Allies and 21st Century Weapons Systems: The Case of the Coming of the F-35 To Europe

05/22/2017

2017-05-17 By Robbin Laird

A key dynamic with the shift from the land wars to shaping a 21st century combat fore is the crucial opportunity the US and its closest allies have to learn from each other thanks to the number of core weapons systems being bought at the same time.

Almost hidden in plain view is the emergence of a significant driver of change –-flying the same aircraft at the same time, and cross learning from each other.

http://breakingdefense.com/2017/04/allies-can-help-us-lower-weapons-costs-build-new-force/

A case in point is the F-35.

There was much recent press on the arrival of USAF F-35s in Europe, landing at RAF Lakenheath and operating from there and then some of those aircraft going to Estonia and then Bulgaria. SACEUR himself showed up at RAF Lakenheath and underscored how significant the arrival of these aircraft was for a training mission in Europe.

For example, in an article by Robert Wall entitled “US jet fighters flex muscle amid Russia tensions” published in The Wall Street Journal, the arrival of the USAF jets in the UK and in Europe is highlighted. It is noted that the U.S. does not intend to permanently deploy the jets in Europe until 2020, and that “several allied air forces, are also buyers.”

https://www.wsj.com/articles/new-u-s-jet-fighters-flex-allied-muscle-in-europe-1493977219

But missing in plain view or perhaps plane view is the reality of the F-35 global enterprise being laid down prior to the arrival of any permanent U.S. deployment, and that global enterprise is being laid down by allies, not the U.S. simply by itself.

To take the key case, look at the United Kingdom.

Hidden in plain view is the fact that the UK is standing up its F-35 base PRIOR to the United States. And that the first squadron for the UK and Australia for that matter is being trained and equipped in the United States prior to their arrival in each of their countries. This is a case of the pilots and maintainers learning common approaches from the ground up PRIOR to standing up the new F-35 bases.

And not only that, but the facilities being established in Europe can provide a key sustainment and operational enterprise which the US as well as allies can leverage in common. Or put bluntly, the U.S. if its follows an innovative sustainment model can gain significant savings and operational advantages from leveraging the European infrastructure, rather than flying in parts and other materials to support ITS jets. The impact of savings to the lift and tanking fleet for the USAF could be very significant indeed from coming up with a 21st century approach to sustainment, support and sortie generation.

It is not just about the US sending advanced jets to Europe; it is about the US being smart enough to embed its jets in a broad scale renorming of airpower associated with the coming of the F-35 to a significant part of the allied combat fleet at virtually the same time.

Last year I visited RAF Lakenheath and recently visited both RAF Marham and RAF Lakenheath to discuss the progress in standing up F-35 bases at both facilities.

The F-35 is a data rich aircraft and needs to see a 21st century basing infrastructure built to support it as is the case of with some other aircraft like Wedgetail, P-8 and Triton. The UK and the US are rebuilding in common their respective bases from which they will operate their F-35s.

During my visit to Marham, I toured the new facilities and discussed the way ahead with senior staff.

There is a staff of 17 at the Lightning Force headquarters supporting the operational standup with nine specifically focused on the infrastructure aspects. They are busy simply in order to have the base ready next year to receive their first contingent of F-35Bs from their current base, which is in the United States.

The base will have a fully operational, training and support capability. Training, maintenance and various centers are being stood up. At the heart of the effort will be the National Operations Center in which logistics and operations are collocated and the U.S. will have personnel in this center as well.

There are multiple synergies involved with the F-35 and the standup of the Marham Air Base, two of which highlight the US-UK working relationship.

The first is the synergy from America to the United Kingdom and back again. The UK has operators at Pax River, Edwards, Eglin and Beaufort Marine Corps Air Station. The planes coming from Beaufort will provide the standup for the first RAF squadron, namely,. 617 squadron.

The second synergy is between the standup among bases and lessons learned. Marham is being stood up and generating operational lessons learned back to the United States, both in terms of the U.S.’s standup of its own bases abroad and at home, and, notably in terms of shaping a new operational dynamic for RAF Lakenheath.

The USAF F-35s at Lakenheath can become integrated into the operational, training and support elements in the UK as well, shaping a new approach for the USAF as well.

As Wing Commander Butcher, the CO of 617 Squadron, underscored the possibilities:

“We want to take forwards everything that we’ve done in the pooling and implementation agreement in the United States, and try and see how we can transpose that into a UK model.

“We’re looking to have jets taking off, F-35A’s taking off at Lakenheath. Well, what if they have an issue and they need to land in Marham. Rather than take the time to move people, spares etc from Lakenheath up to here, what’s to say that we couldn’t conceptually have some maintainers from 617 Squadron repair the jet, sign off, send it flying again.

“Lakenheath is going to be busy base with the closure of Mildenhall. Increased efficiencies working with us would make sense.

“Could we potentially have F-35As operating out of Marham on a daily basis?

“How do we organize hot pit operations on each other’s base?

“One can easily see how that could buy you a lot of combat flexibility, in terms of how you might do maintenance operations.”

https://sldinfo.com/preparing-for-the-operation-of-the-lightning-force-infrastructure-operations-and-the-way-ahead-at-raf-marham/

And visiting RAF Lakenheath, the synergies underway are obvious as well.

According to Col. Evan Pettus, the Commander of the 48th Fighter Wing at Royal Air Force Lakenheath, England:

“We do not have a closer partner than the UK. We will both operate the F-35 from Marham and Lakenheath respectively, which are very close to one another.

“Shaping synergy between the two bases is clearly an important objective.  We are working this process in a step-by-step manner, from understanding how we might operate F-35As from Marham and F-35Bs from Lakenheath, to deeper sustainment and training opportunities as well.”

https://sldinfo.com/raf-lakenheath-prepares-for-the-future-usaf-f-35as-and-f-15s-combine-with-raf-capabilities-to-provide-a-21st-century-deterrent-force/

But the potential is even greater for synergy from the two bases working together across the region. During my visit last year I discussed the impact of the synergy of the US and the allies standing up at the same time the new air combat force with then Col. Novotny, the 48th Fighter Wing Commander, and now General Novotny at the Air Combat Command.

“We are not flying alone; but joined at the hip. We will be flying exactly in the area of interest for which the plane was designed and can fly together, maintain together, and operate together leveraging the air and sea base for which the F-35 B will fly from as well. It is a unique and strategic opportunity for the USAF and for the nations.”

General Novotny added that the two bases joined at the hip can provide a key strategic impact as well.

“As we get this right, we can bring in the Danes, the Norwegians and Dutch who are close in geography and the Israelis and Italians as well to shape the evolving joint operational culture and approach. Before you know it, you’ve got eight countries flying this airplane seamlessly integrated because of the work that Lakenheath and Marham are doing in the 20 nautical miles radius of the two bases.”

The RAF, the RAAF, the USAF and the USMC are already learning how to integrate the F-35 into the air combat force at Red Flags, and recently have included the French Air Force in a Langley trilateral training exercise. But integration will be accelerated by the integration of normal operations from common bases throughout the European region as well.

As Novotny put it: “Doing Red Flags requires bring forces to Nellis and expending monies to come to the exercise, clearly an important task notably in learning to fly together in high intensity warfare exercises. But what can be shape from the RAF Marham and Lakenheath bases is frequency of operations with core allies flying the same aircraft.”

“The same aircraft point can be missed because the UK did not fly F-16s, the Norwegian, the Danes and the Dutch do. And the USAF does not fly Typhoons and Tornados; the UK does. Now they will ALL fly the same aircraft.”

“I did two OT assignments and we worked to get into Red Flag when we could to do joint training. Here we can do that virtually every day. We reach the Dutch training airspace, and can work with the Dutch, with the Brits, with the Germans, with Typhoons, with F3s, with the NATO AWACS. We take off and we fly 30 minutes to the east and we make it happen. It is Red Flag as regular menu; rather than scheduling a gourmet meal from time to time.”

https://sldinfo.com/synergy-and-building-out-extended-nato-defense/

And it is not only European allies who can engage in the cross learning.

The Aussies and the Dutch are standing up their F-35s at about the same time, and cross learning between the Aussies and the F-35 European enterprise is clearly already underway based on my interviews in Australia as well.

In short, the UK is leading the way in shaping a new infrastructure for a 21st century air combat force and with its operational footprint at RAF Lakenheath, the USAF is well positioned to interact with this dynamic of change.

With the RAF and the USAF setting up four squadrons of F-35s between them at two nearby RAF bases, there is a clear opportunity to shape a common sustainment solution.

