Index

Figures are indicated in italics. Operation Enduring Freedom 278 overthrow of Taliban government 3-D (2001) 84, 262 “3-D ink” writing methods xiv and satellite bandwidth 132 soldiers’ 3-D glasses 63 soil mechanics 1 ultrasound scans of unborn child 62–63 Soviet withdrawal from 270, 274 9/11 Commission 219, 221 Stinger missiles 169 unmanned aerial vehicles deployed AAE 33 in 195 AASM 85 US forces’ consumption of fuel 44 Aaviksoo, Jaak 174 Afghanistan, Emir of 91 Abbottabad, Pakistan 80 Agent 99 software 225 “Abuthaabit” (Waseem Mughal) 199, 200, Ahmed, Syed 201 201 air: the third domain of warfare 1, 181 accelerometer xiv Air Force Research Institute 113 Access 209 Air Force Research Laboratory 224 Achtelik, Michael 42 air-freight inspection 241–42 acoustic cloak 54, 55 Air Ministry (British) 106 “active control” 122 air policing 273 active-protection systems 28 air power Adams, Colonel John 7, 9, 80 air supremacy provides no assurance of adaptive camoufl age 32–33 victory 82, 90–95 add-on guidance systems 85 displayed over Baghlan 96 Advanced Tactical (ATL) 18 disruption of an enemy’s fi ghting ADVISE pattern-detection programme 262 system xi Aegis intercept missiles 15 from aircraft carriers 106 Aerodyne Research 34 “synthetic aperture” radar systems xi Aerostar International 116 Air Tractor 113 aerostats see blimps airbags 120 Afghan air force 80 Airborne Laser (ABL) 17–18 Afghanistan Airborne Laser Programme Offi ce, Kirtland adaptive camoufl age tested 32 Air Force Base, New Mexico 18 blimps in 116 Airbus 62, 123 cluster bombs in 82, 88 A350 123 coalition fatalitiesCOPYRIGHTED 275 aircraft MATERIAL drones in 97, 98, 104, 110, 115 AT-6 light-attack plane 113 energy consumption 45, 47 AT-802U warplane 113 fatal insurgent attacks against American “blended wing” 46 forces 186, 187 C-130 Hercules military-transport 170 International Security Assistance Force cargo 124 9, 278 formation fl ying 123–24 Katyusha rockets 17 low-tech propeller planes preferable for national government 280 attacking ground forces 79 need for “strategic patience” 279 maintenance of propeller warplanes 80

bbindex.inddindex.indd 281281 330/11/110/11/11 33:43:43 PPMM 282 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

passenger 124 Iran’s large numbers of 13 turboprops 112–14 RBS-15 11 see also bombers; drones; fi ghter planes and sea mines xvi aircraft carriers Sizzler xii-xiii, 11, 12–13 air power from 106 Yakhont 12 nuclear-powered 15 “anti-social” behaviour 250 threatened by sea mines xvi anti-tank missiles 24, 27 US reluctance to build due to threat Appa, Jamil 62 from anti-ship missiles xiii Apple AK-47 assault rifl e 31, 203, 280 gadgets 4 Akademik Lomonosov power station 72 iPhones 58, 61, 101 Akram, Munir 170 iPods 58, 59, 61 ALADDIN (Autonomous Learning Agents Aptima 213–14 for Decentralised Data and Information Arab-Israeli war (1973) 108 Networks) research project 194–96 Ardennes, Battle of the (1914) 189 Alan Brooke, General (later 1st Viscount Areva 71 Alanbrooke) 92 Arkansas Highway and Transportation Albright, Madeleine 162 Department 199 albumin 57 Arkin, Dr Ronald 197–98 Alcatel Alenia Space (now Thales Alenia) Armed Forces Journal 176 147 Armour Holdings 30 Aldebaran launcher 141 armoured personnel-carriers (APCs) 50–51 Alexander, General Keith 155–56, 160–63, M113 51 183 armoured vehicles Alexander, Robert 192 Bradley 25 Algeria 12, 274 clad in bricks of plastic explosives 2, 35 al-Ali, Hamid 203 Stryker 25 American Association for the arms-control agreements 108, 131 Advancement of Science 76 Army Criminal Investigation Command American Civil Liberties Union 225–26, 266 261, 262 Army Research Laboratory (US) 31–32, 223 American civil war (1861–5) x, 173 Army Research Offi ce 170 American Enterprise Institute 131 Arnold, General Henry “Hap” 107 American Missile Defence Agency 17 Arquilla, John x American Nuclear Society 74 Arrow missile-defence programme 139, American war of independence (1775–83) 142 274 Artis 24, 28 AMI Adaptive Materials 100 Ascending Technologies 42 amoebas 48, 49 Asher, Frank 251 amphibious vehicles, fuel consumption Asian Development Bank 178 46 Aspelund, Curt 51 Anderson, Chris 246 assassinations 197, 229–33 Anderson, Richard 191 Association for Unmanned Vehicle Anderson, Professor Ross 228, 257 Systems International (AUVSI) Angola civil war 275 conference (La Spezia, Italy, 2009) 100, Annett, Martin 120 101 ANT Scientifi c 247 Association of Lonely War Women xvi antennae, home-made directional 208 astronomy 68 Antenori, Frank 79 asymmetric confl icts 192 AnthroTronix 36 asymmetric element of anti-ship Anti-Ballistic Missile Treaty 133 technologies 12 anti-satellite (ASAT) tests 130, 131, 133, 134 asymmetric weaponry xii anti-satellite weapons 125–27 AT-6 light-attack plane 113 anti-ship missiles xii-xiii, xvi, 11–13 AT-802U warplane 113 BrahMos 12, 15 attrition warfare xi, xii the Club 11 Australia Club-K Container Missile System 13 Department of Defence: JICM (Joint Dong-Feng 21 ballistic missile xiii Integrated Contingency Model) 190 11 submarines 14 11 Automated Targeting System 252

bbindex.inddindex.indd 282282 330/11/110/11/11 3:433:43 PMPM Index 283

autopsy system, virtual 62 blimps, militarised 79, 81, 115–16 al-Awlaki, Anwar 231 blood detection 56, 57 Axis powers 106 Bloody Sunday (Northern Ireland, 1972) 276 Baathists 278 BMT Defence Services 26 Babcock & Wilcox 73 body armour 29–30 “back doors” (computing) 161, 169, 180 Boeing “Badr17” 205 Advanced Tactical Laser (ATL) 18, 19 BAE Systems 7, 29, 30, 51, 61–62 and Airborne Laser 17 Advanced Technology Centre, Bristol an American defence giant ix 29 Insitu 101 and ALADDIN 194, 196 and ITAR 148 Taranis 103 Laser Avenger 8 Baghdad xi, 8, 279 LJDAM system 85 bomb explosion (October 25th 2009) Phantom Eye drone 103 xvi, 8 and TNDM software 190 separation walls 277 Boeing 747 aircraft 58 Baghlan, Afghanistan 96 Boeing 787 aircraft 123 Bagram airfi eld, Afghanistan 44 bomb-detection devices, scam xvi Baker, Alan 64 bombers Baker, James 7 B-52 86 Balkans, Predators deployed in 109 Handley Page biplane 91 bandwidth bombs American forces and 128, 135 bunker-smashing 80, 85–86 and Global Hawk 132 CBU-105 86–87 Barker-Wyatt, Charlie 247 cluster 82, 87, 88–89 Barnett, Thomas 176, 270 computerised 154 Great Powers: America and the World fl ying 105, 106, 107, 244 After Bush 270 laser-guided 195 Barracuda cavitating torpedo 14 logic 152, 155, 161 Basque terrorists: connivance with FARC MPR-500 precision bomb xv, 85 guerrillas 3 Perseus 84 Battlefi eld Augmented Reality System xiv “smart” 129 Battlefi eld Extraction-Assist Robot (BEAR) souped-up with rockets 86 36–37 Yemeni cargo 239, 240 BBC “Panorama” programme 254 Booen, Mike 17 Beavin, Michael 146, 148–49 Boot, Max 279 BEC Industries 22 War Made New 279 Béhar, Christophe 74 Borg, Scott 168 behaviour-recognition systems 223 Borgatti, Stephen 212, 265 Bejtlich, Richard 176 Bosnia 280 Belarus, and drones 97 arrest of cyber-jihadist (2005) 200 Ben-David, Yahel 209 “Bosnia Casualty Estimate Study” 188–89 Bensussan, Philippe 13 botnets 159, 162, 176, 179 Beqaa Valley, eastern Lebanon ix Bradley fi ghting vehicles 25 Bharti Airtel 264, 265 BrahMos missile 12, 15 Biden, Joe 266 Braitinger, Manfred 191 Bidlack, Hal xvi BRAWLER system 190 Bigelow, Robert 145 Brazil, turboprops in 113 Bigelow Aerospace 145, 149 Brendley, Keith 24 bin Laden, Osama 80, 206, 211, 231 Brisbane Airport 242 biodiesel 45 Britain biofuel 40, 46 cyber-security policy outfi t 156 biogas power 74 DNA databases 253 biological weaponry 2 and drones 97 biomass 40, 41, 46 in Malaya 276, 277–78 Black Hawk attack helicopter 81, 121, 137 operations centre based in GCHQ 156 Black September 230 and privacy 249 BlackBerry 101 slowly leaves Iraq 278 Blair, Dennis 231 “talking” surveillance cameras 249–50

bbindex.inddindex.indd 283283 330/11/110/11/11 3:433:43 PMPM 284 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

