Japan cabinet minister, MPs visit Yasukuni shrine for war dead

TOKYO (Reuters) – A Japanese cabinet minister and dozens of members of parliament visited the Yasukuni Shrine for war dead on Tuesday to mark an autumn festival at the shrine, seen in China and the two Koreas as a symbol of Japan’s past militarism.


New Zealand approves first visit by U.S. warship in decades

WELLINGTON (Reuters) – The U.S. destroyer Sampson has been cleared to dock next month in New Zealand, the first visit by a U.S. warship since the Pacific nation passed anti-nuclear legislation 30 years ago.


Kerry: Time to Implement a Ceasefire Unconditionally in Yemen, Move to Negotiating Table

United States.

Morocco’s Missing Youth

Chatham House. United Kingdom.

Modi Fails to Gain BRICS Support Against Pakistan

Pakistan Observer.

Colombia’s Paramilitary Successors Call on Nationwide Ceasefire, Urge Medellin Gangs to Join

Colombia Reports.

Apocalypse Delayed in Dabiq

Will McCants, Jihadica
When the Turkish-held noose tightened around Dabiq over the past few weeks, ISIS’ followers began to frantically explain why the approaching showdown in Dabiq would not be THE showdown.


Greenland Is Melting

Elizabeth Kolbert, The New Yorker
The shrinking of Greenland’s ice sheet is triggering feedback loops that accelerate the global crisis. The floodgates may already be open.


Mission Ready A-10s of the 104th Fighter Squadron Deploy to the Middle East

2016-10-17 By Todd Miller

The week of October 10, 2016 some 12 A-10s from the 104th Fighter Squadron (FS) with supporting personnel and equipment deployed.

The 104th Fighter Squadron (FS) is a Maryland Air National Guard (MDANG) squadron of the 175th Wing (WG) based at Warfield Air National Guard Base in Middle River, MD.

Second Line of Defense had the opportunity to visit the 175th WG and 104th FS just prior to deployment on Sept. 28, 2016.

Crew Chief SSgt. B. Sedlak provided insight into his role with the squadron:

“I consider A-10C #693 of the 104th FS “my own.”

“I am responsible to ensure it is in 100% flying condition, all systems checked and up, fully mission capable.

“When the pilot climbs aboard, he will have no question about safety, the aircraft or systems performance.

“He will drop in and be focused on piloting and the mission, knowing his aircraft is sound, safe and fully capable.”

Sedlak is focused, taking personal accountability for the aircraft to ensure it can complete an assigned mission.

His work is supported by a full complement of specialists; avionics, power plant, weapons, and more. Each specialist performs the required work that goes beyond Sedlak’s scope, however it is his job to review and ensure all technical orders have been followed, and the work executed correctly.

A-10 #693 first flew in 1978, and has experienced almost 40 years of punishing flight, low level, high G, all combined with the structure rattling GAU-8 Avenger 30mm cannon fire.

The “Hawg” and its cannon are infamous, and the mere sound of the aircrafts cannon fire “BRRTTTT” have created a rightful cult like following.

The A-10 is slated to be retired in coming years – but that date keeps slipping.

90956 random 1.0 5.0

The aircraft was designed for a time in the cold war when the US and NATO needed an aircraft that could attack and shred columns of battle tanks and armor attacking Europe from the East. The awe-inspiring cannon has proven itself to be very effective in that role.

Given movement of adversaries to Anti-Access/Area Denial (A2/AD) systems comprised of sophisticated and integrated air defenses, close air support will rely on precision guided weapons launched from a distance.

Once retired, there will likely never be anything quite like the A-10 again.

However, right now in the insurgency-like environment of the Middle East, the A-10 remains extraordinarily potent and effective.

The unique howling of its engines is enough to send adversaries scrambling for cover.

Given its age, the aircraft takes careful assessment.

Sedlak has learned its quirks. Once each specialist has done their work and the weapons/sensors/jammers/fuel are loaded as required on the 11 hardpoints, he makes final checks; panels closed, weapons pins placed as required, no leaking fluid, no covers requiring removal, all control surfaces functioning as designed.

It is a moment of personal pride and satisfaction as the aircraft leaves the ramp, headed to the end of runway (EOR) for removal of weapons pins and final checks prior to take-off.

Sedlak is a full-time ANG service member.

He was motivated by his two brothers in the services (US Navy & USAF).

He wanted that same meaningful career and organizational pride he saw them experiencing. Sedlak notes that “the ANG is for those who want to serve, who want to make themselves better. For those that identify with the core values of the Air Force; Integrity First, Service before Self, Excellence in all we do.”