And the impact of so doing could be significant on the North Sea neighbors, namely, the Danes the Norwegians and the Dutch. This is clearly a key way ahead in building out NATO capabilities going forward, which provides a 21st century example of burden sharing which delivers relevant capabilities.

This piece was first published by Breaking Defense

Allies And 21st Century Weapons: The F-35 Comes To Europe

The Missing Item on the Next NATO Summit: North Korea and the New Nuclear Threat

2017-05-18 By Danny Lam

President Trump will be at the May 25 NATO meeting.

Nuclear Ballistic Missile Threats from North Korea are an existential threat to NATO members.

DPRK is presently not on NATO’s agenda.

It must be.

The Second Nuclear Age is simply not something which NATO wants to discuss or recognize.

But in the form of North Korea, it is central to the new nuclear equation, one in which nuclear weapons are not meant to serve deterrence but other values and objectives.

Avoidance of central challenges may be diplomacy; but is not effective defense strategy.

NATO was founded as a collective security organization to defend against existential threats to members. Post war core Anglo-European values that war is abhorrent, and causes of war, whether economic, political such as territorial disputes, etc. should be settled peacefully are at the heart and soul of NATO.

After the cold war, when Russia violated these core values, first in Georgia, then Crimea, and finally the Ukraine, NATO members unambiguously defended these core Anglo-European values against Russia.

Today, the greatest existential threat to the Anglo-European NATO alliance is not Russia, but coming from North Korea under Kim Jong Un.

North Korea will be able to directly pose an existential threat to at least two NATO members (Canada and USA) within a matter of years, and shortly thereafter, Western Europe.   Existential threats are not just the ability to terminate the existence of an opponent.

But, “the capability to permanently change another group’s values and the way it governs itself against the latter’s will”.

North Korea pose an existential threat in at least two ways: First, by acquiring a credible capability to launch a thermo-nuclear ballistic missile strike aimed at any NATO member in Europe or North America. Secondly, by attacking core Anglo-Western values.

Western analysts and the priesthood of DPRK apologists applied their rose tinted glasses to the DPRK and presumed that they share the Anglo-European abhorrence of war. North Korean motives for acquiring thermo-nuclear weapons and ICBMs to deliver it worldwide is presumed to be for the purpose of “deterrence” rather than war fighting or other motives.

North Korea is assumed to be no different than every previous nuclear power (whether P5 or not) who have acquired nuclear WMDs as an insurance policy but have never used it after WWII. In the classic view, nuclear weapons are only useful as deterrence against existential threats.

But this view does not apply to the DPRK’s historical and present behavior.

DPRK under Kim Jong Un is in fact attacking a core post-war Anglo-European value no different than Russia unilaterally changing borders by force: No war for profit.

The Anglo-European value under attack is that economic gains is not a legitimate motive for war, and winning wars should not result in economic gain. This core value was the result of centuries of European wars fought for wealth and spoils, which in the 19th century resulted in the collection of indemnities by European and later, Japanese victors.

After the Great War, the term “indemnities” was replaced with “reparations” in recognition that no amount collected by the victors could “break even,” let alone garner a profit from the war.  Unfortunately, the smaller Great War “reparations” was found to be itself a cause of World War II.

Thus, post war, the very idea of victors receiving sizable economic gains of “reparations” never entered into the equation. Germany, Japan, Italy and other belligerents that lost paid modest (or none) reparations.

The notion that a major 21st Century state can go to war for economic gain in the old fashioned European Way prior to the Great War, and in the process, collect sizable indemnities that make war profitable is nearly inconceivable to Anglo-European statesman.

Until Kim Jong Un’s DPRK, this consensus was shared by every nuclear armed power:   Russians/Soviets, Chinese (whether communist or not), Indians, Pakistanis, Israelis, etc.

North Korea under Kim Jong Un is now challenging this core consensus by acquiring a credible nuclear arsenal with global reach for the purpose of extortion.

DPRK behavior – the long term, sustained and widespread, formal use of military capabilities – for the purpose of extortion by a government that is not a failed state has no precedence in modern history since 1945.

Extortion is the use of force or threat of force to obtain money, property. It is fundamentally and legally distinct from blackmail. (Bracken, 2017).

DPRK is primarily motivated by profit, not deterrence.

Based on DPRK’s history and precedent, and the dynamics of the Kim Jong Un regime, there is no doubt that the ultimate goal of DPRK’s nuclear arsenal programs are to extort wealth, money, etc. from anyone they can threaten and collect from.

Or in Northeast Asian lingo: Demand Tribute from vassals.

The threat from DPRK is against NATO members “within range” like the US and Canada or successfully extorting from NATO is at present limited.   Other states more immediately threatened by DPRK: Republic of Korea, Japan, China, Russia are prospective tribute paying vassals of DPRK in the medium term.

If DPRK succeeds in extortion with WMDs, a core value and necessary element of global commerce will be undermined.  Once North Korea breaks this taboo, it opens the door for Kim Jong Un to sell the same capability to other powers like Iran, jihadists, and any takers that want to set up their own local racket.

Global commerce as we know it cannot survive the return of extortionist regimes who “tax” commerce or require the payment of “protection money”.

If extortion successfully begins with DPRK, it will not end with Iran.  

Nor will it end with economic motives but revive others like religion and race, to name a few.   As such, Kim Jong Un’s DPRK is, indisputably, an existential threat to all NATO members and the world as we know it.

NATO members, including the United States, have failed to recognize the severity and dangers of this existential threat and the power of collective Anglo-European defense.

NATO was never intended to address an existential threat originating outside of Europe from Northeast Asia.

How to reorganize NATO and seek a new, closer and robust defense pact with Asian allies like Australia, Japan, South Korea, etc. is a clear, present, immediate problem.

President Trump have the opportunity to secure a new NATO consensus about the severity and imminency of the DPRK threat during the meeting.

The Trump Administration must before it is too late.

Editor’s Note: If you wish to comment on this article, please see the following:

Refocusing NATO on Imminent Existential Threats

http://sldinfo.wpstage.net/classic-deterrence-theory-does-not-explain-north-korea-what-does/

US Intelligence Setback: A Warning Call About the Need to Protect Personal Data

2017-05-22 By Ed Timperlake

A threshold now may have been tragically crossed in Electronic Surveillance.

Meta data collection is merging with machine-based analysis to filter actionable intelligence. And this information can now be merged with facial recognition software and ubiquitous camera presence. In a police state like the PRC, this provides significant tools to both control citizens and to deal with foreign influences which the regime will not tolerate.

The PRC also has access to commercial credit databases like Experian, etc. that is a gold mine of info for recruitment of spies in every OECD nation.

While serving as Director Technology Assessment, International Technology Security, (ITS) Office of the Secretary of Defense (2003-2009) I became familar with information systems that captured metadata and then harnessed powerful machine based analysis to filter actionable intelligence in order to make America and our Allies safer.

I personally saw the power of their vision being merged with the power of information age technology and was hugely impressed.

However, in our ITS office, we then had a series of discussions about employing such metadata collection and analytical efforts for our Counterintelligence (CI) mission. I saw tremendously powerful new tools.

But, during our ITS office robust discussions, a very smart co-worker flagged his deep concerns about proceeding down this path. This colleague pointed out that it was way too much power to give to the government.

The lowest common denominator is the key source of concern about a government information collection system gone wild.

It is not even about the integrity of the system; it is about a system that can not ensure the integrator of the lowest common denominator.

I personally don’t want a PFC Manning using my personal data for whatever advantage he believes he has the right to gain from that data. PFC Manning is most definitely at the bottom of the Chain-of-Command but what about our leaders and their performance as well?

We need a new systems architecture that compartmentalizes our personal information not just for the sake of protecting civil liberties, but to prevent misuse by both our own government and foreign powers.

We are creating a “one stop” collection effort for PLA Ministry of State Security  (MSS) “collectors.”

What PFC Manning can do, certainly the PLA can do.

China to control their citizens makes no pretense about protecting privacy and routes their cellular exchanges through the Peoples Armed Police. Inside and outside of China, PLA collectors try to collect everything important t their interests and their presentation of reality.

This is their constant unrelenting pattern and practice.

We are now quickly making it very easy for them.

The issues of cyber penetration by collectors can be very simple; touch one classified secure system and very possibly a spy can touch them all.

Tragically, thanks to a recent and extremely important Washington Post story we now know that PLA cyber attacks to acquire highly guarded information about critical defense technologies have been very successful.

