thereafter from ‘limited local war’ to ‘limited war under high tech conditions’.
The concept of limited war under high tech conditions was formulated as a response to ‘Operation Desert
Storm’ and the lessons learnt from it, especially in the areas of information technologies and knowledge-based
Page 9
warfare. China’s November 2004 White Paper on National Defence outlines the acceleration of a Revolution in
Military Affairs (RMA) with Chinese characteristics by building an ‘informationalised’ force. ‘Limited war under
high tech conditions’, which remained in force for over 10 years, has now been replaced by ‘local war under
informationalised conditions’’ after studying the lessons of the Second Gulf War, ‘Operation Enduring Freedom’
in Afghanistan and ‘Operation Allied Force’ in Kosovo. The White Paper mentions the main objective of PLA as:
“The PLA, aiming at building an informationalised force and winning an information war, deepens its reforms,
dedicates itself to innovation, improves its quality and actively pushes forward the RMA with Chinese
characteristics with informationalisation at its core.”1
Though the term ‘informationalisation’ has not been clearly defined, what can be inferred is that it covers a
wide ambit and includes intelligencebased weaponry besides all elements of command, control, computer,
communications, intelligence, surveillance and reconnaissance (C4ISR) and traditional components of
information warfare. While informationalisation is only a sub-set of the RMA, with Chinese characteristics,
information warfare is a sub-set of informationalisation. But at the national and strategic levels, it transcends
the military aspects and becomes an important tool for shaping perceptions and belief systems of adversaries
and competitors on a higher plane. The 2004 White Paper, among other things, makes certain observations
and places emphasis and focus on:2
 Means of information operations and automated command systems, information measures, sound
organisational structures and advance weaponry and equipment, which possesses an integrated and
complete array of information support and operational means.
 Promotion of informationalisation of missiles and equipment, and improvements in communications and
reconnaissance capabilities, especially of the. Second Artillery Force.
 A series of projects on military information systems have been completed and information technology
elements have been incorporated into battle systems and development support to military information
structure has been guaranteed.
 Development of new military and operational theories and increased emphasis on training for information
warfare.
 Integration of military and civil resources for efficient information mobilisation mechanisms for exploiting
synergies.
Importance of Information Warfare
Given the above context, one can get an insight into evolution of Chinese theories and concepts on
Information Warfare (IW). As with all its military theories and strategic perspectives, Chinese traditional
wisdom and strategic thought is applied to all new concepts and precepts originating from the US, Russia or
elsewhere. The first wave of Chinese writings on IW appeared in the mid-1990s following the success of US
information technologies in the first Gulf War of 1991. Though this war was a defining event for all militaries
of the world, its impact on the PLA was greater because of the aspirations of the Chinese political and military
leadership towards acquiring comprehensive national strength. The PLA was first off the block in developing
theories of IW and adapting Western concepts to suit local conditions. A PLA General, writing on challenges
and importance of IW, observed:
In near future, Information warfare will control the form and future of war. We recognise this developmental
trend of information warfare and see it as a driving force in China’s military and combat readiness. This trend
will be highly critical to achieve victory in future wars.3
The General further emphasised that China must use a practical combination of IW and Maoist and Marxist
military thought to guide IW issues under military construction. The military must study ways of using inferior
equipment to achieve victory over the enemy’s superior equipment. He advocated study on how to conduct
‘People’s war in IW domain’. The underlying theme of Chinese concepts on IW has been emphasis on devising
ways and means to attack an enemy’s weaknesses and vulnerabilities, and on exploiting own strengths. The
other fundamental assumption is that superior tactics can compensate for inferior technology.
People’s Warfare in Information Warfare Context
According to some Chinese military analysts, because of the increasing relevance of information technology
(IT) to people’s lives, individuals who take part in IW are not all soldiers and that anybody who understands
computers may become a fighter. IW is inexpensive as the targeted party can be delivered a paralysing blow
through the net and it may be difficult for the latter to discern where the attack originated. Large amount of
useless information can be created to block or stop the functioning of an adversary’s information system.
Thus, a People’s War in context of IW can be carried out by hundreds of millions of people, using open-type
Page 10
modern information systems. Even political mobilisation for war can be achieved via the internet, by sending
patriotic e-mail messages and by setting up databases for education.4
This finds further support from another Chinese author, who observes that “even as … government mobilised
troops, the numbers and roles of traditional warriors will be sharply less than those of technical experts…since
thousand of personal computers can be linked up to perform a common operation, to perform many tasks in
in place of a large-scale military computer, an IW victory will very likely be determined by which country can
mobilise the most computer experts and part-time fans… That will be a real People’s War.”
Preparing for people’s war is a recurring theme in Chinese writing, as IW will be carried out by the PLA and
society as a whole. This concept has found practical expression in turning some of the 1.5 million reserve
forces into mini-IW regiments. The People’s Armed Forces Department (PAFD) has reportedly organised
militia/ reserve IW regiments at district levels in many provinces. For instance, in Echeng district of Hubei
province, the PAFD has a network warfare battalion as well as electronic warfare, intelligence and
psychological warfare battalions, and also a training base for IW activities. The PAFD has also carried out
‘Informaticised People’s Warfare Network Simulation Exercise’.5 A version of this concept was also put into
practice following the bombing of the Chinese embassy in Belgrade on May 8, 1999, during ‘Operation Allied
Force’. The Chinese hacked a number of US political, military and diplomatic web sites, and also carried out a
network battle by mobilising thousands of net users for sending emails and viruses. This caused servers to
crash, paralysing a large number of web sites.
Cyber Warfare
Concerns about China’s net force were heightened after the aforementioned attacks on US computer systems
and after the Chinese militia carried out IW exercises, which included India, the US, Taiwan and Japan as
target countries.6 The aim of such training was to disrupt critical infrastructure like banking, power supply and
telecommunication networks in the target country as part of China’s strategy of asymmetric approach to
warfare. In the cyber domain, the Chinese have adopted three methods for targetting such networks; the first
is the use of e-mails for planting viruses; then phishing and lastly, the introduction of ‘intelligent trojans’ and
‘vacuum trojans’. Diverse routes of planting trojans and viruses have been used to attack critical PCs, which in
turn send out files or cause Chinese Concepts and Capabilities of Information Warfare 785 malfunction.
Hackers’ tools are becoming more robotic and simple; for instance, a vacuum trojan will extract information
from a pen drive automatically when connected to a USB port. It is also believed that the next step could be
planting the targeted sites with the more difficult to detect fake data or partially fake data.
In Nanjing, the PLA has developed more than 250 trojans and similar tools. Here, it needs to be remembered
that foreign companies like Network Solutions, were made to hand over 300 computer viruses by the Ministry
of Public Security’s lab in an effort to speed up the certification of antivirus products .7 Further, the Chinese
Academy of Sciences, which provides suggestions about national information security policy and law, has
established the State Lab for Information Security. The lab has ‘National Attack Project’ as one of its research
programmes. Also, select professionals have been inducted into militia organisations to boost combat
capabilities in future wars.8 Thus, China has been paying much attention to offensive strategies in cyberspace
even as it concentrates on defensive IW.
