Pages

12 June 2017

*** Should The U.S. Government Negotiate For Hostages?


If you're an American, you don't want to be taken hostage. Since 2001, 90 Westerners have been kidnapped and killed overseas, and according to a January study from New America, 41 of them were Americans. That American deaths are disproportional to the number of total hostages raises the question: Why not negotiate?

In the study titled "To Pay Ransom or Not to Pay Ransom? An Examination of Western Hostage Policies," authors Christopher Mellon, Peter Bergen and David Sterman examined the cases of 1,185 Westerners kidnapped overseas by terrorist, militant and pirate groups since Sept. 11, 2001. The study reached two conclusions: "First, countries that do not make concessions experience far worse outcomes for their kidnapped citizens than countries that do. Second, there is no evidence that American and British citizens are more protected than other Westerners by the refusal of their governments to make concessions."

The study then made the following policy recommendations: 

The United States should clarify its stance on granting immunity from prosecution to third parties that assist the families and friends of hostages held by terrorists. 

The United States should facilitate prisoner exchanges for its citizens kidnapped abroad. 

The United States should encourage more data-driven study of hostage taking. 

The United States should evaluate the degree to which the rise of digital media has changed the cost-benefit analysis underlying its hostage policy. 

*** Deploying Cyber to the Front Lines of Battle

BILL LEIGHER

The separation of the U.S. Cyber Command and the National Security Agency (NSA) would have two major and immediate effects. It would allow the Cyber Command to develop tools built specifically for the battlefield, and it would increase the Defense Department’s ownership of cyber technologies – maybe even changing the rules that govern when our armed forces can use them.

Since its inception nearly 10 years ago, the Cyber Command has thrived under the NSA. Being inside that agency gave the fledgling command access to powerful tools. The trouble is, though, those tools were built for intelligence, not combat. Under the exclusive control of combatant commanders, Cyber Command would foster development in regulations specific to the Department of Defense more closely matching combatant commanders’ needs; defensive and offensive cyber weapons; and introduction of tactical skills and procedures that operational commanders can execute.

Pairing the Cyber Command with NSA made sense in 2009. It was the fastest way to stand up the new command and take advantage of NSA’s wealth of talent, intellectual property, and capital. Development focused on areas such as stealth, attribution of cyber activity – often called the holy grail of cyber – and data collection.

***The Sunni-Shia Divide


Sectarian conflict is becoming entrenched in a growing number of Muslim countries and is threatening to fracture Iraq and Syria. Tensions between Sunnis and Shias, exploited by regional rivals Saudi Arabia and Iran, could reshape the future Middle East. 

An ancient religious divide is helping fuel a resurgence of conflicts in the Middle East and Muslim countries. Struggles between Sunni and Shia forces have fed a Syrian civil war that threatens to transform the map of the Middle East, spurred violence that is fracturing Iraq, and widened fissures in a number of tense Gulf countries. Growing sectarian clashes have also sparked a revival of transnational jihadi networks that poses a threat beyond the region.

Islam’s schism, simmering for fourteen centuries, doesn’t explain all the political, economic, and geostrategic factors involved in these conflicts, but it has become one prism through which to understand the underlying tensions. Two countries that compete for the leadership of Islam, Sunni Saudi Arabia and Shia Iran, have used the sectarian divide to further their ambitions. How their rivalry is settled will likely shape the political balance between Sunnis and Shias and the future of the region, especially in Syria, Iraq, Lebanon, Bahrain, and Yemen.

Alongside the proxy battle is the renewed fervor of armed militants, motivated by the goals of cleansing the faith or preparing the way for the return of the messiah. Today there are tens of thousands of organized sectarian militants throughout the region capable of triggering a broader conflict. And despite the efforts of many Sunni and Shia clerics to reduce tensions through dialogue and counterviolence measures, many experts express concern that Islam’s divide will lead to escalating violence and a growing threat to international peace and security.

** Industrial-Scale Looting of Afghanistan´s Mineral Resources

By William A Byrd and Javed Noorani for United States Institute of Peace (USIP)

Summary

Afghanistan is well endowed with underground resources, but hundreds of millions of dollars’ worth of minerals are being extracted yearly, unaccompanied by payment of applicable royalties and taxes to the state.

