Information Operations Newsletter Compiled by: Mr. Jeff Harley US Army Strategic Command G39, Information Operations Branch The articles and information appearing herein are intended for educational and non-commercial purposes to promote discussion of research in the public interest. The views, opinions, and/or findings and recommendations contained in this summary are those of the original authors and should not be construed as an official position, policy, or Table decision of of the United States Government, U.S. Department of the Army, or U.S. Contents Army Strategic Command. ARSTRAT IO Page on Intelink-U Table of Contents Vol. 8, no. 04 (3 – 30 November 2007) 1. National Guard Monitors Web Sites, Blogs 2. New Facility Focus On Electromagnetic Vulnerability 3. Langevin to Study Cyber Threats 4. What Infowar Might Mean To You (blog) 5. Cebrowski Institute, Family Celebrate Contributions of “Father of Network Centric Warfare” 6. Russian Liberals Accuse Government of Cyber Attack 7. Bangladesh Launches Internet Sabotage Probe 8. Chinese People's Liberation Army Modernisation Trends 9. China Conducts Electromagnetic Exercise 10. Turkey To Use Sociopsychological Action Plan To Counter Terrorism 11. Partnership Key to Cleaning Up Za'ab Triangle 12. Cyber Symposium Off To Elevated Start 13. How Technology Almost Lost the War: In Iraq, the Critical Networks Are Social — Not Electronic 14. Report: China Targeting All 'Enemy Space Vehicles' Including GPS Satellites 15. A Force of Cyberwarriors Protects Pentagon Data 16. U.S. "Under Widespread Attack In Cyberspace" 17. Electrical Supe Charged With Damaging California Canal System 18. In Iraq, Psyops Team Plays on Iran Fears, Soccer Love 19. Nov. 19 Airpower Summary: EC-130J Supports OIF, OEF 20. 120 countries building cyber-war capacity ARSTRAT IO Page on Intelink-U Page ii National Guard Monitors Web Sites, Blogs By James W. Crawley Media General News Service, Nov 02, 2007 WASHINGTON -Seven days a week, National Guardsmen search the Internet for military secrets -everything from nuclear weapons to intel on terrorists. The 10-person team, known as the Army Web Risk Assessment Cell, isn't hacking al-Qaida computers or snooping around foreign military databases. Instead, they are scouring U.S. military and government Web sites, soldiers' blogs, MySpace and other pages. It's all in the name of national security. "We're not willy-nilly cruising the Internet," said Lt. Col. Stephen Warnock, who's in charge of the unit. At an undisclosed Northern Virginia location, the Guardsmen from Virginia electronically scan from 100,000 to 2 million Web pages each month looking for secrets posted on public Web sites maintained by the Defense Department, defense contractors and individual soldiers. After a computer finds a specific word and phrase, like "top secret." a Guardsman checks out the Web site. About 10,000 pages a month are reviewed. Of those, a hundred or more may violate Pentagon policy. The Virginians are on active duty for a year, spending five days a week scanning the Web. On weekends, other Guardsmen pull duty during their monthly drill periods. They have found military base diagrams, close-ups of bomb-damaged Humvees, patrol schedules and other information that violate OPSEC -- operational security, said Chief Warrant Officer Kevin Jackameit of King George, Va. "We're looking for information that the enemy would like to use against us," he said. He estimated that 80 percent of the secret information that adversaries get about the U.S. military is over the public Internet. While one piece of information may not be damaging by itself, when combined with other information, it could reveal a weakness to an adversary, said Sgt. 1st Class Christian Smith of Woodbridge, Va. When sensitive or secret information is found, Warnock's men tell soldiers to remove the information. So far, no one has been court-martialed for violating Web site regulations. Because word of the risk assessment cell has spread through the Army, many bases and units ask the Guardsmen to review information on their Web sites before it is posted. The cell also gets calls and e-mails from soldiers reporting questionable Web sites or blogs. In the past, military Web sites have contained sensitive, if not secret, information. In the late 1990s, one military Web site posted the aerial refueling schedule for West Coast and Hawaii jet fighters, including dates, times and locations. Another gave details of which Marine Corps computers, including their Internet addresses, would be off-line during the Y2K scare. The floor plan of a top Pentagon general's residence was posted on the Web. Since 2001, the military has tightened Web site rules. The Pentagon is worried soldiers' blogs, videos posted to YouTube and personal pages on social networking sites like MySpace could reveal secrets about units deployed to Iraq and Afghanistan. YouTube, MySpace and other popular Web sites were put off-limits to military computers earlier this year. New regulations require soldiers to register blogs with their units. The Guardsmen started checking personal blogs last year. That sparked a Freedom of Information Act lawsuit from the Electronic Frontier Foundation. The San Francisco-based foundation has challenged federal government use of technology to monitor personal activities. Page 1 "There's a need for public understanding about what the government is doing," said foundation senior counsel David Sobel. In Army documents, turned over to EFF to settle the lawsuit, relatively few blogs were cited for violating operational security rules. Between January 2006 and January 2007, the unit found 26 security violations on soldiers' blogs. During the same period, 3,899 violations were found on official Army Web pages. The records show, Sobel said, that bloggers are not a big problem. "They officially disclose all kinds of things (on Web sites)," Sobel said. "But, they're coming down on the enlisted people." While Army officials would not comment on the EFF lawsuit, the risk assessment cell's Jackameit said most soldiers understand the blogging rules, so there are few problems. While monitoring the Web is important, the Guardsmen also try to educate military Webmasters about what can or cannot be posted on the Internet. The Army needs to emphasize training and awareness about the need for operational security on the Web, said Warnock, who lives in Northern Virginia. "You could put a million people on (screening Web sites) and never get it done," he said. Despite all the regulations, warnings, orders and admonitions, Warnock said one thing is absolute about the Internet -- "If something is out on the Web, it's out there and we'll never get it back." Table of Contents New Facility Focus On Electromagnetic Vulnerability From Alamogordo Daily News, 11/04/2007 A new research and analysis facility which will provide the Army Research Laboratory and the installation with state of the art electromagnetic spectrum research capability opened on White Sands Missile Range Oct. 24 following a ribbon cutting ceremony. The Electromagnetic Vulnerability Assessment Facility is a multifunction facility that will enable researchers to conduct a wide range of experiments involving radio and wireless emissions and communications. "It's a center to protect our people from threats, from what the enemy has," said Maj. Gen. Fred D. Robinson Jr., commanding general of the Army Research Lab, Development and Engineering Command. A new facility had to be constructed following the loss of the previous EMVAF in a fire in 2001. With the support of local leadership, including the efforts of New Mexico Sen. Pete Domenici, White Sands received the funds to construct a new and improved EMVAF to support the Army's mission to evaluate Army weapons systems' survivability against the full spectrum of electromagnetic energy threats. The major components of the EMVAF are the two double-shielded energy absorbing chambers. Within these chambers experiments are conducted to determine system vulnerabilities. Additionally, since the chambers block all radio and wireless signals, new information warfare techniques with wireless systems can be tested without fear of affecting civilian networks and the Internet. "It's a general purpose experimental tool and gives us a lot of freedom in the (radio frequency) realm," said Dan Williams, an electronics engineer with Army Research Laboratory. Taking up a large portion of the facility is the larger of the two test chambers. At more than 100 feet long, the chamber can accommodate a wide range of devices and vehicles for analysis. Equipped with a fume exhaust system, the chamber can even run experiments on armored vehicles while the vehicle engine is running. Page 2 A hoist system is built into the chamber's ceiling to accommodate experiments that involve small aircraft or airborne systems that would be active in flight. The EMVAF will begin experimentation in the coming months when it starts evaluating new information systems and other systems for use in the war on terror. "In addition to (Survivability/Lethality Analysis Directorate's) traditional electronic warfare work, we expect the EMVAF to be key to our support for, among other things, the (Command and Control, Communications, Computers, Intelligence, Sensors, and Reconnaissance On-the-move) experiment, the Mine-Resistant Ambush Protected vehicle program, the wireless mobile ad-hoc network connection for the Future Combat Systems, and wireless local area networks," said Dr. Paul Tanenbaum, director of the Survivability/Lethality Analysis Directorate. The new facility includes a number of safety upgrades and maintenance enhancements that the previous EMVAF lacked. The new facility is built using fire retardant materials, and is equipped with a dry pipe sprinkler system that can be activated without a fear of harming anyone in the building. Even the lighting was designed with safety in mind. Lighting in the large test chamber can be accessed from an attic, so employees no longer need to interrupt experiments and climb tall ladders just to replace light bulbs. "It's a far safer environment and it is a lot more convenient," Williams said. The new facility's location on White Sands will save time and money since experiments can be run on the range instead of requiring transport to another facility. The ribbon cutting ceremony concluded with a demonstration of the Range Control Branch's Army Air Flare copter. According to Dave Chelgren, operations officer for Army Air, the Flare copter is a UH-1 Huey helicopter equipped with the Army Research Lab's countermeasure dispensing system. The system is capable of launching up to 480 flares in support of various test and experimentation missions. Table of Contents Langevin to Study Cyber Threats By John E. Mulligan, the Providence Journal, November 5, 2007 WASHINGTON — As he wraps up a year as rookie chairman of a little known House subcommittee, Rep. James R. Langevin is about to take the gavel in a new arena that could attract some attention in the year to come. A Washington think tank that specializes in security issues has tapped the Rhode Island Democrat to help lead a commission that will examine holes in the nation’s defenses against “cyberterrorism” — computer hacking and other such attacks that, according to Langevin, might one day shut down power grids, sow chaos in the economy or worse. It will be “difficult, if not impossible,” to shield every weakness in U.S. computer systems, Langevin said as creation of the blue-ribbon panel was announced. But he declared it his goal to “pinpoint the most glaring vulnerabilities” so that the nation can set about “trying to manage, reduce and eliminate, if possible, the vulnerabilities that are out there.” The nonpartisan, 31-member group will be called the Commission on Cyber Security for the 44th Presidency. It will begin meeting next week, with the goal of producing a report and recommendations before the next president takes office in 2009. Another leader of the new panel, Rep. Michael McCaul, R-Texas, compared its mission to the prevention of “a digital Pearl Harbor.” Langevin and McCaul will act as cochairmen of the panel, along with former Adm. Bobby Inman, the onetime chief of the National Security Agency, and Scott Charney, a Microsoft vice president expert in computer security issues. While breaches of “cyber security” are not known to have done the nation extensive harm, Langevin and his colleagues cited a number of computer security breakdowns that add up, in their view, to a daunting potential for damage. Page 3 • The Department of Homeland Security endured more than 800 “cyber security incidents” over a recent two-year period, the worst of which was the alleged failure of a big contractor to deliver properly on a multimillion-dollar agreement to provide certain protections of DHS computers, according to Langevin. • In a simulation of an enemy cyber-attack early this year, researchers hacked into computers at the Idaho National Laboratory and induced a turbine to work so hard that it was damaged. In news accounts at the time, officials downplayed the prospect that a sustained series of such attacks could threaten the nation’s electrical system. But McCaul warned this week, “With the click of a mouse, our power grids could be destroyed,” potentially crippling the economy. • The Pentagon acknowledged last spring that it had temporarily shut down a portion of its nonclassified e-mail service after determining that unknown parties had hacked into the system. Electronic espionage and sabotage have been features of the computer world practically since the Defense Department projects that eventually helped to create the Internet, said James Lewis, of the Center for Strategic and International Studies, the think tank that is sponsoring the new commission. “But attackers are getting better and smarter,” Lewis said, “and they’re getting better and smarter faster than we are.” As chairman of a House subcommittee on emerging threats, Langevin said his method has been to amass