Showing posts with label ABKHAZIA. Show all posts
Showing posts with label ABKHAZIA. Show all posts

Friday, October 26, 2012

DTN News - GEORGIA DEFENSE NEWS: How Russia And Georgia Started A Drone Arms Race

Defense News: DTN News - GEORGIA DEFENSE NEWS: How Russia And Georgia Started A Drone Arms Race
Source: DTN News - - This article compiled by Roger Smith from reliable sources By Nicholas Clayton GlobalPost.com
(NSI News Source Info) TORONTO, Canada - October 26, 2012: On the night of August 7, 2008, (TBILISI, Georgia) what military experts and historians say is the world’s first two-sided drone war began.

Georgia, convinced Russia was about to annex its separatist region of South Ossetia, made the first move by bombarding and then invading the separatist capital, Tskhinvali.

What followed was a destructive five-day war that was to a great extent provoked and fought by drones, waking Russia up to the strategic importance of unmanned aerial vehicle (UAV) technology.

The Georgian government lost control over South Ossetia and Abkhazia in the country’s chaotic first years of independence after the Soviet Union fell in 1991.

Four months before the war, as peace talks stalled between Georgia and the de facto governments of its breakaway territories of South Ossetia and Abkhazia the Georgian government began conducting reconnaissance flights over the conflict regions using medium-sized Hermes-450 drones it had purchased from Israel.

Moscow and Georgia’s capital of Tbilisi have frequently clashed over Georgia’s aspirations to join NATO as well as Russia’s increasing support to Georgian separatists, but the conflict intensified as the drones started to go down.

Three to seven Georgian drones were shot down over Abkhazia in April and May 2008. Each side offered conflicting information on the number of incidents and aircraft involved.

Georgia accused Russia, which maintained a peacekeeping contingent in each of the territories, of committing a “military aggression” on sovereign Georgian territory by shooting down the drones. On one occasion, Georgia produced video transmissions from one of its downed drones, showing a fighter jet shooting it with a missile. A subsequent UN report found that video proved Russia had shot down the drone using either a MiG-29 or Su-27 fighter.

These drone incidents highlighted a grey area of international laws and treaties pertaining to disputed territories and the use of unarmed, unmanned aircraft.

The 1994 Moscow Agreement was signed by the parties of the 1993-1994 Georgian-Abkhaz conflict and dictated that heavy weapons and military aircraft would not be allowed in or around the conflict zone. Both the UN and the Organization for Security and Cooperation in Europe (OSCE), which had observers deployed in Abkhazia, found that Russia violated the Moscow Agreement by sending the fighter to shoot down the Georgian drone.

However, the UN found that Georgia also violated the ceasefire because “a reconnaissance mission by a military aircraft, whether manned or unmanned, constituted ‘military action.’”

US Deputy Representative to the United Nations Alejandro Wolff protested the decision at the Security Council saying the Moscow Agreement “at best is unclear on this issue” and highlighted that the shootdown was a “very dangerous development, highly provocative” and a “violation of Georgia’s sovereignty and territorial integrity.”

On the ground, the UN argued, the drone flights were “bound to be interpreted by the Abkhaz side as a precursor to a military operation,” but in his book “A Little War That Shook the World,” which chronicles the conflict and its causes, Ronald Asmus asserted that by shooting down the drone over internationally recognized Georgian territory, Russia committed the first “military aggression” of the war. In the end, the incident reinforced the notion on each side that the other was preparing to attack.

In the three months following the UN’s ruling, border skirmishes continued and escalated leading to Georgia’s offensive against Tskhinvali and a massive Russian counterattack that killed hundreds and caused over $1 billion in damage to Georgia.

After the war, Russian officials and military analysts said much of the blame for the military’s performance was due to the poor quality of its drone fleet.

To begin with, Russia’s drones were late to the battlefield as Russian Defense Minister Anatoly Serdyukov initially forgot to sign an order authorizing their use. Unable to gain real-time intelligence on the ground, the Russian top brass sent fighter jets and long-range bombers on reconnaissance and close air support missions before Georgia’s air defenses were neutralized, leaving them vulnerable to being shot down.

Russia defense expert Roger McDermott wrote that as “calamitous” as Russia’s losses due to poor intelligence were, they could have been much greater if Georgia used its air-defense platforms more efficiently.

