ANN ARBOR – Over the
next few weeks, MITechNews.Com will be publishing excerpts from cybersecurity
expert Richard Stiennon’s latest
book, called There Will Be Cyberwar. The book makes the case that the US
military rushed to “network
everything” and,
like most organizations, neglected to secure its most critical systems, opening the door to a possible cyberattack as deadly as the Japanese attack on Pearl Harbor in 1941.
One
point he makes is that an orchestrated effort on the part of China over the
past 15 years to hack the defense industrial base networks and US military
networks, “such as
stealing designs of the advanced military systems such as the Joint Strike
Fighter, was in reality to discover weaknesses in those systems that the People’s
Liberation Army could exploit in conflict. While the knowledge that source code
and configuration data was stolen was recognized by the NSA and FBI, they never
surmised anything beyond industrial espionage.”
We
pick up the book in chapter one when Stiennon writes a fictitious REPORT ON SPECIAL INVESTIGATION INTO
THE TAIWAN STRAITS CONFLICT OF MARCH 18, 2018
Presented
to the Armed Services Sub-Committee May 12, 2018.
Since at least 2013,
the Chinese PLA had enhanced their use of encryption and embarked on a secret
mission to gain advantage over the US fighting forces. It now appears that the
entire scenario was planned for years and that, when the time was right, it was
executed. It is outside the scope of this report to address the intelligence
failure beyond these findings and to recommend a separate investigation into
the IC which has focused on data gathering and mining at the expense of long
term discovery of adversary intent.
Because of the loud
outcry from the Chinese Communist Party and expressions of discomfort from
allies in Asia, namely Japan, and Korea, the President asked the Joint Chiefs
for guidance. The Joint Chiefs recommended a show of force, which included
moving the 7th Fleet into the Taiwan Straits, as well as mobilizing the 4th
Fleet from San Diego where it had just returned from the joint US-Korea naval
exercises. Diplomatic channels were used to warn China not to move missile
barrages into place across the Straits, and apprised Chinese leaders that this
was a show of force, not an imminent military incursion. China acknowledged
this; however, through channels, added a warning that an incursion into its
territorial waters for any reason would be viewed as an act of war.
The investigators who
have assembled this report were most interested in how the 7th Fleet came to
encroach on China’s
territory although the mission plan explicitly called for that boundary to be
given a wide berth.
While the inadvertent
incursion into Chinese territory is viewed widely as the trigger of the event,
this investigation has found that it started days before and that the incursion
was manufactured by Chinese action. Every communication channel from the office
of POTUS to the Joint Chiefs to Pacific Command was compromised. Not only could
the PLA intercept and decrypt those channels, it could also inject misleading
information. Work is still under way to determine the implications of the false
weather reports that led the commander of the Fleet to understand that weather
in the target zone would be clear when in fact it was overcast with limited
visibility. Recorded data from most communications during the 72-hour period of
the engagement is, of course, missing since it was erased by the infected
payloads received.
It now appears that
the incident in northern Wisconsin involving what was thought to be a rogue
terrorist cell and the death of two DISA officers who were inspecting the ELF
array was connected to the events of March. Key management for the US ballistic
missile fleet is archaic. While Cold War era means of cycling through
encryption keys manually and only periodically sufficed in an earlier period,
they evidently should be updated. The attack and loss of the key storage unit
that was in the possession of the two officers now appears to have been timed
to give the attackers maximum benefit of the encryption keys before they were
set to expire. That expiration date, only two days after the engagement,
indicates that the PLA had orchestrated the entire set of events, perhaps even
inciting the rhetoric around the Taiwan election.
It also now appears
that some of the delays experienced by the prime contractor for the GPS III
series of satellites was also orchestrated by the PLA. Multiple cyber
incursions, which were attributed at the time to DPRK, against subcontractors
of critical components set back final delivery by 18 months after two years of
delays that can be accounted for by nominal issues with the defense procurement
process. In addition the failure of the Delta IV launch vehicle at Vandenberg
in January put that launcher on hold pending the accident investigation. In
light of the findings in this report it is recommended that the inquiry be
expanded to include foul play on the part of foreign agents.
