China’s Cyber Attack on Pentagon Missile Defense Daily

So, where are the strongly worded letters, the condemnation, the sanctions the counter-measures?

Cyber-warfare, industrial espionage, economic warfare.

 

November 2015:

WASHINGTON (Reuters) – The U.S. military on Sunday hailed the success of a complex $230 million test of the U.S. missile defense system that it said showed the ability of the Aegis and THAAD weapons systems to identify and destroy ballistic and cruise missiles at once.

The test was conducted near Wake Island in the western Pacific Ocean around 11:05 p.m. EDT by the U.S. Missile Defense Agency, U.S. European Command, U.S. Pacific Command, the Ballistic Missile Defense System Operational Test Agency and the Joint Functional Component Command for Integrated Missile Defense.

“This was a highly complex operational test of the BMDS which required all elements to work together in an integrated layered defense design to detect, track, discriminate, engage, and negate the ballistic missile threats,” MDA said in a statement released late Sunday.

The Missile Defense Agency website.

Admiral: China Launching Cyber Attacks on Missile Defense Nets ‘Every Day’

Cyber threat comparable to Iranian, North Korean missile danger

FreeBeacon: Chinese military hackers are conducting cyber attacks on the Pentagon’s Missile Defense Agency networks on a daily basis and will soon shift to hacking into networks of missile defense contractors, the admiral in charge of the agency told Congress on Thursday.

Vice Adm. James D. Syring, the MDA chief who is in charge of building multi-billion dollar anti-missile defenses, told a House hearing that while his networks are successfully fighting off the cyber attacks, missile defense contractors need to improve their network security.

The three-star admiral said the threat of Chinese cyber attacks was equal to North Korean and Iranian missile threats.

“I view the cyber threat that I specifically face with MDA and the systems we are fielding on par with any ballistic missile threat that either Iran or North Korea possess,” Syring said.

Asked by Rep. Mike Rogers (R., Ala.), the chairman of the House Armed Services subcommittee on strategic forces, if he is fighting off cyber attacks from Chinese military hackers, Syring answered: “Yes, sir.” He limited his comments and said he would provide details of the cyber threats during a later closed-door session of the subcommittee.

“We have taken inordinate steps to protect both our classified and unclassified networks from attack, [with] constant 24/7 monitoring with teams in place plus good material protections of those systems,” he said.

“My biggest concern remains in our cleared defense contractor base and their protections,” Syring added, noting that Chinese efforts to break into missile defense networks are relentless.

“They are continuing to try and attack my government networks, every day, classified and unclassified,” he said. “But where they’re going next and we’ve gotten examples of this is to my cleared defense contractors with the unclassified controlled technical information.”

Bolstering the network security of contractors is a high priority across the entire ballistic missile defense system, he said.

Foreign states are seeking to penetrate missile defenses and other weapons systems to steal technology and data for use in their own weapons. They also seek to disrupt or destroy the systems in the event of a crisis or conflict.

A report by the Defense Science Board warned in 2013 that critical U.S. weapons and other military systems are vulnerable to cyber attack.

“The United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent utilizing cyber capabilities in combination with all of their military and intelligence capabilities (a ‘full spectrum’ adversary,” the report concluded.

Syring said in prepared testimony his agency is deploying upgraded command and control systems with better security against cyber attacks. Missile defense personnel also are being trained to prevent cyber intrusions.

“We know that malicious cyber actors are constantly attempting to exfiltrate information from U.S Industry,” Syring stated. “We will continue to work with the defense industrial base, the FBI, and other partners to identify these issues and raise the costs of this behavior to those responsible, in coordination with national authorities and in accordance with national policy.”

Syring said a key objective is hardening U.S. missiles defenses for future conflicts, which will likely involve cyber attacks against its networks.

“We must build resilient cyber defenses that are capable of detecting and mitigating threats without impeding operations in order to ‘fight through’ the cyber threat,” he said.

Two exercises simulating cyber attacks on missile defense networks were held last year. Another exercise is set for next month.

To prevent cyber attacks through equipment and parts, MDA is tightening the security of its suppliers.