information about the potential dangers from weapons of mass destruction, cyberterrorism and the like and then to confront federal officials with any shortcomings in the defenses against such threats. Langevin saw some parallels between this panel and the one that probed the causes of the terrorist attacks of Sept. 11, 2001, and laid out lessons learned from the event. But Langevin noted that the cyber security commission lacks subpoena power and any mandate to look back at any catastrophic attacks. He portrayed the new panel as likely to focus on “identifying” risks and creating potential ways to minimize or prevent them. The new commission might also raise Langevin’s profile along the way. As a supporter of looser federal limits on stem cell research, Langevin has distinguished himself from his peers by speaking from experience. The accident that paralyzed Langevin in his youth has made him feel in a keen and personal way the hopes that many sick and injured people harbor for the medical breakthroughs that the research. Langevin also has firsthand knowledge about how hard it can be to make a national policy imprint as one member of the large and unruly House of Representatives. As a former Rhode Island secretary of state when he was elected in 2000, Langevin envisioned a role in eliminating shortcomings in the nation’s election vote-counting systems. He is one of many legislators who have invested much energy in plans to overhaul the medical system but have little too show for it. Neither initiative has produced landmark legislation. This year, however, Langevin earned the coveted title, “Mr. Chairman,” when his seniority and party affiliation put him in charge of one of the subcommittees of the House Committee on Homeland Security. It is a new and lightly trodden field; the committee was created to watch over and write policy and budget blueprints for the Department of Homeland Security. The cabinet-level agency was created by an act of Congress after the terrorist attacks of Sept. 11, 2001. Langevin heads the Homeland Security Subcommittee on Emerging Threats, Cyber Security and Science and Technology. Table of Contents Page 4 What Infowar Might Mean To You (blog) By Scott Wilson, the CIO Weblog, November 05, 2007 I don't think it rises quite to the level of sabre-rattling, but some of Chinese president Hu Jintao's recent pronouncements on China's defense policy as it relates to information technology got me thinking. In his report to the 17th Party Congress, Hu says: To attain the strategic objective of building computerized armed forces and winning IT-based warfare, we will accelerate composite development of mechanization and computerization, carry out military training under IT-based conditions, modernize every aspect of logistics, intensify our efforts to train a new type of high-caliber military personnel in large numbers and change the mode of generating combat capabilities. I get the feeling that something may have been lost in translation, or maybe it's just the universal sort of double-speak that politicians the world over are famous for; there aren't really many specifics in that. But it's no secret that China has been aggressively developing information warfare capabilities, as Western intelligence agencies have been reporting. I have noticed a tendency among many IT staff and CIOs to mentally segregate day-to-day security and the panopoly of attacks and vulnerabilities which typify modern network operations from the loftier matter of "Information Warfare." IW is something that nations might levy against one another and at any rate it's all a bit theoretical, right? Certainly nothing to eclipse concerns about the next potential breach of personal credit card information. But this attitude is just as mistaken as the dismissal of any other sort of warfare as being primarily a matter between state actors. For many people, terrorism has driven home the fallacy of this notion. The most effective means of striking at a nation, it seems, is to strike directly at its people, bypassing the military and other mechanisms designed for defense. This isn't a new strategic thought, but it may have come to its logical conclusion in our era. The same is true with Information Warfare. Should China, or any other capable entity (whether a state or non-governmental organization), desire to strike out at an opponent, there is little profit in doing so toward those sectors best prepared for such an event. Instead, the best targets to incite fear in the populace and ruin an economy and communications conduits are the group of corporations which comprise it. And that, to a greater or lesser extent, means your company. Information Warfare, should it ever really come of age, will do so on your servers, not on those buried in some hardened bunker at the Pentagon. Hu seems to acknowledge this tacitly in his report, stating the necessity of developing military and civilian capabilities and systems hand in hand. There is no significant difference between them if one intends to fight an IW battle, after all. The good news is that most of the things that you are already doing to secure your network are just as applicable in the face of IW as they are against a teenage phreaker or a syndicate of card number thieves. The bad news is that few of us take those things seriously enough as it is. And while a minor disaster at a particular company is no big deal at the moment, a concerted effort to wreak havoc at dozens, or hundreds of major corporations simultaneously could have significant effect on the nation. Table of Contents Cebrowski Institute, Family Celebrate Contributions of “Father of Network Centric Warfare” By Barbara Honegger, Naval Post Graduate Public Affairs, October 31, 2007 The Naval Postgraduate School Cebrowski Institute for Information Innovation and Superiority held a special symposium Oct. 9 celebrating the Institute’s accomplishments and visioning its future research on emerging themes in national security. Page 5 The morning session on “Framing the Future” discussed future directions for the interdisciplinary research institute named after the late Vice Adm. Arthur Cebrowski, NPS Hall of Fame distinguished alumnus (Computer Systems Management, with distinction, 1973) and “father” of Network Centric Warfare. It kicked off with a presentation by Institute Director Prof. Peter Denning on “Mastering the Mess,” followed by Deputy Director Sue Higgins on “Framing New Approaches” and Prof. Bill Murray on “Open Network Security.” What made the symposium truly special was the presence and active participation of the guests of honor — Cebrowski’s life partner and wife Kathy, his older brother retired Marine Corps Capt. John Cebrowski and members of his extended family — in the afternoon celebration of Cebrowski’s life and revolutionary military philosophy. “This has truly been an incredible, wonderful and once-in-a-lifetime experience,” said Cebrowski’s brother John. “We’re thrilled to be here and tip our hats to everyone who engineered this symposium, which has exceeded all our expectations. Kathy and I are so grateful to all of you for carrying on Art’s work in his name and that his vision lives on in the work of the Institute. We thank you from the bottom of our hearts.” The elder Cebrowski remembered key turning points in his brother’s early life that presaged his later career. “As a boy, Art would spend hours at the town dump shooting rats next to Teterboro Airport [in New Jersey], where we got our first exhilarating taste of air flight that led us both to become pilots; Art and I both flew in Vietnam. Another profound influence was the summers in Connecticut on our grandparents’ farm, with their deep religious faith and focus on God, country and family. Art loved public speaking at our high school, which accepted, valued and nurtured individualism and gave him the confidence to be apolitical, to articulate something new and different as an intellectual leader, and to stand alone if needed to defend it. But the moment I remember most was Art transfixed by ‘Victory at Sea.’ From that moment on, it was inevitable he would enter the Navy.” Professor of Operations Research Wayne Hughes, who then Lt. Cebrowski worked for when they were both in the Pentagon, remembered that the future founder of DoD’s Office of Force Transformation was quick to grasp key concepts. “Art was a Hughes-trained man only in the Japanese sense of a sempai, a mentor who senses he’s in the presence of a student who will go beyond anything he has to teach him,” Hughes said. “And so he did. Right from the beginning, Art Cebrowski stood out as something special. He was a trailblazer and a pacesetter for us all.” “The Naval Postgraduate School has kept faith with Art Cebrowski,” Hughes noted. “He was the driving force behind a major transformation of the curricula here to share core courses, and gave us the mission to design ‘SeaLance’ — a street fighter-like small, inshore combatant ship — for a Systems Engineering and Analysis interdisciplinary capstone research project, and of course was the guiding light and inspiration for the Cebrowski Institute.” John Garstka, now with the Office of the Undersecretary of Defense for Policy and co-author with Cebrowski on their paradigm-changing Naval Institute Proceedings article on network-centric warfare, shared highlights of their seminal work together. “Art was a deep intellect who saw the big picture,” Garstka recalled. “We met in the early 1990s, at a Christian study group — we were both Catholics, both Polish and both math majors — and then worked together to develop the concept and vision for network-centric warfare. One day I called him up and laid out the idea of a shift from platform-centric to network-centric military operations. He instantly grasped its importance and said, ‘This is an idea I can run with.’ With our seminal article in Proceedings, we laid down the gauntlet and began the debate on networking. Now, the debate is not on whether we need to be networked, but only how networked we need to be.” “The core of Art Cebrowski’s vision was that information superiority enables a more effective and more moral use of military force,” Denning explained. “He saw that the competitive advantage in future warfare would come from a superior ability to make sense of information and to act on it Page 6 rapidly, and that we need to move toward clearly communicating commander’s intent and allowing greater flexibility at lower levels in carrying it out, coordinating situational awareness and action at all levels through networked communications.” A number of other speakers also emphasized Cebrowski’s deep religious faith as the foundation for the conscious moral dimension of his life’s work. “Admiral Cebrowski said that the military’s obligation to the world is to export security as part of an integral strategy to provide a better life for those not yet integrated into the world system,” said Higgins. “He also said that not sharing information at the tactical level is immoral. “This moral dimension of everything Admiral Cebrowski did and thought was his defining signature,” Higgins continued. “In his King Hall presentation, after being honored as an NPS distinguished alumnus, he said something amazing: ‘If you want to serve your country, there’s no better way than to have a good marriage and to love your spouse.’ He lived those words. His love of family and deep belief in the family as the teacher of moral values was a foundational element of his life and work. "This event has helped us synthesize the contributions of Art Cebrowski and further shape the direction of the Institute,” Higgins noted. “It helped us illuminate shifts in military missions beyond traditional warfare to areas supporting stability, security, transition and reconstruction (SSTR) operations and the increased emphasis on humanitarian assistance and disaster relief. These changes are clearly reflected in the U.S. Navy's new Maritime Strategy, which acknowledges that prevention of warfare operations are as important as warfare itself. Art Cebrowski foresaw that these information age and globalization trends would require the Department of Defense to coevolve with changes in the larger world. Cebrowski Institute certificate and degree programs in globalization and network science are under development that will create venues for growing new generations of security leaders who are well grounded in the principles championed by Art Cebrowski.” In addition to the Institute, organizations represented at the symposium were the Department of Defense Office of Force Transformation, for which Cebrowski was the founding director; the World Wide Consortium for the Grid (W2COG); and the Network Centric Operations Industry Consortium (NCOIC). Cebrowski inspired retired Air Force Gen. Carl G. O’Berry, then a senior vice president with Boeing Corporation, to found the NCOIC in 2004. “The late Admiral Art Cebrowski was the patriarch of Network-Centric Operations, which clearly had a profound impact on how we vision defense in the 21st century,” said NCOIC senior staff member John Poladian. “The NCOIC was honored to participate in this inaugural symposium in honor of his life and work, and especially to witness the many personal remembrances by family members and colleagues who worked closely with him. Most importantly, we look forward to continuing the walk with our peers to achieve Art’s vision.” Other morning session topics included autonomous coordination, cross sector collaboration and security, climate change as a global security issue, globalization and network science, hastily formed networks, information operations, information security, maritime domain awareness, mobile devices, positive change, semantic computation, terrorism and irregular warfare and the World Wide Consortium for the Grid. In the early afternoon, participants toured the institute’s affiliated centers and programs in stateof-the-art Glasgow Hall East, and were feted to a reception and lavish spread after the symposium adjourned. A number of symposium