The ramp at Warfield ANG base was busy as personnel from all specialties were inspecting aircraft proactively prior to deployment.

The squadron planned to deploy 12 A-10s and with 3-4 spares available for any last moment aborts. Some deployments allow units to arrive on location with support equipment in place (following the departure of a previous unit).

The 104th would realize no such benefit in this deployment, they would be required to take all their support equipment. It was expected they would require multiple numbers of the largest transport in the Air Force inventory, the C-5 Galaxy to carry all the required support personnel and equipment overseas.

Sedlak does not find pre-deployment activity more intense than usual, simply focused.

However, the personal preparation for the six-month deployment was an additional exercise. Most members leave behind families and properties, and it is critical to have trusted people and systems in place to manage finances, and to be available for maintenance and any personal family crisis that may take place.

Not concerned with the potential danger of deploying to a volatile part of the world (in effect a war zone), Sedlak says everybody just keeps a steady calm and focuses on getting their jobs done.

Once there, he imagines that thoughts and emotions may change.

Even then – everyone will remain focused on the mission.

Mission comes first.

Besides, he notes that there is such a tight connection among personnel in the unit that it is like deploying with family. The teamwork and camaraderie is evident as a group offloads unexpended ammunition from the A-10s 30 mm cannon, and others move 4000 lbs of MK-84 (2 x 2000 lbs) practice bombs into storage.

Sedlak acknowledges that we live in a diverse society, and many may question why we are in the Middle East, or military engagements in general.

But he’s doing his job proudly knowing that it gives our society the freedom to express opinions – even dissenting ones.

There is one critically unique aspect of the National Guard not to be overlooked.

The “Guard” is made up primarily of civilians living within our own communities serving one weekend a month.

They may be lifted and placed into a war zone at a moment’s notice.

They may be deployed locally to help with natural disasters and crisis like the riots experienced in Baltimore last year.

When they assist locally, they are not outsiders, they serve the very same communities where they live.

Seeing is believing: it is integrity, it is service, it is excellence.


The Maryland Air National Guard Deploys Cyber Team in the Digital Battlespace

2016-10-13 By Todd Miller

The Department of Defense (DoD) is ambitiously building a Cyber Security force to fulfill its Cyber Strategy. It is a high priority given the network dependence of our defense and national infrastructure and the growth and severity of cyber attacks.

“Hunter,” an intelligence analyst with the Maryland Air National Guard (ANG) 275th Cyber Operations Squadron describes the challenge:

“The domains of Air, Sea & Land are finite, generally fully mapped and known. In the cyberspace domain, the internet is the terrain and it is arguably infinite, growing and morphing every day.”

Hunter describes the internet as the “Wild West” – an image of a time and place where anything goes, violence a way of life, “law and order” fleeting, commercial opportunities (mines, railroads) non-existent one day booming the next, the saloon the Facebook of the day, and change fast and furious.

We have become too familiar with the hazards of the internet, leaked emails, busted corporations, compromised databases, stolen identities – and so many more examples of the vulnerabilities of this new indispensable terrain.

While these risks are troubling for corporations and individuals, they are potentially devastating for our military forces.

Emerging warfare doctrine has been described by Richard S. Deakin in his book “Battlespace Technologies” (Artech House Publishers, 2010) as “Network-Enabled Information Dominance.” The warfighter and weapons platforms utilized today (F-22, F-35, AEGIS Cruisers, P-8, E-3G, Wedgetail, Triton/Global Hawk and more) generate an unprecedented amount of information are very effective in a network enabled environment.

The enabled platforms share information via the network and create a unified battlespace picture, where each individual platform has access to the others targeting data.

The result is what the Navy calls the “tactical cloud” or as others reference, the “Kill web.”

The information and network enabled systems provide the warfighter with unprecedented situational awareness and give strategic and tactical command a tremendous advantage in any conflict.

90915 random 1.0 5.0

Caption for Slide Gallery: The 275th Cyber Operations Squadrons Cyber Protection Team at work in the “Hunters Den.”  A squadron of the 175th Wing Maryland Air National Guard. 

And yet, given they rely on the internet these networks have the potential of being hacked, compromised, or degraded. There can be no higher imperative than to protect the networks that carry the information as well as the associated platforms.

Any compromise will have a serious impact on warfighting capability.

In the last few years the Government and DOD have mobilized to take this threat seriously with the launch of the United States Cyber Command (USCYBERCOM), a sub-unified command of the United States Strategic Command.

Within the Air Force, Cyber is led by the 24th Air Force, a chain of command that includes the 175th Wing of the Maryland ANG and its 175th Cyberspace Operations Group.

