19 June 2015

Ernie Pyle, still telling the stories of soldiers, 70 years on

By STEVE PADILLA

In Ernie Pyle's words, World War II museum staff members find inspiration for sanctifying soldiers' sacrifice

"Here in a jumbled row for mile on mile are soldiers' packs.

"Here are socks and shoe polish, sewing kits, diaries, Bibles and hand grenades.... Here are toothbrushes and razors, and snapshots of families back home staring up at you from the sand."

The words appeared in American newspapers on June 17, 1944, contained in the last of three reports war correspondent Ernie Pyle filed depicting the aftermath of D-day.

In his signature style, detailed and deceptively simple, Pyle described the "human litter" that extended in "a thin little line, like a high-water mark" along the beaches of Normandy after the June 6 landing.

Writing paper and air mail envelopes constituted the most common debris, after cigarettes.

Is India's Main Battle Tank Finally Doomed?


The Indian Army may be finally giving up on the indigenously developed Arjun main battle tank. 
Last week, the Indian Army released a global request for information (RFI) inviting responses by 31 July to develop a multi-purpose Future Ready Combat Vehicle (FRCV) in order to replace older license-built Soviet-era main-battle tanks (MBTs).

“The Indian Army is planning to design and develop a new generation, state-of-the-art combat vehicle platform for populating its armored fighting vehicle fleet in the coming decade. This vehicle, which will be called the future ready combat vehicle (FRCV), will form the base platform for the main battle tank which is planned to replace the existing T-72 tanks in the Armored Corps,” the RFI reads.

India and Russia to Press on With Fifth-Generation Fighter Development

June 18, 2015

Despite numerous delays, the joint Indo-Russian Fifth Generation Fighter Aircraft (FGFA) project will not get cancelled. 

This week, the head of Russia’s United Aircraft Corporation (UAC) announced that a full R&D collaboration contract would be signed in 2015 with New Delhi for joint work on the derivative Indian version of the PAK FA T-50 fifth-generation fighter jet, the Perspective Multi-role Fighter (PMF).

The contract could be signed as early as July, as a follow-up to Indian Prime Minister’s Narendra Modi’s visit to Russia. Defense News reports that according to an unnamed source within the Indian Ministry of Defense (MOD), India is compromising on various points of conflict over the joint R&D program.

Most interestingly, the draft agreement will include a fixed order of 154 PMFs, and include a compromise on work share, a firm commitment to the number of single- versus double-seat PMF (aka Fifth Generation Fighter Aircraft) jets, and steps that specifically address each of the approximate 40 changes that the Indian Air Force (IAF) wants in comparison to the current T-50 prototype.

How China Could Become a Two-Ocean Power (Thanks to Pakistan)


June 15, 2015

In the last few months Pakistan’s Government has made a number of decisions that have drawn the country even further into China’s Geo-Strategic orbit. 

In the last few months Pakistan’s Government has made a number of decisions that have drawn the country even further into China’s Geo-Strategic orbit. And although China and Pakistan have had a long and fruitful relationship for well over 50 years, it was the launch of the 2,900 km China–Pakistan Economic Corridor (CPEC) during a visit to Pakistan by Chinese President Xi Jinping in April that qualitatively changed the relationship. This $46 billion CPEC project, which involves the construction of roads, railroads and power plants over a 15-year period, comes on top of other previous important Pakistan–China agreements in the military, energy and infrastructure fields.

The geostrategic importance of CPEC is bolstered by some earlier bilateral agreements. First, in April China was granted 40-year operation rights to the port of Gwadar on the Indian Ocean, at the mouth of the Persian Gulf. Beijing is expected to invest $1.62 billion in Gwadar. Gwadar will be where the CPEC begins and eventually makes its way to Kashgar in western China. Eventually when the port is fully operational and CPEC is completed, China will be able to transship some of its oil needs from that port, thus saving billions and precious time and most importantly avoiding the potentially vulnerable Malacca Strait. Gwadar will play a critical part in China’s land and maritime silk routes, linking it to Central Asia and beyond.

