27 February 2013

SIPR on Your Cell Phone

DOD releases their "Commercial Mobile Device Implementation Plan"

The Department of Defense announced today the release of a Commercial Mobile Device Implementation Plan that supports the department’s June 2012 Mobility Strategy with specific goals and objectives in order to capitalize on the full potential of mobile devices. The implementation plan focuses on improving three areas critical to mobility: mobile devices, wireless infrastructure, and mobile applications, and works to ensure these areas remain reliable, secure and flexible enough to keep up with fast-changing technology.

“The Department of Defense is taking a leadership role in leveraging mobile device technology by ensuring its workforce is empowered with mobile devices,” said Teri Takai, Defense Department chief information officer. “As today’s DoD personnel increasingly rely on mobile technology as a key capability enabler for joint force combat operations, the application of mobile technology into global operations, integration of secure and non-secure communications, and development of portable, cloud-enabled capability will dramatically increase the number of people able to collaborate and share information rapidly.”

The implementation plan establishes a framework to equip the department’s 600,000 mobile-device users with secure classified and protected unclassified mobile solutions that leverage commercial off-the-shelf products, promote the development and use of mobile applications to improve functionality, decrease costs, and enable increased personal productivity. The plan orchestrates a series of operational pilots from across the DoD components that will incorporate lessons learned, ensure interoperability, refine technical requirements, influence commercial standards, and create operational efficiencies for DoD mobile users.

“The DoD Mobile Device Strategy and Implementation Plan aim to align the various mobile devices, pilots and initiatives across the department under common objectives to ensure the warfighter benefits from these activities and aligns with efforts in the Joint Information Environment,” said Ms. Takai. “This is not simply about embracing the newest technology -- it is about keeping the department’s workforce relevant in an era when information accessibility and cybersecurity play a critical role in mission success.”



Anyone want to try to translate that to English?



By: Brant

23 February 2013

Norks "Threaten" US if Exercises Continue

Maybe they'll make us eat some of their "food"?

North Korea on Sunday warned the top U.S. military commander stationed in South Korea that his forces would "meet a miserable destruction" if they go ahead with scheduled military drills with South Korean troops, North Korean state media said.
Pak Rim-su, chief delegate of the North Korean military mission to the inter-Korean truce village of Panmunjom, gave the message by phone to Gen. James Thurman, the commander of the U.S. Forces Korea, KCNA news agency said.
It came amid escalating tension on the divided Korean peninsula after the North's third nuclear test earlier this month, in defiance of U.N. resolutions, drew harsh international condemnation.
A direct message from the North's Panmunjom mission to the U.S. commander is rare.

By: Brant

22 February 2013

Meanwhile, at Booz-Allen-Hamilton



Anyone that's been near these blokes in the field - especially dealing with civil affairs work - knows exactly how this fits.

By: Widow 6-7

The Guys That Exposed China's Military Hacking

By now, you've all heard about the Chinese Army's hacking unit that's been attacking the US.
“Either they are coming from inside Unit 61398,” said Kevin Mandia, the founder and chief executive of Mandiant, in an interview last week, “or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.” Other security firms that have tracked “Comment Crew” say they also believe the group is state-sponsored, and a recent classified National Intelligence Estimate, issued as a consensus document for all 16 of the United States intelligence agencies, makes a strong case that many of these hacking groups are either run by army officers or are contractors working for commands like Unit 61398, according to officials with knowledge of its classified content.


But now more info is coming out about the guys that are responsible for exposing them.