Hopefully the US is rapidly addressing that problem and fixing it.

https://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html?utm_term=.5d508d6bfc8c

http://www.sldforum.com/2013/06/is-america-on-the-eve-of-an-electronic-wave-of-terror/

https://soundcloud.com/thelarslarsonshow/is-america-on-the-edge-of-an-electronic-wave-of-terror-an-interview-with-ed-timperlake

Now a great human tragedy has been identified as playing out in China.

The New York Times just broke one of the most important stories about a successful 21st Century counter intelligence operation by the PRC.

The South China Morning Post gives reporting kudos to NYT and their headline captures the current state of play:

China killed or jailed up to 20 US spies in 2010 to 2012, report says

‘One of the worst US intelligence setbacks in decades’ may have been the result of hacking, code-breaking or betrayal by moles within the CIA

Beijing systematically dismantled CIA spying efforts in China beginning in 2010, killing or jailing more than a dozen covert sources, in a deep setback to US intelligence, The New York Times reported on Sunday.

http://www.scmp.com/news/china/diplomacy-defence/article/2095100/china-killed-or-jailed-20-us-spies-2010-2012-report

What has been missed so far is the potential merging of all things in U..S total information awareness electronic files with accurately reported successful breaches by hostile intelligence services.

These services can merge data with the next step in counter intelligence technology — facial recognition technology.

Merging purloined highly classified information about U.S. Intelligence Community sponsored “collectors” or agents of influence in play inside the PRC with facial recognition technology become a powerful tool.

The PRC may well have deployed automated speech recognition software to screen a large amount of verbal conversations they monitor as well.

Already we have seen the use by China of surveillance and facial recognition systems at the 2008 Olympics.

Under Beijing’s seven year, $6.5 billion program called the Grand Beijing Safeguard Sphere, the Chinese government has installed roughly 300,000 video surveillance units around the city, according to a Los Angeles Times article. Included in that project and in conjunction with the video cameras, China has also deployed a face recognition technology in hopes of catching unwanted visitors at the Olympics in Beijing this summer (2008).

Chinese officials are hopeful that it soon will be able to identify individuals out of a moving crowd. While China does have legitimate concerns over watching for Chinese critics and activists as a recent attack killed 16 police officers, Western security experts fear that China is pushing the envelope.

In addition to video surveillance, there are reports of the Chinese Government monitoring and controlling internet access, monitoring hotels and taxis, and employing ordinary citizens as snoops for suspicious behavior.

https://www.secureidnews.com/news-item/china-to-use-surveillance-and-face-recognition-to-stop-activists-at-olympics/

During the run-up to the Beijing Olympics, a system of monitoring cameras that combined the optical TV scanners with facial recognition software and a database of known terror suspects was initiated.

The system was designed and able to flag people and issue alerts in near real time.

As usual, the PLA in reaching out globally would demand that the technology transfer would include database of known terrorists.

It is unknown how far the transfer of any database would have been allowed. And such merging of data is indispensable to the kind of activity reported by the New York Times by the Chinese counter intelligence services.

Editor’s Note: If you wish to comment on this article, please see the following:

We Need a New Systems Architecture to Protect Personal Data and to Deal With Foreign Espionage

North Korea, Trump and NATO: A Significant Challenge to the Western Alliance

2017-05-22 By Danny Lam

North Korea responded to President Trump’s visit to Saudi Arabia and $110 billion arms sales on behalf of Iran with a ballistic missile test.

Coming a week after the last missile test, the medium range ballistic missile is believed to be a solid fueled Pukguksong-2 with a potential range of 1,200-3,000km.

Sent as a proxy message from Iran, all of Saudi Arabia and Yemen, as with parts of NATO members like Germany, Italy, Poland is within range.

DPRK’s message sets the stage for President Trump’s first NATO meeting in Brussels.

At present, North Korean nuclear ballistic missiles are regarded by NATO members except the United States as a non-proliferation nuisance that barely warrant a protest note and perhaps a desultory discussion at a leisurely disarmament conference.

NATO member Canada, who is aspiring to be elected as a UN Security Council member, did not see fit to issue any statement or expressed any concern about the DPRK threat.

Iran is the primary financial sponsor of DPRK’s missile and nuclear arsenal programs and will be the beneficiary of the technical data and expertise garnered from the tests.

The United States and Canada are no longer the only NATO members threatened by NORK WMDs: When Germany, Italy and Southeastern NATO members like Poland, Turkey, are within range of Iranian-DPRK nuclear missiles, it is indisputably an existential threat to NATO as a whole.

NATO have been slow to recognize the tight coupling between DPRK-Iran WMD programs as an existential threat, preferring to focus on apparently more salient issues like NATO’s relevancy, Russia, Ukraine, Afghanistan, Homophobia, Gender Equality, or progress toward 2% GDP spending on defense circa 2030.

Far from the mind of NATO members, including nuclear armed UK and France, is that extended deterrence may fail given DPRK’s thinking in the historical and martial traditions of Northeast Asia.

North Korean and Iran are in fact an imminent, clear, and present existential threat to NATO members in two ways:   First, as an existential threat where thermonuclear ballistic missiles can destroy significant portions of NATO.   Second, an existential threat in that North Korea have indisputably and repeatedly demonstrated that they intend to use their nuclear arsenal for the purposes of extortion.

Once the taboo against using nuclear arsenals any other purpose beside deterrence is breached by its use for economic extortion by North Korea under Kim Jong Un, it opens the door for its use for other purposes: e.g. compel adoption of a particular religion, genocide, etc.

In other words, the destruction of Anglo-European values, and with it, the global economic system on a grand scale.

NATO members have expressed fear and trepidation at President Trump, “It’s like they’re preparing to deal with a child — someone with a short attention span and mood who has no knowledge of NATO, no interest in in-depth policy issues, nothing,”.

Perhaps NATO officials should have a deep look at how in fact they fit this description as shown by their collective blind eye and refusal to look at, let alone acknowledge the DPRK-Iran nuclear arsenal problem.

President Donald J. Trump brings to the table a unique perspective.

He is probably the only NATO head of state/government that have had a lifetime of experience dealing with extortionists. As a major real estate developer, President Trump have on more than one occasion been “shaken down.” He knows intuitively how much he will tolerate, and at what point, summon the police.

The DPRK-Iran WMD problem is in many ways, similar.

DPRK has a history of and is presently making extortionate demands, e.g. to be paid to halt WMD development and deployment.

Iran was handsomely paid off by the Obama Administration, only to shift their nuclear arsenal and missile development to DPRK with their new found access to tens of billions of cash.

Once paid off, both DPRK and Iran are back at it again unless they get paid more: The classic behavior of an extortionist.

President Trump is now the leader of the world’s police force: A weak, fractious “federal” police force at the UN with no direct military power, and a potentially powerful police force of US, NATO and non-NATO allies.

During the NATO Summit, President Trump has the opportunity to sound the warning about the true character and nature of the DPRK-Iran Axis like Sir Winston Churchill did in November, 1934, when war weary European leaders are obsessed with appeasing that Austrian Corporal.

Sir Winston Churchill’s early warning was ignored until well into late 1930s. By then, it was too late to prevent another world war.

President Trump, by alerting NATO allies to the threat and forging a consensus for collective action, can accelerate the process of fielding a more credible deterrent against DPRK-Iran and others, before it is too late.

 

 

The RAF and the Weapons Revolution: Shaping an Integrated 21st Century Air Combat Force

05/21/2017

2017-05-13 By Robbin Laird

The RAF is positioning itself for a triple transition.

The first transition is from the Tornado to Typhoon.

The second is the transition is to a fifth generation enabled air combat force.

The third transition is the deployment of F-35s aboard the new Queen Elizabeth class carriers and shaping their operational integration with land based Typhoons into an air-sea-land combat package.

The weapons revolution is being set into play enabling the capability to shape an integrated offensive-defensive strike force. 

And at the heart of this transition are MBDA weapons being acquired through the UK’s Team Complex Weapons approach.

This is an approach which expands the partnership between industry and government whereby the customer can work more closely with industry to shape and drive the needs customized to its force development.

In this case, the customer needs to enable its high end legacy aircraft with an integrated approach to fifth generation enablement.

The first transition is about the Tornado going out of service with the Typhoon subsuming many of its core missions.

And this is being done by modifications to the Typhoon in its cockpit and software and the incorporation of key Tornado weapons, such as Storm Shadow and Brimstone.

This overall transition is referred to by the UK as the Centurion program which is designed to transition Tornado capabilities to the Typhoon by the end of 2018.

The incorporation of Tornado weapons is part of the Phases 2 and 3 Enhancement packages for Typhoon and also includes the introduction of a new missile the Meteor that can be considered to be a new capability being added to the force.

