NATO can usually audit its own CA
infrastructures and ensure their security. However, security breaches in an external CA can also
jeopardize NATO own security. In addition, the possibility of malicious use of intermediate
CAs to perform targeted attacks through ad-hoc certificates cannot be neglected [5], and these
attacks are extremely difficult to detect. These rogue certificates can be used in man-in-the-middle
attacks, which will not be detected by conventional mechanisms for PKIX certification
path validation and revocation checks