The bulk of this industrial-scale mineral looting—which has burgeoned over the past decade—has occurred not through surreptitious smuggling but openly, in significant mining operations, with visible transport of minerals on large trucks along major highways and across the Afghan border at a few government-controlled points.

The prior political penetration of power holders and their networks in government, who became increasingly entrenched over time, explains this pattern of looting, which is engaged in with impunity owing to massive corruption of government agencies charged with overseeing the extractives sector, main highways, and borders.

The current political and security climate favors continued and even further increased looting, which strengthens and further entrenches warlords, corrupts the government, partly funds the Taliban and reportedly ISIS, and fuels both local conflicts and the wider insurgency.

Although the situation is dire and no answers are easy, near-term recommendations that could begin to make a dent in the problem include halting the issuance of new mining contracts, enforcing existing contracts to ensure taxes and royalties are paid, monitoring the transport of minerals on main roads and across borders, and imposing an emergency levy on mineral exports.

** How to Fight ISIS Online

By Audrey Alexander

From Twitter to Telegram, Islamic State (ISIS) sympathizers continue to set up camp on social media platforms around the world. While some of the outlets are far-reaching and transparent, others are insular and protected. The range of platforms, the diffusion of sympathizers, and the sheer volume of content make it difficult for governments and private companies to contain the online ISIS threat. To begin doing so, it is necessary to understand the external factors that have shaped ISIS’s communications strategy.

On a strategic level, ISIS is winning the war on social media with effective branding, information distribution, and agenda-setting. For example, in the wake of violent attacks, it has become commonplace for counterterrorism analysts to search for press releases claiming affiliation by Amaq News Agency. In an analysis of the ISIS manual, Media Operative, You Are a Mujahid, Too, the terrorism researcher Charlie Winter argues that the organization’s marketing approach allow ISIS to “forcibly inject itself into the global collective consciousness.” But the group is fundamentally dependent on platforms it cannot control, which leaves it vulnerable to changing regulations and security measures. For example, in August 2015, U.S. authorities arrested Jaelyn Young and Muhammad Dakhlalla, after the couple disclosed their plans to travel to ISIS-controlled territory to undercover agents on multiple social media platforms, including Twitter. In Syria, a targeted strike reportedly killed Junaid Hussein after the British recruiter and hacker left an Internet cafe in Raqqa, ISIS’ de facto capital. 

ISIS is winning the war on social media with effective branding, information distribution, and agenda-setting.

Let the Strategic Partnership policy weaponise make in India

By Richard Heald

With the announcement of the Strategic Partnership policy, the Indian ministry of defence (MoD) has rolled out a significant initiative aimed at revitalising the ‘Defence Industrial Ecosystem’. This announcement could be ground-breaking. Cementing partnerships with Indian companies is already recognised as an important opportunity for big foreign defence manufacturing companies, providing an impetus to ‘Make in India’.

The British defence sector, with its unique expertise and already established long-term commitment, is looking at these developments with attention. The devil will be in the details.

But to date, the plans are radical and make the elusive target of 70 per cent indigenous manufacturing, which MoD is committed to, realisable.

It’s been over a decade since India’s private sector was directly involved in defence manufacturing. Citing security concerns, India’s defence procurement has largely been driven by various defence public sector undertakings (DPSUs) and the Ordnance Factory Board. While defence manufacturing was ‘liberalised’ in 2001and opened up to not just Indian private players but also to foreign entities (49 per cent FDI), a defence production base outside of the DPSUs and the OFB has not yet been prevalent.

Will India Dare To Dream Like China?

Sanjay Anandaram

Like in the case of China, we need an Indian Dream.

However, creating and pursuing a national dream will require big, bold decisions. Will we take them?

The pulling out of the Paris Climate Accord by the United States (US) has understandably led to international outrage. But what has received less attention is the enormous lament in Western media about the US abdicating “global leadership” to China. This lament isn’t without basis.