“warrantless” eavesdropping 255 Osama bin Laden Unit 219 British Aerospace 34 previously the OSS xvi Brunbech, J.G. 50 Centre for Strategic and Budgetary BT 173 Assessments (CSBA) 111, 116, 133, 135 Bulge, Battle of the (1944) 192 Centre for Strategic and International “bulging armour” 26 Studies (CSIS) 146, 147, 160 Bullet Flight app 61 Centre for the Development of Industrial bunker-busters 80, 85–86 Technology, Madrid 99 Burgoon, Dr Judee 225 ceramic armour 27 Burns, Bob 225 Cessna 81, 104, 112 Bush, George H.W. 188 CFMS laboratory, Bristol 62 Bush, George W. x, 203, 232, 254–55, 262 Chabinsky, Steven 159 Bush administration 258–59 Challenger 2 tanks 27 Bushehr nuclear plant, Iran 165, 167–68 chameleon sheeting 32 Button, Robert 21 Chao, Pierre 146, 147, 150 Chapman, Anna 217 C-130 Hercules military-transport planes Check Point 64–65 170 Chembot 48–49 CADPAT (Canadian camoufl age pattern) chemical weaponry 2 31 chemical-warfare laboratories 84 “cage” armour 26 Chen, Hsinchun 261 California: blaze of October 2007 243 Chernobyl nuclear disaster, Ukraine 70 Caltech (California Institute of Technology) Chiarelli, General Peter 280 123 Chile, turboprops in 113 Cambodia 114 China camelina plant 46 accused of wholesale espionage cameras 159–60 closed-circuit television (CCTV) 251, civilian space programme 126 253, 256 cyberspies 160 surveillance 171, 223, 249–50 Dong-Feng 21 (DF-21) anti-ship missile thermal-imaging 115 xiii, 15 camoufl age 31–33 and drones 97, 101 Camp Victory, Baghdad 45 emerging space power 126 Canada: dip in the number of American- foreign ministry 125 Canadian projects 147 French satellites attacked by ground- “car antenna” scam devices xvi, 8 based xv cargo-scanning 211–12 and Google 159–60, 228 Carley, Kathleen 268 progress as a space-faring nation 149 Carnegie Endowment 131 helium-cooled reactors 74 Carnegie Mellon University, Pittsburgh high-tech “residency” cards 249 268 information revolution 257 carpet-bombing xii, 176 Lightning Bug spy plane fl own over Carroll, Lewis: Through the Looking-Glass (1964) 108 186–87 and malware 178–80 Cartwright, General James 131–32 Mao Zedong’s “protracted war” 274 Casteau, Belgium 31 missile-defence system tested (2010) 137 Caton, Professor Jeffrey 142 satellite destruction 82–83, 125–27, 129, CBU-105 bombs 86–87 130, 134, 137, 139, 142 CCTV 251, 253, 256 and Sizzlers xii, 12 Cebu, Philippines (regional summit, 2007) submarines 14 125 and Taiwan 125, 126, 131, 271 Ceno Technologies 33 Chinese armed forces, and tactical cenospheres 33 intelligence xv Censorship Research Centre 228 Chu, Steven 72 Central Command 160 Church, Senator Frank 231 Central Intelligence Agency (CIA) 152, 169 Churchill, Winston 91, 114 “Darwin patrols” in Iraq 5, 6 Civil Aviation Authority 246 drone attacks 232 civil liberties 256, 257, 258, 262 In-Q-Tel 219, 261 CLARA metal-free explosive armour 25 Kansi shoots fi ve employees 218 Clark, General Wesley 171, 188

bbindex.inddindex.indd 284284 330/11/110/11/11 3:433:43 PMPM Index 285

Clarke, Peter 201 Constellation Energy 72 Clarke, Richard 156 consumer products: appropriated for Clausewitz, Carl von 269 military uses 58, 60, 61 clean technology 44–47 consumer-electronics industry 58–59, 61 Clinton, Bill 231 “contact” detonators 7 Clinton, Hillary 227 contact lenses, light-emitting diodes closed-circuit television cameras (CCTV) embedded in xiv, 38–39 251, 253, 256 control centres 130, 135–36 closed-loop system 40–41 Convention on Cluster Munitions 82, Club anti-ship missile see Sizzler 88–89 Club-K Container Missile System 13 cordon-and-search operations (Northern Cluster Munition Coalition 88 Ireland) 276 cluster munitions 82, 87, 88–89 Coriolis effect 61 clutter metrics 32 Corporate Risk International 219 CNES space agency 141 Corum, James 93 coal, and synthetic fuels 46 Cotabato City, Philippines 8 Cohen, Charles 223 Council of Europe Convention on COIL (chemical oxygen-iodine laser) Cybercrime 174 reactor 17 counter-insurgency 268, 275–79 Colascione, Daniel 228 counter-terrorism 204, 266, 270, 275 cold war x, 60, 128–31, 155, 231 “counterspace operations” 134 Colombia credit cards 216, 221, 255, 258 and drones 97 fraud 252 turboprops 113 credit-reporting fi rms 260 Colombian terrorists 7 crime prediction 266 Colorado Springs command centre 130, cropdusters 113 135–36 crowdsourcing data 196 combat fatigues Defence Systems Project camoufl age 31, 32 Offi ce for Directed Energy Applications tiger stripes 32 16 Combating Terrorism Centre, West Point cruise missiles 105, 107, 108 206 Cuban missile crisis (1962) 161 Combined Air Operations Centre 128 cubesats 80, 140, 141 Comer, Kenneth 10 Cukierman, Edouard 64 command chains, modifi cation of xv Cullom, Rear-Admiral Philip 46 commercial-freight scanning technology Cummer, Dr Steven 54, 55 241–42 current probe 52, 53 Commission on the Prevention of Cutmore, Nick 242 Weapons of Mass Destruction cyber-missiles 164 Proliferation and Terrorism 4 cyberarms-control 181–83 Commonwealth Scientifi c and Industrial cyber-attacks, classifying 173–75 Research Organisation (CSIRO) 241, Cybercom 163 242 cybercrime 174 compass xiv fi nancial statistics 157–58 Comprehensive Test-Ban Treaty 67 cyber-defence 175 computer bugs 155, 156 cybergangs 175 computer technologies, arms race in x cyber-hooliganism 174 computer worms 158 Cybernet Systems 223 Stuxnet 151 cyberspace: the fi fth domain of warfare computerised tomographic body-scanning 181 235 cyber-vandalism 174 computers cyberwar 83, 135, 155–84 growing dependence on 156 concealed “kill switches” 151, 152 Panasonic Toughbook 61 strongest defi nition of 174 police 233 Cyclone Power Technology 41 computing: the fi fth domain of warfare 1 concealment 31, 33, 34, 35 D-day (6 June 1944) 92 Concepts Evaluation Model (CEM) 192 Dalai Lama 178, 180 Concern Morinformsystem-Agat 13 Damascus: Israeli killing of Mughniyeh condensation trails (contrails) 34 (2008) 230

bbindex.inddindex.indd 285285 330/11/110/11/11 3:433:43 PMPM 286 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

Danish Army Material Command, crashing following data-connection Oksboel 50 loss 99 Dannatt, General Sir Richard 273, 279 disadvantages 101 al-Daour, Tariq 200–201 drone strikes 212–13, 232 DARPA see Defence Advanced Research drones-for-hire market 101 Projects Agency Eagle-1 98 Darul Islam movement 279 ECCHO software 101 “Darwin patrols” 5, 6 engines 99 Das, Premvir 15 ethical understanding 154, 197–98 Dassault Aviation 100, 141 Firebee 108 data mining 213, 251, 252, 255, 258–62, 263, foldaway 245 265 Global Hawk 99, 110, 115, 132 data-protection laws 256 global sales 97 Davis, Dr James 224 and the Gorgon Stare 195 Day, Greg 158 hard to shoot down 99 dead-letter drop 216–17 hovering 245 Deal, John 73, 75 “hunter-killer” x, 96–97 Debecka, Iraq incident (2003) 79 jet-powered 246 decals missile-launching 81 and adaptive camoufl age 32–33 Neuron jet-engine stealth drone 99–100 insulating 33–34 new displays 110–11 deception 31 Pelican helicopter 42–43 Defence Advanced Research Projects police use 245, 250 Agency (DARPA) 43, 48, 170 Predator 96, 104–5, 106, 107, 115, 244–45, defence contractors 61, 153 247 Defence Science Board 169–70 privacy issue 244, 248 defence spending Reaper x, 96, 110, 112 development of niche technologies 4 reconnaissance 61, 80, 101, 106, 108, fuelling innovation 4 110, 245 global 58 Red Wagon 108 Dell 146 regulation of 246, 247–48 democracy movements 209 RQ-2 Pioneer 80 deuterium 67–68, 242 RQ-170 Sentinel 81 Devaney, Earl 266 scout 98 DF-21 ballistic missile 15 small 97, 100, 103, 110, 243–46, 250 Dick, Philip K.: “The Minority Report” 225 Snark 107 “digital Pearl Harbour” 164, 173 solar-powered 110 “directed-energy weapon” see ray gun and spying 79, 81, 97–98, 100, 101, 211 Directorate of Defence Trade Controls Tornado 99 149 TV-guided 106 distributed denial-of-service (DDoS) and Xbox video-game controllers 58 attacks 159, 161, 172, 174, 183 Dubai: death of Mahmoud al-Mabhouh Djibouti 101 (2010) 229–30, 233 DNA databases 253–54 Duchesneau, Réjean 31 domain-name servers 157 Duhamel, Erwin 143 infected IP addresses 157 Duke University, North Carolina 54 domains of warfare 1 Dumas, Mark 268 Dominican Republic, turboprops in 113 Dupuy, Trevor 188, 189 Dong-Feng 21 anti-ship missile xiii Dupuy Institute 188–93 Dorchester Level 2 ceramic armour 27 Dutch counter-terrorism offi ce 204 DoSHTTP utility 172 Dynamit Nobel Defence 2, 25, 27, 28 Dragon Runner robot 8 drones 80–81, 96–111 e-mails assassinations 197 private 254 attack 104–11, 112 and procurement fraud 266 bat-winged 80–81 spam 158 co-operative control of 196 and terrorism 202 control systems made easier to use EADS 98, 147 100–101 EADS Sodern 147 costs 99–100, 245–46 Eagle-1 drone 98