Definition and Goals of Information Warfare
The Chinese understanding of IW, which was initially based on western concepts, has increasingly moved
towards evolving its own orientation. Chinese experts believe that IW’s essence is the sum of information
capabilities capable of breaking the will to resist by attacking an enemy’s cognitive understanding and
convictions, forcing it to give up all resistance and terminate the war. The goal is to “force enemy to regard
their goal as our goal, to force the opponent to give up the will to resist and end confrontation and stop fight
by attacking enemy’s perceptions and belief via information energy.” Xie Guang, the then Vice Minister of
Science and Technology and Industry for National Defence, defined IW in December 1999 thus: “IW in military
sense means overall use of various types (of) information technologies, equipment and systems, particularly
his command systems, to shake determination of enemy’s policy makers and at the same time, the use of all
the means possible to ensure that that one’s own systems are not damaged or disturbed.” This definition
apparently includes the aspects of IW’s goals at the larger national level. A further elaboration was done by
two senior PLA colonels, who described IW as consisting of five major elements and two general areas.9 The
five elements are:
 Substantive destruction, the use of hard weapons to destroy enemy headquarters, command posts, and
command and control (C2) information centres
Page 11
 Electronic warfare, the use of electronic means of jamming or the use of anti-radiation [electromagnetic]
weapons to attack enemy information and intelligence collection systems such as communications and
radar
 Military deception, the use of operations such as tactical feints [simulated attacks] to shield or deceive
enemy intelligence collection systems
 Operational secrecy, the use of all means to maintain secrecy and keep the enemy from collecting
intelligence on our operations.
 Psychological warfare, the use of TV, radio, and leaflets to undermine the enemy’s military morale.
The two general areas are information protection (defence) and information attack (offence). Information
defence means preventing the destruction of one’s own information systems, ensuring that these systems can
perform their normal functions. In future wars, key information and information systems will become “combat
priorities”, the key targets of enemy attack. It also includes many other manifestations of IW like computer
virus warfare, precision warfare and stealth warfare, all dependent in some manner on information and
software programmes.
Information Operations
Information Operations (IO) are specific operations and are considered to be at the core of IW, in the same
manner as IW is considered to be at the core of informationalisation. In fact, IO is a manifestation of IW on
the battlefield. It can be both of the defensive and offensive types, and can be conducted at the strategic,
operational, campaign and tactical levels at times of peace, wars and crises. Principles of IO have been
defined by Chinese military authors to include centralised command, decentralised control (multi-level power
delegation), multi-dimension inspection and testing, timely decision-making and integration of military and
civil actions with focus on key links. Major General Dai Qingmin, Director of PLA’s General Staff responsible for
IW and IO (and also ex-Commander of PLA’s IW Centre in Wuhan) observes that integrated and joint
information operations give more scope and purpose to people’s war. (In fact, jointness and integration is a
major theme of the 2004 White Paper). He defines IO as a series of operations with an informationalised
environment as the basic battlefield condition, with military information and information systems as the direct
operational targets and electronic warfare (EW) and computer networks as the principal form. He has outlined
various IO strategies because, as mentioned earlier, according to the traditional Chinese approach strategies
can compensate for inferior equipment and technologies and, in the case of IO, it may also compensate for
gaps in information or poor information about the enemy.10 Some of the IO strategies are:
 Jamming or sabotaging an enemy’s information or information system.
 Sabotaging an enemy’s overall information operational structure.
 Weakening an enemy’s information fighting capacity.
 Dispersing enemy forces, arms and fires while concentrating own forces, arms and fire.
 Confusing or diverting an enemy and creating an excellent combat opportunity for on self.
 Diverting an enemy’s reconnaissance attempt and making sufficient preparations for it.
 Giving the enemy a false impression and launching surprise information attack on him at the same time.
 Blinding or deafening an enemy with false impressions.
 Confusing an enemy or disrupting his thinking.
 Making an enemy believe that what is true is false and what is false is true.
 Causing an enemy to make a wrong judgement or take wrong action.
In the IW exercises conducted by PAFD, 10 methods of IO were practised and these can be viewed as tactics
in the electronic battlefield. These are: 11
 Planting information mines
 Conducting information reconnaissance
 Changing network data
 Releasing information bombs
 Dumping information garbage
 Disseminating propaganda
 Applying information deception
 Releasing clone information
Page 12
 Organising information defence
 Establishing network spy stations
Computer Network Operations
In Chinese writings on Information Warfare, networking has also been the focus of discussions. The recent
emphasis on jointness and integration apply equally to integrating various military networks. A critique by
Timothy Thomas notes that the Chinese feel it necessary to prepare for a “network people’s war”. Computer
network warfare has been included by Dai Qing as one of the six forms of IW (i.e. operational security,
military deception, psychological warfare, electronic warfare, computer network warfare and physical
destruction). Though there is no evidence of a formal Chinese doctrine, Chinese theorists have coined the
term “Integrated Network Electronic Warfare” (INEW) and this has also been referred to by Timothy Thomas
as a half cousin, given its similarities and points of divergences to the US approach.12
INEW has been described as a series of combat operations that integrate electronic warfare and computer
network warfare measures to disrupt the normal operation of an enemy’s battlefield systems while protecting
one’s own with the objective of attaining information superiority. The essence of computer network warfare
(CNW) is “to disrupt layers in which information is processed, by seizing and maintaining control of network
space”. EW is targeted at networked information systems and informationalised weapon systems in order to
increase combat effectiveness. According to Dai, INEW is necessary for system to system confrontation on the
informationalised battlefield, as systems are centres of gravity. Any disruption in system will lead to a
disconnect between the people and weapons. Thus, INEW lays stress on coordinating and integrating all
aspects of C4ISR and weapon platforms and weapon systems to produce the desired effects at the target end.
The effectiveness of weapon platforms and network systems is directly proportional to its levels of integration.
As in other spheres, integration produces a combat capability greater than the sum of its parts and, this is
true for information operations as well.
China’s computer network operations (CNO) comprise network attacks, defence, and exploitation. According to
the Pentagon’s Annual Report for 2005 to the Congress on China’s military power, the PLA views CNO as
critical to seize the initiative and “electromagnetic dominance” early in a conflict, and as a force multiplier.
This concept outlines the integrated use of electronic warfare, CNO and limited physical strikes against key
C4ISR nodes to disrupt an enemy’s battlefield network information systems. It is believed that the PLA has
established information warfare units to develop viruses to attack enemy computer systems and networks,
and tactics to protect friendly computer systems and networks. The PLA has increased the role of CNO in its
military exercises. Although initial training efforts focused on increasing the PLA’s proficiency in defensive
measures, recent exercises have incorporated offensive operations, primarily as first strikes against enemy
networks.13
The main area of weakness that the Chinese espy, especially with regard to US forces, is the deployment
phase. US forces are largely dependent upon computer and communication systems, both military and
nonmilitary, and the particularly weak links in the logistics network systems make them susceptible to
computer network attacks. Logistics network systems may be relatively easy to penetrate compared to other
C4 systems though it will be more useful to penetrate command and information links. However, the priority
of Chinese CNW seems to be to prevent the force from deploying at the first place and thereafter breaking the
linkages between decision-makers and weapon platforms. This approach rhymes with the oft-stated Chinese
strategy of attacking weaknesses and avoiding strengths of the enemy. As observed by James Mulvenon,
Chinese strategists theorise that:
 Computer network attack is the most effective means for a weak adversary to fight a strong one.
 It can be used as a means to deter the enemy.
 It has longer range than the conventional power projection assets, as long distance surveillance and
precise powerful and long distance attacks are available to the military.14
Psychological Operations and Information Warfare
Another important component of information Warfare with Chinese characteristics is psychological warfare.
Chinese doctrine has traditionally focused more attention on the psychological dimensions of IW, including
deception, though of late they have also been paying equal, if not more, attention to the technological
dimensions.15 The target in psychological operations is always the people and decision-makers, so that their
will and perceptions are attacked to alter their beliefs, goals and behaviour. This is aimed at both military and
civil components of an adversary’s populace. Psychological operations comprise of manipulation of media to
support military efforts and include conventional methods of propaganda like distribution of leaflets, radio and
TV broadcasts, and other means of communication. Like most of the components of IW, psychological
operations are a continuum of actions in peacetime, crisis time and war time.
