Feral Jundi

Monday, December 13, 2010

PMC 2.0: The Army Wants To Give It’s Soldiers Free Smart Phones

    You know what would really be cool is if companies handed out free smart phones when you signed a contract? I would classify it as a piece of kit as important as a rifle or radio that would be issued.  Because as you read through all the reasons why the Army wants to give their soldiers smart phones, then you can see why something like this would be important for companies to think about doing. Especially if they want to share the battle space with the military.

    Also, contractors already deploy with smart phones.  I take an iPhone 3GS with me when I go on contract, and it is indispensable.  Most contractors you work with now a days have these phones as well and take them out on gigs. This is nothing new and I have talked about this in the past.  It’s just now you see the military recognizing the smart phone’s utility and potential, and they are the ones leading the charge of incorporating them into their operations. Good on them.

    Another idea for companies is to develop applications that contractors can download for a contract. For example, DynCorp could have a DynCorp application that could serve as a portal for employees to access their intranet, all from a mobile phone.  DynCorp could send out alerts to their employees and contractors through this application, and people could call or write back to the company with these devices.  For travel arrangements or time sheets, this could also be done on the mobile phone through a really easy to use and understand company application.  For secure communications, they could integrate Hushmail or something similar on their company application and the possibilities are endless.

    The military could benefit from the companies having contractors armed with smart phones as well.  An application could be set up for a specific Area of Operation in a war, and all companies would require that their contractors download that app on their phone.  It could be set up as a secure means for the military and contractors to communicate with each other, and establish unity of effort through the real time exchange of information.  Smart phones could be that thing that could connect private industry with the military in a war zone.

     Apps like this could lead to more enemy killed, less fratricide incidents, and real time information exchanges that could assist in local COIN efforts. Contractors are a HUMINT resource that could really be exploited via smart phones and their applications.

     A contractor AO specific app could also have the rules for the use of force (RUF) that could be constantly updated by the military in that AO, or that RUF could be sent to them by the company via a company app. Unity of effort all the way and as long as the military has a network established out there, companies could be brought into that as well.

    The other thing that would be interesting with a company app or a company issued smart phone, is security.  If you want your employees/contractors using these devices, they have to be secure.  By channeling everyone through an app, a protected remote browser or company issued phone, a company information technology security team or contracted security team could stand a better chance of protecting the system.  Because once you have have established a connection between the contractor and company, there will always be some group or person out there that will want to sabotage it or try to hack into it.

     That last part is very important to remember, and there are numerous folks out there that are making it very easy for anyone to be a hacker.  Easy to use programs like Firesheep, that allow folks to break into other people’s computers or phones via wifi are just one example of what I am talking about. (thanks to DVM for that story)  As the military or companies delve further into integrating smart phones into their organizations, their phone and computer security personnel will be vital to the safeguarding of their operations. But the benefits still outweigh the negatives with this technology, and this is where the military (and private industry) is going. –Matt

Army sees smart phones playing important role

The service also views smart phone as a ‘force multiplier’ — and it wants to give you a free one

By Joe Gould and Michael Hoffman

Sunday Dec 12, 2010

The Army wants to issue every soldier an iPhone or Android cell phone — it could be a soldier’s choice.

And to top it off, the Army wants to pay your monthly phone bill.

To most soldiers, it sounds almost too good to be true, but it’s real, said Lt. Gen. Michael Vane, director of the Army Capabilities Integration Center. He said the Army would issue these smart phones just like any other piece of equipment a soldier receives.

“One of the options potentially is to make it a piece of equipment in a soldier’s clothing bag,” Vane said.

With the backing of officials such as Vane, efforts are underway around the Army to harness smart phones to revolutionize the way the service trains and fights.

Army-issued smart phones are already in the schoolhouse and garrison, in the hands of some students at Fort Leonard Wood, Mo.; Fort Lee, Va.; and at Fort Sill, Okla., under an Army program called Connecting Soldiers to Digital Applications. CSDA’s next step, already underway at Fort Bliss, Texas, is testing for the war zone.

In February, the Army plans to begin fielding phones, network equipment and applications to the first Army brigade to be modernized under the brigade combat team modernization program. That test will not be limited to smart phones but will include any electronic devices that may be useful to troops.

(more…)

Monday, November 29, 2010

Technology: China Used Cyber Privateers In Attack Against Google

     The hack was part of a computer sabotage campaign carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. This has been going on since at least 2002, the cable said.

     I read this and the first thing that popped out at me was that China was contracting with private industry to attack an enemy in cyber space (the commons).  In this case, that enemy was Google.

