An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Chemical Weapons in Iraq and Beyond

During the first Gulf War, distribution was made to our soldiers for the protection of chemical weapons.

U.S. troops were frequently ordered to don their gas masks and protective suits. The term Mission Oriented Protective Posture (MOPP) refers to the amount of protective gear that troops are ordered to wear in response to an assessed chemical-warfare threat, and ranges from MOPP-0 (no protection) to MOPP-4 (the entire protective ensemble).

The incidents are recorded here by date, location and the type of chemical weapon. The Veterans Administration noted the types of risks and was careful omitting admission of chemical weapons, yet did include them on the website.

There was also congressional testimony in 1992/1993. One cannot ignore the in depth report the New York Times did about two years ago.

Soldiers Exposed to “Chemical Unknown” in Iraq not Getting Adequate FOIA Responses from DOD, and More: FRINFORMSUM 5/19/2016

May 19, 2016

 

The two-page 2003 Camp Taji Incident report -- released a dozen years after the dangerous exposure.

The two-page 2003 Camp Taji Incident report — released a dozen years after the dangerous exposure.

The Defense Department is telling soldiers that were exposed in 2003 to a “chemical unknown” in Taji, Iraq that it has no documents on the incident – after a decade of saying that documents on the event were classified.

C. J. Chivers of the The New York Times reported in May 2015 that, for over a decade, the US military denied FOIA requests on the chemicals soldiers were exposed to, resulting in chronic illnesses. The Army only released the two-page 2003 Camp Taji Incident report, written by the multinational Iraq Survey Group, after years of FOIA requests; the report found that the chemical soldiers came in contact with was a potentially fatal “carcinogen and poisonous chemical.” The Archive’s Director Tom Blanton told the Times in 2015 that, in addition to the secrecy trumping common sense, that “the outrage here is extraordinary.” Blanton noted, “Soldiers exposed to something really dangerous cannot find out what it was because ‘Sorry it’s classified’?” he said. “It’s creepy and it’s crazy.”

Now, according to reporting by Samantha Foster at the Topeka Capital-Journal, the Army is telling soldiers like Army Spc. Sparky Edwards and former Sgt. First Class Dennis Marcello that there are no documents on the chemical they were exposed to or the incident. Nate Jones, the Archive’s FOIA project director, notes that the DOD may be claiming to have no documents because they were possibly destroyed or misfiled during the war – or because the large, decentralized Defense Department genuinely doesn’t know where to look to find the records. Jones identifies this as a prime example of why FOIA requesters “must specify exactly where they want to search or risk the agency not going the extra mile” to find them, and that it is always a good idea to appeal a “no records” response.

According to Department of Justice statistics, last fiscal year an obscenely high 130,113 FOIA requests (16.9 percent of requests processed) were deemed to result in “no records” responses. As the Archive has learned, more often than not, appealing a “no records” response and explaining why you think the records exist and even suggesting which records (including the Washington Records Center –control f) the agency should search leads to more records being found. Link for citation is here.

As recently as last month, it was found that Islamic State had taken cached and reserve chemical weapons and made a new factory at Mosul University.

Just last week:

ISIS testing chemical weapons on prisoners and animals in grisly laboratories

VILE Islamic State (ISIS) jihadis are testing chemical weapons on its prisoners in grisly suburban laboratories, terrified Iraqi citizens have claimed.

ExpressUK: The sick militants are testing chlorine and mustard gas on its captives, in direct opposition to the Geneva Protocol’s war crime guidelines.

ISIS’s laboratories are located deep within its territory in the city of Mosul in northern Iraq.

 

The lunatic extremists are understood to be working frantically to improve its chemical and nuclear weapon capabilities, with plans to launch attacks in Iraq, Syria and on the West.

Abu Shaima, the head of ISIS’s chemical warfare unit, has now moved the operation away from the city’s university to residential areas like al-Mohandseen, which are surrounded by innocent civilian homes.

Concerned residents have reported several houses in the area have now been taken over by ISIS researchers, according to The Telegraph.

Chillingly, dozens of dead dogs and rabbits have also been found nearby, hinting at the cruel experiments taking place within, while nearby residents are suffering from breathing difficulties and rashes.