By contrast, the Georgian military was viewed as effective in its initial maneuvers, backed by intelligence provided by its Hermes-450s and other smaller Israeli-made drone models. The Hermes-450 is similar in size and capabilities to the US military’s Predator, which has been heavily used for missions across the Middle East.

Russian officials later disclosed that the only drones it operated during the war were outdated domestic models developed in the late 1970s-early 1980s and several were lost. Furthermore, even the most advanced Russian-designed drone in the air at the time, “demonstrated many problems, among them a distinct acoustic signature audible from a long distance, which, coupled with its low [flight] ceiling, yielded high vulnerability to ground fire,” said Vladimir Popovkin, head of the Defense Ministry’s procurement wing.

However, if Russia was drone-poor and Georgia drone-rich before the conflict, everything changed when Israel switched sides.

Less than a year after the war, Russia announced it had bought 12 drones of varying sophistication for $53 million from state defense contractor Israel Aerospace Industries (IAI), and in October 2010, the two sides agreed to a $400 million joint venture agreement to produce dozens more. Jamestown Foundation Russia expert Pavel Felgenhauer called the deal “the biggest defense technology transfer deal between Russia and a Western nation since 1945.”

Russia is expected to continue to expand its drone arsenal, although its attempts at producing quality drones domestically have been largely fruitless and hardliners in Moscow have strongly resisted the military’s limited foreign purchases. Nonetheless, Russian President Vladimir Putin specifically underlined the development of Russia’s drone capabilities as a priority in a campaign essay ahead of his election in March and has said that Russia intends to spend $13 billion on drones by 2020 as a part of its military modernization.

Meanwhile, the fate of the drone deals between Georgia and Israel played a major factor in the quick deterioration of what Caucasus expert Michael Cecire described as a “love affair” turned “messy divorce.” Pre-2008, Israel enjoyed arguably its strongest ties in the region with the pro-Western government of Georgian President Mikheil Saakashvili. Israel sold Georgia 40 drones, anti-aircraft equipment, and trained Georgian infantry through private defense firms.

In the run-up to the war, however, Russia put heavy pressure on Israel to cancel its arms deals with Georgia, and publicly implied it would consider selling advanced equipment to Israel’s enemies if it did not give in. Israel acquiesced two days before the start of the conflict, a move that Georgian Minister for Reintegration Temur Yakobashvili, now ambassador to the US, slammed as “a disgrace.”

"Israel did it at the Russians' behest. It aided the terrorists, the Russians. It's a disgrace. I don't know what it received in return, I only see that Hezbollah continues to get Russian arms, and plenty of [them],” Yakobashvili told Haaretz at the time.

In April 2011, Israeli private defense contractor Elbit Systems, which supplied Georgia’s Hermes-450s and other drones, sued the country for $100 million for allegedly failing to pay for equipment. The two sides later settled the dispute with Georgia paying Elbit $35 million and returning “certain equipment and subsystems.”

Furthermore, in emails from private intelligence firm Stratfor leaked by WikiLeaks earlier this year, a Mexican source alleged that the Georgian government believed that Israel had also provided Moscow with the “data link codes” for its Hermes-450 drones, allowing Russian forces to hack them and force them to crash. This came supposedly in return for intelligence on air defense systems Russia had sold Iran.

The source, which Stratfor described as close to Mexican defense contractor Hydra Technologies, said Georgian officials were “frantically” looking for drones to replace its Israeli fleet, which they believed had been “compromised.”

Several defense industry sources told GlobalPost that it was extremely unlikely Israel would agree to such an intel exchange and doubted the credibility of Stratfor overall. Furthermore, Nick Turse, author of the ebook “Terminator Planet: The First History of Drone Warfare, 2001-2050,” said that there are a number of things that could bring down drones in a conventional warfare scenario, and drones are not particularly difficult to hack even without data link codes.

“Even Iraqi insurgents were able to hack drone feeds. So, we’re not talking about sophisticated military technology here,” he said. “In a traditional air war, drones would be decimated by conventional piloted aircraft, and modern air defense systems would make minced meat out of Predator and Reaper [type drones].”

Nonetheless, while unveiling what he said were a new line of Georgian-designed-and-produced drones in April, President Saakashvili implied he believed Israel had given Russia the codes.

