Obama/Kerry Cant Modify Iran, Cyber Army

Iran’s cyber army – the latest in a series of maleficence

TheHill: In July, when the P5+1 struck a nuclear deal with Iran dubbed as “historic,” administration officials spun it as a first step on a path toward improving Tehran’s behavior. That path hit yet another bump in recent weeks, when Iran launched nuclear-capable missiles in defiance of a United Nations Security Council resolution that endorsed the nuclear deal.

In a letter to the U.N., the U.S., France, Great Britain and Germany decried the missile tests. Secretary of State John Kerry speaking on a visit to Bahrain on April 7, 2016, condemned “the destabilising actions of Iran.”

Iran’s Minister of Defense Brig. Gen. Hossein Dehghan shot back: “If John Kerry actually thought about these subjects, he would no longer utter nonsense and foolish words.” The U.S., he said, should “leave the region and stop supporting terrorists.”

The Iranian regime, in contrast, clearly has no plans to curtail its regional meddling. According to reports from inside the Iranian regime, Supreme Leader Ali Khamenei has dispatched hordes of Islamic Revolutionary Guard Corps (IRGC), mercenary militias, as well as groups of regular army forces to Syria in anticipation of new attacks against the opposition and Free Syrian Army (FSA).

In a move unparalleled since the Iran-Iraq war, Khamenei has deployed his military on a large scale abroad.

The missile launches, coupled with the Iranian regime’s expanding role in wreaking havoc in Syria, naturally grabbed the headlines, overshadowing a no less disturbing report by the U.S. Justice Department that Iran was behind a series of cyber attacks against the U.S., targeting at least 46 companies and a dam by 2013. Now, new and stunning intelligence about the scope and depth of the Iranian regime’s investment in a cyber war against the U.S. are widening the anti-terror focus.

According to the U.S. indictment, between 2011 and 2013, hackers linked to the IRGC attacked U.S. financial institutions as well as a flood-control dam 25 miles north of New York City. Other targets included the New York Stock Exchange, Bank of America, and AT&T.

The hackers broke into the command and control system of the dam in 2013, according to Washington, and may have been able to release water from behind the dam if not for the fact that the sluice gate had been manually disconnected at the time of intrusion.

This is an unequivocal warning that the Iranian regime is preparing to mount a larger cyber attack against American infrastructure.

According to new reports from inside the Iranian regime, IRGC commander Mohammad-Ali Jafari has thrown his weight behind designating a “Cyber Force” to act as the IRGC’s “sixth force” – alongside its ground forces, navy, aerospace, extraterritorial Qods (Jerusalem) Force, and domestic Bassij militia.

The IRGC has been deeply involved in cyber warfare aimed at domestic suppression and supporting terrorists abroad since 2007. IRGC Brigadier General Hossein Hamedani (killed in late 2015 leading the charge in Syria) announced in 2010, “The Bassij cyber council has trained over 1,500 active ‘cyber jihadis,’” promising that their activities would increase in the near future.

When the IRGC’s Intelligence Organization was formed following the 2009 nationwide uprisings against the theocracy, the Cyber Army was placed under it. In November 2010, the Cyber Army claimed that it had hacked 500 sites simultaneously, while disrupting the intelligence networks and private websites of other counties.

Tehran has no intention of getting “right with the world,” as President Obama once suggested. The Iranian regime is committed to pursuing a strategic war against the U.S. and its allies. Any hopes of change in behavior are illusory at best.

Washington needs to develop a more comprehensive strategy to confront this threat before it’s too late. Since the regime’s cyber force, now targeting U.S. sites was formed to counter social protests and political activism inside Iran, America’s natural allies in this war are the Iranian people and the organized opposition.

Related: 2013: The Iranian Cyber Threat, Revisited

Statement before the U.S. House of Representatives Committee on Homeland Security/Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

******

In 2014: As international scrutiny remains focused on the Islamic Republic of Iran’s nuclear program, a capability is developing in the shadows inside Iran that could pose an even greater threat to the United States. The 2010 National Security Strategy discusses Iran in the context of its nuclear program, support of terrorism, its influence in regional activities, and its internal problems. There was no mention of Iran’s cyber capability or of that ability to pose a threat to U.S. interests. This is understandable, considering Iran has not been a major concern in the cyber realm. Furthermore, Russia and China’s cyber activities have justifiably garnered a majority of attention and been widely reported in the media over the past decade. Iran’s cyber capabilities have been considered third-tier at best. That is rapidly changing. This report discusses the growing cyber capability of Iran and why it poses a new threat to U.S. national interests.