The extremists are believed to have seized chemicals and weapons from Syrian forces, with which they have already launched a devastating chemical attack on the Iraqi town of Taza.

That attack this March killed a three-year-old girl and injured 600 others, as well as highlighting the terror group’s chemical warfare intentions.

Hamish de Bretton-Gordon, formerly of the UK Chemical, Biological, Radiological and Nuclear Regiment, said: “ISIL’s chemical weapons operation has been heavily targeted – as is detailed in this report – and moving into residential areas is exactly what you would expect them to do now.

“Now we know the extent of the ISIL chemical and dirty bomb aspirations we must make doubly sure that our security in the UK is absolutely water-tight against this threat.”

Iraqi forces uncover an Islamic State weapon hideaway including gas canisters used to make homemade bombs. For the slide show on photos, go here.

*****

Chemical Agents as Weapons of Terror Rather Than as Weapons of Mass Destruction

In February 2012, the Director of the Defense Intelligence Agency identified that “terrorist organizations are working to acquire and employ chemical, biological, and radiological materials.”43 Many experts believe that it would be difficult for terrorist groups to use chemical agents as weapons of mass destruction. In 1993, the Office of Technology Assessment estimated that VX, the most lethal of nerve agents, spread uniformly and efficiently would require tons of material to kill 50% of the people in a 100 km2 area.44 On the other hand, chemical agents might be effectively used as weapons of terror in situations where limited or enclosed space might decrease the required amounts of chemical. That is, the use of the weapon itself, even if casualties are few, could cause fear that would magnify the attack’s effect beyond what would be expected based solely on the number of casualties. Full summary here.

 

What Obama Did Not Mention in Hiroshima

Obama started off his speech by saying death fell from the sky. Sigh…. What is more interesting is part of his speech in both audio and text that has been published has been edited already. The sentence that has been removed by most sites is this:

“Let all the souls here rest in peace, for we shall not repeat the evil,” the president said. “We come to ponder the terrible force unleashed in the not so distant past. We come to mourn the dead.”

Evil?

Well there are some facts that the Obama White House protocol office and speechwriters clearly don’t know about that day Japan surrendered, where General McArthur crafted a well organized day demonstrating the full might of the United States and her military in the face of the Japanese aboard our battleship.

Every one of the Missouri’s crew received a card like this for taking part in the surrender in Tokyo Bay almost 59 years ago.

Every one of the Missouri’s crew received a card like this for taking part in the surrender in Tokyo Bay almost 59 years ago.

Tokyo Bay at the signing of the surrender by Japan:  

Douglas MacArthur Receives the Japanese Surrender

Tokyo Bay : 2 September 1945

Japan’s formal capitulation to the Allies climaxed a week of historic events as the initial steps of the occupation program went into effect. The surrender ceremony took place aboard the Third Fleet flagship, U. S. S. Missouri, on the misty morning of Sunday, 2 September 1945. As the Missouri lay majestically at anchor in the calm waters of Tokyo Bay, convoys of large and small vessels formed a tight cordon around the surrender ship, while army and navy planes maintained a protective vigil overhead. This was the objective toward which the Allies had long been striving-the unconditional surrender of the previously undefeated military forces of Japan and the final end to conflict in World War II.

The decks of the Missouri that morning were crowded with the representatives of the various United Nations that had participated in the Pacific War. Outstanding among the Americans flanking General MacArthur were Admirals Nimitz and Halsey, and General Wainwright who had recently been released from a Manchurian internment camp, flown to Manila, and then brought aboard to witness the occasion. Present also were the veteran staff members who had fought with General MacArthur since the early dark days of Melbourne and Port Moresby.