Page 13
In August 2005, the PLA conducted a joint exercise, involving not only all its services but also troops from
Russia. The exercise involved distribution of leaflets over the opponent, electronic warfare to confuse incoming
missiles and adoption of electronic counter measures. These exercises involved the use of live missiles and
ammunition, and showcased precision warfare capabilities as well as the latest military equipment.16 These
exercises could also be said to have had a psychological dimension for deterring Taiwan or those aiding it in
its political objectives. Here, it can be argued that the Chinese appear to have taken a leaf out of the US
forces’ tom-tomming of the awesome power of their arsenal and military capabilities before the start of
‘Operation Iraqi Freedom’, which had the effect of lowering the morale of the Iraqi military. The US forces also
air dropped over 31 million leaflets for propaganda purposes besides physically attacking Iraqi forces’
command and control networks based on fibre optic lines and radio and computer servers. US forces had been
issued cyber-guidance as early as February 2003 for operations in Iraq. The PLA has thus been quick to
absorb lessons on IW from ‘Operation Iraqi Freedom’.
The Chinese also observed the power of media when CNN’s broadcast of a US soldier’s body being dragged
through the streets of Mogadishu transformed perceptions of victory into defeat. Authors of the Chinese book
titled Unrestricted Warfare reflected on the incident thus: Did CNN’s broadcast of an exposed corpse of a US
soldier in the streets of Mogadishu shake the determination of the Americans to act as the world’s policeman,
thereby altering the world’s strategic situation? And should an assessment of wartime actions look at the
means or the results?17
PLA’s IW/EW Capabilities
The 2004 White Paper shows that the Chinese military has understood that there is a large and expanding
technology gap between it and modern militaries, especially that of the US. China’s leaders, including
President Hu Jintao, have ordered the PLA to pursue “leap ahead” technologies and “informationalised”
capabilities to increase weapons’ mobility, firepower and precision. This perspective applies to IW also.
The Central Military Commission’s (CMC) Third or Technical Department of General Service Headquarters is
responsible for strategic SIGINT and has established a number of monitoring stations to intercept signals from
countries like India, Taiwan, Japan, South Korea and others. The PRC also established a Fourth Armed Forces
Department in 1990 to look after offensive and defensive IW activities. It has also built “an information
warfare simulation centre” for training its corps of network warriors. The centre uses high technology
simulation skills and equipment to simulate information warfare and its environment. The Fourth Department
has special detachments and units that manage and direct SIGINT and EW operations for the PLA at all levels
and includes operations of the Air Force and the Navy.18
The PRC has completed one million km of fibre optics line and communication infrastructure called “Eight
Horizontal Grids and Eight Vertical Grids” supported by satellite, ground mobile receiving stations and ground
to air data links.19 With technologies obtained from Western countries and by exploiting its booming
commercial IT and telecommunications sector, it has improved the quality of its military programmes. The PLA
has acquired and deployed a wide variety of air, sea and land-based intelligence, surveillance and
reconnaissance (ISR) systems to enhance its ability to detect monitor and target military activities in Asia and
West Pacific Ocean. Some of the latest programmes include electro-optics, synthetic aperture radar, over the
horizon radars, and surveillance systems that can detect stealth aircraft.
EW is a key element in the PLA’s ‘Three Attacks and Three Defences’ strategy (attack stealth aircraft, cruise
missiles and helicopters; defend against precision strikes, electronic warfare, and enemy reconnaissance) to
meet the requirements of ‘local war under high tech conditions’ which has now progressed to ‘local war under
informationalised conditions’. Both military and civil sectors are actively exploring IW concepts which could
lead to developing a corps of network warriors to defend China’s telecommunication, command and
information networks while uncovering vulnerabilities of adversaries’ networks.
At the national level, China has a C3I system based on fibre optic cables, satellite communications, microwave links, tropo-scatter communications and automated command and control systems. The PLA has both
secured and non-secured telecommunications and has an army wide data communication network and
integrated field operations communication system. Its WAN is capable of supporting peacetime operations
within Chinese borders and limited pre-planned operations along China’s periphery but is inadequate for largescale joint operations.20
The Chinese Army has a family of battlefield ELINT systems like DZ 9002 that detect, intercept, analyse and
record an adversary’s signal emissions. DZ 9001 has been developed both for defensive and offensive
electronic counter measures (ECM). DZ 9300 is a man-packed radar reconnaissance system meant for special
operations forces and rapid reaction forces. A bodyguard laser countermeasures system has also been
developed to counter precision-guided munitions guided by laser emissions.21 There are also a variety of
jamming systems with the ground forces.
Page 14
The PLA Air Force is developing capabilities in airborne warning and control systems (AWACS), airborne early
warning, and ECM aircraft and UAVs. Shaanxi Y-8 has been designed for special EW, ELINT and ECM missions.
This aircraft was first observed in operation in the summer of 2004 and it is believed that some of its
equipment may be from the US Navy’s EP-3 ELINT aircraft that made an emergency landing in Hainan in April
2001. Another version of the Y-8 aircraft is ‘Balance Beam’ airborne early warning aircraft meant for tactical
ISR, EW and ELINT missions. It made its maiden flight in 2001 and its finalised version Y-8 F600 flew in
January 2005. The PLA Air Force is planning for 4-6 AWACS and has about 20 other dedicated ELINT aircraft
like HD-5, TU-154M and HZ-6. HD-5, an older version, is being replaced by HZ-6 which has improved
capabilities. UAV’s configured for ELINT and EW missions are also in use.22 In July 2002, the PLA inducted the
Israeli anti-radar hunter killer HARPY UAV.
The Chinese Navy also has over a dozen ships and several trawlers for various electronic warfare missions.
Four Yuan Wang and Shiyan class ships monitor space events and are capable of collecting and monitoring
missile and satellite telemetry data and communications. Chinese industry has developed three types of
systems, based on Soviet-era systems, which have been further upgraded and modernised.
Space is another area where the Chinese have been making rapid advances, especially in the field of ISR and
anti-satellite technologies. China considers space as a ‘commanding height’ and it plans to control space and
win the information war after having built up an informationalised PLA. In 2003, the PLA had six dual-use
dedicated satellites for military purposes. In 2004, China placed 10 satellites into orbit and has a similar
schedule through 2006. It hopes to have more than 100 satellites in orbit by 2010, and launch an additional
100 satellites by 2020. In the next decade, Beijing will most likely field radar, ocean surveillance, and
improved filmbased photo-reconnaissance satellites. China will eventually deploy advanced imagery,
reconnaissance, and Earth resource systems with military applications. China’s ZY-2 payloads have digital
imagery reconnaissance capabilities and have worldwide coverage. Beijing also tested new film-based imagery
satellites and small digital imagery satellites in 2003 and 2004. It is also developing its own GPS navigation
system based on the Beidou series of navigational satellites. The PLA possesses anti-GPS jammers obtained
from Russia, which however may not be very effective against the NAVSAT satellite system of the US.23
China is also developing electronic intelligence (ELINT) and signals intelligence (SIGINT) reconnaissance
satellites. These digital data systems will be able to transmit directly to ground sites, and China may be
developing a system of data relay satellites to support global coverage. Furthermore, Beijing has acquired
mobile data reception equipment that can support more rapid data transmission to deployed military forces
and units. China is developing micro satellites for remote sensing as well as for putting into place networks of
electro-optical and radar satellites. In April 2004, Beijing launched a micro satellite with a probable imagery
mission. China is also conducting research to develop ground-based laser ASAT Weapons.24 All these
capabilities will contribute to China’s prowess in the field of information warfare.
