The 7th Fleet Deployment v. China

 

SOUTH CHINA SEA – USS Stockdale (DDG 106) is conducting a routine patrol in international waters of the South China Sea as part of the John C. Stennis Strike Group and Great Green Fleet on a regularly scheduled 7th Fleet deployment.

“The strike group is exercising our right to operate in international waters,” said Rear Adm. Ron Boxall, commander, John C. Stennis Strike Group. “Our presence here promotes peace and stability in the region. We’ve got vibrant economies in the Western Pacific, and it’s really important for us to be there for our national interests and to ensure that we can keep the sea lanes free.”

In recent months, other U.S. Navy ships have conducted similar operations in the 7th Fleet area of operations including the Arleigh Burke-class guided-missile destroyers USS Curtis Wilbur (DDG 54), USS Lassen (DDG 82), USS McCampbell (DDG 85) and USS Preble (DDG 88), the multi-purpose amphibious assault ship USS Essex (LHD 2), the Ticonderoga-class guided missile cruiser USS Chancellorsville (CG 62) and the Freedom-class littoral combat ship USS Fort Worth (LCS 3). The amphibious dock landing ship USS Ashland (LSD 48) completed a similar patrol, Feb. 26.

Stockdale is currently on patrol in 7th Fleet as part of the John C. Stennis Strike Group (JCSSG). The strike group is comprised of USS John C. Stennis (CVN 74) with Carrier Airwing (CVW) 9 and Destroyer Squadron (DESRON) 21 embarked, Arleigh Burke-class guided-missile destroyers USS Chung-Hoon (DDG 93), USS Stockdale (DDG 106), USS William P. Lawrence (DDG 110) and Ticonderoga-class guided-missile cruiser USS Mobile Bay (CG 53).

CVW-9 consists of Helicopter Maritime Strike Squadron (HSM) 71, Helicopter Sea Combat Squadron (HSC) 14, Airborne Early Warning Squadron (VAW) 112, Electronic Attack Squadron (VAQ) 133 and Strike Fighter Squadrons (VFA) 151, 97, 41, 14.

JCSSG is providing a ready force supporting security and stability in the Indo-Asia- Pacific.

****

For a full photo essay, go here.

What China Has Been Building in the South China Sea

NYT: China has placed runways and radar facilities on new islets in the South China Sea, built by piling huge amounts of sand onto reefs. The construction is straining already taut geopolitical tensions.

The speed and scale of China’s island-building spree in the South China Sea last year alarmed other countries with interests in the region. After announcing in June that the process of building seven new islands by moving sediment from the seafloor to reefs was almost done, China has focused its efforts on building ports, three airstrips, radar facilities and other military buildings on the islands. The installations bolster China’s foothold in the Spratly Islands, a disputed scattering of reefs and islands in the South China Sea more than 500 miles from the Chinese mainland. China’s activity in the Spratlys is a major point of contention between China and the United States, and has prompted the White House to send Navy destroyers to patrol near the islands twice in recent months.

The speed and scale of China’s island-building spree in the South China Sea last year alarmed other countries with interests in the region. After announcing in June that the process of building seven new islands by moving sediment from the seafloor to reefs was almost done, China has focused its efforts on building ports, three airstrips, radar facilities and other military buildings on the islands. The installations bolster China’s foothold in the Spratly Islands, a disputed scattering of reefs and islands in the South China Sea more than 500 miles from the Chinese mainland. China’s activity in the Spratlys is a major point of contention between China and the United States, and has prompted the White House to send Navy destroyers to patrol near the islands twice in recent months.

Sources: C.I.A., NASA, China Maritime Safety Administration

The new islands allow China to harness a portion of the sea for its own use that had been relatively out of reach. Although there are significant fisheries and possible large oil and gas reserves in the South China Sea, China’s efforts serve more to fortify its territorial claims than to help it extract natural resources, said Mira Rapp-Hooper, formerly the director of the Asia Maritime Transparency Initiative at the Center for Strategic and International Studies, a Washington research group. Though they are too small to support large military units, the islands will also enable sustained air and sea patrols, strengthening China’s influence in the area.