Iran in a Cyber Context.
      Just as computing power grows exponentially each year, so can an adversary’s cyber capabilities. When one considers the origins of world-class cyber threats to the United States, two countries immediately come to mind—Russia and China. Yet with its growing cyber capabilities and intent to use them, Iran is rapidly striving to earn a position among the ranks of this nefariously elite group. For decades, the U.S. Government has publicly acknowledged concern over Iran’s efforts to develop a nuclear program to counter U.S. military capabilities. Recently, the 2014 Quadrennial Defense Review stated that, “Over the past 5 years, a top Administration priority in the Middle East has been preventing Iran from acquiring a nuclear weapon.”2 This focus on Iran’s nuclear ambitions has distracted many from Iran’s other developing capability. In the last few years, Iran’s cyber proficiency has garnered the attention of a select few government officials and private industry leaders. In late-2011, the executive chairman of Google stated, “The Iranians are unusually talented in cyber war for some reason we don’t fully understand.”3 Stopping a cyber adversary from disrupting activity or stealing intellectual property has been the primary concern of government and private sector organizations, but in the military and intelligence communities, there are other concerns about Iran. More here.

Trump: America First, Foreign Policy Presentation

Good for Donald Trump, America should be first when it comes to policy and diplomacy. Applause to the Donald for that standard. Well said.

Tell us again how to pronounce Tanzania or San Bernardino.

What was not said however is disturbing for those who have a keen interest in foreign policy. Of particular note, the Ambassador of Russia was sitting on the front row. Perhaps this is but one reason, Trump never mentioned Russia or Vladimir Putin.

Remember it was only recently that Russia has been more than provocative in reckless actions against a U.S. destroyer and U.S. military aircraft. This is a violation of the IncSea Treaty. This is not the first time either, noting Russian bombers off the West Coast and the same with our European allies. What about the Baltic States, Crimea or Ukraine? Anything?

What about the constant war in the cyber realm? Trump did mention artificial intelligence, does he know what that is? What about electronic or economic warfare?

al Qaeda, Boko Harem, Haqqani, Jabhat al-Nusra, Houthis? Nah….the plight of Jews and Christians, Yazidis, Peshmerga? Standing with France on their recent attacks? Nothing about China’s aggression with the new islands and fighter jets there?

Well said Donald on the destruction of Islamic State, high marks for that. Additional high marks for the IRGC and kidnapping our sailors.

Trump made a mere simple reference to Iran and their nuclear program, stating they will never have a nuclear weapon and the Joint Plan of Action was a bad deal. How come no reference to Iran being a violator of conventions, a rogue state sponsor of terror? Nothing about the Iranian Revolutionary Guard Corp or Hezbollah or IED’s made by Iran that killed and maimed our soldiers? What about Iran’s collusion with North Korea? Anything on that? No…

Does Trump approve of John Kerry’s work as the current Secretary of State? Humm, perhaps as Trump never mentioned Kerry.

Syria unleashed Islamic State? Really? Trump blames China for North Korea. Does Donald think that China is fully, exclusively responsible and accountable for Kim Jung Un?

Why no mention of foreign aid? There is likely a bailout coming for Puerto Rico. Does Trump have a clue on that? When it comes to NATO, Trump backed off and merely mentioned that only four member countries pay the 2% of GDP. Never a mention that countries do pay the United States for bases and protection like Philippines and Japan. Did Trump slight Israel by not stating nurturing and restoring the relationship or is he still in a neutral position when it comes to the Palestinians? Hamas? Anything on human rights violations? What about the corruption of the United Nations?

When referencing Cuba, Trump correctly stated that Obama was slighted at the airport with no Cuban official being on the formal reception. Is Trump cool with normalizing relations with Cuba considering the treatment of dissidents or U.S. criminals that have receive safe haven on the island or the debt Cuba owes to U.S. domestic corporations for nationalizing them? What about Guantanamo as a whole?

Forgotten is a war we are currently fighting against the Taliban in Afghanistan…not a word at all by Trump.

Trump did layout his policy on foreign matters stating diplomacy, caution and restraint. That is always the standard. Did Trump mention he was going to revisit or retool those approaches? No….

Most disturbing, included in Trump’s foreign policy speech was the feeble condition of our own nuclear program and the military as a whole. Why explain any weakness at all where adversaries are listening with a keen ear? The U.S. military is still today the most advanced power on the globe while new technologies and weapons systems are in the future pipelines. Hey Donald, how about making a positive declaration about the military condition and the work of the Pentagon and the military collaboration with allies that does demonstrate strength?

Well, here is the text of his speech for your reference.

