25 June 2017

Space Corps, What Is It Good For? Not Much: Air Force Leaders

By SYDNEY J. FREEDBERG JR.

CAPITOL HILL: The nation does not need a new armed service specializing in space, the leaders of the Air Force said today in rejecting a House Armed Services Committee plan. In fact, they said, carving a “Space Corps” out of the Air Force — which handles most space missions today — would only make it harder to integrate space operations with warfare in the air, cyberspace, land, and sea.

“The Pentagon is complicated enough,” Air Force Secretary Heather Wilson told reporters. “This will make it more complex, add more boxes to the organization chart, and cost more money. And if I had more money, I would put it into lethality, not bureaucracy….I don’t need another chief of staff and another six deputy chiefs of staff.”

The brainchild of Strategic Forces Subcommittee chairman Mike Rogers, the HASC proposal would create the Space Corps as its own service with its own Chief of Staff sitting on the Joint Chiefs. The new Space Corps would be a separate uniformed service from the Air Force but would report to the civilian Air Force Secretary, who would oversee both Air Force and Space Corps acquisition. That’s similar to the longstanding arrangement whereby the Marine Corps is a separate service from the Navy but reports to the Navy Secretary. The Navy-Marine model proves such arrangements can work — but then the sea services have had since 1798 to work out the many bugs.

Canada's Military Gets More Cyber, and the Headaches That Come With It

Alex Grigsby

Earlier this month, Canada released a white paper that set outs the country's defense policy for the next twenty years. The headlines have focused on the massive spending increase, mostly to placate President Trump, who has criticized NATO countries for not pulling their own weight. The government intends on increasing the Canadian Forces' budget by 70 percent--mostly to buy big ticket items like eighty-eight fighter aircraft to replace its aging CF-18 (a variant of the U.S. F/A-18 Hornet) and six arctic patrol ships, and to grow the regular force by 3,500 to a total of 71,500, and to add 1,500 to the reserves. 

Beyond the new toys and quintessentially Canadian hand wringing about the role the military should play in peacekeeping missions, the white paper signals a shift in Canada's approach to cyberspace. For the first time, the government has acknowledged that the Canadian Forces will build an offensive cyber capability deployable in support of government-authorized military missions.

Canada has had the ability to engage in offensive cyber operations for a while now, depending on how you define them. The country's signals intelligence agency, Communications Security Establishment (CSE), breaks into foreign networks to extract foreign intelligence all the time, much like its other Five Eyes partners. It also supports the Canadian Forces with intelligence support when on deployment, as it did when Canadian troops were deployed to Afghanistan and in contributions to combating the self-declared Islamic State.

Boeing signs $100 million contract to keep navy’s P-8I aircraft flying

By Ajai Shukla

The Indian Navy’s Boeing P-8I long-range maritime patrol aircraft, reputedly the world’s most fearsome submarine hunters, have proved themselves in joint patrols with the US Navy in the Indian Ocean, tracking Chinese submarines.

Last July, a pleased Indian Navy signed a billion-dollar contract with Boeing for four more P-8Is to augment the eight aircraft it already flies. Delivery will begin in 2020.

But, with Chinese submarine activity growing in the Indian Ocean, the navy wants more P-8Is on station today. Last Monday, the navy signed a $100 million contract; requiring Boeing to maintain spare parts and personnel in India, ready to respond to any defects or failures in the P-8I fleet over the next three years.

The so-called “performance based logistics” contract requires Boeing to continue the warranty services it has so far provided under an initial production contract, which will expire in October.

“This contract will substantially bolster Boeing’s performance-based support to the Indian Navy and should maintain or increase the operational capability of the eight-aircraft fleet,” said Boeing on Monday.

Captain America and Information Operations (IO)

By Jon Herrmann

We’ve all (hopefully) seen Captain America, whether in a movie, comic book, or any other of a dozen venues. Even those who have heard only a little know the basics: Captain America is the super-soldier, one man who takes on thousands… and wins. Alone or with the support of some more average people (Howling Commando soldiers or secret agents of SHIELD), the key is the Captain. Compare that to the more “realistic” versions of combat we see in Band of Brothers, Saving Private Ryan, or even Call of Duty. If one person takes on a thousand, the one dies. So can we learn anything from Captain America for national security in reality? Maybe so… in information operations (IO).

Normal combat takes place in a physical realm, where normal (Gaussian) distributions and bell curves make sense. For millennia, we have learned the rules and principles of war or battle, if you prefer. We know that mass matters, and no single soldier is going to overwhelm even five adversaries, in any but the most bizarre circumstances. The rarity of those circumstances means that the effects of any single soldier are generally lost in a battle- the entire effort “averages out.” That is a key reason that having many soldiers is crucial in traditional combat.

Informational combat is atypical. Normal distributions are not normal at all, and bell curves are an illusion that poor commanders use to console themselves, seeking the comfort of a simple model instead of the frightening truth. Information warfare is the world of Captain America. In information warfare, communications professionals hone and craft hundreds of stories, developing articles like basic training develops recruits. Editors mold these stories with the sharp criticisms we once heard from drill sergeants like R. Lee Ermey or Heinlein’s Sergeant Zim. They know they are useful. Stories can overwhelm mental defenses like a traditional mass combat can overwhelm physical defenses. Psychologists have shown that repetition creates the perception of truth, regardless of factual basis, so sending story after story against the minds of opponents can be very effective over time. But the human wave is not the key to modern combat, and the story wave is not the key to modern information conflict.