China has surely and steadfastly worked to realise President Xi Jinping’s Chinese Dream - "the great rejuvenation of the Chinese nation”, calling upon young people to dare to dream with the goal of making China a fully developed nation by 2049 the hundredth anniversary of the founding of the People's Republic. Along the way, they want to double the 2010 gross domestic product (GDP) per capita of $10,000 by 2020, and complete urbanisation of about 70 per cent of its population, or about one billion people, by 2030. "Modernization" means China regaining “its position as a world leader in science and technology as well as in economics and business; the resurgence of Chinese civilization, culture and military might; and China participating actively in all areas of human endeavour.”

The Indian IT industry’s future potential

Vinod K. Jain

News about the coming death of India’s information technology (IT) services industry started to trickle in about five years ago. KPMG broke the news of “the death of outsourcing” in a white paper in July 2012. In January 2013, The Economist reported that India was no longer the automatic choice for IT services and back-office work and cited a report by the consulting firm Hackett that the migration of service jobs to India (and other offshore locations) would stop entirely by 2022.

Despite such prognostications, there is also optimism about the prospects of India’s IT services industry for the coming decade. First, the industry has gone through, and survived, trying times before, such as the dot-com crash of the early 2000s and the 2008 financial crisis. Second, the major IT services firms devote significant resources to employee training and development, offering world-class facilities and educational programmes for new and existing employees. Third, some of them are also beginning to adopt new business models and develop new products and platforms to wean themselves off low value-added services and time-and-materials and fixed-price pricing models.

Finally, the $1.2 trillion global IT industry, growing at a rate of 4% a year, will continue to offer opportunities for IT services firms operating at all stages of the IT global value chain. CIOs (chief information officers), the primary customers for IT services, tend to be risk-averse and like to do business with firms with which they have had good prior experiences. All of these factors should continue to offer opportunities for India’s IT services firms for the foreseeable future.

A WRONG TURN IN INDONESIA? ASIA IS WATCHING


In May, the governor of Indonesia’s capital Jakarta, Basuki Tjahaja Purnama – known more commonly as Ahok – was sentenced to two years’ jail for blaspheming against the Qur’an. Indonesian governors don’t often feature in global news, but Ahok’s case is exceptional, seen as a barometer for the state of Indonesia’s tolerance for religious and ethnic diversity. The world’s largest Muslim state has often prided itself on its pluralism, enshrined in the national motto Bhinneka Tunggal Ika (“unity in diversity”). But now, that unity is being challenged. Ahok’s fate has raised concerns beyond Indonesia’s shores about the use of religious tactics in future elections and the cohesiveness of Indonesia’s pluralism more broadly.

In late 2016, Islamic hardliners capitalized on Ahok’s double minority status as a Christian and ethnic Chinese to paint him as “anti-Muslim.” In October, Ahok had said his opponents were misusing the Qur’an to trick people into voting against a non-Muslim. His statements, edited to appear more provocative, went viral on social media. Hardliners fanned condemnation of his statements and mobilized mass protests in the capital (up to 200,000 at their peak in December) to call for his arrest. Not all of Ahok’s policies were popular but these tactics were seen as successful in transforming his double-digit lead into defeat during April’s gubernatorial elections. His prison sentence is also considered a political move, given prosecutors had asked only for probation.

TOURISM: A ‘SOFT' WEAPON FOR CHINESE HEGEMONY

Claude Arpi

While the world talks of Xi's ‘dream', waves after waves of Chinese visitors can suddenly be seen pouring along the Belt and Road. Is Delhi aware of the time bomb at its gates?

A Tibet Work Forum is a conference attended by several hundreds of officials, including the entire politburo, the People’s Liberation Army (PLA), representatives from different Ministries, as well as local satraps; held every five to 10 years, it usually decides the fate of the Roof of the World. The last forum was held in Beijing in 2015, but it is during the previous one in January 2010 that the destiny of Tibet changed, probably forever.

It was then decided to transform Tibet into a paradise for tourists, a Disneyland of Snows, by bringing millions of visitors to the plateau, killing several birds with just one stone.