Shortly before 0900 Tokyo time, a launch from the mainland pulled alongside the great United States warship and the emissaries of defeated Japan climbed silently and glumly aboard. The Japanese delegation included two representatives empowered to sign the Instrument of Surrender, Mamoru Shigemitsu, Minister of Foreign Affairs and Gen. Yoshijiro Umezu of the Imperial General Staff, in addition to three representatives from the Foreign Office, three representatives from the Army, and three representatives from the Navy.68

As Supreme Commander for the Allied Powers, General MacArthur presided over the epoch-making ceremony, and with the following words he inaugurated the proceedings which would ring down the curtain of war in the Pacific:

We are gathered here, representatives of the major warring powers, to conclude a solemn agreement whereby peace may be restored. The issues, involving divergent ideals and ideologies, have been determined on the battlefields of the world and hence are not for our discussion or debate. Nor is it for us here to meet, representing as we do a majority of the people of the earth, in a spirit of distrust, malice or hatred. But rather it is for us, both victors and vanquished, to rise to that higher dignity which alone befits the sacred purposes we are about to serve, committing all our peoples unreservedly to faithful compliance with the understandings they are here formally to assume.

It is my earnest hope, and indeed the hope of all mankind, that from this solemn occasion a better world shall emerge out of the blood and carnage of the past-a world dedicated to the dignity of man and the fulfillment of his most cherished wish for freedom, tolerance and justice.

The terms and conditions upon which surrender of the Japanese Imperial Forces is here to be given and accepted are contained in the instrument of surrender now before you ….69

The Supreme Commander then invited the two Japanese plenipotentiaries to sign the duplicate surrender documents: Foreign Minister Shigemitsu, on behalf of the Emperor and the Japanese Government, and General Umezu, for the Japanese Imperial General Headquarters. He then called forward two famous former prisoners of the Japanese to stand behind him while he himself affixed his signature to the formal acceptance of the surrender: Gen. Jonathan M. Wainwright, hero of Bataan and Corregidor and Lt. Gen. Sir Arthur E. Percival, who had been forced to yield the British stronghold at Singapore.

General MacArthur was followed in turn by Admiral Nimitz, who signed on behalf of the United States, and by the representatives of the other United Nations present: Gen. Hsu Yung-Chang for China, Adm. Sir Bruce Fraser for the United Kingdom, Lt. Gen. Kuzma N. Derevyanko for the Union of Soviet Socialist Republics, Gen. Sir Thomas A. Blarney for Australia, Col. L. Moore-Cosgrave for Canada, Gen. Jacques P. LeClerc for France, Adm. Conrad E. L. Helfrich for the Netherlands, and Air Vice-Marshall Leonard M. Isitt for New Zealand.

The Instrument of Surrender was completely signed within twenty minutes. (Plate No. 132) The first signature of the Japanese delegation was affixed at 0904; General MacArthur wrote his name at 0910; and the last of the Allied representatives signed at 0920. The Japanese envoys then received their copy of the surrender document, bowed stiffly and departed for Tokyo. Simultaneously, hundreds of army and navy planes roared low over the Missouri in one last display of massed air might.

In signing the Instrument of Surrender, the Japanese bound themselves to accept the provisions of the Potsdam Declaration, to surrender unconditionally their armed forces wherever located, to liberate all internees and prisoners of war, and to carry out all orders issued by the Supreme Commander for the Allied Powers to effectuate the terms of surrender.

On that same eventful day, the Supreme Commander broadcast a report to the people of the United States. Having been associated with Pacific events since the Russo-Japanese war, General MacArthur was able to speak with the authority of long experience to forecast a future for Japan:

We stand in Tokyo today reminiscent of our countryman, Commodore Perry, ninety-two years ago. His purpose was to bring to Japan an era of enlightenment and progress by lifting the veil of isolation to the friendship, trade and commerce of the world. But, alas, the knowledge thereby gained of Western science was forged into an instrument of oppression and human enslavement. Freedom of expression, freedom of action, even freedom of thought were denied through supervision of liberal education, through appeal to superstition and through the application of force. We are committed by the Potsdam Declaration of Principles to see that the Japanese people are liberated from this condition of slavery. It is my purpose to implement this commitment just as rapidly as the armed forces are demobilized and other essential steps taken to neutralize the war potential. The energy of the Japanese race, if properly directed, will enable expansion vertically rather than horizontally. If the talents of the race are turned into constructive channels, the country can lift itself from its present deplorable state into a position of dignity….70