Implications for India
Attaining information superiority has become one of the most important objectives to be achieved in the era of
knowledge age warfare. The concept of information superiority is somewhat analogous to similar concepts of
air, sea or space superiority. This is because proper use of information is as lethal as other kinds of power.
Further, the concept of information superiority leads us to attainment of decision superiority. Information
operations are increasingly being considered as important as sea, land and air operations. Information
operations can vary from physical destruction to psychological operations to computer network defence.
Wellconducted joint information operations with new RMA technologies, improved organisations and doctrine
will greatly contribute to a successful and decisive outcome.
It is in this context that a Defence Information Warfare Agency (DIWA) under the Integrated Defence Staff
Headquarters has been formed to coordinate efforts of the three services and certain other agencies to handle
all aspects of information warfare.25 The Indian concepts of IW are generally based on Western concepts and
according to the 2004 Army Doctrine, IW encompasses the elements of command and control warfare,
intelligencebased warfare, electronic warfare, cyber warfare, psychological warfare and network centric
warfare, military deception and secrecy as well as media support. Though the three Services have different set
ups for IW activity, DIWA is the nodal and apex policy-making body to formulate joint and integrated
responses to IW challenges. Therefore, an IW doctrine needs to be formulated, which it is believed, is under
the process of being evolved by DIWA. However, it is at operational levels that weaknesses in our IW efforts
exist. There is a need for joint linkages and joint planning to synchronise our response to all elements of
information warfare.
The Indian armed forces have made considerable progress in establishing C4ISR networks. But given that
these are service wise, there is a need for establishing a Joint Inter-Services Network26. The other areas that
need attention are:
Page 15
 In the era of cyber warfare, information warfare and net wars, information systems, both civil and military
networks, should have adequate redundancy, survivability and electronic security.
 For optimisation, the strengths of our IT infrastructure and industry and advancements in satellites and
radio-based systems should be jointly exploited by the military and civil sectors.
 Joint network and individual services networks should be able to function in all environments including
nuclear. For instance, they should be hardened against or be resistant to an EMP attack.
 We need to induct a wide variety of military satellites for upgrading our strategic ISR, SIGINT, ELINT,
COMMINT, imagery and navigation capabilities.
 We need to reflect on the Chinese model of net force based on their militia and examine whether there is
a need to adopt a similar model in our Territorial Army units. Even though Computer Emergency Response
Teams (CERT) at national and lower levels have been formed to respond to cyber attacks on civilian
infrastructure, the concept is more defensive in nature. A pro-active concept like that of net force may be
more appropriate.
Conclusion
China sees IW as a field where asymmetric strategies can be used to better its rivals, especially the ones with
better technological capabilities. It has applied People’s War concept in the context of IW to leverage the
availability of a large number of civilian IT experts. Simultaneously, it has not neglected the technological
aspects. Over the years, it has acquired state-of-the-art technologies from the West and Israel, and as the
Cox Report of May 1999 revealed through pilferage and spying, to upgrade its arsenal.
China has a large reservoir of scientists and a booming economy, which will help it in acquiring improved
capabilities in the sphere of IW. It has made rapid advances in the field of IT and space-based systems, which
will assist it in closing the technological gap with its peer competitors.
IW is important at the national, strategic and operational levels. At the national level, the aim is to alter the
perceptions of the adversary so that victory can be achieved without fighting or at the lowest cost. Militaries
all over the world have recognised IT and IW as force multipliers and as key battle winning tools. The electromagnetic spectrum, a key component of the information domain, has become the new high ground to be
captured for success of operations, thus highlighting the operational aspects of IW. China’s rising military
power has created concerns not only for the US but also its neighbours, which are equally if not more
concerned of the possible destabilising effects of a likely assertive China. India and other neighbours need to
evolve holistic strategies to safeguard their information domains and protect them from a variety of
information attacks.
References/End Notes
1. “China’s National Defense in 2004", White Paper, at http://english.people.com.cn/whitepaper/defense2004/defense2004.html. See Chapter
III, Revolution in
Military Affairs with Chinese Characteristics.
2. Ibid.
3. Wang Pufeng, “Challenge of Information Warfare,” in Michael Pillsbury (ed.), Chinese Views of Future Warfare, National Defense University
Press, Washington D.C., 1997, at http://www.au.af.mil/au/awc/awcgate/ndu/chinview/chinacont.html
4. Wei Jincheng, “Information War: A New Form of People’s War”, in Michael Pillsbury (ed.), Chinese Views of Future Warfare, Part Four at
http://www.au.af.mil/ au/awc/awcgate/ndu/chinview/chinacont.html
5. Timothy L. Thomas, “Like Adding Wings to Tiger: Chinese Information War Theory and Practice,” at
http://www.iwar.org.uk/iwar/resources/china/iw/chinaiw.htm
6. Ravi Visvesvaraya Prasad, “At the Hackers”, The Hindustan Times, December 19,2000.
7. Evan S. Mederios et al, “A New Direction for China’s Defense Industry,” p. 242, at
www.rand.org
8. “Over 500 Information Professionals Enrolled into Militia Organization,” PLA Daily, at www.english.chinamil.cn
9. Wang Baocun and Li Fei, “Information Warfare” in Michael Pillsbury (ed.), no. 3.
10. Dai Qingmin, “Innovating and Developing Views on Information Operations,” Beijing Zhongguo, August 20, 2000, article reviewed by
Timothy L. Thomas in “China’s Electronic Strategies,” Military Review, May-June 2001, pp. 72-77.
11. Ibid
12. Timothy L. Thomas, “Chinese and American Network Centric Warfare”, Joint Forces Quarterly (38) at
http://www.dtic.mil/doctrine/jel/jfq_pubs/1538.pdf.
13. Annual Report to Congress on “The Military Power of People’s Republic of China 2006,” (Department of Defense, Washington D.C.) at
www.defenselink.mil/ pubs/pdfs/china%20Report%202006.pdf
14. Testimony of James C. Mulvenon, “Chinese Information Operations Strategies in a Taiwan Contingency” before US-China Economic and
Security Review Commission Hearing “China’s Military Modernization and Cross Strait Balance,” September 15, 2005 at
www.uscc.gov/hearings/2005hearings/written_ testimonies/ 05_09_15wrts/mulvenon.pdf
Page 16
15. For China’s increased emphasis on Psywar, see views of Maj. Gen. Xu Hezen as quoted in, Timothy L. Thomas, “Comparing US, Russian
and Chinese Information Operation Concepts,” Foreign Military Studies Office, Fort Leavenworth, KS 66048, February 2004 at
www.dodccrp.org/events/2004_CCRTS/CD/papers/ 064.pdf
16. Vinod Anand and Arun Sahgal, “China and Russia, the new shooting stars,”, Asia Times, September 9, 2005.
17. Qiao Liang and Wang Xiang Sui, Unrestricted Warfare, PLA Literature and Arts Publishing House, Beijing, February 1999. Electronic edition
of the book available at http://212.111.49.124/iwar/resources/china/iw/unrestricted-warfare.pdf
18. Manuel Cerejo, “China, Cuba and Information Warfare, Signal Intelligence, Electronic Warfare and Cyber Warfare,” at
http://www.futurodecuba.org/ChinaandInformationWarfare4.htm
19. Abe C. Lin, “Comparison of Information Warfare Capabilities of the ROC and PRC,” at http://cryptome.org/cn2-infowar.htm.