It would give the People’s Republic of China a good image after the beating it received in the world media following the 2008 unrest on the Roof of the World; Tibetans would be financially better off; they would be ‘occupied’ to entertaining tourists; their heritage would be ‘protected’ and massive infrastructure would be built, keeping an eye on the need of the PLA to ‘defend the borders’ (with India).

DoD's assessment of China's information capabilities

By: Mark Pomerleau

The Department of Defense made public this week its annual report to Congress on China’s military developments, shedding some light on information-based capabilities including cyber, electromagnetic spectrum operations and space operations. 

The report offers greater details about China’s Strategic Support Force, created in 2015. The military organization garnered less than 30 words in the DoD’s report last year, as it was in its infancy at the time of production. 

This organization appears to link the Chinese People’s Liberation Army’s space, cyber and EW missions. The report makes note that the SSF may represent the PLA’s first step in developing a cyber force that combines cyber reconnaissance, attack and defense capabilities under one hat. Importantly, it appears the PLA has taken note of U.S. Cyber Command’s structure that consolidated cyber functions under a single entity. 

The PLA also seems to make a clear distinction between peacetime cyber operations and wartime cyber operations, the report notes. Peacetime operation include the defense of the electromagnetic space and cyberspace given China’s increasing reliance on the information economy, while wartime capabilities could help the PLA understand enemy trends, plan combat operations and ensure battlefield victories. 

Pentagon report singles out Pakistan as home of future Chinese military base


A Pentagon report released on Tuesday singled out Pakistan as a possible location for a future Chinese military base, as it forecast that Beijing would likely build more bases overseas after establishing a facility in the African nation of Djibouti.

The prediction came in a 97-page annual report to Congress that saw advances throughout the Chinese military in 2016, funded by robust defence spending that the Pentagon estimated exceeded $180 billion. That is higher than China's official defence budget figure of $140.4 billion.

Chinese leaders, the US report said, appeared committed to defence spending hikes for the “foreseeable future,” even as economic growth slows.

The report repeatedly cited China's construction of its first overseas naval base in Djibouti, which is already home to a key US military base and is strategically located at the southern entrance to the Red Sea on the route to the Suez Canal.

“China most likely will seek to establish additional military bases in countries with which it has a longstanding friendly relationship and similar strategic interests, such as Pakistan,” the report said.

U.S. Warns of China's Cyber Strategies

By MarEx 

The U.S. Department of Defense has released its annual report, Military and Security Developments Involving the People's Republic of China, highlighting China's attempts to gain military advantage. 

China is undergoing a military modernization program that is targeting capabilities with the potential to degrade core U.S. military-technological advantages, states the report. “To support this modernization, China uses a variety of methods to acquire foreign military and dual-use technologies, including cyber theft, targeted foreign direct investment and exploitation of the access of private Chinese nationals to such technologies. 

“Several cases emerged in 2016 of China using its intelligence services, and employing other illicit approaches that violate U.S. laws and export controls, to obtain national security and export-restricted technologies, controlled equipment and other materials.” 

Last year, China identified cyberspace as a critical domain for national security and declared its intent to expedite the development of its cyber forces. The report states that its military may seek to use its cyber warfare capabilities to collect data for intelligence and cyber attack purposes and to constrain an adversary’s actions by targeting network-based logistics, communications and

Lest We Forget: The Latest News About the War in Yemen


The Shia rebels are stalling efforts to negotiate a peace deal. This is seen as an example of Iranian influence because it’s the sort of tactic Iran has often used for a long time. In this case Iranian advisers have convinced Yemeni Shia rebel leaders is that their best chance of coming out of all this intact is to hang on for a bit longer. Waiting for exactly what is a mystery, at least to the public.

Some secrets have been revealed. For example Iran has quietly put several hundred Iranian and Lebanese (Hezbollah) advisers and technical experts into Shia controlled northwestern Yemen since early 2015. In that time about fifty of these Iranian personnel have been killed or captured. But the rest have been very effective. But this has not stopped the government forces from advancing although it has slowed them down.