bbindex.inddindex.indd 286286 330/11/110/11/11 3:433:43 PMPM Index 287

East Timor 279, 280 Fatah movement 230 EATR (Energetically Autonomous Tactical Federal Aviation Administration (FAA) 246, Robot) 4, 40–41 247, 248 ECCHO software 101 Federal Bureau of Investigation (FBI) 202, Echo (in Greek mythology) 53, 54 251, 262 École des Mines, France 74 data mining 258, 259 Economist, The x DNA databank 253 Ecuador, turboprops in 113 and the Patriot Act 254 EDF 71, 72 Ten Most Wanted list 218 Egypt Terrorist Financing Operations Section activists circumvent internet shutdowns 219 154, 208 Terrorist Screening Centre 261 government toppled (2011) 153 Fédération Aéronautique Internationale social networks 268 121 Ehrhard, Tom 135 fi bre-optic cables 157 Einstein, Albert 55 fi eld-emission displays 56 Ekman, Paul 224 fi ghter jets, limitations of 79, 96, 112 El Salvador 275, 279 fi ghter planes electric armour 26 F-16 fi ghter jets 96, 137 “electrical signature” of ground vehicles F-18 Hornet jet 46 98–99 F-35 fi ghter jet 99, 159, 160 electricity, rubbish converted to 45 Mirage 100 electromagnetic radiation: scrambling Rafale fi ghter jet 141 incoming missiles’ electronics 11 Filis, Bill 34 electronic barcodes 250 fi lms, electrically conductive 56 electronic data-gathering, ubiquity of 249 fi nancial-services industry 221 “electronic fratricide” 7 Finkelstein, Dr Robert 41 electronic warfare 79, 109, 214 Finland, and TNDM software 190 Embraer 114 Finmeccanica 99 EMP Commission xvii Firebee target drone 108 endoscopy 49 First Capital Technologies 221 Enerdyne Technologies 98 fi rst world war (1914–18), bloodbath of x, Enterra Solutions 176 xi-xii Erdberg, Dan 117, 118 fi rst-generation warfare 274 Estonia, cyber-attack on (2007) 161, 162, Fischer-Tropsch method 46 172–73, 174, 175, 179, 182, 183 Flamanville, France 71 ethane: in weather balloons 116, 117 fl exible autonomy 196 Ethical Architecture 154, 198 “fl y-by-wire” control 122 ethnic cleansing 94 FM 3–24 counter-insurgency manual European Defence Agency (EDA) 26, 28 269 European Space Agency (ESA) 143, 146, FOPEN (foliage penetration) radar system 147, 148 34–35 European Space Policy Institute xv Force Protection of South Carolina 9 European Union 146, 183, 259 Foreign Intelligence Surveillance Act (1978) Evergreen 247–48 255, 262 Exocet anti-ship missile 11 Forensic Institute, Glasgow 254 explosive sniffers 241 formation fl ying 123–24 “explosively formed projectiles” 9 Fort Irwin, California 45 export controls 145, 146, 147 forward operating base (FOB) 45, 47 eye-tracking devices 32 fossil fuel need for in warfare 44 Facebook 213, 216, 227, 233, 264, 266 pricing of 47 facial expressions 224 Fourth Amendment 252 “Fairey Queen” biplane 105 fourth-generation warfare 274 false identities 215, 216, 217, 233 France Famas assault rifl e 31 Aldebaran rocket 141–42 FARC guerrillas, connivance with Basque Atomic Energy Commission 74 terrorists 3 and drones 97, 98 Farnborough Air Show (2010) 103 satellites attacked by Chinese ground- FAST 259 based lasers xv

bbindex.inddindex.indd 287287 330/11/110/11/11 3:433:43 PMPM 288 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

Frankfurt: killing of a Soviet defector (1957) global warming 245 234 globalisation 148, 217, 270 fraud 213, 252, 266 GlobalSecurity.org 18 fraud-detection applications 261–62 GNR 222 Free Tibet group 179 Göge, Dennis 142 Freeman, Jared 213 Golan Heights: Syria aims to control French air force, and AASM 85 of Israeli-occupied parts ix , and AASM 85 Gold, Mike 149 Friedman, Herbert xvii Google 160, 228 Future Attributable Screening Technology Google Earth mapping software 101, 244 (FAST) 225 Gorbachev, Mikhail ix Gorgon Stare 195 Galileo (constellation of satellites) 146 Goure, Dan 50 game theory 195 GPS (global-positioning system) xiv, 85, Gangotra, Amrita 264 109, 128, 132, 135, 136, 146, 156, 198, 244, garage-door bomb triggers 6, 7 246 Garten, Eli 65 graphics chips 58 Gartner 265 Green movement 227 Gates, Bill 75 greenhouse gases 46 Gates, Robert xiii, 89, 116, 271, 280 GRID container-management system 22 Gatorade 53 Griffi n, Bob 211, 267 Gaza Strip: Trophy system foils RPG attack Griffi n, Michael 126 28 ground launchers: locating and destroying GCAM software 190 xiii GCHQ 156, 160 ground stations 135–36 GE 176 Guardian newspaper 227 Geers, Kenneth 210 guerrillas, main weapons of 277 General Atomics 112 gyroscopes xiv, 106, 107 genetic tags 250 Geneva Conventions 183 hackers 155, 158, 167, 179, 181–82, 199, 256 Genoa, Paul 71 Haiti earthquake (2010) 196 Georgia Halutz, Lieut-General Dan 90, 94 cyber-attack on (2008) 162, 172–75, 179, ham-radio operators 209 182, 183 Hama, Syria: massacre (1982) 274 and drones 97 Hamas 94, 179, 229, 230, 233 Russia invades (2008) 172, 271 Hammes, Thomas 274 Russia uses cluster munitions in 89 HARM missiles 191 Georgia Institute of Technology: School of Harpoon anti-ship missile 11 Interactive Computing 197 Harris, “Bomber” Arthur 90, 92 germ laboratories 84 Harvard law faculty 231 German, Mike 262 Harvard Law Record 231 German Aerospace Centre, Cologne 142 Harvard University 247 Germany Hawker Beechcraft 113 and drones 97 Haystack (anti-censorship software) Nazi Germany 274 227–28 Red Army Faction 275 Heap, Austin 227, 228 Stuxnet infects industrial plants 165 heat-insulating foam 34 Geva, Meir 86 heat-signatures 33, 34, 87 Ghorayeb, Amal 98 helicopters GhostNet 178 Black Hawk 81, 121, 137 Gigabit Ethernet 59 cost of operation 243 Gilbert, Gary 36, 37 dirt landings 113 Gilleland, John 75 MD-500 119 Glasgow airport: car bombs (2007) 201, protected by honeycomb cushion 204 119–20 Global Hawk drone 99, 110, 115, 132 speed 121–22 Global Initiative to Combat Nuclear X2 121–22 Terrorism 70 helium Global Telesat Corporation 117 in blimps 115, 116 Global Times 138 in weather balloons 117, 118

