http://blog.wired.com/defense/2007/12/how-to-wage-cyb.html By Noah Shachtman Wired.com December 12, 2007 Pentagon types are spending God-knows-how-much to wage battle online. Brave New War [1] author John Robb [2] offers 'em some tips on how to put their dough to the best use [3] . Over the few years, the Defense Department has morphed the nuclear weaponeers of U.S. Strategic Command [4] into network warriors, and turned the 8th Air Force into a new "Cyberspace Command." Not to mention plowing countless billions into the National Security Agency [5] and all kinds of digital combat cadres [6], scattered throughout the armed services. And from the interviews I've done, at least, the roles and expectations for each of these agencies is, um, evolving, at best. Robb's advice, to his former Air Force colleagues now putting Cyberspace Command together: * Real-world experience and rapid (open source) innovation. Most, if not all, of this experience and innovation in cyberwarfare is gained through criminal activity. Innovation is a product of rapid cycles of competition with software vendors and computer security companies. * Massive self-replication. Think in term of small teams (the smarter, the better) designing software that seizes control of tens of millions of computer systems through various forms of infection. * Deniability. Nearly all of the successful operations conducted in offensive cyberwarfare will require deniability. Post-attack forensics must not point back to a government since these wars/battles will be fought in peacetime. "Given these requirements, Robb believes, "this new Command will likely fail (and badly)." It'll create public relations disasters -- and retreat into a largely defensive crouch. And once it does, it'll be outmaneuvered by countries willing to get in bed with online mafias. We'll see. [1] http://www.amazon.com/exec/obidos/ASIN/0471780790/c4iorg [2] http://globalguerrillas.typepad.com/ [3] http://globalguerrillas.typepad.com/globalguerrillas/2007/12/the-us-and-cybe.html [4] http://www.defenselink.mil/news/newsarticle.aspx?id=47605 [5] http://blog.wired.com/defense/2007/09/nsa-targets-hac.html [6] http://blog.wired.com/defense/2007/10/also-nsa-target.html __________________________________________________________________ Visit InfoSec News http://www.infosecnews.org/
This archive was generated by hypermail 2.1.3 : Thu Dec 13 2007 - 00:10:54 PST