***

Several reefs have been destroyed outright to serve as a foundation for the new islands, and the process also causes extensive damage to the surrounding marine ecosystem. Frank Muller-Karger, professor of biological oceanography at the University of South Florida, said sediment “can wash back into the sea, forming plumes that can smother marine life and could be laced with heavy metals, oil and other chemicals from the ships and shore facilities being built.” Such plumes threaten the biologically diverse reefs throughout the Spratlys, which Dr. Muller-Karger said may have trouble surviving in sediment-laden water. 

Although China was a relative latecomer to construction in the Spratly archipelago, its island building is much more extensive than similar efforts by other countries in the area. The recent activity has unsettled the United States, which has about $1.2 trillion in bilateral trade go through the South China Sea every year.

Washington does not recognize China’s ownership of the islands, and in February President Obama reiterated the government’s position that “the United States will continue to fly, sail and operate wherever international law allows.” To reinforce the message, the United States Navy sent missile destroyers in October and January within 12 nautical miles of the islands, the conventional limit for territorial waters. According to statements from David Shear, the top Pentagon official in charge of Asia and the Pacific, the last time before October that the United States had sent ships or aircraft that close to the islands was in 2012.

***

What Is on the Islands

China has built airstrips, ports, radar facilities, solar arrays, lighthouses and support buildings on the islands. The airstrips and ports lengthen the reach of Chinese ships and planes, while the radar facilities allow the country to keep a closer eye on what is happening nearby. Imagery from January compiled for a recent report by the C.S.I.S. suggests that China may be constructing a longer-range high-frequency radar installation on Cuarteron Reef that would help the country monitor air and ship traffic in the south, farther from the Chinese mainland.

***

Fiery Cross Reef is one of China’s most strategically important new islands, with an airstrip that is long enough to allow the country to land any plane, from fighter jets to large transport aircraft.

***

Two additional airstrips on Mischief Reef and Subi Reef that China has been building since mid-2015 are nearing completion, bringing China’s total to three airstrips in the region.

***

Though China’s airstrips expand the country’s ability to operate in the South China Sea, they are not the first in the region — every other country that occupies the Spratlys already operates an airstrip as well.

***

Vietnam, Malaysia, the Philippines and Taiwan have also expanded islands in the Spratlys, but at a much smaller scale than China’s efforts.

***

China’s reefs hosted smaller structures for years before the current surge in construction. By preserving these initially isolated buildings, China can claim that it is merely expanding existing facilities, similar to what other countries have done elsewhere in the region.

***

Construction on Johnson South Reef from January 2014 to February 2016.

Image by DigitalGlobe, via CSIS Asia Maritime Transparency Initiative

 

Escalating Military Conflict in Iraq and S. China Sea?

US sending nuclear-capable B-52 bombers to ISIS fight

FNC: The United States is sending nuclear-capable B-52 aircraft to drop bombs on the Islamic State terror group, defense officials confirmed to Fox News Friday.

The B-52 Stratofortress will start its first bombing campaign against ISIS in April, the Air Force Times reports. It’s not clear how many B-52s or airmen will be involved.

Officials say the aircraft will replace nuclear-capable B-1 Lancers hitting ISIS targets in Iraq and Syria.

The Lancers returned to home bases in the U.S. in January. They flew only 3% of all strike missions against ISIS, but had dropped 40% of the bombs and other munitions. B-1s could loiter over the battlefield for 10 hours, much longer than jet fighters, and also could fly supersonic, reaching targets across Iraq and Syria within minutes.

“The B-1s are rotated out, so they’re not here right now, they’ve gone back to do some upgrades,” Lieutenant General Charles Q. Brown Jr., commander at U.S. Air Forces Central Command, told reporters.  More here.

The U.S. just sent a carrier strike group to confront China

The U.S. Navy has dispatched a small armada to the South China Sea.