When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn't have to consult with American diplomats in Beijing or declassify tactics to safely reveal government secrets.
He pulled together a 76-page report based on seven years of his company's work and produced the most detailed public account yet of how, he says, the Chinese government has been rummaging through the networks of major U.S. companies.
It wasn't news to Mandia's commercial competitors, or the federal government, that systematic attacks could be traced back to a nondescript office building outside Shanghai that he believes was run by the Chinese army. What was remarkable was that the extraordinary details — code names of hackers, one's affection for Harry Potter and how they stole sensitive trade secrets and passwords — came from a private security company without the official backing of the U.S. military or intelligence agencies that are responsible for protecting the nation from a cyberattack.
The report, embraced by stakeholders in both government and industry, represented a notable alignment of interests in Washington: The Obama administration has pressed for new evidence of Chinese hacking that it can leverage in diplomatic talks — without revealing secrets about its own hacking investigations — and Mandiant makes headlines with its sensational revelations.
The report also shows the balance of power in America's cyberwar has shifted into the hands of the $30 billion-a-year computer security industry.
"We probably kicked the hornet's nest," Mandia, 42, said in an interview at the Alexandria, Va., headquarters of Mandiant. But "tolerance is just dwindling. People are tired of the status quo of being hacked with impunity, where there's no risk or repercussion."
China has disputed Mandiant's allegations.
Mandiant, which took in some $100 million in business last year — up 60 percent from the year before — is part of a lucrative and exploding market that goes beyond antivirus software and firewalls. These "digital forensics" outfits can tell a business whether its systems have been breached and — if the company pays extra — who attacked it.
Mandiant's staff is stocked with retired intelligence and law enforcement agents who specialize in computer forensics and promise their clients confidentiality and control over the investigation. In turn, they get unfettered access to the crime scene and resources to fix the problem (Mandiant won't say exactly how much it charges, but it's estimated to average around $400 an hour).



Now what we need is an open, frank public dialog about what to do about it.

By: Brant

21 February 2013

The DoD's New Intel Agency

Because apparently our problem is that we don't have enough spies, we now have the Defense Clandestine Service.

The world's newest spy agency is now open for business. The Defense Clandestine Service now has its own website, a motto, and, finally, money from Congress to operate. The DCS, in its own words, "conducts human intelligence (HUMINT) operations to answer national-level defense objectives for the President, the Secretary of Defense, and senior policy-makers." DCS case officers "conduct source operations in every region of the world, alone or in teams. They use their innate intellect, flexibility and creativity — augmented by knowledge of the culture and comprehensive training — to recruit and manage HUMINT sources whose information answers national-level defense objectives."

By: Brant

15 February 2013

DOD Announces the Distinguished Warfare Medal

To much chagrin and derision, the DoD has announced the Distinguished Warfare Medal for servicemembers who kinda-sorta went to war, and maybe commuted to it.

The Department of Defense announced today the creation of the Distinguished Warfare Medal to recognize a service member’s extraordinary achievements directly impacting combat operations.

Modern technology enables service members with special training and capabilities to more directly and precisely impact military operations at times far from the battlefield. The Distinguished Warfare Medal will be awarded in the name of the secretary of defense to service members whose extraordinary achievements, regardless of their distance to the traditional combat theater, deserve distinct department-wide recognition.

“I have seen first-hand how modern tools like remotely piloted platforms and cyber systems have changed the way wars can be fought,” said Secretary of Defense Leon E. Panetta. “We should also have the ability to honor extraordinary actions that make a true difference in combat operations, even if those actions are physically removed from the fight.”

Based on the order of precedence, the Distinguished Warfare Medal will sit directly below the Distinguished Flying Cross. It may be awarded for actions in any domain but not involving acts of valor.

“This new medal recognizes the changing character of warfare and those who make extraordinary contributions to it,” said Joint Chiefs of Staff Chairman Gen. Martin E. Dempsey. “The criteria for this award will be highly selective and reflect high standards.”

The medal, designed by The Institute of Heraldry, will be available in the coming months. The signed memo, criteria for the medal, along with the design, can be seen here: http://www.defense.gov/news/DistinguishedWarfareMedalMemo.pdf



Here's The Duffel Blog's suggestion for what it should look like

By: Brant

AQIM Leaves Vital Document Behind in Rapid Retreat

The AP has a great article talking about an Al Qaeda 'manifesto' that was left behind in Timbuktu and discovered by one of their reporters.


In their hurry to flee last month, al-Qaida fighters left behind a crucial document: Tucked under a pile of papers and trash is a confidential letter, spelling out the terror network's strategy for conquering northern Mali and reflecting internal discord over how to rule the region.

