Security

The Magic of Number Stations

Waterfall display for "The Buzzer", radio station UVB-76 on 4625 KHz. The lower sideband is clearly suppressed. Uploaded to Wikipedia Commons on 28 June 2010 by Janm67
“Waterfall display for “The Buzzer”, radio station UVB-76 on 4625 KHz. The lower sideband is clearly suppressed.” Uploaded to Wikipedia Commons on 28 June 2010 by Janm67 with a GNU Free Documentation License.

One of the world’s enduring mysteries is the nature of number stations, which are shortwave radio stations that broadcast random lists of numbers, morse code, or strange bursts of sound, such as the odd beeps on Russian station UVB-76. Nobody knows what the purpose of the number stations is for certain, but we do know that they have been broadcasting for decades, that the transmitters have an immense amount of power, and that stations broadcast in languages that range from Bulgarian to Chinese. These facts probably mean that only nation states would have the resources to operate these communication systems. The most likely explanation is that these sites are tools for global espionage networks. It may be difficult to believe, but even in this internet age the most secure way to transmit one way messages may be through shortwave radio, which can’t be traced to the listener. The messages are almost certainly transmitted using one time pads, a probably unbreakable form of encryption. …

Security, fear and Stuxnet

Roman Poroshyn’s brief book (156 pages) provides an excellent overview of Stuxnet within the larger context of cyber-warfare and espionage in the Middle East. Unlike another book on the same topic, Kim Zetter’s Countdown to Zero, it is not based on extensive interviews, nor does it focus in as great a depth upon the process through which the virus was investigated by global cyber security firms. Instead, with Stuxnet: the true story of Hunt and Evolution, Poroshyn tries to place Stuxnet into a broader context of espionage and cyber-warfare directed against not only Iran, but also other institutions in the Middle East, such as the Lebanese banking system. The book is an engaging read (despite the awkward wording of its subtitle), and Poroshyn shares a number of intriguing insights, of which the most interesting was that Stuxnet’s creators ultimately may have allowed it to be revealed to the world as an act of psychological warfare (33-35, 154-155). One of Poroshyn’s other arguments is that Stuxnet is only one chapter in a much longer struggle, which is convincing given his detailed analysis of successive software tools (Flame, Gauss, Narilam, and perhaps Stars) that Israel and the United States likely used against Iran and other regional actors.

One of the book’s strengths is its ability to convey the intelligence of the software design behind this particular cyberweapon. For example, Stuxnet entered into the Iranian nuclear enrichment network through USB sticks, because the network was air-gapped (lacked an internet connection) to the outside world. The level of deceit entailed is chilling: “After the third infection the original Stuxnet worm commits suicide. It deletes itself from the USB stick without leaving a trace” (18). Perhaps most impressive was the fact that it used the very tools for securing machines to infect them: “The perfect match for all of Stuxnet’s requirements is a computer scan process, generated by antivirus software. Stuxnet injects its clone into a variety of processes generated by anti-virus programs from BitDefender, Kaspersky, McAfee, Symantec, and many others” (19). The program was so effective that it briefly shut down the entire Iranian enrichment program (22). Of course, the Iranians ultimately were able to return to significant production. What is impressive, however, was that it achieved this goals which would have been difficult to achieve even with a conventional airstrike against such a hardened site as the Iranian enrichment facility. It also had dangerous implications: “Russia, which is involved in the reconstruction of the Iranian nuclear reactor in Busher, immediately accused Stuxnet of problems associated with the reactor’s reconstruction, and blamed Stuxnet for all delays” (37). There seems to be little evidence for this allegation, but once the attack is made, other actors may also view themselves as being threatened (or that the attack represents a convenient excuse).

There is reason to believe, as Poroshyn suggests, that there are other versions of this particular weapon in existence, only biding their time to be unleashed (53). This book is currently in its third edition. It will be interesting to learn what has happened when the fourth edition is released.

If you are interested in cyber-warfare you might want to read my review of the novel Ghost Fleet.

Shawn Smallman, 2016

Seymour Hersh and Syria

Few investigative journalists have as impressive a history covering international issues as Seymour Hersh. His current article, Military to Military, in the London Review of Books harshly criticizes current U.S. policy in Syria for being too critical of Russia, too supportive of Turkey, and most of all, unsuccessful. The piece is well worth reading.