20. Details of China’s C4ISR systems available at http://sinodefence.com.
21. Ibid
22. Ibid. Also see Manuel Cerejo, no. 18.
23. See Annual Report to Congress on “The Military Power of People’s Republic of China 2006", no. 13.
24. Ibid
25. Saikat Dutta, “Forces get ready for Information War,” The Indian Express,February 23, 2003.
26. Vinod Anand, Joint Vision for the Indian Armed Forces, Delhi Papers No. 16, IDSA, New Delhi, 2001, pp. 36-49.
Table of Contents
Battle Updates Space and Missile Defense Conference on Cyber
Huntsville Progress
By Mike Kelley, Huntsville Times, August 19, 2011
HUNTSVILLE, Alabama – A lot has happened over the past year to make Huntsville a center for cyber security,
Huntsville Mayor Tommy Battle said at the 14th annual Space and Missile Defense Conference.
Battle announced at the 2010 SMD conference his plans to create a Cyber Security Center of Excellence in
Huntsville that would leverage Huntsville's intellectual capital and capabilities to help solve the growing cyber
security challenges faced by the United States.
Battle and other local information technology leaders also see the initiative as an economic development boon
that would bring jobs to an area threatened by cutbacks in NASA and defense employment.
An increased pace of cyber attacks on government, military, and commercial targets such as financial
institutions has raised the level of awareness and need for information technology security specialists.
According to Gary Warner, a leading cyber forensics researcher at the University of Alabama in Birmingham,
the federal government alone could hire upward of 10,000 cyber security analysts per year if they were
available.
In his presentation, Battle pointed out that Huntsville would occupy a niche in the overall framework of cyber
security, providing cyber security research and development, modeling and simulation, engineering, training
and education and experimentation. Other areas of the U.S. are already heavily involved in cyber intelligence
exploitation, cyber operations, and government and infrastructure defense.
Since the announcement a year ago, Battle said a steering committee has been formed, and currently nearly
200 people locally are involved in some aspect of Cyber Huntsville, as the initiative has been named. "We
have a fantastic crew working on this effort," Battle said.
Cyber Huntsville now consists of an advisory panel made up of current and retired Army generals and Senior
Executive Service members and a collection of working groups. The effort recently took a major step by
reorganizing itself as a 501(c)(6) corporation and appointing a board of directors.
In his presentation, Battle pointed to the effort to get the word out about Huntsville and the Tennessee
Valley's expertise as one of the accomplishments of the past. Dr. Rodney Robertson, who is leading the local
effort, has made numerous visits to cyber security decision makers to further Huntsville's bid as a cyber
research center. "People in Washington recognize Huntsville as an aerospace and missile town, and we want
them to recognize us as a cyber security town," Robertson said recently.
The committee also recently developed a survey of cyber security needs, developments, and capabilities.
Battle also pointed to a late June cyber security summit as another accomplishment. Following the April 27
tornadoes that knocked out power throughout the Huntsville area for several days, the committee held a
"Resilience of our Critical Infrastructure and Cyber Security Summit – Lessons Learned after the Disaster"
event with Energy Department and Homeland Security Department officials. Commenting on the outcome of
the summit, Battle said, "We've seen what our vulnerabilities are and what our opportunities are."
Page 17
A major upcoming activity will be a Table Top exercise, planned for October that will simulate a coordinated
cyber attack on multiple areas of Huntsville. The simulated attack is designed to see how the city and other
local facilities, such as Redstone Arsenal, would respond to such an attack.
Table of Contents
Army Cyber 2020
By Rita Boland, AFCEA blog, 8/25/11
The U.S Army Cyber Command/2nd Army has been in operation for less than a year, but already it is building
the cyber Army of 2020, with several clear-cut views on future operations. Lt. Gen. Rhett Hernandez, USA, the
commanding general, explained during LandWarNet that his organization coordinates the Army’s information
operations and serves as its cyber proponent. In addition to high-level activities, the command is growing its
subordinate cyber brigade which will serve as the operational arm of the Army’s cyber mission.
Over the past 10 months personnel at the command have celebrated several successes including starting to
develop a strategic plan for Army Cyber 2020. Gen. Hernandez explained that cyber already has a role in all
operations and that moving forward cyberspace must extend U.S. and allied mission-command capabilities
while denying the same to others. The future also will involve an increased emphasis on the tactical edge.
According to the general, by 2020 the Army must integrate full-spectrum cyber capabilities, ensure mission
command and achieve cyber domain operational freedom meaning the Army will operate in the cyber domain
with the same level of freedom it now has in the land domain. “The future battlefield will be as much defined
by cyber as it is enabled by its effects,” Gen. Hernandez said. Other necessary actions include operationalizing
cyber, growing Army capacity and capabilities, and recruiting, developing and maintaining cyber professionals.
The general outlined several actions necessary for the Army to grow capacity and capability including defining
the force structure and integrating cyber into institutional process. He outlined plans to create a world-class
cyber operations center that will replicate cyberthreats as well as establish cyber centers to support mission
control, defend the network and extend capabilities. “A key to success in this line of effort is adequate and
rigorous leadership development,” he said, later adding that, “People are the centerpiece in all we do.”
Army Cyber Command is looking at different ways to attract qualified warriors to obtain the human capital it
requires. This involves examining industry initiatives for recruitment and retention as well as leveraging talent
across the active-duty military, National Guard, Army Reserves, civilian personnel and contractors. In
addition, Gen. Hernandez referenced “green page” pilots. The efforts aim to create directories in which people
could enter their skill sets to find opportunities to use them in Army efforts. Leaders could employ the pages
to find qualified personnel to fill certain requirements. Initiated in other parts of the Army, Gen. Hernandez
said he would like to find ways to leverage the pages across Army cyber.
To help secure the cyber domain, Gen. Hernandez explained that the Army must go beyond 3G—gates, guns
and guards. Instead, the Army must protect networks in more robust ways. And though he has faced several
challenges involved with moving forward cyberoperations and bringing together organizations that only
recently came into existence he said is excited about what has been done and what is to come. “I never
thought we’d have the opportunity to be on the front end of a new domain,” he stated.
Table of Contents
10 Years Later: How We Won
By William McCants & William Rosenau, the Atlantic, 8 Sep 2011
The war against al-Qaeda is over, but continuing to fight terrorism will require understanding what we did that
worked - and what didn't
Ten years into our struggle against al-Qaeda, it's time to acknowledge that the "war" is over and recognize
that the United States and its international partners overreacted to the al-Qaeda threat. Terrorism, after all, is
designed to elicit such overreactions. But the confluence of the recent death of bin Laden, harsh new
economic realities, the democratic movements in the Middle East, and the ten-year anniversary of the
September 11 attacks provide an ideal time to take stock of what it actually takes to deal with the al-Qaeda
threat.
The Failure of Al-Qaeda
The immediate physical threat posed by al-Qaeda has diminished greatly over the past ten years. The
elimination of Osama bin Laden -- a long-overdue counterterrorism triumph -- and the relentless dismantling
of al-Qaeda's senior leadership in their Pakistani sanctuaries and redoubts are obvious but powerful signs of
Page 18
the enterprise's darkening prospects. The recent death of one of al-Qaeda's most capable and influential
senior leaders, Abu Abd al-Rahman Atiyyatallah, in an alleged U.S. drone attack in Pakistan, will only hasten
its leadership's collapse.
More important, al Qaeda has failed utterly in its efforts to achieve one of its paramount political objectives.