It's Surprisingly Simple to Hack a Satellite

J.M. PORUP

Hacker conferences are famous for using quirky, hackablebadges. DefCon's 2015 badge was a working vinyl LP containing a spoken-word ciphertext copy of the Hacker Manifesto.

But at the Chaos Communication Camp, held in Zehdenick, Germany last week, the organizers did something different: they gave out 4500 rad1o badges. These software-defined radios are sensitive enough to intercept satellite traffic from the Iridium communications network.

During a Camp presentation entitled "Iridium Hacking: please don't sue us," hackers Sec and schneider demonstrated how to eavesdrop on Iridium pager traffic using the Camp badge.

The Iridium satellite network consists of 66 active satellites in low Earth orbit. Developed by Motorola for the Iridium company, the network offers voice and data communications for satellite phones, pagers, and integrated transceivers around the world. (Iridium went bankrupt in 1999, but was later purchased from Motorola in 2001 by private investors, who have revived the company.) The largest user of the Iridium network is the Pentagon.

"The problem," Sec explained, "isn't that Iridium has poor security. It's that it has no security."

The Army Can Now Stop Enemy Tanks In Their Tracks Without Firing A Shot

By JARED KELLER

U.S. Army personnel have successfully used advanced electronic warfare technology to completely disable enemy armor during a simulated tank assault at the Army National Training Center, Defense Systems reports.

Developed by the Army Rapid Capabilities Office (RCO), the combination of wireless communications-jamming and hacker exploits of vehicle systems forces enemy tanks to “stop, dismount, get out of their protection, [and] reduce their mobility,” as one Army observer described the ANTC training exercise at Fort Irwin, California.

This is only the second major Army test of tactical electronic warfare in recent history. In April, the RCO outfitted nearly 20 soldiers from the 2nd Cavalry Regiment at U.S. Army Garrison Bavaria in Vilseck, Germany, with advanced electronic warfare equipment for field-testing, the first time an Army electronic warfare system had been deployed in a tactical environment.

Barely the size of “a lightweight backpack,” the vehicle- and -infantry portable kits come with two primary capabilities: VROD (Versatile Radio Observation & Direction) to “detect and understand” enemy electromagnetic signals, and the so-called VMAX to “search and attack” with “electronic attack effects” that the Army RCO described as “more effective than the existing jammers used by anti-missile systems in aircraft.”

The Pentagon’s New Algorithmic Warfare Cell Gets Its First Mission: Hunt ISIS

BY MARCUS WEISGERBER

By year’s end, the Pentagon wants computers to be leading the hunt for Islamic State militants in Iraq and Syria, through turning countless hours of aerial surveillance video into actionable intelligence.

It’s part of Project Maven, a fast-moving effort launched last month by Deputy Defense Secretary Bob Work to accelerate, improve, and put to wider use the military’s use of machine learning. 

“We have to tackle the problem a different way,” said Air Force Lt. Gen. John N.T.“Jack” Shanahan, director for defense intelligence for warfighter support, and the man tasked with finding the new technology. “We’re not going to solve it by throwing more people at the problem…That’s the last thing that we actually want to do. We want to be smarter about what we’re doing.”

Thousands of military and civilian intelligence analysts are “overwhelmed” by the amount of video being recorded over the battlefield. These analysts watch the video, looking for abnormal activities. Right now, about 95 percent of the video shot by drone aircraft is from the campaign against ISIS in Iraq and Syria.

The Pentagon has raced to buy and deploy drones that carry high-resolution cameras over the past decade and a half of war in Afghanistan and Iraq. But on the back end, stateside analysts are overwhelmed. Pentagon leaders hope technology can ease the burden on the workforce while producing better results on the battlefield.

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

BY PATRICK TUCKER

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm. 

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Biometric access

Forget thumbprint unlock screens for phones and communications equipment. Tomorrow’s next-generation biometric identifiers are related to the data that soldiers create through their activity. That could include everything from the way that a soldier walks, to the way she holds her phone, to places that she’s been.

“In the future, we see that the systems you carry on you, developing information on you and taking information from you,” said Lynn. “Your walk is as individual as your thumbprint. Why is that important? Well, if you are in warfighting, oftentimes you wear gloves, oftentimes you wear masks…you can’t use a lot of the biometrics you would normally use. But your gait, your walk, that’s going to be there. We think that’s an important part of our future for identity.” 

24 June 2017

*** THE BATTLE FOR MARAWI CITY


On what was to be her wedding day, Stephanie Villarosa ate chocolate-flavored rice porridge out of a styrofoam cup. Under normal circumstances—rings exchanged, fidelity promised, bride kissed—she and her family would have been feasting on lechón, roasted suckling pig, a delicacy in her fiancé’s hometown of Iligan City on the southern Philippine island of Mindanao. Instead, Villarosa was huddled on an institutional plastic chair 38 km south of Iligan, inside Marawi City’s provincial government building. Outside, sniper fire crackled over the mosque-dotted hills to the east and military FA50 fighter jets thundered overhead. Wedding or no, the porridge was nourishing, and Villarosa was happy: “God is good. Today we survived.”