bbindex.inddindex.indd 288288 330/11/110/11/11 3:433:43 PMPM Index 289

Hellfi re missile 26, 104, 105, 110, 197 garage-door triggers 6, 7 Henry L. Stimson Centre 131 “hoax” wiring 6 High Energy Laser Technology mobile-phone signals 7 Demonstrator 17 and predictive-analysis software 10 High Mobility Multipurpose Wheeled responsible for two-thirds of coalition Vehicle (Humvee) 41, 44, 202 deaths 6 Hindenburg airship 115–16 shockwaves from 27 hitmen 233–34 squirting water into circuitry 8–9 Hizbullah xvii, 94 technological leap-frogging 10 damages an Israeli corvette (2006) 12 zapping with a laser 8 and drones 98 “impulse waves” 43 and elections 267 in-car navigation systems 58 Israel sends bogus news fl ashes to In-Q-Tel 219, 261 mobile phones xvii India and Israeli air power 90 and BrahMos missile 12, 15 Israeli killing of Mughniyeh 230 and Pakistan 271 Katyusha rockets 17 progress as a space-faring nation 149 al-Manar satellite-TV signal pirated xvii and Sizzler missile xii, 12 scrambles signals from a French military Indonesia satellite 143 annexation of East Timor 279 Hiznay, Mark 84, 85 and Darul Islam movement 279 Hoffman, Professor Bruce 206 submarines 14 Hogervorst, Maarten 32 turboprops 113 Holland, Steve 1, 27 Yakhont missile sold to 12 Hollifi eld, Stephen 266 information revolution 257 Hollis, Professor Duncan 174, 175 Information Warfare Monitor 154 home secretary 255, 259 informational warfare 153 Hong, Dr Dennis 49 informers 249 hostile-intent systems 223–26 infra-red equipment 33 Huang, Jen-Hsun 62 inks, electronic 56 Huawei 180 innovation 4, 5 Hughes, Nathan 13 Insitu 101 Human Rights Watch 84 Institute of Electrical and Electronics human shields 81 Engineers 121 Hussein, Saddam xi, 6, 84, 93, 97, 191, 212, Institution of Chemical Engineers 240 231, 267 integrated circuits 108 Hutcheon, Dr Ian 76 Integrated Dynamics 99 hydrazine fuel 142 intelligence hydrogen bombs: nuclear fusion 66 agencies 202, 206, 222, 260, 261, 266 hydrogen, in the Hindenburg 115–16 air power used to gather 93–94 Hyperion Power Generation 73, 75 Israeli intelligence in the occupied Hyperion Power Module (HPM) reactor territories 94 73 intercontinental ballistic missiles (ICBMs) hyperspectral imaging system 139 17 Intermat 34 i2 211, 267 Internal Revenue Service 213, 265 IABG 191 International Atomic Energy Agency IBM 222, 264–65 (IAEA) 69–72, 151, 152, 168 SPSS 266 International Civil Aviation Organisation Ibn Taymiyya 206 124 ICBMs see intercontinental ballistic International Experimental missiles Thermonuclear Reactor, Cadarache, identity cards 253 France 68 Identity Systems 222 international human-rights laws and identity theft 250, 256 treaties 257 IEDs see improvised explosive devices International Security Assistance Force image-recognition software 41 9, 278 Imperial College, London 35, 54, 194, 240 International Space Station 148 improvised explosive devices (IEDs) 6–10 International Traffi c in Arms Regulation blowing up 8 (ITAR) 145–49

bbindex.inddindex.indd 289289 330/11/110/11/11 3:433:43 PMPM 290 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

internet Iraq war (2003-) breaking up data 156–57 CBU-105 bombs 86 growing connectivity 156 “Darwin patrols” 5, 6 insecure 156 drones 98, 104, 115 Irhabi007 and jihad 199 invasion of 20, 44, 274 origins in military research 58 Iraqi command-and-control facilities used to promote terrorism 202 blown up xi vital computer systems linked to 155 overthrow of Saddam’s government 84 internet-service providers 184 and precision guidance 93 invisibility cloak 54, 55 psychological warfare before xvii Ioannis, Alexander 271 unmanned aerial vehicles deployed iPhones 58, 61, 101 in 195 iPods 58, 59, 61 US supply convoys attacked 44–45 Iran Iraqi army cyber-army 182 casualties in 2003 war xi diffi culties in obtaining new anti- command-and-control facilities blown aircraft batteries from Russia 153 up xi drones 97–98 disbanding of 278 gains naval power 13 size of xi Green movement’s protests (2009) Iraqi insurgency 192 227 “Irhabi007” (Younis Tsouli) 199–205, 207 and Haystack anti-censorship software “Irhabi11” 207 227–28 iRobot 48 hostile to the West 278 Iron Curtain active-protection system 28 midget submarines 13 irregular warfare 273–80 nuclear equipment 4 Isaac, Dan 99 nuclear programme 69 Israel nuclear weapons 271 Arrow missile-defence programme 139 and Sizzler missile xii-xiii, 12 conscription 4, 64 and Stuxnet 151 deaths in Dubai, Tunis and Damascus Iraq 229–30 anti-aircraft missiles 214 and drones 97, 108–9 blimps in 116 intelligence in the occuipied territories Britain slowly leaves 278 94 cluster bombs in 82, 88 pirates Hizbullah’s al-Manar satellite-TV Coalition Provisional Authority 278 signal xvii energy consumption 45 success of tech industry 4 Iraqi forces ejected from Kuwait (1991) war against Hizbullah forces (2006) 276 xvii Katyusha rockets 17 Israel Aerospace Industries 98 national government 280 Israel Aircraft Industries 109 “surge” in 276 Israel Defence Forces (IDF) xiii, 25 turboprops 113 fl eet of UAVs 96 US forces’ consumption of fuel 44 nurtures entrepreneurs 64–65 US UAV fl ight-hours in 97 Israel Military Industries 85, 86 Iraq war (1991) Israel-Canada Chamber of Commerce, Tel Iraqi command-and-control facilities Aviv 64 blown up xi Israeli air force Iraqi conscripts’ response to killing of civilians in Lebanon 94 psychological warfare xvii Lebanon war (1982–3) ix lasers used to guide bombs 84 Israeli, Antan 96 Pentagon study on bombing Israeli army: tanks destroyed in Yom effectiveness 85 Kippur war 24 and precision guidance 93 Israeli start-ups 64 preparations for sorties in run-up to the Italy war 3 and drones 97 quest for asymmetric advantage after Red Brigades 275 xii Ivry, David ix and satellite bandwidth 132 TNDM statistics 189 Jacobs, Pieter 32

bbindex.inddindex.indd 290290 330/11/110/11/11 3:433:43 PMPM Index 291

Jael 229 Krepon, Michael 131 Jamestown Foundation 205 Kroo, Dr Ilan 123, 124 Jamieson, Professor Allan 254 Kulathuramaiyer, Narayanan 260 jamming concept 48 Kulinski, Mike 98 jamming equipment 7, 98 Kurdish Peshmerga troops: incident at Japan: Atomic Energy Commission 74 Debecka (2003) 79 Javelin missile 26 Kursk submarine 14 Jennings, Dr Nick 196 Kuwait 276 Jerusalem, Temple in 273 Kuznetsov, Vladimir 72 jet fuel 46 JICM (Joint Integrated Contingency Model) L-3 WESCAM 113 190 land: the fi rst domain of warfare 1, 181 jihad 91, 199–206, 274 landmine ban (1997) 89 jihadi groups 201, 202, 263 Langley Research Centre, Hampton, John F. Kennedy, USS 201 Virginia 119, 120 Johnson, Lyndon 93 Laser Area Defence Systems (LADS) 16–17 Johnson, Dr Neil 185–86, 187 Laser Avenger 8 Johnson, Wray 93 laser guns Joint High Power Solid State Laser 17 detonating roadside bombs 2 Joint IED Defeat Organisation 10 protecting ships from missiles 2 Joint Strike Fighter 111 ship-mounted 2 Jones, Chris 48 shooting down incoming barrages of Jordan: General Intelligence Department artillery shells 2 261 “laser tag” exercises 191 Josephus 273 LaserMotive 42, 43 Joyner, Ellen 265 lasers “dazzling” satellites xv, 130, 142–43 Kabul 9 defensive use of 16–18 bombing of (1919) 91 developed to shoot down missiles 15, kamikaze pilots 106–7 133 Kansi, Mir Aimal 218 High Energy Laser Technology Kare, Jordin 43 Demonstrator 17 Kareiis, Hans 33 Joint High Power Solid State Laser 17 Katyusha rockets 17 LADS 16–17 Kay, David 153, 171, 214 laser-guided munitions 108 Kellas, Sotiris 119 offensive use of 18–19, 84 Kennedy, Senator “Ted” 252 power beaming 42–43 Kenya satellite-to-satellite communication attack on Israeli hotel (2002) 231 136 US embassy bombed (1998) 231 targeting 81 Kettering Bug 106 Latin America 276 Kevlar 9, 30 law-enforcement agencies 222, 224, 266 KGB 233–34 Lawrence, Chris 189, 192 Khan, Abdul Qadeer 213 Lawrence, T.E. 277 Kharoba, Sam 221 Seven Pillars of Wisdom 276 Kilcullen, Colonel David 279 Lawrence Livermore National Laboratory, “kill chain” 104 California 66, 76 “kill switches” 151, 152, 153, 169–71 Lebanon Kilo submarines xiii Hizbullah’s use of Katyusha rockets 17 kinetic-energy projectiles 26, 27 Israeli corvette damaged by Hizbullah King’s College, London 252 (2006) 12 Kirtland Air Force Base, New Mexico 140 Israelis driven out of 274 kites 105 and network analysis 267 Kitov, Ruvi 64 turboprops 113 Klein, Daniel 28 US retreat from (1983) 275–76 Kolb, Charles 34 war against Hizbullah forces (2006) xvii, Kosovo 34, 94, 191 90, 94–95 Kotov, Dr Nicholas 56, 57 Lebanon war (1982) Koushanfar, Farinaz 170 use of small Israeli-built UAVs 108–9 Krawciw, Major General Nicholas 193 largest air battle of the jet age ix, xiv