Why the Taliban Wants ISIS Out of Afghanistan

June 18, 2015

The Taliban want to make it clear for ISIS: Afghanistan’s only big enough for one of them. And it’s not ISIS.
A few months after Mosul fell in Iraq last summer and the Islamic State group (also known as ISIS) rose to prominence, we began hearing murmurs that ISIS had spread eastward, into Afghanistan. The extent of ISIS’ activities and presence in Afghanistan remain ambiguous, but the Taliban have started to feel the group’s impact. This week, the Taliban warned Abu Bakr al-Baghdadi, the leader of the Islamic State and its self-styled caliph, that “jihad against the Americans and their allies [in Afghanistan] must be conducted under one flag and one leadership.” The Taliban in Afghanistan and Pakistan largely remain loyal to Mullah Omar, the group’s reclusive leader who holds the title of Amir al-Mu’minin (Commander of the Faithful).

Thirsty Yet? Central Asia's Coming Water Crisis

Everyone agrees water is a growing problem in the region, but the states of Central Asia can’t agree on what to do. 

“Water is life. Water is health. Water is dignity. Water is a human right,” UN Secretary General Ban Ki-moon said last week at a conference in Tajikistan aimed at assessing the results of the UN’s decade-long “Water for Life” initiative, launched in 2005.

Reportedly 2,000 participants attended the event, hearing more than 70 reports in the Tajik capital, Dushanbe. But, Eurasianet notes, “despite numerous statements of concern, the meeting produced no substantive measures.” Meaningless conferences apparently don’t just happen in Washington, DC. After an entire decade of concerted focus on the issue, Central Asia remains one of the most irresponsible regions when it comes to water.

Global Peace Index: South China Sea a 'Potential Area For Conflict'

June 19, 2015

A new report highlights an increasing division between the most and least peaceful nations – including in Asia. 
This week, the Institute for Economics and Peacepublished its annual Global Peace Index. This year’s index highlighted that escalating civil strife and the consequent refugee crisis have been among the key drivers in increasing the cost of containing global violence.

The intensity of armed conflict increased dramatically, with the number of people killed in conflicts globally rising more than 3.5 times from 49,000 in 2010 to 180,000 in 2014.

Despite ongoing improvements in peace in many countries, the number and intensity of armed conflicts increased dramatically, with a 267 percent rise in the number of deaths from conflict since 2010, creating unprecedented levels of refugees.

With specific reference to the Asia-Pacific region, the index highlights diverse trends:

Taiwan Will Have a Female President in 2016

June 18, 2015

For the first time ever, two female candidates will square off in Taiwan’s presidential election. 
Taiwan’s ruling Kuomintang (KMT) has all but selected its candidate for the 2016 presidential elections. Hung Hsiu-chu, the deputy legislative speaker, is the sole contender for the KMT nomination, and was just formally granted the go-ahead by the party’s Central Standing Committee. That sets up a showdown between Hung and Democratic Progressive Party chair Tsai Ing-wen for the presidency – and guarantees Taiwan will have its first-ever female president.

Hung passed of the last hurdles for the nomination on Wednesday, when the Standing Committee formally affirmed her bid. Prior to that, Hung had to prove she had a higher than 30 percent public approval rating, a requirement for the KMT’s candidate. Hung passed that bar easily, gaining 46 percent approval. With those requirements met, Hung will “for sure be appointed” the KMT candidate during the party congress on July 19, KMT spokesman Yang Wei-chung told The Wall Street Journal.

In China, an Ode to 'Grandpa Xi'


A children’s song about Xi Jinping is the latest sign of a growing personality cult in China. 

Chinese President Xi Jinping has recently acquired a new nickname: Grandpa Xi (Xi Yeye) instead of Uncle Xi (Xi Dada). This upgrade is appropriate because those who address Xi as “grandpa” are elementary school students. What is more interesting, given China’s recent history, is that the new nickname is a part of the title for a new song praising the Chinese Communist Party (CCP) leader.