From the 19th century through the present day, terrorists and insurgents -- from transatlantic anarchists to
Fanonists of the tiers monde to Nepalese Maoists -- have spun insurrectionist fantasies of taking over. But the
Salafist-jihadists' worldwide Islamic uprising, against perceived enemies of the faith, never materialized. The
Muslim masses have refused to play their part in the al-Qaeda dramaturgy. The terrorism intended to
generate widespread rebellion has failed to arouse a global Muslim community. Most damningly, al-Qaeda has
been irrelevant to the popular uprisings sweeping the heartland of the Muslim world.
Rethinking How We Fight Terrorism
In recognizing al-Qaeda's failures and weaknesses, we should reevaluate the political, military, economic, and
other instruments the United States wields against terrorism. Three of these methods need particular scrutiny.
The first is social and economic development. It might be useful in dealing with large-scale insurgencies, but
development is unlikely to address the idiosyncratic motives of the small number of people who join terrorist
groups. It's true that addressing the "root causes" of terrorism sounds like a sensible, systemic course of
action, but few truly agree what those causes are -- nor is there anything like a consensus on what measures
are likely to prove most effective.
The second questionable tool is one used in part of a broader set of information operations: positive
messaging about the United States. There are excellent reasons to pursue public diplomacy, but countering
terrorism is not one of them. The young people who are vulnerable to al-Qaeda's recruitment pitches are likely
to be impervious to positive messages about the United States. In addition, linking public diplomacy with
counterterrorism risks alienating intended audiences, which can easily detect the fear and hidden agenda
lurking behind the friendly American smile. The United States needs to dissuade people from attacking its
citizens -- but those people do not need to like the United States in order to abandon violence.
The third tool to drop is the one with which we've had the least success: occupying the country from which a
terrorist group is attempting to recruit. There might be good reasons to invade and occupy a country, but
eliminating a terrorist group is not one of them. It only engenders new recruits for the terrorists' cause and it
provides them a fertile training ground. Moreover, it plays into al-Qaeda's openly professed strategy of
bleeding U.S. resources to force it to reduce its influence in the Middle East.
What Works in Counterterrorism
What's left in the counter-terrorist's toolkit? Most of the significant advances against al-Qaeda and its fellow
travelers over the last ten years have come as a consequence of intelligence gathering, good policing,
spreading the awful truth about al-Qaeda, and helping other governments do these same things. These are
not ancillary to counterterrorism but rather its essential components.
Violent operations against al-Qaeda have garnered most of the public's attention. But, in terms of preventing
terrorist attacks, the most powerful weapon has been decidedly unglamorous and much less visible: police
work informed by well-placed sources inside terrorist cells. Major plots in New York, London, Stockholm, and
other key urban centers have been foiled by police, often working in unison with intelligence services.
Assisting foreign police forces should be a major component of the U.S. counterterrorism repertoire -- but
such aid is limited by considerable restrictions from Congress and a lack of skilled police trainers able and
willing to work abroad.
Eliminating terrorist networks is not enough. They also have to be discredited among the audiences they seek
to influence. Although it is true that al-Qaeda has done much to discredit itself through its doctrinal and
operational excesses -- killing civilians, attacking places of worship, targeting fellows Muslims -- the U.S. and
its allies have done an excellent job of magnifying those excesses. Two effective techniques have been
releasing private correspondence between al-Qaeda's senior leaders, which is rarely flattering, and quietly
pointing the media to evidence that al-Qaeda does not represent the aspirations of the vast majority of
Muslims.
Not only has the U.S. become adept at using these tools, it has also been skillful in showing others how to use
them. For example, Indonesia, once a fertile ground for militant Islamist activity, is now a counterterrorism
success stories because of these efforts.
Given the considerable damage that "kinetic" military operations have reportedly done to al-Qaeda, military
and paramilitary force should obviously remain an important part of the counterterrorist arsenal. But it should
be reserved only for killing the most senior leaders and operatives in a terrorist organization -- those whose
Page 19
skills are most lethal and most difficult to replace -- and only when local security forces are unable or unwilling
to take appropriate action. This does not require occupying a country, but rather cultivating local allies and
spending money to develop intelligence networks.
The War is Over
There will inevitably one day be another large attack on American soil and the U.S. government will inevitably
overreact, That is the response terrorism is design to elicit and the United States, because its safety and
isolation make terrorism feel so horrifying, is particularly susceptible to such a response. But if Washington
can use this 10-year landmark to throw out the counterterrorism tools that haven't worked and to sharpen the
ones that do, the negative consequences of that overreaction will be minimal. If not, the United States will
have drawn the wrong lessons from the last ten years, obliging its terrorist enemies by repeating its worst
mistakes.
Table of Contents
Information Warfare: A Historical Approach
By Adam Elkus, CTO Vision, September 16, 2011
Information warfare is thought to be a product of what, broadly speaking, is considered the “information” era.
However, if we correctly understand what information war is, we can see that it stretches back to the dawn of
organized conflict itself.
Dorothy Denning defines information warfare (IW) as “operations that target or exploit information
resources.” Information resources consist of containers (information media that contain forms of data),
transporters (objects and communication systems that transport information from one location to another),
sensors (humans and machines that extract information objects and the environment), recorders (objects that
place information in containers), and processors (people and objects that manipulate information).
Information resources are important because they have value to people, and thus can be disabled, destroyed,
or manipulated to accomplish operational and strategic goals. Hence, it matters little if you destroy a
command and control center with a computer network operation or simply blow it to smithereens with a
terminally guided submunition. The effect is largely identical.
Using this definition, information warfare becomes less exotic and part of the general toolbox of the
commander. Military deception–one element of IW–has been crucial to the success of many large operations.
Operation Bagration, the Soviet destruction of the Wehrmarcht’s Army Group Center, was only successful after
a massive campaign of maskirovka designed to hoodwink the German military planners trying to forecast their
attack. The deception campaigns that preceded the Normandy invasion and the German invasion of Russia are
also well-known to military historians. Although military writers often reach back to Sun Tzu to look at Chinese
information warfare theory, some of the biggest influences on current People’s Liberation Army (PLA) is
actually the Chinese Civil War. The Beiping-Tianjin campaign, for example, is an example of the seamless
employment of psychological operations alongside large-scale maneuver and attrition warfare and looms large
in the PLA’s institutional memory.
Military deception also has been extensively utilized in antiquity by the Mongols and the various armies that
contested China to not only delay recognition of the point of the blow but also to fool the foe into exaggerating
the size of one’s force. Genghis Khan, in this sense, was an IW pioneer.
Khan was widely known for leading hordes of savage horsemen across Russia and into Europe. While not
totally unfounded, the Mongols’ image of total, barbaric domination was greatly enhanced by Khan’s use of
PSYOP, deception, OPSEC, and targeting his adversaries’ decision-making process. “Agents of influence” were
sent in advance of his armies to do face-to-face PSYOP, telling of brutality and large numbers in the Mongol
army. Khan also used deception to create the illusion of invincible numbers by using rapid troop maneuver,
making his army look larger than it really was. He had a network of horsemen called “arrow riders” to
communicate quickly with his commanders, and he targeted enemy messengers to prevent enemy
commanders from communicating with each other.
Actual employment of IW capabilities in modern war will not differ much from the means described here–the
capabilities in question will change, but the methods of degrading the opponent’s information, attempting to
bait them into the wrong decisions, targeting their C3I, practicing proper operations security, protecting one’s
own information, and trying to undermine enemy morale are basic and recurring elements of IW throughout
history. One can also consider Khan’s “arrow riders” as an ancient attempt at increasing “power to the edge.”