bbindex.inddindex.indd 291291 330/11/110/11/11 3:433:43 PMPM 292 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

tank losses 25 McCulloh, Ian 212 Lego Mindstorms robotics kit 246 McMurray, Colonel Robert 18 Lehniger, Peter 25, 28 McPheeters, Scott 16 Lewis, Jim 160 McVadon, Eric 15 Lexington Institute 50 “Mad Mullah” (Mohammed bin Abdullah Liberia: seabasing 20–21 Hassan) 91–92 Libya Mahdi, the 91, 274 activists circumvent internet shutdowns Maital, Shlomo: Global Risk/Global 208 Opportunity 64 and anti-tank missiles 169 Makin Island, USS 46 civilian vehicles used by Qaddafi forces Malalo, Michel 31 81 Malaya 279 cluster bombs in Misrata 82 British success against communist NATO and xvii, 81, 271 revolutionaries (1950s) 276, 277–78 sidestepping of communications Malaysia: purchase of its second attack blackouts 154 submarine 14 and Thuraya satellite telephone system Maldives 245 132 malware 158–59, 159, 178–80 licence-plate data 259 Mamozai, Faqir 96 Liddell Hart, Basil 91 al-Manar satellite-TV xvii light sensors as bomb detonators 7 Manned Ground Vehicle (MGV) 51 light-emitting diodes Mansoor, Sheikh 197 camoufl age 1, 32 Mao Zedong 274, 277 embedded in contact lenses xiv, 38–39 al-Maqdisi, Abu Muhammad 206 Lightning Bug unmanned spy plane 108 Marine Corps: OneSAF model 190 Lillehammer, Norway: murder of a Maritime Pre-Positioning Force (Future) 21 Moroccan waiter (1973) 230 Markov, Georgy 234 Lindahl, David 151, 152–53, 169, 170 Mars: rovers 43, 148 Lindelauf, Roy 143, 266 Mars Pathfi nder 120 link analysis see network analysis Massive Ordnance Penetrator 86 Linux 59, 60 Matador cruise missile 107 liquid armour 29–30 Mattis, General James 44 Lissaman, Dr Peter 123, 124 “Maximus” (Mirsad Bektasevic) 200 Litani river 94 May, Ed 22–23 Litvinenko, Alexander 234 Mayport naval base, Jacksonville, Florida Livingston, Mark xiv 201 LJDAM system 85 MD-500 helicopter 119 Lockheed Martin 17, 34, 35, 81, 101, 148, 160, Medicaid and Medicare health-care 190, 237 schemes 266 London Mehsud, Baitullah 232 bus bomb (2005) 240 memory sticks 160, 164, 166, 167 failed car bombs (2007) 201, 204 Meshal, Khaled 230 killing of Litvinenko (2006) 234 MessageLabs Intelligence 179 killing of Markov (1978) 234 Metropolitan Police 201 V-1 fl ying bomb as a weapon of terror Michels, Hans 240 against 107 micro-expressions 224 Lormel, Dennis 219 microchips 170, 250 Los Alamos National Laboratory, New Microdrones 245 Mexico 62 Microsoft 155, 167, 228, 259 Los Angeles County Sheriff’s Department Windows 166, 167 245 microwave ovens 210 Los Angeles Police Department 260 microwaves 11, 210 Luc-Bouhali, Agnès 246 Miliband, David 88 Lyke, James 140 military manuals 204, 276–77 Lynntech 7–8 military procurement programmes 59 “military-consumer complex” 1 M1 Bazooka 24 Milosevic, Slobodan 94 al-Mabhouh, Mahmoud 229–30, 233 mine-resistant ambush-protected vehicles McAfee 158 (MRAPs) 9 McConnell, Mike 156 Ocelot 9

bbindex.inddindex.indd 292292 330/11/110/11/11 3:433:43 PMPM Index 293

mineral-analysis technology 241 Exchange (Matrix) 251 Ministry of Defence (Britain) 7, 33 Munich Olympics (1972) 230 Minority Report, The (fi lm) 225 MW Power 250 Misrata, Libya 82 MX-15 imaging device 113 missile-detection system, “multichannel” MySpace 213, 266 13 missiles Nabhan, Saleh Ali Saleh 231 air-to-air 110 Nafi on 57 aircraft-launched 26 Nagaraja, Shishir 180 anti-aircraft 214 Nagl, John 280 anti-radar 110 Learning to Eat Soup with a Knife 276 anti-ship xii-xiii, xvi, 11–13 name-matching software 218–22 anti-tank 24, 169 NameX programme 221 ballistic Nano Letters 57 powerful enough to cross space nanotechnology 56 briefl y 131 nanotubes 56, 57 shooting down 133 napalm 84 boost phase 17–18 Napoleon Bonaparte 91, 128, 274 cruise 105, 107, 108 NASA 140 “delinking” 214 honeycomb cushion protecting heat-seeking 170 helicopters 119 hypersonic and non-nuclear 82, 139 Mars rover 148 inter-continental ballistic missiles 17 and Pelican helicopter drone 42 lasers developed to shoot down 17, 133 and shooting down of a satellite by medium-range ballistic 125 China 126 shoulder-fi red 1, 26, 27, 99 technology offi ce, Washington, DC 43 surface-to-air 108 and transport of astronauts to mobile landing platform (MLP) 21–22 international space station 148 mobile phones Nash, Thomas 88, 89 bogus news fl ashes sent to xvii Natanz nuclear refi nery, Iran 152, 165, 168 with cameras 3 national children’s database (Britain) 255 Green movement’s protests in Iran National Health Service 255, 256 (2009) 227 National Ignition Facility (NIF), Lawrence improvised explosive devices 7 Livermore National Laboratory, interception of communications by California 66–68 drones 97 National Intelligence Estimate (US) 202 sales 59 National Security Agency (NSA) 9, 156, 160, and spies 215–16 215, 262 and stealth aircraft 35 National Transportation Safety Board Mobile Tactical Vehicle Light (MTVL) 51 (NTSB) 244, 247 Moleschi, Ron 71 nationalism 278 Montgomery, Colonel John 105, 111 NATO 178, 183 moon, the, laser-powered rovers on 43 bombing campaign in Serbia (1999) 34, Moor, Philip 73–74 93, 191 Morelli, Frank 223 in Bosnia 188 Morocco, turboprops in 113 and cyberwar as a form of “armed Moss, Jeff 208 attack” 182–83 Mossad 216, 229, 230 cyberwar unit, Estonia 161, 175, 178, 210 Mowry, Chris 73 International Security Assistance Force Mozambique civil war 275 9, 278 MPR-500 (Israeli precision bomb) xv, 85 Joint Air Power Competence Centre, MRAPs see mine-resistant ambush- Kalkar, Germany xv protected vehicles Kosovo (1999) 191 MSE 35 in Libya xvii, 81, 271 Mughniyeh, Imad 230 modifi cation of command chains xv Muhammad, Prophet 204, 206 mutual-defence obligations 174–75 mujahideen 203, 205, 270 new “strategic concept” 162 Mukasey, Michael 259 and tactical intelligence xiv-xv multicore processors 62 war of psychological pressure against Multistate Anti-Terrorism Information Milosevic 94

bbindex.inddindex.indd 293293 330/11/110/11/11 3:433:43 PMPM 294 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

Naval Postgraduate School, Monterey, and utilities 4 California x Nuctech Company 241, 242 Naval Research Laboratory, Washington, NuScale 72 DC xiv NVIDiA 62, 63 NETSTORM 214 network analysis 211–14, 264–68 Obama, President Barack Neuron jet-engine stealth drone 99–100 and attack on al-Awlaki 231 neutron scanning 241–42 and CIA drone attacks 232 Nevada desert 104, 136 and cluster bombs 82, 89 New America Foundation 232 and cybercrime 157–58 New Jersey Institute of Technology (NJIT) green agenda 45 33–34 and US digital infrastructure 155 New York Times 228 and US Navy Seals attack on Newton, Sir Isaac 18 Abbottabad compound 81 Nicaragua 279 Oceaneering International 22, 23 Nik, Ramli xiii, 14–15 Ocelot (a MRAP) 9 “N02ID” movement 253 OECD (Organisation for Economic non-explosive reactive armour (NxRA) Co-operation and Development) 175 25–26 Offi ce of Naval Research (ONR) 23 Nonproliferation Policy Education Centre Ohio State University 224 75 oil prices 45 Nordenberg, Rickard 143 OJSC NII Stali 25–26 Normandy landings 92 Old Dominion University, Virginia 191 North Korea Oliver, Christopher 98 detonation of a test nuclear device Olkiluoto, Finland 71 (2009) 99 Olmert, Ehud 90 midget submarines 13 Olympics, protection of 70 shells South Korea 271 Omdurman, Battle of (1898) 19 and tactical intelligence xv OMS Services 221 North Vietnam “on eye” augmented-reality displays xiv anti-aircraft missile defences 108 Onera 243, 246 response to bombing of industrial OneSAF model 190 sector 93 Operation Desert Storm 188 North Waziristan, Pakistan 197 Operation Enduring Freedom 278 North-West Frontier Province 91 Operation Joint Endeavour 188 Northern Ireland 274, 276 Operationally Responsive Space Offi ce Northrop Grumman 17, 99 (ORSO) 140 Northwestern University, Evanston, Illinois Optibase 65 268 optimisation techniques 195 Norway ORA model 268 fi rst government satellite launched Orbital Sciences Corporation 141 (2010) 80 Ordtech Military Industries 271 and the World Institute for Nuclear OSS (Offi ce of Strategic Services): Security 70 psychological warfare xvi-xvii Nuclear Energy Institute, Washington, Oto Melara 100 DC 71 nuclear fusion 66, 68 Pakistan nuclear power, fi ve worries of (safety, blocks US efforts to safeguard its proliferation, waste, cost and fuel nuclear facilities 170 availability) 75 disassembly and replication of foreign nuclear security 69–70, 77 components 171 Nuclear Threat Initiative 70 drone strikes 212–13, 232 nuclear traffi cking 69–70, 213 and India 271 nuclear-arms race x Tornado UAV 99 nuclear-power reactors unable to remove insurgent havens fl oating 72 278 mini-reactors 4, 71–75 Pakistani army 81 powering warships and submarines Palestine 273, 274 4 Palm Pre 101 “travelling wave” 75 pan-Islamism 78