Shawn Smallman, Portland State University

Book Review of Lords of Secrecy

Scott Horton’s book Lords of Secrecy is a passionate, angry, well-written and disturbing look at how U.S. national security agencies have undermined congressional oversight, and consistently violated the law. At the core, this book argues that the growth of the national security bureaucracy has outgrown the ability of Congress to provide oversight, and fundamentally threatens democracy. In the aftermath of the appalling and evil attacks in Paris last week, there is currently a clear need for effective intelligence agencies. Horton’s work, however, raises questions about the autonomy of these organizations, and the risks that their work may entail by pervading secrecy throughout our political culture. …

Book Review of The Dark Net

The Dark Web first came to widespread notice with the publicity surrounding the arrest of the founder of Silk Road, an anonymous online market place. The Dark Web itself is subject to multiple definitions, although the most common is that component of the web that cannot be accessed by standard browsers. To access this part of the web, one must use a specifically designed browser, such as TOR. In his new book, the Dark Net, Jamie Bartlett takes a more expansive approach to the web, which he conceives off as the underworld of the internet, beyond the reach of the government and the authorities. …

Security and a strange cyberattack

The Natanz nuclear facility in Iran. This photo was taken by Hamed Saber, and was posted to http://www.flickr.com/photos/hamed/237790717, and downloaded from Wikipedia Commons
The Natanz nuclear facility in Iran. This photo was taken by Hamed Saber, and was posted to http://www.flickr.com/photos/hamed/237790717. I downloaded the image from Wikipedia Commons

In Countdown to Zero Kim Zetter describes a 2010 cyberattack on the Iranian nuclear program. In a brilliant piece of computer engineering, the control units for centrifuges that enriched uranium were forced to slow and fail. The attack was so carefully planned that even after it began the Iranians were initially unable to diagnose the problem. The book itself is well written and carefully researched. Zetter did extensive interviews in the cybersecurity community, to understand how people identified and studied this particular worm. This work is detailed in extensive footnotes, which will lead a curious reader down interesting paths. Zetter carefully describes the technical issues involved in the attack, without letting this detail impede the storyline. Overall, this is a masterful work of narrative non-fiction, which engages the reader in a highly complex topic. …

Climate Change and the Middle East

Image of Yemen from the CIA World Factbook, Yemen.
Image of Yemen from the CIA World Factbook, Yemen.

I’ve blogged before regarding the argument that a disastrous drought helped to feed the conflict in Syria. It’s worth revisiting the topic, however, based on a report edited by Caitlin Werrel and Francesco Femia at the Center for Climate and Security.The report, “Climate Change and the Arab Spring,” was published in February 2013, and makes the argument that climate change was a key factor in the Arab Spring, although that is not to say that it caused the uprisings. The essays in the collection clarify the truly global factors that underpinned this event, from declining wheat production in China, which undermined food security in the Middle East, to the “transcendent challenges” created by climate change globally.

The link between drought and warfare is not new. This linkage, for example, may help explain the collapse of classical Mayan civilization in the 9th century in the Yucatan peninsula and Central America. The Mayan city-states faced both an epic drought, and -based on the archaeological record- widespread warfare perhaps beginning around 800 AD (Michael Coe, The Maya, 162-163, Jared Diamond, Collapse, 172-174). The historical connection between drought and conflict is a deep one. …

Ghost Fleet: a book review

F35 on training flight. Wikicommons. U.S. Navy ID number ID 110211-O-XX000-001
F35 on training flight. Wikicommons. U.S. Navy ID number  110211-O-XX000-001

P.W. Singer and August Cole have written a techno-thriller based on a Chinese invasion of Hawaii, in a strange replay of Pearl Harbor. As with Tom Clancy’s work, there are multiple points of view, moral black and whites, and the technology is at times as much of a star as the main characters. Yet this work creates a pessimistic twist to Clancy’s upbeat vision. In Ghost Fleet America’s reliance on technology makes the country so vulnerable to attack that it must draw (spoiler alert) on irregular warfare tactics that its armed forces learned fighting in Afghanistan and Iraq.