speakers referred participants to Transforming Military Force: The Legacy of Arthur Cebrowski and Network Centric Warfare, a new book by James R. Blaker. “Allison Kerr was the coordinator who helped weave the vision that Peter Denning and I had for this event into magical reality,” Higgins noted. Table of Contents Page 7 Russian Liberals Accuse Government of Cyber Attack From Reuters, 9 Nov 2007 A leading Russian opposition party accused the government on Friday of being behind a hacker attack on its Web site and the police seizure a day earlier of millions of leaflets across the country. Union of Right Forces (SPS) leader Nikita Belykh said a hacker attack from 400 points around the world hit the party's Web site (www.sps.ru) with 5-6,000 requests per second, forcing it off line. "The character and size of the attack shows this is part of an operation against the Union of Right Forces that has been going on since the beginning of the election campaign by plan of the administration of the president," Belykh wrote on his personal website (www.belyh.ru). Calls by Reuters to the Russian Federal Agency for Government Communications and Information, via the press office of the Federal Security Bureau, were unanswered. On Thursday, Belykh said police had confiscated 10 million copies of the SPS newspaper and stopped another 4 million copies at the printer in raids as far afield as Krasnoyarsk in eastern Siberia, the Volga region of Udmurtia, and Moscow. A police spokesman did not confirm the newspaper raids, but SPS's charges have raised fears among opposition groups that the Kremlin's allies are using the state apparatus to crack down on its political opponents. Belykh said party member Internet diaries continued to work, while specialists were working to transfer the SPS files to another internet service provider. Analysts and opinion polls agree the pro-Kremlin United Russia party, personally supported by President Vladimir Putin, will win the Dec. 2 polls and maintain its dominance of the State Duma (lower house of parliament). Polls show the weak and fractured liberal SPS are unlikely to pass the 7 percent threshold needed to win Duma seats. Two liberal parties won seats in elections eight years ago, but they have been dwarfed during Putin's time in office. Table of Contents Bangladesh Launches Internet Sabotage Probe From Agence France Presse, 13 Nov 07 DHAKA (AFP) - Bangladesh on Tuesday launched an investigation after the country's Internet link was sabotaged, disrupting communications nationwide for most of the day. Officials said cables were also severed twice last week causing massive disruption to businesses in the impoverished country. "We are investigating the cable cutting incident which took place today (Tuesday) with high priority," said Ziaur Rashid Sofder, general manager of security at the Bangladesh Telephone and Telegraph Board. "We are taking it very seriously because it was a really big sabotage," he said, adding that three people were arrested last October following a similar attack. "They confessed that someone had given them money to cut the cable but police are still investigating the incident," he said. Azahar Chowdhury, vice president of Internet Service Providers of Bangladesh, said the sabotage had prevented all Internet use and international telephone calls for most of Tuesday. Other industry figures called for urgent action to prevent further problems. "We were completely detached from world communications -- it was total isolation, a complete disaster," said Masum Billah, manager of the leading Internet service provider Grameen Cybernet. Table of Contents Page 8 Chinese People's Liberation Army Modernisation Trends By Rahul K Bhonsle, Newsblaze, 2 Nov 07 China will speed up modernization of its armed forces over the next five years as it has correspondingly reduced overall force levels. This was the central message delivered by Chairman Hu Jintao at the 17th CPC. "We must implement the military strategy for the new period, accelerate the revolution in military affairs with Chinese characteristics, ensure military preparedness, and enhance the military's capability to respond to various security threats and accomplish diverse military tasks", said Hu. A linkage between growth, development and defence was also underlined with the words, "Bearing in mind the overall strategic interests of national security and development, we must take both economic development and national defence into consideration and make our country prosperous and our armed forces powerful while building a moderately prosperous society in all respects." That the PLA will continue to be a people's army was also highlighted with the words, "fundamental purpose of the armed forces serving the people." The overall control of the Party over the military is axiomatic. A report by Xinhua highlighted the commitment of the six high-ranking generals of the People's Liberation Army (PLA), all members of the Central Military Commission who pledged to support the absolute leadership of the Communist Party of China for national defence construction and PLA modernization. The focus of modernization will be to develop information focused mechanized force, capable of undertaking war in an information dominated environment. Personnel would also be highly trained and equipped with weapons through "our capacity for independent innovation in R&D of weapons and equipment with better quality and cost-effectiveness," he said. Training of military personnel and logistics would be the other arm of the modernisation process developed through thrift and diligence. The focus is also likely to be on extensive training, in information and electronic rich, what the Chinese call as the, "electromagnetic" environments. Troops are to be trained in difficult and risky missions to be capable of winning the wars. The remarks of Kang Fei, delegate from the Navy on training appear particularly relevant, he says, "being resolute to rectify the unhealthy and fancy-seeking tendencies in training, and truly carrying out the training in accordance with the needs of real war by way of stressing on actual effects," should be our aim. Chen Bingde, member of the Central Military Commission and chief of general staff, emphasized that the Party committees at various levels should fully implement the spirit of the 17th CPC National Congress, focus on the fulfillment of the historical mission of the army in the new century and the new period, make dynamic efforts to boost the reform of military work, work in a down-to-earth manner in the preparedness for military struggles, and promote a better and faster development of the work and construction of the General Staff Headquarters of the PLA. In the sphere of logistics, Liao Xilong, member of the Central Military Commission and director of the General Logistics Department of the PLA, stressed on the logistics challenges as, "how to resolve the important and practical problems of the PLA's logistics construction and reform, fully strengthen and improve the construction of the CPC in the units under the General Logistics Department of the PLA, and fulfill the missions of all-round development of modern logistics at high standards and sound quality". The focus on human resources development was also evident with the ability to bring out creative initiative of the officers and the men by motivating them to excel. This was highlighted by indicating an approach, which put people first in the army to protect their legitimate interests. As Cheng Wanchong, delegate to the 17th CPC National Congress and deputy commander of an aviation regiment of the PLA Air Force, highlighted, "In the grassroots units, the more the officers and men are developed all-roundly, the better will it favour the process of the military reform with Chinese characteristics, the maintenance and enhancement of the advanced nature of the army as Page 9 a "big school", and the army's forefront role in the effort to promote the national civilization quality." While modernisation is in focus, the key issues identified are no different from other armies of the world be it emphasis on technology absorption or human resource development. Similarly electronic and information warfare have also received much attention. These precepts were also practiced during Queshan 2007, an exercise carried out by the PLA in September 2007. An essential factor, which has not received much focus, appears to be integration and jointness. A detailed review of PLA doctrines is essential before any further comment can be made, however in such important deliberations, integration and jointness could have possibly received greater attention. In the final analysis, the PLA is accountable to the Party and will follow its mandate. Table of Contents China Conducts Electromagnetic Exercise By Wendell Minnick, Defense News, 5 Nov 07 The People’s Liberation Army (PLA) concluded a weeklong live-fire exercise, dubbed “Iron Fist2007,” on Nov. 2 in central China’s Henan Province. The exercise included a division of 10,000 troops from the Jinan Military Region. The exercise involved testing command and control, longrange maneuvers and electromagnetic warfare exercises. Larry Wortzel, commissioner of the U.S.-China Economic and Security Review Commission, explained that the exercise involved everything from traditional jamming to spoofing an enemy’s communications, cyber warfare and information warfare. “They have electronic warfare regiments in all the military regions,” Wortzel said. “It means that they are practicing operating under conditions where they are under electromagnetic attack of their communications, data transmissions and radar, while they are practicing the same against an adversary.” Thomas Kane, author of the book “Chinese Grand Strategy and Maritime Power,” explained that the phrase electromagnetic warfare has been surfacing regularly in Chinese military writings. “I suspect that the term ‘electromagnetic warfare’ normally refers to what English speakers would call ‘electronic warfare,’” he said. “In other words, it refers to attempts to transmit and receive electromagnetic energy for military purposes while interfering with the enemy’s ability to do likewise. “Examples would include radar, radio communications, interception of enemy radio communications, encryption of friendly radio communications, jamming, spoofing, passive detection of enemy electromagnetic emissions, etc.” Chinese military writers have been claiming that “the electromagnetic battle will densely cover all naval battle space, penetrating all combat operations,” Kane said. Table of Contents Turkey To Use Sociopsychological Action Plan To Counter Terrorism By Ercan Yavuz, Today’s Zaman, 6 Nov 07 With a report prepared by the Turkish intelligence authorities explaining that the Kurdistan Workers’ Party (PKK) needs considerable money and weapons for a new wave of more violent attacks and is trying to raise funds from Kurdish citizens both within the country and abroad, the Turkish government has launched a psychological warfare action plan to counter such efforts. This action plan intends to neutralize the effects of the PKK’s propaganda on the people in the eastern and southeastern Anatolian regions through economic, social and cultural measures, and it will be implemented to complement the military and diplomatic attacks on the terrorist organization. Page 10 The Turkish intelligence units observe that the PKK is trying to regain its former strength by conducting shocking attacks when it loses support, cautioning that the PKK militants who were dispersed because of the ongoing crackdown in rural areas may opt for conducting terrorist attacks in the cities, particularly in metropolitan areas. According to the intelligence units, in the future the PKK will distinguish between its armed attacks and social attacks. Its social attacks will aim to create psychological uneasiness in society, and the government is planning to counter these attacks by introducing a psychological warfare plan. The main tenets of this plan were discussed in a National Security Council (MGK) meeting held on Oct. 21, and it was drafted after the country’s counterterrorism strategy was determined in detail. This plan aims to dissuade the people who support the PKK’s terrorism and includes several measures intended to counteract the effects of the PKK’s propaganda on the people of the region. The social aspects of the counterterrorism efforts will be emphasized. The misconceptions disseminated by the terrorist organizations will be curtailed, and the loyalty of citizens to “the state, the nation, the country and the flag” will be reassured. A greater importance will be attached to channels of communication. Due to the modified organization of the MGK, the psychological warfare plan will be conducted by the Higher Counterterrorism Board (TMYK), chaired by Deputy Prime Minister Cemil Çiçek. As part of the reforms the government implemented to ensure increased harmonization in Turkey’s EU bid, the MGK began to be chaired by a civilian secretary-general in 2003, and because of this organizational change, the MGK’s public relations department, which was formerly in charge of psychological warfare, became dysfunctional, which in turn led to defects in the psychological aspects of the country’s counterterrorism efforts. To eliminate these defects, the government has decided to make the TMYK more functional. In this context, the security affairs department, subordinated to the Prime Ministry, but which, too, was not very active, will be transformed into a general directorate, connected to the TMYK. These public institutions will identify psychological, social, cultural and economic priorities of counterterrorism. As part the psychological warfare plan, data on forms of terrorism, rates of support for terrorism, demographical structure and economic and social status of the terrorism-intensive areas have been collected. This data will be used to guide the efforts to determine political, social, economic and security aspects