The Meteor adds range and lethality to the Typhoon in terms of its ability to carry out its air superiority missions.

While the incorporation of the Tornado weapons provides for an expanded Typhoon role, the addition of Meteor represents the next step in the weapons revolution enabled by fifth generation aircraft.

The Meteor’s longer range means that forward targeting by F-35s with data sent to Typhoons enables the air combat force to significantly enhance its overall capability to deliver longer range strikes against adversary air forces.

It shifts the consideration from the role Meteor can play on Eurofighter organically, to one whereby Eurofighter is providing strike for the penetrating air combat force enabled by the F-35.

This has already been seen at Red Flag 17-1 one this year.

Discussions with the Aussies, Brits and Americans involved in this year’s high end exercises emphasized that Typhoon’s strike weapons were enabled by targeting data from F-35s operating deeper in the battlespace.

When Meteor is added to Typhoon this means that Typhoons can fire its weapons load against targets identified by the F-35 force at a greater distance because of Meteor with network enabled kill capabilities.

This is the template for weapons to come.

It is about weapons in the force being empowered by forward targeting and decision making by the F-35 which in turn then highlights the importance of high weapons load outs which the Typhoon is designed for.

The Meteor then provides a strike means of much greater range than current US shorter range strike weapons.

In other words, the RAF is preparing itself with its longer-range strike weapons, Storm Shadow and Meteor, to be a core weapons carrier for an F-35 enabled combat force.

And the force is being designed along these lines.

There are other key advantages of the approach as well.

With various European legacy air forces buying Meteor and Storm Shadow, stockpiling of weapons can be enabled to reduce costs and to enhance capabilities at the same time.

With Meteor to fly on multiple European air frames, development costs can be reduced, modernization enhanced and logistical reach enhanced.

This also is a template upon which forces can build.

Both templates – off-boarding of strike and weapons stockpiling across air frames – are key to the next phase of the weapons revolution.

The first will be about building out capabilities from a force which no longer is focused on what the single combat aircraft or its close proximity wing men can deliver but upon what the combat force can deliver enabled by F-35 forward based decision making and target identification.

A glimpse of this future was seen in Red Flag 17-1 one where one RAF pilot asked “Where are our SEAD weapons for Typhoon?

The F-35 identified clearly the targets; but why is it dropping weapons in the SEAD mission?

Why not pass that on to us and we can then fire the long range SEAD weapons against targets identified, selected and ordered up by the F-35s?”

Good question and will be answered by the next phase of the weapons revolution.

Another part of this evolving template was seen in tests earlier this year whereby MADL data (the video data stream which the F-35s use to transfer machine to machine data) was passed to Typhoons.

This development opens up the possibilities of transferring selective targeting video packages to other elements of the combat force.

And this could well see the transfer of another of the Tornado experiences, namely, the role of the weapons officer.

The Tornado has continued to fly for so long with effectiveness largely because of the combination of a weapons officer on board and the arrival of dual seeker Brimstone.

This strike package is a bus containing weapons which are independently directed to their target and managed by the weapons officer onboard Tornado.

Spear 3, a new MBDA weapon, will allow the single cockpit aircraft to use automation to replicate some of this capability.

But the role of the weapons officer could well be transitioned from a platform like Tornado to the combat force itself.

There is no reason that the weapons officer could not be flying on the Wedgetail, or A400M or another aircraft whereby the distributed strike force has embedded in it lower cost weapons which are guided to their targets by a weapons manager supporting the fifth generation enabled strike force.

And this will clearly be the case as the capabilities of the naval surface fleet flow into the air combat force as well.

Clearly, there is no reason weapons from a surface ship could not become part of the strike arsenal of an F-35 enabled air combat force.

RAF Typhoons leaving EOR at JBLE for an Atlantic Trident ’17 vul.

Last year, I discussed this development with a number of UK, Australian and US naval officers and clearly the ultimate meaning of the US Navy’s focus on NIFCA is to enable a JIFCA.

The Navy is working on the integration of several assets to deliver integrated strike but there is no reason that this effort should not break service boundaries and become joint.

The UK is in a good position to do this as their F-35 force will be flown by an integrated team of Air Force and Navy pilots and enabling a carrier strike force.

From Presentation by Captain Walker, Royal Navy, at the Williams Foundation seminar on Air-Sea Integration, August 2016

The opportunity was highlighted in an interview I did with, Rear Admiral Mayer, the Commander of the Australian Fleet, last year in Australia.

Clearly, a key part of the evolution is about shaping a weapons revolution whereby weapons can operate throughout the battlespace hosted by platforms that are empowered by networks tailored to the battlespace.

And that revolution will have its proper impact only if the network and C2 dynamics discussed by Rear Admiral Mayer unfold in the national and coalition forces.

“The limiting factor now is not our platforms; it’s the networks and C2 that hold the potential of those platforms down.

“When the individual platforms actually go into a fight they’re part of an interdependent system, the thing that will dumb down the system will be a network that is not tailored to leverage the potential of the elements, or a network that holds decision authority at a level that is a constraint on timely decision making.

“The network will determine the lethality of our combined system.”

In short, the way the RAF is approaching Typhoon-F-35 integration prioritizes the weapons revolution and network enablement.

This is clearly the way forward for a 21st century air combat force.

And the shift in how integration is done and the reshaping of combat effects was evident in Red Flag 17-1.

With the F-35 in RF17-1, the entire combat force was reconfigured to get maximum advantage from the performance of the other air combat assets.

This reshuffling was driven by the forward operating SA of the F-35 and its ability to make decisions on the fly and to drive appropriate information to informed combat assets to deliver ordinance on target.

With regard to the RAAF and its participation in Red Flag 2017-1 and the role of Wedgetail, Group Captain Bellingham had this to say about the evolving approach to fifth generation enabled air combat:

Question: I think Red Flag 17-1 is a good example of how we collectively are shaping a way ahead.

In effect, we are seeing the training of a network of operators who can shape high intensity air operations under the impact of fifth generation warfighting concepts.

The technology is crucial; the platforms are important; but it is the training towards where we need to go that is crucial, rather than simply training to the past.

Is that not where your experience with Wedgetail and working with allies comes in?

Group Captain Bellingham: That is a good way to set up the discussion.

I think the strength of everything we’re doing at the moment only comes from a strong cooperation with our allies. Obviously, we’re a tiny force, and our relevance and real strength becomes fully apparent when we tie our capabilities with those of our allies.

At Red Flag 17-1, we saw the US, the UK and Australia blending advanced assets together to make the entire force more lethal and survivable in the high end threat environment.

RAF Typhoons on the ramp with Strike Eaglesat Joint Base Langley-Eustis during Atlantic Trident ’17.

And in a discussion with RAF pilots participating in Red Flag 17-1, the key impact which the F-35 has on the combat force.

“As we introduce the F-35, the pilots have to adjust to the fact that their machines will see and convey data that they themselves are not looking at.

“And different airplanes will have different levels of SA in the battlespace.

“How to adjust the operation of the force to meet this challenge?”

And there are legacy and then legacy aircraft when it comes to the impact of the F-35.

“If you optimize the relationship between fourth and fifth-gen surely you’d have your fourth-gen as out of harm’s way as you could as they are not low observable amongst those things.

“Therefore, you’d want to have onboard the 4th gen aircraft longest-range weapon you could possibly manage and I don’t think a Hornet of any variety is the right platform for that.

“And actually Typhoon, whether it’s by accident or by design, does give you that especially with Meteor.”

And the RAF is moving ahead with F-35 and Typhoon integration on the connectivity level as well.

In the Babel Fish III trial in February 2017, enhanced connectivity was demonstrated.

“During the trial, the Northrop Grumman Airborne Gateway connected the fifth-generation F-35B, which communicates using the stealthy Multifunction Advanced Data Link, and the fourth-generation Typhoon, by translating MADL messages to Link 16 format. Link 16 is the U.S. and NATO military tactical data link used by some military aircraft, ships and ground forces to communicate and exchange tactical data.

The F-35 and the Typhoon can communicate directly via Link 16 but previously could not communicate or share certain fifth-generation information.”

Andrew Tyler, chief executive, Northrop Grumman Europe said:

“Being able to network sensor data between fifth-generation and fourth-generation fast-jets and other battlespace assets in a stealthy manner is critically important to enabling the full capability offered by fifth-generation aircraft.

We are pleased to have played our part in this successful trial, the output of which will help the MOD to broaden its understanding of the effect that can be generated by its fifth-generation combat-air fleet.”