Without the
completion of the GPS III constellation the 7th fleet relied on current GPS.
The PLA used their own satellites, which had been identified as new weather and
earth resource platforms to send signals that were much stronger than the US
GPS satellites. These signals are the primary measure the PLA used to set their
plan in motion.
As the 7th fleet
approached Taiwan it launched four F-35 Lightning fighters. These fighters
failed to rendezvous with their tankers. It is evident that their GPS guidance
was compromised and they received the wrong coordinates for the rendezvous. At
the same time the tankers that had flown from Kunsan Air Base in South Korea
were also misguided. The discrepancy between courses is estimated to have been
200 nautical miles. The tankers were able to re-establish correct GPS
connections shortly after they left the engagement area. None of their
communications reached the 7th Fleet. Low on fuel and headed back to the
carrier group the F-35 squadron were intercepted by still unidentified fighter
jets. The sole survivor of the trailing F-35 reports that the sophisticated
enemy identification systems on board failed to trigger any alerts.
Investigations are ongoing but it now appears that the mission data set
uploaded to the onboard computers during the flight preparation procedure were
corrupted. The entire US Reprogramming Lab at Elgin Air Force Base, Florida, is
under investigation as the most likely source of the corrupted data sets.
The loss of
communication with the fighters and tankers led the Fleet Commander to believe
that he was engaged in an active battle situation and he took steps to arm the
Aegis missile systems. Reports from survivors indicate there were no anomalies
in the behavior of the Aegis system, all readouts were nominal.
The errant GPS
signals were also the cause for the fleet being out of position by 160 nautical
miles, putting them well inside the air defense identification zone (ADIZ),
China had declared over the East China Sea in November 2013. The overcast skies
prevented the normal navigational sightings that may have warned the officers
of a problem with the GPS navigation system. Television broadcasts from an
island north of Taiwan provided visual confirmation of the fleet being well
within China territorial waters. It now appears that the fleet was expected and
that the cameras had been positioned specifically to support China’s
claims of legal authority to strike. Satcoms and imagery did not give warning
and may have also been tampered with. The low ceiling and false weather reports
contributed to the confusion as Fleet Command tried to regain situational
awareness, as they were in a state of disarray trying to ascertain what had
happened to the fighter squadron.
When the first
Chinese J8 fighters flew a reconnaissance pass it was discovered that the
targeting radar systems would not lock on to them. When the torpedo-armed
bombers approached, the Commander ordered the launch of Aegis
surface-to-air-missiles. These missiles also failed to obtain a lock in-flight
and never corrected course. It now appears that the media reports, gathered
from the survivors recounting what they had seen, were incorrect. The Chinese
aircraft did not have a new stealth technology that made them invisible to
radar, but in fact used electronic countermeasures that triggered a previously
unknown bug in the radar control systems that caused them to disable the Aegis
guidance system.
Coincident with the
beginnings of hostilities the USS Minnesota (SSN-783)
received an unauthorized command via ELF to surface immediately for further
instructions. Its mission had been to cover the 7th Fleet and provide support
should it be needed. It surfaced well within the radius of effects caused by
the upper atmosphere EMP device detonated over the area. Those effects were the
first indication that PACCOM had that a major military engagement was under
way.
The loss of the USS Reagan aircraft carrier and the flanking destroyers was accomplished with Chinese air
launched torpedoes. Witnesses from the tenders and other locally-based boats
that eventually fled the area report that the carrier and destroyers did not
take evasive maneuvers or launch any type of defense. Most of the surface fleet
reported loss of radar, ship-to-shore comms, and that onboard systems crashed
and were re-booting even as the torpedoes struck. The EMP blast finished what
the onboard failures had started, the complete disarming of the 7th Fleet.
Excerpted from There Will Be
Cyberwar: How the Move to Network-Centric War Fighting Has Set the Stage for
Cyberwar by Richard Stiennon.Purchase it today from Amazon in print ($14.90) or Kindle ($9.99)
formats. http://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/