NavyTimes: The carrier John C. Stennis, two destroyers, two cruisers and the 7th Fleet flagship have sailed into the disputed waters in recent days, according to military officials. The carrier strike group is the latest show of force in the tense region, with the U.S. asserting that China is militarizing the region to guard its excessive territorial claims.

Stennis is joined in the region by the cruisers Antietam and Mobile Bay, and the destroyers Chung-Hoon and Stockdale. The command ship Blue Ridge, the floating headquarters of the Japan-based 7th Fleet, is also in the area, en route to a port visit in the Philippines. Stennis deployed from Washington state on Jan. 15.

The Japan-based Antietam, officials said, was conducting a “routine patrol” separate from the Stennis, following up patrols conducted by the destroyer McCambell and the dock landing ship Ashland in late February.

The stand-off has been heating up on both sides. After news in February that the Chinese deployed an advanced surface-to-air missile battery to the Paracel Islands, U.S. Pacific Command head Adm. Harry Harris told lawmakers that China was militarizing the South China Sea.

“In my opinion China is clearly militarizing the South China Sea,” Harris testified on Feb. 24. “You’d have to believe in a flat Earth to believe otherwise.”

Overnight, Chinese officials dismissed claims that China was militarizing the region, pointing to the Stennis’s patrol as evidence that the U.S. was to blame for the increased military tensions.

“The accusation [that China is militarizing the region] can lead to a miscalculation of the situation,” said Fu Ying, a spokeswoman for China’s National People’s Congress. “If you take a look at the matter closely, it’s the US sending the most advanced aircraft and military vessels to the South China Sea.”

A Pacific Fleet spokesman downplayed the heavy U.S. presence in the region.

“Our ships and aircraft operate routinely throughout the Western Pacific — including the South China Sea — and have for decades,” Cmdr. Clay Doss said in a statement. “In 2015 alone, Pacific Fleet ships sailed about 700 combined days in the South China Sea.”

However, experts say sending Stennis and its air wing to the South China Sea is a clear signal to China and the region.

“Clearly the Navy and DoD is demonstrating its full commitment to presence and freedom of navigation in the region,” said Jerry Hendrix, a retired Navy captain and analyst with the Center for a New American Security in Washington, D.C. “With the full carrier strike group and the command ship, the Navy is showing the scope of its interests and ability to project presence and power around world.”

The destroyer Lassen’s vaunted October patrol within the 12-mile limit of China’s man-made South China Sea islands was the first challenge of China’s sovereignty over the Spratly Islands since Chinese land-reclamation projects began there.

On Jan. 30, the destroyer Curtis Wilbur patrolled near Triton Island, part of the Paracel Islands chain China also claims. More here.

Emerging Putin’s Geo Aggressions

Putin has an inside circle and it is bid-rigging and creating wealth though fraud and collusion. Cunning, calculated, measured and well planned, Putin has a global objective. Is he stoppable beyond Syria?

Few have spoken about the national blackout, the cyber-attack on Ukraine’s power grid. If it can happen in Ukraine, it can happen in America. It must be noted who owns and controls companies with ties to infrastructure….Putin’s friends. For a chilling read, go here.

In part: In a statement announcing the sanctions, the U.S. Treasury Department alleged that Putin “has investments” with Gunvor, the oil-trading firm that Timchenko founded but exited a day before he was hit with U.S. sanctions, and “may have access to Gunvor funds.”

Washington has not released any evidence to substantiate these claims, which the Kremlin and Gunvor deny. (The firm also says CEO Torbjorn Tornqvist was in charge of daily operations.)*

Meanwhile, Navalny filed a lawsuit earlier this month accusing Putin of a conflict of interest in awarding $1.75 billion in state financing to a company part-owned by Shamalov, his alleged son-in-law. A Moscow court rejected the lawsuit, saying it did not qualify for consideration under “administrative proceedings.” Full article here.

When it comes to Crimea and most recently Ukraine, does anyone care? For a data cache on Russian aggressions on Ukraine, go here.