Air Commodore Linc Taylor Senior Responsible Owner for the UK’s F-35 Programme said:

“I have been enormously impressed both by the collegiate effort to make the Babel Fish III trial happen so successfully, and the specific outcomes of the trial.

This marks another great step forward in interoperability between our fourth- and fifth- generation aircraft, putting the RAF at the forefront of this work. We plan to continue to understand and develop where the most capability and interoperability benefit lies through a series of future trials along similar lines.”

According to the company:

“Bridging this fifth-to-fourth generation platform interoperability gap was made possible by the inclusion of a Northrop Grumman Freedom 550™ software-defined radio in the Airborne Gateway.

The Freedom 550™ is derived from the integrated communications, navigation and identification avionics suite the company developed and manufactures for the F-35; it was validated under the Jetpack Joint Capability Technology Demonstration programme, an effort sponsored by the Office of the Secretary of Defense and U.S. Air Force that concluded in 2014.

Northrop Grumman’s Airborne Gateway translates and relays information from various sources across diverse platforms and domains to enhance interoperability, situational awareness, communications and coordination for warfighters in the air, on the ground and at sea. The system is derived from the combat-proven airborne communications node that Northrop Grumman provides to the U.S. Air Force.”

F-35 aircraft have also successfully passed target data off to Typhoon jets who then successfully engaged the target during Exercise Red Flag.

The F-35 is designed to share what it sees with legacy aircraft.

The US Air Force state that the lethality of the aircraft comes from ‘a combination of stealth, electronic attack, information sharing, and other features make the platform an invaluable part of a modern air-strike package.’

Col. George Watkins, 34th Fighter Squadron commander said:

“Our strength with the F-35 has been finding the threats.

We use our onboard system to geo-locate and get a picture of the target, day or night, through the weather. We pass that threat information to others while using our stealth capability. We can get a lot closer to the advanced threat than anyone else can get.

That allows us to target them out and take out critical assets.”

Lt. Col. Dave DeAngelis, F-35 pilot and commander of the 419th Operations Group said:

“During one scenario, the Airmen were given a general location by advanced intelligence, surveillance and reconnaissance aircraft. The F-35s were tasked with finding a convoy carrying a high-value target.

The F-35s advanced targeting capabilities were able to pinpoint the convoy’s location. They then communicated that to British Typhoon fighters who took out the target.

The thing that’s great about having Link 16 and MADL onboard and the sensor fusion is the amount of situational awareness the pilot has.

“I’m able to directly communicate with specific formations and I can see the whole war, and where all the other players are, from a God’s-eye view.

“That makes me a lot more effective because I know who to talk with and at what times, over the secure voice.”

The F-35 uses the Link 16 secure architecture to communicate with fourth-generation aircraft in the Red Flag fight and combined with the Multifunction Advanced Data Link, which allows pilots to see the battlespace and share that data with other F-35 pilots.

Using the F-35 as a broad area sensor can also significantly increase a warships ability to detect, track and engage a target.

An unmodified US Marine Corps F-35B from the Marine Operational Test and Evaluation Squadron, based in Edwards Air Force Base, acted as an elevated sensor to detect an over-the-horizon threat.

The aircraft then sent data through its Multi-Function Advanced Data Link to a ground station connected to USS Desert Ship, a land-based launch facility designed to simulate a ship at sea.

Using the latest Aegis Weapon System Baseline 9.C1 and a Standard Missile 6, the system successfully detected and engaged the target.

The exercise was the first live fire missile event that successfully demonstrated the integration of the F-35 to support Naval Integrated Fire Control-Counter Air and represent a very promising exploration into the interoperability of the F-35B with other naval assets.

The F-35 will drastically increase the situational awareness of the forces with which it will deploy and for the UK, where deployed numbers may be a concern, it represents a fantastic way to enhance combat capability in any coalition or national effort.

Editor’s Note: The photos of Typhoon at Red Flag 17-1 are credited to the RAF. 

 

The Role of Unmanned Aerial Systems in the Remaking of the Amphibious Task Force: The Perspective of Lt. General (Retired) Trautman

2017-05-17 By Robbin Laird

President Trump has come to power at a time when a very flexible force able to insert from the sea and rapidly return to the sea has emerged.

This USN-USMC capability has migrated beyond the classic Amphibious Ready Group-Marine Expeditionary Unit (ARG-MEU) into a very flexible and lethal amphibious task force.

The evolving Marine Corps aviation assets, coupled with the reshaping of Marine Corps concepts of operations for conducting force insertion from the sea, are shaping a new capability and within that capability unmanned aerial assets are playing a key role.

One of the key architects of the Marine aviation revolution has been Lt. General (Retired) Trautman.

During his tenure as Deputy Commandant for Aviation, the Osprey began its first deployments to the Middle East, the H-1 Venom and Viper were introduced to the Fleet and the F-35B was coming to its initial fruition.

With the continued development of the CH-53E into the K and the addition of unmanned aviation, the mix of flying assets that would work with the Ground Combat Element to shape new MEU capabilities was put into motion.

I had a chance recently to talk with Lt. General (Retired) Trautman about the unmanned element and its role in the evolving way ahead for Marine Corps transformation.

Question: The UAVs going on ships now really had their origin in the land wars.  

How did the process get started?

Lt. General (Retired) Trautman: It goes back to the time General Jim Conway was in Iraq with the 1st Marine Expeditionary Force and he found a little company that was making the Scan Eagle UAV.

Believe it or not, the Scan Eagle was being used for the Albacore fishing fleets up in the Pacific Northwest at the time.

In other words, Scan Eagle has a shipboard legacy already built right into it.

But, the Marines evolved the Scan Eagle principally as an asset for land based operations in Afghanistan and Iraq.

And, in recent years with the focus placed on returning to the sea it became obvious that a similar capability on board our amphibious task force would be quite useful.

That is what led us to make the selection of the RQ-21 Blackjack which is now deploying on our Marine Expeditionary Units and by all accounts it is doing quite well so far.

Question: It is very challenging to operate unmanned air systems onboard ships and could you discuss those challenges?

The Blackjack at Sea from SldInfo.com on Vimeo.

Lt. General (Retired) Trautman: Many people who have not spent a lot of time at sea really don’t grasp the inherent challenges that you have when you launch and recover from a sea base.

The Marines over the years, along with their partners in the US Navy, have built an aviation force that’s quite credible from the sea. F-35Bs, MV-22s, H-1s and the evolving CH-53K all come into the force at a very important time as our nation evolves into a better understanding of the value and proper use of the amphibious task force.

In parallel with those developments, we must figure out how to take advantage of unmanned aerial systems.

As we do that operationally, we at the same time have to experiment and learn and use systems from the sea in ways that cause us to understand what new systems we should procure in the coming decade as well.

In other words, the foundation for the future is being built with our experience on board our amphibious ships today as the new aviation assets marry up with the unmanned systems onboard our ships.

Question: And having the UASs onboard allows the Marine Corps commanders to sort out how best to use those assets in operations as well.  How might they do that?

Lt. General (Retired) Trautman: If I’m a task force commander and I’m deployed somewhere around the globe, I want to be prepared to conduct operations at a moment’s notice when the mission dictates.

I also want to have the flexibility to conduct all of my sorties from the sea or if necessary transition to an expeditionary land base for short duration operations that make an impact on the enemy before quickly returning to sea.

I want unmanned aerial systems that enable me to do whatever I need to do in order to accomplish the mission.

That means I need range, speed, endurance, the ability to take off and land vertically, a wide range of payloads, non-proprietary payload “hooks,” and the best Size, Weight and Power (SWAP) advantage I can attain.

To do that, you have to think long and hard about the types of capabilities that you wish to procure.

Whether it’s classic UAS capabilities like intelligence surveillance and reconnaissance, the delivery of precision weapons, or electronic warfare, there are a whole host of missions that unmanned systems can do with the right payloads.

The key is to have those systems with me, use them and determine how to get the most effective use from them in the widely varied operations that an amphibious task force will pursue.

Question: When you were DCA you worked the decision to sunset the Prowler electronic warfare aircraft.  

That clearly has an impact on the payloads which you want to have on a UAS as well?

Lt. General (Retired) Trautman: It does.

We made the decision in 2009 to sunset the Prowler a decade out in 2019.

We did that with our eyes wide open knowing that the F-35B would be coming into the force in a more robust way by that time.

There are inherent electronic warfare capabilities resident in the F-35 but our vision also included the need for unmanned aerial systems to proliferate in the battle space to round out the electronic warfare requirements that the force will have.

