22 juillet 2020 | International, C4ISR

The new ways the military is fighting against information warfare tactics

One of the clearest examples of how the military wants to defeat adversaries using information warfare is by publicly disclosing what those enemies have been doing and what capabilities they have.

Information warfare can be abstract, combining cyber, intelligence, electronic warfare, information operations, psychological operations or military deception as a way to influence the information environment or change the way an adversary think.

“At our level, the most important thing we can do is to be able to expose what an adversary is doing that we consider to be malign activity, in a way that allows that to be put in the information environment so that now more scrutiny can be applied to it,” Lt. Gen. Timothy Haugh, commander 16th Air Force, the Air Force's newly established information warfare organization, told reporters during a media round table in late February.

One of the first ways the Department of Defense has sought to test this is through U.S. Cyber Command's posting of malware samples to the public resource VirusTotal. Malware samples discovered in the course of operations by the Cyber National Mission Force are posted to the site to inform network owners. It also helps antivirus organizations of the strains build patches against that code and helps identify the enemies' tools being used in ongoing campaigns.

Haugh, who most recently led the Cyber National Mission Force, explained how these cyber teams, conducting what Cyber Command calls hunt forward operations, were able to expose Russian tactics.

U.S. military teams deploy to other nations to help them defend against malign cyber activity inside their networks. “Those defensive teams then were able to identify tools that were on networks and publicly disclose them, [and] industry later attributed to being Russian tools,” he said. “That was a means for us to use our unique authorities outside the United States to be able to then identify adversary activity and publicly disclose it.”

Officials have said this approach changes the calculus of adversaries while also taking their tools off the battlefield.

“Disclosure is more than just revealing adversary intent and capabilities. From a cyberspace perspective, disclosure is cost imposing as it removes adversary weapons from the ‘battlefield' and forces them to expend resources to create new weapons,” Col. Brian Russell, the commander of II Marine Expeditionary Force Information Group, told C4ISRNET in June. “Disclosure forces the adversary to ask: ‘How were those capabilities discovered?' It causes them to investigate the cause of the disclosure, forcing them to spend time on something other than attacking us. If I can plant a seed of doubt (messaging) that the disclosure might have been caused by someone working on the inside, it makes them question the system's very nature, perhaps spending more time and resources to fix the system.”

The NSA has demonstrated a similar tactic when it created its cybersecurity directorate in late 2019. The entity was formed in part, due to the fact that adversaries were using cyberspace to achieve strategic objectives below the threshold of armed conflict. Now, the directorate uses its intelligence and cyber expertise to issue advisories to the network owners of cybersecurity threats so they can take the necessary steps to defend themselves.

One recent advisory had direct bearing on a nation state's malicious activity, according to a senior intelligence official. In late May, the agency issued an advisory regarding a vulnerability in Exim mail transfer agent, which was being widely exploited by a potent entity of Russia's military intelligence arm the GRU called Sandworm.

“Quickly thereafter, we saw five cybersecurity companies jumped on it and really used that to deepen and expand and publish information about the GRU's infrastructure that they use to conduct their cyberattacks and further information as well,” the official told reporters in early July. “That was terrific because we felt that that had a direct impact on a major nation state in terms of exposing their infrastructure ... and we saw significant patch rates go up on a vulnerability that we knew they were using. That's the kind of thing that we're looking for.”

The military has had to think differently to combat for how adversaries are operating.

“A central challenge today is that our adversaries compete below the threshold of armed conflict, without triggering the hostilities for which DoD has traditionally prepared,” Gen. Paul Nakasone, commander of Cyber Command, wrote in prepared testimony before the House Armed Services Committee in early March. “That short-of-war competition features cyber and information operations employed by nations in ways that bypass America's conventional military strengths.”

These disclosures or efforts to call out malign behavior have also taken the forms of media interviews and press releases.

For example, Gen. Jay Raymond, the head of U.S. Space Command and the commandant of Space Force, said in a February interview in which he detailed what he deemed unacceptable behavior by Russia in space, a surprising charge given how tight lipped the U.S. government typically is about its satellites.

“We view this behavior as unusual and disturbing,” he said of Russian satellites creeping up to American ones. “It has the potential to create a dangerous situation in space.”

Or consider that leaders from Africa Command on July 15 issued a press release detailing the activities of the Wagner Group, a Russian security company, as acting on behalf of the Russian state to undermine the security situation in Libya.

“U.S. Africa Command (AFRICOM) has clear evidence that Russian employed, state-sponsored Wagner Group laid landmines and improvised explosive devices (IEDs) in and around Tripoli, further violating the United Nations arms embargo and endangering the lives of innocent Libyans,” the release said. “Verified photographic evidence shows indiscriminately placed booby-traps and minefields around the outskirts of Tripoli down to Sirte since mid-June. These weapons are assessed to have been introduced into Libya by the Wagner Group.”