“We also have a rigorous cyber and supply chain risk management inspection program to examine everything about our systems, from the truck to supply chain, to the fielded operational ability,” Syring said.

Chinese agents were detected spying on the U.S. missile defense interceptor base at Fort Greely, Alaska, several years ago, according to defense officials.

Barry Pike, executive officer for the U.S. Army’s missiles and space program, said during the House hearing that foreign military threats are growing with the emergence of synchronized air, missile, cyber, and electronic warfare attacks.

“Across all Army [air and missile defense] programs, we are improving our resilience and ability to mitigate cyber and electronic warfare attacks,” he stated in prepared testimony.

Rogers, the subcommittee chairman, said in opening remarks at the hearing that after eight years of President Obama’s administration “our nation’s security is in more jeopardy than any time in recent memory.”

“North Korea, Iran, Pakistan, Russia, and China are all advancing their ballistic and cruise missile programs, along with weapons of mass destruction programs, to put our military, our allies, and our homeland at risk,” Rogers said.

“At the same time, President Obama has cut missile defense practically every year he’s been in office,” he added. “America’s enemies know an opportunity when they see one; our allies see they are on their own.”

Disclosure of the Chinese hacking against missile defenses comes as Syring and other military leaders revealed the Pentagon is working on its own cyber weapons that could be used to disable or destroy missiles prior to launch.

Details about what the Pentagon calls “left-of-launch” measures remain classified but are said to include cyber attacks and other electronic warfare measures against missile launch controls and other information systems.

Pre-launch cyber attacks against missiles are designed to bolster other missile defenses, including lasers and anti-missile interceptors, that can attack enemy missiles in the early, middle, and late stages of flight, while decreasing costs.

China is developing both missile defenses and anti-satellite missiles that employ similar technologies and are known to be targeting U.S. and allied computer networks to steal technical information useful in developing its weapons.

China also has targeted U.S. and foreign suppliers that provide equipment and material used in missile defenses.

A briefing in 2014 by Joyce Corell, a senior U.S. counterintelligence official, identified numerous pathways used by foreign states to penetrate the U.S. supply chain.

“We have more than enough evidence to know the threat is real and dangerous, but we will inevitably have difficulty predicting targets and assessing impacts,” she stated in a briefing slide.

U.S. Deploys Commandos to the Philippines

Why? Well as both Barack Obama and John Kerry tell us that Islamic State has lost territory, which may only be barely accurate in Iraq or Syria, they have gained a larger footprint globally and that includes the Philippines.

The Philippines-based jihadi group Abu Sayyaf Group released a new video with its Canadian, Filipino, and Norwegian hostages, giving a final deadline for their ransoms to be met and threatening to behead one of the four on April 25.

So we are deploying special forces to the region.

MANILA, Philippines— In a military buildup certain to inflame tensions with China, the United States said Thursday it will send troops and combat aircraft to the Philippines for regular, more frequent rotations, and will conduct more joint sea and air patrols with Philippine forces in the South China Sea.

In fact, Defense Secretary Ash Carter is in the region on has taken some time to board the carrier battle group the USS Stennis.

ABOARD THE USS JOHN C. STENNIS —U.S. Secretary of Defense Ash Carter on Friday made a second sail of the South China Sea, underscoring the U.S. commitment to its Asia-Pacific allies amid increasing tensions with China.

Carter said his presence on the aircraft carrier USS John C. Stennis, which was sailing about 60 to 70 miles West of the Philippines’ main island, Luzon Island, was to send “a message to the region.”

“The United States intends to continue to play a role in keeping peace and stability in this region’” said Carter, who was accompanied by Philippines defense minister Voltaire Gazmin.

What is the problem there you ask? Islamic State….the terror operation that is spreading to other regions in the world.

From Time magazine:

ISIS Is Making Inroads in the Southern Philippines and the Implications for Asia Are Alarming

Counter-terrorism operation in Philippines Anadolu Agency/Getty ImagesPhilippine army soldiers stage a counterterrorism operation against Maute terrorists, who are allegedly linked with ISIS, in Butig, the Philippine province of Lanao Del Sur, in Mindanao Island, on March 1, 2016

Islamist extremism is growing in Mindanao, with serious security implications for the region and beyond

Musa Muhammad stands at the site where 400 Islamist militants launched an invasion of the southern Philippine city of Zamboanga little over two years ago, sparking 20 days of heavy fighting with security forces. The ruins of his old house can be found there, amid several hundred other razed homes. Since then his family has lived in a sports stadium, refusing to move to a newly built house in another part of town.