The document is an unprecedented window into the terrorist operation, indicating that al-Qaida predicted the military intervention that would dislodge it in January and recognized its own vulnerability.

The letter also shows a sharp division within al-Qaida's Africa chapter over how quickly and how strictly to apply Islamic law, with its senior commander expressing dismay over the whipping of women and the destruction of Timbuktu's ancient monuments. It moreover leaves no doubt that despite a temporary withdrawal into the desert, al-Qaida plans to operate in the region over the long haul, and is willing to make short-term concessions on ideology to gain the allies it acknowledges it needs.

The more than nine-page document, found by The Associated Press in a building occupied by the Islamic extremists for almost a year, is signed by Abu Musab Abdul Wadud, the nom de guerre of Abdelmalek Droukdel, the senior commander appointed by Osama bin Laden to run al-Qaida's branch in Africa. The clear-headed, point-by-point assessment resembles a memo from a CEO to his top managers and lays out for his jihadists in Mali what they have done wrong in months past, and what they need to do to correct their behavior in the future.

Droukdel, the emir of al-Qaida in the Islamic Maghreb, perhaps surprisingly argues that his fighters moved too fast and too brutally in applying the Islamic law known as Shariah to northern Mali. Comparing the relationship of al-Qaida to Mali as that of an adult to an infant, he urges them to be more gentle, like a parent:

There's a lot more at the link.

By: Brant

12 February 2013

New Nork Nuke Noodling

The Norks have supposedly set off a new underground nuclear test. CNN reports...

North Korea said Tuesday that it had conducted a new, more powerful underground nuclear test using more sophisticated technology, jolting the already fragile security situation in Northeast Asia and drawing condemnation from around the globe.
It is the first nuclear test carried out under the North's young leader, Kim Jong Un, who appears to be sticking closely to his father's policy of building up the isolated state's military deterrent to keep its foes at bay, shrugging off the resulting international condemnation and sanctions.
Although Pyongyang had announced plans for the test in recent, vitriolic statements, its decision to go ahead with it provided a stark reminder of a seemingly intractable foreign policy challenge for President Barack Obama ahead of his State of the Union address later Tuesday.
The test was designed "to defend the country's security and sovereignty in the face of the ferocious hostile act of the U.S.," the North's state-run Korean Central News Agency (KCNA) said, referring to new U.S.-led sanctions on Pyongyang in the wake of a recent long-range rocket launch.



Put on your predictor hats - what happens next?



By: Brant

10 February 2013

Was Petraeus Brought Down By Insider Intrigue?

A forthcoming ebook on Benghazi is claiming Petraeus' downfall was engineered by his bodyguards and others inside the CIA.

David Petraeus was betrayed by his own bodyguards and vengeful high-ranking enemies in the CIA, who made sure his affair with his biographer was exposed to the public, a new book claims.
MailOnline can reveal a new angle on the story that rocked Washington last fall. It comes from two retired special operations commandos - a Navy SEAL and a Green Beret - who say they discovered a plot against the former CIA director while doing research about the attacks on the U.S. consulate in Benghazi, Libya.
Senior CIA officers targeted Petraeus because they didn't like the way he was running the agency - focusing more on paramilitary operations than intelligence analysis. They used their political clout and their connections to force an FBI investigation of his affair with Paula Broadwell and make it public, according to 'Benghazi: The Definitive Report.'
'It was high-level career officers on the CIA who got the ball rolling on the investigation. It was basically a palace coupe to get Petraeus out of there,' Jack Murphy, one of the authors, told MailOnline.
Murphy and co-author Brandon Webb also revealed that the September 11 Benghazi terrorist attack that killed four Americans, including Ambassador Chris Stevens, was retaliation by Islamist militants who had been targeted by covert U.S. military operations.
The book claims that neither Stevens nor even Petraeus knew about the raids by American special operations troops, which had 'kicked a hornet's nest' among the heavily-armed fighters after the overthrow of Libyan dictator Muammar Gaddafi.
John Brennan, President Barack Obama's Deputy National Security Adviser, had been authorizing 'unilateral operations in North Africa outside of the traditional command structure,' according to the e-book. Brennan is Obama's pick to replace Petraeus as head of the CIA.