of counterterrorism. The psychological action plan also has a role for media organizations in counter-terrorism efforts and entails coordination in this respect. The economic and social measures will be implemented following the first meeting of the Cabinet to be held after the return of Prime Minister Recep Tayyip ErdoÄŸan from the US. Furthermore, several ministers will regularly visit the eastern and southeastern provinces to listen to the problems of the local people. Economic measures will be prioritized and infrastructure problems of the settlements in the region will be completely solved. Flights to the region will be encouraged, and railways and trains will be renovated. Long-term loans will be provided for animal breeding and crafts with low interest rates. National and international fairs and exhibitions will be organized in the provinces to develop the industrial sector. More medical and education personnel will be assigned to the region, and voluntary service will be introduced for the region. This service will mainly target women and children. Table of Contents Partnership Key to Cleaning Up Za'ab Triangle By Spc. Bradley J. Clark, 4th BCT, 1st Cavalry Division Public Affairs via Blackanthem Military News, Nov 9, 2007 SHARQAT, Iraq - U.S. Soldiers traveled deep into the Za'ab Triangle to meet up with their Iraqi counterparts and conduct various operations in the desert of Salahuddin province. Participating in building the new Combat Outpost on the outskirts of Sharqat were Soldiers from Headquarters and Headquarters Company, 5th Battalion, 82nd Field Artillery Regiment, 4th Brigade Combat Team, 1st Cavalry Division. Page 11 The reason behind the COP's construction is to improve security in the area known as the Za;ab Triangle, which includes the cities of Sharqat, Heschel and Aitha. They all belong to Salahuddin province, but in February, the triangle was moved into the operational control of the 4th BCT, 1st Cav. Div., the unit who is in charge of Ninevah province. This meant the responsibility of cleaning up the region fell on the Soldiers from 5-82 FA, who control the battelspace in southern Ninevah, which borders Salahuddin. "We already have COP Nepsa outside of Heschel, so building up this COP outside of Sharqat will give us an even bigger advantage in picking apart the safe haven for terrorists in the Za'ab Triangle," said Maj. Lance Varney, executive officer for the 5-82 FA. The addition of a combat outpost in the region not only helps Coalition Forces, it also has many benefits to the Iraqi security forces. "With the completion of the COP, the Iraqis will have a Coalition presence, so whenever they need training or coaching, they don't have to travel all the way to [Forward Operating Base] Q-West," said Spc. James Manning, an intelligence analyst from Butler, Pa. "Plus, we will be readily available whenever we are needed to do joint patrols." Before Coalition Forces can operate as frequently and easily as they want in the Sharqat area, they must first build the combat outpost. This task was made easier than normal because Coalition Forces already had a foundation to build upon due to the fact that the COP;s location was previously home to the Iraqi Army's 13th Strategic Infrastructure Battalion. "What we are doing is providing a better setup, which in turn provides better protection," said Staff Sgt. Jeremy Clifton, technical engineer supervisor, HHC, 111th Engineer Brigade. "We are improving force protection by adding a second tier of [barriers] and improving the entry control point by adding a search lane." While the engineer element began working on the combat outpost, the remainder of American troops began to conduct operations in the city of Sharqat to see the progress the ISF have made since February. One of the operations that took place was a walking tour through Market Street in downtown Sharqat with the Iraqi Army and Iraqi Police. "The IA and IP have never done that before, it was a huge breakthrough," Varney said happily. "I remember a time when you couldn;t drive down Market Street and be safe, it has definitely come a long way since then." The tour wasn;t the only evidence of an improving Iraqi security force, a few evening raids also made a strong case for Coalition confidence in their Iraqi counterparts. "When we got to the target locations, they set up security, had dismounted patrolmen, went in and searched all the target houses and didn't cause any damage," said Manning. "Even though the targets weren't there, it was good, clean practice for the Iraqis. Pretty soon they will be right there. There isn't too much more for them to learn or do." Their ability to conduct combat operations wasn't the only thing that impressed Manning. "Their interaction with the local population was great," said Manning. "As soon as they went through the houses, they immediately began positive information operations right there on the spot. Instead of leaving after the search, they stayed on site and let the locals in the neighborhood know what they were doing and why they were doing it - to get the bad guys so their neighborhoods could be safe." The Soldiers of the 5-82 FA look forward to finishing the combat outpost so that Coalition Forces can share continued future success with their Iraqi partners. The COP is scheduled to be complete and fully operational prior to the redeployment of the field artillerymen in early to mid-December. Table of Contents Page 12 Cyber Symposium Off To Elevated Start By John Andrew Prime, Shreveport Times, November 28, 2007 The "Fly and Fight in Cyberspace" symposium got off to a lofty start Tuesday with the theoretical and the practical meeting in a big way. It happened in a lecture hall at the Shreveport Convention Center, with a standing-room-only crowd of military, academics and information-technology civilians listening to an esteemed retired professor. He talked about viruses and evolution and how these provide both models and cautions for the mushrooming world of technology and communications. C.V. Ramamoorthy, professor emeritus of electrical engineering and computer sciences from the University of California, spoke for an hour as the start and keynote speaker of a daylong Center for Secure Cyberspace-sponsored workshop. The Fly and Fight in Cyberspace symposium continues today and Thursday at the Convention Center. Registration is available at the door. Opening in a folksy manner and ending on such a lofty plane that even those in the crowd with doctorates likely hoped that Cliff's notes on the talk might soon be available. Ramamoorthy used the evolution of physical viruses as a model for understanding, developing and combatting metaphysical and cybernetic viruses and other threats. His talk touched on three other related areas as well: security issues and disaster management; the security aspects of "virtualization on the Web;" and system vulnerabilities that can create security weaknesses in software systems. The thrust of the talk was that technology and the knowledge base, and the dangers that result from both chance and malice, double every few years, far outpacing mankind's ability to understand it or defend the mushrooming infrastructure. "The gap between the technology and education increases exponentially," he said. Expansion of this process to the Web and the Internet over the past few years has only accelerated this process and introduced undreamed-of aspects, he said. "Increasingly, the Web and the Internet have been used for social networking and as a repository for personal information," he said. This introduces new ways enemies can threaten us, but is consciously done by those putting information on the Web, as another level of evolution. "We want to leave a legacy to our next generation," he said. "We want to show our faces and our personalities." Such survival, he said, "is the alpha and the omega of all laws of evolution." "He's hitting it pretty square on what the problems are," Lt. Col. Chuck Knofczynski, an F-15 pilot now working with the 46th Test Wing at Eglin Air Force Base, Fla., said after Ramamoorthy ended to applause. Knofczynski, attending to network and learn ways his unit, the service's test and evaluation center for Air Force air-delivered weapons, navigation and guidance systems, can work with Air Force Cyber Command, said the talk made him think. "How do you know you've mutated the right direction?" he asked. "How do you know the iterations you have made are superior iterations? "It's an exceptionally interesting concept. ... We're always reacting, we're never proactive. But at the same time how do we know we're not going to pour a lot of money into the wrong area versus the correct area? "We're treating the symptoms. Every time, we're treating the symptoms." He said Ramamoorthy's take on the Web was dead-on, too. Page 13 "When you think about it, everything we're doing is going to the Web," he said. "So our vulnerabilities are there. Everyone knows that." The rest of the day included several other guest speakers, and presentation of more than a dozen papers on topics ranging from "Annotating High Performance Computing Simulations with Semantic Metadata" to "CyberCraft: Protecting Electronic Systems with Lightweight Agents." In the center's exhibit hall, scores of national and local vendors, from small concerns to industry giants, worked through the day to set up displays and booths. These range from simple displays with printed material and posters to giant trailers packed with state-of-the-art communications gear, such as Cisco Systems' sophisticated Network Emergency Response Vehicle. At one table, a handful of Northrop Grumman representatives worked to make sure a PowerPoint slideshow would effortless display their company's presence in the cybersphere. The company has some 30 staffers from across the country here for the symposium and eventually could have several hundred personnel here, depending on the needs of Air Force Cyber Command and the Cyber Innovation Center. "We also want to support Gov.-elect Jindal's vision of bringing technology into northwest Louisiana, to transform and enable northwest Louisiana," said John Wright, a Northrop Grumman senior information operations planner from Colorado Springs, Colo. "We would like to be a part of that." Shreveport Mayor Cedric Glover, seated up front, was fascinated by Ramamoorthy's presentation, which he saw as a harbinger. "So much of what happens in the cyber environment seems to parallel what exists within the natural world," Glover said. "The concept of how viruses are created and mutate and the ways they behave seem to be so similar to how life itself acts. I found that aspect of it fascinating." On a broader note, he said the discussion and the symposium will "lead to discussions and gatherings in facilities such as this and in classrooms around here for years and decades to come. I'm looking forward to it. It's a good start." Table of Contents How Technology Almost Lost the War: In Iraq, the Critical Networks Are Social — Not Electronic By Noah Shachtman, Wired.com, 27 Nov 2007 The future of war began with an act of faith. In 1991, Navy captain Arthur Cebrowski met John Garstka, a captain in the Air Force, at a McLean, Virginia, Bible-study class. The two quickly discovered they shared more than just their conservative Catholic beliefs. They both had an interest in military strategy. And they were both geeks: Cebrowski — who'd been a math major in college, a fighter pilot in Vietnam, and an aircraft carrier commander during Desert Storm — was fascinated with how information technologies could make fighter jocks more lethal. Garstka — a Stanford-trained engineer — worked on improving algorithms used to track missiles. Over the next several years, the two men traded ideas and compared experiences. They visited businesses embracing the information revolution, ultimately becoming convinced that the changes sweeping the corporate world had applications for the military as well. The Defense Department wasn't blind to the power of networks, of course — the Internet began as a military project, after all, and each branch of the armed services had ongoing "digitization" programs. But no one had ever crystallized what the information age might offer the Pentagon quite like Cebrowski and Garstka did. In an article for the January 1998 issue of the naval journal Proceedings, "NetworkCentric Warfare: Its Origin and Future," they not only named the philosophy but laid out a new direction for how the US would think about war. Their model was Wal-Mart. Here was a sprawling, bureaucratic monster of an organization — sound familiar? — that still managed to automatically order a new lightbulb every time it sold one. Page 14 Warehouses were networked, but so were individual cash registers. So were the guys who sold Wal-Mart the bulbs. If that company could wire everyone together and become more efficient, then US forces could, too. "Nations make war the same way they make wealth," Cebrowski and Garstka wrote. Computer networks and the efficient flow of information would turn America's chain saw of a war machine into a scalpel. The US military could use battlefield sensors to swiftly identify targets and bomb them. Tens of thousands of warfighters would act as a single, self-aware, coordinated organism. Better communications would let troops act swiftly and with accurate intelligence, skirting creaky hierarchies. It'd be "a revolution in military affairs unlike any seen since the Napoleonic Age," they wrote. And it wouldn't take hundreds of thousands of troops to get a job done — that kind of "massing of forces" would be replaced by information management. "For nearly 200 years, the tools and tactics of how we fight have evolved," the pair wrote. "Now, fundamental changes are affecting the very character of war." Network-centric wars would be more moral, too. Cebrowski later argued that network-enabled armies kill more of the right people quicker. With fewer civilian casualties, warfare would be more ethical. And as a result, the US could use military