For additional reference, those included on Trump’s foreign policy team are:

Zalmay Khalilzad, the former Ambassador to Iraq and Afghanistan. He is under investigation. Trump only met Khalilzad earlier in the day. Further, the Ambassador stated that if Hillary had asked him to be part of her team, he would gladly do so.

Walid Phares, a Lebanese Christian and commentator on Middle East Affairs.

George Papadopoulos, energy consultant

Carter Page, energy consultant and lobbyist for Gazprom, a Russian energy company

Joe Schmitz, fired as former Inspector General, Department of Defense, formerly of Blackwater and his sister is Mary Kay Letourneau gained infamy after having a sexual relationship with her 12-year-old student, to whom she is now married.

LTG Keith Kellogg (ret), Chief Operating Officer of the Coalition Provisional Authority in Baghdad, Iraq

 

 

 

 

Cyber: New Strategic Operation v. ISIS

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the Cyber Command.

SecurityAffairs: The US Government has launched its cyber offensive against the coordinated by the Cyber Command. The strategy is clear, the use of hacking operations and cyber weapons will aim to destroy computer systems used by the ISIL and to track its cyber hubs.

In March, Senior Pentagon officials revealed the military’s first use of cyber warfare operations against the ISIL terrorist group.

The US military has started launching cyber attacks against members of the terrorist organization ISIS as part of the operation conducted to take back the Iraqi city of Mosul.

The US military is using cyber tools to contrast the ISIS troops in the area, interfering  members’ operation and communication.

Now the US Government wants to use all the hacking tools in its cyber arsenal against the Islamic State. The New Your Times revealed that until now the Cyber Command operations were more focused on cyber disputes against Russia, China, Iran, and North Korea.

“The National Security Agency, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing.” states the NYT. “But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world.”

The goal of the new campaign is to disrupt the propaganda activities managed by the Islamic State, but also interfere with IS daily functions, like paying its fighters.

“Our cyberoperations are disrupting their command-and-control and communications,” Mr. Obama saidat the C.I.A. headquarters in Langley, Va., on countering the Islamic State.

The deputy secretary of defense, Robert O. Work, confirmed the goals of the cyber operations that were conducted by a small number of “national mission teams.”

“We are dropping cyberbombs,” Mr. Work said. “We have never done that before.”

The NYT, citing interviews withs senior and midlevel officials, confirmed that the US cyber army has begun to deploy a series of “implants” in the networks of the Islamic State to spy on its commanders.

“Now, the plan is to imitate them or to alter their messages, with the aim of redirecting militants to areas more vulnerable to attack by American drones or local ground forces.” continues the NYT. “In other cases, officials said, the United States may complement operations to bomb warehouses full of cash by using cyberattacks to interrupt electronic transfers and misdirect payments.”

The fact that the US Government is admitting the use of cyber weapons that would have unpredictable effects over vast areas of the planet raising major questions over an invasion of sovereignty.

Of course, now we are speaking to contrast the Islamic State and everything seems to be admitted to destroying the threat.

“We’re trying to both physically and virtually isolate ISIL, limit their ability to conduct command and control, limit their ability to communicate with each other, limit their ability to conduct operations locally and tactically,” said Gen. Joseph F. Dunford Jr., the chairman of the Joint Chiefs of Staff,

“But I’ll be one of the first ones arguing that that’s about all we should talk about,” General Dunford said. “We want them to be surprised when we conduct cyberoperations. And, frankly, they’re going to experience some friction that’s associated with us and some friction that’s just associated with the normal course of events in dealing in the information age.”

Of course, part of the intelligence consider very dangerous the use of the implants against the Islamic State. The same implants are used to infiltrate the networks of foreign government and there is the concrete risk that these operations allow foreign intelligence agencies to detect them and neutralize their effects. Another side effect is that the Islamic State militants would stop the use of a communications channel starting one that was harder to monitor.

“N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.” states the NYT.

“It’s a delicate balance,” said Mr. Obama’s national security adviser, Susan E. Rice. “We still have to keep our eye on the Russia-China state-sponsored activity, but this was a new mission, one where we have to balance the collection equities against the disruption equities.”

Lisa O. Monaco, a deputy national security adviser and Mr. Obama’s top adviser met technology executives at IT giants calling for action against the online activities of the Islamic State.

****  

In part from the DailyBeast: The American military’s campaign of cyber attacks against ISIS is far more serious than what the president laid out in his bland description. Three U.S. officials told The Daily Beast that those operations have moved beyond mere disruption and are entering a new, more aggressive phase that is targeted at individuals and is gleaning intelligence that could help capture and kill more ISIS fighters.