By: Brant

08 February 2013

Anniversary: Russo-Japanese War

The formal declarations of war came a few days later, but the Russo-Japanese War started with an attack on 8 February.
Japan issued a declaration of war on 8 February 1904. However, three hours before Japan's declaration of war was received by the Russian Government, the Imperial Japanese Navy attacked the Russian Far East Fleet at Port Arthur. Tsar Nicholas II was stunned by news of the attack. He could not believe that Japan would commit an act of war without a formal declaration, and had been assured by his ministers that the Japanese would not fight. Russia declared war on Japan eight days later. However, the requirement to declare war before commencing hostilities was not made international law until after the war had ended in October 1907, effective from 26 January 1910. Montenegro also declared war against Japan as a gesture of moral support for Russia out of gratitude for Russian support in Montenegro's struggles against the Ottoman Empire. However, due to logistical reasons and distance, Montenegro's contribution to the war effort was limited to those Montenegrins who served in the Russian armed forces.


It was ended in 1905, with the Treaty of Portsmouth, a rare peace treaty that was signed in the Western Hemisphere for a war not involving nations from that half of the world.

What lessons did either side learn from this conflict? Your thoughts in the comments!

By: Brant

Mali Military Mutiny Makes Muddied Messages

Paratroopers in Mali are are mutinying in Bamako.

Malian government soldiers fought mutinous paratroops in the capital Bamako on Friday in a clash that threatened to undermine a French-led military operation to drive al Qaeda-allied Islamist rebels from the north.
Local residents fled in panic as heavy gunfire echoed from the Djikoroni-Para paratrooper base on the Niger River in western Bamako as Malian army units with armored vehicles surrounded the camp.
Smoke rose from the base, where mutinous members of the 'red beret' paratroop unit loyal to deposed Malian President Amadou Toumani Toure started firing with their weapons to protest attempts to reassign some of them, Malian officers said.
At least one person was killed, state media reported.
The clash between forces loyal to Mali's current rulers and the Toure partisans revealed splits in the armed forces still lingering after a military coup in March that plunged the previously stable West African state into chaos.
The coup resulted in Tuareg rebels seizing the north in a revolt later hijacked by Islamist radicals. Mali is Africa's third-largest gold producer after Ghana and South Africa.
The Bamako fighting pointed to serious weaknesses in the Malian state which could set back the rapid military gains made by France's four-week-old military intervention in north Mali, which has driven Islamist insurgents from the major urban areas.


Somewhere on the front lines, the French are thinking "WTF?"

By: Brant

View Larger Map

07 February 2013

Carrier Strike Group Deployment Cancelled

The official statement from the DoD on delaying the Carrier Strike Group deployment to the CENTCOM Area of Responsibility reads:

Statement from Pentagon Press Secretary George Little on U.S. Carrier Strike Group Presence in the CENTCOM Area of Responsibility

“The secretary of defense has delayed the deployment of the USS Harry S. Truman (CVN-75), Norfolk, Va., and the USS Gettysburg (CG-64), Mayport, Fla., which were scheduled to depart later this week for the U.S. Central Command (CENTCOM) area of responsibility.

“Facing budget uncertainty -- including a continuing resolution and the looming potential for across-the-board sequestration cuts -- the U.S. Navy made this request to the secretary and he approved. This prudent decision enables the U.S. Navy to maintain these ships to deploy on short notice in the event they are needed to respond to national security contingencies.

“The United States will continue to maintain a robust military presence in the CENTCOM region, including the current carrier presence and a mix of other assets, to fulfill enduring commitments to our partners. The U.S. military continues to stand ready to respond to any contingency and to confront any threat in the region.”




By: Brant

04 February 2013

An Iranian "Stealth" Fighter?