According to Ukrainian officials on March 1 Russia sent three trains with ammunition to the occupied city of Ilovaisk and two tanks and four armoured personnel vehicles to Novoazovsk.

NATO’s top commander says Russian military activity in eastern Ukraine is increasing. Earlier, General Philip Breedlove also warned of ‘disturbing trends’ – including more sniper fire and shelling on the frontline. The NATO leader claims Russia has placed “well above” 1,000 pieces of military hardware in Ukraine over the past 12 months. More here.

Then comes Kazakhstan, where it appears covert pro-Russian adjustments are next up for Putin and Kazakhstan is taking notice.

Reuters in part: Demographically, the region therefore has much in common with Ukraine’s Crimea peninsula and the eastern Donbass region, whose majority Russian-speaking populations pulled out of Kiev’s orbit with help from Moscow.

There is no separatist rebellion in northern Kazakhstan, but the ethnic Russians, who make up more than a fifth of the country’s 18 million population, are feeling increasingly insecure and some sympathize with the separatists in Ukraine.

The Ukraine experience has made the Kazakh authorities highly sensitive to any signs of disloyalty by ethnic Russians. Ethnically based political parties are banned.

Last year, a court in eastern Kazakhstan sentenced a user of Vkontakte, a Russian-based social network, to five years in prison for posting a poll which asked people whether they would support the idea of that region, which also has a big ethnic Russian population, becoming part of Russia.

“Their bodies are in Kazakhstan but their minds are in Russia,” said political analyst Dosym Satpayev, talking about what he described as the significant portion of the Kazakh population influenced by Russian media.

“There are signs that (the authorities) in Kazakhstan are beginning to realize it also faces a separatist threat,” said Satpayev, who runs the Risk Assessment Group, a think tank.

There are no signs of Moscow promoting separatism in Kazakhstan, although it wants to keep the country in its orbit. More here.

So beyond the matter of Putin taking over Syria, then gaining power and control in Afghanistan again, there is the matter of the Arctic. Enter ICEX.

Military: The U.S. Navy’s submarine force is setting up a temporary command center on a sheet of Arctic ice, where U.S. underwater capabilities will be put to the test in the increasingly strategic High North.


The five-week submarine drill coincides with separate war games in Norway called Cold Response involving 16,000 U.S. and NATO forces. Marines have been launching stinger missiles and maneuvering tanks, and the Air Force has dispatched three B-52 Stratofortress bombers.
Together, the exercises underscore the emergence of the Arctic as an area of concern as melting ice caps raise the prospects for competition over vital undersea natural resources. The area could become a flash point between the U.S. and Russia.


“The Arctic environment plays a key role in national defense,” said U.S. Submarine Forces commander Vice Adm. Joseph E. Tofalo in a statement announcing the launch of Ice Exercise 2016. “With over a thousand miles of Arctic coastline, the U.S. has strong national security and homeland defense interests in the region.”


Then ICEX drill, which is being conducted in the Arctic Ocean, aims to evaluate the terrain and assess the readiness of U.S. submarines operating under ice. It does not explicitly address concerns of a growing Russian military presence.
Still, Russian activity in the High North has grabbed the attention of top U.S. military commanders.
“We are facing a very challenging situation in the Arctic,” European Command’s Gen. Philip Breedlove told lawmakers last week. “Many of our NATO allies, Canada and the U.S. are concerned about what we see as the militarization of the Arctic now by Russia.”
Since 2008, Russia has been steadily upgrading its forces in the Arctic: reopening air bases, restoring air-defense radar stations and building new submarines. The moves are all in response to new security challenges brought on by melting ice and the prospect of new shipping lanes.
Moscow’s actions reflect a focus on “goals beyond the Arctic region,” the Stockholm International Peace Research Institute said in a recent report examining Russian military capabilities and intentions in the region. More here.

Is there some negotiating or new deal that can stop Putin? Anyone?

 

 

 

Hey Pentagon, Hiring Hackers, a Good Idea?

Personally I do see some positives, but I see more downsides….what say you?