The recently activated 175th COG is unique: it is the first Air National Guard (ANG) Wing to have a group structure containing multiple cyber squadrons (3 Operational Squadrons, 1 Operational Support Squadron).

Second Line of Defense visited the 275th Cyber Operations Squadron on September 28, 2016 at the beginning of their first deployment.

Cyber Operations Squadrons (COS) utilize Cyber Protection Teams (CPT) as an operational team to fulfill objectives. While the structure is based on an Air Force model, it is still such a new endeavor that aspects are still evolving.

Many of the personnel involved today have retrained from other disciplines – everything from C-130 pilot to Tactical Aircraft Maintenance.

They now have the privilege of being on “the cutting edge,” performing ground breaking work, refining structures, and cyber tactics.

The ANG model brings additional value by the inclusion of the best cyber personnel available in the private industry. As Hunter explains, the synergy of sitting within a team of the smartest available private industry cyber specialists, while performing cutting edge service is extraordinarily satisfying. The 175th is uniquely situated in Maryland close to Fort Meade, an area with scores of exceptionally qualified cyber specialists.

While the typical ANG personnel serve “one weekend a month” deployment involves putting civilian life on hold and reporting full time. During deployment the squadron may continue to work out of their home base, or given their mobility may relocate equipment and personnel to support a designated network in another location.

While cyber groups within different services have defined roles, CPTs are aligned with; a National CPT against a known threat (Nation State); the Combatant Commander (COCOM) in a specific theater of operations such as Europe (USEUCOM), South Pacific (USPACOM) etc.); the Department of Defense (DOD) Networks; or Service aligned (Air Force, Army, Navy, Marines). The 275th is service aligned with the USAF (24th Air Force) to perform missions on Air Force spheres of influence.

Director of Operations Major C. Ferguson used the physical security apparatus of the base to describe the role of the CPT; the base has a gate, the network has entry points; base security examines credentials and vehicles upon base entry, the CPT views packets, digital signatures and credentials; the base has a fence; the network has a firewall; the base has scores of buildings with different levels of access, the network has areas of similar nature.

The CPT’s job is to survey the network for vulnerabilities, ensure it is secure, and actively protect it.

Hunter notes that the Internet is dramatically different than the domains of Air, Water, Land and Space in that one can be attacked, and not even know it. While probing in the physical domain may include activity close to an adversary’s borders – within the internet the “war” is constant, attacks are real and consequential.

The CPT efforts look for fingerprints that may indicate a previous infiltration or attempt. Like cyber detectives they will follow “the bread crumbs” – always mindful of the legal obligations and process to be maintained.

For example, a cyber analyst might pick a “box,” go look at it, analyze captured network traffic, look for statistical anomalies and subsequently be involved in active adversarial pursuit. Once a network is surveyed and secured the CPT trains the local cyber operator (LCO) to perform the ongoing protection.

In the squadrons ops room (the Hunters Den) the teams structure reveals an openness that supports collaboration.

CPT Mission Commander, Major D. Carpenter indicates that only about 15% of personnel’s time is actually spent on the computer. Most of the time is spent in communication, analysis and consulting with other team members (including intelligence specialists). While not specifically designated for offensive activity the team is “weaponized,” as Carpenter notes, “their weapons system oddly looks like a laptop.”

Potential impacts of cyber warfare bridge both the non-kinetic and kinetic realms. While non-kinetic effects such as data exploitation, data theft, and activity such as monitoring data feeds from a remotely piloted vehicle (RPV) could be considered a typical threat, the dangerous and very real field of Kinetic Cyber has emerged.

Examples of kinetic cyber include the release of the stuxnet virus and its crippling effects on Iran’s nuclear program, or the alteration of the speed of pumps on a pipeline that led to a catastrophic explosion.

Other kinetic cyber impacts could involve taking control of a specific platform, or be as simple as infiltrating a secure facility and turning off the air conditioning to the server room resulting in a shutdown of computer servers to a critical network.

One can appreciate the tremendous importance to secure military networks.

An effective cyber-attack would most certainly reduce warfighting capability and jeopardize the ability of the military to prevail in a conflict with minimal losses.

The threat is sobering, and it is encouraging to see the tremendous effort being expended by the Government and DoD to rapidly develop an effective Cyber Command structure and scores of CPT’s. Units like the 175th COG, and 275th COS demonstrate a new but critical capability for the “network enabled” battlespace.

Second Line of Defense expresses gratitude to Col. C. Kohler and SrA E. Saunders of the Maryland National Guard Public Affairs Office as well as Maj. D. Carpenter CPT Mission Commander, 275th Cyber Operations Squadro