We’re in our infancy right now in developing those capabilities, but the first step in achieving something is to get started, and to put the capabilities in the hands of young men and women who are in the force and then evolve the capability in a way that makes sense.

I’m confident that we are on that trajectory with our unmanned aerial systems and the payloads that we will develop for those systems in the next few years.

Question: And the experience being gained now and in the next decade will clearly shape the way ahead not only for the amphibious task force but for the unmanned element.  In other words, the approach is to experiment by operational use.  

What happens next?

Lt. General (Retired) Trautman: The current Deputy Commandant for Aviation has been very prescient in laying out a requirement for a program called MUX (MAGTF Unmanned eXpeditionary UAS) which the current aviation plan says will be ready for initial operations in the 2025 time frame.

That platform, whatever it becomes, should have the capability to take off and land from the sea base, to take off and land from an expeditionary operating location ashore and deliver long range relatively high speed service to the fleet so that you can use that range and speed to your advantage.

It should also come in with adequate power and non-proprietary “hooks” so that future users can employ whatever payloads make the best sense for the force as it evolves.

This is a very exciting time for the development of unmanned systems in support of the amphibious task force and the Marine Corps.

Editor’s Note: The photos and videos highlight Blackjack training aboard the USS San Diego with the 15th MEU.

The Marines refined their launch and recovery procedures of the RQ-21A Blackjack during COMPTUEX in order to provide reconnaissance for the planning and execution of future missions.

Through a high degree of unit training, the 15th MEU forms a flexible sea-based Marine Air-Ground Task Force capable of mobilizing personnel and equipment to any corner of the globe.

For Todd Miller’s look at the preparation of the 15th MEU see the following:

The 15th MEU & America ARG Take Next Steps in Deployment Preparation

Cyber Hammering Requires Cyber Defense

05/18/2017

2017-05-15 The President has recently signed a new executive order on cyber security.

According to an article by Brooke Singman published by Fox News on May 11, 2017:

President Trump took aim at the federal government’s vulnerability to computer hacking Thursday, signing an executive order that mandates a top-down review of cybersecurity and holds agencies accountable for safeguarding digital information.

The executive order states that it will “hold heads of executive departments and agencies accountable for managing cybersecurity risk to their enterprises.” White House Homeland Security Adviser Tom Bossert, speaking at the White House press briefing, said the White House took the action because online vulnerabilities at the agency level can put the nation at risk.

“The United States invented the Internet and we need to better use it,” Bossert said. “There will always be risk and we need to address that risk.”

The order seeks to improve the network securities of U.S. government agencies and protect critical infrastructure, like the energy grid and financial sector, from attacks that lawmakers and officials have warned could pose a major national security threat. It follows a turbulent election year in which Russia and other entities were accused of meddling in the U.S. election.

While an executive order is welcome, getting on with the solution is slow in coming.

And Secretary Wynne has hammered home the point that no amount of software fixes are going to solve the cyber security problem.

He pointed to recent extortion efforts as an illustration of the wild west future of the cyber war.

“This is just the beginning of extreme lawlessness, with the introduction of anonymous currency, and as smart as our Cyber industry is, they have not corrected or even definitively identified the root cause for cyber hacking.

“There is a wonderful Russian joke that starts with a Village Pastor offering advice to a chicken farmer to restore health to his flock.

“After several sessions, all the chickens are dead.

“When told, the advisor Pastor says, too bad, I had many more solutions to offer.”

What Wynne has in mind is the recent cyberxtortion attack in Europe.

A global cyberattack, unprecedented in scale, had technicians scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide cyberextortion attack is so unprecedented, in fact, that Microsoft quickly changed its policy, announcing security fixes available for free for the older Windows systems still used by millions of individuals and smaller businesses.

 After an emergency government meeting Saturday in London, Britain’s home secretary said one in five of 248 National Health Service groups had been hit. The onslaught forced hospitals to cancel or delay treatments for thousands of patients, even some with serious aliments like cancer.

Home Secretary Amber Rudd said 48 NHS trusts were affected and all but six were now back to normal. The U.K.’s National Cyber Security Center said it is “working round the clock” to restore vital health services.

Security officials in Britain urged organizations to protect themselves by updating their security software fixes, running anti-virus software and backing up data elsewhere.

Who perpetrated this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

And all this may be just a taste of what’s coming, a cyber security expert warned.

No executive order is going to wave a magic wand and eliminate this particular problem.

Only a fundamental change will do that.

And we are republishing an earlier piece by Secretary Wynne that would suggest to President Trump that there is an alternative to simply writing another executive order.

2016-11-20 By Michael W. Wynne, 21st Secretary of the Air Force

Summary:

Academics have known since 1934 that Turing computers were and remain inherently vulnerable to hacking as Godel and Keene Mathematically proved, and confidently expressed that proof in the years following.

The times were different; and computers were just aborning, and abandoning a rule of circuit design to firmly comprehend the relationship of every input to every output seemed acceptable when operating in isolation.

As society wallows in the deceit that a software patch can save the Turing Computing Machines that underlay the present Internet, we find even senior security officials such as the Chair and Co-Chair of the Intelligence Committee espousing the thought that protection is simply unavailable.

This is not fact based, but has grown to be the popular myth.

Returning to complex circuit design to mimic the intended digital circuit can and should underpin the ‘Designed in Security’ our society seeks, a proper defense.

Background:

The Internet was developed many years after the underlying flaw of the Turing Computing Machine was both invented and reviled during the 1930’s.

Turing is celebrated for his major contribution of code breaking, and as well the breakthrough in speed, using the phraseology in his topology of ‘this sentence is false’ leading to an acceptance of intent over precision in his computational mathematics.

Later as other mathematicians examined his processes, the fact of the endless recursive nature of the process allowed others to implant errors in this process, which essentially derailed the machine output. This has leading partially to the phrase “Garbage in Garbage out” as students who followed Turing grappled with the flaw.

My first encounter with computational mathematics was in an analog laboratory in junior high school where we were asked by the instructor to construct a difficult equation using classic ‘AND’ and ‘NAND’ logic based systems.

Looking back on that equation, there is no way to alter the setup without invading the circuit design. As well a bad answer would lead immediately to first a low grade, and second to a re-examination of the circuit for correction.

Thus every output had a known input.

Later, as a part of the autopilot design for the AC-130 gunship, which I and fellow Air Force Academy Instructors had compiled into an on board computer, testing at the Air Force Flight Dynamics Laboratory revealed a terrible anomaly was occurring.

Reflecting that they were in the analog world, and tested analog flight control systems, they took many hours of data illustrating a random control output that flapped the flaps, misguided the rudder, and generally was a disaster waiting to happen. With this information, from the digital perspective we were able to immediately discern that a flaw had been introduced into the program, and found a pointer looking at a random number generator, instead of the control table that we had carefully constructed. Thus, the anomaly was discoverd.

Looking back, there was a lesson, and that was that we had non-maliciously introduced this flaw in the digital domain, and it was detected by the rigor from the analog domain.

Thorough testing using solid circuit design requirements was the key to dealing with the anaomaly.

A shift from software patches to analog circuit design provides a way ahead. Source: Getty Images
A shift from software patches to analog circuit design provides a way ahead. Source: Getty Images

Later still, my daughter was typing away in the college library, when an old fashioned image of a bomb appeared, counted down, and destroyed all of her unsaved work. This prank was a precursor to the current malicious code that can be introduced from distant locations, though it was local at the time.

As this was not the intent of the university Computer Center, it was an indicator that symptoms of our current problems were evident before the Internet was expanded to a universal norm.

Naturally, a software fix, searching for this particular ‘bug’, was introduced. This was also a precursor to our current fixation to software patches that even come to my home computer (windows based) many times a month.

Years later, as the then National Security Advisor, Condoleezza Rice, advised that the Internet was becoming the wild west; and images from the other side of our placid computer screen were shown to be violent, society began to realize we had a problem.

When I became Secretary of the Air Force, I introduced Cyber into the mission of the Air Force to mobilize for the defense of this new domain; where rested much of our Command and Control.

When the Air Force recruiting headlines for Cyber professionals began to emerge, the Air Force was excoriated by the legislature for being overzealous, and mis-judging the problem with the Internet.

All have since been validated; but the problem of defending the domain remains.

It is time for a serious conversation and shaping a new approach, notably because the President-elect has set a key goal as shaping new civilian infrastructure and strengthening the US military.

Current Situation:

It is often said that doing the same thing, but expecting a different answer to emerge is a sign of insanity, though we are all guilty of this flawed thinking.

Putting a software patch on top of a flawed hardware system to counter punch an invader may be fulfilling, but it is been proven over and over to be fruitless.