Mao Zedong was the first CCP leader to be praised in a song. Working with the melody of a local folk song in Shaanxi Province where Mao and his colleagues were congregated to re-launch the communist revolution, farmer Li Youyuan reportedly composed a song, “The East is Red,” to praise Mao personally and the Communist Party collectively. In the song, Mao is hailed as the great savior of the Chinese people and the Communist Party as the sun for the entire world. During the Cultural Revolution from 1966 to 1976, when Mao’s personality cult was at its peak, the song was used as China’s unofficial national anthem.

he China Bubble Is Going to Burst

June 17, 2015
http://www.bloomberg.com/news/articles/2015-06-16/china-bubble-debate-turns-to-when-not-if-stocks-will-tumble

When Will China's Stock Market Bubble Burst? 

It’s no longer a question of whether China’s stock-market rally is a bubble, but when the bubble will burst.

That’s the refrain from a growing number of analysts as valuations climb to levels that by some measures already exceed the peak of China’s last equity mania in 2007.

A market crash may come within six months, Bocom International Holdings Co. said Tuesday, citing an analysis of global bubbles over 800 years that shows the speed of gains in China mirroring past market peaks. Macquarie Investment Management, whose Asian stock fund is outperforming 97 percent of peers in 2015, has already eliminated exposure to mainland shares after turning bearish for the first time in seven years. The government may engineer a correction if valuations rise much further, according to CLSA Ltd.

CHINA’S MILITARY STRATEGY: ASSESSMENT OF WHITE PAPER 2015


This article can be found in its original form at the National Maritime Foundationhere and was republished with permission. 

Philippine Muslim Rebels Begin Turning Over Weapons, Soldiers

June 18, 2015

Government and rebels do what they can to advance a stalled peace process. 

As expected, Muslim rebels in the Philippines began retiring fighters and handing over weapons to the government this week in a demonstration of their commitment toward an ongoing peace process.

The move is part of a peace agreement inked between the Philippine government, led by President Benigno Aquino III, and the Moro Islamic Liberation Front (MILF) to end one of Asia’s deadliest insurgencies which has killed more than 120,000 people.

Quantitatively, the decommissioning that began on Tuesday was but a small step. 75 firearms, including mortar and rocket launchers, were handed over, while 145 guerillas out of an estimated 10,000 prepared to return back to civilian life. But both sides nonetheless praised it as an important step. Al Haj Murad Ebrahim, the MILF chairman, said that it was proof of the group’s belief that its strength lay not in firearms it held but the affection of the Bangsamoro people it led. Aquino, who was present at the decommissioning, called it a “solid testament to the unreserved and honest participation” of the MILF.

Syria's online battlefield

By Luke Coffey
https://uk.news.yahoo.com/syrias-online-battlefield-100724187.html#yIp1KRB

Syria's online battlefield 

Often cyber warfare is described as a "future threat". Nothing could be further from the truth. Warfare in the cyber domain is now an everyday occurrence - and has been for some time. 

In 2007, Russia carried out a cyberattack against Estonia. The use of the co-called Stuxnet virus to slow down Iran's nuclear enrichment programme has been all but officially acknowledged by the US. During the raid on Osama bin Laden's compound in 2011, the lights mysteriously went out in the city of Abbottabad, even though today nobody has explained exactly how this happened.

Cyber warfare, and the threat it poses, is very real. The civil war in Syria is a great example of this.

The reason why the cyber domain is such an attractive target in modern warfare is because of the level of dependency society has on the internet. Syria is no exception.

Dark side

Green Berets’ efforts to take down ISIS undermined by shoddy U.S. intelligence


June 16, 2015

U.S. Special Forces (USSF) soldiers scan the ground below for threats while flying on a MH-60 Black Hawk during a Fast Rope Insertion Extraction System training exercise. USSF fast roped onto a specific target during the Special Forces Advanced Reconnaissance, 

Army Green Berets planned for a wide range of actions in Iraq this year but bemoaned the sorry state of U.S. intelligence assets in the country to help the local security forces find and kill Islamic State terrorist targets, an internal Army memo says.