Iran is claiming to have an indigenous stealth fighter, that looks a lot like an F5 with spray-painted cardboard glued to it.

Iran on Saturday unveiled its newest combat jet, a domestically manufactured fighter-bomber that military officials claim can evade radar.
President Mahmoud Ahmadinejad said in a ceremony broadcast on state TV that building the Qaher F-313, or Dominant F-313, shows Iran's will to "conquer scientific peaks."
The Qaher is one of several aircraft designs the Iranian military has rolled out since 2007. Tehran has repeatedly claimed to have developed advanced military technologies in recent years, but its claims cannot be independently verified because the country does not release technical details of its arsenals.
The Islamic republic launched a self-sufficient military program in the 1980s to compensate for a Western weapons embargo that banned export of military technology and equipment to Iran. Since 1992, Iran has produced its own tanks, armored personnel carriers, missiles, torpedoes, drones and fighter planes.
"Qaher is a fully indigenous aircraft designed and built by our aerospace experts. This is a radar-evading plane that can fly at low altitude, carry weapons, engage enemy aircrafts and land at short airstrips," Defense Minister Ahmad Vahidi said.
Vahidi said advanced materials were used to manufacture the body of the aircraft, making it Iran's best stealth plane.
However, some reports suggest that Iran's program relies on equipment supplied by major international defense contractors and that it incorporates parts made abroad or uses outside engineered technologies in its domestic designs.
Still photos of the Qaher released by the official IRNA news agency and pictures on state TV showed a single-seat jet. They described it as a fighter-bomber that can combat other aircraft and ground targets.
Iran's English-language state Press TV said Qaher was similar to the American-made F/A-18, an advanced fighter capable of dogfighting as well as penetrating enemy air defenses to strike ground targets.



By: Brant

02 February 2013

DoD Identifies Next Units for Upcoming Afghanistan Rotation

The DoD has identified the next units for rotating to Afghanistan

The Department of Defense today identified three major units to deploy as part of the upcoming rotation of forces operating in Afghanistan. The scheduled rotation involves one Infantry Brigade Combat Team (IBCT) with roughly 2,250 personnel; a Combat Aviation Brigade (CAB) with roughly 2,200 personnel; and a corps headquarters with roughly 500 personnel to rotate in spring 2013. The deploying units include:

Brigade Combat Teams:
4th Infantry Brigade Combat Team, 3rd Infantry Division, Fort Stewart, Ga.
10th Combat Aviation Brigade, 10th Mountain Division, Fort Drum, N.Y.

Corps Headquarters:
III Corps Headquarters, Fort Hood, Texas.



By: Brant

01 February 2013

Army 6 Sends...

By: Brant

China Tests DF-21D Missile on "Aircraft Carrier"

An interesting article about a Chinese "test" of the DF-21D Missile and its mocked-up target.

Taiwan-based Want China Times has published suggestive evidence that China has tested its Dong Feng 21D anti-ship ballistic missile (ASBM), also known as the “Carrier Killer” to fans.

This missile will keep the “dog” out of China’s “backyard.”

According to the January 23 article, “PLA ‘sinks’ US carrier in DF-21D missile test in Gobi,” the “People’s Liberation Army has successfully sunk a US aircraft carrier, according to a satellite photo provided by Google Earth, reports our sister paper Want Daily — though the strike was a war game, the carrier a mock-up platform and the ‘sinking’ occurred on dry land in a remote part of western China.”

“A satellite image reveals two large craters on a 200-meter-long white platform in the Gobi desert used to simulate the flight deck of an aircraft carrier. The photo was first posted on SAORBATS, an internet forum based in Argentina. Military analysts believed the craters would have been created by China’s DF-21D anti-ship missile.”

“While claiming that the missile has the capability to hit aircraft carriers 2,000 kilometers away, the nationalistic Chinese tabloid Global Times stated that the weapon was only designed for self-defense; the DF-21D will never pose a serious threat to US national security because it is not even able to reach Hawaii, the newspaper said, though fully aware of the US naval deployment in the Western Pacific.”

By: Brant