“This has been our home for 50 years,” he says. “We’re afraid, but we’ll never leave.”

The Moros (“Moors”), as the Muslims of the southern Philippine region of Mindanao are called, are known for their intransigence. For centuries, they fought the Spanish, Americans and Japanese for their independence. Today, they are fighting Manila too. Some 120,000 people have died, and millions have been displaced, in the past 40 years of insurgency. (Muddying the picture, a separate communist insurgency is also sporadically waged in parts of Mindanao by the New People’s Army, which is thought to consist of some 3,200 fighters.)

Yet many Moros, like Musa, are not victims of a heavy-handed central government but the casualties of infighting among their own kin. The battle at Zamboanga, which led to the destruction of Musa’s home, started off when factions of one rebel group, the Moro National Liberation Front, wanted to signal their displeasure with the peace negotiations with Manila then being carried out by another rebel group, Moro Islamic Liberation Front. It took 3,000 troops to end the rebel occupation of several districts of the city, in an operation that saw 51 insurgents killed and drove 70,000 people from their homes.

Now those talks have stalled and, in the frustrated void that has followed their collapse, extremism has taken root. Several Moro outfits have pledged allegiance to terrorist group Islamic State of Iraq and Greater Syria (ISIS) and carried out attacks in its name.

One of those groups is the Abu Sayyaf militia, whose head Isnilon Hapilon — now styled Sheik Mujahid Abu Abdullah al-Filipini — has been appointed ISIS’s leader in the Philippines. Presently, the Philippine army is attempting to strike at the group’s jungle stronghold on the island of Basilan. In one of the bloodiest days for the armed forces in years, 18 soldiers were killed and over 50 wounded on April 9. ISIS claimed responsibility for the killings. Shortly after, Abu Sayyaf beheaded two Filipino hostages. (The group is also holding 10 Indonesians, two Canadians and a Norwegian captive.)

“It’s very likely that [Abu Sayyaf] will declare a satellite of the caliphate in the coming year,” says Rohan Gunaratna, an international terrorism expert at S. Rajaratnam School of Security Studies in Singapore. “Once that is done, it will be much more difficult to dismantle these groups.”

Already, up to 1,200 Southeast Asians have joined ISIS in the Middle East. Experts now worry that an ISIS stronghold in the southern Philippines will act as a regional lure, providing extremists from across Asia with a place to gain combat experience, before they set act to attack Asian targets or even targets further afield. The Jakarta attack in January that killed four civilians is just a taste of what could come, says Greg Barton, chair in global Islamic politics at Deakin University in Melbourne.

“Next time they won’t mess around with pistols but bring assault rifles,” says Barton. “That’s all it takes to turn amateurs into a lethal bunch of killers.”

Some claim that the biggest threat currently is that competing, ISIS-inspired groups would seek to upstage each other with small-scale attacks. However, organized, international networks still exist, even if the influence of al-Qaeda, which once funded training camps in the southern Philippines, has waned, along with that of its affiliates.

Indonesian operatives are already trading Syria-hardened tutors for weapons and training grounds in Mindanao, reports the ISIS Study Group, an intelligence collective run by the Washington, D.C., think tank Center for a New American Security. The area is evidently attracting insurgents from further afield too. Mohammad Khattab, an alleged bombmaking instructor from Morocco, was reportedly among the five killed militants on Basilan earlier in April. There have been rumors of Muslim Uighurs from China in the area. And in January last year, Zulkifli bin Hir — a Malaysian described as a key facilitator between Indonesian and Filipino extremist groups — was cornered and killed in Mamasapano in central Mindanao, but at the cost of 44 deaths among the Philippine army’s Special Action Force. Five civilians also lost their lives in an operation that turned the tide of support against President Benigno Aquino III’s peace negotiations with the Moro separatists.