Immediately following the signing of the surrender articles, the Imperial Proclamation of capitulation was issued. The Proclamation, the draft of which had been given to General Kawabe at Manila, read as follows:

Accepting the terms set forth in the Declaration issued by the heads of the Governments of the United States, Great Britain and China On July 26th 1945 at Potsdam and subsequently adhered to by the Union of Soviet Socialist Republics, We have commanded the Japanese Imperial Government and the Japanese Imperial General Headquarters to sign on Our behalf the instrument of surrender presented by the Supreme Commander for the Allied Powers and to issue General Orders to the Military and Naval forces in accordance with the direction of the Supreme Commander for the Allied Powers.

We command all Our people forthwith to cease hostilities, to lay down their arms and faithfully to carry out all the provisions of the Instrument of Surrender and the General Orders issued by the Japanese Imperial Government and the Japanese Imperial General Headquarters hereunder.71

Plate No. 132, Surrender Document

Plate No. 132, Surrender Document More here.

1. Although the formal surrender of Japan did not occur until September 2, 1945 aboard the U.S.S. Missouri, the occupation of that nation began five days earlier when a team of 150 American personnel arrived at Atsugi airfield on August 28. They were originally supposed to arrive on August 25 but a Japanese delegation in Manila informed the Americans that several more day were needed to ensure that military resistors to the surrender could be disarmed. They were correct since a few days before the Americans arrived, Japanese pilots took off from Atsugi airfield and dropped leaflets on Tokyo and other cities urging resistance by the civilians. Fortunately those pilots were gone, along with any resistance, by the time the Americans arrived at Atsugi.

2. The surrender ceremony aboard the U.S.S. Missouri on September 2 was carefully planned…except for one small but very important detail. The fancy British mahony table brought aboard the Missouri for the surrender was too small for the two large documents that had to be signed. In desperation, an ordinary table from the crew’s mess was drafted as a replacement. It was covered by a green coffee-stained tablecloth from a wardroom. After the 2 surrender documents were signed on the table, it was returned to the mess and was being set for lunch until the ship’s captain and others realized it was an historical object and removed for posterity.

3. There were 280 allied warships in Tokyo Bay when the surrender took place but no aircraft carriers. They were out at sea as a reserve force just in case the Japanese changed their minds.

4. There was a thick cover of low dark clouds over Tokyo Bay during the 20 minute surrender ceremony. Unfortunately, 2000 planes were scheduled to fly over the bay the moment the ceremony finished. However, at the last moment the clouds suddenly parted, as if in a Hollywood movie production, and the sun burst through allowing all aboard the U.S.S. Missouri to view the mightiest display of air power ever seen.

5. When Emperor Hirohito announced over the radio the acceptance of the allied terms of surrender on August 15 (Tokyo time), very few Japanese listening to him understood what he was saying because he was using formal formal court language not used by the general populace. It wasn’t until the radio announcers followed up by describing what he said that the public understood what he meant.

6. After Emperor Hirohito made his surrender announcement, the Japanese public ran through a gamut of emotions…anger, despair, sadness, and relief. However, one Japanese person had a very different thought on his mind…how to make money off the surrender. He was Ogawa Kikumatsu, a book editor. Ogawa was on a business trip when the surrender was announced on the radio. He immediately returned to Tokyo by train and while traveling he began thinking of how to take advantage of the impending occupation.. By the time he reached Tokyo, he had his idea…to publish a guide booklet of Japanese phrases translated into English with the aid of phonetics. It took less than three days for Ogawa and his team to prepare the 32 page booklet and it was published exactly a month after the surrender. Its first run of 300,000 copies sold out immediately and by the end of 1945, 3.5 million copies had been sold.

 

 

Tech, One Extreme to Another

Does anyone remember the floppy disk? How about Windows Me or COBOL?

Sheesh….

Gov’t report: Feds spend billions to run ancient technology

In a report to be released Wednesday, nonpartisan congressional investigators say the increasing cost of maintaining museum-ready equipment devours money better spent on modernization.

