Documentos de Académico
Documentos de Profesional
Documentos de Cultura
AUGUST/SEPTEMBER 2016
www.armadainternational.com
06
LAND WARFARE
Shoot and
Scoot
Stephen W. Miller takes the
temperature of the selfpropelled artillery domain,
and examines some of the
leading programmes and
technological innovations.
12
land WARFARE
Smart Logistics
Logistics vehicles and tactical
trucks need protection on todays
battlefield. Stephen W. Miller
investigates some offerings aimed
at protecting these vehicles.
18
sea power
24
FUTURE TECHNOLOGIES
28
land WARFARE
Chemical Memory
Chilling yet pertinent analysis from
Andy Oppenheimer regarding the CBRN
threat from non-state actors, and the
available protective equipment.
COMPEN
ATIONAL
ADA INTERN
AN ARM
34
AIR power
COIN Operated
Thomas Newdick examines several
light combat aircraft, explaining
the contributions that they can
make to low-intensity operations.
40
Programme Focus
46
TURING
PLEMENT
DIUM SUP
Armada
compendium
2016/17
: The
new EW
rce for
sou
TrusTed
defence
lysis
ogy ana
Technol
7/29/16
12:38 PM
indd 1
Aug/Sept.
INDEX TO ADVERTISERS
ARMADA SUSCRIPTION
ARMADA WEBSITE
ON THE COVER:
Artillery falls under Armadas
spotlight in Stephen W.
Millers Shoot and Scoot
article in this issue.
45
MTU 15
COVER 3
NEXTER 17
OTOKAR 31
AR MODULAR
ASELSAN
COVER 4
21
CIPRA 43
RAYTHEON
33
ROSOBORONEXPORT 20,21,33,37
UKRSPECEXPORT 9
ELBIT
RADIO COMPENDIUM
ELETTRONICA
COVER 3
US/CANADA BORDER
IAI
COVER 4
CONFERENCE
IDEAS PAKISTAN
FLIR
31
COVER 2
KONGSBERG 11
COVER 2
29
VECTRONIX 27
Entries highlighted with Red Numbers are
found in Electronic Warfare Supplement.
CARAVAN
Gun
Truckin
OF DEATH
FCAS
Developments
Guided
Rockets Advance
Editorial
Careful What You Wish For
n 23 June, the United Kingdom billion towards the end of the decade in 2018/19.
voted to leave the European Meanwhile, the Institute of Fiscal Studies, a
Union (EU). While the security London-based think tank, has warned that the
implications of this decision so-called Brexit decision, and the uncertainty
may not be immediately ap- this has now generated in the UK and internaparent, there are potential implications none- tional business communities over whether the
theless for this momentous decision.
UK will continue to obtain access to the EUs
The editorial of the previous Armada (June/ single market, could see a reduction in the UKs
July) extolled the virtues of the EU and stated Gross Domestic Product (GDP) by between 2.1
this publications desire for the UK to continue percent to 3.9 percent in the 2018/19 timeframe.
its membership. Nevertheless, British voters
A reduction in GDP could mean a reduction
thought otherwise with 51.8 percent wishing to in government spending with less tax revenues
leave the EU, as opposed to the 48.1 who wished to go around. This could have an impact on deto remain. The defence implications of the UKs fence at a time when the UK is having to spend
decision are nuanced. Should the government big on a number of important procurements,
activate Article 50 of the Treaty on European notably the Lockheed Martin F-35B LightningUnion, the mechanism for departing from the II fighter for the Royal Navy and the Royal Air
club, the primary short-term impact could be Force, the Boeing P-8A Poseidon maritime paeconomic.
trol aircraft for the Royal Navy, plus the new
Goldman Sachs and Barclays, two major Type-26 Global Combat Ship and the so-called
finance houses, both predict that the UK will Successor class nuclear-powered ballistic misenter recession by late 2016/early 2017. Any sile submarine (SSBN) for the same service. In
economic downturn could have implications total, these procurements add up to a ballpark
for defence spending. A contracting economy figure of $81.1 billion, based on the reported
means less government spending. A report, costs for the quantities of platforms planned
published on 10 July, by the UK parliamentary for purchase.