“Before the Mamasapano tragedy, it looked really promising,” says Richard Javad Heydarian, a security expert at De La Salle University in Manila. “There were even rumors that Aquino would be nominated for the Nobel Peace Prize. Unfortunately a lot of journalists sensationalized the story, fanning anti-Muslim sentiment. Politicians running for office have then been trying to score political points on this.”

Further talk of a new, autonomous province within the Philippines for the Moro — it would be called Bangsamoro — has now been suspended until the general elections in May. In the meantime, says terrorism expert Gunaratna, intolerance is putting down deeper roots. As an example, he points to the March 1 assassination attempt on a Saudi cleric, Aaidh al-Qarni. The preacher, who has been on ISIS hit lists, was shot while visiting Western Mindanao State University in Zamboanga for a two-day symposium.

“Recent arrests in Malaysia and Indonesia clearly show that a new terror attack from ISIS in the region is imminent,” Gunaratna warns. “And the next one will be bloodier.”

Marines Salvaging Aircraft Parts to Keep Flying

Congressional failures just forced the Marines to raid a museum for aircraft parts

MilitaryTimes: Marine aviation squadrons are salvaging aircraft parts from museums in order to keep planes flying, according to anecdotes from a key congressional leader.

During a recent trip to several Southern U.S. military bases, Marines told House Armed Services Committee Chairman Mac Thornberry, R-Texas, that they’ve been paying for their units’ supplies like pens and paper towels, and were forced to raid decommissioned aircraft for parts.

“I have heard firsthand from service members who have looked me in the eye and told of trying to cannibalize parts from a museum aircraft … getting aircraft that were sent to the boneyard in Arizona back and ready to fly missions, pilots flying well below the minimum number of hours required for minimal proficiency,” Thornberry said.

To see the short real time video go here.

Lawmakers are livid about the fiscal shortfalls, even if their budget infighting in Congress is partly to blame.

At issue are military readiness accounts stretched thin by more than a decade of war and four years of defense penny pinching. Earlier this month, chiefs from each of the four services told lawmakers that those two stressors have led to belt-tightening headaches for units across the military, in some cases deferring long-term needs in favor of short-term solutions.

 PhotoCamel

Thornberry would not identify which Marine air station had the parts shortage, and Marine Corps officials at the locations he visited would not confirm the stories.

But Joint Chiefs Chairman Gen. Joseph Dunford did not dispute and seemed to confirm the incidents when confronted with the anecdotes at a March 22 hearing.

“What you saw in the Marine Corps I think reflects in some part what you’ll see in all the services, perhaps not to the same degree as Marine aviation,” he told the chairman. “But that same dynamic exists in each one of the services.”

The Marine Corps has about 180 F/A-18A-Ds, said Marine Corps spokesman Maj. Clark Carpenter. Typically, 43 F/A-18s from deployable squadrons and nine from training squadrons are in depot for maintenance at any given time. That leaves only about 60 percent of the deployable aircraft in flyable, “fight tonight” status.”

Lt. Gen. Glen Walters, the Corps’ deputy commandant for programs and resources, told lawmakers earlier this month that budget cuts have left the entire service “under-resourced” for spare parts.

The Marine Corps has requested $460 million from Congress in fiscal 2017, some of which would buy spare parts for aircraft, but aviation readiness is not expected to fully recover until at least 2020.

Thornberry said the museum salvage attempt he learned about didn’t work, and the Marines were forced to find another fix to get the aircraft ready for an overseas mission.

“The part they took off the museum aircraft did not fit the aircraft they were trying to keep flying,” he said. “But they’re looking for whatever they can do to keep these things up in the air. It’s just amazing.”

Earlier this month, Marine Commandant Gen. Robert Neller blamed some of the maintenance and repair woes on the continued high tempo of operations.

“The fight in ISIL continues to put stress on equipment, particularly aviation,” he told lawmakers, using an acronym for the Islamic State group. “We’re in the process of resetting our equipment and then you’re trying to maintain legacy gear, and at the same time modernize every model type series of aircraft.”