might to create free societies without being accused of imperialist arrogance. It had a certain geek appeal, to which Wired was not immune. Futurist Alvin Toffler talked up similar ideas — before they even had a name — in the magazine's fifth issue, in 1993. And during the invasion of Iraq in 2003, my colleague Joshua Davis welcomed in a "new age of fighting that combined precision weapons, unprecedented surveillance of the enemy, agile ground forces, and — above all — a real-time communications network that kept the far-flung operation connected minute by minute." As a presidential candidate in 1999, George W. Bush embraced the philosophy, as did his eventual choice for defense secretary, Donald Rumsfeld. At the Pentagon, Rumsfeld instituted a massive program to "transform" the armed services. Cebrowski was installed as the head of the newly created Office of Force Transformation. When the US went to war in Afghanistan, and then in Iraq, its forces achieved apparent victory with lightning speed. Analysts inside and outside the Pentagon credited the network-centric approach for that success. "The successful campaigns in Afghanistan and Iraq took far fewer troops and were executed quicker," Rumsfeld proclaimed, because of "advanced technology and skills." The Army committed more than $230 billion to a network-centric makeover, on top of the billions the military had already spent on surveillance, drone aircraft, spy satellites, and thousands of GPS transceivers. General Tommy Franks, leader of both invasions, was even more effusive than Rumsfeld. All the new tech, he wrote in his 2004 memoir, American Soldier, promised "today's commanders the kind of Olympian perspective that Homer had given his gods." And yet, here we are. The American military is still mired in Iraq. It's still stuck in Afghanistan, battling a resurgent Taliban. Rumsfeld has been forced out of the Pentagon. Dan Halutz, the Israeli Defense Forces chief of general staff and net-centric advocate who led the largely unsuccessful war in Lebanon in 2006, has been fired, too. In the past six years, the world's most technologically sophisticated militaries have gone up against three seemingly primitive foes — and haven't won once. How could this be? The network-centric approach had worked pretty much as advertised. Even the theory's many critics admit net-centric combat helped make an already imposing American military even more effective at locating and killing its foes. The regimes of Saddam Hussein and Mullah Omar were broken almost instantly. But network-centric warfare, with its emphasis on fewer, faster-moving troops, turned out to be just about the last thing the US military needed when it came time to rebuild Iraq and Afghanistan. A small, wired force leaves generals with too few nodes on the military network to secure the peace. There aren't enough troops to go out and find informants, build barricades, rebuild a sewage treatment plant, and patrol a marketplace. Page 15 For the first three years of the Iraq insurgency, American troops largely retreated to their fortified bases, pushed out woefully undertrained local units to do the fighting, and watched the results on feeds from spy drones flying overhead. Retired major general Robert Scales summed up the problem to Congress by way of a complaint from one division commander: "If I know where the enemy is, I can kill it. My problem is I can't connect with the local population." How could he? For far too many units, the war had been turned into a telecommute. Afghanistan, Iraq, and Lebanon were the first conflicts planned, launched, and executed with networked technologies and a networked ideology. They were supposed to be the wars of the future. And the future lost. Inside the Pentagon, the term network-centric warfare is out of fashion, yet countless generals and admirals still adhere to its core principles. On the streets of Iraq, though, troops are learning to grapple with the guerrilla threat. And that means fighting in a way that couldn't be more different from the one Donald Rumsfeld embraced. The failures of wired combat are forcing troops to improvise a new, socially networked kind of war. Tarmiyah, located about 20 miles north of Baghdad, is an ugly town — traced with rivulets of sewage, patrolled by stray dogs, and strewn with rubble and garbage. Insurgents fleeing US military crackdowns in Baghdad and, farther north, in Baqubah, have flooded the city. The local police quit en masse almost a year ago, leaving the security of Tarmiyah's 50,000 residents to 150 men from the US Army's Fourth Battalion, Ninth Infantry Regiment — known since an early-1900s tour of duty in China as the Manchus. Typically, soldiers spend hours of every day at war just trying to figure out where their comrades are, and how to maneuver together. But hand out GPS receivers and put everyone's signals on a map, and those tasks become a whole lot simpler. Luckily for the Manchus, the 4/9 is arguably the most wired unit in the Army. Select troops wear an experimental electronics package, including a helmet-mounted monocle that displays a digital map of Tarmiyah with icons for each of their vehicles and troops. The unit's commander, William Prior, rides an upgraded Stryker armored vehicle that shows the same info on one of many screens. It's packed with battle command stations, advanced radios, remote-controlled weapons turrets, and satellite network terminals. No commander at his level has ever been able to see so many of his men so easily. "It increases the unit's combat power, no question," Prior says. Trim and dark-eyed, the lieutenant colonel knows his tech. He has a master's in physics and taught science at West Point in the late 1990s. During the invasion of Iraq in 2003, only a fraction of the Humvees, tanks, and helicopters invading the country were equipped with these kind of readouts on the position of other US vehicles. Still, enough had them to allow the troops pushing to Baghdad to execute perilous maneuvers, like sending one unit through another's kill zone — a move made even more hair-raising by dust storms that turned the air opaque. Today, every three-man team in the Manchus is an icon on every other team's monocles. Networkcentric doctrine says that these plugged-in soldiers should be able to cover a bigger swath of the battlefield and take on more enemies. And, yes, the gear does let them clear neighborhoods more efficiently and respond to enemy attacks more quickly. But a handful of soldiers still can't secure a town of more than 50,000. Half a dozen Manchus have been killed or wounded by snipers during their five months in Tarmiyah. Prior has handed out 25 Purple Hearts to the 150-man Comanche Company guarding Tarmiyah. It's even worse outside town, where the equally small Blowtorch Company was trying to keep the peace in an area three times the size of Manhattan, until the higher-ups ordered the company onto other missions. "A well-informed but geographically dispersed force," Garstka and Cebrowski wrote in 1998, should be able to triumph over any foe, regardless of "mission, force size and composition, and geography." But neither Cebrowski nor Garstka was thinking about the kind of combat where foes blend into the populace and seed any stretch of road with bombs. Lawless towns like this can be pacified only by flooding them with troops — collecting tips and knocking heads. That's what Prior needs, not more gadgets. "They're just tools," he says in his flat Iowa accent. Page 16 But Prior has just caught a break: Another several hundred soldiers, Special Forces operators, and Iraqi troops have descended on the city to kick in doors, drop bombs on extremist hideouts, and drive out the insurgents. Those men will leave eventually, though, and to sustain the gains they make, Prior is supposed to recruit civilians into a kind of neighborhood watch. The idea is to have as many eyes and ears on the streets, around the shops, and in the mosques as possible. In counterinsurgency, it's better to have a lot of nodes in your network, connecting to the population, than just a few. In fact, that's a key tenet of the new US strategy in Iraq — hiring watchmen who've come to be known in other towns as "alligators" for their light-blue Izod shirts. Prior hasn't had much luck in getting folks in Tarmiyah to sign up; even his own soldiers are reluctant to go out in the daytime. But the extra boots on the ground have given Prior some space. If he can recruit a few alligators in a hurry, the extremists will be less likely to come back. So he has started spending quality time drinking chai with local leaders instead of fighting a shooting war. We walk into the home of Tarmiyah's former mayor, sheikh Sayeed Jassem. Everyone in town agrees he'd be the guy to help sign up alligators. One problem: Jassem is in jail on charges of embezzlement and funneling money to the insurgency. The Iraqi government is in no mood to let him out. That makes the several dozen tribal leaders sitting in Jassem's 40-foot-long, lavishly carpeted living room extremely grouchy. "Sayeed, he knows every sheikh, he knows all the children. The first step is releasing him. Then we can arrange security," says burly, balding, gravelvoiced Abu Ibrahim. Next to him, in a white headdress and wearing a pencil-thin mustache, Jassem's cousin Abu Abbas nods. "I couldn't make a decision until he's free." Prior blinks. Abbas went to Jassem's jail cell the day before yesterday and got the sheikh's blessing to proceed. "But you saw him yesterday, with your own eyes, did you not?" he asks. Abbas starts saying something about his uncles. Prior turns to Ibrahim. "Yesterday, you said you'd have 100 men. All I'm asking for is 30. Five men, in eight-hour shifts, to guard the sheikh's home, and to guard the Tarmiyah gate" — the main entrance to the town. The meeting has been going on for two hours. That's typical. But after a few of these, Prior has finally learned that such gatherings are as much about performance as ticking off agenda items. He booms out in a Broadway-loud voice: "Are there 30 strong men in Tarmiyah who can do this?" OK, OK, everyone answers, of course there are, don't get so excited. They spend the next few hours drinking cup after cup of chai, hammering out exactly what the recruiting announcement will say, whether these guardians will have badges, how they'll be vetted. Finally, they agree that 30 men will meet back at the house tomorrow morning. Prior's soldiers print up 50 makeshift applications — better to have a few extra, just in case. The next day, we go back to Jassem's house. More than 500 men are braving the heat, waiting in front to sign up as alligators. A week later, that number swells to more than 1,400. In the month since, Prior has downed a lot more chai. But he hasn't had to award a single Purple Heart. Outside of Fallujah, on a sprawling US military base, there's an old barracks supposedly built for Uday Hussein's personal shock troops. Down at the dimly lit end of one hallway is a tiled bathroom that's been converted into a tiny office. Inside, three screens sit on a desk, displaying a set of digital maps showing a God's-eye view of the entire country. Every American tank and truck is marked with blue icons. Every recent insurgent attack is marked in red. There are more than 1,100 units like this one across the country, and the site of every major US military center in Iraq is connected to the same system. The brass calls these futuristic command posts... well, it calls them command posts of the future, or CPOF. (Grunts call them the command posts of the right now — CPORN.) This is network-centric warfare, translated from journal theory to war-zone reality. Fallujah isn't more than 10 miles away, but staring at those three screens feels like observing Iraq from another continent — maybe another planet. Outside, it's ant-under-a-magnifying-glass hot. In here I have to pull my arms inside my T-shirt, the thermostat is turned so low. Across the city, marines do their best to predict the insurgents' next moves. But in front of the command post, we have so much information at our fingertips it makes Prior's tech look like a beta-test version of Page 17 Missile Command. "There's a sea of information here. All you have to learn to do is fish in it," says Jim Kanzenbach, a tan, goateed Army contractor and trainer with a southern-accented baritone. Kanzenbach taps the mouse a few times. Red diamonds representing all of the insurgent sigacts (military-speak for "significant activities") array themselves into a timeline. He sorts it by day of the week, then by hour of the day. White space appears during a particular hour; there don't seem to be any sigacts then. "If I was going to run a convoy, that would be the better time." He clicks again, and the middle screen switches to a 3-D map of an Iraqi town from a driver's point of view. Kanzenbach smiles, and his mile-a-minute Texas patter goes hypersonic. "Now let's plan the route. You've got a mosque here. An IED happened over there two weeks ago. Here's the one that happened yesterday. Hey, that's too close. Let's change my route. Change the whole damn thing." He guides me through capability after capability of the command post — all kinds of charts, overlays, and animations. "But wait — there's more," he says. "You wanna see where all the Internet cafés are in Baghdad?" It's hard not to get caught up in Kanzenbach's enthusiasm. But back in the US, John Nagl, one of the authors of the Army's new counterinsurgency manual, isn't impressed. He's a lieutenant colonel and an Iraq vet, an Army batallion commander at Fort Riley in Kansas. He's also the author of several influential articles and books about counterinsurgency, including Learning to Eat Soup With a Knife, an analysis of Vietnam and Malaya. When I ask him about CPOF, he's more interested in what the screens don't show. Historical sigacts don't actually tell you where the next one's going to be. Or who's going to do it. Or who's joining them. Or why. "The police captain playing both sides, the sheikh