The Department of Defense announced today that it will invite vetted hackers to test the department’s cybersecurity under a unique pilot program.  The “Hack the Pentagon” initiative is the first cyber bug bounty program in the history of the federal government.

 

Under the pilot program, the department will use commercial sector crowdsourcing to allow qualified participants to conduct vulnerability identification and analysis on the department’s public webpages.  The bug bounty program is modeled after similar competitions conducted by some of the nation’s biggest companies to improve the security and delivery of networks, products, and digital services. The pilot marks the first in a series of programs designed to test and find vulnerabilities in the department’s applications, websites, and networks.

 

Participants in the bug bounty will be required to register and submit to a background check prior to any involvement with the pilot program.  Once vetted, these hackers will participate in a controlled, limited duration program that will allow them to identify vulnerabilities on a predetermined department system.  Other networks, including the department’s critical, mission-facing systems will not be part of the bug bounty pilot program.  Participants in the competition could be eligible for monetary awards and other recognition.

This innovative project is a demonstration of Secretary Carter’s continued commitment to drive the Pentagon to identify new ways to improve the department’s security measures as our interests in cyberspace evolve.

Pentagon to Establish Defense Innovation Advisory Board

WASHINGTON, March 2, 2016 — In an effort to enhance the Defense Department’s culture, organization and processes by tapping innovators from the private sector in Silicon Valley and beyond, Defense Secretary Ash Carter announced plans today to establish a Defense Innovation Advisory Board, Pentagon Press Secretary Peter Cook said.

 Google, CEO

The initiative represents the secretary’s enduring commitment to building lasting partnerships between the public and private sectors, Cook said in a statement.

“Just as the Defense Business Board provides advice to the department on best business practices from the private sector, the Defense Innovation Advisory Board will provide advice on the best and latest practices in innovation that the department can emulate,” Cook added.

The board’s mandate is to provide department leaders independent advice on innovative and adaptive means to address future organizational and cultural challenges, the press secretary said, including the use of technology alternatives, streamlined project management processes and approaches — all with the goal of identifying quick solutions to DoD problems.

Areas Deeply Familiar in Silicon Valley

The board will seek to advise the department on areas that are deeply familiar to Silicon Valley companies, such as rapid prototyping, iterative product development, complex data analysis in business decision making, the use of mobile and cloud applications, and organizational information sharing, Cook said, and will not engage in discussion of military operations or strategy.

Alphabet Executive Chairman Eric Schmidt will chair the board, which will be composed of up to 12 people who have successfully led large private and public organizations and excelled at identifying and adopting new technology concepts, Cook said.

Carter and Schmidt will jointly select the board, Cook said. “Members will represent a cross-section of America’s most innovative industries, drawing on technical and management expertise from Silicon Valley and beyond,” he added.

As chairman of Alphabet and as the author of “How Google Works,” Schmidt has a unique perspective on the latest practices in harnessing and encouraging innovation and in the importance of technology in driving organizational behavior and business operations, Cook said.

**** Background

US spy chief James Clapper highlights cyber threats

BBC: US intelligence agencies have placed cyber attacks from foreign governments and criminals at the top of their list of threats to the country.

Online assaults would increasingly undermine US economic competitiveness and national security, said Director of National Intelligence James Clapper.

A report issued by his office said Russia’s military was setting up a cyber command to carry out attacks.

The report also describes China, Iran and North Korea as leading threats.

In testimony to a congressional committee on Thursday, Mr Clapper said he no longer believed the US faced “cyber Armageddon”.

The idea that major infrastructure such as financial networks or power grids could be disabled by hackers now looked less probable, he said.

However he warned: “We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.”

Mr Clapper highlighted the case of Russia, which he said posed the greatest a cyber risk to US interests. He said that threat from the Russian government was “more severe” than previously realised.

He also said profit-minded criminals and ideologically driven hackers were also increasingly active.

Over the past year there have been a series of high-profile cyber attacks against US targets.

North Korea was accused of being behind the theft of a huge data cache from Sony Pictures in November.