In the north government forces are now within 20 kilometers of the rebel held national capital Saana. Living conditions in Saana continue to decline and in April there was an outbreak of cholera (that is spread by infected water and food). This is because the rebels have not put a priority on maintaining the quality of the water supply and now there have been nearly 10,000 cases of cholera with over a hundred deaths so far. Iran blames the people fighting the rebels, especially Saudi Arabia.

The Gulf Widens The Roots of the Regional Spat With Qatar

By Dina Esfandiary and Ariane M. Tabatabai

Last month, U.S. President Donald Trump embarked on his first foreign trip, which began in Riyadh. There, the administration and Saudi officials sent a clear message: Iran is a destabilizing force in the region, which “nations of conscience” must counter. Parts of the trip were heavily criticized in the region and beyond, with some observers even insinuating that the trip sparked a split among the Gulf Arabs. Trump can’t be blamed for that split—the Gulf Arabs are no monolith, and disagreements have been rife—but he did embolden hard-line factions in the Gulf.

As the Yemeni conflict dragged on, disagreements within the GCC intensified.

How to deal with Iran has always been the subject of debate within the Gulf Cooperation Council (GCC). Although all of the countries in the group aim to stand up to their powerful neighbor, each differs on how. The nuclear negotiations between the P5+1 and Iran brought these divisions to the forefront. Under Saudi Arabia’s leadership, Bahrain and most of the UAE were skeptical of the deal, highlighting their concerns about Iran’s regional meddling. Others, including Oman and the Emirate of Dubai hoped to capitalize on the deal and forge new trade partnerships. Kuwait and Qatar found themselves in the middle. They were eager to contain Iran, but also to lessen tensions. After all, they share interests with Iran, including gas fields and trade.

The Russian Army to Be Subordinated to the National Guard in a Crisis


By: Aleksandr Golts

President Vladimir Putin signed a decree late last month (May 24) that lays out drastic changes in the military organization of the Russian state. The bureaucratic document approves “The Statute on the Operational-Territorial Grouping of National Guard Troops of the Russian Federation.” However, it is likely that the decree was signed specifically to enshrine in law one crucial paragraph: “By decision of the President of the Russian Federation, tactical formations and military units of the Armed forces of the Russian Federation, other military formations and organs can be transferred to the operational control of the commander of the district to perform the tasks assigned to the troops of the National Guard” (Pravo.gov.ru, May 25). The Russian National Guard (Rosgvardia) was established in April 2016, largely based on the then-existing Interior Troops, to combat “terrorism and extremism” within the country (see EDM, April 7, 2016).

The possibility that the Interior Troops could, in certain situations, be subordinated to the Ministry of Defense existed both in Soviet and post-Soviet times. After all, the “external enemy” could have superiority over the regular Soviet/Russian Armed Forces; to fight against it, the Kremlin needed the ability to focus all of the country’s military or paramilitary units. All major military exercises in recent years had involved units of the Interior Troops subordinated to the Army’s command, and that tradition continued after the Russian National Guard was established. In 2016, joint exercises of the Rosgvardia and the Airborne Troops were conducted in Volgograd region. Four thousand Armed Forces troops, two National Guard brigades, the Special Forces Center and the 56th Separate Airborne Assault Brigade participated. The deputy commander of the airborne forces, Lieutenant General Andrei Kholzakov, oversaw the drills. He explained that the maneuvers took place for the first time “after the reform,” adding, “…we are working on issues of interoperability to understand how we have to operate” (Nezavisimaya Gazeta, August 1, 2016). The reasons why an army general was appointed to command the exercise is clear: his colleagues from the Rosgvardia lacked the experience of planning large-scale operations.

Alleged Russian hack reveals a deeply flawed US election system

by Frank Bajak and Raphael Satter

This Oct. 14, 2016 file photo shows Democratic presidential candidate Hillary Clinton's and Republican presidential candidate Donald Trump's names printed on a ballot on a voting machine to be used in the upcoming election, in Philadelphia. A newly leaked NSA document outlining alleged attempts by Russian military intelligence to hack into U.S. election systems is the latest piece of evidence suggesting a broad, sophisticated foreign attack on the integrity of U.S. elections. (AP Photo/Matt Rourke)

Election officials have long contended that the highly decentralized, often ramshackle U.S. voting system is its own best defense against vote-rigging and sabotage . New evidence from a leaked intelligence report indicates that hasn’t deterred foreign adversaries from exploring ways to attack it anyway.