The memo, a copy of which was obtained by The Washington Times, states that when U.S. forces exited Iraq in December 2011, “all theater-level enterprise databases were terminated.”

This was forcing U.S. special operations forces in Iraq to track a wide range of intelligence reports “on individual service member laptops and share drives,” the memo says.

Boeing Touts The A-10 Thunderbolt For Sale In Mideast As Ideal Warplane To Fight ISIS

June 16 2015 

A U.S. Air Force A-10 Thunderbolt aircraft from Bagram Air Base flies a combat mission over Afghanistan, in this handout photograph taken on June 14, 2009, and obtained on May 20, 2014. The aging aircraft is now being readied for a possible sale to overseas air forces. Reuters/Staff Sgt. Jason Robertson/U.S. Air Force/Handout via Reuters

The A-10 Thunderbolt, a relic of the Cold War that's been flying for the U.S. Air Force since the 1970s and has narrowly escaped retirement as the Pentagon cuts its spending growth, could be about to find itself in demand once again, more than three decades after the final aircraft came off the production line. 

An unexpected appearance by the brutish-looking aircraft at the glitzy Paris Air Show this week showcased the return to the spotlight of the Warthog, as it's universally known by its crews. Not only has the A-10 found a new lease on life fighting Islamic State group militants in Iraq and Syria, and being deployed to its old hunting grounds in Eastern Europe to deter Russian hostility -- it's now being touted by Boeing as a great aircraft for customers in the Middle East, who would get modernized airplanes dismissed by the U.S. Air Force, which has about 300 left in service. 

The US-Korea Summit That Wasn't

By Woo Jung-Yeop
June 17, 2015

Korean President Park was forced to postpone her visit to the U.S. Can the two sides make good use of the delay? 
Korean President Park Geun-hye’s visit to the United States was postponed less than a week before the planned summit with President Barack Obama, scheduled for June 16. With new cases of Middle East Respiratory Syndrome (MERS) reported on a daily basis, there was speculation that Park would shorten the trip by cancelling her plans in Houston and continue as scheduled for the summit in Washington, but the decision to postpone the visit altogether came as a surprise to many observers. Media reports are now overrun with the question of when and how soon the trip will be rescheduled. However, the focus of Park’s U.S. visit should be on what to discuss, not on when to reschedule.

Messaging Problems

South Korea's Foreign Minister to Make First Trip to Japan

June 18, 2015

Yun Byung-se will visit Japan to commemorate the 50th anniversary of ROK-Japan diplomatic ties. 
For the first time since President Park Geun-hye took office in February 2013, South Korea’s foreign minister will visit Japan. The South Korean Ministry of Foreign Affairs (MOFA) announced on Wednesdaythat “Foreign Minister Yun Byung-se will visit Japan on June 21-22 to attend a reception marking the 50th anniversary of the normalization of the ROK-Japan relations… and meet with his Japanese counterpart Fumio Kishida.”

Japan-South Korea ties have been frosty for the past two years, with historical divisions and a territorial dispute driving a wedge between the two Northeast Asian neighbors. The relationship has been inching forward in past months, both on the bilateral level and trilaterally with China. Japan and South Korea restarted the “two-plus-two” dialogue between their foreign and defense ministers in April, after a five-year hiatus. China, Japan, and South Korea restarted their trilateral foreign ministers’ meeting in late March, raising hopes for a possible summit among the three countries’ leaders.

Why Are North Korean Defectors Being Turned Away in Europe?

June 17, 2015

North Koreans’ asylum claims are often denied, as European countries define them as South Korean citizens. 