Survival has become a daily battle in Marawi, the capital of Mindanao’s Lanao del Sur province and whose mostly Muslim 200,000 population make the city the biggest Islamic community in what is otherwise an overwhelmingly Catholic country. Villarosa, a teacher in Marawi, was handing out wedding invitations when black-clad fighters of what the locals call Grupo ISIS swarmed the streets. She ran, hid, and took shelter in a nearby house with 38 other people. Outside, she heard, her workplace Dansalan College was burning, and Christians were being killed. “We rescued ourselves—no military,” says Villarosa. “We had to run, walk, crawl.” Seven of her colleagues, including the school’s principal, were unaccounted for, but, low on food and water, and with news that the military was set to bomb the area, Villarosa decided to get to the sanctuary of city hall. “It looked like a movie outside, it looked like The Walking Dead,” she says, referring to the post-apocalypse U.S. TV series.

*** The Race to the Iraqi Border Begins

By Omar Lamrani

One of the best ways to track Iran's priorities in Syria and Iraq is to follow the movements of one of its highest-ranking military leaders, Maj. Gen. Qassem Soleimani. In September 2016, the commander of the Islamic Revolutionary Guard Corps' (IRGC's) elite Quds Force made an appearance south of Aleppo just before loyalist forces launched the final offensive that led to the critical city's capture. Seven months later, he was spotted in the northern Syrian governorate of Hama as loyalist troops, backed by Iran, geared up for a difficult fight with rebel forces on the outskirts of the provincial capital.

This month, Soleimani is on the move once again. On June 12 the elusive figure paid a visit to Iranian-led militia units on the border between Syria and Iraq, giving prayers of thanks for their recent victories in the area. His presence is telling of the newest phase unfolding in Syria's protracted civil war: the race to the Iraqi border.
The First to the Finish Line

As the Islamic State is slowly being driven out of Syria, its enemies are scrabbling to pick up the territory it leaves behind. Syrian rebels, supported by the U.S.-led coalition, are facing off against the government of President Bashar al Assad, backed by Iran and Russia, to wrest control of the extremist group's remaining positions from its weakened grasp. Yet despite having the same finish line in sight, each participant is driven by its own interests, and is willing to risk colliding with its rivals to secure them.

*** The Maharaja’s Mandala India’s geopolitics offer a fascinating insight into its past and future strategic imperatives.

Anirudh Kanisett

Planet Earth’s crust is a set of massive interlocking, interacting tectonic plates, floating on its molten mantle. Above these plates, Earth’s storms, oceans, and climate buffet and shape its biomes and environments. And in them, nudged and shaped by forces which we barely comprehend, are little bubbles of human life, lines we draw on our maps called “nation-states”.

As below, so above. One way of looking at the human world is to think of it as interlocking, interacting geopolitical plates, defined by climates which shape culture and history. These plates, like actual plates, have “centers of gravity”, where politico-cultural “mass” is centered, and where the central balance is to be found. A change at the center of gravity affects all states on the plate.

For the East Asian plate, the center of gravity would be China. For North America, The United States; for Europe, France and Germany.

Modern India’s geopolitics are centered around the North, and especially in the former imperial capital of Delhi. India’s strategic and security imperatives (it is argued) lie to the North-West, towards our rival Pakistan and its designs on Kashmir. If the news is anything to go by, India’s media and populace seem generally obsessed with Kashmir to the point of utter myopia towards the rest of our international actions.

** Professional Military Education: What Is It Good For?

By Pauline Shanks Kaurin

Professional Military Education (PME) covers a wide range of activities. In one sense it refers to a plethora of training, continuing education, and other activities designed to provide development to members of the military at various points in their career and to prepare them for the next level of responsibilities. The U.S. military requires professional education for both officers and enlisted personnel and its form, content, and objective varies across rank, service, and military role. But what is its overarching purpose? Why do we invest so much in this effort? In his 2012 White Paper on Joint Education, General Martin Dempsey argues the purpose of PME is “…to develop leaders by conveying a broad body of professional knowledge and developing the habits of mind central to the profession.”[1] In addition to critical thinking, he lists the ability to understand the security environment, respond to uncertainty, anticipate and lead transitions through change, and operate with trust, understanding, and empathy as important skills for future military leaders.[2]

Taking this document as a starting point, I focus here on the Staff and War College experiences in U.S. professional military education. While many of the questions raised here apply equally—if perhaps differently—to the education of others in the military and other militaries, a narrow scope allows for more precise framing of questions about the purpose of PME. While it seems we would be able to discern the purpose and aims of military education by looking at various official military and institutional documents, they only tell part of the story. What we find upon closer scrutiny are multiple stories about what exactly professional military education is supposed to do and how it is to be done. Some think of it as the equivalent of graduate school needing research and rigor, others think of it as training that ought to be conducted by expert practitioners, and still others a higher level initiation into the Profession of Arms. Accordingly, a closer look at PME is necessary to clarify these basic questions, which then can lead us to thinking through what the focus and content of these experiences ought to be.