bbindex.inddindex.indd 294294 330/11/110/11/11 3:433:43 PMPM Index 295

Panasonic Toughbook computers 61 and nuclear traffi cking 69, 76 Panzerfaust 3 missile 27, 28 poisoning 233–34 paparazzi 244 police Parviz, Dr Babak 38, 39 and crime prediction 266 passports 216, 220, 230, 233 and data provided by companies 256 Patriot Act (2001) 254 and network analysis (Richmond, Patriot missile-defence systems 137 Virginia) 213, 266 pattern recognition 258, 263 and UAVs 245, 250 pattern-generation software 31 polonium 234 Patwari, Dr Neal 235, 236 polygraphs 226 Payton, Gary 130 Portsmouth University 247 PC video-cards 58 Powell, Colin 276 Pegasus launcher 141 power beaming 42–43 Pelican helicopter drone 42–43 power grid 161 Pendleton, Lieut-Colonel Ryan 139 power law 185, 186 Pendry, Sir John 35, 54 power stations, fusion-based 66 Pentagon 280 Powers, Francis Gary 108 casualty projections for fi rst Iraq war precision guidance 93, 113 188 Predator B UAV (crash in Arizona, 2006) Centre for Army Analysis 190, 192 244, 247 on China’s emergence as a space power Predator drone 96, 104–5, 106, 107, 115, 197, 126 244–45, 247 and China’s missile-defence system predictive analysis see network analysis test 137 predictive-analysis software 9–10 clears sale of Patriot missile-defence privacy 256–57 systems to Taiwan 137 probabilistic modelling 195 and cluster munitions 89 progress curves 186 Cyber Command (Cybercom) 155 Project Hostile Intent 224, 225 and drones 104, 109 Prompt Global Strike missiles 82, 139 and Ethical Architecture 154 propaganda 151, 202, 273–74, 279 fuel bill 45 Provisional Irish Republican Army 276 Global Information Grid 198 Pry, Peter 152 hacked databases 256 psychological warfare National Space Security Offi ce 146 broadcasting xvii and satellite components 148 e-mails xvii and scrambling of satellite signals 143 mobile phones xvii study on bombing effectiveness in fi rst OSS letters xvi-xvii Gulf war 85 Total (later Terrorism) Information Qaddafi , Muammar xvii, 81, 271 Awareness programme 258 al-Qaeda 69, 129, 163, 197, 199, 202, 203, worries about fragile space architecture 206, 211, 231, 262, 263, 279 129 Qatar: Yandarbiyev killed by car-bomb in Perseus bomb 84 (2004) 234 Peru: collapse of Shining Path rebels 275 QinetiQ 8 Peshawar, Pakistan 260–61 Quantico, near Washington, DC 45 PETN (pentaerythritol tetranitrate) 239–40 Queen Bee aircraft 106 Petraeus, General David 276, 279 “Questions and Uncertainties Concerning Petro, Andy 43 the Mujahideen and their Operations” Pfeifer, Brian 22 (e-book) 205–6 Phalanx system 17 Quisquater, Jacques 152 Phantom Eye drone 103 phishing 158 racial profi ling 225 photovoltaic cells 42–43 radar Physical Review Letters 54 development of 106 Pike, John 18 ground-penetrating 237 Pita, Alejandro 101 instrumentation 212 pixel patterns 32 mapping 107 Plumb, Keith 240 and stealth aircraft 35 plutonium “synthetic aperture” xi, 108 fi ssionable 75 radar-refl ective foil (“chaff”) 143

bbindex.inddindex.indd 295295 330/11/110/11/11 3:433:43 PMPM 296 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

radiation-detection kit 209 EATR (Energetically Autonomous radicalisation 202, 205, 206, 261 Tactical Robot) 4, 40–41 radio fl y-like (Harvard “fl y-bot”) 247 development of 106 “garbage man” 142 interception by drones 97 neutralising IEDs 8 jamming 173 reconnaissance 58 radio stations, FM 209 Talon 8 radio tomographic imaging 235–36 vacuum-cleaning 48 radio waves 235 Robust Nuclear Earth Penetrator 85 low-frequency 237–38 rocket boosters 80 radio-frequency identifi cation (RFID) rocket-launchers 94 microchips 250 RPG 203 Rafael 12–13, 14 rocket-propelled grenades (RPGs) 16, 24, Rafale fi ghter jet 141 75, 115, 280 Rains, Lon 146 Rogers, Aaron 141 Ramsey, Mark 265 Rohozinski, Rafal 154 RAND Corporation 21 Rolin, Xavier 2 Rausch, Sharla 224 Rolls-Royce 62 ray gun 16 Romans 273 Raytheon 2, 17, 101 Roomba 48 Advanced Missile Defence and Directed Roos, John 33 Energy Weapons 17 Rosatom 72, 73 RBS-15 anti-ship missile 11 Rosenker, Mark 244 Read, Robyn 113, 114 Rouge, Joe 146, 148, 149–50 Reagan, Ronald 17, 133, 231 Rover laptop computer system 104 Reaper (“hunter-killer” drone) x, 96, 110, Rowe, Richard xi, 10 112, 197 Royal Air Force (RAF) reconstruction agencies 278 air control in Iraq (1922) 92 Recovery Accountability and Transparency air policing 273 Board (RATB) 265–66 bombing of Kabul (1919) 91 Red Army Faction 275 bombing of “Mad Mullah’s” fort (1920) Red Arrows 123 91–92 Red Brigades 275 Royal Dutch Defence Academy 143, 266 “Red Flag” air-combat exercises 136 RPGs 26–27, 28 Red Queen hypothesis 187 RPG-7 26 Red Wagon reconnaissance UAV RPG-29 26 108 RQ-2 Pioneer drone 80 Reed, Thomas 155 RQ-170 Sentinel drone 81 Regulus cruise missile 107 rubber tracks 1, 50–51 Rehm, Gregory 208 Rubin, Uzi 139, 142 REMANTA bug 246 Rumsfeld, Donald x, 134 Ren Zhengfei 180 Russia retina scans 233 arms exports 153 “revolution in military affairs” xii capitalist technology 257 Rice University, Texas 170 cluster munitions in war with Georgia Richardson, Lewis Fry 185, 186 89 ricin 234 cyberspies 160 rifl e glint 31 and drones 97 Riordan, Kevin 239 “Father of All Bombs” xvii, 87 Roadrunner supercomputer 62 information revolution 257 Robb, John 175, 176 invades Georgia (2008) 172, 271 Robertson, Robert 35 mini-reactors 72 Robotic Technology 40, 41 satellite destruction 82–83 robotics, arms race in x security upgrades 69–70 robots Sizzler missile xii Battlefi eld Extraction-Assist Robot Russian army, and tactical intelligence xv (BEAR) 36–37 Russo-Japanese war (1905) 173 cable-climbing 42–43 Chembot 48–49 Saab Barracuda 32 Dragon Runner 8 Saakashvili, President Mikheil 162