Moreover, Africa Command's director of operations called out Russia, noting that country's leaders have the power to stop the Wagner Group, but not the will.

Sixteenth Air Force, at the request of C4ISRNET, provided a vignette of such behavior from Russia in the form of how it covered up the explosion of a radioactive rocket, dubbed Skyfall.

According to the service, Russia took extreme steps to curb monitoring of the site where the explosion took place and sought to conceal the true nature of the explosion potentially hindering surrounding civilian populations from receiving adequate medical treatment and guidance.

With new forces integrated under a single commander, using unique authorities to collect intelligence and authorities to disclose, 16th Air Force is now better postured to expose this type of malign activity, which previously the U.S. government just didn't do.

Top Pentagon leaders have explained that the dynamic information warfare space requires a new way of thinking.

“We've got to think differently. We've got to be proactive and not reactive with messaging,” Lt. Gen. Lori Reynolds, the Marine Corps' deputy commandant for information, told C4ISRNET in an interview in March. “We have been very risk averse with regard to the information that we have. You can't deter anybody if you're the only one who knows that you have a capability.”

https://www.c4isrnet.com/information-warfare/2020/07/20/the-new-ways-the-military-is-fighting-against-information-warfare-tactics/

Sur le même sujet

  • UAE launches ‘Edge’ conglomerate to address its ‘antiquated military industry’

    7 novembre 2019 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    UAE launches ‘Edge’ conglomerate to address its ‘antiquated military industry’

    By: Agnes Helou ABU DHABI, United Arab Emirates — The United Arab Emirates has launched a government-owned company meant to position the country as a global player in advanced technology that can address the threat of hybrid warfare and streamline the local defense industry. The crown prince of Abu Dhabi and the deputy supreme commander of the UAE Armed Forces, Mohamed bin Zayed Al Nahyan, led the inauguration ceremony of the new entity, known as Edge. “The solution to address hybrid warfare lies at the convergence of innovations from the commercial world and the military industry. Established with a core mandate to disrupt an antiquated military industry generally stifled by red tape, Edge is set to bring products to market faster and at more cost-effective price points,” said Faisal Al Bannai, CEO and managing director of Edge. With a combined annual revenue of $5 billion, Edge employs more than 12,000 individuals, and it will consolidate a number of companies and other entities totaling 25 subsidiaries. Those subsidiaries include Nimr, AMMROC, Abu Dhabi Ship Building, Al Tariq, Caracal, Emirates Advanced Research and Technology Holding, ADASI, Al Hosn, Al Jasoor, Al Taif, APT, Beacon RED, EPI, ERS, ETS, GAL, Halcon, Horizon, Jaheziya, Knowledge Point, Lahab, Remaya, and Sign4l. Edge will also adsorb Emirates Defence Industries Company, Tawazun Holding as well as Advanced Investments Group. “The conglomerate will manage effectively the five clusters it has, through the chief executive of each entity who will report to the chief executive of the cluster within the conglomerate,” Al Bannai told Defense News. Those five focus areas are platforms and systems; missiles and weapons; cyber defense; electronic warfare and intelligence; and mission support. The executive said ongoing contracts signed by the subsidiaries before Edge's creation will continue as usual. "With respect to new contracts, they will be signed by Edge if they are strategic deals, and others will be signed by the subsidiary entity depending on the type of the contract,” he added. “EDGE will invest extensively across [research and development], working closely with front-line operators to design and deploy practical solutions that address real-world challenges.” Lockheed Martin's Middle East chief executive, Robert Harward, praised the creation of Edge as “a great opportunity for Lockheed Martin and other partners to engage with the UAE in a new and innovative way.” “Today's announcement is indicative of the UAE's growing defense and technology ecosystem,” Harward said. "We look forward to working with Edge and helping them expand their capabilities through effective partnerships.” The conglomerate will develop partnerships with original equipment manufacturers and defense contractors, small and medium enterprises, and academia, according to an Edge news release. The company also said it will seek industry experts and talent from around the globe to help on a wide spectrum of modern product development related to its five clusters. The company also plans to develop technologies that advance autonomous capabilities, IT hardware, the internet of things, advanced propulsion systems, robotics and smart materials, with a focus on artificial intelligence across all its products and services. https://www.defensenews.com/digital-show-dailies/dubai-air-show/2019/11/06/uae-launches-edge-conglomerate-to-address-its-antiquated-military-industry/

  • Boeing completes critical design review for protected satellite communications payload

    18 mars 2022 | International, Aérospatial

    Boeing completes critical design review for protected satellite communications payload

    The design milestone positions the company to begin integration and test next year.