** The Emerging Trump Doctrine Of Strategic Savvy

By Jiri Valenta and Leni Friedman Valenta

EXECUTIVE SUMMARY: “America will not lead from behind. America First does not mean America alone. It is a commitment to protecting and advancing our vital interests…” So wrote President Donald Trump’s NSA, General H.R. McMaster, with Gary Cohn, head of the National Economic Council, in the Wall Street Journal. What follows is a discussion of US leaders’ failed strategies in several wars, Trump’s team of generals, and the emerging Trump doctrine, which is here termed “strategic savvy”.

1964 Vietnam War; “Lies that Led to Vietnam”

Bullet-headed Lt. General H.R. McMaster, the US National Security Adviser, is not just a brave warrior. Like his mentor, General David Petraeus, he is a prominent military intellectual. Both men wrote their PhD dissertations on the lessons of Vietnam. In The American Military and the Lessons of Vietnam, Petraeus concluded, “…significant emphasis should be given to counterinsurgency forces, equipment and doctrine.” McMasters’s thesis, Dereliction of Duty, addressed the roles of LBJ and Secretary of Defense Robert McNamara. His subtitle was “Lies that Led to Vietnam.”

On August 4, 1964, the Gulf of Tonkin Resolution was pushed through Congress authorizing military action against North Vietnam as “vital” to US national interests. It sought to punish Hanoi for an allegedly unprovoked attack by three torpedo boats on a US destroyer in the Gulf of Tonkin. In fact, it had not been unprovoked; the US had made repeated prior attacks on the North Vietnamese coast.

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators**

BY PATRICK TUCKER

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Biometric access

Forget thumbprint unlock screens for phones and communications equipment. Tomorrow’s next-generation biometric identifiers are related to the data that soldiers create through their activity. That could include everything from the way that a soldier walks, to the way she holds her phone, to places that she’s been.

The IMF: Pakistan’s History And Future With The Lender Of Last Resort – OpEd

By Sara Cheema

Last year marked the end of Pakistan’s most recent IMF Loan Programme. While many commemorate at the thought of finally coming out of the programme and its forced macroeconomic restrictions, others remain doubtful about our future with the Fund. Are we likely to relapse into the fold of yet another burdensome and economically disastrous programme? In truth, our relationship with the IMF has been a long and uncomfortable one. Loans from the Fund continue to be the gift that keeps on giving, even if at times we do not want it, and certainly regardless of whether or not we are in the position to return it.

As of 1988, Pakistan has entered into 12 different programmes with the IMF, which by contrast, is greater than all countries in the region combined. India till now has signed only 1 facility with the Fund, while countries such as Nepal and Bangladesh have signed a mere 2. Pakistan, for this very reason, was classified as a ‘prolonged user’ by the IMF in 2002, ranking third in the world, higher than every low-income African nation, but surpassed only by two countries; the Philippines and Panama.

One reason for this most certainly has been our constant and very costly effort to keep at par with India, economically and militarily, as well as our long-standing war on terror, all of this done too in the face of exceptionally low levels of savings in the country. As a result of such expenditures, our external accounts have typically remained under pressure, which along with soaring costs of commercial borrowing from international markets, made the IMF was an easy solution to our problems.

US Still Tilting at Windmills in the ‘Ghan: Why Is the US Sending 4,000 More Troops to Afghanistan?


KABUL, AFGHANISTAN - Sixteen years into its longest war, the United States is sending another 4,000 troops to Afghanistan in an attempt to turn around a conflict characterized by some of the worst violence since the Taliban were ousted in 2001. They also face the emergence of an Islamic State group affiliate and an emboldened Taliban, who by Washington’s own watchdog’s assessment now control nearly half the country.

In February, Special Inspector General for Afghan Reconstruction John Sopko, in his first report to the Trump administration, offered a bleak picture of a country struggling under the burden of a deeply corrupt government, a strengthening Taliban and a U.S. development budget rife with waste.

While the government of President Ashraf Ghani asked for a troop surge, at least one lawmaker, Nasrullah Sadeqizada, was skeptical of the plan and cautioned that any should be coordinated with the Afghan government and not be done unilaterally by the United States.

“The security situation continues to deteriorate in Afghanistan and the foreign troops who are here are not making it better,” he said.

At its peak, the war involved 120,000 international troops from 42 countries. So many in Afghanistan question whether adding 4,000 troops to the 8,500 U.S. soldiers in the country will bring peace. But failure could leave the U.S. vulnerable to an increasingly hostile Afghanistan and its growing anti-Western sentiment.

WHAT CAUSED THE DETERIORATION ULTIMATELY LEADING TO THE TROOP SURGE?

Sounding The Warning: DoD Report Examines The Growing Security Challenge From China

by Dean Cheng

The annual Department of Defense report on Chinese military and security development makes clear that China’s military capabilities are steadily expanding in every potential warfighting domain: land, sea, air, outer space, and information space. The Chinese are clearly intent upon dominating the western Pacific in order to secure their environment. This will affect not only U.S. allies, but the United States itself. America needs to respond by reassuring our allies and deterring potential adversaries.

Key Takeaways

China is expanding in every potential warfighting domain: land, sea, air, outer space, and information space.

The Chinese are clearly intent upon dominating the western Pacific in order to secure their environment.

The PLA Strategic Support Force will likely undertake missions to help establish dominance of the key domains of outer space and cyber space.