None-the-less, as an Eighteen billion dollar industry, not unfulfilling. Even now the National Institute of Standards has essentially declared out loud the futility of the many solutions it has encountered, citing the patience of the Advanced Persistent Threat in many papers. It as well stipulates that many penetrants never realize for many months or years that a penetration has occurred, until it becomes advantageous for the agent to disclose the information, or a separate patch unwittingly discovers the loss of data.

Many times the victim has no idea there was an issue. Corporate Boards are leery of liability, and thus in denial; or becoming part of the herd of software patch payers.

But society is slowly becoming aware that this is a scam, that they are riding an unending strife curve; and the alarms are beginning to sound as if the end of life as we know it is nigh again.

It is seeping into engineering and into design that those that have stayed with Analog are immune to this Internet, distant and malicious, threat. Whether aircraft safety systems, or in some of the most carefully protected areas; suddenly what is old is new again.

I would like to beat the drum for a ‘blast from the past’ and celebrate the re-emergence of computational analog circuit design.

As well; I would raise a ceremonial toast to a systems engineering rule for thoroughly understanding every input and output response before the system goes on line.

This is a marked departure than ‘crowd sourcing’ corrections to flawed software, which by its very nature invites malicious activity, while waving the flag of cooperation and collaboration.

When it comes to National Security; or to Public Infrastructure, this is flawed policy and needs to change dramatically.

Even the Internet of Things (IoT), now popular, requires re-evaluation when public safety in the form of vehicle control, or Grid, or Pipe, or Dam, is at risk.

Forward Look:

I recently gave a presentation in China at a University there, citing the Systems Engineering principles, and identifying the fatal flaw which has been like a virus that has never been extinguished, but instead tolerated for its good parts; but is now becoming a civil defense issue that should be addressed.

I would say for our National purposes, it is time that we followed some prescriptive advice and agree upon a path that will settle down the current rhetoric; and may create a level playing field, where Intellectual Property can easily be protected if desired; and our National Interests can be logically addressed.

For sure, the cited eighteen billion dollar industry is not going away; but can slowly morph into creating useful paths to a safer Internet.

Society is ready; and now the professionals have to decide on priorities, and action.

I would suggest that we should prioritize the goal that USG Web sites immediately be protected using frozen (e.g.; non reprogrammable) complex analog circuitry mimicking and replacing currently installed internet appliances.

Further; that Infrastructure Owners be tasked to put in place protected SCADA Systems, under the watchful eye of the Department of Homeland Security, which again are frozen analog complex circuitry, again mimicking and replacing the currently installed Internet appliance.

Internet Service Providers, router designers, and server designers can provide needed support to the agencies and public corporations to alter our present course, and they should be doing it.

I would further implore Financial Institutions and Corporations to recognize that this must be done to protect themselves, and their customers from the current economic losses.

Why Insurance Companies are not demanding change is a mystery?

Society is not stuck, but thought leaders are, time for a change.

It is Time for Analog as the solution set to deal with the vulnerability challenges associated with software.

This is not only possible, but has been available for a few years–the path is novel, but not unknown.

Vulnerability on the Internet is actually a choice, not a given outcome.

 Let’s get on with it!

Editor’s Note: In the following article, published earlier this year by David Sax in Bloomberg Business Week, the author suggested that in the Age of Cybercrime, The Best Insurance May be Analog.

http://www.bloomberg.com/news/articles/2016-03-10/cybersecurity-the-best-insurance-may-be-analog

The article is an interesting companion piece to Secretary Wynne’s very clear call for a new way ahead to deal with a strategic vulnerability affecting civil and military defense systems.

Last September, Darpa launched the $36 million Leveraging the Analog Domain for Security (LADS) program, which is attempting to create a set of electronic ears that can detect malicious activity by monitoring the unintentional analog emissions of digital hardware, such as heat, sound, and changed frequencies.

“The advantage of an analog approach is that there’s no way for the malware to directly reach through air and affect the monitoring device,” says Angelos Keromytis, who runs the program.

If you wish to comment on this article you can do so on the Second Line of Defense Forum.

http://www.sldforum.com/2016/11/new-approach-cyber-defense-analog-option/

 

 

Classic Deterrence Theory Does Not Explain North Korea: What Does?

2017-05-18 by Danny Lam

The question of DPRK’s motives for acquiring a nuclear arsenal is central to the current debate about international security.

Motives are ephemeral constructs that are difficult to assess. To wit, historians are still debating the motives of leaders of Germany, Japan, Britain, France, and US as to why they entered WWII.

But without an effort to understand DPRK’s motives, it is impossible to craft a viable set of policies.

Coming just 10 days before the NATO head of state summit meeting, DPRK’s test of an intermediate range Hwasong-12 missile on May 14 was a landmark event that indisputably demonstrated their ability to reach targets within 4,500km. The technical ramifications of this test of a single stage missile based on an indigenously developed engine quantitatively and qualitatively increased the credibility of the North Korean threat.

A careful reading of the KCNA statement that used terms like “large-size heavy nuclear warhead”, “new-type high-thrust rocket engine”, and other statements that suggest they have systematically solved (or are solving) the problems with subsystems involved in a nuclear weapon delivered by ICBM.

Studies of the long term behavior of DPRK over decades their behavior across a range of issues ranging from formal DPRK involvement recently in robbing central banks, narcotics manufacture and smuggling, kidnapping of foreign nationals abroad, targeted killings, counterfeit currency printing and distribution, arms exports, missile proliferation, nuclear weapons exports, cyber extortion, and sensitive material exports show the genetic code of the regime see nothing beyond them historically and right up to the present.

Should we even mention that DPRK is widely suspected to be still holding allied POWs from the Korean war?

This is a regime that certainly have no concern about warfare as a profitable enterprise.   Indeed, the “WannaCry” ramsomware is in the process of being explicitly linked to the DPRK’s cyberwarfare teams.

DPRK behavior – the long term, sustained and widespread, formal use of military capabilities – for the purpose of extortion by a government that is not a failed state has no precedence in modern history since 1945.

Extortion is the use of force or threat of force to obtain money, property. It is fundamentally and legally distinct from blackmail.   (Bracken, 2017).   Nuclear blackmail has precedence with Israel’s threat to use nuclear weapons unless they received urgent conventional arms aid during the Yom Kippur War.

Nuclear extortion has no known precedence EXCEPT DPRK.

Reviewing the regime long historical evidence of DPRK behavior, when set in the context of the history and traditions of Northeast Asia, it is as obvious as night and day to all but the priesthood of Korean “handlers” and “arms control advocates” that motives for North Korea’s WMD, Missile, and Nuclear Weapons program since 2011 materially changed.

DPRK’s nuclear arsenal program being explicitly motivated by extortion and economic gain — rather than regime survival like every other nuclear weapons state is alien to the North Korean analyst priesthood.

If we assume that DPRK did not make enormous sacrifices internally to fund their accelerated nuclear arsenal programs (as Zulfikar Ali Bhutto said, “Eat Grass”), and we take seriously the indisputable evidence of an INCREASE in the standard of living in DPRK under Kim Jong Un — particularly for the military and security elite in and around Pyongyang, then money had to have come from somewhere.

The question is where?

The default explanation is a significant and material injection of economic resources at least in the USD billions range into DPRK must have happened somehow since about 2013.   It is hard to believe that Pakistan, jihadists, Syria, or non-state actors would so fund DPRK at this level. Or that funds of this scale could have been raised by traditional DPRK state sponsored criminal and other enterprises (e.g. North Korean restaurants abroad).

It could have been raised by being a major player in the global narcotics trade, but we are seeing no signs of such mass movements of physical commodities, be it product or cash).   There had to be wealthy patrons that most likely, are a middle power state or parts of such a state that have the capacity for such wealth transfers.

Likewise, the “product” or “service” sold by DPRK must be of such a nature as to be readily exportable because it is small, compact, easy to smuggle — like data from simulations and drawings on a flash card.

Nuclear arsenal and missile technology fits this bill nearly perfectly as a sanction buster.

Few in the arms control community have recognized that circa 2014, when the US began to lift sanctions on Iran and enabled them to access USD tens of billions of wealth was, curiously, directly correlated with DPRK acquiring state of the art tooling, equipment, and systems to forward their weapons programs.

And to conduct a series of expensive tests despite the tightening of sanctions.

DPRK motives for acquisition of nuclear weapons, ballistic missiles, and WMDs do not conform to previous nuclear arsenal states. If DPRK’s motives under Kim Jong Un was solely an “insurance policy” against existential threats to the regime, that goal could have been achieved with a modest, but credible nuclear arsenal similar to what Israel or Pakistan developed.