One caution, however. Information warfare has never been decisive in and of itself–it’s always increased the
strategic effectiveness of one’s own forces and decreased the effectiveness of the enemy. Strategic
information warfare–even in the Gulf Wars, which featured the wholesale destruction of enemy C3I–did not
Page 20
decide the campaign. Rather, ground and air forces operating as part of the AirLand Battle paradigm utilized
capabilities, tactics, and operational plans honed in many rotations at the National Training Center (NTC)
against the most fearsome Soviet imitation forces the military could provide. Although future wars will
certainly raise the importance of IW as more and more enemy information assets and systems can be
targeted, history suggests that a “cyber Pearl Harbor” will not in itself be decisive.
Table of Contents
Anti-Israel Turks Erroneously Hack Into Palestinian Sites
By Ben Zur-Laron, Y Net news, 19 Sep 2011
Turkish hackers attacked dozens of Israeli websites over the weekend, only to find out that the sites belonged
to Palestinians.
The confusion was caused due to the fact that the Palestinian sites, which have a .ps web suffix, use Israeli
web servers.
"The hackers left anti-Israel messages on 70 Palestinian sites," said Shai Blitzblau, the head of MaglanComputer Warfare and Network Intelligence Labs. "Most of them discovered it when it was already too late.
Only after they broke in and sabotaged the websites did they find out these were Palestinian sites."
The message, which featured an image of an Israeli soldier washing blood off of his hands, read: "Because
you voted on behalf of Israel on Blue (Mavi) Marmara report… We suspended this site. You will apologize
Netanyahu, you will apologize Israel."
The criminal incident comes amidst a deepening diplomatic crisis between Turkey and Israel. Turkey recently
expelled Israel's ambassador and downgraded diplomatic relations with Israel over Jerusalem's refusal to
apologize for the events of last year's Gaza flotilla in which nine Turkish citizens were killed.
The criminal incident comes amidst a deepening diplomatic crisis between Turkey and Israel. Turkey recently
expelled Israel's ambassador and downgraded diplomatic relations with Israel over Jerusalem's refusal to
apologize for the events of last year's Gaza flotilla in which nine Turkish citizens were killed.
In recent weeks, Turkish Prime Minister Recep Tayyip Erdogan has made a number of speeches in which he
expressed, among other things, the Turkish fleet's readiness to face Israel. On Sunday, Turkish Foreign
Minister Ahmet Davutoglu announced that Ankara had interfered with Israel's request to open a NATO office in
Brussels.
Turkish messages on Palestinian sites
Table of Contents
Page 21
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence
By Magnus Hjortdal, Centre for Military Studies, University of Copenhagen
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will
continue to be—a decisive element in China's strategy to ascend in the international system. The three
reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain
military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in
using cyberspace offensively than other actors, such as the United States, since it has more to gain from
spying on and deterring the United States than the other way around. The article also documents China's
progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the
current debate within the country. Several examples of cyber attacks traceable to China are also presented.
This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint
Strike Fighter and an airbase) and the U.S. electric grid, as well as the current Google affair, which has proved
to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain
constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China
itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States
and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their
budgets.
China's Use of Cyber
Warfare_ Espionage Meets Strategic Deterrenc[1].pdf
Table of Contents
7 Lessons: Surviving a Zero-Day Attack
By John Foley, InformationWeek, September 19, 2011
When Pacific Northwest National Laboratory detected a cyber attack--actually two of them--against its tech
infrastructure in July, the lab acted quickly to root out the exploits and secure its network. PNNL then did
something few other cyber attack victims have been willing to do. It decided to talk openly about what
happened.
The lab's CIO, Jerry Johnson, last week provided a detailed accounting of the cyber attacks. Speaking at the
IW500 Conference in Dana Point, Calif., Johnson described how intruders took advantage of a vulnerability in
one of the lab's public-facing web servers to plant a "drive-by" exploit on the PCs of site visitors, lab
employees among them. For weeks, the hackers then surreptitiously scouted PNNL's network from the
compromised workstations.
Simultaneously, a spear-phishing attack hit one of the lab's major business partners, with which it shared
network resources. This second group of hackers was able to obtain a privileged account and compromise a
root domain controller that was shared by the lab and its partner. When the intruders tried to recreate and
elevate account privileges, this action triggered an alarm, alerting the lab's cybersecurity team.
Within hours, the lab made the decision to disconnect its network in order to sever the hackers'
communications paths and contain any further damage. Over the July 4 weekend, while the rest of us were
grilling burgers, PNNL's security team conducted cyber forensics, reconstructed the domain controller, reimaged systems, and restored network services that had been taken off line.
Who was behind the attacks? That's one question CIO Johnson won't discuss. But it's worth noting that Dept.
of Energy facilities were reportedly targets in the series of cyber attacks known as Operation Shady RAT that
were carried out against more than 70 companies, defense contractors, and government agencies over the
past few years. Based on the available evidence, some experts have speculated that those attacks originated
in China.
At the IW500 conference, in a session titled "Anatomy of a Zero-Day Attack," Johnson was candid about how
the lab responded to the intrusions. He also shared the following list of lessons learned from the experience:
1. There's danger in multi-level security environments. The lab had a well-protected IT security perimeter,
but the attacks made it through anyway. An advocate of "defense in depth," Johnson is putting increased
emphasis on protecting the data itself.
Page 22
2. Purge legacy, minority technologies. The Web server in the first attack was based on a little-used
technology at the lab, Adobe ColdFusion. Such out-of-sight, out-of-mind technologies are inherently
vulnerable because they don't get the same degree of attention as an organization's primary platforms.
3. Monitor cybersecurity events 24 x 7. Advanced persistent threats like those that hit PNNL are just that-persistent--and require constant vigilance. Across federal government, agencies are investing in "continuous
monitoring," with a goal of obtaining a near real-time view into the status of computer system security.
4. Maintain a core forensics capability. If your network does get hacked, security teams must be able to
reconstruct events and assess the damages. What you learn can help prevent a relapse.
5. Include a senior project manager on your response team. Responding to a breach requires not only
attention to detail and carefully coordination, but an ability to engage top management at a moment's notice
and, if necessary, escalate decision making.
6. Be prepared to call for help, and don't wait. You may need to bring in security experts, business partners,
law enforcement, or other outsiders. At PNNL, Johnson alerted the public affairs office, in order to prepare for
the inevitable media inquiries.
7. Have an emergency communications continuity plan. When PNNL pulled the plug on its network, the
hackers lost their ability to inflict further damage. Unfortunately, the decision also meant that lab employees
lost network services, including email and voice mail. Be prepared for that eventuality by sharing cell phone
numbers and alternative email address in advance.
As Operation Shady RAT and a similar cyber attack on Google and other companies demonstrate, the risks are
complex and growing. Johnson agreed to talk about it as a way of helping other organizations bolster their
defenses. For that, he deserves a tremendous amount of credit. Secrecy is the norm in the wake of a cyber
attack, but openness will lead to better preparedness.
Table of Contents
Tactical Information Operations in Contemporary COIN Campaigns
By Thomas Elkjer Nissen, Dept. of Joint Operations, Royal Danish Defence College, Sep 2011
This paper examines how the modern information environment affects the operational environment in
contemporary COIN operations and how Information Operations (INFO OPS) fits into and supports these
operations at the tactical level. Furthermore the paper looks at the techniques and capabilities that can be
utilised for influence purposes in COIN, and not least all the things that lies behind the INFO OPS - specifically
training and education, leadership, intelligence and planning principles unique to the successful conduct of
Tactical INFO OPS in COIN.