Select a Section 1/0

Consistent with the fiscal year 2000 National Defense Authorization Act (NDAA), the Department of Defense (DOD) recently released its annual report to Congress on Chinese military and security developments. The report lays out the official views of the DOD and the U.S. intelligence community on the state of the Chinese military and Chinese security activities. Its issuance has been protested annually by the People’s Republic of China (PRC) as furthering perceptions of a “China threat.”

Israel, the Six Day War and the End of the Two-state Solution

By David Gardner

Donald Trump entered the White House promising to be ‘the most pro-Israel president ever’. This hyperbolic bombast gratified what is certainly the most right-wing Israeli government ever, which is celebrating the 50th anniversary of Israel’s crushing victory over Arab armies in 1967, and half a century of occupation of the West Bank and Arab east Jerusalem it has no plans to end.

President Trump, the self-described dealmaker, keeps hinting and tweeting he is on course to do ‘the ultimate deal’ that has eluded his predecessors: never spelt out but assumed to mean an Arab-Israeli peace encompassing a deal for the Palestinians, who have sought in vain the state proffered tantalisingly by the Oslo accords of 1993-95.

This most erratic of US presidents, meeting Benjamin Netanyahu, Israel’s prime minister, in February, threw the international consensus on the Israeli-Palestinian conflict since Oslo to the winds, saying that the two-state solution, meant to offer security to Israel and justice to the Palestinians, may not be the way to resolve it. ‘I am looking at two-state and one-state [solutions], and I like the one that both parties like,’ Trump said, to nervous chortles from Netanyahu and general bemusement.

Trump, Who Said He Was Smarter Than All America’s Generals, Has Outsourced the War in Afghanistan

Mark Landler and Michael R. Gordon

WASHINGTON — When President Trump made his first major decision on the war in Afghanistan, he did not announce it in a nationally televised address from the White House or a speech at West Point.

Instead, the Pentagon issued a news release late one afternoon last week confirming that the president had given the defense secretary, Jim Mattis, the authority to send several thousand additional troops to a war that, in its 16th year, engages about 8,800 American troops.

Mr. Trump, who writes avidly on Twitter about war and peace in other parts of the world, said nothing about the announcement. But its effect was unmistakable: He had outsourced the decision on how to proceed militarily in Afghanistan to the Pentagon, a startling break with how former President Barack Obama and many of his predecessors handled the anguished task of sending Americans into foreign conflicts.

The White House played down the Pentagon’s vaguely worded statement, which referred only to setting “troop levels” as a stopgap measure — a tacit admission of the administration’s internal conflicts over what to do about the deteriorating situation in Afghanistan.

With a president who ran for office almost never having talked about the war, a coterie of political advisers who bitterly oppose deeper American engagement in it, and a national security team dominated by generals worried about the consequences if the United States does not act quickly, the decision could succeed in buying time for Mr. Trump and his advisers to fully deliberate over what to do in Afghanistan.

Backgrounder: The Six-Day War


With the fiftieth anniversary of the 1967 Six-Day War this month, we offer a quick review of work on the subject produced over the years by the Middle East Forum's staff and fellows, and by contributors to its flagship journal, Middle East Quarterly (MEQ).
Causes

The basic facts of the Six-Day War aren't really in dispute. In the face of a military buildup by Arab armies, bellicose threats by Arab leaders, Egyptian President Gamal Abdel Nasser's closure of the Straits of Tiran to Israeli shipping (an act of war that cut off the Jewish state's access to the Red Sea), and other provocations, Israel struck first on June 5. Catching its enemies by surprise, Israel effectively destroyed Nasser's air force in the first hours, then defeated the Egyptian, Jordanian, and Syrian armies in quick succession. By the end of the war it had captured the entire Sinai from Egypt, the West Bank and East Jerusalem from Jordan, and the Golan Heights from Syria.

The conventional wisdom is that the Six-Day War was more or less accidental in that Nasser did not want war. Led astray by Soviet misinformation and egged on by rival Arab leaders, he took the escalation a bridge too far, cornering Israeli leaders into seeing a "preemptive" strike as the only option.

But MEQ editor Efraim Karsh argues in the new Summer 2017 issue of MEQ that whatever specific triggers may have led to war on June 5, 1967, a "second all-out attempt ... to abort the Jewish national revival" was going to happen eventually given the Arab world's unwavering rejection of Jewish statehood, together with Nasser's pan-Arab ambitions and overconfidence.

New playground for non-state actors

M. K. Narayanan

‘Internet-enabled’ terrorism has introduced greater complexity in an already difficult scenario

Hidden terror was, till now, believed to be confined mainly to the less developed regions of the world — the 9/11 attack in the U.S. was seen as an aberration, or exception, rather than the rule in this respect. Since 2015, however, with the attack in January of that year on the Charlie Hebdo offices in Paris, followed by a series of major terrorist incidents in Brussels, Paris, Nice, Berlin and Istanbul during the past two years, it is evident that the developed world is no longer immune from terror strikes.

The Islamic State (IS) has claimed responsibility for the vast majority of these attacks, though this may not be true in all cases. What is not disputed any longer is that the West now has a sizeable number of radicalised Islamist elements who are willing to perpetrate acts of terror — either on their own, or under instructions from elsewhere.