Joint Committee on National Security, which
Such a figure may simply be too much for
scrutinises UK defence and security policy, UK government spending to stomach in light of
noted that current UK defence spending com- any contraction of the economy, and some promitments had been predicated on a 0.5 percent grammes may have to be substantially reduced,
annual spending increase above the rate of in- if not scrapped completely. No wonder Russian
flation. This was expected to take UK defence President Vladimir Putin welcomed the Brexit Thomas Withington,
Editor
spending from $45.3 billion for 2015/16 to $50.3 result.
AD
US Army
Land WARFARE
Land forces that have shown the ability for their guns (field artillery) to keep up with advancing
infantry and cavalry combat forces have always had a decisive advantage. This is because the ground
force as a whole is able to move forward, rather than one part outrunning another.
Stephen W. Miller
RoK Army
Land WARFARE
KMW
The PzH2000
maximizes the use
of automation in all
aspects of the gun
aiming, loading and
firing process to both
reduce the crew size
and to allow the gun
to undertake fire
support missions as an
independent unit.
US Army
Land WARFARE
BAE Systems
Land WARFARE
Automation
The presence of INS/GPS and digital
computers provides almost seamless calculation of the gun firing solution for each
target. Integrating this data into the gun
traverse and elevation servos permits the
gunner to direct their gun to the proper aim
point with the push of a button. The process
can be totally automated with even propellant charges determined, selected and
prepared. This hands-off process, coupled
with the automatic loading, is the core to
the Multiple-Round Simultaneous-Impact
(MRSI) capability. Another benefit is the
substantially reduced crew size required.
Early SPHs required five to seven troops
in the gun/vehicle crew. Current systems
have reduced this by 50 to 75 percent. For
example, the FH77BW LA2 can be fired by
as few as three soldiers. They can carry out
an entire fire mission and displace to a new
position without ever touching the gun or
leaving the protection of the armoured cab.
This capability is of special interest to nations with smaller forces and limited numbers of soldiers and equipment. This was
one of the motivations for the Armn (Swedish Army) on its FH77BW LA2 selection.
Singurlaug Jonsdottir, a spokesperson for
BAE Systems Bofors division which builds
the product, confirmed that the Swedish
Army accepted its first unit in September
2015 with further deliveries of the first 24
unit order occurring in 2016.
Improved Ammunition
Advances in electronics miniaturization
opened the door for taking the precision
targeting technology being employed in
air-to-ground munitions and applying
it to artillery projectiles. One of the first
was the US M712 Copperhead which used
a laser seeker that homed onto the target
being painted by a laser designator. Paul
Daniels, a programme manager at Raytheon for PGMs (Precision-Guided Munitions) who used the M712 as an artillery officer, shared with Armada that although
it was a great idea the complexity of the
firing process made it difficult to actually
employ current PGMs, like Raytheons
Excalibur, are far simpler, cost less and
are more reliable and accurate. The
Excalibur, which is fired from a 155mm
gun, had a goal of a CEP (Circular Error
Land WARFARE
aircraft. Several companies have developed solutions that offer ground and air
transport mobility by fitting the gun onto
a tactical truck. The Nexter CAESAR and
Soltom ATMOS 2000 are both 155mm
howitzers mounted in the rear bed of a
truck. The DONAR from KMW goes even
further. It is a modular gun system that
can be mounted on a wide range of either
tracked or wheeled chassis depending on
the users preference. These systems replicate the full complement of navigation
and positioning, C2, digital fire control and
fires management networking. A difference from the heavier SPH is that these
are generally (with exception of DONAR)
manually loaded although with mechanically assisted ammunition handling which
allows the ATMOS to be served by a crew of
only four, while the CAESAR uses six.