     Also, just look at the list of folks they contracted with, and you wonder how is this not cyber privateering?  Perhaps the Chinese understand the concept of ‘creating an industry out of destroying your enemies’, much better than the west. It is also the Chinese who are doing this, and not some poor third world country.

     So this is the next thought that came to mind.  If China is doing this, then why couldn’t the US use the same tool of cyber warfare against the Chinese, or even against a group like Wikileaks?  Hell, we can even be open about it and issue Letters of Marque and Reprisal to individuals and companies in order to make this happen. Just a thought, and hey, China is doing it. lol –Matt

Chinese Government Ordered Hack on Google Servers: Wikileaks

By Clint Boulton2010-11-29

Wikileaks gave the New York Times a diplomatic cable that shows the Chinese government was responsible for the hack on Google’s Gmail system.

China’s government was indeed behind the hack on Google’s Gmail system earlier this year according to a cable captured by the controversial Wikileaks organization.

Wikileaks, which butters its bread collecting secret documents and seeding them in media outlets, snagged 250,000 American diplomatic cables dating back three years and released some of them to the New York Times and other media outlets.

The Times cited one of the cables as proof that “China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January.”

The hack was part of a computer sabotage campaign carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. This has been going on since at least 2002, the cable said.

A Google spokesperson told eWEEK: “We aren’t going to be able to comment. As you know, since we revealed this incident in January, we haven’t been speculating as to the parties responsible.”

(more…)

Wednesday, October 27, 2010

Letter Of Marque: The Morgan Doctrine–A Blog Dedicated To Exploring The Cyber Privateer Concept

     This is neat. A couple of days ago, Rick Bennet popped up on the blog to discuss the Letter of Marque and cyber privateering and I thought it was cool that he had a blog dedicated to exploring the concepts. This is good because we need more folks with a different eye to pick this stuff apart. Be sure to also check out Rick’s book and I have provided the link below.

     His recent post on Australia and the potential of them issuing a LoM is interesting, and I made the comment that the individual states there are free to structure their constitutions to allow things like ‘bills of attainder‘ . So a state setting up a Letter of Marque might not be a stretch. The Declaration of Paris comes into play as well, but if bills of attainder could be done, I don’t see how a LoM would be a bridge too far? So with that said, here is the link to his blog. –Matt

The Morgan Doctrine

By Rick Bennett

Author of Destroying Angel

     CYBER PRIVATEERS could be the new, effective, and highly paid army of swashbucklers. The Monroe Doctrine stated any attack in the Americas would be considered an attack on the United States. THE MORGAN DOCTRINE (after my fictional Morgan Rapier) asserts that any foreign cyber attack on US-based computers is an act of war, and retaliation (ie, looting) may take place on the perpetrator of that attack, wherever he/she/it may be located. Good policy or just a good novel?

Background: Welcome black hats, white hats and cyber swashbucklers

     The Revolutionary War was fought, financed, and pretty well WON by bonded privateers, legalized pirates who were given Letters of Marque and Reprisal by the Continental Congress and authorized to attack, capture and monetize British ships. The purpose of this site is to explore the possibility of a modern-day doctrine much like the Monroe Doctrine, by means of which the U.S. government could legally and, more importantly, effectively stop international hackers. Current cybercrime law is not only ineffective, but downright stupid. My Linux servers are attacked hundreds of times a day (mostly from China and former USSR domains), yet if I retaliate against those servers with some creative technology at my disposal (I know some VERY smart guys), then I am in violation of federal law and subject to some onerous penalties. We need more than a new law. We need a new international doctrine. I call it The Morgan Doctrine, named after Morgan Rapier, a fictional character I’ve created (hey, this is my way of establishing ownership of the concept, should it ever see the light of day).

     Why a new international doctrine? Simply, nothing else will work. Introduced on December 2, 1823, the Monroe Doctrine told the world to keep their hands off the Americas. Combine this with current legal thinking on “hot pursuit” of fugitives. In 1917 the US Army went into Mexico after Pancho Villa. More recently, in 1960 Israeli Mossad agents abducted Adolf Eichmann from Argentina. Granted, much of the world regards the Eichmann advanture as a violation of international law. I don’t share that opinion and therefore use it as the third leg of my Monroe-Pancho-Aldof platform for The Morgan Doctrine.

     If someone comes into your home and attacks or attempts to rob you, you may shoot them dead. You may do so as long as they expire on your property. But what about cyber criminals? They attack you in your home from their homes. Retaliate in kind, and you go to jail. The Morgan Doctrine states simply that if you attack my computers (or my banking assets held in US-based computers), then under a certain set of well-defined conditions, a licensed and bonded “cyber privateer” may attack you in your home country and split the proceeds with the U.S. government. For the sake of argument, let’s call it a 50-50 split (heh heh).