bbindex.inddindex.indd 296296 330/11/110/11/11 3:433:43 PMPM Index 297

Sabatini, Nicholas 246, 247, 248 “sentiment analysis” 261 Sadequee, Ehsanul 201 September 11th 2001 attacks 219, 231, 251, Sagger missile system 24 254, 262 SAIC 192 Serbia: NATO bombing campaign (1999) salafi sm 204 34, 93, 191 saline aerials 52–53 Shanks, Wayne 9 Sandia National Laboratories 190 shear-thickening fl uids 29–30 Sandinistas 279 Shearer, Colin 266 Sanswire 117, 118 Shepherd’s Bush, London 200 Sartiano, Joseph 45 Shining Path rebels 275 SAS 213, 265 ships satellite-guidance systems 84 all-electric 46 satellite-navigation systems 60 hybrid-powered 46 satellites Shkval (Squall) cavitating torpedo 14 atmospheric 117 “shock and awe” 23, 271 Corona surveillance 108 shop “loyalty” cards 255 cubesats 80 Siardi, Carlo 99 “dazzled” by ground-based lasers xv, Siberia: explosion on a Soviet gas pipeline 130, 142–43 (1982) 155 destroyed 82–83, 125–27, 129, 130, 134, Siemens 23, 62, 166, 167 137, 142 Sikorsky 81, 121, 122 and dissidents 209–10 Singapore: submarines 14 estimated number of active satellites Singer, P.W. 101–2 (end 2007) 132 Wired for War 102 GPS xiv, 85, 109, 128, 132, 135, 136, 146, Sisera 229 156, 198, 244, 246 Sizzler anti-ship missile xii-xiii, 11, 12–13 as “guardian angels” 134 SJH Projects 1, 27 intelligence-gathering 129 SkySat 117 intentional interference with 131–32 “smart” grids 45, 161, 165 launch costs 140–41 Smith, Jacqui 259 and radar-refl ective foil (“chaff”) 143 Smiths (aviation-security fi rm) 239 shifting position of 134 Snark drone 107 smaller 139–40, 143 SNC-Lavalin Nuclear 71 spy 106, 126, 130, 139, 142 “sneak and peek” 254, 256 Saudi Arabia 271 sniffers identifying bomb chemicals 7–8 Scheuer, Michael 219, 220 Snyder, Kyle 101 Schmidt, Howard 155, 156 social networks 264, 265, 266, 268 Schneider, Mycle 74 social-networking sites 158, 196 Schneier, Bruce 156, 173, 252 Sofradir 13 Schrogl, Kai-Uwe xv software Science 185 Agent 99 225 Scripps Institute of Oceanography 245 anti-censorship 227–28 SDS (security company) 239 and camoufl age 31, 32 sea: the second domain of warfare 1, 181 and container management 22 sea mines xvi and data quality 13 seabasing 20–23 drone 154 seawater antenna 52–53 forecasting 154 SecDev Group 179 Google Earth mapping 101 second world war 274 and IEDs 10 carpet-bombing xii image-recognition 41 killing of Isoroku Yamamoto 231–32 internet-security 64–65 reports of formation fl ying 124 network-analysis 211–14 synthetic fuels 46 object-recognition 7, 98, 223 second-generation warfare 274 open-source 59 security certifi cates 167 pattern-generation 31 Seisint 251 predictive 9, 10, 154 Selex Galileo 99 simplifi ed 140 Señoron, Captain Francis 8, 9 and spam servers 64 sensor-fused weapons 87 translation 59 “sensor-to-shooter” cycle 104 and UAV missions 100–101

bbindex.inddindex.indd 297297 330/11/110/11/11 3:433:43 PMPM 298 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

and uranium-enrichment centrifuges efforts to protect 83 151 SPADAC 268 war-forecasting 188–93 Spain soil mechanics 1 and drones 97 Sokolski, Henry 4, 75 guerrilla attacks against Napoleon’s solar panels 4, 45 forces 274 solar power spall 28 and drones 110 spam 158, 158 falling costs of 74 Spaulding, Suzanne 260 solenoid valves 147 spear-phishing 158 SOMA Terror Organization Portal 267 special theory of relativity 55 Somalia spectrometer 8 death of Nabhan (2009) 231 secondary-ion mass 76 US retreat from (1994) 275–76 239 sonar 54 Spectrum 121 Sony PlayStation 3 (PS3) 4, 58–62 spycatchers 215 Soriano, Bobby 208 spying 79, 81 Soucy International 51 “squash head” 27–28 South Africa SR-71 Blackbird 108 aborts construction of a nuclear reactor SRA 266 (2010) 74–75 Sri Lanka, and drones 97 and TNDM software 190 Stalin, Joseph 233 South American drug plantations 113 Standingford, David 62 South Korea Stanford University 123 replacement of U-2 spy planes with Star Trek 46 Global Hawks 99 Star Wars scheme 17, 133 shelled by North Korea 271 stars: nuclear fusion 66, 68 sinking in 2010 of a Southern Korean START-style treaty 183 frigate 13 statistics of war 185 and TNDM software 190 stealth aircraft 35 South Waziristan, Pakistan: funeral attack stealth poncho 33 (2009) 197 steam engine, EATR 40–41 Soviet Union Steinhardt, Barry 225–26 anti-satellite weapons tested 139 Stinger missiles 169 collapse of 279 Stockholm International Peace Research economic and technological decline ix Institute 214 perestroika reforms ix Stokes, Mark xiii poisonings 233–34 StopGeorgia website 172 rigid dogfi ghting doctrine xiv STRATFOR 13 U2 spy plane lost over (1960) 108 stratellites 117 withdrawal from Afghanistan 270, 274 STS-111 airship 117–18 space Stuxnet 151, 152, 164–65, 166–68 the fourth domain of warfare 1, 181 submarines global common in international law 132 anti-submarine technology xiii militarisation of 82, 128–36, 142 construction xiii situational awareness 135 drone launched from 101 Space and Missile Defence Command, hiding with an acoustic cloak 54 Directed Energy Division 19 increased purchase of 14 space capsule, and honeycomb cushion Kilo xiii 119 Kursk 14 space exploration, and power beaming 43 midget 13 space landers, unmanned 120 Nik’s opinion of 14–15 Space News 146 nuclear-powered 4 Space Review 146 Subrahmanian, Venkatramana 267 space security 134–35 Sudan 268, 274 Space Security Index 144 suicide bombers xii, 106–7, 163, 199, 261, space surveillance 135 280 “space tugs” 134 Sullivan, Pat 81, 112 spacecraft Sun Tzu 125, 127 ability to shoot down 82 Sunni tribes 279

bbindex.inddindex.indd 298298 330/11/110/11/11 3:433:43 PMPM Index 299

Super Tucano turboprop 114 “tandem charge” munitions 26 supercomputers 4, 58, 60 Tank Museum, Bovington 28 Roadrunner 62 tanks supernovae, exploding 68 Abrams 44 supervisory control and data acquisition Challenger 2 27 (SCADA) 161, 166, 167 destroyed in Yom Kippur war 24 surgical strikes 154 dummy 34, 191 Surveillance Studies Network 256 rubber tracks for 1, 51 surveillance videos 128 Tanzania: US embassy bombed (1998) 231 surveyors, and UAVs 245 Taranis drone 103 Survival Consultants International 9 Targeted Trojans 178, 179 “survival of the fi ttest” 6, 10 Tbilisi, Georgia 172 “Suspicious Activity Report – Support and Teal Group 12 Implementation Project” (2008) 260 technical-assistance agreements 148 Suzuki, Tatsujiro 74 telegraph 173 Sweden Telesat 147 data-mining 259 television, development of 106 and TNDM software 190 Tellis, Ashley 131 Swedish Defence Materiel Administration Temple University, Pennsylvania 174 143 Templer, General Sir Gerald 276, 277 Swedish Defence Research Agency 33, 151, Tennessee Valley Authority 73 153, 169, 214 tents, military 45 Swedish National Defence Research TerraPower 75 Institute 190 terror groups Swedish police: virtual autopsy system recruiting extremists 153 62 social networks 266–67 Swedish War College 190 spreading propaganda 153 Switzerland, and TNDM software 190 terror networks: strengthened by Symantec 158, 167 capturing/killing of bombers 10 syngas (synthetic gas) 45 terrorist-profi ling systems 252–53 synthetic-aperture radar 108 Tesla, Nikola 105 Syria textiles, intelligent 56 aims to gain control of Israeli-occupied Textron Defense Systems 87 parts of Golan Heights ix Thales 12, 34 anti-aircraft batteries in Bekaa valley thallium 234 109 Thamm, Berndt 263 Hama massacre (1982) 274 Theobald, Daniel 36 and Sizzlers 12 thermal-vision equipment 33 Syrian air force: routed in Lebanon war third-generation warfare 274 (1982–3) ix, xiv Thomas, Richard (Britain’s information System to Assess Risk (STAR) 251–52 commissioner) 256 system-disruption warfare xi-xii Thomas Freeborn (Union navy steamer) 173 TacSat-3 spy satellite 139, 140 Thrush Aircraft 113 Tactical Garbage to Energy Refi nery (TGER) Thuraya satellite telephone system 132 45 Tibetan diaspora 178 tactical intelligence xiv-xv Tighe, Donald 261 Tactical Numerical Deterministic Model Tikrit, Iraq 267 (TNDM) 188–92 Tip of the Camel’s Hump (militant Tactical Tech 208, 209 e-magazine) 204 TACWAR forecasting system 191 Tito, Josip Broz 274 Tahrir Square, Cairo 208 TNO, Soesterberg 32 Ta iwa n Tolk, Andreas 191 and China 125, 126, 131, 271 torpedoes US arms sales to 137, 138 cavitating 14 Taliban 33, 84, 109, 129, 199, 232 Barracuda 14 Tallinn, Estonia 161, 175, 179, 210 Shkval (Squall) 14 TALON pattern-detection programme 262 homing and guidance systems 14 Talon robot 8 and sinking of South Korean frigate Tam, Daniel 52 (2010) 13