As the U.S. ratchets up its online offensive against the terror group, U.S. military hackers are now breaking into the computers of individual ISIS fighters. Once inside the machines, these hackers are implanting viruses and malicious software that allow them to mine their devices for intelligence, such as names of members and their contacts, as well as insights into the group’s plans, the officials said, speaking on condition of anonymity to describe sensitive operations.

In remarks at CIA headquarters in Langley, Virginia, this week, Obama confirmed that cyber operations were underway and noted that recently the U.S. has either captured or killed several key ISIS figures, including Sulayman Dawud al-Bakkar, a leader of its chemical weapons program, and “Haji Iman,” the man purported to be ISIS’s second in command.

The military has also used cyber operations to block ISIS’s use of encrypted communications, in order to force members to use less secure channels where they can be more easily monitored, officials said. That tactic appears to be a response to ISIS’s effective use of encrypted text applications in particular, which officials had said previously made it harder for the military and intelligence community to track individual fighters.

Electronic Warfare, the Emerging War Platform

Russia Begins Test Of New Electronic Warfare System

DefenseWorld: Russia has begun testing a ground-based electronic warfare system that is capable of protecting the troops and civilian facilities from an air and space attack, TASS reported Monday.

A source from Concern Radio-Electronic Technologies (KRET), a subsidiary of State Corporation Rostec, told TASS that it has launched factory testing of components of a ground-based electronic warfare system, capable of protecting the troops and civilian facilities from air and space attack weapons. The tests will be completed during the year.

Integrated with antiaircraft defense systems, the electronic warfare system is capable of conducting real-time automated exchange of data on the actions of the aerospace grouping for purposes of centralized target assignment, according to the report.

The system consists of separate jamming modules that are capable of influencing the enemy’s command and control system at long distances emitting a powerful and complex digital signal. “Multichannel stations that ensure simultaneous inhibition of various avionics systems have been created”, the company representative said.

The consortium’s First Deputy Director General Igor Nasenkov is quoted by the company’s press service as saying that the jamming modules are elements of a hierarchically-structured multilevel system.

“Their energy, frequency and intellectual resources are distributed in an optimal way. In addition, all the modules are equipped with individual defense sets because they are the prime targets for enemy’s attack”, he said.

Previously, the company’s deputy head Yuri Mayevsky told TASS that the system will be installed on ground platforms, aircraft and offshore platforms.

*****

WASHINGTON: With the rise of high-tech threats from Russia and China, the Marine Corps plans a major increase in its forces devoted to jamming, hacking, and deceiving enemies. That includes:

  • putting new sensors and jammers in everything from ground units to drones to V-22 Osprey tiltrotors and KC-130 transports, despite a tight budget;
  • adding 1,000 to 3,000 more personnel, carved out of other parts of a Marine Corps legally limited to 182,000 active-duty troops. (That’s on top of a 1,300-plus increase in these specialties over the last several years);
  • retraining skilled electronic warriors from disbanded EA-6B Prowler squadrons to work with ground units and drones;
  • consolidating disparate disciplines — from offensive cyber warfare and electronic warfare to psychological operations and military deception — into a new “information warfare” force.

 Electronic Warfare (EW) represents the ability to use the electromagnetic spectrum—signals such as radio, infrared or radar—to sense, protect, and communicate. At the same time, it can be used to deny adversaries the ability to either disrupt or use these signals.

EW is divided into three (3) major areas:

Electronic Attack

Electronic Attack
Disrupting a signal, for example
electronic jammers
Electronic Protection
Preventing a receiver from being jammed
Electronic Support
Electronic Support
In the air, on land, and at sea, Lockheed Martin pioneers advanced technologies to control the electromagnetic spectrum, and develops disruptive technologies to outpace adversary threats. The key to success lies not only in the capability of the systems we provide, but integration of those systems across platforms to offer a complete picture of the battle space and unimpeded use of the electromagnetic spectrum for the warfighter.

Military Escalation in Iraq

InquisitR: The United States has deployed a squadron of tactical aircraft to be used in the efforts to defeat the Islamic State (ISIS) terrorist group that controls regions of Syria and Iraq, military officials announced this week. The warplanes, a squadron of Marine Corps EA-6B Prowler aircraft, were sent to Incirlik Air Base in Turkey to act as tactical support for U.S. and coalition operations.