There is a contradiction within this work. At times some scenes come across as unrealistic, and the analysis of international politics seems simplistic. Some plot devices, (another spoiler alert) such as the discovery of new resources leading to a surprise invasion, are so common in the genre as to be exhausted. In contrast, the focus on technology is all too convincing, and this detailed look at possible scenarios for future warfare (the book has extensive endnotes) is fascinating. The work is also carefully plotted, and the climax is deftly handled. …

Maps and the South China Sea

With the possible exception of Ukraine, there is perhaps no place in the world today so likely to see a localized conflict expand into a global war as the South China Sea. Business Insider has recently published a collection of maps that seek to explain tensions in the area. The maps themselves were originally produced by the Asia Maritime Transparency Initiative, which has done an important service by documenting the economic, political and geographic issues that are shaping geopolitical tensions throughout the region. Therese Delpeche, who sadly passed away in 2012, argued in her important book, Savage Century: Back to Barbarism, that the political situation in Asia now resembles that in Europe in 1914. This idea was not new, and has been controversial within Political Science, but after reading her work it is difficult not to see historical parallels. For anyone who wonders why these ocean waters have engaged so many different nations, these nineteen maps explain what is at stake. The maps would also be a great teaching tool in an “Introduction to International and Global Studies” class.

For a critical look at U.S. policy in the region, and its implications for Australia, please see my review of Michael Fraser’s Dangerous Allies. For a broader look at the issue, please see my book review of Robert Kaplan’s work, Asia’s Cauldron.

Shawn Smallman, Portland State University

War and the limits of theory

Image of the Persian Gulf from the CIA World Factbook
Image of the Persian Gulf from the CIA World Factbook

This week an anonymous author wrote a brief article in the New York Review of Books that is attracting a lot of attention. All that we know about the writer is that they have worked as an official in a “NATO country” and that they have a great deal of experience in the Middle East. The central idea of the piece is that our current social science theories utterly fail to explain the rise of ISIS in Iraq and Syria. As the author argues, there is a rich literature on guerrilla warfare, which is based on more than a century of experience. ISIS has violated everyone of these rules -don’t engage in fixed position warfare; don’t violate the social norms in the communities in which you exist- and yet ISIS still moves from success to success against vastly greater forces.

Like most observers, the author of this piece has been stunned both by the sheer speed of ISIS’s success, and its ability to change the rules of the game. The author makes the point that observers often assume that what is needed is more information, but perhaps that is not the case. Maybe the real problem is our analytical frameworks. Maybe we don’t know what we thought we know. Certainly, the complete failure of U.S. policy in Iraq raises questions about every aspect of U.S. counter-insurgency doctrine. Of course, one could also point to the deeply flawed rationale for the invasion of Iraq in the first place. Still, perhaps the conceptual problem is even larger than this, and speaks to the overall weakness of social science theories as they are applied to the region. The author makes the point that to see an equally stunning success against all expectations you might have to look to the Vandal conquest of North Africa in the dying days of the Roman Empire. This is an engaging analogy, although historians might quibble with the need to reach so deeply into the past. Even so, the larger point is that our current social science models governing what are sometimes called “small wars” don’t seem to be working well to understand this current conflict.

One might question whether our understanding of small wars is to Eurocentric. Still, most of the authors of foundational texts -Mao, Ho Chi Minh and Che Guevara- were not Western. A counter-argument might be that ISIS may yet collapse as quickly as it emerged on the scene. Perhaps ISIS appears to be rewriting the rules only because there has not been enough time for it to pay the price for violating them. Perhaps ISIS has not yet had enough time to fail, and its collapse will be as quick as its rise. Still, if ISIS continues to thrive over the next few years, then the author is correct that something fundamental is wrong with our understanding of these conflicts. In that case, theorists and strategists will need to fundamentally question everything about our current understanding of irregular warfare.

If you are interested in the theory of war, I strongly recommend Ann Hironaka’s Neverending WarsI used the book in my “Foundations of Global Studies Theory” class, as a key security studies text. I am often frustrated by much of the existing literature in security studies, which still overemphasizes conventional conflict, and relies too much on Realism as a theoretical approach. In an era of terrorist organizations, cyber-warfare, Anonymous, and drug cartels, much of this theoretical literature is in danger of becoming dusty. Hironaka’s work is interesting because it focuses on civil war, the dominant form of conflict in the world today, and draws on insights from Sociology. Her central argument is that the international community unintentionally propagates these conflicts, an idea that is relevant to many existing conflicts globally.

Shawn Smallman, Portland State University

Privacy & Cookies: This site uses cookies. See our Privacy Policy for details. By continuing to use this website, you agree to their use. If you do not consent, click here to opt out of Google Analytics.