North Korean defectors have little hope of finding asylum in Europe due to increasingly strict criteria used to determine claims, according to a reportreleased this week by a U.K.-based advocacy group.
The report by the European Alliance for Human Rights in North Korea says the U.K., France, Belgium, and the Netherlands are rejecting most claims for asylum by North Koreans because they view them as South Korean citizens.

In 2013, the U.K. rejected 30 out of 40 asylum applications made by North Korean defectors, according to the report, titled “A Case for Clarification: European Asylum Policy and North Korean Refugees.” Belgium turned down 99 of 126 claims it received, according to the study. The Netherlands and France, meanwhile, rejected all of the applications they processed – 128 and 19, respectively.

Tsipras Attacks Greece’s Creditors as Pressure Grows on Debts


JUNE 16, 2015 

BRUSSELS — Greece’s prime minister, Alexis Tsipras, on Tuesday blasted his country’s creditors for austerity measures that he said were humiliating and strangling his people as pressure mounted on Athens to present reforms in exchange for bailout funding.

With critical deadlines pressing — the Greek bailout program expires in two weeks, when a huge payment on debt is due — European Union policy makers were discussing the possibility of an emergency summit meeting to determine a solution if eurozone finance ministers fail to broker a deal at their meeting on Thursday.

The standoff with Greece could have severe repercussions for European integration if Greece becomes the first country forced out of the 19-member currency bloc.

European stock markets and the euro were little changed on the day, and only in Athens did things appear particularly bleak, as stocks fell nearly 5 percent and bond yields stood at levels suggesting investors believe default on Greece’s bailout loans was a distinct possibility.

World losing battle against terror, climate change & cyberattacks: Albright

Madeleine K. Albright and Ibrahim A. Gambari4
June 16, 2015 

To confront the crisis in global governance, the United Nations needs key reforms.

As the United Nations marks its 70th anniversarylater this year, there is mounting evidence that the international community is losing the fight against the most pressing security and justice challenges of our time. From Syria to sub-Saharan Africa, a markedincrease in mass atrocities has undermined basic human rights and reversed the trend of declining political violence that began with the end of the Cold War. Climate change, cyberattacks, and the threat of cross-border economic shocks also pose grave implications for global security and justice.

Chinese Military Modernization: Implications for Strategic Nuclear Arms Control

By Stephen J. Cimbala for The Air University
17 June 2015

Is it time for the United States and Russia to factor China into their dialogue on strategic nuclear arms reductions? Stephen Cimbala believes so. As he sees it, Beijing’s military modernization program could lead to the deployment of a ‘more than minimum’ deterrent force within a decade.

This article was originally published in Vol. 9, Issue 2 of Strategic Studies Quarterly, the Strategic Journal of the United States Air Force.

RUSSIA’S HYBRID WAR IN UKRAINE:

June 17, 2015
http://fortunascorner.com/2015/06/17/russias-hybrid-war-in-ukraine/\

Since the change of power in Ukraine in February 2014, Russia has been swift to occupy and annex the Crimean peninsula. In April 2014, separatist riots broke out in Eastern Ukraine, following a very similar pattern to those in Crimea. These actions were accompanied by a strong and intensive, well-coordinated diplomatic, economic and media campaign both in Ukraine and abroad, also supported by pressure exerted by the large Russian military units lined up along the border with Ukraine.

The form of warfare Russia employed in Ukraine in 2014, often called hybrid war, has been aimed at defeating the target country by breaking its ability to resist without actually launching a full-scale military attack. In line with contemporary Russian military thinking on ‘new generation warfare’, hybrid war is built on the combined use of military and non-military means, employing basically the whole spectrum of a state’s policy inventory, including diplomatic, economic, political, social, information and also military means.

This report aims to seek answers to two main research questions. First, what are the main features and characteristics of Russia’s hybrid warfare as conducted in Ukraine? Derived from the first, the second research question is focused on the operational prerequisites for the Russian hybrid war. In other words, is the Russian hybrid war a universal warfare method deployable anywhere, or is it more country or region-specific?