Mr Clapper also mentioned the example of an alleged Iranian attack on the Las Vegas Sands Casino Corporation last year.

Meanwhile in January the Twitter and YouTube accounts of the US military command were hacked by a group claiming to back Islamic State (IS).

During the hearing, Mr Clapper acknowledged that the US had its own “offensive capabilities”.

In 2010 Iran experienced a cyber attack on its nuclear program. Tehran accused Israel and the US of planting malware.

After Ukraine, DHS Warns Domestic Utility Companies

Feds advise utilities to pull plug on Internet after Ukraine attack

WashingtonExaminer: The Department of Homeland Security advised electric utilities Thursday that they may need to stop using the Internet altogether, after the agency found that a cyberattack that brought down Ukraine’s power grid in December could have been far more devastating than reported.

The Dec. 23 cyberattack forced U.S. regulators to place utilities on alert after unknown attackers caused thousands of Ukrainian residents to lose power for hours by installing malicious software, or malware, on utility computers. But the Department of Homeland Security said Thursday that the attack may have been directed at more than just the country’s electricity sector, suggesting the attackers were looking to cause more harm than was reported.

In response, federal investigators are recommending that U.S. utilities and other industries “take defensive measures.” To start with, they need to best practices “to minimize the risk from similar malicious cyber activity,” according to an investigative report issued Thursday by Homeland Security’s Industrial Control Systems Cyber Emergency Response Team.

But the team is also recommending more drastic action, such as keep control-system computers away from the Internet.

“Organizations should isolate [industrial control system] networks from any untrusted networks, especially the Internet,” the report says. “All unused ports should be locked down and all unused services turned off. If a defined business requirement or control function exists, only allow real-time connectivity to external networks. If one-way communication can accomplish a task, use optical separation.”

The findings show that the power outages were caused by three attacks using cyberintrusion software to attack electric power distribution companies, affecting about 225,000 customers. It also reveals that once power was restored, the utilities continued “to run under constrained operations,” implying that the damage to grid control systems was profound.

The team also learned that “three other organizations, some from other critical infrastructure sectors, were also intruded upon but did not experience operational impacts.” That suggests the attackers were going after more than just the power grid, and may have been planning a much more economy-wide attack. The team does not disclose what other sectors of the country were targeted.

The team said the attack was well-planned, “probably following extensive reconnaissance of the victim networks,” the report says. “According to company personnel, the cyberattacks at each company occurred within 30 minutes of each other and impacted multiple central and regional facilities.”

The attackers were attempting to make the damage permanent. The report says the attackers installed “KillDisk” malware onto company computers that would erase data necessary to reboot operations after a cyberattack.

There is also a mystery to the attackers’ actions.

“Each company also reported that they had been infected with BlackEnergy malware; however, we do not know whether the malware played a role in the cyberattacks,” the report says. The malware was delivered using an email embedded hacking technique known as “spear phishing” that contained a number of malicious Microsoft Office attachments.

“It is suspected that BlackEnergy may have been used as an initial access vector to acquire legitimate credentials; however, this information is still being evaluated,” the team says.

The investigation was done with Ukraine authorities and involved the FBI, Department of Energy and the North American Electric Reliability Corporation.

*** 

New research is shining a light on the ongoing evolution of the BlackEnergy malware, which has been spotted recently targeting government institutions in the Ukraine.

Security researchers at ESET and F-Secure each have dived into the malware’s evolution. BlackEnergy was first identified several years ago. Originally a DDoS Trojan, it has since morphed into “a sophisticated piece of malware with a modular architecture, making it a suitable tool for sending spam and for online bank fraud,” blogged ESET’s Robert Lipovsky.

“The targeted attacks recently discovered are proof that the Trojan is still alive and kicking in 2014,” wrote Lipovsky, a malware researcher at ESET.

ESET has nicknamed the BlackEnergy modifications first spotted at the beginning of the year ‘BlackEnergyLite’ due to the lack of a kernel-mode driver component. It also featured less support for plug-ins and a lighter overall footprint.