Timeline of the new phase

As ISIS Shrinks in Syria, the US and Iran Draw Closer to Conflict

BY MOHAMAD BAZZI

On Sunday evening, a U.S. warplane shot down a Syrian jet after it bombed American-backed rebels in northern Syria. This marked the first time the United States has downed a Syrian warplane since the start of the country’s civil war in 2011. On Tuesday, the Pentagon announced that the United States had shot down an Iranian-made drone in the country’s southeast, where American personnel have been training anti-Islamic State fighters. 

Since President Donald Trump took office, the U.S. military has struck the Syrian regime or its allies at least five times, in most cases to protect U.S.-backed rebels and their American advisers. Even if the Pentagon may not want to directly engage Syrian forces or their Russian and Iranian-backed allies, there’s a danger of accidental escalation, especially as various forces continue to converge on eastern and southern Syria to reclaim strategic territory from ISIS. Russia, for its part, angrily condemned the U.S. action and threatened on Monday to treat all coalition planes in Syria as potential targets

But the dangers are perhaps particularly acute when it comes to Iran, which made dramatic battlefield moves of its own on Sunday, when it launched several missiles from inside Iran against ISIS targets in eastern Syria. Officially, Iran’s Revolutionary Guards said the volley of missiles fired at Deir Ezzor province was a response to a pair of attacks by ISIS in Tehran on June 7, which killed 18 people and wounded dozens; the attacks marked the first time that ISIS had struck inside Iran. But the Iranian regime had several less-dramatic means to exact revenge against ISIS targets in Syria—after all, there’s no shortage of Iranian allies operating in the war-ravaged country. 

Why Talk About Disinformation Now?

By Alina Polyakova

Cyberattacks played a key, but relatively small part in this operation. Kremlin-backed hackers used targeted phishing e-mails to steal troves of documents and communications between Democratic Party operatives, but the bigger, and more sophisticated, part came later. Rather than using the stolen information for intelligence gathering—a normal and expected technique in the world of spycraft—the data instead appeared on WikiLeaks and other sites beginning in July 2016. It was at this point that an intelligence-gathering operation turned into an influence operation.

Disinformation has become a hot topic since Russia’s interference in the US presidential elections in 2016. As seventeen US intelligence agencies agreed in December of last year: “Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election.” This influence operation aimed to undermine faith in democracy and the credibility of the Western institutions.

The Kremlin’s well-resourced media networks, including RT and Sputnik, and its social bots and troll armies quickly spun narratives about Democratic presidential nominee Hillary Clinton’s campaign. Western media, compelled by trending topics and dramatic headlines, followed suit. And “fake news entrepreneurs” looking to turn an easy profit from ad dollars by writing false stories with alarming headlines took advantage of the scandals. As a result, the e-mail hacks, rather than policies, came to dominate our political discourse while polarizing our society. The Kremlin effectively exploited the virtues of free and open societies and the plurality of our media space to undermine our electoral process.

CJCS Dunford Talks Turkey, Iran, Afghan Troop Numbers & Daesh

By JAMES KITFIELD

Breaking Defense contributor James Kitfield spoke with Gen. Joe Dunford, chairman of the Joint Chiefs of Staff, during Dunford’s swing through Japan, Singapore, Australia, Wake Island, and Hawaii. BD readers know that Defense Secretary Jim Mattis promised Sen. John McCain yesterday that America would get a new Afghan strategy by mid-July. In this second part of Kitfield’s interview, Dunford talks Turkey, Kurds, Daesh (ISIS) and whether the US will boost the number of troops stationed in Afghanistan. Read on! The Editor.

BD: Just while you were meeting with your Asian counterparts in Singapore and Sydney, Australia, there were terrorist attacks claimed by the Islamic State of Iraq and Syria (ISIS) in London, Melbourne, and Kabul. What are we and our allies doing to try and contain the threat from ISIS’ foreign fighters returning to their home regions and launching attacks?

Dunford: One of the issues we talked about with our allies is that there are three pieces of connective tissue that unites these terrorist groups: the flow of foreign fighters, the flow of resources, and a common ideology. And we need to cut that connective tissue. A primary way we are doing that is through a broad intelligence and information sharing network that we have established with the members of the anti-ISIS coalition, who all share a common view of this threat of ISIS foreign fighters.

Who Will Fill America’s Shoes?


RICHARD N. HAASS

NEW YORK – It is increasingly clear that US President Donald Trump represents a departure when it comes to America’s global outlook and behavior. As a result, the United States will no longer play the leading international role that has defined its foreign policy for three quarters of a century, under Democratic and Republican presidents alike.

We have already seen many examples of this change. The traditional US commitment to global organizations has been superseded by the idea of “America first.” Alliances and security guarantees once regarded as a given are increasingly conditioned on how much allies spend on defense and whether they are seen to derive unfair advantage from trade with the US.

More broadly, foreign trade is viewed with suspicion – supposedly a source of job loss rather than an engine of investment, job creation, growth, and stability. Immigration and refugee policies have become more restrictive. Less emphasis is being placed on promoting democracy and human rights. More dollars are going to defense, but fewer resources are being devoted to supporting global health or development.

This is not to be confused with isolationism. Even Trump’s America will continue to play a meaningful role in the world. It is using military force in the Middle East and Afghanistan, increasing diplomatic pressure on North Korea to rein in its nuclear and missile programs, and renegotiating the North American Free Trade Agreement with Canada and Mexico. And the policies of states, cities, and companies will translate into an American commitment to climate change, despite Trump’s decisionto abandon the Paris agreement.

