
3 4 June 2017
network – lower classified networks include
nipper of course but also the public internet. The
tunnels are now understood to be Virtual Private
Networks (VPNs) that are in daily use by private
industry. The implication of this ostensibly
innocuous development is that the military
themselves have transcended the security of
their own private network using what is now off-
the-shelf technology.
Did You Lose Control
of the Drones?
At the intersection of the video-games universe
and the US military is Creech Air Force Base, just
outside Las Vegas, Nevada. From there Air Force
pilots remotely control the surveillance, informa-
tion-gathering and ‘targeted killing’ Drone
operations. Among the many different forms of
information communicated to and from Creech
is target-designation information – focusing on
who is to be killed. This information is commu
-
nicated via our now familiar slipper network.
On 9 September 2016 the network at Creech
crashed, affecting ‘critical services’. Services fell
back to less powerful devices which temporarily
stabilised operations but it was stated at the time
that there was no backup if that solution failed
under load. The US Air Force has been somewhat
tight-lipped regarding the root cause of the
outage, whether it was a crash or a cyber attack
but what is not disputed is that one of the critical
services that was affected, however briefly, was
control of Drones - Drones with weapons.
It is unclear whether what followed was a
direct result of the crash or unrelated. Within
weeks of the crash, a series of Drone related air-
strikes went badly wrong. The litany of errors
included:
•
September 17: 62 Syrian Soldiers accidentally
killed by US airstrike during a ceasefire
•
September 18: 15 civilians killed in Afghani-
stan by Drone strike
•
September 18: 22 Somali soldiers killed by US
Drone strike
So far, no explanation for these failures has
been forthcoming, but on October 7 2016 the Air
Force announced that Creech would be subject
to a surprise cyber security inspection.
Surprise Security Checks
When I think of the US cyber command I always
have a soundtrack that combines Darth Vader’s
march with the tempo of the Start Spangled
Banner. The razzmatazz that we associate with
the general US way of life does not escape the
military it appears. The surprise inspection was
heralded by a poster on the Nellis Air Force base
website.
The rest of the page highlights the imperatives
that personnel should be aware of including not
sharing secret information via, amongst other
things, social media.
Other areas that personnel, including the
Drone ‘pilots’, were encouraged to consider
include:
“Exercising your mental skills by memorizing
login credentials is also vital. Stay away from
writing them down”. And perhaps even more
alarming:
“Continue to be wary of phishing attempts;
each and every day people fall victim to cyber
hacks conducted via adversary phishing tactics,
techniques and procedures”.
In summary: don’t share secrets on Facebook,
try to remember your password, presumably
including the codes that allow Drones to fire on
targets, and finally don’t trust everything you
read in your email.
But if slipper is ‘Airgapped’ as stated, how is
the system vulnerable to leaks via social
networks?
Of course Cyber Command came into exist-
ence as a result of a previous hack – Operation
Buckshot Yankee – where a USB drive was
apparently left in the parking lot of a Defence
Department facility. That USB was subsequently
attached to a laptop computer releasing mali-
cious code dubbed agent.btz on the military
networks taking 14 months to eradicate.
Can Ireland Be Neutral?
Putting all of the pieces together, we know that
private networks are utilised by the US Military
to connect its various operations, some diplo-
matic and some offensive military operations.
We know that GCHQ in the UK has maintained
access to this infrastructure, including transat-
lantic cables that terminate or land in Ireland.
Questions should be raised at Government
level to determine what if anything has been
done to ensure that military traffic, particularly
that used in offensive operations, does not pass
through Irish infrastructure. Is this challenge to
our neutrality deliberate or a blind spot as a
result of ignorance of the technology?
Afterthought -
The Future of Drones
The US and its military are facing a crisis con-
cerning its Drones. Pilots are leaving in
significant numbers, citing Post Traumatic Stress
Disorder (PTSD). While we may struggle to sym-
pathise with the pilots who leave their
comfortable facility in Nevada to travel home to
their well-appointed houses in Las Vegas having
wiped innocent people from existence, we
should be deeply concerned by the proposals to
deal with the problem. The US Air Force is
attempting to leverage Artificial Intelligence
technologies to allow Drones to designate their
own targets. In effect they are proposing the
development of an autonomous fleet of armed
robots. It all evokes the ‘Hunter Killer’ in the Ter-
minator series – a flying, autonomous, armed
military robot.
Stephen Hawking has been quite clear on his
concerns relating to Artificial Intelligence, which
I’ll explore in a future article, and that is in the
absence of arming an artificially intelligent
robot. We should all be fearful.
Slipper, nipper, JWICS and
so on all leverage private
infrastructure but are
supposedly separated from the
rest of the Internet, but there is
some evidence to suggest that
this isn’t entirely the case
MEDIA
‘Hunter Killer’ from Terminator