[ISN] Cyber Warfare (long -- with comments)

From: mea culpa (jerichot_private)
Date: Sun Jul 26 1998 - 14:20:37 PDT

  • Next message: mea culpa: "[ISN] cDc releases BACK ORIFICE for MS Windows"

    Originally From: alan l cottrell <acottrellt_private>
    Posted To: dc-stufft_private
    
    THE WASHINGTON POST (July 26, 1998): Intent on developing more powerful
    weapons for penetrating enemy computer networks, U.S. military and
    intelligence authorities are struggling to define new rules for deciding
    when to launch cyber attacks, who should authorize them and conduct them
    and where they fit into an overall defense strategy[1]. 
    
    Not since the advent of nuclear bombs half a century ago have national
    security officials confronted weapons with such potential to alter the
    means for waging war, say those involved in the planning.  But the
    consequences of their use remain largely unexamined and problematic[2]. 
    
    The extent of U.S. offensive capabilities is among the most tightly held
    national security secrets[3].  According to various accounts, the
    government has explored ways of planting computer viruses or "logic bombs"
    in foreign networks to sow confusion and disruption[4]. 
    
    It has considered manipulating cyberspace to disable an enemy air-defense
    network without firing a shot[5], shut off power and phone service in
    major cities, feed false information about troop locations into an
    adversary's computers and morph video images onto foreign broadcast
    stations[6]. 
    
    Pentagon officials say they are at an early stage of thinking about the
    various applications for cyber weapons and the legal, ethical and
    operational consequences of employing them.  But because of secrecy
    concerns, many of the programs remain known only to strictly
    compartmentalized groups, inhibiting the drafting of general policy or
    specific rules of engagement[7]. 
    
    "It's a little bit like medical ethics,"[8] said a high-ranking Defense
    Department official who requested anonymity.  "The technology gives you
    the capabilities that go a lot further than the ethical context for using
    them sometimes.  This is a very tough area." 
    
    A presidential directive last month outlining a plan for raising U.S. 
    defensive barriers against computer attacks made no mention of the
    offensive side of the issue.  Senior administration officials say no
    presidential directive about offensive capabilities is in the works that
    might help resolve the differences between the Pentagon and intelligence
    agencies[9]. 
    
    Similarly, Congress has held next to no public debate[10] on the direction
    the United States should be heading in inventing cyber weapons[11],
    writing guidelines for their use or weighing the potential international
    repercussions of unleashing them.  At a Senate hearing last month that
    focused on the vulnerability of America's information systems to
    unauthorized entry[12], Sen. Carl M. Levin, D-Mich., gingerly questioned
    whether the United States is developing offensive capabilities.  George J.
    Tenet, director of Central Intelligence, said the nation can rest assured
    that "we're not asleep at the switch in this regard." 
    
    For all the interest in cyber warfare, specialists cautioned that yawning
    gaps exist between what the technology promises and what practitioners
    currently can deliver[13].  Large-scale computer attacks require an
    extraordinary amount of detailed intelligence about a nation's hardware
    and software systems[14], as well as about the habits and decision-making
    processes of foreign and military authorities. 
    
    "Frequently, we like to think of electronic attack as the ultimate in
    precision weapons," said Vice Adm. Arthur K. Cebrowski, a leading Navy
    authority on the subject.  "But these are not necessarily very precise
    instruments." 
    
    Much is still unknown about how a major cyber attack would play out. 
    
    "We don't understand the cascading effects on decision-making of what
    providing defective data to an enemy may mean," said a colonel responsible
    for the Air Force's information warfare plans.  "That's a hard thing to
    model." 
    
    Other critical questions surround these largely untested weapons, experts
    say.  Given their broad destructive potential, for instance, should cyber
    weapons be placed under a special military command authority, similar to
    the Strategic Command that manages targeting plans for the U.S. atomic
    arsenal?[15]
    
    When should the United States justifiably consider taking down chunks of
    the information infrastructure of a foreign country?  What are the risks
    of inviting retaliation? 
    
    How should intrusions into foreign systems be conducted in peacetime for
    the benefit of intelligence gathering, and when does such snooping --
    which often involves the same computer techniques as offensive action --
    cross some boundary into outright aggression? 
    
    "What constitutes an act of war in this area?  It's never been made
    clear," said Brenton C. Greene, a former Pentagon specialist in
    information operations who served on the presidential commission that
    studied U.S. vulnerabilities last year... 
    
    <snip>
    
    for the remainder of this article, see http://www.washingtonpost.com
    
    [1] the us military is not allowed to conduct warfare on its own
    citizens, right?  especially without a formal declaration of war?
    [2] right now, who else could they be used against -- besides us, i mean?
    [3] i'm wondering, is this why the clinadmins what to force weak
    encryption upon us -- especially at the export level?  you know those
    feisty germans.  we could never invade granada again if we let them
    secure their communications...
    [4] a.) who's been talking?
    b.) remember this the next time someone criticized the use of worms,
    viruses or security testing...
    c.) is this a possible defense for kevin mitnick (well, the government is
    doing it, why can't i?).
    [5] just like the legion of the underground -- good going, guys
    [6] a.) once again, just like the legion of the underground (they're
    really cyberspies)... </sarcasm>
    b.) now your domestic station is running american military diversions
    while cnn is live, on the ground, filling you in on what is really
    happening.  and which station do you watch?  which one do you believe?  a
    little crinkle in the plan here.  now, if the were to take over cnn...
    [7] pete, sinster -- all you security consultants out there, i'm sensing
    a brand new business opportunity, with the potential for wealth and fame:
    teach the military how to conduct cyber war.  you better act quick,
    before this article reaches new mexico (i figure you've got two weeks),
    and carolyn sees the same opportunity (that ought to give you another two
    months)...
    [8] can you have ethics and the defense department logically in the same
    sentence.  anyway, forget about carolyn, she doesn't have any ethics...
    [9] ok, so the pentagon has a new toy and the nsa and cia want to play
    with it too?  don't you feel safer now?
    [10] although patrick leahy (senator from vermont, sits on intelligence
    committee, and generally knowledgeable about technology) admitted that
    there were secret hearings before the intelligence committee on just this
    subject...
    [11] mitnick wasn't cracking into people's computers, he was inventing a
    new form of cyber weapon on behalf of the us military...
    [12] i think they're talking about you
    [13] what they're really trying to say is this: For all the interest in
    cyber warfare, specialists cautioned that yawning gaps exist between what
    government employees can currently do and what everyone else seems
    capable of...
    [14] not unlike the kind of "intelligence" that pete currently collects
    -- i'm seeing money rushing to you, evil pete...
    [15] yep.  i'm volunteering to lead the Strategic Command for the Use and
    Exploitation of Cyber Weaponry in All Circumstances Short of a Formal
    Declaration of War as passed by Congress
    
    
    
    
    -o-
    Subscribe: mail majordomot_private with "subscribe isn".
    Today's ISN Sponsor: New Dimensions International [www.newdimensions.net]
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:59:53 PDT