Moving Forward
The attributes provided by SPHs are
crucial to the ability to effectively deliver
KONGSBERG
KONGSBERG creates and delivers
high technology solutions for people
that operate under very challenging
conditions on the oceans, in the
deep subsea, in defence, in space.
www.kongsberg.com
Oshkosh
Land WARFARE
Smart
Logistics
Military tactical vehicles have for the most part remained similar to their commercial cousins
since their introduction during the First World War. In most armies they were often exactly like the
commercial versions though painted in green or sand colours with some military options.
Stephen W Miller
Protection
Tactical trucks, like their commercial
counterparts, have traditionally been soft
skinned i.e. unarmoured. They were seen
in land forces doctrine as support vehicles
that generally would operate behind the
forward echelons. In fact, as trucks they
Land WARFARE
Mobility
Enhancing the off-road mobility of
military trucks by taking advantage of
new technologies in suspension systems
has also been a recent focus. The impetus
for the adoption of these improvements
is partly in response to the added weight
of the protection packages; the APK adds
Oshkosh
QinetiQ
Mercedes Benz
Land WARFARE
US DoD
Iveco
Land WARFARE
Land WARFARE
The artillery
system of the
21st century
Trevor Hollingsbee
sea power
Protecting
the Air
from the Sea
Advances in the capabilities of surface-to-air missiles are being
matched by developments in maritime air defence sensors. There
is therefore demand for increasingly sophisticated, dedicated
air defence vessels. This article analyses a number of the most
significant recent developments in this field.
Trevor Hollingsbee
18 armadainternational.com - august/september 2016
sea power
DCNS
Weibo.com
sea power
sea power
US Navy
NATO
Land WARFARE
HOW NOT
TO BE SEEN
Modern armed forces must adopt a mix of tactics, techniques
and procedures, standard operating procedures and technology
in order to successfully execute missions across a varied
contemporary operating environment.
Andrew White
Saab
Land WARFARE
Saab
Land WARFARE
Land WARFARE
Russia, reports continue to emerge regarding the utility of special coatings used to
camouflage aircraft including the Sukhoi
Su-34 tactical bomber. Manufactured by
the United Aircraft Corporations Novosibirsk Aircraft Plant, the paint protects
against corrosion as well as camouflaging
the aircraft when viewed against the open
sky or ocean. Options include the Naval
Pattern which comprises a hybrid mix of
light blue and turquoise colours providing
the main body of the camouflage with an
additional white cone, while aircraft edges
are coloured in a light grey. Additionally,
UAC offers a single-colour camouflage
option for other fixed-wing aircraft, which
the company claims makes it less visible
to the human eye as well as a disruptive
pattern tailored to specific particular
environments and designed to make parts
of the aircraft unidentifiable to observers. Looking to the future, UAC is in the
process of evaluating camouflage paint
options capable of protecting the aircraft
COLDIPC.VECTRONIX.CH
I T I S O U R M I S S I O N TO AT TA I N
PERFECTION IN SURVEYING, TARGETING
A N D T R A N S F E R R I N G I N F O R M AT I O N .
C LI P O N L A S E R R A N G E F I N D I N G D E V I C E
I L LU M I N AT I O N P O I N T I N G C O M M U N I C AT I O N
Chemical
Memory
US Army
LAND WARFARE
Devices (IEDs) which involves several connected IEDs or mines usually buried beneath
a road, with the first device set off by an approaching vehicle which triggers detonation
by driving over a pressure plate in the device.
The first detonation in turn sets off all the
rest of the buried devices which are connected below the surface, thereby destroying
an entire convoy.
Mixed Results
How many ISIS IEDs incorporate chemicals or other CBRN (Chemical, Biological,
Maksym Kozlenko
LAND WARFARE
Rigaku
Environics
LAND WARFARE
The handheld
Progeny ResQ
produced by
Rigaku Analytical
Devices can
indicate the overall
threat level posed
by the presence of
multiple individual
chemicals.