bbindex.inddindex.indd 299299 330/11/110/11/11 3:433:43 PMPM 300 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

speed of 14 Future Combat Systems super-fast rocket-propelled xiii modernisation programme 51 tricking with decoys 14 Joint Chiefs of Staff 190, 191 Toshiba: 4S reactor 74 network-analysis software 212, transliteration 218–22 213–14 Treasury (British) 91 US Strategic Command 139 trench warfare xi, xiv, 90 Department of Energy 66–67, 70 Trenchard, Hugh 90–91 Department of Homeland Security 152, tritium 67–68, 242 163, 208, 237, 258, 260 Trojans 158 Human Factors Division 224, 225 Trophy system 28 Department of Justice 259, 260 Trusted Foundry Programme 170 Department of Motor Vehicles 266 Tufi n Technologies 64 Department of State xvi, 113, 145–49, Tunis: killing of Abu Jihad (1988) 230 153–54, 220, 221, 227, 280 Tunisia: government toppled (2011) 153 DNA databases 253–54 tunnels, and illegal traffi c 237–38 heavy dependence on military satellites turboprops 112–14 125, 126 208B Caravan 112 House of Representatives, Armed Super Tucano 114 Services Committee 188 Vigilante 113 humiliating retreats from Lebanon and Turkey: restricts use of its territory and Somalia 275–76 airspace during invasion of Iraq (2003) location and destruction of ground 20 launchers xiii Twitter 213, 227, 266 potential military intervention in any war over Taiwan 131 U-2 spy planes 99, 108 pressure to step up defence UAVs see drones co-operation and diplomatic Ulph, Stephen 205, 206 activity in Asia xiii ultrasound scanner: 3D images 62–63 probably the most vulnerable to cyber- “underpants bomber” (Detroit-bound attack 183 plane, 2009) 240 restrictions to space industry 145–50 UNIMAS 260 satellite destruction 82–83, 139, 142 United Arab Emirates, and Sizzlers 12 seabasing 20–23 United Nations Senate, armed-services committee and anti-satellite research 144 116, 271 Charter 174 and small reactors 72–74 General Assembly 133 spy technologies xiii resolution 1540 70 Star Wars scheme 17, 133 Security Council 69, 174 “stockpile stewardship” programme for weapons conventions 84 nuclear bombs 67 United States Supreme Court 260 Aegis intercept missiles 15 ten Russians arrested and deported air supremacy 128 (2010) 215, 217 arms sales to Taiwan 137, 138 testing of nuclear weapons suspended civilian space programme 126 (1992) 67 and cluster bombs 82, 88, 89 Treasury 227, 266 Congress xvii, 67, 85, 131, 133, 140, 146, Offi ce of Foreign Assets Control 221 149, 152, 180, 231, 258, 259 use of arms deals as “a foreign-policy Customs and Border Protection 244, tool” 153 252 utilities and small nuclear reactors 4 Cyber Command 162, 182, 183 war-forecasting systems 190 Department of Commerce 145, 149, United States Cyber-Consequences Unit 227 168 Offi ce of Space Commercialisation United States Information Agency 280 146 University of Arizona, Tucson 225 Department of Defence 43, 48, 116, 140, Artifi cial Intelligence Lab 261 152, 221, 225, 266 University of Bristol 194 Defence Advanced Research Projects University of California, Berkeley 209 Agency 40, 46 University of California, San Francisco and drones 97, 100 224

bbindex.inddindex.indd 300300 330/11/110/11/11 3:433:43 PMPM Index 301

University of Cambridge 213, 228, 257 research grants for network analysis University of Cambridge Computer 67–68 Laboratory 178 SOMA funding 267 University of Delaware 29 Space and Missile Defence Command University of German Federal Armed 17 Forces, Munich 260 TACOM (Tank-Automotive and University of Illinois 180 Armaments Command) 50, 51 University of Kentucky 212, 265 Telemedicine and Advanced University of Maryland 267 Technology Research Centre University of Miami 186 (TATRC) 36 University of Michigan 56 US Army War College 142 University of Oxford 194 US Navy University of Southampton 194, 196 Battlefi eld Augmented Reality System University of Southern California 123 xv University of Toronto 154, 179 Directed Energy Weapons Programme University of Utah 235 Offi ce 17 University of Washington xiv, 38 faith in biofuels 46 unmanned aerial vehicles (UAVs) see GCAM software 190 drones loss of three aircraft over Lebanon uranium (1983) 109 233U 76 Regulus cruise missile 107 235U 76 Space and Naval Warfare Systems 236U 76 Command (SPAWAR) 52, 53 238U 76 and Super Tucano turboprop 114 enriched 75, 152 TV-guided drones 106 highly enriched uranium (HEU), and US Navy Seals: attack on bin Laden’s nuclear traffi cking 69, 76 Abbottabad compound (2011) 80 natural 76 US-China Economic and Security Review non-enriched, depleted 75 Commission 163 and Stuxnet 151, 152 USA-193 spy satellite 142 weapon-grade 76 USAID development agency 280 US Air Force USB dongles 209 432nd Wing 104–5 Uzzi, Brian 268 Advanced Tactical Laser (ATL) 18, 19 BRAWLER system 190 V-1 fl ying bomb 105, 107 and integrating a satellite with a launch van Creveld, Martin 9, 274 rocket 141 van Hoof, Jan xv, 96 intelligence and surveillance division Vareilles, Thierry 3, 6 176 Vecna Technologies 36 Matador cruise missile 107 Venezuela, turboprops in 113 Research Laboratory 147 Verizon 158 retrieval of containers from a logistics video games ship 3 jihadist 203 School of Advanced Airpower Studies Sony PlayStation 3 (PS3) 60 93 XBox 360 58, 60 SOMA funding 267 video surveillance cameras 171 and Sony PlayStation 3 (PS3) 60 Vietcong 269–70, 275 Space Command 139 archives 192–93 turboprops 113–14 Vietnam US Army and Sizzlers 12 Aberdeen Proving Ground, Maryland submarines 14 223 Yakhont missile sold to 12 adaptive camoufl age 33 Vietnam Veterans of America Foundation Army Medical Department 190 190 corps of advisers 280 Vietnam war (1955–75) 93, 108, 129, 197, expansion of 280 269–70, 274, 276 Infantry Centre Manoeuvre Battle Vilyuchinsk, Russia 72 Laboratory, Fort Benning, Georgia Vincent, Antoine 26 37 Virginia Tech 49 OneSAF model 190 virtual training camps 204

bbindex.inddindex.indd 301301 330/11/110/11/11 3:433:43 PMPM 302 MODERN WARFARE, INTELLIGENCE AND DETERRENCE

virus-writers 158 Williams (Formula 1 racing team) 62 VirusBloxAda 166 Williamson, Colonel Charles 176 viruses 158 Wilson, Joey 235, 236 Visiongain 8, 97 WinCC 166, 167 Visual Analytics 260 wind power, falling costs of 74 voice-over-internet audio 202 wind turbines 45 Volodarsky, Boris 233 WIRED magazine 246 von Knop, Katharina 260 wireless suitcase kit 153–54 wiretapping 254–55 Wachs, John 19 Woods, Paul 179 war forecasting 185–93 World Institute for Nuclear Security war games, and forecasting models 191 (WINS) 69, 70 Wa r Of fi ce 91 world wars 185 “war on terror” 231, 278–79 Wright brothers 105 warheads Wyatt, John 239 anti-ship missile 11 armour-piercing 2 X-rays 235, 239, 241, 242 nuclear xvii X2 helicopter 121–22 RPG 26–27 Xandem 236 US subcritical tests 67 Xbox 360 video-game controllers 58, 61 warrant issue 254–55 XPT “stone sponge” material 27 warships, nuclear-powered 4 Washington, DC Yahoo! 228 Capitol 201 Yakhont missile 12 George Washington Masonic Memorial Yamamoto, Admiral Isoroku 231–32 201 Yandarbiyev, Zelimkhan 234 World Bank 201 Yemen watch-lists 219, 221, 222, 261 cargo bombs 239, 240 Watts, Barry xi, 84–85, 116 cluster bombs in 82 Watts, Daniel 33, 34 Yom Kippur war (1973), Israeli tank losses weapons of mass destruction 69 in 24, 25 weather balloons 117–18 Youbombit.com 203 Web War 1 161 YouTube 229 websites Yugoslavia 274 jihadi 199–200, 201, 203–5 and malware 158 Zaloga, Steve 12 Wegner, Peter 140 al-Zarqawi, Abu Musab 199, 203, 206 Wells, H.G. 16 al-Zawahiri, Ayman 203, 206 Wen Jiabao 125 Zealots 273 Wessely, Professor Simon 252 Zeineh, Rashid 33 West Point military academy 206, 212 Zelikow, Philip 221 Western armies: individual initiative zero-day vulnerabilities 167 xiii-xiv Zetterling, Niklas 190 Westphal, Chris 260 Zeus ray gun 16 Wezeman, Siemon 214 ZigBee networks 236 Wheeler, Stuart 28 Zilmer, General Richard 44–45 Wi-Fi networks 209, 236 Zuckerman, Ethan 173 Wieselsberger, Carl 123

bbindex.inddindex.indd 302302 330/11/110/11/11 3:433:43 PMPM