Other service officials have echoed similar problems. Dunford and Defense Secretary Ash Carter point to Congress’ defense spending caps, which have limited maintenance and investment accounts in recent years, and begged for relief in upcoming budgets.

But committee members have questioned the Pentagon leaders’ assessments that the White House’s fiscal 2017 budget request is truly enough to fix the deep-seated problems, criticizing their promises that next year’s spending caps will be enough to right the force.

Thornberry said that several service members have told him they’ve started buying “basic supplies” like pens and cleaning products “because otherwise it would take three to four months to get them if they could get them at all.”

“I’d say my concern level was very high when I hear [anecdotes] like that. You have folks out there doing their job and they can’t get a pen from the federal government procurement system.

“It just makes you think ‘my gosh, can’t we do better than this?’”

Pentagon Launching Cyber Bombs on ISIS

FNC: The U.S. has ramped up its fight against the Islamic State terror group’s online capabilities, dropping so-called “cyber bombs” on the militants, a top Pentagon official said Tuesday.

“Those guys are under enormous pressure. Every time we have gone after one of their defended positions over the last six months, we have defeated them. They have left, they have retreated,” Deputy Defense Secretary Robert Work told Reuters.

Defense Secretary Ash Carter gave some explanation for the concept of “cyber bombs” in a February NPR interview.

“We are using cyber tools, which is really a major new departure… These are strikes that are conducted in the warzone using cyber essentially as a weapon of war, just like we drop bombs,” Carter said.

Analysts say ISIS has frequently used the Internet to spread its message, regularly releasing photos and videos on social media. The latest edition of its magazine “Dabiq” went online this week.

Meanwhile, the U.S. has helped Iraqi forces as they prepare operations to retake the northern city of Mosul. While they got off to a slow start, there have been some recent advances, and officials say momentum has been growing in the fight against ISIS.

Secretary of State John Kerry, during a visit to Baghdad last Friday, pledged $155 million in new U.S. aid to Iraq and offered a show of political support to Iraq’s beleaguered Prime Minister Haider al-Abadi.

****

DefenseSystems: Given the classifications and operational security surrounding cyber operations, details on anti-ISIS activity in this domain are scant, though Carter added some information in a Pentagon press conference with reporters on Monday, saying the cyber component is aimed at disrupting ISIS’s command and control to cause them to lose confidence in their networks, as well as overloading their networks to limit their operational functionality. But given that the cyber tools are new, Carter said details are being kept under wraps, especially considering they are applicable to other conflicts globally.

Chairman of the Joint Chiefs of Staff Gen. Joseph Dunford reiterated the point that DOD does not want to provide operational details in hopes of keeping the element of surprise. Dunford did say that, conceptually, DOD is trying to isolate ISIS in the same way it is trying to so in the physical space.

Both Dunford and Carter said that the capabilities being used against ISIS, and others globally, are exactly why the U.S. Cyber Command was established in the first place. Dunford said the command is building an inventory of tools to be used in cyberspace going forward.

Carter has said previously that the Defense Department will look to take the fight to ISIS in the cyber domain, even resorting to targeting members of ISIS’s hacking cadre with bombs. However, it is still believed that ISIS’ cyber capabilities remain low, limited to merely website defacements and denial-of-service attacks.

One concern, whether from nation-states or groups such as ISIS should they gain cyber acumen, is the targeting of U.S. critical infrastructure. “Although it’s not a popular target for people trying to make a profit – that’s good and bad, because the flip side is that the adversaries who are interested in potentially targeting critical infrastructure could potentially be more sophisticated adversaries,” Isaac Porche, associate director of the Forces and Logistics Program at RAND, told a panel of lawmakers last week. “So critical infrastructure today might have to deal with a more sophisticated threat than, let’s say, a hardware store might have to.”

Military and U.S. intelligence officials in the past have been careful about what, in their minds, the term “attack” connotes in cyberspace, potentially allowing conclusions to be drawn regarding current U.S. activity against ISIS. “Terminology and lexicon is very important in this space,” Adm. Michael Rogers, the head of the National Security Agency and Cyber Command, told the House Intelligence Committee last year.“And many times I’ll hear people throw out ‘attack’ and ‘act of war’ and I go, ‘That’s not necessarily in every case how I would characterize the activity that I see’.”