The document, attributed to the U.S. National Security Agency, describes alleged attempts by Russian military intelligence to hack into local election systems — the latest evidence of a broad and sophisticated foreign attack on the integrity of U.S. elections. It does not indicate whether actual vote-tampering occurred.

The NSA report adds significant new detail to previous U.S. intelligence assessments that alleged Russia-backed hackers had compromised elements of America’s electoral machinery. It also suggests that attackers may also have been laying groundwork for future subversive activity.

British Intelligence Fails Again

By Jytte Klausen

Following the third terror attack in the United Kingdom in two-and-a-half months, on Sunday British Prime Minister Theresa May went before the cameras to declare that “enough is enough” and outline a new round of anti-terrorism legislation. She pinned the blame for Britain’s vulnerability to terrorism on excessive toleration of extremist ideology—citing the “safe spaces” that exist online, and in British society generally, protecting the open expression of Islamist extremism. Addressing the problem, she said, will require “difficult, and often embarrassing, conversations.” 

The string of recent violence began on March 22 with an attack in Westminster, near the British Parliament. A 52-year-old convert to Islam, Khaled Masood, used a white van to strike pedestrians on a bridge. He then ran on foot into Parliament’s New Palace Yard, where he killed a guard before he was shot. On May 22 came the suicide bombing at a concert in Manchester, which was attended mainly by young girls and women. Salman Abedi, the bomber, was a local man who had traveled to Libya with his family some months earlier. He had returned to Manchester just four days prior to the attack.

BOMBSHELL: SOON, AND FOR THE REST OF YOUR LIFE

LOREN DEJONGE SCHULMAN, RADHA IYENGAR AND ERIN SIMPSON

This week we go it alone to focus on your questions! We force Radha and Loren to actually define their true loves of process and staffing, all while drinking delicious white sangria. Plus, what’s a wonk? Then we dig into the president’s whirlwind trip, upcoming U.K. elections and Erin and Radha’s obsession with measurement error, how to make decisions on major international agreements after a Frenchman shakes your hand too hard, and whether the world is really as zero-sum as reality TV.

First Wave at Omaha Beach


When he was promoted to officer rank at eighteen, S. L. A. MARSHALL was the youngest shavetail in the United States Army during World War I. He rejoined the Army in 1942, became a combat historian with the rank of colonel; and the notes he made at the time of the Normandy landing are the source of this heroic reminder. Readers will remember his frank and ennobling book about Korea, THE RIVER AND THE GAUNTLET, which was the result of still a third tour of duty.

UNLIKE what happens to other great battles, the passing of the years and the retelling of the story have softened the horror of Omaha Beach on D Day. This fluke of history is doubly ironic since no other decisive battle has ever been so thoroughly reported for the official record. While the troops were still fighting in Normandy, what had happened to each unit in the landing had become known through the eyewitness testimony of all survivors. It was this research by the field historians which first determined where each company had hit the beach and by what route it had moved inland. Owing to the fact that every unit save one had been mislanded, it took this work to show the troops where they had fought.

How they fought and what they suffered were also determined in detail during the field research. As published today, the map data showing where the troops came ashore check exactly with the work done in the field; but the accompanying narrative describing their ordeal is a sanitized version of the original field notes.

Stalkers in Space: Defeating the Threat

Brian G Chow 

Since 2008, China has been developing a new antisatellite weapon that, once in orbit, can ‘tailgate’ and attack other systems. Unfortunately, and for different reasons, the author of this text doesn’t believe the US will be able to counter this threat. Worse yet, since “space stalkers” can’t be reliably distinguished from ordinary satellites, they can’t be banned. So what’s the solution? The author believes the US should declare and promote a new norm – i.e., any country that configures or readies space stalkers for attack is demonstrating hostile intent and should thus be preempted.

Nations ramping up cyber counter-strike capabilities

by Gerard O'Dwyer

The often unclear nature of the capabilities currently available to hostile non-state actors in cyberspace is driving NATO, the U.S. and major global military powers to develop offensive counter-strike capabilities.