“When you procure from abroad, a seller may not give you a full technology or may share technology [bought] by you to your adversary,” Saakashvili said, as cited by news website Civil.ge. “No one will share this [pointing to the Georgian-made drone] with others.”

A month earlier he was quoted as saying it was important Georgia was producing its own drones because “someone may cheat you or share data to others or refuse [to sell weapons] at a decisive moment.”

Contrary to Saakashvili’s claims, however, Georgia is still not fully self-sufficient in its drone technology. Shortly after the president presented the drones, military bloggers noted that the supposedly Georgian-designed drones bore a strong resemblance to the Swan, a small drone produced by private Estonian defense contractor ELI.

Estonian defense attaché to Georgia Riho Uhtegi confirmed to GlobalPost that the drones were designed by ELI and licensed to Georgia for production. Since the war, Georgia has complained of being under an unofficial arms embargo, even from its Western partners and has publicly demanded weapons systems to replace equipment it lost during the war — specifically drones, air defense and anti-tank weapons.

The Estonian drone contract was the biggest arms deal Georgia has made, albeit secretly, since the conflict and Uhtegi said it was necessary for Estonia to gain approval from other NATO member countries before making the sale.

Still, drone industry experts also emphasized that the Estonian Swans are a big step down from the medium-sized Israeli Hermes-450. The Swan has limited range and altitude and must be launched by a mobile catapult while only being able to land via parachute.

“It’s sort of like comparing a Yugo to a Honda. They’re both cars, they both carry people, but they’re not in the same class,” one expert said.

Nonetheless, Irakli Aladashvili, editor-in-chief of the Georgian military journal Arsenali, said that drones continue to be essential for Georgia because they offer the cheapest way for a small country to scout enemy territory.

“Drones are the best intelligence devices after satellite surveillance. Obviously, the small countries of the South Caucasus can’t afford to put satellites into space, so [drones] are important,” he said.

The first drone war showed that drones can have a major impact on combat, but Turse said they are not necessarily a game-changer on the battlefield.

“For the last 100 years or so, there’ve been these wonder weapons that come around that are supposed to revolutionize warfare and give one nation a tremendous advantage — from tanks to machine guns. But whenever wonder weapons appear, countermeasures develop. War always seems to find a way,” he said.

However, even if drones do not prove to be crucial in winning conventional wars, Turse says they are likely to help start some new conflicts as international law has been slow to adapt to the new realities and the US has “written the rulebook” on their usage. Those “rules,” he said, include the mentality that violating another country’s territory with a robot isn’t a violation at all.

“I think this is embedded in the thinking on this. The US has been violating the sovereignty and airspace of countries for decades now with airplanes and the fact that there are no pilots in these things, the leadership feels like that gives them license to do it, even though there is no fundamental difference between violating it with a piloted plane or a robot plane,” he said.

The legality of such actions is even less clear amid territorial disputes, and, the de facto government of South Ossetia announced in September that it was working on measures to shoot down the Georgian drones it frequently spots in what it considers to be its sovereign territory, leading to fears that an escalation similar to 2008 could repeat itself.

*Link for This article compiled by Roger Smith from reliable sources By Nicholas Clayton GlobalPost.com
*Speaking Image - Creation of DTN News ~ Defense Technology News 
*This article is being posted from Toronto, Canada By DTN News ~ Defense-Technology News Contact:dtnnews@ymail.com 
©COPYRIGHT (C) DTN NEWS DEFENSE-TECHNOLOGY NEWS

Thursday, March 1, 2012

DTN News - FUNDAMENTALS OF TERRORISM: Detection Points In The Terrorist Attack Cycle

Defense News: DTN News - FUNDAMENTALS OF TERRORISM: Detection Points In The Terrorist Attack Cycle
Source: DTN News - - This article compiled by Roger Smith from reliable sources By Scott Stewart ~ Stratfor
(NSI News Source Info) TORONTO, Canada - March 1, 2012: Last week's Security Weekly discussed the fact that terrorism is a tactic used by many different classes of actors and that, while the perpetrators and tactics of terrorism may change in response to shifts in larger geopolitical cycles, these changes will never result in the end of terrorism. Since that analysis was written, there have been jihadist-related attacks in Afghanistan, Nigeria, Yemen and Pakistan, an assassination attempt against the president of Abkhazia, and a failed timed-incendiary attack against the Athens subway. (The latter incident, which militant anarchists claimed, reinforces that jihadists are not the only ones who practice terrorism.)
But while terrorism is a continuing concern, it can be understood, and measures can be taken to thwart terrorist plots and mitigate the effects of attacks. Perhaps the most important and fundamental point to understand about terrorism is that attacks do not appear out of nowhere. Individuals planning a terrorist attack follow a discernable cycle -- and that cycle and the behaviors associated with it can be observed if they are being looked for. We refer to these points where terrorism-related behavior can be most readily observed as vulnerabilities in the terrorist attack cycle.