Despite a White House push to replace aging workhorse systems, the budget for modernization has fallen, and will be $7 billion less in 2017 than in 2010, said the Government Accountability Office. The report was provided to The Associated Press ahead of a House oversight committee hearing.

GAO said it found problems across the government, not just in a few agencies. Among those highlighted in the report:

The Defense Department’s Strategic Automated Command and Control System, which is used to send and receive emergency action messages to U.S. nuclear forces. The system is running on a 1970s IBM computing platform, and still uses 8-inch floppy disks to store data. “Replacement parts for the system are difficult to find because they are now obsolete,” GAO said. The Pentagon is initiating a full replacement and says the floppy disks should be gone by the end of next year. The entire upgrade will take longer.

Treasury’s individual and business master files, the authoritative data sources for taxpayer information. The systems are about 56 years old, and use an outdated computer language that is difficult to write and maintain. Treasury plans to replace the systems, but has no firm dates.

Social Security systems that are used to determine eligibility and estimate benefits, about 31 years old. Some use a programming language called COBOL, dating to the late 1950s and early 1960s. “Most of the employees who developed these systems are ready to retire and the agency will lose their collective knowledge,” the report said. “Training new employees to maintain the older systems takes a lot of time.” Social Security has no plans to replace the entire system, but is eliminating and upgrading older and costlier components. It is also rehiring retirees who know the technology.

Medicare’s Appeals System, which is only 11 years old, but facing challenges keeping up with a growing number of appeals, as well as questions from congressional offices following up on constituent concerns. The report says the agency has general plans to keep updating the system, depending on the availability of funds.

The Transportation Department’s Hazardous Materials Information System, used to track incidents and keep information relied on by regulators. The system is about 41 years old, and some of its software is no longer supported by vendors, which can create security risks. The department plans to complete its modernization program in 2018.

GAO estimates that the government spent at least $80 billion on information technology, or IT, in 2015. However, the total could be significantly higher. Not counted in the report are certain Pentagon systems, as well as those run by independent agencies, among them the CIA. Major systems are known as “IT investments” in government jargon. More here from WashingtonPost.

*****

Smarter than Google?

This new search engine could be way smarter than Google

Search engines that aren’t Google rarely have much that’s interesting to offer to the average consumer. But Omnity, a new search engine aimed at researchers — or even just students doing their homework — offers some glimmers of something new that make it worth taking notice.

Search, as we know it, is ripe for some sort of change, after all. Google is certainly working to bake search more fully into our cars, phones and other devices. Specialized search engines — for flights, places to stay, even .gifs — are going strong.  And then there are those AI bots being promised by Google, Facebook, Microsoft and others. What are they but high-powered, repackaged search engines?

Omnity stands out by offering results that best match for any given search term and also how those results relate to each other. So if you’re about to start a research project on a topic you know little about, you can quickly see who is getting cited the most, whose research is the most influential or which university is leading the pack on that subject. It draws from a number of data sets, including SEC filings, public news organization reports, scientific journals, financial reports and legal histories.

You can also drag and drop documents into the search engine to get an analysis of the “rare words” in it — Omnity obviously strips out the little words like “he,” “she,” “it” and “but,” yet also looks for words that are more unique to any given document to get a better idea of what it’s about. For example, I dragged in a legal filing from a case I’m researching for another article. Omnity turned up links to other cases that were relevant but not directly cited in the filing, as well as the names of some experts that I may now end up calling. More from WashingtonPost.

 

Obama Concession to Iran: Russian Arms?

Obama Admin Considers Permitting Advanced Russian Arms Sales to Iran

White House might not invoke laws triggering new sanctions
FreeBeacon: The Obama administration has the power to sanction key Russian arms sales to Iran, but has so far abstained from exercising this right under U.S. law, prompting some in Congress to question whether the administration is “acquiescing” to the arms sales in order to appease Iran, according to conversations with sources and recent congressional correspondence to the White House exclusively obtained by the Washington Free Beacon.

President Barack Obama has the authority under U.S. law to designate as illegal Russia’s contested sale to Iran of the S-300 missile system, an advanced long-range weapon that would boost the Islamic Republic’s regional military might.