According to cyber experts, the omnipresent fear among national states is that sophisticated, low production cost cyber weapons could be used to attack critical state infrastructure. This fear is heightened by the danger that the same capability could be made available by terrorist organizations, such as ISIS, to criminal organizations.

The general consensus among experts at the Cyber Conflict (CyCon) conference in Tallinn is that not much is known about the offensive capabilities of terrorist groups or what types of new cyber weapons may be under development.

NATO and Western powers need to gain a better understanding of how the prospect for lower production costs may relate to the potential development and deployment of offensive weapons capabilities in cyberspace, said Max Smeets, a research affiliate of the cyber studies program at University of Oxford.

“It is important that we have a better grasp of costs relating to cyber weapons. This will be essential to understanding what actors – be they state, non-state, or criminal – are likely to attain what types of cyber capability in the future,” said Smeets.

New cyber weapons needed in move from ‘Cold War to the Code War’

by Gerard O'Dwyer

The increasing potential for conflict in the cyberspace domain will require governments and militaries to focus more deeply on the specific advantages of using defensive or offensive cyber weapons technologies. Militaries can be expected to develop counter-response “weapons” that have surgical precision strike capabilities.

Digitalization, pushed by the rapid advance of digital-based communications, has taken the world from the “Cold War to the Code War” in this battle-space era, said William H. Saito, an IT and cyber threats special adviser to the Cabinet Office of the Government of Japan.

“Ten years ago the biggest companies in the world were in oil, now the biggest companies are in technology fields. This new Code War is very different to past threats, in the sense that non-state hostile actors may not have any value in terms of being a real or definable enemy,” said Saito.

The core question for governments, militaries and national security agencies, said Saito, is to determine whether it is better to have a good defense or a better offense. “I am not sure that it is a better offense,” Saito told a gathering of cyber experts at the Cyber Conflict (CyCon) 2017 conference in Tallinn.

HHS Cyber Task Force report offers much-needed recommendations

by James Scott

On June 2, 2017, the Health Care Industry Cybersecurity Task Force under the Department of Health and Human Services released its Report on Improving Cybersecurity in the Health Care Industry, beseeching six Congressional chairmen to consider six imperatives along with cascading recommendations and action items that demonstrate the need for a unified public-private collaboration to increase patient safety and to diminish the constant cybersecurity threat to the healthcare sector from cyber criminals, digital mercenaries, techno-jihadists, nation-state sponsored advanced persistent threats (APTs), and others who target vulnerable critical systems and sensitive treasure troves of patient information with ransomware and other malware.

The report was incited by the Cybersecurity Act of 2015, but its necessity was reinforced by the recent WannaCry global ransomware attack that crippled over 300,000 systems in 150 countries, including those of at least 16 NHS organizations in Britain. The findings of the task force address the hyper-evolving threat landscape surrounding healthcare systems, electronic patient records, and medical device security by increasing information sharing and awareness, by increasing public-private partnerships, and by establishing a cybersecurity leadership position within HHS.

Army electronic warfare technology attacks and disables tank

BY KATHERINE OWENS

Army trainers successfully used cyber weapons and electronic warfare (EW) technology to thwart a simulated tank assault at a training exercise conducted at the Army National Training Center at Fort Irwin, Calif. The exercise reinforced the need for the EW and cyber protection technology that is under development by entities such as the Army Rapid Capabilities Office (RCO) and U.S. Cyber Command.

“These tanks had to stop, dismount, get out of their protection, reduce their mobility,” said Capt. George Puryear, an Irregular Operations Officer at Fort Irwin. As a result, they were easily defeated.

The cyber weapon used in the exercise specifically targeted the radio and wireless communication systems of the tankers. Cyber warfare can include both jamming of communication signals and hacker infiltration into networks, which they can then either disable or manipulate to relay false information to commanders from within their own networks. This capability was also demonstrated in the exercise at Fort Irwin, according to an Army official.

Another aspect of cyber warfare explored as part of the exercise was infiltration of civilian networks in order to subdue a population and invade territory.