ANN ARBOR – Over the next few weeks, MITechNews.Com will be

publishing excerpts from cybersecurity expert Richard Stiennon’s latest book,

called There Will Be Cyberwar. The book makes the case that the US military

rushed to “network everything” and, like most organizations,

neglected to secure its most critical systems. CHAPTERTWO Cautionary Tale.

 

The foregoing fictional scenario (as outlined in Chapter

One) is meant purely as an exercise in predicting the worst case outcome of a

situation that has evolved over the past two decades. The US military, and

indeed most advanced military organizations, have moved to a network-centric

war fighting stance with little or no thought, until very recently,1 to the

incumbent vulnerabilities that entails.

 

In 2011 Leon Panetta, then US Secretary of Defense, joined

the chorus of those newly awakened to the reality of the threat of cyberattack

against critical infrastructure when he warned of an impending “cyber Pearl

Harbor.” But Panetta got his metaphor wrong. An attack against critical

infrastructure of the type he and many Cassandras rail on about, one that shuts

down the power and communication grids, would be more akin to a terrorist

attack than a military surprise attack. The metaphor Panetta should have used

was a “cyber 9/11.” A “cyber Pearl Harbor,” if the metaphor were to be

correctly applied, would entail a military defeat via cyber means, which the

previous chapter attempted to dramatize. In other words, an adversary’s use of

computer network attack (CNA) and exploitation (CNE) to gain a tactical

advantage that leads to a lost battle, a change in military standing, or even a

shift in the geopolitical balance, would be most comparable to the destruction

of the Pacific Fleet at Pearl Harbor, on December 7, 1941.

 

This book takes us on a journey from the development of the

Internet, to the exciting days of the new information age, and then to the

discovery of the power of networking by the US military. The history of the

development of attacks against vulnerabilities in the commercial world has a

parallel in the domain of governments, militaries, and war fighting; a parallel

that allows us to project into the future. That future vision includes a

humiliating military defeat at the hands of a more capable digital adversary.

One such scenario, played out in the introduction, was chosen for a particular

reason.

 

The 1995-96 Taiwan Straits Crisis

 

The history of China and Taiwan is short and consistent.

When Mao Zedong finally won the Communist revolution against the Chinese

Nationalists in 1949, Chiang Kai-Shek fled with his forces to the adjacent

island of Formosa and established a new country, Taiwan. Since then China’s

stated goal has been to reunify the two countries. Whether it will be a

peaceful reunification (like that of Hong Kong in 1999) or a violent

reunification, contributes to the long lasting tension between the two

countries. During the Korean War there were multiple armed invasions of Taiwan

from China.

 

In 1991 Taiwanese President Lee Teng-hui angered China with

his statements about reunification, leaning away from the One China rhetoric

that both countries generally stuck to. Then in 1994 Lee was traveling from

South America when his flight was diverted to Honolulu to refuel. The Clinton

Administration, cognizant of the delicate situation, bowed to Chinese pressure

and refused to grant Lee a visa, forcing him to stay overnight in the plane.

Tensions began to rise in 1995 when Lee was invited to speak at his Alma Mater,

Cornell University. Congress passed a resolution requiring the State Department

to grant him a visa. This was during the lead up to the first fully democratic presidential

elections in Taiwan and China took a dim view of the situation. Lee spoke at

Cornell in June 1995.

 

China announced missile tests in a region near Taiwan and

began maneuvers on the mainland across the Straits from Taiwan in Fujian

Provence. They carried out a series of missile launches into the sea to the

North of Taiwan in July. The Clinton Administration took steps to demonstrate

that the United States was willing to intercede if China threatened an

invasion. In March of 1996 two aircraft carrier battle groups were deployed to

the vicinity.

 

This is where Admiral Archie Clemins comes into the story.

Clemins was the Vice Admiral of the US Navy’s 7th Fleet. Only two years before,

upon achieving flag rank, he had been assigned to the training division of the

US Pacific Fleet under Admiral Frank Kelso. He was also dual-hatted as head of

N6, the information technology arm of the Pacific Fleet.

 

As an “IT guy,” Clemins began to carry a laptop with him, an

unusual sight in the 1993 Navy. It was an Apple PowerBook, probably a 160 with

4 MB of memory and a 40 MB hard drive. It was one of the earliest flip top

portable computers and had a grayscale LCD screen. It weighed 6.8 pounds.

 

His Powerbook was his constant companion, even on trips to

the Pentagon. He found that people, specifically Admiral Robert J. Kelly,

Commander of the Pacific Fleet based in Hawaii, were asking him for copies of

the notes he took on his portable. He was living the Information Revolution of

the time. “That started the use of computers, we, at Training Group Pacific,

led everybody, with desktop computers.”

 

Shortly after taking on the Pacific Fleet role based in San

Diego, Admiral Clemins got a call from the Navy’s Assignment Officer who asked

how he liked the weather in San Diego and if he would like to transfer to the

Pentagon? The previous week Admiral Keslo, head of Naval Operations, had

announced a major reorganization of the Navy and Clemins had been chosen to

lead the effort.

 

As Clemins pulled together a small team within the Pentagon

he made sure that they used technology to its best advantage. Clemins credits

this use of computers for the success his team had in accomplishing the Navy

reorganization in 12 months instead of the 18 months originally slated for it.

 

Clemins was then appointed Deputy Commander of the Atlantic

Fleet at Norfolk to accomplish the same reorganization. “The more I did this

the more I came to believe this [computer technology] was the way we were

going.”

 

From Norfolk, Clemins was promoted to commander of the 7th

Fleet where he had served as chief of staff years before. He was determined to

bring the fleet into the Information Age: “You have to remember the ships of

the time, ’93-94 are still moving information at teletype speed.” That meant at

most 80 messages a day of 40 lines each. All messages would go directly to the

Commanding Officer (CO) who would route them to the appropriate department or

personnel.

 

Clemins’ first task was to assemble a team. He drew from

surface, air, and submarine commanders. This was 1995, the year Windows 95 came

out, the first commercial operating system with embedded TCP/IP networking

capability. Mark Lenci, the submarine captain that Clemins tasked with

retrofitting the 7th Fleet, had little experience with networking. His only

qualification: he had an AOL account. But no one in the command ranks was an

expert and Clemins chose a team that could learn quickly and get things done.

When Lanci reported to duty aboard Clemin’s command ship, the USS Blue Ridge,

he recalls Clemins saying “let’s go take a walk.” On the flight deck he

explained his vision of NCW.

 

“I don’t know what a WAN (wide area network) is but I know

we need one. Get the smart guys together here in the Pacific. We are going to

do it.” And they were going to do it with commercial off the shelf products

(COTS).

 

Conclusion of Chapter Two Next week

 

Excerpted from There Will Be Cyberwar: How the Move to

Network-Centric War Fighting Has Set the Stage for Cyberwar by Richard

Stiennon.Purchase it today from Amazon in print ($14.90) or Kindle ($9.99)

formats. http://www.amazon.com/There-Will-Be-Cyberwar-Network-Centric/dp/0985460784/