An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Unique mission focuses on exposing systems' vulnerabilities

  • Published
  • By Michael P. Kleiman
  • Air Force Research Laboratory Space Vehicles Directorate Public Affairs
Three to four times a year a group of junior U.S. military officers and federal government employees use open source databases such as the Internet and libraries in an attempt to reveal potential weaknesses in the Department of Defense's current and future space systems.

More often than not, participants in the Space Countermeasures Hands On Program, usually known as Space CHOP, succeed in achieving their objectives.

Space CHOP is the recognized leader in emulating the asymmetric, terrorist and rogue nation threat. Despite the program's national importance it is run by one Air Force civilian engineer, with assistance from two contractor consultants.

"Space CHOP gives a unique and incomparable look at the customer's potential vulnerabilities from an asymmetric viewpoint," said John Holbrook, aerospace engineer and chief, space countermeasures, Space Vehicles Directorate, Air Force Research Laboratory.

Space CHOP is actually the second "CHOP" type organization in AFRL. The first was organized in the early 1990s, and worked strictly for the Ballistic Missile Defense Organization, later renamed the Missile Defense Agency. This CHOP worked on exposing possible flaws in the proposed space-based shield to protect the nation from nuclear missile attacks, which comprised part of the Reagan administration's Strategic Defense Initiative.

The CHOP concept proved so successful that the present Space CHOP was formed in 1999. Space CHOP would be available to any military or government organization that needed an asymmetric threat assessment. The MDA CHOP closed its successful run in 2003, leaving Space CHOP as the focus of all such open source threat emulation.

Following the terrorist attacks on Sept. 11, 2001, the Space CHOP's client base and number of scheduled missions expanded. A few months later, the Air Force's Space and Missile Systems Center started funding the program, with AFRL's Space Vehicles Directorate continuing administrative oversight.

The awareness level of the threat to U.S. systems posed by asymmetric threats has increased dramatically. "The nature of our enemy has changed," said Peter Withers, a current Navy Reserve intelligence officer, and Space CHOP management consultant, Universal Technologies Corp. "Space CHOP allows our customers to see themselves through the eyes of their adversaries."

About four months in duration, a standard program mission involves four Air Force junior officers with a technical academic education. Occasionally, an officer with a non-technical background, such as business, will be invited to join a team.

"Most of our missions are quite technical in nature, so I mostly pick volunteers with engineering or physical science degrees, but some missions have policy aspects to them, so I like to add a non-techie in those cases," said Mr. Holbrook. "That mixture has worked out very well."

Regardless of academic background, the four Airmen, serving on a temporary duty assignment, have no prior knowledge of the designated military space system. They

assess its susceptibility to asymmetric threats employing common, web-based investigative methods and other atypical communicative processes including social engineering, an unorthodox practice of obtaining information from legitimate sources via the telephone or computer.

"We don't want officers with inside knowledge on our missions, because the whole purpose is to see what an outside group, from anywhere in the world, can discern about our systems," said George Dietrich, a former Air Force fighter-bomber pilot and operational test director, and Space CHOP management consultant, Booz Allen Hamilton.

At the onset of each session, the Space CHOP organization identifies the rules of engagement to the participants and client. In addition, as a precautionary measure, they coordinate the planned session with the customer's security organization, the local Air Force Office of Special Investigations detachment, and other applicable protective agencies.

At the midway point of a mission, the Space CHOP simulated terrorist team delivers a status briefing for the customer and upon mission completion, the customer agency receives a final, formal classified presentation and report, as well as gets the list of what the team found in open source documentation, compiled in several binders.

"Space CHOP provides the customer what they want and need," said Mr. Dietrich. "It also provides young lieutenants with a four-month course on intelligence-based, asymmetric training."

"By using fresh teams for each mission, we assure our customer we are not 'mirror imaging,' a problem that can affect professional intel analysts as they can tend to look at an enemy and assume he will act as we would," said Mr. Withers. "Our young guys have no preconceived notions, and so have not developed any biases."

Looking to attract other participating federal government agencies and military services, the Space CHOP will continue to evolve to meet the rapid technological advances impacting today's asymmetric threat environment on the ground or in the heavens. Nevertheless, the program remains primarily focused on protecting military assets.

"We are growing, but we're not forgetting where we come from," said program chief Holbrook, himself a former Marine Corps enlisted navigator and Air Force space weather officer. "We are the only government organization that does open source, simulated terrorism employing a non-expert team."

"Space CHOP is a genuinely unique organization," he continued. "However, it's important to note that we do not replace traditional vulnerability analysis, we complement it. When the leadership fuses the two types of analyses together, the result is the best possible insight into enemy capabilities and intentions."