Showing posts with label MQ-9 REAPER. Show all posts
Showing posts with label MQ-9 REAPER. Show all posts

Sunday, February 5, 2012

DTN News - DEFENSE & INTELLIGENCE NEWS: China's Cyber Thievery Is National Policy—And Must Be Challenged

Asia News Report: DTN News - DEFENSE & INTELLIGENCE NEWS: China's Cyber Thievery Is National Policy—And Must Be Challenged
*It is more efficient for the Chinese to steal innovations and intellectual property than to incur the cost and time of creating their own.
Source: DTN News - - This article compiled by Roger Smith from reliable sources WSJ – Mike McConnell, Michael Chertoff, William Lynn
 (NSI News Source Info) TORONTO, Canada - February 5, 2012:Only three months ago, we would have violated U.S. secrecy laws by sharing what we write here—even though, as a former director of national intelligence, secretary of homeland security, and deputy secretary of defense, we have long known it to be true. The Chinese government has a national policy of economic espionage in cyberspace. In fact, the Chinese are the world's most active and persistent practitioners of cyber espionage today.
Evidence of China's economically devastating theft of proprietary technologies and other intellectual property from U.S. companies is growing. Only in October 2011 were details declassified in a report to Congress by the Office of the National Counterintelligence Executive. Each of us has been speaking publicly for years about the ability of cyber terrorists to cripple our critical infrastructure, including financial networks and the power grid. Now this report finally reveals what we couldn't say before: The threat of economic cyber espionage looms even more ominously.
The report is a summation of the catastrophic impact cyber espionage could have on the U.S. economy and global competitiveness over the next decade. Evidence indicates that China intends to help build its economy by intellectual-property theft rather than by innovation and investment in research and development (two strong suits of the U.S. economy). The nature of the Chinese economy offers a powerful motive to do so.
According to 2009 estimates by the United Nations, China has a population of 1.3 billion, with 468 million (about 36% of the population) living on less than $2 a day. While Chinese poverty has declined dramatically in the last 30 years, income inequality has increased, with much greater benefits going to the relatively small portion of educated people in urban areas, where about 25% of the population lives.
The bottom line is this: China has a massive, inexpensive work force ravenous for economic growth. It is much more efficient for the Chinese to steal innovations and intellectual property—the source code of advanced economies—than to incur the cost and time of creating their own. They turn those stolen ideas directly into production, creating products faster and cheaper than the U.S. and others.
Cyberspace is an ideal medium for stealing intellectual capital. Hackers can easily penetrate systems that transfer large amounts of data, while corporations and governments have a very hard time identifying specific perpetrators.
Unfortunately, it is also difficult to estimate the economic cost of these thefts to the U.S. economy. The report to Congress calls the cost "large" and notes that this includes corporate revenues, jobs, innovation and impacts to national security. Although a rigorous assessment has not been done, we think it is safe to say that "large" easily means billions of dollars and millions of jobs.
So how to protect ourselves from this economic threat? First, we must acknowledge its severity and understand that its impacts are more long-term than immediate. And we need to respond with all of the diplomatic, trade, economic and technological tools at our disposal.
The report to Congress notes that the U.S. intelligence community has improved its collaboration to better address cyber espionage in the military and national-security areas. Yet today's legislative framework severely restricts us from fully addressing domestic economic espionage. The intelligence community must gain a stronger role in collecting and analyzing this economic data and making it available to appropriate government and commercial entities.
Congress and the administration must also create the means to actively force more information-sharing. While organizations (both in government and in the private sector) claim to share information, the opposite is usually the case, and this must be actively fixed.
The U.S. also must make broader investments in education to produce many more workers with science, technology, engineering and math skills. Our country reacted to the Soviet Union's 1957 launch of Sputnik with investments in math and science education that launched the age of digital communications. Now is the time for a similar approach to build the skills our nation will need to compete in a global economy vastly different from 50 years ago.
Corporate America must do its part, too. If we are to ever understand the extent of cyber espionage, companies must be more open and aggressive about identifying, acknowledging and reporting incidents of cyber theft. Congress is considering legislation to require this, and the idea deserves support. Companies must also invest more in enhancing their employees' cyber skills; it is shocking how many cyber-security breaches result from simple human error such as coding mistakes or lost discs and laptops.
In this election year, our economy will take center stage, as will China and its role in issues such as monetary policy. If we are to protect ourselves against irreversible long-term damage, the economic issues behind cyber espionage must share some of that spotlight.
Mr. McConnell, a retired Navy vice admiral and former director of the National Security Agency (1992-96) and director of national intelligence (2007-09), is vice chairman of Booz Allen Hamilton. Mr. Chertoff, a former secretary of homeland security (2005-09), is senior counsel at Covington & Burling. Mr. Lynn has served as deputy secretary of defense (2009-11) and undersecretary of defense (1997-2001).
*Speaking Image - Creation of DTN News ~ Defense Technology News 
*This article is being posted from Toronto, Canada By DTN News ~ Defense-Technology News Contact:dtnnews@ymail.com 
©COPYRIGHT (C) DTN NEWS DEFENSE-TECHNOLOGY NEWS