US Army
LAND WARFARE
US Army
LAND WARFARE
Training
In the wake of Mr. Brennans assessment
of ISIS CW capabilities, the US DoD is emphasising training and exercises to enhance
CBRN readiness on the domestic front. This
involves training emergency responders at
the tactical level, who are in the front line of
response to attacks, and commanders and
government leaders at the operational and
strategic levels with CBRN scenario and
exercise development, post-drill reviews,
and mobile training teams.
The US National Guard WMD (Weapons of Mass Destruction) Civil Support
Teams (CSTs) would be in the forefront of
response to any intentional or unintentional release of CBRN materials. Their
training programmes, which are prepared
by leading defence company Battelle, have
to be of the highest quality for the survivability, safety and sustainment of operations. Federal exercises to practice and
assess coordinated emergency responses
are frequently conducted, an example
being a series from 2010 through 2014 at
several nuclear power stations across the
United States.
Euro 2016
Closer to current events, fears of further
ISIS attacks in France at the Euro 2016 soccer competition staged in June prompted
the French security services to stage a
simulated chemical attack at the Stadium
Municipal in Toulouse, in the southwest of
the country. Some 1200 volunteers acting
as fans were treated by paramedics while
armed police stormed the stadium. One
drill simulated a similar scenario to the
bomb and gun attack perpetrated by ISIS
at the La Stade stadium in northern Paris
in November 2015, while another simulated
a sarin nerve gas attack. As there was a vast
police presence needed to deal with several
outbreaks of severe football violence in the
first week of the contest, which attracted
hundreds of thousands of fans from many
countries, this begs the question as to
whether the authorities could have dealt
with a simultaneous attack at, or near, a
stadium while such violence was ongoing? CBRN will always be the wildcard, but
preparation for an attack has to continue
on many fronts, both military and civilian,
despite the cost.
air power
COINOperated
In this article Armada focuses on the exclusively fixed-wing part of
the light combat and Counterinsurgency (COIN) aircraft market,
where the focus is on non-traditional warfare and border patrol as
opposed to classic air combat tasks.
Thomas Newdick
34 armadainternational.com - august/september 2016
USAF
air power
USAF
air power
air power
Beechcraft
air power
IOMAX
Sukhoi
Programme FOCUS
The Generation
Game
On 27 April 2016 the latest example of Russias fifth-generation fighter, the Sukhoi T-50-6-2,
performed its maiden flight. This test aircraft, described by the design bureau as the first of the
second stage prototypes, marked an important milestone for the programme.
Thomas Newdick
Sukhoi
Programme FOCUS
Sukhoi
MoD had hoped to declare initial operational capability and launch full-scale
series production of the T-50 by the end
of December 2016. The Russian National
Armament Programme, which outlines
the procurement priorities for the Russian
military, called for 60 T-50s to be acquired
by 2020. These plans will not be realised,
and the Russian MoD has begun to make
contingency plans in light of delays to
the PAK FA programme, and perhaps
broader concerns over its capabilities. In
March 2015 the Russian deputy minister
of defence Yuri Borisov announced that a
reduced number of T-50s, perhaps as few
as twelve, might be purchased by 2020.
The T-50s chances are hampered by
the availability of Sukhoi Su-30SM and
Su-35 fighters, the latest iterations of the
Flanker family. These two lower-cost options, already in operational service with
the RuAF, provide an alternative to the
T-50, at least in the short to medium term.
Sukhoi
Programme FOCUS
Force (IAF) version, including the addition of the Tikhomirov NIIP N079 radar,
in place of the N036 Byelka radar on the
RuAF T-50s, and export versions of countermeasures and weapon management
systems, for example.
Like their Russian counterparts, when
it comes to the FGFA, Indian defence officials have provided a mix of unrealistic
timescale targets (including launch of
production in India in 2018-19) and threats
of reduced acquisition totals. In early
2015 the Indian chief of air staff Air Chief
Marshal Arup Raha confirmed that the
quantity of fighters that India will acquire
is still undetermined, and will depend on
financial factors.