Neither went the next step to developing long range MRBM or ICBMs.

What are the economic & political impetus then?

Sometime after Kim Jong Un assumed power in 2012, North Korea’s behavior, posture, and pattern changed abruptly. Economic reforms that were long stalled by Kim Jong Il was revived, resulted in an explosion of state capitalism similar to what the southern Chinese provinces experienced circa 1978.

Prior “opening” reforms under Kim Jong Il was ad hoc responses to the famine and hardships brought about in the 1990s by the collapse of their Soviet patrons and the unwillingness of Beijing-China to continually expand subsidies.

After Kim Jong Un consolidated power, these initiatives have become a more or less permanent feature — with concomitant benefits no different than the explosion of wealth and incomes seen in PRC, Russia and former Soviet Republics, and everywhere communist regimes based on the early 20th Century model abandoned tightly controlled central planning and severe limits on private enterprise.

Today, the image of a starving, Stalinist DPRK of 1994-98 that staggered under sanctions is no more appropriate than an image of Shenzhen, PRC in 1984 at the height of the Cultural Revolution in 1967.

What are the political consequences of the Kim Jong Un economic reforms?

For one, it accelerated the loss of formal control over the regime as officials from top to bottom discovered that their position and power translates into rent-seeking opportunities.   That be the case whether it is the border guards that took a fee for letting goods through (both exporting and importing), to the officials that control people, facilities, resources, knowhow, etc. who all of a sudden, are free to flog their resources to anyone willing to pay them or work with them (aka joint venture).   P

RC managed this very same transition with the PLA/N going into business for themselves.

That be the case whether it is the setting up of factories in DPRK that are “contractors” for firms in PRC, who are in turn, selling the goods worldwide, or the export of DPRK labor (a traditional cash earner for the regime). Such opportunities, however, are not evenly distributed throughout the DPRK regime.

What about the sectors that are left behind?

The largest and most critical sectors that are left behind are the military and security forces (beside the party and government) upon which Kim Jong Un depend on for his grip on power. The opening up that saw wealth flow to other (formerly less influential officials like border guards and managers of run-on-the-mill state owned enterprises) at the expense of the bureaucracy and military.

Where have we seen this before?

This is virtually a cookie cutter description of what happened in PRC circa 1989 just prior to Tiananmen, when the opening of the economy and inflationary pressures brought on by new found wealth impoverished the traditional privileged class of senior officials who did not have rent seeking opportunities.

Recall that the proximate cause of Tiananmen protests was students who’s elite, privileged parents got them into the most prestigious institution in PRC after they themselves survived grueling exams discovered that, a) they were not getting what they expected in cushy jobs in the bureaucracy; b) even if they did, inflation made the “iron rice bowl job” reward nominal;   c) “lesser” people who did not have their connections and paper qualifications are surpassing them in opportunities and outcomes.

The upending of the established pathway to wealth, power, and success by economic reforms in PRC nearly collapsed the regime.  It was fortuitous that when the PLA was called to restore order in Beijing, they obeyed and the regime survived.

Kim Jong Un’s DPRK no doubt saw this direct parallel. His father, for the same reasons, resisted economic reforms for these reasons to the very end.

But Kim Join Un is different.  

He was Swiss educated in one of the wealthiest countries in the world, where he is exposed to wealth and riches that are unimaginable in DPRK for all but the elite ruling clans. He more likely have some language abilities beyond Korean, possibly English, French, or German.   What’s more, as a member of the ruling elite, he had first-hand experience and access to the explosion of electronics, games, communications, and outside influences well before he assumed leadership of the Dynasty.

Kim Jong Un, like his assassinated brother, had no illusions as to how backward and perilous the regime he inherited was and is.

Economic reforms by Kim brought not just newfound riches but also political problems in a Stalinist system. Wealth are expressed in many different ways, from more freedom, more (and deeper) penetration of knowledge about the outside world and culture into DPRK. As recently as 2005, it was a big deal and the height of luxury to have access to old (obsolete / junked) Video Cassette Recorders (VCRs) to be imported from China and Japan, with tapes of South Korean shows smuggled in.

Today, that is largely displaced by the smuggling of portable media players, content on flash memory sticks and SD cards. A significant portion of the population is well within broadcast range for cell phone and data transmissions, let alone other broadcasts, and have easy access to the means to receive and enjoy such “forbidden” content such as the latest K-Pop shows.

No doubt illicit wireless repeaters easily sourced from China have extended the reach of South Korean, PRC, Japanese, and Russian wireless to much of DPRK.   DPRK, as of 2011, is no longer a “Hermit Kingdom”.

The greater concern faced by the Kim Jong Un regime is that such opening up not only create new wealth and centers of power outside of the formal state system, but it places the DPRK regime in direct competition with the new “private” enterprises and the couture of state capitalist officials being enriched by new opportunities.

Each of these are a potential threat to his power and regime.

Regime stalwarts in the military, security services and government have to be adequately compensated beyond what can be extracted in monopoly rents or taxes from the economy.   Otherwise, Kim Jong Un’s DPRK risk a Tiananmen. The old days of Kim Jong Il when scarce foreign products like imported brandy etc. served as an adequate bribe is over.

Kim Jong Un had to do better, and fast.

KCNA extensively cataloged how Kim Jong Un did inspection tours of facilities once he assumed and consolidated power. Western trained analysts often laughed at these events as crass propaganda exercises of Kim being taken to Potemkin Villages as his father was for decades. But what if there is more to this?

A look at the propaganda and how it changed revealed how Kim initially inspected the standard KWP showcases that made food, etc. and then moving to him inspecting military units.   Standard socialist fare until 2013.

A very telling tale was how Kim Jong Un visited a Missile Factory in 2013 and “angrily demanded” that the plant be updated with state-of-the-art robotics, CNC machines, etc. which was promptly done, resulting in a precision metals manufacturing capability that is more than adequate for their missile programs that was evident during his next inspection.   It would be farcical to presume that the young Kim would not have the wherewithal and language skills to access the web to see published photos and catalogs of advanced manufacturing facilities of manufacturers like Samsung.

Or to think that the Swiss educated Kim could not recall how a tiny country manufactured a range of ultra-high tech goods and services.

Kim recognize that DPRK economy inherited from his father is well behind the times. And he had the capacity to look, see by just consulting material found on the internet.

Turning to the next problem beyond the absolute priority of holding onto power. Sanctions notwithstanding, if DPRK is to spend on importing high tech equipment, training, expertise, and development, however, must realize a profit in some way shape or form so as to provide rewards and maintain the loyalty of Kim’s power bases.

While no public estimate is available, clearly, the DPRK missile and nuclear programs must have had significant costs at least since Kim’s reign.

In the modern history of costly (and relatively unusable) weapons development programs like ballistic missiles and nuclear weapons by all but the wealthiest, largest nations, financing and funding these programs have proven to be a budget busting burden.

Thus, it is not a surprise that strategic cost sharing partners are sought after.  

France benefitted from the US experience in acquiring nuclear weapons, Beijing China had no compunction about aiding Pakistan up to and including transferring Chinese weapons designs.   Other states, like Israel, with a perfectly straight face, sold missile technology to Taiwan, and worked with South Africa for nuclear weapons development. Beyond these formal, state-to-state deals, there is the precedent of the Abdul Aadeer Khan network that sold nuclear capabilities to any customer with cash before he was stopped:   Libya, North Korea, Iran, PRC.

Is it even plausible that DPRK can undertake such programs without a clear, substantial profit motive and pathway to riches?

DPRK motives for acquiring a credible nuclear arsenal with the capacity to strike anywhere in the world (including the United States and Western Europe) is both current profit (paid by regimes like Iran) that is essential for rewarding the regime loyalists, and almost certainly with that, for purposes of extortion in the future against any and all states.

It changes our calculus as to what is likely to be an acceptable outcome to DPRK if the US and Allies do not develop a viable military option.

Clearly, de-nuclearization in any way, shape or form is off the table for DPRK.

Can DPRK stop at just developing a nuclear arsenal?

What to do when clients like Iran are no longer willing to pay billions for nuclear weapons and missiles from DPRK?

What will they sell then?

What will the Kim Jong Un regime do to bring in cash for the next round?

To see the dangers from DPRK and what policy options must be acquired, we must speculate as to what his next move will be.

If Kim Jong Un failed to raise the living standards of his core power base, he is history.

The question is how?

If you wish to comment on this article, please see the following:

Understanding North Korea’s Motives