     Right now, American law enforcement is completely unequipped to deal with the sheer number international cyber hackers. Sure, I could report each of the thousand daily attacks to the FBI, as could the millions of other attackees in the USA. But the volume of such reports would make any meaningful resolution laughable. Not to mention that the FBI has no jurisdiction outside the USA. Yet to make such “enforcement” profitable to recognized (ie, “bonded” “deputized”) privateers, as Heath Ledger’s Joker said in his last role, “Now you’re talking!” You raid our bank accounts, we raid yours. You make money from off-shore child pornography, we’re going to loot your bank accounts and, with some REALLY creative black hat operations, you will be taken off the grid worldwide to the extent that you’ll not even complete a cell phone conversation for the remainder of your miserable depraved life. Okay, that last part probably won’t fly, but you get my drift.

     The purpose of this site is to explore the mechanics, legalities and practicality of The Morgan Doctrine.

     And I will be the sole arbiter of whether or not your comments get posted. As Mel Brooks wrote, “It’s good to be king.”

Link to blog here.

Wednesday, October 6, 2010

Technology: RRS Staring Array Radar Takes LEDS To New Level

     Thanks to Eeben for sending me this one. I really like these technologies because they have the potential to save lives. It would also help to defeat the very simple weapon system called the rocket launcher (like the RPG), which is in use by many of today’s forces throughout the world. These systems can also be used to locate and neutralize teams that are attacking the vehicle. It is all about minimizing the effectiveness of the very low cost weapon systems being used by combatants throughout the world.

     Now could we ever see a day where private industry would have the financing necessary to buy these systems and put them on their armored transports? Maybe. The cost and effectiveness would be factors.  It is definitely something that should be presented to potential customers as a way to supplement the defense of their personnel and facilities. Imagine an LEDS 300 system on a tower or on a Casspir/MRAP?

     Currently, I know the military sports all types of sensors on vehicles these days, but the pinnacle of these types of systems is their ability to zap RPG’s in mid-air and destroy that stuff in a way that doesn’t hurt the dismounted troops nearby.  With an ultra-fast radar detection system, it will give the other systems on the vehicle time to make decisions and arm/launch whatever munitions is required. Hence why the RRS news is key here. I believe there are multiple countries trying to achieve the same goal with these systems, and I hope they are able to effectively accomplish the task. –Matt

——————————————————————

LEDS

The CV90 sporting LEDS 150. Note the staring array radars at the front corners and the two high speed directed launchers containing multispectrals smoke and Mongoose missiles to the rear of the remote weapon station.  

Reutech staring array radar takes LEDS to new level 

06 October 2010

By Leon Engelbrecht

Reutech Radar Systems (RRS) says its new frequency modulated continuous wave (FMCW) staring array radar can detect a rocket propelled grenade (RPG) launch within 5.2 milliseconds (ms) and can provide an accurate track within 14.3ms. A millisecond is 1000th of a second and a RPG, fired at 20 metres, takes roughly 187 to impact.

Similar staring array technology forms the core of the radar systems supporting the US Navy’s Aegis and the US Army’s Patriot air defence complexes.The cost of developing this technology in South Africa is not known, but RRS was awarded a R643 970 contract in July “to demonstrate a frequency modulated continuous wave ranging radar concept.” RRS last month said it has been working on staring arrays for the “past three years.”

Colonel Cobus van der Merwe (Retired), SAAB Electronic Defense Systems’ Product Manager for Land Self-Protection Systems told a recent precision weapons solutions conference that with the radar his company’s Land Electronic Defense Systems (LEDS) can detect a RPG within 5ms and calculate whether the RPG will hit or miss the carrier vehicle within a further 10ms. The active defence controller then determines the validity of the threat within a further 10ms before taking less than 50ms to compute an intercept. It then takes 10ms to launch and a further 50ms for the “effects deployment”.

RRS’ Peter Bradshaw in a separate presentation at the South African Precision Weapon Solutions Conference held at the Africa Aerospace and Defence (AAD) exhibition in Cape Town two weeks ago, added that 5.2ms for first detection amounted to a “worst-case scenario” for the radar. He added that once detected and confirmed, track updates were given every 1.3ms.

(more…)

Tuesday, October 5, 2010

Cool Stuff: The XOS 2 Exoskeleton

« Newer PostsOlder Posts »

Powered by WordPress