Angad Singh, a New Delhi-based
defence analyst, suggests that the most
important factor facing the FGFA is the
fact it is a government-to-government
programme, meaning its ultimate fate
rests with a political decision, and not
the IAF. The IAF has repeatedly signalled a willingness to sacrifice the FGFA
if it means they can shore up fighter
numbers in the short term. The hugely
expensive MMRCA (Medium Multirole
Combat Aircraft) programme, and now
the government-to-government Dassault
Rafale-F3 fighter acquisition deal have
priority at the (IAF) headquarters, and
multiple pronouncements by multiple
officers have indicated that they are willing to push back or scale down (or both)
the FGFA in favour of a more immediate
fourth-generation buy.
Mr. Singh also believes that the IAF is not happy with the current or even promised capabilities of the FGFA. They would never
admit it in public, but the Su- 30MKI fleet is a huge headache from a
reliability perspective, with the engines a particular concern.
As its power plant, the T-50 currently employs two Saturn/
Rybinsk AL-41F1 thrust-vectoring turbofans. Despite its new
name, as Mr. Singh points out, the AL-41F1 engine is essentially an
upgrade of the AL-31F as used in the Su-27/Su-30 fighters, albeit
with improvements including a larger-diameter fan, new highand low-pressure turbines, an upgraded combustion chamber and
a new Full-Authority Digital Engine Control (FADEC) system, by
which the engine is controlled in an entirely computerised manner. According to Mr. Butowski, AL-41F1 engines will power T-50
fighters at least until 2020. After this date, they are expected to
be fitted with the Izdeliye-30 turbofan, a completely new design.
Mr. Singh continues, as an operator of multiple Russian
fighter types, the IAF is familiar with Russian technological
limitations There is a lack of confidence that the Izdeliye-30
engines will be delivered on time and on spec. Indian confidence
in the T-50 is also eroded by Russian reluctance to share test data
and take part in prototype evaluation. IAF officers are incredibly
unhappy that the Russians are not letting them get their hands on
even the T-50 prototypes. An Indian delegation was present when
T-50-5 caught fire, and reportedly the Russians wouldnt tell them
what had gone wrong and wouldnt let them near the aircraft once
the fire had been put out. Thats the sort of behaviour that upsets
prospective customers.
Compounding Indian unease is the RuAF decision to induct
only a small batch of series-production T-50s before committing
to a full-scale production. Aside from India, however, export
prospects for the T-50 are somewhat limited. The classic market
for top-end Russian equipment is the Peoples Republic of China
(PRC), Mr. Bronk notes. The PRC, however, has taken a different
path to developing its own advanced fighters. Having stolen so
much data, the PRC is in a better position to develop indigenous
fifth-generation fighters. In terms of countries to willing to
buy fighters from Russia, these tend to need to bolster their air
defences quickly, and above all cheaply. While there have been
claims that the T-50s unit cost will be comparable to the latest
Flanker series, (the Su-35), Mr. Bronk considers that this is clearly
unrealistic. Furthermore, with the Su-35 available and in quantity
production, this option represents a very good deal in itself. For
$65 million, very little comes close to the Su-35, he adds.
While the PRC develops its own comparable fifth-generation
fighters, India was hopeful that joining Russia to co-develop the
FGFA would provide a head start for its own aerospace industry. So far, there is little clarity on Indian industrial participation, beyond the fact that HAL is to be the lead integrator for the
Indian production effort, says Mr. Singh. Its early to be talking
about industrial participation anyway, since everything seems to
have gone sideways. The Russians have done most, if not all the
development work. If India stumps up the $6 billion the Russians
were asking for, they will essentially be paying for instructions
on how to build a fighter whose development is all but complete. I
think even the Russians have recognised this and revised their ask
including Critical
Information
Infrastructure
Protection
Ministry of Interior
Department of
Disaster Prevention
& Mitigation
Sukhoi
Sukhoi
Programme FOCUS
TURING
Global Reach
Al-Qaeda had already made inroads into
the World Wide Web and other groups
follow its example, but ISIS has exceeded
these efforts, paradoxically employing 21st
century technology to promote its antediluvian ideology and practices of mass killings, torture, rape, enslavement, economic
jihad and the destruction of antiquities.