Thursday, January 12, 2012

DTN News - DRONES FLYING HIGH: Armed UAV Operations 10 Years On

Asia News Report: DTN News - DRONES FLYING HIGH: Armed UAV Operations 10 Years On
Source: DTN News - - This article compiled by Roger Smith from reliable sources Stratfor
 (NSI News Source Info) TORONTO, Canada - January 12, 2012: One of the most iconic images of the American-led wars in Iraq and Afghanistan -- as well as global U.S. counterterrorism efforts -- has been the armed unmanned aerial vehicle (UAV), specifically the MQ-1 "Predator" and the MQ-9 "Reaper." Unarmed RQ-1 Predators (which first flew in 1994) were flying over Afghanistan well before the 9/11 attacks. Less than a month after the attacks, an armed variant already in development was deployed for the first time.

In the decade since, the Predator has clocked more than a million flight hours. And while U.S. Air Force procurement ceased in early 2011 -- with more than 250 airframes purchased -- the follow-on MQ-9 Reaper has already been procured in numbers and production continues. Predators and Reapers continue to be employed in a broad spectrum of roles, including close air support (CAS), when forward air controllers communicate with UAV operators to release ordnance with friendly troops in the vicinity (CAS is one of the more challenging missions even for manned aircraft because of the heightened risk of friendly casualties). Officially designated "armed, multi-mission, medium-altitude, long endurance, remotely piloted aircraft," the second to last distinction is the Predator and Reaper's principal value: the ability to loiter for extended periods, in some cases for more than 24 hours.

This ability affords unprecedented situational awareness and physical presence over the battlefield. The implications of this are still being understood, but it is clear that it allows, for example, the sustained and constant monitoring of main supply routes for attempts to emplace improvised explosive devices (IEDs) or the ability to establish a more sophisticated understanding of high-value targets' living patterns. In addition, live, full-motion video for ground controllers is available to lower and lower echelons to an unprecedented degree.

As the procurement of Predators and Reapers and the training of operators accelerated -- particularly under the tenure of former U.S. Defense Secretary Robert Gates, beginning in 2006 -- the number of UAV "orbits" skyrocketed (an orbit is a single, continuous presence requiring more than one UAV airframe per orbit). There are now more than 50 such orbits in the U.S. Central Command area of operations alone (counting several maintained by the larger, unarmed RQ-4 "Global Hawk"). The U.S. Air Force expects to be capable of maintaining 65 orbits globally by 2013, with the combined total of flight hours for Predator and Reaper operations reaching about 2 million around the same time. In 2005, UAVs made up about 5 percent of the military aircraft fleet. They have since grown to 30 percent, though most are small, hand-launched and unarmed tactical UAVs.

The Counterterrorism Value

One of the most notable uses of the Predator and Reaper has been in the counterterrorism role, both as an intelligence, surveillance and reconnaissance (ISR) platform and as an on-call strike platform. These armed UAVs are operated both by the U.S. Air Force and, in some cases (as with operations conducted over Pakistan), the CIA. Even before the 9/11 attacks, the armed Predator then in development was being considered as a means not only of keeping tabs on Osama bin Laden but also of killing him. Since then, armed UAVs have proved their worth both in the offensive strike role against specific targets and as a means of maintaining a constant level of threat.

The value of the counterterrorism ISR that can be collected by large UAVs alone is limited since so much depends on how and where they are deployed and what they are looking for. This mission requires not only sophisticated signals but also actionable human intelligence. But as a front-line element of a larger, integrated collection strategy, the armed UAV has proved to be a viable and enduring element of the U.S. counterterrorism strategy worldwide.

The ability to loiter is central and has a value far beyond the physical capabilities of a single airframe in a specific orbit. Operating higher than helicopters and with a lower signature than manned, jet-powered fighter aircraft, the UAV is neither visibly or audibly obvious (though the degree of inconspicuousness depends on, among other things, weather and altitude). Because UAVs are so discreet, potential targets must work under the assumption that an armed UAV is orbiting within striking distance at all times.


Such a constant threat can place considerable psychological pressure on the prey, even when the predator is large and loud. During the two battles of Fallujah, Iraq, in April and November of 2004, AC-130 gunships proved particularly devastating for insurgents pinned in certain quadrants of the city, but AC-130s were limited in number and availability. When it was not possible to keep an AC-130 on station at night (in order to keep the insurgents' heads down), unarmed C-130 transports were flown in the same orbits at altitudes where the distinctive sound of a C-130 could be clearly discerned on the ground, thus maintaining the perception of a possible AC-130 reprisal against any insurgent offensive.