skimming money from a construction project," Nagl asks, "what color are they?" CPOF was designed for planning short, decisive battles against another regular army — the Soviets, the Chinese, Saddam's Republican Guard, whoever — as long as they had tanks to destroy, territory to seize, and leaders to kill. The counterinsurgency game has completely different rules. The goal here is to stabilize a government, not bring it down; to persuade people to cooperate, not bludgeon them into submission. In fact, many of these kinetic bombs-and-bullets activities can actually undermine a counterinsurgency, creating more enemies than they kill. "Some of the best weapons for counterinsurgency do not shoot," Nagl's counterinsurgency manual says. Instead, it advises troops to get to know the locals — both individually and as groups — and gain their trust. The locals generally know which of their neighbors are insurgents and which aren't; they're already plugged into the communal network. "Arguably," the manual says, "the decisive battle is for the people's minds." Cebrowski and Garstka wrote about a different kind of power, one that came when connected troops started to share information in ways that circumvented, and bypassed, the Industrial Age military chain of command. But that helps only if troops can connect in the first place. It can take up to a week for them to wrangle their laptops into updating the biometric databases that track who gets in and out of Fallujah. Intelligence reports can take even longer. The people best equipped to win the battle for people's minds — US troops on the ground, local policemen, Iraqi Army officers, tribal leaders — are left out of CPOF's network. It's a bandwidth hog, and the soldiers and marines fighting these counterinsurgencies aren't exactly carrying around T3 lines. Only recently did infantrymen like the ones in Fallujah even get their own radios. The Pentagon's sluggish structure for buying new gear means it can take up to a decade to get soldiers equipped. (Though to be fair, CPOF was purchased and deployed years ahead of schedule.) In Fallujah, the marines of Fox Company, based in an abandoned train station, mostly use their CPOF terminal to generate local maps, which they export to PowerPoint. Their buddies in Fox Company's first platoon, working out of a police precinct, have it even worse. When they want to get online, they have to drive to the station. As for Iraqi access, while CPOF technically isn't classified, all of the data on it is. Locals can't see the information or update any of those databases with their own intelligence. A key tenet of network theory is that a network's power grows with every new node. But that's only if every node gets as good as it gives. In Iraq, the most important nodes in this fight are all but cut off. Page 18 Meanwhile, insurgent forces cherry-pick the best US tech: disposable email addresses, anonymous Internet accounts, the latest radios. They do everything online: recruiting, fundraising, trading bomb-building tips, spreading propaganda, even selling T-shirts. And every American-financed move to reinforce Iraq's civilian infrastructure only makes it easier for the insurgents to operate. Every new Internet café is a center for insurgent operations. Every new cell tower means a hundred new nodes on the insurgent network. And, of course, the insurgents know the language and understand the local culture. Which means they plug into Iraq's larger social web more easily than an American ever could. As John Abizaid, Franks' successor at Central Command, told a conference earlier this year, "This enemy is better networked than we are." The insurgent groups are also exploiting something that US network-centric gurus seem to have missed: All of us are already connected to a global media grid. Satellite television, radio, and the Internet mean that many of the most spectacular attacks in Iraq are deliberately staged for the cameras, uploaded to YouTube, picked up by CNN, and broadcast around the world. American forces have been trying to solve the insurgent puzzle in Fallujah since 2003. Massive battles devastated the town, damaging more than half the homes there and driving out 90 percent of the populace. The insurgents kept coming back. But in the past year, things have shifted. Today, Fallujah is calm: Shops are open, kids are in school, men are smoking their cigarettes and holding hands in outdoor cafs. "The people just decided they couldn't take al Qaeda anymore," says George Benson, executive officer of the marines' Second Battalion, Sixth Marine Regiment, Regimental Combat Team Six, which is responsible for the town. Benson believes that a beefy, blue-eyed kid raised in the Cleveland suburbs is a big part of the reason Fallujah has gone so quiet. His name is Joe Colabuno, and he's a sergeant who works in psychological operations — psyops, in military-speak. His job is to win the hearts-and-minds battle, and his tools are almost comically simple: posters drawn in Photoshop, loudspeaker and radio broadcasts pasted together with SonicStage and saved to MiniDiscs, the occasional newspaper article, and, above all, his own big mouth. Arab culture lives by its oral traditions; talk is often the most important weapon. "I find the right people to shape, and they shape the rest," Colabuno says. Just as in Tarmiyah, troops in Fallujah are looking to recruit locals to keep tabs on their neighborhoods. Yesterday, on the west side of town, an alligator helped catch one of the Americans' top insurgent targets in Fallujah. After seeing a photograph, the watchman ID'd the guy as a neighbor, living just a few houses down the street. But an alligator-recruiting drive yesterday in the Askeri district, in the northeastern corner of town, didn't go so well. The marines got less than half of the 125 they were looking for. So Colabuno hops into a Humvee to find out why. We pull up to a narrow, unpaved street alongside the Askeri recruiting station. A group of seven men sit on the gravel, beneath a set of drying sheets. In the middle of the crowd, leaning on a cane, fingering prayer beads and dressed in white, is a rotund, bearded man. He's clearly the ringleader. Colabuno and his wire-thin interpreter, Leo, approach him. In every other district, they've recruited plenty of alligators. "Why not in Askeri?" Colabuno asks the ringleader. The money's not good enough, he answers. An alligator makes only $50 a month; day laborers get $8 a day — when there's work, that is. "That's the weakest argument ever," Colabuno says. The men looked stunned; Americans don't normally speak this directly — they're usually deferential to the point of looking weak, or just condescending. "Do you remember Sheikh Hamsa?" Colabuno asks. Sure, sure, the men nod. The popular imam was killed more than a year ago by insurgents, but they're a bit surprised that Colabuno knows who he is. Most of the US troops here have been in town for just a few months. "Well, Sheikh Hamsa told me that weak faith protects only so much.'" The ringleader stares down at the ground and fingers his beads. Colabuno has hit a nerve. "You know, I looked in the Koran. I didn't see anything about Mohammed demanding a better salary before he'd do God's work," Colabuno says, jamming his forefinger into his palm. Page 19 A skinny man at the back of the pack speaks up, telling Colabuno that the Americans are just here to take Iraq's oil. "Yeah, you're right. We want your oil," Colabuno answers. Again eyes grow big with surprise. "We want to buy it. So you can pay for jobs, for water, for electricity. Make you rich." The men chuckle. Everyone shakes hands. Askeri's alligator quota is filled by the next morning. Colabuno joined the Army because, frankly, it sounded better than his other option: managing a local steakhouse. When his recruiter told him about psyops, Colabuno loved the idea. It sounded like something out of The X-Files. "Does the job involve LSD?" he jokingly asked. It did not. Instead, Colabuno has spent the better part of four years, and all of the past 17 months, getting comfortable with the residents of Fallujah. And now that he has cracked Fallujah's cultural code, the brass is reluctant to let him leave. We head back to the base. Colabuno's office looks like a dorm room, with mountain bikes hanging on the wall next to posters of Kristin Chenoweth, Vida Guerra, the Denver Broncos cheerleaders, and Corona beer. "Theme of the week," reads a white board, "terrorism causes CANCER... and impotence." Colabuno's early efforts to persuade the population were just as subtle. He shows me a collection of his early posters, tabloid-sized pages laid on a table. Against a flaming background, a terrorist holds a child. The text asks why the parents of Fallujah would let insurgents harm their kids. Wrong move. This is a culture based on shame and honor; now you've just called the parents inadequate. Plus, the piece is just too on the nose, too blatant. The best propaganda is sneaky. So Colabuno started spoofing the insurgents' posters instead. He put a logo similar to that of the terrorist Islamic Army at the top of a simple black-and-white sheet. "A young boy died while wearing a suicide vest given to him by criminals," one flyer read. "You should remember that whoever makes lies about Allah should reserve his seat in hell." The extremists went nuts — screaming at shopkeepers and locals who posted the flyers, blaming other insurgents for defaming their good names. All the while, Americans watched the action through high-powered surveillance cameras. Consequently the marines knew who to question, and who to capture or kill. "We know where you are and what you are doing," another poster proclaimed. "Who will you trust now?" American forces here set up a tip line so the locals could report on any insurgents (and get a little reward for their efforts). The extremists responded by blowing up the local cell towers, which Colabuno then turned into another psyops poster criticizing their self-destructive behavior. "Now we've got them making really stupid decisions," he says, grinning. "They communicate by cell phone, too. They can't argue that they're just attacking the foreigners." General David Petraeus knows all about these mind games. The man in charge of the American military effort in Iraq helped turn soldiers' training from tank-on-tank battles to taking on insurgents. He oversaw the writing of the new counterinsurgency manual that John Nagl worked on. The book counsels officers to reinforce the local economy and politics and build knowledge of the native culture, "an operational code' that is valid for an entire group of people." And the manual blasts the old, network-centric American approach in Iraq. "If military forces remain in their compounds, they lose touch with the people, appear to be running scared, and cede the initiative to the insurgents," it says. So I get escorted across Baghdad's concrete-ringed International Zone, around the manicured lawns of the Republican Palace, up its marbled stairs, past ambassadors and generals, through a seemingly endless series of gates and checkpoints, and into Petraeus' office. But even this far inside the US war machine, I'm expecting a frontal assault on network-centric warfare. Instead, he sings me a love song. "It's definitely here to stay. It's just going to keep getting greater and greater and greater," Petraeus says. I settle on a couch, and he shuts off the air conditioner. "I was a skeptic of networkcentric warfare for years," he confesses. But thanks to years of wartime funding, he says, the military now has the ability "to transmit data, full-motion video, still photos, images, information. So you can more effectively determine who the enemy is, find them and kill or capture, and have a sense of what's going on in the area as you do it — where the friendlies are, and which platform you want to bring to bear." Page 20 Of course, he adds, he doesn't believe the Rumsfeld-era idea that you can get away with fewer, better-networked troops. Petraeus is the man behind the "surge," after all. Anyone who thinks you don't need massing of troops is living in an "academic world," he says. And Petraeus believes "the most important network is still the one that is between the ears of commanders and staff officers." Yet he's a believer, just like a whole lot of other Army generals. He supports the $230 billion plan to wire the Army, a gargantuan commitment to network-centric war. "We realized very quickly you could do incredible stuff with this," he says. "It was revolutionary. It was." I press my hands to my forehead. What about all the cultural understanding, I ask him. What about nation-building? What about your counterinsurgency manual? "Well," Petraeus says, "it doesn't say that the best weapons don't shoot. It says sometimes the best weapons don't shoot. Sometimes the best weapons do shoot." A war like Iraq is a mix, he adds: In one part of the country, the military is reinforcing the society, building things; in another, it's breaking them — waging "major combat operations" that aren't all that different from what might have gone down in 2003. And this technology, he says, it's pretty good at 2003-style war. When Cebrowski and Garstka wrote about adding information technology to the military's way of finding and wiping out enemies — the kill chain — to a certain extent, they were right. In 1991, Operation Desert Storm began with a long bombing campaign, then a ground assault. But in Afghanistan and the 2003 Iraq war, soldiers on the ground handed off coordinates to bombers and fighter planes, who attacked with laser- and satellite-guided munitions. The effect was devastating, shrinking the so-called sensor-to-shooter cycle to mere instants. During the first Gulf War, it typically took three days of paper pushing to assign a plane a target to hit. This time around, in parts of Anbar province, it took under 10 minutes. A relatively small number of Special Forces, sent to neuter Scud missile sites, took control of an area about the size of South Carolina — despite being outnumbered on the ground at least 10 to 1, and in some spots 500 to 1. The Iraqis never got off a single Scud. But for all that, Cebrowski and Garstka weren't really writing about network-centric warfare at all. They were writing about a single, network-enabled process: killing. In 1998, to a former fighter jock and missile defender, the two things must have seemed the same. A decade later, it's pretty clear they aren't — not with American troops nation-building in Afghanistan, peacekeeping in Kosovo, chasing pirates off Djibouti, delivering disaster relief to Indonesia, and fighting insurgents in Iraq. The fact is, today we rely on our troops to perform all sort of missions that are only loosely connected with traditional combat but are vital to maintaining world security. And it's all happening while the military is becoming less and less likely to exercise its traditional duties of fighting an oldfashioned war. When is that going to happen again? What potential enemy of the US is going to bother amassing, Saddam-style, army tanks and tens of thousands of troops when the insurgent approach obviously works so well? "The real problem with network-centric warfare is that it helps us only destroy. But in the 21st century, that's just a sliver of what we're trying to do," Nagl says. "It solves a problem I don't have — fighting some conventional enemy — and helps only a little with a problem I do have: how to build a society in the face of technology-enabled, superempowered individuals." Admiral Arthur Cebrowski died of cancer in 2005. The Office of Force Transformation he headed has been disbanded. John Garstka is still at the Defense Department, working in the Office of the Deputy Assistant Secretary for Forces Transformation and Resources. It reports to the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict and Interdependent Capabilities, which in turn reports to the Office of the Undersecretary of Defense (Policy). I ask Garstka if he'd like to meet up. "Sure," he answers. "The Ritz-Carlton does a nice lunch." In the Ritz's oak-paneled dining room a few minutes' walk from the Pentagon, Garstka sits with his arms folded across his white button-down shirt and his Defense Department badge. He's not exactly pleased with his new position — the length of his office's name is perhaps inversely proportional to its influence. "I have to be a good soldier," he sighs. But he takes comfort in Page 21 knowing that network-centric warfare is "past the point of no return." It's been "demonstrated beyond a reasonable doubt" — not just in traditional battles, like the invasion of Iraq, but also during so-called stability operations, like the four-plus years since "mission accomplished." (He says he'd like to go to Iraq one day to see it all for himself.) If network-centric warfare has flaws, he adds, don't blame the concept. The slow-moving Defense Department bureaucracy hasn't worked quickly enough to roll out wired gear for the troops. Insurgents seized on commercial technology quicker than anticipated. And anyway, Garstka says, people have hijacked the term network-centric warfare to mean all sorts of things, from investing in fiber optics to rejiggering an organizational chart, without really understanding what it means. But by the time Garstka finishes his 8-ounce Angus cheeseburger, he's willing to acknowledge some of the potential gaps in the strategy. "I'm not an expert in stability operations," he admits. Maybe network-centric combat isn't perfectly suited to the wars we're fighting now. And it certainly requires a different skill set than counterinsurgency or nation-building. "Stability operations is like soccer. Major combat operations is like football. So it's almost impossible [for one team] to win both the World Cup and the Super Bowl in the same year," he tells me. "Not when you're playing two different games." Finally, at the end of our meal, Garstka suggests that the model he helped create will have to change again. "You have to think differently about people," he says. "You have your social networks and technological networks. You need to have both." So the troops in Iraq and Afghanistan are updating the playbook. Technological networks like WalMart's are out. The social network warfare of Nagl, Prior, and Colabuno is in. The Army has set aside $41 million to build what it calls Human Terrain Teams: 150 social scientists, software geeks, and experts on local culture, split up and embedded with 26 different military units in Iraq and Afghanistan over the next year. The first six HTTs are already on the ground. The idea, basically, is to give each commander a set of cultural counselors, the way he has soldiers giving him combat advice. In western Afghanistan, for instance, a brigade of the 82nd Airborne Division was being targeted by rockets, over and over, from the vicinity of a nearby village. But no one from the unit had bothered to ask the townspeople why. When the Human Terrain Team finally paid a visit, villagers complained that the Taliban was around only because the Americans didn't provide security. And oh, by the way, they really wanted a volleyball net, too. So a net was acquired. Patrols were started. There hasn't been an attack in two months. At the HTT's suggestions, the brigade also invited the province's head mullah to bless a newly restored mosque on the base. He "was so delighted that he recorded an announcement in Pashto and Dari for radio broadcast denouncing the Taliban," an after-action report noted. In his initial evaluation, the brigade commander credits the HTT with an astonishing 60 to 70 percent drop in the number of bombs-and-bullets strikes he has had to make. It's a number that even some HTT members have a hard time believing. But the commander insists that 53 of 83 districts in his area now support the local government. Before the HTT arrived, it was only 19. "We got trapped into thinking that killing/destruction mechanisms of the highest technical quality could replace true human understanding. The vote is in, and we were wrong," says Steve Fondacaro, a cleft-chinned, chipped-toothed former Special Forces operator who now heads the HTT program. "We had been trying to take the test without doing the course work. That never works in school, and it hasn't worked any better in war." The program is still new, and many questions remain about how it'll actually operate. Will the social scientists — many of them civilian academics — carry guns? Wear uniforms? Will they be conducting fieldwork or just doing research at their desks? How will these people be trained? What kind of credentials do they need? Will commanders listen to what they have to say? And is it even ethical to use their skills in wartime? Page 22 One thing is clear: The Human Terrain Teams will eventually do more than just advise. Soon each team will get a server, a half-dozen laptops, a satellite dish, and software for social-network analysis — to diagram how all of the important players in an area are connected. Digital timelines will mark key cultural and political events. Mapmaking programs will plot out the economic, ethnic, and tribal landscape, just like the command post of the future maps the physical terrain. But those HTT diagrams can never be more than approximations, converting messy analog narratives to binary facts. Warfare will continue to center around networks. But some networks will be social, linking not computers and drones and Humvees but tribes, sects, political parties, even entire cultures. In the end, everything else is just data. Table of Contents Report: China Targeting All 'Enemy Space Vehicles' Including GPS Satellites From World Tribune, 27 Nov 07 China’s anti-satellite and space warfare program includes plans to destroy or incapacitate 'every enemy space vehicle' that passes over China. The annual report of the U.S.-China Economic and Security Review Commission, released last week, listed among Beijing's goals that of ensuring that Chinese space weapons are “conducted covertly so China can maintain a positive international image.” China has called for a ban on space weapons at the United Nations. The report said that China also is developing civilian technology that can be applied to military space programs and is acquiring the “ability to destroy or temporarily incapacitate every enemy space vehicle when it is located above China,” the report said. The Chinese also plan to attack U.S. global positioning system (GPS) satellites through various means, including anti-satellite weapons, high-energy weapons, high-energy weather monitoring rockets and ground attacks on earth-based stations. One section of the report, based on public and classified briefings, concluded there was a need for more information about Chinese activities and intentions. Research from nearly 100 Chinese sources identified 30 proposals and recommendations by Chinese military leaders “regarding the development of space and counter-space weapons and programs.” The military is also developing stealth satellites and a space program that will “provide key support for Chinese combat forces.” “Some of these proposals appear to have been implemented already, as evidenced by January’s kinetic anti-satellite test and earlier laser incidents involving American satellites,” the report said. Table of Contents A Force of Cyberwarriors Protects Pentagon Data From Seattle Times, 30 November 2007 The responsibility for protecting the Pentagon's global information grid, composed of 12,000 networks and 5 million individual systems, rests with the Joint Task Force-Global Network Operations, an arm of the Strategic Command, or STRATCOM. Task-force personnel work behind two banks of computers in a government building in Arlington, Va., keeping a 24/7 vigil. Spokesman Timothy Madden said threats cover "a large and diverse" range, and he acknowledged the perpetrators include "nation-states," which he declined to identify. Two years after the 2001 terrorist attacks, the Bush administration developed a "National Strategy to Secure Cyberspace," which put the then-new Department of Homeland Security in charge of cyberprotection. The strategy has included development of the "Einstein" early-warning system to Page 23 spot attacks on government computers, as well as public-private exercises known as "Cyber Storm." The blueprint for the military is a classified document that includes both defensive and offensive measures, according to officials and analysts. Likely offensive tactics include disabling an enemy's command-and-control networks, destroying data or dispatching false information to weapons networks, often as part of a larger attack with air power and other traditional weaponry. As an outgrowth of the strategy, Air Force leaders established a provisional cybercommand at Barksdale Air Force Base in Louisiana and plan to develop a permanent command at an as-yet undesignated site on Oct. 1, 2008. Maj. Gen. William Lord, who heads the provisional command and is leading the search for a site, said the headquarters will consist of about 500 personnel charged with training and coordinating cyber-activities within the Air Force. Lord said he's been contacted by congressional delegations from at least seven states, including California and Texas, who hope to land the command and its attendant economic benefits. As many as 40,000 Air Force personnel are assigned to cybertasks, and Air Force officials envision an emerging breed of warrior who fights with a computer and keyboard. But he's expected to be as formidable as the soldier with a gun. Dr. Lani Kass, special assistant to Gen. T. Michael Moseley, Air Force chief of staff, said at a recent seminar that Air Force cyberwarriors would be "trained killers" and "not a bunch of geeks." Table of Contents U.S. "Under Widespread Attack In Cyberspace" By Dave Montgomery, Seattle Times, 30 November 2007 WASHINGTON — While U.S. forces in Iraq and Afghanistan engage the enemy with guns, tanks, airplanes and missiles, the Pentagon is quietly fighting a much different kind of war on a new front — cyberspace. Military officials say that a cyber-attack by foreign enemies or terrorist groups could result in "an electronic Pearl Harbor" that would shut down electricity, banking systems, cellphones and other tools of day-to-day life. A report issued Thursday by security-software firm McAfee said government-affiliated hackers in China are at the forefront of a brewing "cyber Cold War" still in its infancy. Within two decades, according to McAfee, the scuffle could erupt into a worldwide conflict involving hundreds of countries attacking one another's online networks with sophisticated software. McAfee said about 120 countries are developing cyber-attack strategies and most are merely testing them to determine the risks involved in certain tactics — though devastating international attacks could come one day. Hundreds, and possibly thousands, of more limited cyber-assaults are already bombarding the firewalls of government computer systems daily, prompting U.S. officials and military leaders to declare the United States is already at war on the cyberfront. "America is under widespread attack in cyberspace," Gen. James Cartwright, then-commander of the U.S. Strategic Command, which oversees the military's computer grid, told Congress in March. "Our freedom to use cyberspace is threatened by the actions of criminals, terrorists and nations alike." As a result, the U.S. military is aggressively incorporating cybertechnology into its war-fighting arsenal in the same sort of evolutionary pattern that saw air power emerge from the early biplanes of the past century. All branches of the military have cyber-operations, and the Air Force is moving to set up a full-fledged cybercommand that will have the same stature as its other commands. U.S. officials acknowledge that the computer-dependent military and federal government are threatened by virtually every malevolent concept of the cyber-age, from worms and viruses that Page 24 aim to cripple or shut down networks to illegal intrusions