However, the administration has declined for weeks to clarify its stance on new sanctions, despite expressing opposition to the sale. Administration officials have further declined to answer questions from the Free Beacon and other outlets about whether the president will consider taking action in the future.

The administration’s hesitance to act has prompted a new congressional inquiry, the Free Beacon has learned, and has sparked accusations that the White House is not exercising its sanction authority in order to prevent Iran from walking away from last summer’s nuclear deal.

Rep. Steve Chabot (R., Ohio) sent an inquiry to the White House about the matter more than a month ago. The White House has not responded.

“Given the series implications for the United States and our allies in the region, I respectfully request that you quickly determine that Russia’s transfer of S-300 surface-to-air missile systems advance Iran’s efforts to acquire ‘destabilizing numbers and types of advances conventional weapons’ and impose the necessary U.S. sanctions once the Russian delivery takes place,” Chabot wrote to the White House on April 7, according to a copy of the letter obtained by the Free Beacon.

Chabot outlined concern “that without such a determination the United States may be viewed as acquiescing to this transfer” of a major defensive weapons system to Iran.

Chabot told the Free Beacon on Thursday the administration has not responded to multiple inquiries about the potential designation.

“Despite multiple inquires to the U.S. Department of State, I still have not received a response on Russia’s S300 surface-to-air missile system transfer to Iran,” Chabot said. “This apparent dismissal leaves me wondering what exactly the Administration is hiding. I am really asking a simple question – is the introduction of a sophisticated weapon system into Iran, that has not been there previously, going to illicit the appropriate U.S. sanctions response? I am not sure why the Administration has found it so hard to come to a determination. The S300 is one of the most advanced anti-aircraft missile system’s in the world and significantly bolsters Iran’s offensive capabilities and stands as a serious hurdle to our efforts to prevent Iran from becoming a nuclear armed state. This is absolutely a destabilizing conventional weapon system.”

When contacted for comment, a State Department official told the Free Beacon that the administration has not made a final determination about whether the S-300 sale would trigger additional U.S. sanctions.

“We’re continuing to closely follow reports concerning the delivery of the S-300 defensive missile system from Russia to Iran‎,” the official said. “We have not made a determination as to whether this delivery, if and when complete, would trigger any actions under U.S. authorities.”

“These systems would significantly bolster Iran’s offensive capabilities and introduce new obstacles to our efforts to eliminate the threat of an Iranian nuclear weapon. I believe existing U.S. sanctions should be used to deter Russia from transferring this or other dangerous weapons systems to Iran,” Chabot said.

The sale is technically permitted under current United Nations resolutions governing weapons sales. However, the Obama administration has the right to veto the sale at the U.N. Security Council. The administration has not committed to doing so.

U.S. law also grants the president the right to designate such sales as illicit and therefore open to sanctions.

The Iran-Iraq Arms Nonproliferation Act of 1992 grants the president authority to sanction the sale of “advanced conventional weapons” to Iran by any nation.

“U.S. law provides your administration with the authority to apply U.S. sanctions in response” to the sale, Chabot explains in his letter. “For example, the Iran-Iraq Arms Nonproliferation Act and the Iran Sanctions Act provide authority for you to sanction individuals or countries that you determine are aiding Iran’s efforts to acquire or develop ‘destabilizing numbers and types of advanced conventional weapons.’”

Sanctions would kick in if the president decides that such a sale would destabilize the Middle East and shift regional balance.

“Iran’s acquisition of these systems would embolden Tehran to adopt a more threatening regional posture and to pursue offensive activities detrimental to regional stability in the belief that the systems would deter retaliation,” according to Chabot.

Reporters as well as lawmakers have attempted for weeks to get an answer from the administration about whether the president would make such a determination.

One foreign policy adviser who works closely with Congress on the Iran issue told the Free Beacon that the administration can no longer waffle on the issue.

“The administration tried to look the other way, but got called out for it by Congress. Then they spent a month and a half hoping that the whole thing would go away,” the source said. “Now I don’t know what they’re going to do, since it’s obvious that they’re letting Iran import advanced weapons in violation of U.S. law just to preserve the nuclear deal.”

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”