IS ESPIONAGE NECESSARY FOR OUR SECURITY? A HISTORICAL LOOK BACK

June 16, 2015 

Covert operations for intelligence collection, which have not had the same public attention, require much more thorough consideration. Such operations involve the recruiting of agents in foreign nations, encouraging the defection of knowledgeable individuals, audio-surveillance, and other techniques falling under the general heading of espionage. At least for the purpose of this discussion, espionage does not include large-scale and remote-control secret operations such as satellite reconnaissance, “spy planes,” or the interception and analysis of communications and electronic emissions performed outside the borders of the target country.

The information sought by clandestine means may include not only positive intelligence on the plans and programs of other nations but also the quite different category of counterintelligence on threats from foreign intelligence or terrorist groups. While covert intelligence collection abroad has not been free of criticism, it has not, at least since the unique U-2 incident of 1960, seriously embarrassed the U.S. government or caused major international repercussions. However, counterintelligence activities, the responsibility of both the FBI (at home) and the CIA (abroad), have raised some of the most serious domestic issues of illegality and abridgment of civil rights-notably the CIA’s screening and opening of mail to the Soviet Union. 

Two Articles by Former Senior US Intelligence Officers

June 16, 2015

The website of the Association of Former Intelligence Officers (AFIO) has placed online two new scholarly articles on intelligence matters. 

The first article, entitled Decision Advantage, Decision Confidence, written by John MacGaffin and Peter C. Oleson, explains why intelligence information has become so essential to formulation and execution of policy in the U.S.

The second article by Adam D.M. Svendsen, entitled simply Intelligence Liaison, covers the incredibly important subject of how and why intelligence services have collaborated with one another since the dawn of time. Very interesting historical analysis of this overlooked subject in intelligence studies.

Interview With General James Mattis

4/30/2015
http://www.historynet.com/interview-with-general-james-mattis.htm


Over his 41-year Marine Corps career General James Mattis honored his obligation to share lessons learned from combat and his own rigorous study of military history. (DoD Photo) 

Hijacked Malaysian Tanker Sparks Regional Response

June 18, 2015

The country steps up efforts to find a missing vessel with the help of regional states. 

Last week, a Malaysian-registered tanker went missing in the South China Sea near Johor. Though the vessel – believed to be hijacked – still has not been found a week later, the Malaysian government is stepping up its rescue efforts with the help of other neighboring states and willing partners.

The tanker, the MT Orkim Harmony, suddenly lost contact around 8:50pm Thursday night. It was filled with nearly 6,000 tons of RON95 petrol worth some 21 million ringgit (US$5.6 million) and had 22 crew members on board, including 16 Malaysians, five Indonesians and a Myanmar national. Malaysian authorities immediately began combing surrounding waters after they received a missing tanker report from the shipping company Orkim Ship Management Sdn Bhd on Friday morning. But after nearly 50,000 square kilometers has been searched over the past few days, the vessel has yet to be found.

Myanmar’s Refugee Problem Is Worse Than You Thought

June 17, 2015

Two months ago, the world was shocked to discover the persecution endured by the Rohingya ethnic group, which drove many of them to seek asylum in several Southeast Asian countries. The majority of the boat refugees came from Myanmar.

But the refugee problem could be worse. Consider these statistics provided by the United Nations High Commissioner for Refugees: Myanmar’s stateless people are estimated to number 810,000, most of them Rohingya, who are not recognized by the government. In 2012, violence in Rakhine State forced around 140,000 people, including the Rohingya, to flee their homes. Meanwhile, the number of internally displaced persons across the country has already reached 374,000. Refugees who are originally from Myanmar are pegged at 479,706, while those seeking asylum number 48,053. Temporary camps along the Thai border have been established for some 120,000 refugees from Myanmar.

Debt Worries? Not Asia, Says IMF

June 17, 2015

A new report suggests there is scope for governments to borrow more, with one exception. 

A toxic cocktail of debt, deflation and demographics is stalking some of Asia’s biggest economies. Yet according to International Monetary Fund (IMF) researchers, the region still has plenty of room to ramp up government borrowings, with one notable exception.