  • 5 technology trends driving an intelligent military

    6 juillet 2018 | International, C4ISR

    5 technology trends driving an intelligent military

    By: Antti Kolehmainen The rise of non-traditional actors, cyberattacks and state-sponsored subversion is challenging democratic governance and creating an increasingly volatile operational and security environment for defense agencies. To address these threats, military organizations must be able to operate seamlessly and intelligently across a network of multinational partners. This year's Accenture Technology Vision identified five trends that are essential components of any intelligent defense organization: Citizen AI, extended reality, data veracity, frictionless business and Internet of Thinking. Private AI: training AI as an effective troop member Harnessing AI's potential is no longer just about training it to perform a specific task: AI will increasingly function alongside people as a full-fledged member of a team. In the high-stakes world of defense, it's especially important that AI systems act as trustworthy, responsible and efficient colleagues. AI could have a major impact for military organizations, including defense logistics and cybersecurity. An adversary equipped with advanced AI capabilities will not wait for its enemies to catch up technologically before launching an offensive. AI's ability to process and analyze vast amounts of data has significant implications across the Observe, Orient, Decide, Act (OODA) loop. From augmenting our ability to detect new threats to analyzing countless variables, AI could transform surveillance and situational awareness. Extended Reality: The end of distance Extended reality (XR), which includes virtual reality (VR) and augmented reality (AR), is the first technology to relocate people in both time and place—effectively eliminating distance. For the defense sector, the ability to simulate and share a common view of an operational theatre is immensely powerful. Recently, Accenture created a mixed reality proof of concept using Microsoft HoloLens and gaming engine Unity that provides military personnel with an interactive map showing real-time location and status data for troops and resources on the ground. With a simple command, a user can order reinforcements or supplies, or create and test different scenarios through a mixed reality interface. XR technology can also enhance operational command capabilities in the field. For example, AR goggles could provide dashboards and data visualizations where and when they are needed – such as at an operating base. XR also will have major implications for training, allowing soldiers and pilots to engage in highly realistic combat simulations. Data veracity: the importance of trust As defense organizations become increasingly data-driven, inaccurate and manipulated information is a persistent and serious threat. Agencies can address this vulnerability by building confidence in three key data-focused tenets: provenance, or verifying data from its origin throughout its life cycle; context, or considering the circumstances around its use; and integrity, or securing and maintaining data. The ability to trust and verify the data that flows between multinational partners is critically important. Organizations must be capable of delivering the right data to the right recipient, at the right time – which can only be accomplished by radically reorienting how data is shared across today's armed forces. Today's vertical approach involves passing information up and down the command stack of a nation's military. In contrast, multinational military operations demand that information is also shared horizontally across the forces of different nations and partners. This shift requires a profound change in technology, mindset and culture within agencies. Frictionless defense: built to partner at scale Our recent survey found that 36 percent of public service leaders report working with twice as many strategic partners than two years ago. And when partnerships between industry, academia and military organizations are horizontally integrated and technology-based, they can expand faster and further than ever before. But legacy systems weren't built to support this kind of expansion, and soon, outdated systems will be major hindrances to collaboration. With this in mind, defense organizations must develop new IT architectures to reduce complexity. Agile IT systems will allow innovation to flourish, unimpeded by internal politics and employee resistance. A modern IT architecture will push organizations to clearly define the services they offer and turn each service into a potential enabler of collaboration. The Internet of Thinking: intelligent distributed defense capabilities Today's technology infrastructures are designed around a few basic assumptions: enough bandwidth to support remote applications, an abundance of computing power in a remote cloud and nearly infinite storage. But the demand for immediate response times defies this approach. Recent projections suggest that by 2020, smart sensors and other Internet of Things devices will generate at least 507.5 zettabytes of data. Trying to manage the computational “heavy-lifting” offsite will become limiting. The need for real-time systems puts hardware back in focus: special-purpose and customizable hardware is making devices at the edge of networks more powerful and energy efficient than ever before. Public service organizations are taking note: our survey indicates 79 percent of leaders believe it will be very critical over the next two years to leverage custom hardware and accelerators to meet new computing demands. The next generation of military strategies ride on pushing intelligence into the physical world. Defense organizations have to embrace new operating models to enable high-speed data flows, harness the potential of distributed intelligence and successfully neutralize threats. The defense sector is challenged to respond to new types of threat, political volatility and even new combat arenas, and acquiring new technology capabilities is a strategic imperative. Delivering greater situational awareness and the ability to respond rapidly to unpredictable adversaries requires investments in AI, edge computing and other emerging technologies. Likewise, today's information architectures will need to be redesigned to collaborate quickly, effectively and securely. Antti Kolehmainen is managing director, defense business service global lead at Accenture. https://www.c4isrnet.com/opinion/2018/07/05/5-technology-trends-driving-an-intelligent-military

Toutes les nouvelles