Indeed, it is difficult to overstate the psychological and operational impact of this tactic on a group that experiences successful strikes on its members, even if the strikes are conducted only rarely. Counterterrorism targets in areas where UAVs are known to operate must work under tight communications discipline and constraints, since having their cellular or satellite phone conversations tapped risks not only penetration of communications but immediate and potentially lethal attacks.

The UAV threat was hardly the only factor, but consider how Osama bin Laden's communiques declined from comparatively regular and timely videos to rare audiotapes. In 2001, bin Laden was operating with immense freedom of maneuver and impunity despite the manhunt already under way for him. That situation changed even as he fled to Pakistan, and the combination of aggressive signals as well as UAV- and space-based ISR efforts further constrained his operational bandwidth and relevance as he was forced to focus more and more on his own personal survival.

The UAV threat affects not only the targeted individuals themselves but also their entire organizations. When the failure to adhere to security protocols can immediately yield lethal results, the natural response is to constrict communications and cease contact with untrusted allies, affiliates and subordinates. When the minutiae of security protocols start to matter, the standard for having full faith, trust and confidence among those belonging to or connected with a terrorist organization become much higher. And the more that organization's survival is at stake, the more it must focus on survival, thereby reducing its capacity to engage in ambitious operations. On a deeper level, there is also the value of sowing distrust and paranoia within an organization. This has the same ultimate effect of increasing internal distrust and thereby undermining the spare capacity for the pursuit of larger, external objectives.

The Evolving Geography

While armed Predators first operated in the Afghanistan-Pakistan theater, it was the darkest days of the Iraq War, at the height of the violence there from 2005 to 2007, that saw the strongest demand for them. As the main effort shifted from Iraq to Afghanistan, UAV operations began to shift with them. While UAVs will remain in high demand in Afghanistan even as the drawdown of forces continues there in 2012, the end of armed UAV operations in Iraq and the continued expansion of the U.S. Air Force's Reaper fleet mean that considerable bandwidth is being freed up for operations in other parts of the world. (In Iraq, some UAVs may continue to be operated over northern Kurdish areas in coordination with Turkey, and some private security contractors are operating a small fleet of unarmed UAVs as part of protection efforts in coordination with the U.S. State Department's Diplomatic Security Service.)

There are obvious diplomatic and operational limitations to the employment of armed UAVs. Diplomatically, however, they also have demonstrated some value as an intermediate step between purely clandestine operations run by the CIA and the overt deployment of uniformed personnel and manned aircraft. Operationally, while Predators and Reapers lack the sort of low-observability profile of the RQ-170 (one of which was lost over Iran in 2011), UAVs lack pilots and pose no risk of human personnel being taken captive. A UAV that crashes in Iran has far fewer political ramifications than a piloted aircraft, making its deployment an easier decision for political leaders.

Indeed, the last decade has seen the maturation of the armed UAV, including its underlying architecture and doctrines. And while more than 50 Predators and Reapers have been lost in Iraq and Afghanistan and in training over the past decade, the aircraft are now essentially as safe and reliable as a manned F-16C/D but far cheaper to procure, maintain and operate. And over the next 10 years, the Pentagon plans to grow its UAV fleet about 35 percent. The U.S. Air Force plans to buy 288 more Reapers -- 48 per year from now through 2016 -- and money for UAVs has remained largely untouched even as budget cuts intensify at the Pentagon.

So while armed UAVs are merely one tool of a much broader and more sophisticated counterterrorism strategy, they can be expected to be valuable for the foreseeable future, and employed in areas of the world beyond Pakistan, Somalia and Yemen (even along the U.S.-Mexico border in an unarmed role for border patrol and counternarcotics missions). And despite an enormous breach in U.S.-Pakistani relations following the deaths of two dozen Pakistani military personnel in a cross-border incident in November and the consequent ejection of the CIA from Shamsi airfield in Pakistan (from which it had operated armed UAVs since October 2001), existing UAV orbits have been largely maintained. On Jan. 10, the first strike on Pakistani territory since November took place in North Waziristan agency of the Federally Administered Tribal Areas.

*Link for This article compiled by Roger Smith from reliable sources Stratfor
*Speaking Image - Creation of DTN News ~ Defense Technology News 
*This article is being posted from Toronto, Canada By DTN News ~ Defense-Technology News Contact:dtnnews@ymail.com 
©COPYRIGHT (C) DTN NEWS DEFENSE-TECHNOLOGY NEWS