UK Blazes New Path on Information Sharing


The United Kingdom has revamped the way its intelligence agencies collaborate with private industry by establishing a new National Cyber Security Centre that leans towards more open and meaningful exchanges to help secure the country against malicious cyber attacks. The Cipher Brief’s Levi Maxey spoke with Sir David Omand, the former director of the Government Communications Headquarters (GCHQ) and the first UK Security and Intelligence Coordinator, about how this novel model of private-public collaboration is seeking to bridge the gaps between government and private industry when it comes to sharing information on cybersecurity threats.

The Cipher Brief: How has the UK traditionally collaborated with the private sector in areas such as threat intelligence sharing?

David Omand: The starting point for a discussion of these issues has to be the experience, driven sadly by the past terrorist threat from the Provisional IRA, that the UK security authorities have built up while working with the private sector over many years. The owners and operators of the critical national infrastructure in particular are not fazed by working with the Centre for the Protection of National Infrastructure, a part of MI5, the UK’s counterpart to the FBI, giving and receiving sensitive information about vulnerabilities.

Specialist advice on protective security and sharing of intelligence-based threat warnings and assessments became normal business practice and developed mutual confidence based on the shared goal of public protection. Now those relationships of trust between government and industry are being transferred into the cyber domain through the new National Cyber Security Centre (NCSC) a part of Government Communications Headquarters (GCHQ), the UK signals intelligence agency and partner of the U.S. National Security Agency, to face the new threats from criminal and state hackers.  

The Whiskey-Fueled Riot That Forged West Point

Matthew Gault

The United States Military Academy at West Point is synonymous with prestige. Its list of graduates includes two U.S. presidents, 40 astronauts and countless Rhodes Scholars and Medal of Honor recipients. For the past 150 years, West Point’s name has meant excellence, discipline and courage.

The name once meant debauchery, laziness and alcohol poisoning. For the first half of the 19th century, West Point was more Animal House than, well, West Point. That all changed when a new superintendent took control of the academy, modernized its practices and disciplined its cadets.

In return, the cadets got shit-can drunk on Christmas Eve and rioted.

The ensuing chaos destroyed one whole barracks. Dozens of inebriated students ran through the campus, threatening officers and puking all over the grounds. In the morning, the new superintendent rounded up a third of the worst cadets and expelled them.

It was a moment that defined the academy, the last outburst of public excess before West Point settled down and became the prestigious institution it is today. The Eggnog Riot was West Point’s last great bender.

The White House, Wonder Woman and What to Know About Thucydides

Olivia B. Waxman

For a man who's been dead for more than 2,000 years, the Ancient Athenian historian Thucydides is proving surprising relevant. He makes an appearance — though not one entirely based on facts — in the blockbuster Wonder Woman, and on Wednesday Politico reported that Graham Allison, the political scientist who wrote Destined for War: Can America and China Escape Thucydides's Trap?, recently briefed President Donald Trump's National Security Council on what the Peloponnesian War, fought between Athens and Sparta in the 5th century BC, could teach them about U.S.-China relations. 

But, though Thucydides may be having a moment, theorists of international relations have always looked to his writings for guidance on approaching international conflicts. 

He didn't always have all of the answers, however, and in fact, learned them the hard way. Thucydides was well-connected in Athenian society (he snagged an elite position as one of the ten stratēgoi, or military commanders, who were picked each year) but didn't prove himself a particularly adept military leader. During the war, the Spartan general Brasidas caught him and his fleet off-guard and was able to snatch up the strategically-important city of Amphipolis from under his nose. Thucydides was banished as a punishment so, during his 20 years in exile, which lasted until Sparta finally conquered Athens in 404 B.C., he had a lot of time to think about the meaning of war and write about the history he was living through. 

Why I’m Directing The Air Force to Focus on Space

BY HEATHER WILSON 

In the coming months, the US Air Force will grow the space force in numbers and capabilities. 

For the service that I once served and now lead, one of the most important tasks ahead is getting space operations right.

In many respects, the Air Force and the nation are at a critical crossroads. We realize, as do our potential adversaries, that space is interconnected to American life and to U.S. military success. The time is now to integrate, elevate, and normalize space in the Air Force and thus assure continued American dominance in this most critical domain. 

We will do this systematically and doggedly, drawing lessons from earlier periods in which airmen created the resources, tools, and tradecraft to assure freedom of access and freedom of operation for the U.S. military writ large. Today, we begin the process of standing up a new organization at the Pentagon that will be responsible for recruiting, training and equipping airmen involved in the space mission. The establishment of the deputy chief of staff for space operations is the next step toward ensuring that we maintain space superiority.

This move will allow us to focus our attention on many critical areas as we make the policy and budget decisions necessary to train and equip airmen for the challenges in space, an essential but sometimes overlooked area of military operations. In the months ahead, you will hear much more about how we are transforming a mission that for some time has been designed around a relatively benign environment to one that has grown crowded and contested.