that attempt to steal classified information. "We're vulnerable every day," said Greg Garcia, the assistant secretary for cybersecurity and communications at the Department of Homeland Security, which is charged with overseeing cyberprotection for the federal government and the private sector. "Everybody is seeing some form of intrusion or attack." The department received 37,000 reports of attempted breaches on government and private systems in fiscal 2007, which ended Sept. 30, compared with 24,000 the previous year. Assaults on federal agencies increased 152 percent during that period, from 5,143 to 12,986. A worst-case attack could shut down computer command-and-control systems that run banking, water and sewer systems, traffic lights, oil and gas networks and nearly every other element of the public infrastructure. The roster of adversaries in cyberspace includes foreign militaries and intelligence services, hackers who could be working in league with foreign governments, and "hacktivists" — hackers with political agendas. Terrorists, thus far, are considered only a limited threat, but they could become more dangerous as technically proficient younger members join the ranks, the Government Accountability Office said in September, citing the CIA. The United States, with its multilayered systems and advanced firewalls, has avoided the type of extensive attack that caused widespread disruptions throughout government agencies and institutions in Estonia this spring. But it's not for lack of trying. Numerous assaults, most of them harmless, pound U.S. military and government computers once every several seconds, experts say. "The Pentagon is probably one of the most attacked networks in the world," said Matt Richard, the director of the rapid-response team for VeriSign iDefense, a California-based firm that specializes in cybersecurity. A limited attack on an unclassified system in the Pentagon this summer was traced to China, according to news accounts, but the Chinese government vehemently denied any involvement. Some of the most adept hackers are based in Russia, Asia and Eastern Europe, Richard said. A freelance group known as NCPH is based in China and reputedly has at least loose ties to the government. A prolific group of hackers in St. Petersburg, Russia, which uses the name of a legitimate Russian business network, allegedly has ties to the Russian mob. China has steadfastly denied it is engaged in any cybercrime and said its networks, too, have been targeted. "China has also been attacked by hackers of some countries, so the Chinese government attaches great importance to and participates in the international law-enforcement cooperation in this area," Foreign Ministry spokesman Liu Jianchao said at a briefing Thursday. Liu declined to reveal which countries were targeting China. The McAfee report, which included the company's research and input from security experts with NATO, the FBI and other intelligence outfits, said hackers in China are believed responsible for four out of five major cyber-attacks on government targets in 2007. The biggest intrusions appear to have targeted a Pentagon computer network and government agencies in Germany, India, Australia and New Zealand. "The Chinese have publicly stated that they are pursuing activities in cyber espionage ... they speak of technology being a large part of war in the future," the McAfee report read. McAfee said there were more attacks reported on critical national infrastructure in 2007 than ever before. Targets included financial markets, utilities and air traffic control machinery, and the attacks were thought to have been launched by governments or government-allied groups. Table of Contents Page 25 Electrical Supe Charged With Damaging California Canal System By Dan Goodin, the Register (UK), 30 November 2007 A former employee for a federally-owned canal system in California was charged with installing software that damaged a computer used to divert water out of a local river. Michael Keehn, of Willows, California, faces a maximum penalty of 10 years in prison and a $250,000 fine. Federal court documents claim the former electrical supervisor with the Tehama Colusa Canal Authority "intentionally caused damage without authorization to a protected computer." The TCCA operates two canals that move water out of the Sacramento River for using in irrigation and agriculture in Northern California. As part of its duties, the TCCA uses a supervisory control and data acquisition (SCADA) system to regulate the system. Attempts to reach Keehn for comment were not successful. A report found here (http://www.localnews1.net/1state&localbriefs/9_7_07/vmfbi.html) quoted Keehn as saying "I'm sure I did something to cause it" but that he wasn't entirely sure. Keehn worked for the TCCA for more than 17 years before being fired on August 15, the date he is alleged to have installed the unauthorized software. The security of SCADA systems has emerged as a sensitive issue in the post 9-11 world. In 2000, a disgruntled former employee for a water system in Australia used a SCADA system to spill raw sewage into waterways, hotel grounds and canals in the area, according to this article (http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9050098&intsr c=hm_list) from ComputerWorld. Table of Contents In Iraq, Psyops Team Plays on Iran Fears, Soccer Love By Noah Shachtman, Wired, November 30, 2007 Psychological operations specialist spent a year-and-a-half Sgt. Joe Colabuno helping convince the Sunni residents of Fallujah to turn against local extremists by appealing to citizens' sense of civic pride, pumping up their love of the national soccer team, citing the Koran, and provoking jihadists to overreact. Colabuno also appealed to the Sunnis hatred and fear of Shi'ites, and of Shi'ite Iran. "For 7 or 8 months," Colabuno tells me, "all we hear about is 'Iran is doing all [of the attacks], Iran is behind everything.' There was frustration from them [Fallujah's locals] because we wouldn't 'admit it.' Like maybe the U.S. was conspiring with Iran." "We'd stress in our SITREPS [situation reports] that in order to get these people on our side, we've got to play into their fears abut Iran," he adds. Then, in January, "the White House suddenly got involved," talking tough about how Tehran was stoking instability in Iraq. "That overnight changed the attitudes of the people towards us. They took it as almost an apology," he adds. In local newspaper articles, in radio and loudspeaker broadcasts -- and in talks on the street -Colabuno started playing up "operations against Shi'a militia." He played up how the U.S. troop "surge" was silencing Shi'a leader Moktada "al-Sadr's yipping and yapping." The successes of the American counterinsurgency strategy in Iraq have, so far, been hyperlocal: local watchmen, patrolling their mini-neighborhoods; local tribal and political leaders, making deals with American commanders. And in that context, playing on fears on Shi'ite boogeymen in Sunni regions makes a ton of sense. The question, though, is what are the national consequences of this local strategy. How can the U.S. encourage country-wide reconciliation -- while riding a wave of sectarian hate? Local psychological operations are given a fair amount of flexibility to operate as they please. But their primary messages and handed down from much further up the chain of command. Major Brian Yarbrough, who, until recently headed up all pysops work in Anbar province, told me, "We Page 26 operate within psyops objectives determined in Washington. Baghdad draws up the supporting objectives. Then we work out specific themes and actions." This wasn't Colabuno's only message, of course. When the Iraqi national soccer team won the Asia Cup, psyops teams started printing up glossy magazines extolling the team -- and the local police, and the virtues of national unity. Colabuno's team has even printed up t-shirts showing policemen as cartoonishly muscular -- Ahnolds of Mesopotamia. Even bad news was turned to good. When I was in Fallujah, a prominent Sunni Imam was murdered in his Jolan district mosque by a suicide bomber. "Unfortunately, as tragic as an event that is, it's great for me," Marine reserve Colonel Wally Powers, an information operations officer, told me the next day. "When they [the jihadists] are just attacking us, people are like, 'yeah, whatever.' They don't care. Now they're attacking mosques, too. That pisses people off. Beautiful! We didn't have to do anything!" Later that day, I went with Colabuno to visit a local police chief, a Captain Mohammed. His Imam was the one that got killed. And Captain Mohammed was so angry, he asked Colabuno to print up flyers with his face -- unheard of in the area -- telling people he wasn't afraid. Table of Contents Nov. 19 Airpower Summary: EC-130J Supports OIF, OEF From Air Force Print News, 19 Nov 07 11/20/2007 - SOUTHWEST ASIA (AFPN) -- Coalition airpower integrated with coalition ground forces in Iraq and the International Security Assistance Force in Afghanistan during operations Nov. 19, according to Combined Air and Space Operations Center officials here. In Afghanistan, Air Force F-15E Strike Eagles engaged enemy combatants with guided bomb unit12s, GBU-31s, GBU-38s, and cannon rounds southwest of Garmsir. The on-scene joint terminal attack controller reported the mission as a success. During the same mission, a hellfire missile from an Air Force MQ-9A Reaper was used against the enemy combatants. The mission was reported as successful by the JTAC. An enemy compound in Kajaki Dam was hit by GBU-31s and cannon rounds fired from F-15Es. The aircrew supported coalition forces in hostile contact against enemy combatants. The JTAC confirmed the mission as successful. An Air Force B-1B Lancer dropped GBU-38s and GBU-31s against enemy combatants during an engagement in Deh' Rawod. Additionally, a show of force with flares was performed to deter enemy activities in the area. During the same engagement, a Royal Air Force Harrier GR-7 launched rockets against enemy positions in Deh' Rawod. A show of force with flares was performed by an F-15E to deter enemy activities in Deh' Rawod. Additionally, the aircrew dropped a GBU-38 against an enemy fighting position in Asadabad. The JTAC confirmed the missions as successful. An enemy compound in Musa Qal'eh was struck with a GBU-12 from a French Mirage 2000. The mission was reported as successful by the JTAC. A Mirage 2000 and a French Mirage F-1 CR conducted shows of force to deter enemy activities in Musa Qal'eh. The mission was assessed as a success by the JTAC. Air Force A-10 Thunderbolt IIs fired cannon rounds against enemy combatants in Asadabad. The JTAC reported good hits on the targets and declared the strike as successful. In total, 37 close-air-support missions were flown in support of the ISAF and Afghan security forces, reconstruction activities and route patrols. Seven Air Force surveillance and reconnaissance aircraft flew missions in support of operations in Afghanistan. Additionally, two RAF aircraft performed tactical reconnaissance. Page 27 In Iraq, a RAF Tornado GR-4 conducted a show of force to deter enemy activities in Baqubah. The mission was reported as a success by the JTAC. Air Force F-16 Fighting Falcons destroyed a vehicle borne improvised explosive device with GBU12s and a GBU-38 in Samarra. The JTAC reported the mission as successful. A show of force with flares was performed by an F-16 to deter enemy actions in Hawijah. The mission was reported as a success by the JTAC. In total, coalition aircraft flew 43 close-air-support missions for Operation Iraqi Freedom. These missions supported coalition ground forces, protected key infrastructure, provided over watch for reconstruction activities and helped to deter and disrupt terrorist activities. Twenty-four Air Force and Navy surveillance and reconnaissance aircraft flew missions in support of operations in Iraq. Additionally, three Air Force and RAF aircraft performed tactical reconnaissance. Air Force C-130 Hercules and C-17 Globemaster IIIs provided intratheater heavy airlift support, helping to sustain operations throughout Afghanistan, Iraq and the Horn of Africa. Approximately 156 airlift sorties were flown; 379 tons of cargos were delivered, and 3,011 passengers were transported. This included approximately 78,615 pounds of troop re-supply airdropped in Afghanistan. Coalition C-130 crews from Australia, Canada, Iraq, and Japan flew in support of operations in Afghanistan or Iraq. On Nov. 18, Air Force, French, and RAF aerial refueling crews flew 36 sorties and off-loaded approximately 2.3 million pounds of fuel to 183 receiving aircraft. Table of Contents 120 countries building cyber-war capacity From UPI via Middle East Times, November 30, 2007 WASHINGTON, Nov. 30 (UPI) -- More than 100 countries are developing cyber-war techniques, using the Internet for political, military or economic espionage, says a new report. The annual Virtual Criminology Report by Internet security firm McAfee says that with an estimated 120 countries working on their cyber-attack capabilities, the world is likely headed for a "Cyber cold war." "In 10-20 years, experts believe we could see countries jostling for cyber-supremacy," it reads. The report, released Thursday, cites one researcher who said he had come across hackers in Eastern Europe producing custom-built viruses, Trojan horses and other malware designed specifically to attack individual corporations and government agencies. "Cybercrime is now a global issue," said Jeff Green, senior vice president of McAfee Avert Labs. "It has evolved significantly and is no longer just a threat to industry and individuals, but increasingly to national security. We're seeing emerging threats from increasingly sophisticated groups attacking organizations around the world." The report is based on consultations with "more than a dozen security experts at the world's premier institutions" including NATO, the FBI and the London School of Economics. Table of Contents Page 28