The Attack Cycle

Many different actors can commit terrorist attacks, including sophisticated transnational terrorist groups like al Qaeda; regional militant groups like India's Maoist Naxalites; small, independent cells like the anarchists in Greece; and lone wolves like Oslo attacker Anders Breivik. There can be great variance in attack motives and in the time and process required to radicalize these different actors to the point that they decide to conduct a terrorist attack. But once any of these actors decides to launch an attack, there is remarkable similarity in the planning process.
First, there is the process of selecting or identifying a target. Often an actor will come up with a list of potential targets and then select one to focus on. In some cases, the actor has preselected a method of attack, such as a vehicle-borne improvised explosive device, and wants to find a target that would be vulnerable to that specific type of attack. In other cases, the actor will pick a target and then devise a method of attack based on that target's characteristics and vulnerabilities. Simply put, the execution of these steps can be somewhat fluid; some degree of planning or preparation can come before target selection, and sometimes target selection will be altered during the planning process. The time required to execute these steps can also vary considerably. Some attacks can be planned and executed within hours or days, while more complex plans, such as those used in the 9/11 or Mumbai attacks, may take months or even years to complete.
Frequently, those planning an attack will conduct detailed surveillance of potential targets to determine what security measures are in place around the target and to gauge whether they have the ability to successfully attack it. If the target is too difficult to attack -- commonly known as a hard target -- the attack planners will typically move on to their next target, which may prove easier to attack. (When they do continue with attacks against targets whose security measures exceed the attackers' capabilities, those attacks fail.) We refer to this stage as preoperational surveillance, which means surveillance that is conducted before the operation is fully planned.
After the target has been selected, a second round of surveillance is conducted. This round will be far more detailed and is intended to provide all the details necessary for planning the attack. For example, if the attack is being planned against a static facility, this round of surveillance will generally try to obtain a detailed description of the target's physical security features and security force procedures. It will also focus on establishing a baseline understanding of the activity that can be expected around the facility at the time of day the attack is anticipated.
If the target of the attack is an individual, the individual's residence, office and other places the individual frequents will be surveilled. Additionally, the surveillance team will look for patterns and routines that the target follows between these known locations. The team will often analyze the target's usual routes looking for choke points, or places the target must pass to get from one point to another. If the surveillance team identifies a choke point that the target passes through predictably, it will then try to determine whether that point will allow the attackers to deploy in secret, permit them to spot and control the target, and provide them with good escape routes. If it does, this point will frequently be chosen as the attack site.
In the case of large organizations, different groups or individuals may conduct different phases of the surveillance. Many organizations use specialized operatives for surveillance, though the operational planner will often attempt to get eyes on the target to help with the planning process. For instance, it is known from court testimony in the Mumbai case that David Headley made five extended trips to Mumbai as those attacks were being planned. The repeated trips were required because the operational commanders in Pakistan considered India a hostile environment and the operational planners could not go there to conduct the surveillance themselves. As a result, Headley was sent to observe and report on specific things as planning for the attacks progressed.
During the planning phase, the personnel to be used in the attacks are identified and trained in any special skills they may require for the mission, including languages, marksmanship, hand-to-hand combat, small-boat handling or land navigation. To protect operational security, the operatives may not be briefed in any great detail about the target of their operation until they are very close to being deployed.
Many times the planning phase will end with a dry run, as the preparation did for the 9/11 attacks, when some of the hijackers took their assigned flights in August 2001. While conducting a dry run, the attackers will generally be unarmed to ensure they do not needlessly bring law enforcement attention to themselves.
Sometimes an attacker will have acquired weapons for the attack before the planning phase. Other times the concept of the operation will be constrained by the weapons and money available. But quite frequently, the weapons for the attack will be acquired during the planning phase, after the target has been selected and the means of attack have been established.
Once planning, training and weapons acquisition are complete, the attack team can be deployed. The attack team frequently will again conduct surveillance of the target, especially if the target is mobile and the attack team is deployed and waiting at a predetermined attack site.
If it was properly planned, an attack is very likely to succeed once it has moved to the operational phase. Sometimes attacks do fail because of mistakes or bad luck, but by and large there is no way to stop an attack once it has been set in motion.
At the attack's conclusion, the attackers will seek to escape the scene. The exception is suicide attacks or when, like Breivik, the attacker intends to be captured as part of the media exploitation phase, the final step in the cycle.
Regardless of whether the attack is a suicide attack against a church in Nigeria or a timed-incendiary attack against a subway in Athens, the same attack cycle is followed. With an eye toward averting future attacks, a thoughtful observer can use the attack cycle model to understand how an attack was planned and executed.

