Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged CNAS

Rss Feed Group items tagged

Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

US intervention in Syria? Not under Trump | Middle East Eye - 0 views

  • A new coalition of US-based organisations is pushing for a more aggressive US intervention against the Assad regime. But both the war in Syria and politics in the United States have shifted dramatically against this objective.When it was formed last July, the coalition hoped that a Hillary Clinton administration would pick up its proposals for a more forward stance in support of the anti-Assad armed groups. But with Donald Trump in office instead, the supporters of a US war in Syria now have little or no chance of selling the idea.One of the ways the group is adjusting to the new political reality is to package its proposal for deeper US military engagement on behalf of US-supported armed groups as part of a plan to counter al-Qaeda, now calling itself Jabhat Fateh al Sham.But that rationale depends on a highly distorted presentation of the problematic relations between those supposedly “moderate” groups and al-Qaeda’s Syrian offshoot.
  •  
    It looks like the U.S. is actually moving to support Syria's Assad rather than remove him. In the last two weeks, news from Syria has been filled with reports of ever-mounting ISIL and Al-Nusrah casualties inflicted by the U.S., and by Syria's coalition with Russia, Iran, and Hezbollah. The body count is horrendous. A meeting to hammer out a peace agreement is about to begin and the U.S. declined to participate, signaling its future non-involvement with Syria. In this important article, Gareth Porter lays out the reasons that the strategy developed for Hillary to preserve ISIL and al-Qaeda with no-bombing zones is unlikely to fly with the Trump Administration. See also http://www.middleeasteye.net/columns/last-chance-saloon-syrias-rebels-1757006265 (Saudi and Turkish support for mercenaries fighting in Syria is drying up).
Paul Merrell

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
Paul Merrell

U.S. military officers have deep doubts about impact, wisdom of a U.S. strike on Syria ... - 0 views

  • The Obama administration’s plan to launch a military strike against Syria is being received with serious reservations by many in the U.S. military, which is coping with the scars of two lengthy wars and a rapidly contracting budget, according to current and former officers. Having assumed for months that the United States was unlikely to intervene militarily in Syria, the Defense Department has been thrust onto a war footing that has made many in the armed services uneasy, according to interviews with more than a dozen military officers ranging from captains to a four-star general.
  • The Obama administration’s plan to launch a military strike against Syria is being received with serious reservations by many in the U.S. military, which is coping with the scars of two lengthy wars and a rapidly contracting budget, according to current and former officers. Having assumed for months that the United States was unlikely to intervene militarily in Syria, the Defense Department has been thrust onto a war footing that has made many in the armed services uneasy, according to interviews with more than a dozen military officers ranging from captains to a four-star general.
  • Former and current officers, many with the painful lessons of Iraq and Afghanistan on their minds, said the main reservations concern the potential unintended consequences of launching cruise missiles against Syria.Some questioned the use of military force as a punitive measure and suggested that the White House lacks a coherent strategy. If the administration is ambivalent about the wisdom of defeating or crippling the Syrian leader, possibly setting the stage for Damascus to fall to fundamentalist rebels, they said, the military objective of strikes on Assad’s military targets is at best ambiguous. “There’s a broad naivete in the political class about America’s obligations in foreign policy issues, and scary simplicity about the effects that employing American military power can achieve,” said retired Lt. Gen. Gregory S. Newbold, who served as director of operations for the Joint Chiefs of Staff during the run-up to the Iraq war, noting that many of his contemporaries are alarmed by the plan.
Paul Merrell

Does Our Military Know Something We Don't About Global Warming? - Forbes - 0 views

  • Every branch of the United States Military is worried about climate change. They have been since well before it became controversial. In the wake of an historic climate change agreement between President Obama and President Xi Jinping in China this week (Brookings), the military’s perspective is significant in how it views climate effects on emerging military conflicts.
  • At a time when Presidents Ronald Reagan and Bush 41, and even British Prime Minister Margaret Thatcher, called for binding international protocols to control greenhouse gas emissions, the U.S. Military was seriously studying global warming in order to determine what actions they could take to prepare for the change in threats that our military will face in the future. The Center for Naval Analysis has had its Military Advisory Board examining the national security implications of climate change for many years. Lead by Army General Paul Kern, the Military Advisory Board is a group of 16 retired flag-level officers from all branches of the Service. This is not a group normally considered to be liberal activists and fear-mongers.
  • This year, the Military Advisory Board came out with a new report, called National Security and the Accelerating Risks of Climate Change, that is a serious discussion about what the military sees as the threats and the actions to be taken to mitigate them. “The potential security ramifications of global climate change should be serving as catalysts for cooperation and change. Instead, climate change impacts are already accelerating instability in vulnerable areas of the world and are serving as catalysts for conflict.”
  • ...3 more annotations...
  • Bill Pennell, former Director of the Atmospheric Sciences and Global Change Division at Pacific Northwest National Laboratory, summed up the threat in recent discussions about climate and national security: “The environmental consequences of climate change are a significant threat multiplier, which by itself, can be a cause for future conflicts. Global warming will affect military operations as well as its theaters of operations. And it poses significant risks and costs to military and civilian infrastructure, especially those facilities located on the coastline.” “The countries and regions posing the greatest security threats to the United States are among those most susceptible to the adverse and destabilizing effects of climate change. Many of these countries are already unstable and have little economic or social capital for coping with additional disruptions.” “Whether in Africa, the Middle East, South Asia, or North Korea, we are already seeing how extreme weather events – such as droughts and flooding and the food shortages and population dislocations that accompany them – can destabilize governments and lead to conflict. For example, one trigger of the chaos in Syria has been the multi-year drought the country has experienced since 2006 and the Assad Regime’s ineptitude in dealing with it.”
  • So why is the country as a whole, and those who normally support our military, so loathe to prepare for possible threats from this direction? In 1990, Eugene Skolnikoff summarized the national policy issues surrounding global warming and why it has been so difficult to rationally develop policy to address it. “The central problem is that outside the security sector, policy processes confronting issues with substantial uncertainty do not normally yield policy that has high economic or political costs. This is especially true when the uncertainty extends not only to the issues themselves, but also to the measures to avert them or deal with their consequences.” “The climate change issue illustrates – in fact exaggerates – all the elements of this central problem. Indeed, no major action is likely to be taken until those uncertainties are substantially reduced, and probably not before evidence of warming and its effects are actually visible. Unfortunately, any increase in temperature will be irreversible by the time the danger becomes obvious enough to permit political action.” And this was in 1990!
  • As Arctic ice diminishes, the region will see new shipping routes, new energy zones, new fisheries, new tourism and new sources of conflict not covered by existing maritime treaties. Since the United States is not party to the United Nations Convention on the Law of the Sea (UNCLOS) treaty, we will not have maximum operating flexibility in the Arctic. Even seemingly small administrative issues may become important in the new era, e.g., the Unified Command Plan presently splits Arctic responsibility between two Combatant Commands: U.S. Northern Command (NORTHCOM) and U.S. European Command (EUCOM). This type of things needs to be resolved with the coming global changes in mind. Source: Center for Naval Analysis
1 - 5 of 5
Showing 20 items per page