Titled “When should public debt be reduced?” the recent IMF staff paper has ranked South Korea second only to Norway in its “fiscal space,” defined as the difference between the debt limit and the actual debt-to-gross domestic product (GDP) ratio, which for South Korea was calculated at 241 percent compared to Norway’s 246 percent.

A number of other Asian nations ranked in the top 10, including third-rated New Zealand (228 percent) and fourth-ranked Hong Kong (224 percent). Despite its heated political debate over budgets, Australia placed sixth at 214 percent, followed by Taiwan at 209 percent and 10th-ranked Singapore (193 percent), according to the paper’s authors Raphael Espinoza, Atish Ghosh and Jonathan Ostry.

STRATCOM Must Be Warfighters, Not FAA In Space: Lt. Gen. Kowalski

June 16, 2015

CAPITOL HILL: The US military spends too much time acting as the FAA of space and not enough watching for potential threats, the deputy chief of Strategic Command said today. That has to change as outer space becomes increasingly contested and increasingly intertwined with cyberspace, Lt. Gen. James Kowalski told a Peter Huessy breakfast here.

“How do we envision the Joint Space Operations Center in the future if we’re going to be in an environment where we [must] assume space is under threat?” Kowalski asked. “Today if we have a problem with a communications satellite, we immediately turn to the engineers and [ask], ‘hey, what’s broken on the satellite?’ We need to be in a mindset that we have tofirst rule out that that satellite was under some kind of attack.”

“That’s really not what we’re at,” Kowalski continued. “We spend a lot of time doing catalog and tracking and collision avoidance kind of things,” he said. “If you think about who does that in the airspace, it’s probably not military, it’s a civilian agency,” such as the Federal Aviation Administration. “We need to revisit how we’ve allocated military personnel to what may not be really a military mission.”
Sharon Chand

Ways to Protect the U.S. Grid from Cyberattacks

Judging by the number and type of cyber incidents reported to the U.S. Department of Homeland Security (DHS), attackers appear to be stepping up efforts to access or otherwise harm the electrical grid.

During fiscal year 2014, DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 245 cyber incidents targeting various companies’ industrial control systems, according to a bulletin released March 2015. In the energy sector, which reported the most incidents, industrial control systems monitor and control nuclear power facilities, wastewater collection and treatment plants, oil and gas pipelines, and the generation, transmission and distribution of electricity.

The cyber incidents that energy and other sectors reported encompassed a wide range of attacks, including unauthorized access to Internet-facing industrial control and SCADA (supervisory control and data acquisition) devices, exploitation of zero-day vulnerabilities in those devices, malware, and network scanning and probing.

ISRAELI ARMY TO ESTABLISH CYBER WARFARE COMMAND

Written by NAN
16 June 2015

The Israeli army said on Tuesday that it plans to establish a new command dealing exclusively with cyber warfare.

Currently, the Israeli military has several bodies spread out in different units that deal with the various aspects of a field that is gaining importance from day to day, including cyber defence, cyber attacks and cyber intelligence gathering.

Those will now be brought together under one command within two years, explained the official.

The new cyber command would oversee all operational activities in the cyber dimension.

A military statement said that the cyber dimension ``is of utmost importance in the mission to adapt the Israel Defence Forces (IDF) to the dynamic changes and challenges of modern warfare.

DISA's new framework brings best practices to services management

Amber Corrin
June 9, 2015 

The Defense Information Systems Agency hasreleased a new framework aiming to standardize ITservices and operations throughout the military, formalizing ideas that top officials have been discussing in recent months.

The DoD Enterprise Services Management Framework (DESMF) "provides guidance to standardize the management of IT services across DoD organizations and is the embodiment of the integration of various best practices, frameworks and standards that defines a department-wide service management approach," the memo states.

The framework, a second-edition release that will be followed by a third edition incoming months, reflects broader DoD moves toward centralized IT services that the military services already are moving out on, such as the unified capabilities under development in a joint effort between DISA, the Army and the Air Force.

