Qioptiq logo Raytheon Global MilSatCom

CYBER WARFARE AND HOMELAND SECURITY UPDATE

16 May 13. The Pentagon has cyberattack capabilities that allow the U.S. military to help blind Syrian air defenses without firing a shot, according to military analysts.
“One of the reasons the Air Force has paid so much attention to cyberwarfare is … for beating enemy air defenses,” said James Lewis, an analyst at the Center for Strategic and International Studies.
U.S. abilities to defeat Syria’s air defenses are central to a debate over whether to intervene in the 2-year-old civil war. Electronic methods to disable enemy air defense systems include the injection of malware, a form of computer software, into the air-defense network through a computer attack or by electronic warfare aircraft capable of jamming radar. The radars act like wireless transmitters, and jammers can send false or destructive information into the radar, which then gets into the network, said Shlomo Narkolayev, an analyst who has worked on cyber issues for the Israeli military’s cyberwarfare unit. “It sounds like science fiction. It’s not,” Narkolayev said. “It’s not hard to do this,” he said. Syria and other nations are constantly adjusting the electronics for their air systems, and Air Force documents show the U.S. military does the same with its cyberweapons. They are constantly updated to counter changes made by enemy militaries. A 2007 Israeli attack on a suspected Syrian nuclear power plant in 2007 provided a template for a future attack. The Israelis used a cyberattack to disable Syrian air defenses before aircraft entered Syrian airspace. The Israeli attack was a quick strike that only required temporarily blinding air defenses. Establishing a no-fly zone would require taking down Syrian air defenses for months. Cyberattacks can cause permanent damage, Lewis said. U.S. forces have been reluctant to use cyberattacks for fear malware could damage other networks and because of concerns that enemy nations will copy the malware once it is released. Syrians could take the system offline to avoid an infection spreading, but then the system would be less effective, Lewis said. The Pentagon has said any air campaign would be a challenge because of the size and sophistication of Syrian air defenses, which are far more extensive than in Libya, where the United States and NATO created a no-fly zone in 2011. While cyberwarfare provides advantages, it is not without risk and can’t replace more conventional tactics, said Jeffrey Carr, founder of Taia Global, a cybersecurity consultancy. (Source: Early Bird/USA Today)

13 May 13. Northrop Grumman Corporation has signed a memorandum of agreement with the Department of Homeland Security (DHS) that will enable the expansion of cybersecurity protections for the nation’s critical infrastructure. Northrop Grumman is now starting the security accreditation process which is required before approval to operate as a commercial services provider under the DHS Enhanced Cybersecurity Services (ECS) program. ECS is an information-sharing program to assist critical infrastructure owners and operators in enhancing the cybersecurity protections of their information systems from unauthorized access, exploitation and data exfiltration. Under ECS, DHS will share classified and unclassified cyber threat “indicators” with designated Commercial Service Providers, and the Commercial Services Providers will utilize the threat indicators to provide approved cybersecurity services to authorized critical infrastructure entities.

14 May 13. The Department of Homeland Security has taken a positive step in one of the longer running procurement sagas of recent years, issuing downselect notices to several contractors to compete in the next phase of a controversial border security program, sources confirm. Although details of which companies received the notices are still sketchy, DHS confirmed to Defense News that the notices went out late last week, and two people with knowledge of the program have offered that General Dynamics, R

Back to article list