As well as the better-known Facebook
and Twitter social media outlets, to reach
new audiences ISIS use Ask.fm, Pinterest,
YouTube, WordPress, Kik, WhatsApp and
Tumblr to spread its message.
ISIS are on a far larger scale and
intensity than any insurgent organisation,
either contemporary or erstwhile. This
gives it a truly global reach. An indicator of
that reach can be seen in the increase of Internet use this century: in 2005 there were
one billion users; by 2010, two billion; by
2014, three billion; and by mid-2016, over 3.5
billion, according to Internet World Stats
Usage and Population Statistics. Today, a
young recruit from Africa can be drawn in
via Twitter by a faceless cyber-operative
somewhere in Syria.
Lone Wolves
Online propaganda has succeeded in radicalising individuals who have travelled to
fight with ISIS in Syria and Iraq, and increasingly, to commit lone wolf attacks
in the West, exemplified most recently by
the deadliest mass shooting in modern
times in the United States when an ISISinspired US-born gunman shot dead 49
people at the Pulse nightclub in Orlando,
Florida, on 11 June. The perpetrator,
Omar Mateen (later killed by police) was
radicalised online. The difference between recruiting through these channels
and other, more traditional methods of
recruitment (see below) is that while some
of it can be tracked by the authorities, the
recipients, especially those prone to radicalisation for a variety of reasons, can be
sucked into it in a way not seen in normal
insurgent recruitment (which ISIS also
uses) namely face-to-face communication, persuasion or threats of violence.
Online recruitment is essentially invisible recruitment. Recruitment online follows three stages: individuals in the preradicalisation phase visit extremist home
pages, watch videos with subtitles in their
US DoD
TURING
Example 1
In May ISIS-linked hackers published
a hit list of dozens of home addresses
and photographs of over 70 US military
personnel that the group claimed to have
been involved in Unmanned Combat
Aerial Vehicle (UCAV) attacks on targets in
Syria. The hackers, who have links with the
United Kingdom, and call themselves the
Islamic State Hacking Division, took the
information from social media sites and
circulated online the personnels names,
home addresses and photographs. They
urged supporters: Kill them wherever
US Army
TURING
Cyber Caliphate
As well as using the Internet as a recruitment and propaganda tool, ISIS, along
with a host of other criminals worldwide,
are launching cyber attacks. These have
advanced from various uncoordinated
groups without direct association with
the caliphate to the formation of a fullyfledged operation in early 2016 known as
ISIS United Cyber Caliphate. Of concern
is that well-educated young people will be
attracted to contribute to this cyber division, and that their efforts will take down
websites, often through massive Distributed Denial Of Service (DDOS) attacks
to disrupt infrastructure, and produce
further recruitment, support, and attacks.
Within the United Cyber Caliphate
the ISIS hacking division selects targets
and assesses the value of sensitive data
from past attacks. Second, the cyber
recruitment drive is a programme to find
skilled hackers who are tasked with using
malware (malicious software) and hacking
tools. These young cyber-attackers are
trained on courses found on Dark Web
Forums. The Dark Web is a broad term
for content on the World Wide Web which
requires dedicated software or authorisations to access and which thus cannot be
reached by normal search engines. While
many rank-and-file ISIS recruits are
uneducated or have criminal records, this
separate recruitment effort is attracting
well-educated clean skins with IT (Information Technology) skills. According to
Laith Alkhouri, co-founder at Flashpoint,
a pioneer of Dark Web Intelligence, not
long back, we rated the cyber threat from
them as mediocre and without the acumen
for sophisticated targeting. But ISIS cyber
attacks have entered a new dimension (by
Challenging Recruitment
Government deradicalisation programmes
(such as Prevent and Channel in the UK)
involve advising community leaders how
to resist the ISIS online message, along
with the creation of alternative websites.