Empowering DOD with critical cyber training

By Jonathan Sholtis

U.S. federal agencies have increasing concerns about cybersecurity -- and rightly so. Recently, the Department of Defense faced criticism about its preparedness for a cyber-attack. A December 2016 report from the Office of the Director, Operational Test and Evaluation stated: “DOD personnel too often treat network defense as an administrative function, not a war fighting capability. Until this paradigm changes…the Department will continue to struggle to adequately defend its systems and networks from advanced cyber-attacks.”
While critical feedback can sometimes be warranted and even beneficial to drive improvement, this characterization does not reflect current efforts.

Both former Defense Secretary Ash Carter and current Secretary James Mattis have been explicit in their view that cyber is a key part of our national defense and should be classified as part of the war-fighting domain. The likely elevation of U.S. Cyber Command to combatant command status will put it on equal footing with commands like U.S. Central Command and U.S. Special Operations Command, clearly advancing cybersecurity as a priority for DOD leadership.

Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors

By Kevin Bankston

Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and human rights are protected? How can or should law and policy adapt to a world of digital evidence, much of which is easily obtainable—but much of which is not?

The primary focus of that conference was on how best to regulate the sharing of needed user data between internet companies in one country and law enforcement in another country. However, in this post—part of an online symposium at Lawfare following up on that conference—I’ll be mostly focusing on another, particularly controversial part of the broader conversation regarding modern policing: the debate over encryption, and how law enforcement should respond to it.

First, to very briefly summarize a long-running debate: until he was dismissed in May, FBI Director Comey had been arguing since 2014 that the growing prevalence of encryption—in particular, default encryption on some smartphones, and end-to-end encrypted messages that neither messaging service providers nor the government can decode—is depriving government investigators of needed evidence. This is what the FBI calls the “Going Dark” problem. For the past several years, and most recently in two speeches in March and in testimony to Congress in early May, Comey called for a solution to that problem. Privacy and security advocates fear that the FBI’s preferred solution may end up being a wrong-headed legislative mandate requiring providers to ensure some sort of exceptional technical access to encrypted data for government—what opponents (like me) would call a “backdoor”—or otherwise ensure that they do not deploy any encryption that they themselves cannot decrypt. I won’t bother repeating here the many arguments why such a mandate would be bad for America’s cybersecurity and economic security, as well as the civil and human rights of people around the world, nor why it would be mostly useless at preventing bad guys from using encryption if they want to; see here for arguments that I and my organization Open Technology Institute have previously made.

Intelligent Machines The Dark Secret at the Heart of AI

Will Knight

Last year, a strange self-driving car was released onto the quiet roads of Monmouth County, New Jersey. The experimental vehicle, developed by researchers at the chip maker Nvidia, didn’t look different from other autonomous cars, but it was unlike anything demonstrated by Google, Tesla, or General Motors, and it showed the rising power of artificial intelligence. The car didn’t follow a single instruction provided by an engineer or programmer. Instead, it relied entirely on an algorithm that had taught itself to drive by watching a human do it.

Getting a car to drive this way was an impressive feat. But it’s also a bit unsettling, since it isn’t completely clear how the car makes its decisions. Information from the vehicle’s sensors goes straight into a huge network of artificial neurons that process the data and then deliver the commands required to operate the steering wheel, the brakes, and other systems. The result seems to match the responses you’d expect from a human driver. But what if one day it did something unexpected—crashed into a tree, or sat at a green light? As things stand now, it might be difficult to find out why. The system is so complicated that even the engineers who designed it may struggle to isolate the reason for any single action. And you can’t ask it: there is no obvious way to design such a system so that it could always explain why it did what it did.

The mysterious mind of this vehicle points to a looming issue with artificial intelligence. The car’s underlying AI technology, known as deep learning, has proved very powerful at solving problems in recent years, and it has been widely deployed for tasks like image captioning, voice recognition, and language translation. There is now hope that the same techniques will be able to diagnose deadly diseases, make million-dollar trading decisions, and do countless other things to transform whole industries.

Ransomware attack reveals breakdown in US intelligence protocols, expert says

Edward Helmore 

The attack that temporarily crippled the NHS in Britain and dozens of other institutions across Europe and Russia reveals the failure of the US government’s protocols for warning software developers and the private sector about system vulnerabilities, a cyber-security expert told the Guardian.

Under the vulnerability equities process (VEP) established by the US government, US intelligence agencies are supposed to collectively determine whether to disclose a vulnerability it has obtained or discovered – so the software developer has a chance to fix the problem – or withhold the information to use the flaw for offensive or defensive purposes.

“The NSA is supposed to lead the vulnerability equities process with all the other government agencies gathered round to discuss their interests in the vulnerability, and to weigh the offensive capabilities against defensive concerns for the private sector and US interests,” said Adam Segal, the director of the digital and cyberspace policy program at the Council on Foreign Relations. The EternalBlue-WannaCry attack showed that the NSA did not reveal the vulnerability it had discovered before it was stolen and apparently auctioned off, Segal said.

The US government has consistently indicated it is predisposed to releasing vulnerabilities and leaning toward taking a defensive position. In testimony, NSA director Mike Rogers has said the intelligence agencies revealed close to 90% of vulnerabilities they discover.

According to Segal, the Shadow Brokers case and Wikileaks’ recent ‘Vault 7’ release of CIA hacking tools have led to increasing suspicion that may only be true given a narrow definition of vulnerability.