Tag Archive for: Quadrennial Defense Review

Congress and the US Defense budget

Defense Secretary Chuck Hagel greets U.S. Rep. Rodney Frelinghuysen of New Jersey, chairman of the House Appropriations Committee's defense subcommittee, before testifying on the Defense Department's fiscal year 2015 budget request before the subcommittee in Washington, D.C., March 13, 2014. DOD photo by Erin A. Kirk-Cuomo

As Peter Jennings observed in a recent post, the Quadrennial Defense Review makes for sobering reading for Americans and allies alike. With its troop and cost reductions and emphasis on modernisation yet discussion of heightened risk, this QDR says as much about the fiscal environment as it does about the strategic environment.

More sobering still have been the House and Senate committee hearings on the accompanying Pentagon budget request. At these hearings Defense Secretary Chuck Hagel, Chairman of the Joint Chiefs of Staff General Martin Dempsey, PACOM Commander Admiral Samuel Locklear and other senior officials have stressed in stark terms the damage to force readiness and national security if Congress doesn’t prevent renewed sequestration. While Defense has been spared its full effects in 2014 and 2015 by a rare bipartisan budget agreement (which revised the Budget Control Act), sequestration resumes in 2016 and beyond, unless Congress repeals or softens it. Read more

Cyber wrap

Russia has tightened its physical grip on Crimea this week, though  offensive operations have largely been taking place online. Apart from the anticipated DDoS attacks, analysts from security firm BAE have disclosed the nature of an active and potent cyber espionage tool kit dubbed ‘Snake’ that has infiltrated Ukrainian government computer systems. The malware gives full remote access to compromised systems, allowing the attacker to siphon data and manipulate networks. G Data has a post exploring its technical aspects. For an analysis of Russia’s political intentions behind the cyberattacks (assuming the Russian government is the source), see these articles in the New York Times and Washington Post . Cybersecurity expert Jeffrey Carr has said that current operations may be only the tip of the iceberg, as ‘Russia has the ability to completely shut down Ukraine’s infrastructure’. If so, is the relative quiet a result of precise and sophisticated Russian cyberinstruments, or restraint in using them?

Increasingly effective cyber espionage operations like those used against Ukraine raise questions about the use of cyber capabilities during conflict. How do governments define cyber attacks and cyber war? One commentator suggests that there will be a ‘declaration of an act of cyber war before there is agreement on what it is’. Ben Schreer and Tobias Feakin  argue here on The Strategist that ‘cyber war’ should be understood in the traditional sense of what constitutes war: ‘the use or threat of the use of force to deter or compel an adversary’. And Bruce Schneier argues that any offensive computer networked operation—including espionage—is a cyber attack, and should be ‘subject to the same international law standards that govern acts of war in the offline world’. Read more