Director of National Intelligence James Clapper has said previously that the hack and theft of millions of records from the Office of Personnel Management did not constitute an attack, because it did not result in the destruction of systems, infrastructure or data.

“We generally look at all cyber events and we define it as an attack. In many cases you can do reconnaissance, you can do espionage, you can do theft in this domain we call cyberspace,” Director of the Defense Intelligence Agency Lt. Gen. Vincent Stewart told lawmakers recently. “But the reaction always is, whether it’s an adversary doing reconnaissance, an adversary trying to conduct a [human intelligence] operations in this domain, we define it as an attack and I don’t think that’s terribly helpful.”

Passing a Law to Enforce the Law and an App

When George W. Bush created the Department of Homeland Security, one of the missions was to bring together the mobilize key agencies into one to force collaboration, cooperation and joint use of tools and technology to secure the country. Under Barack Obama, not only were executive orders signed to waive standing law and procedures, the security of the country has reached a tipping point as a result of adding in migrants, refugees and aliens. Mandates from the White House to other agencies include edicts to ignore policy and security standards but we are virtually giving sanctuary to criminals.

Now the House of Representatives is working on legislation to force compliance with law.

The Department of Homeland Security knows there are growing threats across the country so in December of 2015 the agency re-launched the warning system.

There is an app for that. The Department of Justice even published a 10 page handbook.

WASHINGTON — Homeland Security Secretary Jeh Johnson activated the National Terrorism Advisory System for the first time Wednesday, warning the public of “self-radicalized actors who could strike with little or no notice.”

The bulletin, which marks the addition of a new level of public warning to the system, will be in effect for the next six months, or until events dictate otherwise, Johnson said.

The Department of Homeland Security is “especially concerned that terrorist-inspired individuals and homegrown violent extremists may be encouraged or inspired to target public events or places,” the bulletin stated.

“As we saw in the recent attacks in San Bernardino and Paris, terrorists will consider a diverse and wide selection of targets for attacks,” the DHS notice said.

House Acts to Keep America Safe

Passes Legislation to Enhance Overseas Traveler Vetting & Help Stem Flow of Foreign Fighters

Washington, D.C. – Today, the House of Representatives passed the Enhancing Overseas Traveler Vetting Act (H.R. 4403).  The legislation, introduced by Rep. Will Hurd (R-TX), works to improve the vetting of travelers against terrorist watch lists and law enforcement databases, enhances border management, and improves targeting and analysis.

On the House floor, speaking in support of the bipartisan legislation, Chairman Royce delivered the following remarks (as prepared for delivery):

The global threat of terrorism has never been as high as it is today.  In just the last 12 months, we’ve seen terrorists strike in my home state of California, and in France, Belgium, Turkey, India, Tunisia, the Ivory Coast, Nigeria, Pakistan and Iraq – to name a few.  No country is immune.  The ideology of violent extremism knows no boundaries – allowing individuals to become radicalized by terrorists overseas without leaving their neighborhood.

I just returned from Iraq, Jordan and Tunisia, where I heard first-hand about the foreign fighter threat.  More than 35,000 foreigners from 120 countries have traveled to the Middle East to join ISIS, and many of these fighters are now looking to return to their homes and to the United States to carry out attacks.

That is why information sharing between countries is more critical than ever.

The bipartisan Task Force’s report highlighted the lack of any comprehensive, global database of foreign fighters and suspected terrorists.  In its absence, the U.S. and other countries rely on a patchwork system for exchanging extremist identities, which is weak and increases the odds that foreign fighters and suspected terrorists will be able to cross borders undetected.

H.R. 4403 will authorize the Secretaries of the Department of State and Homeland Security to develop open-source software platforms to vet travelers against terrorist watch lists and law enforcement databases.  It permits the open-source software to be shared with foreign governments and multilateral organizations, like INTERPOL.

This bill reflects the recommendations made by our colleagues on the Task Force, which we have worked together on.  I thank Mr. Hurd and Chairman McCaul for their leadership working to make our nation safer against terrorist threats.