CNN reported on April 15 that the U.S. European Command announced that the Prowler squadron, part of Marine Corps Tactical Warfare Squadron 4, were deployed to attack ISIS’s ability to communicate in areas of engagement. Mission specifics were not spelled out, of course, but Prowlers not only can intercept ISIS communications but also disrupt — or jam — frequencies of communication devices and radar. Jamming capability benefits are manifold, from disrupting cell phones used in triggering Improvised Explosive Devices (IEDs) to blocking ISIS propaganda transmissions.

Lt. Col. David Westover Jr., spokesperson for European Command, told CNN the following “the Prowler is a force multiplier continuing to do what it has for the last 45 years: support warfighters flying in the air and fighting on the ground by giving them the electronic communications dominance to ensure a decisive win.”

The Prowler aircraft has a long and distinguished history, dating back to its first deployment in the skies over Vietnam in 1972. Besides its more recent use in Iraq and Syria against ISIS (since 2014), the aircraft has also been instrumental in peace-keeping efforts around the world, such as when it was employed to assist in maintaining the “no-fly zone” over the war-torn area of former Yugoslavia in the 1990s.

The deployment of the Prowler squadron to aid in the fight against ISIS is just the latest addition to the armament being sent to combat the terrorist organization. Just last week, an untold number of B-52 Stratofortress bombers were deployed to Qatar to run missions against ISIS troop concentrations and targets of strategic value. It was the first time since Operation Desert Storm that B-52s had seen service in the Middle East, although a number of the Air Force’s oldest and most reliable aircraft had been used in the war in Afghanistan.

But Prowlers and B-52s aren’t the only weapons the U.S. military is now using to fight ISIS. It was announced earlier in the week, according to Reuters, that the U.S. and its coalition partners were also using cyber attacks as part of their military strategy against ISIS. This is done using “cyber bombs” against ISIS internet capabilities, placing increased pressure on the terrorist organization, which has been quite effective in disseminating terrorist propaganda online, not to mention its use of the internet as a recruitment tool.

Deputy Defense Secretary Robert Work said the following on Tuesday from an aircraft headed to a Colorado air base.

****

NYT: BAGHDAD — President Obama will send American military advisers closer to the front lines of the conflict against the Islamic State in Iraq, part of a series of measures that will broaden the United States military campaign against the extremist group there.

The advisers, who until now had been assisting Iraqi military divisions, which have about 10,000 troops, will now also work with units of about 2,000 soldiers who are more directly involved in day-to-day combat, according to Defense Department officials.

The officials said the advisers will not be on the actual front lines, but American and Iraqi commanders want them to move closer to the fighting so they can provide timely tactical guidance to the Iraqis as they prepare for the long-awaited assault on the northern city of Mosul, seized by the Islamic State in 2014.

Defense Secretary Ashton B. Carter made the announcement in a speech to dozens of American troops at the airport in Baghdad.

To give the Iraqis more capabilities on the battlefield, the Pentagon will also deploy a handful of Apache attack helicopters, Mr. Carter said. The Apaches, known for their withering — and accurate — rocket and cannon fire, can provide strong air support to ground forces. The Pentagon will also deploy several long-range artillery units, Mr. Carter added.

Earlier Monday, Mr. Carter flew by helicopter into the Green Zone, where he met with the Iraqi prime minister, Haider al-Abadi, who has been contending with Shiite leaders backed by Iran who oppose an expanded American role in the country.

In December, Mr. Abadi declined to take up the Pentagon when it offered him Apaches to help his forces.

“We’re on the same page as the Iraqi government,” Mr. Carter said on Monday.

The package of military aid will involve sending to Iraq more members of the Army Special Forces, or Green Berets, who specialize in advising and training foreign military forces. Mr. Obama will increase the number of American forces that commanders can use in Iraq by 217, to 4,087. That number, however, is largely symbolic because the Pentagon uses a system that has exceptions for commandos and soldiers who are supposed to be in the country less than four months. Defense Department officials have said that there are more than 5,000 service members in Iraq.

The Kurds are an important part of the anti-Islamic State campaign in the north, and Mr. Carter said the United States would give the Kurdish regional government more than $415 million.

The announcement came as the Obama administration has said that the campaign against the Islamic State, also known as ISIS or ISIL, is gaining momentum. In recent weeks, the Iraqi military reclaimed the city of Hit. At the end of December, the Iraqis, with the help of American air power, drove the Islamic State out of Ramadi, the biggest city in western Iraq.

Yet it has been nearly two years since the United States began military operations against the Islamic State and the organization still controls a significant portion of the northern and western parts of Iraq, including Mosul, the second largest city in the country. American commanders estimate that there are 5,000 Islamic State fighters in Mosul and about 5,000 more elsewhere in Iraq and more than 10,000 in Syria.