Tactical information
operations in contemporary COIN campaigns.pdf
Table of Contents
The Taliban are winning Afghanistan's information war
By Frank Ledwidge, the Guardian, 14 September 2011
Over the last decade Nato has constantly found itself behind the curve in planning and executing what they
call "influence operations" – a combination of the use of propaganda ("psychological operations") and,
importantly, force to deliver its "message". For getting its media message across, it has relied on clunking
spokesmen whose pronouncements, particularly on casualties, are automatically assumed by Afghans to be
lies. Matters are not assisted by the fact that for much of the time western forces and their Afghan allies do
not seem entirely clear on their objectives.
Meanwhile the Taliban (or Islamic Emirate of Afghanistan, as they call themselves) are crystal clear as to their
desired end-state: foreigners out and a government under Islamic law. Despite the fact that much of their
media output is highly inaccurate – their website this morning claimed that they had killed "several dozen
foreign invaders and local puppets" – the Taliban are always first off the mark after every incident. This has
long been a source of huge frustration to senior officers, but a problem that Nato's media operations
bureaucracy seems incapable of putting right.
Tuesday's attacks in Kabul delivered a series of messages from the Taliban (if indeed it was the Taliban who
carried them out. Needless to say, they claimed them anyway.) First, they confirm what is already clear to
Page 23
most Afghans: no one is now convinced by Nato's claim that Afghan forces will be able to secure the country
within three years. Aside from the inability of the army or police to conduct the smallest operation without
foreign help, the desertion rate in the army is extremely high – at one point reaching 35% at the height of
harvest time this summer.
The police are even worse: their many checkpoints are regarded, like much of the rest of government, as
useless obstructions to everyday life. Afghan security forces' performance during the recent attacks in the
capital have not inspired confidence among Kabulis. Matters are not helped by the fact that yesterday's
attackers are thought to have entered the city dressed in burqas. Few if any of those police checkpoints have
women officers.
Second, the Taliban is pointing up the strategic irrelevance of the current operations in Helmand and the
south. The military historian and former US marine corps colonel Bing West describes these desultory battles
as "groundhog wars". Despite taking serious losses from what are effectively Nato special forces' death
squads, the Taliban is still in business.
In any event, the centre of gravity in this war is not the south, where the enemy is strong and has succeeded
in "fixing" US and other Nato forces to their bases and a few hamlets and towns. These forces include British
troops in Helmand who cling on to three of the province's 14 districts. The centre of gravity of this war is
Kabul itself and what it represents. We have found ourselves involved in national war, which has been
exhausting the country for over 30 years since the 1979 Soviet invasion. Both the west and the Taliban are
tired now and keen to move toward a resolution.
Which brings us to the key purpose of the attacks. In December, there is to be another try at a political
settlement in Bonn. The convenor of the last Bonn conference in 2001, Lakhdar Brahimi, has said that the
"original sin" in 2001 was not to give the Taliban a seat at the table. They may yet get it. This week the US
approved the opening of a Taliban office in Doha, and it is certain that talks will begin between the US and the
Taliban before the end of the year. This is a huge step forward, and the Islamic Emirate of Afghanistan, the
organisation we call the Taliban, or that part of it under the control of Mullah Omar, is determined to begin
them from a position of strength. Their operations in Kabul and elsewhere were intended to establish that
position. There is no doubt at all that there will be more like them.
Table of Contents
Arab Protesters and Social Media: Need For Engagement – Analysis
By James M. Dorsey, EurAsia Review, October 6, 2011
If there is one event or region that has highlighted the impact of technology and social media on
policymaking, social movements and protest, it is the Arab revolt that has been sweeping the Middle East and
North Africa since December last year. Many have dubbed the popular revolts in Egypt and Tunisia a
“Facebook revolution” because of the use by middle-class activists of social media in the build-up to the mass
anti-government protests that early this year toppled presidents Hosni Mubarak and Zine el Abedine Ben Ali.
Activists in Libya employed social media to organise peaceful protests in February against the regime of
Colonel Moammar Gaddafi before they mutated into a civil war.
Similarly, social media and mobile telephony have played a key role in Syria in circumventing news blackouts
and censorship to get news of the brutal crackdown by the government of President Bashar al Assad to the
outside world. They also figure in exacerbating sectarian tensions between the country’s Sunni Muslims and
Alawites, the minority sect to which Assad belongs.
Technology does not spark revolts
Yet, despite the perception of many, it is not technology that sparks revolts. No doubt, social media facilitate
and accelerate the speed and breadth of communication, and impact politics, social movements,
communications and the flow of news. But the answer to the question whether the Arab revolt would have
erupted without Facebook is a resounding yes. To dub the Arab revolt a Facebook revolution would require
revising explanations of past revolts such as the Islamic revolution in Iran and popular uprisings in the
Philippines and Indonesia.
To be sure, technology plays an important role in protests and revolts. In Iran in 1979, it was the cassette
tape that helped Ayatollah Khomeini to inspire millions to overthrow the Shah, at the time the most powerful
symbol of US influence in the region. In Tunisia, a mobile phone video of a young man setting himself on fire
in desperation, tapped into widespread discontent and last December brought thousands into the streets of
Tunis. Cassettes and mobile telephony are technologies that autocrats understand. Social media, however, is
a game changer. Pro-democracy activists understand social media and the opportunities they offer in ways
that autocratic Arab regimes find difficult, if not impossible, to grasp.
Page 24
Social media change the way communications and public affairs are managed, particularly in a crisis. That
requires a degree of sophistication that many but particularly autocratic governments often find difficult, if not
impossible, to marshal. In fact, employing that degree of sophistication would require a far-reaching revision
of the way most Arab autocrats do business. Syria is a case in point. The government’s approach to online
information warfare involved its Syrian Electronic Army hacking hundreds of opposition and international
websites, to assert that it was battling terrorists. According to NPR (National Public Radio) the websites
targeted included those of Newsweek, the US Treasury, and screen and television personalities.
Engagement replaces control
Perhaps what is most frustrating to Arab autocrats is the fact that the combination of mobile telephony, the
Internet and social media has rendered censorship futile and fundamentally rewritten the ground rules of
communications policies. Social media have turned the shaping of the narrative into something much more
complex, in which governments and institutions have to engage in ways they did not have to in the past.
For one, communication has become a two-way street. Shaping the narrative no longer means control, instead
it means engagement. That is an approach that in the best of circumstances is a difficult one, but particularly
for embattled autocrats, because it requires a mind shift that few autocrats can make.
Even the Western media had problems in adjusting to technological change. When newspapers shifted from
broadsheet to tabloid formats, not only did size change, so did the content, the story. Similarly, moving the
print edition of a newspaper on to the Internet proved to be an unworkable formula. It failed to recognise that
technology had replaced one-way communication with interactivity and changed the way news is consumed
and what an empowered public expects of news organisations.
As a result, governments and institutions, irrespective of the political environment they operate in, are being
forced to rethink their approach to communications. They have to pay greater attention to the way they
project themselves, their policies and the way they relate to the public in a new and increasingly complex
communications landscape. Technological change means that governments and institutions have to be more
attentive to public opinion because whether or not that opinion can be freely expressed social media enable it
to become part of the public domain.
Discontent will find its Outlet
The international community looked to the Arab street in the wake of 9/11 for change that would eradicate the
breeding ground of extremism. When the Arab street did not immediately revolt, government officials,
analysts and journalists wrote off the Arab street. Nonetheless, the widespread discontent continued to
simmer at the surface. It was palpable if one put one’s ear to the ground.
If the current Middle Eastern revolt and its embrace of technology teach anything, it is that where discontent
exists but cannot be expressed openly, it will be expressed elsewhere in what constitutes a truer reflection of
reality.
It is a reality enhanced by technology that Middle Eastern and North African autocrats ignore at their peril.
Table of Contents
Page 25
Download