DISA rolls out new 5-year strategy


Amber Corrin
June 16, 2015 

The Defense Information Systems Agency has released its 2015-2020 strategic plan, laying out core agency missions and objectives in getting IT services to Defense Department users.

The strategic plan centers on a handful of objectives, including:

"We are at an operational crossroads," DISA Director LTG Ronnie Hawkins writes in the opening pages of the strategy. "We continue to operate in a contested battlespace, where the barrier to entry is low and oftentimes unchallenged. We must recognize that mission success is defined by our ability to pre-emptively disrupt, degrade, or deny our adversaries, both internal and external, unimpeded access to the information and capabilities of the Department of Defense Information Network (DODIN). We must sustain our operations and defenses before, during, and after an attack by reducing the attack surface, continually improving defensive cyberspace operations, and effectively commanding and controlling the DODIN."

THE REAL FOG OF CYBERWAR: OPERATIONAL CYBER PLANNING

June 17, 2015
Cyber operations and strategies are assumed to be critically important to national security strategies. The United States has gone to great lengths to involve cyber planning at thenational level, as well as at the operational level in the U.S. military. The problem is that we have little ability to answer the question of “what can we do?” with cyber strategies as they are utilized in the real world. Few really understand the behavior of these unicorn-like operations that are thought to be easy, safe, and cheap. In fact, cyber operations are not easy, nor are they cheap or safe. Not being able to answer critical questions of how to operationalize cyber strategies leaves us also unable to ponder the deeper question of “what should we do?” in cyberspace once we have an idea of capabilities and effects.

WHAT IS POLICY RELEVANCE?

June 17, 2015


Editor’s Note: This is the latest article in our special series, “The Schoolhouse.” The aim of this series is to explore and debate the state of advanced graduate education in international affairs. We aim to move beyond the often-repetitive and tiresome debates about the usefulness of scholarship to policy. We believe there are deeper issues at stake.

Attempts to bridge the gap between academia and the real world, especially in the area of international relations, have accelerated over the last few years. There are several initiatives ongoing, including the Bridging the Gap project, the Tobin Project, the Institute for the Theory and Practice of International Relations (TRIP), and a variety of others. The Bridging the Gap project, for example, trains academics how to ask policy relevant questions and write for public policy audiences. To complement these efforts, our understanding of what policy relevance “is” needs improving. In particular, distinguishing between research with significance for policy and research that is policy actionable — promoting realistic policy actions — can bring analytical clarity to the concept of policy relevance and help enhance efforts to bridge the gap.

CIA Looking for Cutting Edge Big Data Technology in Silicon Valley

Jonathan Vanian
June 17, 2015

What the CIA and Silicon Valley have in common

The CIA’s top techie explained why the intelligence agency is interested in the same big data tech that businesses love.

Doug Wolfe, the CIA’s chief information officer, made an unusual sales pitch to Silicon Valley on Tuesday by arguing that the spy agency and the tech industry have a lot in common.

“Remember, a lot of the solutions we need are similar to the private sector,” he told the crowd at a tech conference in San Francisco, using some tech industry jargon in the process.

Anonymous Backs New Encrypted Social Network to Rival Facebook

June 17, 2015

Individuals appearing in public as Anonymous, wearing Guy Fawkes masks
 
A new social network has been launched, vowing more transparency, security, and privacy than Facebook and other social media giants. Backed by the hacktivist group Anonymous, it will encrypt all messages, shielding data from governments and advertisers.

At first glance, Minds.com appears similar to any other social network. It provides a person’s followers with the latest updates, allowing their friends to comment and promote posts.

But the major difference exists behind the scenes. Minds.com doesn’t aim to profit from gathering data. In fact, its goal is the opposite – to encrypt all messages so they can’t be read by governments or advertisers.

The social network will also reward users for interacting with posts. This can be done by voting, commenting or uploading.