Government agencies post counter messages on Twitter and other social media,
yet these efforts are not widely viewed as
effective. The programme run on Twitter
by the US State Departments Centre for
Strategic Counterterrorism Communications (CSCC) called Think again, turn
away is aimed at potential ISIS recruits,
but, according to Daniel Cohen, coordinator of the cyber warfare programme at the
Institute for National Security Studies in
Tel Aviv, Israel, Its not reaching the right
population. Its not reaching the potential
jihadists. This really is the hard part: The
prime challenge is to target, identify and
connect with all those who are absorbing
content from ISIS and other extremist
groups, and becoming radicalised.
Civilian Surveillance
Countering Internet-based political
violence is opening up controversial
debates about civil liberties, as it is pushing the UK, the US and other democracies
to bring in more surveillance of overall
Internet use by the public at large. In May,
US Army
TURING
the French National Assembly, the countrys parliament, adopted legislation that
expanded the governments surveillance
authorities to counter such threats. The
UK government is pushing the Investigative Powers Bill through parliament,
which will bring together all of the powers already available to law enforcement
and the security and intelligence agencies
to obtain communications and data about
communications and make provision
for the retention of Internet connection
records for law enforcement to identify
the communications service to which a
device has connected.
The Bill is controversial partly because, according to points raised by the
shadow home secretary Andy Burnham
who speaks on domestic security matters
for the opposition in the UK parliament,
routine gathering of large quantities of
information from ordinary people does
lead to privacy concerns and should be as
targeted as possible It is for the government still to convince the public that these
powers are needed.
Hackers vs. hackers
In the wake of the ISIS bombings in Brussels on 22 March, the hacktivist group
Anonymous announced (anonymously, of
course) that it would intensify its cyber-
Active/Passive Defence
To protect against actual cyber attacks,
products such as firewalls, cryptography
and intrusion detection are produced
in rapid succession to protect organisational IT assets; this is known as passive
defence. Active defence imposes serious
risk or penalty on the attacker as this
involves identification and exposure, investigation and prosecution, pre-emptive
or counter-attacks (as per the Anonymous
campaign). The former tends to be the
province of companies, the latter, mainly
for legal reasons, of governments; for example in the US, the National Infrastructure Protection Centre.
At the corporate level, IBM has made
its vast library of security intelligence data
available via the IBM X-Force Exchange,
a new cyber threat intelligence sharing
platform powered by the IBM Cloud that
allows organisations to easily collaborate
on security incidents. This collaborative
platform provides access to global volumes
of actionable IBM and third-party threat
data, including real-time indicators of
live attacks, which can be used to defend
against cyber crimes. X-Force Exchange
users can tap into threat information
based on the monitoring of more than 15
billion security events per day; malware
threat intelligence from a network of 270
million endpoints; threat information
based on over 25 billion web pages and
images; deep intelligence on more than
eight million spam and phishing attacks;
and reputation data on nearly one million
malicious IP (Internet Protocol) addresses.
The pace of development in this area is
so rapid that it will take corporate leaders
in the cyber field, working in tandem with,
or as well as, security services with special
cyber divisions to attack the growing use
of web-based recruitment and modus operandi. The dependence of billions of people
on cyber systems makes cyber war all the
more complicated, and all the more imperative. The far reach of ISIS via the Internet is
succeeding in radicalising people, especially lone wolves and self-starter groups who
are inspired by the organisation, all over the
world who are prone to extremism, the next
step being their adoption of violence. While
cyber terrorism may be the silent recruiter,
its deadly results are anything but.