“The omission of the kernel mode driver may appear as a step back in terms of malware complexity: however it is a growing trend in the malware landscape nowadays,” he blogged. “The threats that were among the highest-ranked malware in terms of technical sophistication (e.g., rootkits and bootkits, such as Rustock, Olmarik/TDL4, Rovnix, and others) a few years back are no longer as common.”

The malware variants ESET has tracked in 2014 – both of BlackEnergy and of BlackEnergy Lite – have been used in targeted attacks. This was underscored by the presence of plugins meant for network discovery, remote code execution and data collection, Lipovsky noted.

“We have observed over a hundred individual victims of these campaigns during our monitoring of the botnets,” he blogged. “Approximately half of these victims are situated in Ukraine and half in Poland, and include a number of state organizations, various businesses, as well as targets which we were unable to identify. The spreading campaigns that we have observed have used either technical infection methods through exploitation of software vulnerabilities, social engineering through spear-phishing emails and decoy documents, or a combination of both.”

In a whitepaper, researchers at F-Secure noted that in the summer of 2014, the firm saw samples of BlackEnergy targeting Ukrainian government organizations for the purposes of stealing information. These samples were nicknamed BlackEnergy 3 by F-Secure and identified as the work of a group the company refers to as “Quedagh.” According to F-Secure, the group is suspected to have been involved in cyber-attacks launched against Georgia during that country’s conflict with Russia in 2008.

“The Quedagh-related customizations to the BlackEnergy malware include support for proxy servers and use of techniques to bypass User Account Control and driver signing features in 64-bit Windows systems,” according to the F-Secure whitepaper. “While monitoring BlackEnergy samples, we also uncovered a new variant used by this group. We named this new variant BlackEnergy 3.”

Only Quedagh is believed to be using BlackEnergy 3, and it is not available for sale on the open market, noted Sean Sullivan, security advisor at F-Secure.

“The name [of the group] is based on a ship taken by Captain Kidd, an infamous privateer,” he said. “It is our working theory that the group has previous crimeware experience. Its goals appear to be political but they operate like a crimeware gang. There have been several cases this year of which BlackEnergy is the latest. The trend is one of off-the-shelf malware being used in an APT [advanced persistent threat] kind of way. The tech isn’t currently worthy of being called APT, but its evolving and scaling in that direction.”

Within a month of Windows 8.1’s release, the group added support for 64-bit systems. They also used a technique to bypass the driver-signing requirement on 64-bit Windows systems.

In the case of BlackEnergy 3, the malware will only attempt to infect a system if the current user is a member of the local administration group. If not, it will re-launch itself as Administrator on Vista. This will trigger a User Account Control (UAC) prompt. However, on Windows 7 and later, the malware will look to bypass the default UAC settings.  

“The use of BlackEnergy for a politically-oriented attack is an intriguing convergence of criminal activity and espionage,” F-Secure notes in the paper. “As the kit is being used by multiple groups, it provides a greater measure of plausible deniability than is afforded by a custom-made piece of code.”

In 2014 from the Department of Interior and DHS:

Summary: Investigation of NPS-GCNP SCADA SYSTEM

Report Date: August 7, 2014

OIG investigated allegations that the Supervisory Control and Data Acquisition (SCADA) system at Grand Canyon National Park (Park) may be obsolete and prone to failure. In addition, it was alleged only one Park employee controlled the system, increasing the potential for the system to fail or become unusable.

The SCADA system is a private utilities network that monitors and controls critical infrastructure elements at the Park. Failure of the system could pose a health and safety risk to millions of Park visitors. Due to potential risks that system failure posed, we consulted with the U.S. Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and asked that they assess the overall architecture and cybersecurity of the Park’s SCADA system.

ICS-CERT conducted an onsite review and issued a report outlining the weaknesses it found at the Park’s SCADA system, including obsolete hardware and software, inadequate system documentation and policies, insufficient logging and data retention. We provided a copy of ICS-CERT’s assessment report to the National Park Service for review and action.