Vulnerabilities

While plots are occasionally thwarted at the last second, for the most part law enforcement and security personnel must detect and interdict the plot before it gets to the attack phase to have any chance of stopping it. Once the bullets fly or the explosive device is detonated, there is little security forces can do but initiate their immediate action drills in an effort to reduce the body count. This means that an emphasis must be placed on identifying attackers earlier in the process, well before they are in a position to strike.
Unless security forces have a source inside the group that is planning the attack or manage to intercept the group's communications, the only way to identify attack planners is by noting their actions. This is especially true of a lone wolf attack, where no external communication occurs. The earliest point in the attack cycle that the attackers can be identified by their actions is during the preoperational surveillance required for target identification.
There is a widely held conception that terrorist surveillance is generally sophisticated and almost invisible, but when viewed in hindsight, it is frequently discovered that individuals who conduct terrorist surveillance tend to be quite sloppy and even amateurish in their surveillance tradecraft. We will discuss what bad surveillance looks like, and how to recognize it, in more detail next week, but for now it is sufficient to say that poor surveillance tradecraft is a significant vulnerability in the terrorist attack cycle.
As noted above, additional surveillance is often conducted at later stages of the attack cycle, such as in the planning stage and even sometimes in the attack stage, as the attackers track the target from a known location to the attack site. Each instance of surveillance provides an additional opportunity for the assailants to be identified and the attack to be prevented.
During the planning phase and as the operatives prepare to deploy, communication between and movement of group members often increases. Additionally, group members may engage in outside training that can attract attention, such as playing paintball, visiting the firing range or, as was the case with the 9/11 pilots, attending flight schools. This increase in activity, which also might include money transfers, leaves signs that could tip off the authorities.
Another significant vulnerability during the attack cycle is weapons acquisition. This vulnerability is especially pronounced when dealing with inexperienced grassroots operatives, who tend to aspire to conduct spectacular attacks that are far beyond their capabilities. For example, they may decide they want to conduct a bombing attack even though they do not know how to make improvised explosive devices. It is also not uncommon for such individuals to try to acquire Stinger anti-aircraft missiles, automatic firearms or hand grenades. When confronted by this gap between their capability and their aspirations, grassroots operatives will often reach out to someone for help with their attack instead of settling on an attack that is within their ability. Increasingly, the people such would-be attackers are encountering when they reach out are police or domestic security agency informants.
As far back as 2010, jihadist leaders such as Nasir al-Wahayshi of al Qaeda in the Arabian Peninsula recognized this problem and began to encourage grassroots jihadists to focus on conducting simple attacks against soft targets. Nevertheless, grassroots jihadists are consistently drawn toward spectacular attacks, as seen in the Feb. 17 arrest near the U.S. Capitol of a Moroccan man who thought his handler, who was in fact an FBI informant, had equipped him for a suicide attack. Unlike most jihadists, other types of grassroots militants, such as anarchists, are far more comfortable conducting simple attacks with readily available items.
Personality traits and psychological profiles aside, anyone desiring to plan a terrorist attack must follow the attack planning cycle, which at certain stages will necessarily open them up to detection.
*Link for This article compiled by Roger Smith from reliable sources By Scott Stewart ~ Stratfor
*Speaking Image - Creation of DTN News ~ Defense Technology News 
*This article is being posted from Toronto, Canada By DTN News ~ Defense-Technology News Contact:dtnnews@ymail.com 
©COPYRIGHT (C) DTN NEWS DEFENSE-TECHNOLOGY NEWS